text
stringlengths 2.85k
2.55M
| label
class label 11
classes |
---|---|
Formalising Confluence in PVS
Mauricio Ayala-Rincón
Departamentos de Ciência da Computação e Matemática
Universidade de Brası́lia, Brazil
[email protected]
Confluence is a critical property of computational systems which is related with determinism and
non ambiguity and thus with other relevant computational attributes of functional specifications and
rewriting system as termination and completion. Several criteria have been explored that guarantee
confluence and their formalisations provide further interesting information. This work discusses topics and presents personal positions and views related with the formalisation of confluence properties
in the Prototype Verification System PVS developed at our research group.
1
Introduction
Syntactic criteria such as avoiding overlapping of rules as well as linearity of rules have been used as a
discipline of functional programming which avoids ambiguity. In the context of term rewriting systems
(TRSs for short), well-known results such as Newman’s Lemma [9], Rosen’s Confluence of Orthogonal
term rewriting systems [11] as well as the famous Knut-Bendix(-Huet) Critical Pair Lemma [8, 7] are of
great theoretical and practical relevance. The first one, guarantees confluence of Noetherian and locally
confluent abstract reduction systems; the second one, assures confluence of orthogonal term rewriting
systems, that are systems that avoid ambiguities generated by overlapping of their rules and whose rules
do not allow repetitions of variables in their left-hand side (i.e., left-linear); and, the third one provides
local confluence of term rewriting systems whose critical pairs are joinable.
Formalisations in PVS of these confluence criteria provide valuable and precise data about the theory
of rewriting (cf. [6], [5], [10]). All mentioned specifications and formalisations are available either
at the local site http://trs.cic.unb.br or, as part of the NASA PVS libraries, in the theories for
abstract reduction systems ars and term rewriting systems trs that belong to the TRS development, at
http://shemesh.larc.nasa.gov/fm/ftp/larc/PVS-library/pvslib.html.
2
Background
It is assumed the reader is familiar with rewriting notations and notions as given in [3] and [4].
2.1 Abstract reduction systems
In the PVS development for TRSs, specifically in the theory ars, an abstract reduction system (for
short, ARS) is specified as a binary relation R over an uninterpreted type T , R VAR : PRED[[T,T]].
This choice facilitates the definition of associated necessary relations through the use of PVS operations
for relations such as reversal, subset, union, composition and an operator for iterative applications of
compositions. For instance,
• the inverse of the relation is specified as converse(R);
C.A. Muñoz and J. A. Pérez (Eds.) :
Developments in Computational Models
EPTCS 204, 2016, pp. 11–17, doi:10.4204/EPTCS.204.2
Formalising Confluence in PVS
12
• the symmetric closure, SC(R), as union(R, converse(R);
• the reflexive closure, RC(R), as union(R, =);
• the reflexive transitive closure, RTC(R), as IUnion(LAMBDA n:
iterate(R, n));
• the equivalence closure, EC(R), as RTC(SC(R)) etc.
Properties of ARSs are then specified in a very natural manner from these relational basis. For
instance, using PVS properties for relations such as well-foundedness, the property of noetherianity,
noetherian?(R) is specified as the predicate well founded?(converse(R)). Also, the property of
confluence, confluence?(R), is specified as
FORALL x, y, z: RTC(R)(x,y) & RTC(R)(x,z) => joinable?(R)(y,z)
where the predicate joinable? is specified as
joinable?(R)(x,y): bool = EXISTS z: RTC(R)(x,z) & RTC(R)(y, z).
More synthetic specifications might be possible; for instance, the elegant set-theoretical definition of
confluence, written in the usual rewriting notation as (∗ ← ◦ →∗ ) ⊆ (→∗ ◦ ∗ ←) can be specified straightforwardly as subset?(RTC(converse(R)) o RTC(R), RTC(R) o RTC(converse(R))), using relation composition, o, and the subset predicate, subset?.
ARS results were formalised using standard proof techniques as noetherian induction. Among other
results on confluence of ARSs, a description of the formalisation of Newman Lemma, specified below,
is available in [5]
Newman: LEMMA noetherian?(R) => (confluent?(R) <=> locally confluent?(R))
2.2 Term Rewriting Systems
Terms are specified as a data type built from variables over a nonempty uninterpreted type and a signature
of function symbols with their respective arities. The arguments of a functional term, headed by a
function symbol of the signature, are specified as a finite sequence of terms, of length equal to the arity
of the function symbol. Positions of a term t, written posOF(t), are finite sequences of naturals specified
recursively as in the standard way in the theory of rewriting. Thus, the necessary operations on positions
as their concatenation resumes to concatenation of finite sequences of naturals and so, predicates such as
disjunct or parallel positions, given by the predicate parallel? or for short ||, are specified as (NOT
p <= q) & (NOT q <= p), where <= is the sequence prefix relation built as <=(p, q): bool =
(EXISTS (p1: position): q = p o p1).
Using these types for terms and positions, it is possible to build the required algebraic properties
for terms, positions, subterms and replacement of terms. Namely, the subterm of a term t at a valid
position p, usually written as t p , is specified recursively navigating through the structure of the term
according to the naturals in the position sequence and the arguments of the functional terms inside
t: stOF(t: term, (p: positions?(t)). Also, the replacement of the subterm at a valid position p of a term s by another term t is built recursively: replaceTerm(s: term, t: term, (p:
positions?(s))), that will be abbreviated as s[t] p. These design decisions give rise to algebraic
properties that are easily formalised by inductive proofs on these data structures. Among other properties,
one has formalisations for:
• Preservation of positions after replacement of subterms either positions of replacement:
posOF(s)(p) => posOF(s[t] p)(p)
or parallel positions to the position of replacement:
posOF(s)(p) & posOF(s)(q) & p||q => posOF(s[t] p)(q)
M. Ayala-Rincón
13
• Extension of possible new valid positions at the position of replacement after a replacement (where
below o stands for the concatenation of sequences):
posOF(t)(q) & posOF(s)(p) => posOF(s[t] p)(p o q)
• Preservation of replaced terms:
posOF(s)(p) & posOF(t)(q) => stOF(s[t] p,p o q) = stOF(t, q)
• Associativity of replacement:
posOF(s)(p) & posOF(t)(q) => (s[t] p)[r] (p o q) = s[t[r] q] p
• Commutativity of replacement at parallel positions:
posOF(s)(p) & posOF(s)(q) & p||q => (s[t] p)[r] q = (s[r] q)[t] p
Rewriting rules are specified as pairs of terms (l, r) satisfying the usual conditions on rules, that is
the left-hand side (lhs) cannot be a variable and the variables occurring in the right-hand side (rhs) should
belong to the lhs of the rule:
rewrite rule?(l,r):
bool = (NOT vars?(l)) & subset?(Vars(r), Vars(l))
After that, it is possible to define the type of rewriting rules as
rewrite rule :
TYPE rewrite rule?
and then, a TRS is given as a set of rewriting rules set[rewrite rule].
Substitutions are built as objects of type [V -> term], where V is a countably infinite set of variables and such that their domain is finite, that is Sub?(sig): bool = is finite(Dom(sig)), where
Dom(sig): set[(V)] = {x: (V) | sig(x) /= x} . The type of substitutions is given as Sub:
TYPE = (Sub?). From this point, renaming, variants, composition of substitutions and homomorphic
extensions of substitutions, ext(sigma), are easily built as well as a series of necessary substitution
properties formalised.
With these elements of formal design it is possible to define the reduction relation from a set of
rewriting rules say E:
reduction?(E)(s,t): bool =
EXISTS ( (e | member(e, E)), sigma, (p: positions?(s))) :
stOF(s, p) = ext(sigma)(lhs(e)) &
t = s[ext(sigma)(rhs(e))]_p
Immediately, it is possible to prove that this relation is closed under substitutions and compatible
with contexts.
After that, a predicate for critical pairs of a TRS E is built, CP?(E), and then the most famous result
on confluence of TRSs, that is the Critical Pair Lemma is formalised as described in [6].
CP: THEOREM FORALL E: locally_confluent?(reduction?(E)) <=>
(FORALL s, t) : CP?(E)(s, t) => joinable?(reduction?(E))(s,t)
Since the reduction relation built from a set of rewriting rules inherits by parameterisation, all properties of ARSs in the ars development, it is possible to apply Newman’s Lemma in order to formally
infer confluence of a terminating TRS all whose critical pairs are joinable.
The design decisions taken in the specification of ARSs and TRSs were satisfactory to accomplish
one of our main objectives in this formalisation, that is indeed maintaining formal proofs as close as
14
Formalising Confluence in PVS
possible to the analytical proofs presented in textbooks. In fact, diagrammatic didactical artefacts (used
in papers and textbook) representing rewriting properties used in the proofs as commutation diagrams
for confluence, local-confluence etc, and those ones used for representing peaks valleys and overlap
situations in the analysis of the Critical Pair criterion can be also conducted when reasoning about our
formalisations.
In particular, the formalisation of the Critical Pair Lemma follows the textbook proof organisation
which is based on the analysis of the possible peaks when trying to obtain local confluence. These peaks
can be originated from simultaneous reductions at parallel positions, which are trivially joinable, or from
reductions at nested positions, which give rise to either critical or non-critical overlaps.
A peak, from a critical overlap can be easily verified to join, by proving that it corresponds to an
instance of a critical pair and using the assumption that critical pairs are joinable.
The non-critical overlaps are the interesting ones. A such peak is originated by application of rules
l → r and g → d with substitution σ , assuming these rules have not common variables which is possible
by renaming of rules. Supposing l σ occurs in the dominating position of the overlap, one can focus on
the analysis of the joinability of the peak rσ ← l σ → l σ [d σ ] p◦q , where p is a variable position in l, say
l p = x, and q the position in xσ in which gσ occurs.
Thus, all that is solved by the careful construction of a new substitution, σ ′ such that it modifies
σ mapping x 7→ xσ [d σ ]q and maintains the images of all other variables in the domain of σ as those
mapped by σ .
In the sequel, by a like “uniform reduction sequence” one has that rσ →∗ rσ ′ and l σ [d σ ] p◦q →∗ l σ ′ ;
the former is done as rσ → rσ [d σ ]q1 ◦q → · · · → rσ [d σ ]q1 ◦q · · · [d σ ]qn ◦q = rσ ′ , where {q1 , . . . , qn } is the
set of positions of r in which x occurs, and the latter is done as l σ [d σ ] p◦q → l σ [d σ ] p◦q [d σ ] p1 ◦q → · · · →
l σ [d σ ] p◦q [d σ ] p1 ◦q · · · [d σ ] pm ◦q = l σ ′ , where {p} ∪ {p1 , . . . , pn } is the set of positions of l in which x
occurs.
So joinability is concluded by the application of rule l → r with substitution σ ′ . See for instance the
proof in Chapters 6 or 2 of respectively [3] or [4].
The formalisation, under the design choices previously mentioned, requires the construction of elements that guarantee specialised properties, such as the instantiation of a critical pair, built from the
rewriting rules, that corresponds to a critical overlap as well as the substitution σ ′ for a non-critical overlap. For the latter, it is necessary an inductive proof (using auxiliary lemmas) on the cardinality of the
sets of positions {q1 , . . . , qn } and {p1 , . . . , pm } for concluding that l σ and rσ rewrite into l σ ′ and rσ ′ ,
respectively.
3
Formalising the algebra of parallel rewriting and orthogonality
Rosen’s confluence of orthogonal TRSs [11] is a challenging formalisation. The classical proof is based
on the Parallel Moves lemma: essentially, what is necessary is to prove that under the hypothesis of
orthogonality, the associated parallel reduction relation holds the diamond property.
Intuitively, the analytical proof requires only the comprehension of properties for the notion of the
parallel reduction relation, but the intuition of parallel rewriting is usually explained through the like
“uniform reduction” as in the analysis of the Critical Pair criterion, which in fact refers to sequential
rewriting. So, any formalisation following the classical approach would require an explicit construction of such that parallel relation as well as the specialised description and formalisation of its specific
algebraic properties.
The notion of parallel reduction depends on sets of triplets of valid positions, rules and substitutions,
M. Ayala-Rincón
15
positions in which sequential replacements are simultaneously applied according to the instantiation
of the rules with the associated substitutions. Because of this dependence, two design approaches are
possible: either using sets of triplets of positions, rules and substitutions or sets of (finite) and coordinated
sequences of positions Π, rules Γ and substitutions Σ. We opted by the last design alternative since we
believe it is closer to implementations in programming languages and also because PVS offers libraries
with translations (and their necessary formalised properties) between data structures such as sets, lists
and finite sequences.
The parallel rewriting reduction relation built from a set of rewriting rules E, that in classical notation
is written as s ⇒ t, is specified as the relation parallel reduction?(E)(s,t) below, using a parallel
replacement operator, replace par pos, that is recursively specified from the sequential replaceTerm
operator, and through an auxiliary relation parallel reduction fix?(E).
parallel_reduction_fix?(E)(s,t, (fsp: SPP(s))): bool =
EXISTS ((fse | member(fse, E)), fss) :
fsp‘length = fse‘length AND fsp‘length = fss‘length
AND subtermsOF(s,fsp) = sigma_lhs(fss, fse)
AND t = replace_par_pos(s, fsp, sigma_rhs(fss, fse))
parallel_reduction?(E)(s,t): bool =
EXISTS (fsp: SPP(s)): parallel_reduction_fix?(E)(s,t,fsp)
fsp, fse and fss correspond to the sequences Π = [p1 , . . . , pn ], Γ = [(l1 , r1 ), . . . , (ln , rn )] and Σ =
[σ1 , . . . , σn ] of positions, rewriting rules and substitutions used in the parallel rewriting. fsp is a sequence of parallel positions of s obtained by its type dependency, that is SSP(s). fse is a sequence
of equations in the rewriting system given by member(fse, E), and fss is a sequence of substitutions. The required coordination of triplets of associated positions, rules and substitutions is directly
obtained by using the corresponding indexation in the respective sequences, that is the same index. The
condition subtermsOF(s,fsp) = sigma lhs(fss, fse) equals the condition that for all valid index
i of these sequences, s pi = li σi and the condition t= replace par pos(s, fsp, sigma rhs(fss,
fse)) equals t to the desired parallel contractum, that is s replacing the li σi ’s by the ri σi ’s.
In a parallel peak, say t ⇔ s ⇒ u, using positions, equations and substitutions say (Πk , Γk , Σk ) for
k = 1, 2, as in the case of the Critical Pair Lemma, the interesting cases are those of non-critical overlaps.
Without loss of generality, at some position q ∈ Π1 one has all positions p1 , ..., pn in Π2 below q. On
the one side, sq = l σ and tq = rσ , where (l, r) is the rewriting rule in Γ1 and σ the substitution in Γ1
associated with the position q in Π1 . On the other side, one has sq ⇒ uq by parallel reduction at positions
p1 , . . . pn below q accordingly to the same equations and substitutions in the triplet (Π2 , Γ2 , Σ2 ). Let
(Π′ , Γ′ , Σ′ ) denote the triplet of this last parallel reduction step, then the parallel peak rσ ⇔ l σ ⇒ uq is
an instance of the Parallel Moves Lemma. See details in Chapter 4.3 of [4] or 6.4 of [3], for instance.
Since in such a parallel peak rσ ⇔ l σ ⇒ t all overlaps are non critical, one should prove that parallel
reducing each σ -instance of a variable in l, say x at position p one has l σ p = xσ ⇒ xσ ′ = t p , where the
substitution σ ′ is built by reducing in parallel all occurrences of σ -instantiated variables in l σ uniformly,
which is possible by left-linearity assumption. Thus, rσ ⇒ rσ ′ and t ⇒ l σ ′ , that allows concluding the
joinability of the peak.
Despite in the theory the adaptation of sequential properties for parallel replacement might be intuitively clear, in the PVS development the necessary specialised algebraic properties should be formalised.
Let s[T] Π denote the parallel replacement of terms in the sequence of terms T at valid parallel positions
Π. A few of those properties are included below.
Formalising Confluence in PVS
16
• Preservation of positions after replacement of subterms either positions of replacement:
posOF(s)(Π) => posOF(s[T] Π)(Π)
or parallel positions to the position of replacement:
posOF(s)(Π) & posOF(s)(Π′) & Π′ ||Π => posOF(s[t] p)(Π′ )
• Invariance under composition of parallel replacement at parallel sequences of positions:
posOF(s)(Π1) & posOF(s)(Π2) & Π1 ||Π2 =>
(s[T 1] Π1 )[T 2] Π2 = (s[T 1 o T 2] Π1 ◦ Π2
• Commutativity of parallel replacement at parallel sequences of positions:
posOF(s)(Π1) & posOF(s)(Π2) & Π1 ||Π2 =>
(s[T 1] Π1 )[T 2] Π2 = (s[T 2] Π2 )[T 1] Π1
The formalisation of confluence of orthogonal TRS proceeds by inductive proof techniques taking
care of the specificities of the algebra of parallel positions, replacement and rewriting.
4
Conclusions and future work
The development of these formalisations on confluence of TRSs brought out several lessons.
From the theoretical point of view, the main observation is that despite the intuitive notion of ”uniform reduction”, that is used to provide intuition about the proof of the Parallel Moves Lemma, induces
to believe that the extension is obvious, a specialised development of the theory of parallel reduction
and its algebraic properties is necessary. And extending sequential to parallel rewriting formalisations is
not trivial. A preliminary thoughtful analysis would be always necessary in order to estimate accurately
the real complexity and the necessary effort of formalisations in any context, mostly when the proposed
development appears to be a simple extension of those yet available. The second lesson has to do with
the investment of enough time for fine tuning design decisions since they influence the effort required in
proofs.
The main lesson is that through this kind of exercise, our comprehension of the theory becomes more
refined, providing a better support for the formal analysis of further related developments, as well as a
more realistic insight about the possible adaptation or reuse of previous specifications and proofs. Developments in progress include use of such techniques in other contexts as the nominal syntax approach
of rewriting (cf. [1] [2]).
References
[1] M. Ayala-Rincón, M. Fernández, M. J. Gabbay & A. C. Rocha Oliveira (2015): Checking
Available at
Overlaps of Nominal Rewriting Rules.
In: Pre-proc. LSFA, pp. 199–2014.
https://www.mat.ufrn.br/~LSFA2015/preproceedings.pdf.
[2] M. Ayala-Rincón, M. Fernández & A. C. Rocha Oliveira (2015):
Completeness in PVS
Pre-proc. LSFA, pp. 19–34.
Available at
of a Nominal Unification Algorithm.
In:
https://www.mat.ufrn.br/~LSFA2015/preproceedings.pdf.
[3] F. Baader & T. Nipkow (1998):
doi:10.1017/CBO9781139172752.
Term Rewriting and All That.
Cambridge University Press,
[4] M. Bezem, J.W. Klop & R. de Vrijer, editors (2003): Term Rewriting Systems by TeReSe. Cambridge Tracts
in Theoretical Computer Science 55, Cambridge University Press.
M. Ayala-Rincón
17
[5] A. L. Galdino & M. Ayala-Rincón (2008): A Formalization of Newman’s and Yokouchi Lemmas in a HigherOrder Language. Journal of Formalized Reasoning 1(1), pp. 39–50, doi:10.6092/issn.1972-5787/1347.
[6] A. L. Galdino & M. Ayala-Rincón (2010): A Formalization of the Knuth-Bendix(-Huet) Critical Pair Theorem. J. of Automated Reasoning 45(3), pp. 301–325, doi:10.1007/s10817-010-9165-2.
[7] G. Huet (1981): A complete proof of correctness of the Knuth-Bendix completion algorithm. Journal of
Computer and Systems Sciences 23(1), pp. 11–21, doi:10.1016/0022-0000(81)90002-7.
[8] D. E. Knuth & P. B. Bendix (1970): Computational Problems in Abstract Algebra, chapter Simple
Words Problems in Universal Algebras, pp. 263–297. J. Leech, ed. Pergamon Press, Oxford, U. K.,
doi:10.1016/B978-0-08-012975-4.50028-X.
[9] M. H. A. Newman (1942): On theories with a combinatorial definition of “equivalence”. Ann. of Math.
43(2), pp. 223–243, doi:10.2307/1968867.
[10] A. C. Rocha Oliveira & M. Ayala-Rincón (2013): Formalizing the Confluence of Orthogonal Rewriting Systems.
CoRR abs/1303.7335, doi:10.4204/EPTCS.113.14.
Available at
http://arxiv.org/abs/1303.7335.
[11] B. K. Rosen (1973): Tree-Manipulating Systems and Church-Rosser Theorems. J. of the ACM 20(1), pp.
160–187, doi:10.1145/321738.321750.
| 6cs.PL
|
Distance-based Self-Attention Network for Natural Language Inference
Jinbae Im and Sungzoon Cho
Department of Industrial Engineering
Seoul National University
Seoul, South Korea
[email protected], [email protected]
Abstract
arXiv:1712.02047v1 [cs.CL] 6 Dec 2017
Attention mechanism has been used as an
ancillary means to help RNN or CNN.
However, the Transformer (Vaswani et al.,
2017) recently recorded the state-of-theart performance in machine translation
with a dramatic reduction in training
time by solely using attention. Motivated by the Transformer, Directional Self
Attention Network (Shen et al., 2017),
a fully attention-based sentence encoder,
was proposed. It showed good performance with various data by using forward
and backward directional information in
a sentence. But in their study, not considered at all was the distance between
words, an important feature when learning the local dependency to help understand the context of input text. We propose Distance-based Self-Attention Network, which considers the word distance
by using a simple distance mask in order to
model the local dependency without losing the ability of modeling global dependency which attention has inherent. Our
model shows good performance with NLI
data, and it records the new state-of-the-art
result with SNLI data. Additionally, we
show that our model has a strength in long
sentences or documents.
1
Introduction
Sequence modeling has been employing Recurrent
Neural Networks (RNN) or Convolutional Neural
Networks (CNN) mostly. More recently, models
incorporating attention mechanisms have shown
good performance in machine translation (Bahdanau et al., 2014; Sutskever et al., 2014), Natural
Language Inference (NLI) (Liu et al., 2016), and
Question Answering (QA) (Hermann et al., 2015;
Sukhbaatar et al., 2015) etc. Attention mechanisms used to be exploited in conjunction with
RNN or CNN as an ancillary means to help improve performance. Lately, Vaswani et al. (2017)
presented the first fully attention-based model,
which recorded the state-of-the-art result in machine translation. As a fully attention-based model
can consider all words in a sentence at once, parallelization leads to great reduction in training time.
Motivated by Vaswani et al. (2017), Shen et al.
(2017) proposed the first fully attention-based
sentence encoder. Shen et al. (2017) recorded
good performance in a variety of tasks. In particular, they recorded the state-of-the-art result
with Stanford Natural Language Inference (SNLI)
dataset (Bowman et al., 2015) which is a representative dataset of NLI. The NLI task aims to
classify the relationship between two sentences
as entailment, contradiction, or neutral. One
of the approaches to solving the NLI task is
to use sentence-encoding based models.∗ Shen
et al. (2017) presented a sentence-encoding based
model reflecting directional information in a sentence. However, the distance between words was
not considered at all in their model, and the directional information simply involved words before and after the reference word. Altogether, positional information of words was not fully taken
into account. As a result, the difference of importance between the distant words and the nearby
words was not appropriately reflected. Hence lo∗
The NLI task can be solved through two different approaches: sentence encoding-based models and joint models.
The former separately encode each sentence, whereas the latter take into account the direct relationship between two sentences. Between them, sentence-encoding based models focus on training sentence encoder that can represent sentences
in vector form well. We focus on the former approach, since
the objective of our work is to develop an advanced sentenceencoding model.
cal dependency was not properly modeled, which
in turn failed to capture the context information in
long sentences.
To tackle this limitation, we propose Distancebased Self-Attention Network which introduces a
distance mask which models the relative distance
between words. In conjunction with a directional
mask, the distance mask allows us to incorporate
complete positional information of words in our
model. Our Distance-based Self-Attention Network achieved good performance with NLI data,
and recorded the state-of-the-art result with SNLI.
Our model worked exceptionally well with long
sentences, in particular. We also visualized the effect of the distance mask to show that our model
can grasp both local dependency and global dependency.
2
Related Works
NLI tasks have been studied through models of
various structures. Most of all, models combining
attention with Long Short-Term Memory (LSTM)
have performed well. Liu et al. (2016) improved
the performance by adding the mean pooling vector to the conventional attention model in which
attention is applied to hidden states of LSTM.
Chen et al. (2017) used the input gates of the
LSTM as attention weights to simplify the model
structure. In Chen et al. (2017) and Ni and Bansal
(2017), short-cut connections in stacked LSTM,
in combination with max-pooling originally suggested by Conneau et al. (2017), were proven effective in improving performance, recording the
state-of-the-art performance in MultiNLI. And
Munkhdalai and Yu (2016a) used the memory for
sentence encoding motivated by Neural Turing
Machine (Graves et al., 2014).
Vaswani et al. (2017) was the first study to construct an end-to-end model with attention alone,
and recorded the state-of-the-art performance in
machine translation tasks. Vaswani et al. (2017)’s
encoder-decoder framework consists of a multihead attention and a position-wise feed forward
network as a basic building block which is deeply
stacked combined with residual connection. The
multi-head attention projects the input sentences
to multiple subspaces and then computes the
scaled dot-product attention in each subspace. The
results in each subspace are then concatenated and
projected again. Position-wise feed forward network adds non-linearity to vector representations
of each position. In this way, the fully attentionbased model was constructed without using RNN
or CNN, and the training cost was greatly reduced.
Shen et al. (2017), a very recent work, constructed a fully attention-based sentence encoder
motivated by Vaswani et al. (2017). They proposed a multi-dimensional attention mechanism
that computes the attention by each dimension
through modification of additive attention. In addition, their model exploits directional attention
as well as fusion gate motivated by bi-directional
LSTM. Directional information was reflected by
introducing a simple directional mask. By adding
a directional mask to the logit of attention, words
in a specific direction in the sentence were masked
to avoid attention. The extent to which attention
results are ultimately reflected was determined
through fusion gate. In our study, we construct
our model based on Vaswani et al. (2017)’s basic
building block, as well as Shen et al. (2017)’s key
model structures. In order to model the distance
between words, which was not considered in their
works, we transform the multi-head attention in
Vaswani et al. (2017), in particular, to fit our objective. Details can be found in section 4.
3
Background
In Vaswani et al. (2017), the attention function
is defined as follows by introducing the concept
of query, key, and value. “An attention function
can be described as mapping a query and a set
of key-value pairs to an output, where the query,
keys, values, and output are all vectors. The output is computed as a weighted sum of the values,
where the weight assigned to each value is computed by a compatibility function of the query with
the corresponding key (Vaswani et al., 2017).” The
two most commonly used attentions are additive
attention (Bahdanau et al., 2014; Shang et al.,
2015) and dot-product attention (Kim et al., 2016;
Sukhbaatar et al., 2015; Vaswani et al., 2017).
3.1
Additive Attention
Let query, ith key, and ith value be q, ki , and vi
respectively. (q ∈ Rdk , ki ∈ Rdk , and vi ∈ Rdv )
Compatibility function of the query with the ith
key is represented by the following equation 1.
f (q, ki ) = li = uT σ(q + ki ),
(1)
where u ∈ Rdk , and σ(·) is an activation function
usually chosen as tanh.
And attention weight assigned to each ith value
is computed by applying the softmax function to
li and final output is weighted sum of value as following equations.
exp(li )
j=1 exp(lj )
wi = P
Output =
X
wi v i
(2)
(3)
i=1
3.2
Dot-product Attention
Dot-product attention is the same as additive attention except for compatibility function. In dotproduct attention, compatibility function is computed by the following equation 4 in place of the
equation 1.
f (q, ki ) = li = h q, ki i
(4)
On implementation, dot-product attention is
much faster and more space-efficient than additive
attention due to optimized matrix multiplication.
In practice, however, additive attention outperforms dot product attention for large values of dk .
So Vaswani et al. (2017) used scaled dot-product
attention instead of normal dot-product attention
to prevent performance loss in large dimension as
following equation 5.
h q, ki i
f (q, ki ) = li = √
dk
4
4.1
Figure 1: Overall architecture
4.2
Sentence Encoder
The sentence encoder structure proposed in this
paper is shown in Figure 2. The term “Norm”
in Figure 2 stands for layer normalization. The
sentence encoder of Figure 2 encodes the premise
and hypothesis in a vector form. We describe each
component of our sentence encoder in detail in the
following subsections.
(5)
Proposed Model
Overall Architecture
Our model’s overall architecture is shown in Figure 1. We follow the conventional architecture for
training NLI data. First, the two input sentences,
premise and hypothesis, are encoded as vectors, u
and v respectively, through identical sentence encoders. For the encoded vectors u and v, the representation of relation between the two vectors is
generated by the concatenation of u, v, |u − v|,
and u ∗ v. Thereafter, a probability for each of the
3-class is generated through the 300D ReLU layer
and the 3-way softmax output layer. We configured the model with the setting of 1layer 300D as
in Shen et al. (2017) to focus on the performance
evaluation of the sentence encoder itself. Layer
normalization (Ba et al., 2016) and dropout are applied to 300D ReLU layer.
Figure 2: Sentence encoder
4.2.1
Word Embedding Layer
Let an input sentence be a sequence of discrete
words x = [x1 , x2 , · · ·, xn ], where xi ∈ RN is
a one-hot representation of the word i, and N is
the vocabulary size. These one-hot representations
are transformed into dense representations by us-
ing the pre-trained word embedding.
Let We ∈ Rde ×N be a pre-trained word embedding matrix. Then a sequence of dense word
representations can be written as w = We x =
[w1 , w2 , · · ·, wn ], where wi ∈ Rde is dense representation of the word i.
(a) Forward mask
4.2.2 Masked Multi-Head Attention
The masked multi-head attention is a variation
of the multi-head attention employed by Vaswani
et al. (2017). The scaled dot-product attention of
Vaswani et al. (2017) is expressed as following:
QK T
Attention(Q, K, V ) = softmax( √ )V
dk
(6)
where Q, K, V are matrices composed of a set of
queries, keys, and values, respectively.
We transform equation 6 and express the
masked attention as following:
Masked(Q, K, V )
(7)
QK T
= softmax( √
+ Mdir + αMdis )V
dk
Here, Mdir ∈ Rn×n is the directional mask
as proposed in Shen et al. (2017), while Mdis ∈
Rn×n is the distance mask proposed in this model.
Hyper parameter α is the distance-alpha tuned
through validation data.
Mdir consists of the forward mask and backward mask as explained in Figure 3. In the Forward Masked Multi-Head Attention phase, the
forward mask is selected, and in the Backward
Masked Multi-Head Attention phase, the backward mask. The forward masks prevent words that
appear after a given word from being considered in
the attention process, while backward masks prevent words that appear before from consideration
by adding −∞ to the logits before taking the softmax at the attention phase. The diagonal component of Mdir is also set to −∞ so that each token
does not consider itself to attention, and the information of each token is later transmitted through
the fusion gate of section 4.2.3
Mdis is shown in the Figure 4. The (i, j) component of the distance mask is −|i − j|, representing the distance between (i + 1)th word and
(j + 1)th word multiplied by −1. By multiplying
this value by α and adding it to logit, the attention weight becomes smaller as distance increases.
(b) Backward mask
Figure 3: Directional mask
That is, the distance mask serves to concentrate on
the local words around the reference word. Such
a structure may appear similar to a CNN filter extracting a local feature. Yet, the big difference is
that CNN only uses information in the window
size, whereas our model considers all words in a
sentence at once, concentrating on the local words
by taking account of the relative distance between
words.
By using the distance mask, the distance between words, not considered through the directional mask of Shen et al. (2017), was considered
additionally, so the complete positional information of words was taken into consideration.∗
Figure 4: Distance mask
The masked multi-head attention can be expressed as following:
Masked Multi-Head(Q, K, V )
= concat(head1 , · · · , headh )W O
(8)
where headi = Masked(QWiQ , KWiK , V WiV ),
with h as the number of heads, WiQ , WiK , WiV ∈
∗
In Vaswani et al. (2017), the positional information of
the word was used through positional encoding. By adding
the positional encoding vector to the word embedding vector,
the embedding changed according to the absolute position of
the word in the sentence. However, in sentence modeling, the
relative position with respect to the other words is important,
not the absolute position of the word. In other words, what
words are placed in order before and after the word is important, not the absolute position of the word in a sentence.
Therefore, we take the relative position directly into account
in our model through the distance mask instead of the positional encoding which considers the relative position indirectly.
Rde ×de /h , and W O ∈ Rde ×de . Q, K, V ∈ Rn×de
are matrices created from n word embedding vectors of sentences and expressed as equation 9.
− w1 −
− w2 −
Q=K=V =
..
.
− wn −
(9)
The masked multi-head attention first projects
Q, K, V into h subspaces, respectively, and performs masked attention of equation 7 for each
Q, K, V projection combination. The h attention
result is concatenated before projection.∗
4.2.3 Fusion Gate
At the fusion gate, raw word embedding S ∈
Rn×de and the result of masked multi-head attention H ∈ Rn×de in equation 10 are used as input.
− w1 −
− h1 −
− w2 −
− h2 −
S=
H =
..
..
.
.
− wn −
− hn −
(10)
First, we generate S F , H F by projecting S, H
using W S , W H ∈ Rde ×de . Mathematically:
S F = SW S
(11)
H F = HW H
Then create gate F as shown in equation 12
where bF ∈ Rde .
4.2.4 Position-wise Feed Forward Networks
We used position-wise feed forward network
structure of Vaswani et al. (2017) as it is. The
position-wise feed forward network employs the
same fully connected network to each position of
sentence, in which the fully connected layer consists of two linear transformations, with the ReLU
activation in between. Mathematically:
FFN(x) = max(0, xW1P + bP1 )W2P + bP2 (13)
where x ∈ R1×de , W1P ∈ Rde ×df f , W2P ∈
Rdf f ×de , bP1 ∈ Rdf f , and bP2 ∈ Rde .
The FFN function of the above equation 13 is
applied to each position of the result of the fusion
gate. Note that position-wise feed forward network is combined with the residual connection as
shown in Figure 2. That is, FFN learns the residuals. In our model, df f was set to 4de .
4.2.5 Pooling Layer
The vector representation of input sentence is generated through the pooling layer after the concatenation of the results of forward directional
self attention and backward directional self attention. That is, the input of pooling layer is U =
[U f w ; U bw ] ∈ Rn×2de where each directional self
attention output is U f w ∈ Rn×de , U bw ∈ Rn×de .
We use the multi-dimensional source2token
self-attention of Shen et al. (2017) for our multidimensional self-attention.
For ith row vector of U , ui , logit l(ui ) is computed as following:
M
M
l(ui ) = ELU (ui W1M + bM
1 )W2 + b2
Gate(S, H) = F
S F + (1 − F )
F
F
HF
F
where F = sigmoid(S + H + b )
(12)
Finally, we obtain the gated sum by using F . It
is common in many papers including Shen et al.
(2017) to use raw S and H in gated sum. We,
however, use the gated sum of S F and H F which
resulted in a significant increase in accuracy.
∗
Multi-head attention (Vaswani et al., 2017) is fast and
efficient because it is based on dot-product attention. However, multi-dimensional attention (Shen et al., 2017) has a disadvantage in that it consumes a lot of gpu memory because
it requires several 4-dimensional tensors on implementation.
So, in our model, the multi-head attention was used as a base
structure instead of the multi-dimensional attention. In addition, the performance of the actual implementation was also
better with multi-head attention.
(14)
where ui = Ui∗ ∈ R1×2de , W1M , W2M ∈
M
2de .
R2de ×2de , and bM
1 , b2 ∈ R
The calculations of logit consist of two linear transformations, with the Exponential Linear
Units (ELU) activation function (Clevert et al.,
2015) in between. Multi-dimensional attention
differs from general attention in that the logit for
an input vector is not a scalar but a vector with dimensions equal to the dimensions of the input vector. This allows each dimension of the input vector
to have a scalar logit, and we can perform attention
to n word tokens in each dimension, as illustrated
below by equation 15, 16. Note that softmax is
performed on the row dimension of L, not the column dimension.
M = softmax(L) U
− l(u1 ) −
− l(u2 ) −
where L =
..
.
− l(un ) −
(15)
We set h = 5, α = 1.5 in the masked multi-head
attention, and the dropout probability was set to
0.1. Batch size was 64, and the model was trained
with Adam (Kingma et al., 2014) optimizer, with
a learning rate of 0.001. All models were implemented via Tensorflow on single Nvidia Geforce
GTX 1080Ti GPU.
5.3
Multi-dimensional(U ) =
n
X
Mi∗
(16)
i=1
The 2de -dimensional output vector of multidimensional attention and the 2de -dimensional
vector obtained by applying max pooling to U
are concatenated to encode the input sentence as
a 4de -dimensional vector.
5
Experiments and Results
5.1
Dataset
The dataset used in the experiments are SNLI
(Bowman et al., 2015) and MultiNLI (Williams
et al., 2017) datasets. The SNLI dataset consists of 549,367 / 9,842 / 9,824 (train / valid
/ test) premise and hypothesis pairs; and the
MultiNLI dataset, 392,702 / 9,815 / 9,832 / 9,796
/ 9,847 (train / valid matched / valid mismatched
/ test matched / test mismatched) sentence pairs.
The two datasets have the same format, but sentences in the MultiNLI dataset are much longer
than those in SNLI dataset. In addition, MultiNLI
dataset consists of various genre information. If
genres included in the train data are also found
in valid (test) data, then the dataset is called
“matched”; if valid (test) data includes genres that
are not in the train data, then the dataset is called
“mismatched”.
5.2
Experimental results of SNLI data compared with
the existing models on the SNLI leader-board2
are shown in Table 1. Compared with the existing state-of-the-art model (Shen et al., 2017), the
number of parameters and the training time increased, but our results show the new state-of-theart record. We also looked at the model with distance mask removed to verify the effect of the distance mask proposed in this paper. Results show
that the addition of the distance mask improved
the performance without significantly affecting the
training time or increasing the number of parameters.
Figure 5: SNLI average sentence length
Training Details
We used the Glove 840B 300D1 (de = 300) for
the pre-trained word embedding without any finetuning. This is to train the more universally usable
sentence encoder.
Layer normalization (Ba et al., 2016) was applied to all linear projections of masked multihead attention, fusion gate, and multi-dimensional
attention. We applied residual dropout as used in
Vaswani et al. (2017), with dropout to the output
of masked multi-head attention and S F +H F +bF
of fusion gate.
1
SNLI Results
https://nlp.stanford.edu/projects/glove/
Figure 6: With distance mask vs. Without distance mask. Change of test accuracy on SNLI
data w.r.t average length of sentence pair.
2
https://nlp.stanford.edu/projects/snli/
Model Name
Feature-based models
Unlexicalized features (Bowman et al., 2015)
+Unigram and bigram features (Bowman et al., 2015)
Sentence encoding-based models
100D LSTM encoders (Bowman et al., 2015)
300D LSTM encoders (Bowman et al., 2016)
1024D GRU encoders (Vendrov et al., 2015)
300D Tree-based CNN encoders (Mou et al., 2015)
300D SPINN-PI encoders (Bowman et al., 2016)
600D Bi-LSTM encoders (Liu et al., 2016)
300D NTI-SLSTM-LSTM encoders (Munkhdalai and Yu, 2016b)
600D Bi-LSTM encoders+intra-attention (Liu et al., 2016)
300D NSE encoders (Munkhdalai and Yu, 2016a)
600D Deep Gated Attn. BiLSTM encoders (Chen et al., 2017)
600D Directional Self-Attention Network (Shen et al., 2017)
Our self-attention network (without distance mask)
Our Distance-based Self-Attention Network
| θ|
220k
3.0m
15m
3.5m
3.7m
2.0m
4.0m
2.8m
3.0m
11.6m
2.4m
4.7m
4.7m
T(s)/epoch
587
687
693
Train Acc(%)
Test Acc(%)
49.4
99.7
50.4
78.2
84.8
83.9
98.8
83.3
89.2
86.4
82.5
84.5
86.2
90.5
91.1
88.1
89.6
77.6
80.6
81.4
82.1
83.2
83.3
83.4
84.2
84.6
85.5
85.6
86.0
86.3
Table 1: Experimental results of different models on SNLI data. | θ| : number of parameters (excluding word embedding part). T(s)/epoch : average training time (second) per epoch.
The improvement of the test accuracy by introducing the distance mask is only by 0.3% point,
potentially because SNLI data mostly consist of
short sentences. Hence, we additionally examined
how the effect of the distance mask changes as the
average length of the two sentences of premise and
hypothesis pair changes. The distribution of the
average length of the two sentences of the SNLI
test data is shown in Figure 5, and the effect of
the distance mask according to the average length
change can be seen from Figure 6. Figure 6 shows
that the accuracy is similar until the average length
is less than 25, yet the test accuracy of the model
without the distance mask deteriorates drastically
for data of an average length exceeding 25. This
demonstrates that the distance mask has an advantage with long sentences or documents.
5.4
MultiNLI Results
The results of applying SNLI best model to
MultiNLI dataset without additional parameter
tuning are presented in Table 2. Note that
matched-test accuracy and mismatched-test accuracy were obtained by submitting our test results
to Kaggle open evaluation platforms: MultiNLI
Matched Open Evaluation3 and MultiNLI Mismatched Open Evaluation4 . First, the average
test accuracy difference is greater than 2% when
compared to the Directional Self-Attention Net3
4
https://www.kaggle.com/c/
multinli-matched-open-evaluation
https://www.kaggle.com/c/
multinli-mismatched-open-evaluation
work (Shen et al., 2017). This once again confirms
our model’s advantage in long sentences, given
that the sentence is much longer in MultiNLI.
Compared with the result of RepEVAL
2017 (Nangia et al., 2017), we can see that the
Distance-based Self-Attention Network performs
well. When compared with the model of Chen
et al. (2017), our model showed similar average
test accuracy with much lower number of parameters. Also, considering that the model of
Chen et al. (2017) is a complex LSTM model, our
model has an advantage in training time as a fully
attention-based model.
Ni and Bansal (2017) showed the best performance with 74.5% accuracy in Matched Test.
However, it is a very deep structured LSTM model
with 140.2m parameters. In our model, the inference layer is simply composed of 1 layer of
300D in order to focus on the training of sentence encoder. Both in Chen et al. (2017) and
Ni and Bansal (2017) models, the inference layer
was set very complex in order to improve the
MultiNLI accuracy. Taking this into consideration, it can be seen that our Distance-based SelfAttention Network performs competitively given
its simpler structure.
5.5
Case Study
A case study was conducted to investigate the
role of each structure of the Distance-based SelfAttention Network. For this, a sentence “A lady
stands outside of a Mexican market.” is picked
Model Name
Baseline
CBOW (Williams et al., 2017)
BiLSTM (Williams et al., 2017)
RepEval 2017 (Nangia et al., 2017)
Cha-level Intra-attention BiLSTM encoders (Yang et al., 2017)
BiLSTM + enhanced embedding + max pooling (Vu et al., 2017)
BiLSTM + Inner-attention (Balazs et al., 2017)
Deep Gated Attn. BiLSTM encoders (Chen et al., 2017)
Shortcut-Stacked BiLSTM encoders (Ni and Bansal, 2017)
Fully attention-based models
Directional Self-Attention Network (Shen et al., 2017)
Our Distance-based Self-Attention Network
SNLI Mix
| θ|
Matched Test Acc(%)
Mismatched Test Acc(%)
O
O
66.2
67.5
64.6
67.1
O
X
O
X
O
11.6m
140.2m
67.9
70.7
72.1
73.5
74.5
68.2
70.8
72.1
73.6
73.5
X
X
2.4m
4.7m
71.0
74.1
71.4
72.9
Table 2: Experimental results of different models on MultiNLI data. SNLI Mix : use of SNLI
training dataset. | θ| : number of parameters (excluding word embedding part).
among the premise sentences of SNLI test data.
We focused on training encoders that can represent
each sentence in a vector form well. Therefore, a
case study was conducted on a single sentence, not
a sentence pair.
Masked Multi-Head Attention We first look at
the attention weights in masked multi-head attention. Attention weights represent a n by n matrix
T
√
corresponding to softmax( QK
+ Mdir + αMdis )
dk
of equation 7, which is different for each head.
Here we look at the average attention weights obtained by averaging the attention weights of each
head. The attention weights for each head can be
found in Appendix.
(a) Forward
(b) Backward
(c) Forward
(d) Backward
Figure 8: Masked multi-head average attention
weights : without/with distance mask. (a), (b)
: without distance mask. (c), (d) : with distance
mask
(a) Forward
(b) Backward
Figure 7: Masked multi-head average attention
weights
The row of the matrix of Figure 7 represents
each word of the sentence, and the column represents the attention weights for each word at each
row. It can be seen that the attention weights are
heavier to the nearby words as compared to those
distant from the reference word. At the same time,
‘outside’ in the forward mask and ‘Mexican’ in
the backward mask have high attention weights for
several words. From this, it can be seen that important word is considered in the attention process.
Distance Mask We compared the masked
multi-head average attention weights for the
longest sentence example in the SNLI test data,
with length of 57 words to further verify the effect
of the distance mask. Panels (a) and (b) of Figure 8 show results without considering distance,
while (c) and (d) show the results with the distance
mask. In panels (a) and (b), very distant words are
considered in the attention and the overall attention weights were reduced. This implies that each
word does not focus on the important words in the
attention process, but rather takes into account almost every word, resulting in noisier figures.
However, in panels (c) and (d), the neighboring words are seen more intensively, which im-
plies that the local dependency has been well captured by our model. In addition, as shown in panel
(c), even if the word is far apart, it is still considered in the attention process if it is important.
This demonstrates the effectiveness of the distance
mask to identify local dependencies without losing
the ability to grasp the global dependency.
Fusion Gate We visualize the role of the fusion
gate F ∈ Rn×de at forward directional self attention. Figure 9 represents the average gate value
that averages de -dimensional gate value for each
word. If look at the results of both extremes, keyword ‘Mexican’ has a low gate value, resulting in
an output that greatly reflects the multi-head attention result. In contrast, ‘of’, ‘.’, the words of
little importance, have large gate values, which indicates that the original word embedding is greatly
reflected, not the multi-head attention result.
Figure 9: Fusion gate (forward)
Position-wise FFN For the FFN function of
equation 13, Figure 10(a) represents the deactivation ratio in the first hidden layer of position-wise
ffn.
As shown in Figure 2, position-wise ffn is used
in conjunction with a residual connection. That
is, the final output of position-wise ffn for input
x is the de -dimensional vector of LayerNorm(x +
FFN(x)). Figure 10(b) visualizes the maximum
value of this final output vector.
In Figure 10, keywords with a high deactivation
ratio is shown in panel (a) and a high final max
value in panel (b). In case of a word corresponding to a keyword, deactivation occurs frequently
in (a), and residual learning is hardly achieved in
the position-wise ffn, so that the output of the fusion gate is almost maintained. On the other hand,
in case of non-important words, residual learning
is performed in position-wise ffn because there is
less deactivation in (a), so that the max value of
final output becomes smaller in (b). This results
in preventing non-important words from consideration in the subsequent pooling layer. In summary, position-wise ffn plays a key role in ensuring that non-critical words are paid less attention
to in pooling layers.
(a) First hidden layer deactivation ratio
(b) Final output max value (+residual connection)
Figure 10: Position-wise ffn (forward)
Pooling Layer For the multi-dimensional attention corresponding to Figure 11(a), we visualized the attention weights averaged for each
word, where attention weights correspond to
softmax(L) ∈ Rn×2de in equation 15.
In max pooling, the max value is selected for
each column of U ∈ Rn×2de . Thus, in Figure
11(b), we visualize the percentage at which each
word is selected in the max pooling operation for
the 2de dimension.
It can be seen that panels (a) and (b) of Figure
11 are similar on the whole. In other words, both
multi-dimensional attention and max pooling utilize information about key words intensively. A
similar result can be expected by using only one
of the pooling layers. However, experiment results
show that using both multi-dimensional attention
and max pooling layer gives better performance.
(a) Multi-dimensional attention average weight
(b) Max pooling ratio (%)
Figure 11: Pooling layer
6
Conclusion
In this paper, we propose the Distance-based SelfAttention Network reflecting the distance between
words. By reflecting the word distance information, our model learns the local dependency
without losing the ability to capture the global
dependency. This was achieved through a simple distance mask, so that the performance of the
NLI task could be improved while maintaining the
number of parameters and training time. In particular, we recorded the new state-of-the-art performance for SNLI data. The introduction of the distance mask improves the performance with longer
sentences.
As the research on universal sentence encoders
using NLI data was proposed by Conneau et al.
(2017), we plan to carry out research on fully
attention-based networks for universal sentence
embedding as future work. We will also study
the fully attention-based network in image data
and speech data. Especially, regarding image data,
capsule network (Sabour et al., 2017) recently proposed, and as research on new structure to replace
CNN is going on, our future work will move in
similar directions.
In Proceedings of EMNLP 2015, pages 632–642.
Association for Computational Linguistics.
Samuel R. Bowman, Jon Gauthier, Abhinav Rastogi, Raghav Gupta, Christopher D. Manning, and
Christopher Potts. 2016. A fast unified model for
parsing and sentence understanding. In Proceedings of ACL 2016, pages 1466–1477. Association for
Computational Linguistics.
Qian Chen, Xiaodan Zhu, Zhen-Hua Ling, Si Wei, Hui
Jiang, and Diana Inkpen. 2017. Recurrent neural
network-based sentence encoder with gated attention for natural language inference. In Proceedings
of RepEval 2017: The Second Workshop on Evaluating Vector Space Representations for NLP. Association for Computational Linguistics.
Djork-Arn Clevert, Thomas Unterthiner, and Sepp
Hochreiter. 2015. Fast and accurate deep network
learning by exponential linear units (elus). In Proceedings of ICLR 2016.
Acknowledgments
We would like to thank Hyejin Lee, Hyunjoong
Kim, Taewook Kim, Jinwon An, Inbeom Park,
Minki Chung, and many others in SNUDM center, for critical feedback and discussions.
This work was supported by the BK21 Plus Program(Center for Sustainable and Innovative Industrial Systems, Department of Industrial Engineering & Institute for Industrial Systems Innovation,
Seoul National University) funded by the Ministry of Education, Korea (No. 21A20130012638),
the National Research Foundation (NRF) grant
funded by the Korea government (MSIP) (No.
2011- 0030814), and the Institute for Industrial
Systems Innovation of SNU.
Alexis Conneau, Douwe Kiela, Holger Schwenk, Loic
Barrault, and Antoine Bordes. 2017. Supervised
learning of universal sentence representations from
natural language inference data. In Proceedings
of EMNLP 2017, pages 681–691. Association for
Computational Linguistics.
Alex Graves, Greg Wayne, and Ivo Danihelka.
2014. Neural turing machines. arXiv preprint
arXiv:1410.5401.
Karl Moritz Hermann, Tom Koisk, Edward Grefenstette, Lasse Espeholt, Will Kay, Mustafa Suleyman,
and Phil Blunsom. 2015. Teaching machines to read
and comprehend. In Proceedings of NIPS 2015,
pages 1693–1701.
References
Yoon Kim, Yacine Jernite, David Sontag, and Alexander M. Rush. 2016. Character-aware neural language models. In Proceedings of AAAI 2016, pages
2741–2749.
Jimmy Lei Ba, Jamie Ryan Kiros, and Geoffrey E. Hinton. 2016. Layer normalization. In NIPS 2016 Deep
Learning Symposium.
Kingma, Diederik, and Jimmy Ba. 2014. Adam: A
method for stochastic optimization. In Proceedings
of ICLR 2015.
Dzmitry Bahdanau, Kyunghyun Cho, and Yoshua Bengio. 2014. Neural machine translation by jointly
learning to align and translate. In Proceedings of
ICLR 2015.
Jorge A. Balazs, Edison Marrese-Taylor, Pablo Loyola, and Yutaka Matsuo. 2017. Refining raw sentence representations for textual entailment recognition via attention. In Proceedings of RepEval 2017:
The Second Workshop on Evaluating Vector Space
Representations for NLP. Association for Computational Linguistics.
Samuel R. Bowman, Gabor Angeli, Christopher Potts,
and Christopher D. Manning. 2015. A large annotated corpus for learning natural language inference.
Yang Liu, Chengjie Sun, Lei Lin, and Xiaolong Wang.
2016. Learning natural language inference using
bidirectional lstm model and inner-attention. arXiv
preprint arXiv:1605.09090.
Lili Mou, Rui Men, Ge Li, Yan Xu, Lu Zhang, Rui Yan,
and Zhi Jin. 2015. Natural language inference by
tree-based convolution and heuristic matching. In
Proceedings of ACL 2016, page 130. Association for
Computational Linguistics.
Tsendsuren Munkhdalai and Hong Yu. 2016a. Neural
semantic encoders. In Proceedings of EACL 2017,
pages 397–407. Association for Computational Linguistics.
Tsendsuren Munkhdalai and Hong Yu. 2016b. Neural
tree indexers for text understanding. In Proceedings
of EACL 2017, pages 11–21. Association for Computational Linguistics.
Nikita Nangia, Adina Williams, Angeliki Lazaridou,
and Samuel R. Bowman. 2017. The repeval 2017
shared task: Multi-genre natural language inference
with sentence representations. In Proceedings of
RepEval 2017: The Second Workshop on Evaluating
Vector Space Representations for NLP. Association
for Computational Linguistics.
Yixin Ni and Mohit Bansal. 2017. Shortcut-stacked
sentence encoders for multi-domain inference. In
Proceedings of RepEval 2017: The Second Workshop on Evaluating Vector Space Representations
for NLP. Association for Computational Linguistics.
Sara Sabour, Nicholas Frosst, and Geoffrey E Hinton.
2017. Dynamic routing between capsules. arXiv
preprint arXiv:1710.09829.
Lifeng Shang, Zhengdong Lu, and Hang Li. 2015.
Neural responding machine for short-text conversation. In Proceedings of ACL 2015, pages 1577–
1586. Association for Computational Linguistics.
Tao Shen, Tianyi Zhou, Guodong Long, Jing Jiang,
Shirui Pan, and Chengqi Zhang. 2017. Disan:
Directional self-attention network for rnn/cnnfree language understanding.
arXiv preprint
arXiv:1709.04696.
Sainbayar Sukhbaatar, Arthur Szlam, Jason Weston,
and Rob Fergus. 2015. End-to-end memory networks. In Proceedings of NIPS 2015, pages 2440–
2448.
Ilya Sutskever, Oriol Vinyals, and Quoc V. Le. 2014.
Sequence to sequence learning with neural networks. In Proceedings of NIPS 2014, pages 3104–
3112.
Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob
Uszkoreit, Llion Jones, Aidan N. Gomez, Lukasz
Kaiser, and Illia Polosukhin. 2017. Attention is all
you need. arXiv preprint arXiv:1706.03762.
Ivan Vendrov, Ryan Kiros, Sanja Fidler, and Raquel
Urtasun. 2015. Order-embeddings of images and
language. In Proceedings of ICLR 2016.
Hoa Trong Vu, Thuong-Hai Pham, Xiaoyu Bai Marc
Tanti, Lonneke van der Plas, and Albert Gatt. 2017.
Lct-maltas submission to repeval 2017 shared task.
In Proceedings of RepEval 2017: The Second Workshop on Evaluating Vector Space Representations
for NLP. Association for Computational Linguistics.
Adina Williams, Nikita Nangia, and Samuel R. Bowman. 2017. A broad-coverage challenge corpus for
sentence understanding through inference. arXiv
preprint arXiv:1704.05426.
Han Yang, Marta R, Costa-juss, and Jos A. R. Fonollosa. 2017. Character-level intra attention network
for natural language inference. In Proceedings of
RepEval 2017: The Second Workshop on Evaluating
Vector Space Representations for NLP. Association
for Computational Linguistics.
Appendix
Masked Multi-Head Attention The attention
weights for each head in the masked multi-head
attention are shown in Figures 12 and 13. Figure
12 shows the result of using a forward directional
mask, and Figure 13 is the result of using a backward directional mask. It can be seen that the attention weights are different for each head. This
allows our model to capture various dependencies
between words in a sentence.
(a) head0
(a) head0
(b) head1
(c) head2
(d) head3
(b) head1
(e) head4
(c) head2
(d) head3
(e) head4
Figure 12: Forward masked multi-head attention weights
Figure 13: Backward masked multi-head attention weights
| 2cs.AI
|
arXiv:1404.4944v1 [math.OC] 19 Apr 2014
Unit commitment with valve-point
loading effect
João Pedro Pedroso
INESC Porto and Faculdade de Ciências, Universidade do Porto, Portugal
[email protected]
Mikio Kubo
Tokyo University of Marine Science and Technology, Japan
[email protected]
Ana Viana
INESC Porto and Instituto Superior de Engenharia, Instituto Politécnico do Porto, Portugal
[email protected]
Technical Report Series: DCC-2014-05
Departamento de Ciência de Computadores
Faculdade de Ciências da Universidade do Porto
Rua do Campo Alegre, 1021/1055,
4169-007 PORTO,
PORTUGAL
Tel: 220 402 900 Fax: 220 402 950
http://www.dcc.fc.up.pt/Pubs/
Unit commitment with valve-point loading effect
João Pedro Pedroso
INESC Porto and Faculdade de Ciências, Universidade do Porto, Portugal
Mikio Kubo
Tokyo University of Marine Science and Technology, Japan
Ana Viana
INESC Porto and
Instituto Superior de Engenharia, Instituto Politécnico do Porto, Portugal
Abstract
Valve-point loading affects the input-output characteristics of generating units, bringing the fuel costs
nonlinear and nonsmooth. This has been considered in the solution of load dispatch problems, but
not in the planning phase of unit commitment.
This paper presents a mathematical optimization model for the thermal unit commitment problem
considering valve-point loading. The formulation is based on a careful linearization of the fuel cost
function, which is modeled with great detail on power regions being used in the current solution, and
roughly on other regions.
A set of benchmark instances for this problem is used for analyzing the method, with recourse to
a general-purpose mixed-integer optimization solver.
Keywords: Unit Commitment, Load Dispatch, Combinatorial Optimization, Mixed-integer
Programming
1. Introduction
The unit commitment problem (UCP) consists of deciding which power generating units must be
committed/decommitted over a planning horizon, usually lasting from 1 day to 2 weeks and split
into periods of one hour. The production levels at which units must operate (pre-dispatch) must
also be determined to optimize a cost function which includes both fixed and variable costs. The
committed units must satisfy the forecasted system load and reserve requirements, as well as a large
set of technological constraints. This problem has great practical relevance, due to the savings that
can be achieved with an optimized schedule.
Simple approaches for this problem model the cost as a linear function, which provides a rather
rough approximation; accuracy can be improved by switching to a quadratic function. For these
models general-purpose mixed-integer convex optimization solvers can be used to find optimum
solutions for realistic, large instances. Nonetheless, much better approximations of the true costs
can be obtained if the valve-point loading effect is taken into account; however models become much
more difficult to optimize.
Valve-point loading affects the input-output characteristics of generating units, making the fuel
costs nonlinear and nonsmooth. This has been considered in the heuristic solution of load dispatch
problems — see, e.g., [1, 2, 3, 4], but there are no exact methods available in the literature.
Email addresses: [email protected] (João Pedro Pedroso), [email protected] (Mikio Kubo),
[email protected] (Ana Viana)
2
Concerning the planning phase of unit commitment, even for convex models most of the research
on the solution of the UCP focuses in heuristic methods. Recently, however, improvements in
the capabilities of mixed-integer programming solvers has encouraged the thorough exploitation of
their capabilities [5]. Extensive surveys of different optimization techniques and modeling issues are
provided in [6, 7, 8], but the valve-point loading effect is not considered in any of the exact methods
proposed. A mixed integer quadratically constrained model to solve unit commitment on real-life,
large-scale power systems is presented in [9]; it details some features of the units, but not the valvepoint loading effect. Another approach, where a mixed integer linear formulation is used for modeling
nonlinear output of generators and applied to unit commitment, is presented in [10]. A process with
some similarities to the method we propose, also involving the assessment of lower and upper bounds
to a nonlinear function and iteratively converging to the optimum, has been presented in [11] and
applied to a related problem: that of optimizing short-term hydro scheduling.
The main contribution of this paper is a method based on a careful linearization of the fuel cost
function, which is modeled with great detail on power regions being used in the current solution
and roughly on other regions; this formulation is used in an iterative process that converges to the
optimum. The method may be used both for load dispatch (by setting the number of planning periods
to one) and for unit commitment. When the solution process stops, e.g. due to a limit on CPU usage,
the method provides both an upper and a lower bound to the optimum; this information is usually
very important in practice.
2. Mathematical model
Cost
A concise, complete description of the unit commitment problem as a mathematical optimization
model has been provided in [5]. When valve-point loading is taken into account that model can be
used as is, except for the shape of the objective function: instead of a quadratic function, as considered
in [12], it is now a nonconvex, nonsmooth function, as has been proposed for load dispatching in [13]
(cited by [14]).
P min
Power
P max
Figure 1: Typical shape of the fuel cost considering the valve-point loading effect.
3
2.1. Objective
A commonly used function of the fuel costs in a generating unit in terms of the power produced
p, taking into account the valve-point loading effect, is the following [13]:
F (p) = a + bp + cp2 + e sin f (P min − p) ,
(1)
where a, b, c, e, f are function’s parameters (see Figure 4), as are the minimum and maximum operating powers P min and P max . The first three terms describe a quadratic function, as usually taken into
account when valve-point loading is not considered; when it is, there is a periodic factor, as described
in the rightmost term.
This function being nonlinear, nonconvex, and nonsmooth, methods for optimizing it under
constraints on load limit and demand satisfaction — i.e., in an economic load dispatch setting
— usually involve specifically designed heuristic approaches, many of them based on evolutionary
algorithms [4, 15].
There is, however, a way of tackling this problem exactly (i.e., with arbitrarily low error). Let us
first notice that the valve points — where there is a discontinuity — limit areas where the function
is concave. Thus, if we evaluate the function into several points and use them as breakpoints for
joining the two valve points, we obtain a linear function that is never larger than the true function
(see Figure 2). Given a power production level this function provides, thus, a lower bound to the
objective value; on the other hand, the evaluation of the true function provides a trivial upper bound.
For any solution satisfying all the problem’s constraints, a lower and an upper bound to possible values
of the objective can therefore be obtained by the piecewise-linear lower approximation and the true
function, respectively.
UB
Cost
Cost
LB
exact function
approximation
Power
Power
p
Figure 2: Fuel cost and its representation with a piecewise-linear function (left). Upper bound (UB, exact function
evaluation) and lower bound (LB, piecewise-linear approximation) at a given production level p (right).
For obtaining increased precision, a large number of breakpoints may be required; this is likely
to be the limiting step for large instances. In order to obviate this problem as much as possible, we
may have the cost function represented with greater detail in power regions of potential operation,
whereas on other areas the representation may be more rough; in the limit, there may be a single
straight line joining two valve points (see Figure 3). Later in this section we propose an algorithm
for determining where to expand the number of breakpoints. The final shape of the piecewise-linear
approximation may resemble that of Figure 3.
Considering a set of units U and a set of periods T , for a given unit u ∈ U and period t ∈ T , once
the coordinates (Xutk , Yutk ) for the set of breakpoints k = 0, . . . , K to be considered is known, the
lower approximation of the objective function can easily be included in a mixed-integer programming
(MIP) linear model by means of a convex combination of these points:
4
Cost
Cost
exact function
approximation
exact function
approximation
P min
Power
Power
P max
Figure 3: Piecewise-linear fine approximation in important areas, rough on the other areas (left). Fuel cost and its
possible final representation with a piecewise-linear function (right).
K
X
put =
Xutk zutk , ∀u ∈ U, ∀t ∈ T ,
(2)
k=0
Lut =
K
X
Yutk zutk ,
∀u ∈ U, ∀t ∈ T ,
(3)
∀u ∈ U, ∀t ∈ T .
(4)
k=0
K
X
zutk ≤ yut ,
k=0
PK
In a standard convex combination model the last equation is written as k=0 zutk = 1. However,
in the case a unit is not committed in a given period, both the production level put and the linearized
fuel cost Lut must be zero. For taking this into account, in the right hand size of equation (4)
instead of 1 there must be variable yut , which indicates whether unit u was committed to produce in
period t (yut = 1) or not (yut = 0). Additionally, for the model to be correct, there must be points
corresponding to minimum and maximum operating powers, i.e., Xut0 = Pumin and XutK = Pumax , for
each unit u and period t.
For the minimization of non-convex functions represented by piecewise-linear segments, as in the
present case, it is necessary to introduce binary variables, each corresponding to a zutk , limiting
which may be non-zero; also an additional constraint for forcing the convex combination to take
on two consecutive points is necessary (i.e., there can be zutk > 0 and zu,t,k+1 > 0 only for one
value of k ∈ {0, . . . , K − 1}). Alternatively, we may use a convenience of most modern MIP solvers
that assures the same thing by declaring that, for each u and t, the set of variables zutk , ∀k forms a
so-called special ordered set constraint of type II (SOS2) [16].
The objective is to minimize the total production costs,
minimize
XX
(Lut + Sut ) ,
(5)
t∈T u∈U
which include start-up costs Sut ; these are modeled as
hot
cold cold
Sut = ahot
u sut + au sut ,
(6)
(7)
hot
where ahot
u is the hot start up cost and variable sut = 1 if there was a hot start for unit u in period
t, 0 otherwise. Equivalently for cold start up, with acold
and scold
u
ut . (See also constraints (15) to (18).)
5
2.2. Constraints
In this problem the following constraints will be considered: system power balance and generation
limits (i.e., load dispatch), system reserve requirements, unit initial conditions, and unit minimum
up and down times; this MIP model was introduced in [5].
Demand satisfaction is modeled by constraint (8), and power reserve requirements by constraint (9).
X
put = Dt ,
∀t ∈ T ,
(8)
Pumax yut ≥ Dt + Rt , ∀t ∈ T .
(9)
u∈U
X
u∈U
Power production levels of thermal power units are within the range defined by the technical
minimum and maximum production levels in (10).
Pumin yut ≤ put ≤ Pumax yut , ∀u ∈ U, ∀t ∈ T .
(10)
When a unit u is switched on, it must remain on for at least Tuon consecutive periods; similarly,
it must be kept off for at least Tuoff after being switched off. Constraints (11) and (12) model this
aspect for the initial state, while constraints (13) and (14) do the same for the remaining planning
off
prev
off
horizon. In (11) θuon represents max(0, Tuon − tprev
u ), and θu in (12) stands for max(0, Tu − tu ); the
prev
previous state of unit u is the parameter yu , which is 1 if the unit was on, 0 if it was off.
yut = 1, ∀u ∈ U : yuprev = 1, for t = 0, . . . , θuon ,
yut = 0, ∀u ∈ U :
yuprev
= 0, for t =
0, . . . , θuoff .
(11)
(12)
off
Constraints (13) and (14) determine if a unit u is started/switched off in period t (xon
ut = 1, xut = 1,
off
on
off
on
respectively, or 0 otherwise); variables τut and τut stand for max(t−Tu +1, 1) and max(t−Tu +1, 1),
respectively.
t
X
xon
ui ≤ yut ,
∀u ∈ U, ∀t ∈ T ,
(13)
xoff
ui ≤ 1 − yut , ∀u ∈ U, ∀t ∈ T .
(14)
on
i=τut
t
X
off
i=τut
Constraints (15) state that every time a unit is switched on, a start-up cost will be incurred.
cold
on
shot
ut + sut = xut ,
∀u ∈ U, ∀t ∈ T .
(15)
Constraints (16) determine the start-up type of each unit, i.e., decide whether it is a cold or a
hot start type. It will be a cold start if the unit remained off for more than tcold
periods of time, and
u
a hot start otherwise.
t−1
X
yut −
yui ≤ scold
ut , ∀u ∈ U, ∀t ∈ T .
(16)
i=t−tcold
u −1
Constraints (17) determine each unit’s switch-on variables, and (18) determine the switch-off
variables.
yut − yu,t−1 ≤ xon
ut ,
xoff
ut
=
xon
ut
∀u ∈ U, ∀t ∈ T ,
(17)
+ yu,t−1 − yut , ∀u ∈ U, ∀t ∈ T .
(18)
6
2.3. Solution approach
There is not, to the best of our knowledge, exact solution method for the load dispatching problem
when the valve-point loading effect is taken into account, let alone the full unit commitment problem.
The solution approach that we propose achieves this, in the sense that it converges to a solution with
an arbitrary degree of precision.
The method is based in the replacement of the function defined by Equation (1) by a piecewiselinear function; a careful selection of the breakpoints allows the construction of a model that provides
a lower bound to the exact function. Upon a feasible solution obtained by this linear model, we
can evaluate the true function; this will provide an upper bound to the value of the objective. As
described in Algorithm 1, if the deviation between the upper and lower bounds are within a userspecified tolerance, then the method will stop. Otherwise, the number of breakpoints is increased
(though only in the required intervals), thus leading to a better approximation, and the optimization
problem is resolved. This process is repeated until the relative deviation between upper and lower
bounds is small enough (or the allowed CPU time is exceeded). Notice that the solution of an iteration
is feasible to the problem of the next, the only changes are in its evaluation. We can, therefore, supply
it as a starting point to the MIP solver in line (4) of the algorithm.
Algorithm 1: Solution procedure.
Input: UCP instance, CPU limit, tolerance
Output: A solution to the input instance
(1)
foreach unit u ∈ U , period t ∈ T :
(2)
But := set of breakpoints containing only the valve points
(3)
while true
(4)
solve problem with piecewise-linear objective, breakpoints B
(5)
if U B − LB < tolerance or CPU limit exceeded:
(6)
return solution
(7)
foreach u, t with coarse objective representation in the solution:
(8)
divide the inter-valve interval containing put into K segments
(9)
add corresponding points to But
(10)
if there were no u, t with coarse objective in put :
(11)
K := 2K
(12)
for each u, t recompute But based on K segments in the inter-valve interval containing
put
The value K used in this algorithm should ideally be setup in such a way that the initial
approximation is just good enough to solve the instance with sufficient precision. If K is set too
high, there will be too many intervals in the piecewise-linear representation of the objective function,
leading to great precision but requiring unnecessary CPU for solving the problem; if is it set too low,
additional iterations will be necessary for providing the required precision (each iteration doubling
the value of K), and again unnecessary CPU will be used.
The most important properties of this algorithm are summarized next. Let us denominate P1 the
problem of maximizing the true objective,
XX
minimize
[Sut + yut Fut (put )]
(19)
t∈T u∈U
where
min
Fut (p) = au + bu p + cu p2 + eu sin fu (Put
− p) ,
under constraints (6) to (18), and P2 its linearized counterpart, i.e., the problem of maximizing (5)
under the same constraints and additionally (2), (3) and (4).
Property 1. Feasible solutions for P2 are feasible for P1 .
Proof. P2 includes all the variables of P1 , and contraints of P2 are a superset of constraints of P1 .
Property 2. The evaluation of the objective function (19) at a feasible solution obtained for P2 is
an upper bound to the optimum of P1 .
7
wi′
wi+1
wi+1
Cost
wi
Cost
wi
wK
wK
wK−1
wK−1
Power
Power
Figure 4: Linear approximations in consecutive iterations.
Proof. Follows from Property 1 and from the notion of optimum: the objective at any feasible solution
of a minimization problem provides an upper bound to its optimum.
Property 3. An optimum of P2 is a lower bound to the optimum of P1 .
Proof. Between two consecutive valve points the function F (p) defined by Equation 1 is concave as
long as c ≤ ef 2 /2 (see Appendix B); therefore, if this condition is observed, any piecewise-linear
interpolation between consecutive valve points is not larger than F . In the construction of the
piecewise-linear approximation we are considering all the valve points, as well as the extreme point
of the domain of F , as interpolation points; hence, the linear interpolation is not larger than F
in its domain. We can thus conclude that the minimum of P2 — where the objective is a linear
interpolation in the previous conditions — is not larger than the minimum of P1 , where the objective
is function F .
Property 4. With tolerance ǫ = 0, when the number of iterations increases the solution provided by
Algorithm 1 converges to the optimum solution of P1 .
Proof. Let us denote the linear approximation of F at an iteration i by Gi , and define G = limi→∞ Gi .
Note that Gj (p) ≥ Gi (p), for any j > i, and for all p in the domain of F . As functions Gi are nondecreasing with increasing i and are limited above by F , the sequence Gi converges.
It remains to prove that the optimum solution with Gi as the objective function, when i tends to
infinity, is an optimum solution with F as the objective function. We will assume that this is not true,
i.e., that the optimum F ∗ is strictly greater than G∗ , and show that this leads to a contradiction.
Notice that F ∗ > G∗ is equivalent to F ∗ − G∗ = ǫ∗ , with ǫ∗ > 0, which implies that there must be
some u, t such that Fut (p∗ ) − Gut (p∗ ) = ǫ′ > 0. However, lines (11) and (12) of Algorithm 1 imply
that the number of segments in each inter-valve interval containing p∗ut tends to infinity when the
number of iterations tends to infinity. This means that Gut (p∗ ) becomes arbitrarily close to Fut (p∗ ),
and hence ǫ′ cannot be positive.
3. Computational results
In order to run economic load dispatch instances with the current model we must set up an
instance with only one period; generators must have the previous status as operating, and must be
forced to keep operating by adjusting the minimum number of on periods. We have thus prepared
data for the most widely used benchmark instances for load dispatching with valve-point loading
8
179300
55900
upper bound
lower bound
upper bound
lower bound
179200
55850
179100
179000
55800
Total cost
Total cost
178900
55750
55700
178800
178700
178600
55650
178500
178400
55600
178300
178200
55550
0
5
10
15
20
0
25
5
10
15
20
25
Iteration
Iteration
Figure 5: Bounds as a function of the iteration number, for instance ucp40 with one period (optimal solution was
found) and three periods (final solution was not optimal).
effect: eld13 (first described in [13]) and eld40 (first described in [17]); we have used the tables
available in [14]1 .
The setup used was the following: a computer with an Intel Xeon processor at 3.0 GHz and
running Linux version 2.6.32, using Gurobi version 5.0.1 [16]. Only one thread was assigned to
this experiment. Models were written in the Python language and the default Gurobi parameters
were used until reaching the user-defined tolerance; then, parameters were changed to the maximum
precision supported by Gurobi. The aim of this procedure is to avoid spending too much CPU in the
initial iterations, where the representation of the objective function is still rather course.
Instance
eld13
eld13
eld40
Load
1800
2520
10500
Lower bound
17963.83
24169.92
121412.53
Upper bound
17963.83
24169.92
121412.54
Error
<1.e-7
<1.e-7
<1.e-7
CPU time
19.1s
1.8s
7.6s
N
34
19
27
Table 1: Solution to economic load dispatch instances: bounds to the objective value, maximum relative error, CPU
time employed, and number of iterations performed.
The results presented in Table 1 are optima, and are approximately equal to the best solutions
found by the best methods available in the literature [4].2
As for the unit commitment problem, to the best of our knowledge there are no test instances
taking into account the valve-point effect. We have therefore prepared a set of benchmarks, based on
the instances for unit commitment provided in [12], and on the instances for economic load dispatch
mentioned above. Instance ucp10 corresponds to the standard instance described in [12]; ucp5 is
based on that instance, by selecting only half of the units and adjusting demand. Instances ucp13
and ucp40 have costs taken from eld13 and eld40, respectively, and data concerning multi-period
operation based on [12]. Notice that the difference between instances eld13 and ucp13 with one
period (besides possible differences in the demand value) is that in the former the commitment
decision has already been made, and all units considered must be operating; the same for eld40 and
ucp40. These results are presented in Table 2. Figure 5 plots the evolution, for a particular case,
of the lower and upper bounds with respect to the iteration number; as expected, the lower bound
is non-decreasing, whereas the upper bound may increase (when the linear approximation at the
solution of the previous iteration was poor).
1 All
the
data
and
programs
used
are
available
in
this
paper’s
Internet
page,
http://www.dcc.fc.up.pt/~ jpp/code/valve
2 Results presented in [15] are better than the optimum for eld13, indicating that there is likely an error in that
paper. Possibly this is due to a rounding error; if we calculate the cost for the solutions provided in the paper we
obtain values greater than those reported.
9
Instance
ucp5
ucp5
ucp5
ucp5
ucp5
ucp10
ucp10
ucp10
ucp10
ucp10
ucp13
ucp13
ucp13
ucp13
ucp13
ucp40
ucp40
ucp40
ucp40
ucp40
Periods
1
3
6
12
24
1
3
6
12
24
1
3
6
12
24
1
3
6
12
24
Lower bound
7352.46
24506.12
59127.38
153575.68
308482.03
13826.85
45929.36
109919.97
285808.54
572943.80
11701.28
38849.84
91405.97
231587.47
464053.01
55644.79
178395.51
416108.42
1112370.94
2235970.56
Upper bound
7352.46
24506.12
59127.39
153575.69
309152.47
13826.85
45929.36
109919.98
286067.44
574554.02
11701.28
38849.84
91783.98
232537.37
466186.98
55644.79
178547.12
416605.93
1113801.09
2238504.45
Error
<1.e-7
<1.e-7
<1.e-7
<1.e-7
0.22%
<1.e-7
<1.e-7
<1.e-7
0.091%
0.28%
<1.e-7
<1.e-7
0.41%
0.41%
0.46%
<1.e-7
0.085%
0.12%
0.13%
0.11%
CPU time
0.12
0.29
1.2
54.
3600.
0.17
1.3
31.
3600.
3600.
0.15
3.3
3600.
3600.
3600.
3.9
3600.
3600.
3600.
3600.
N
5
5
6
7
3
6
7
9
5
3
6
11
10
4
3
25
30
15
11
7
Table 2: Solution to unit commitment instances: bounds to the objective value, maximum relative error, CPU time
employed, and number of iterations performed.
4. Conclusions
The main contribution of this paper is a model and an algorithm for solving the unit commitment
problem taking into consideration the valve-point loading effect in fuel cost computation. This model
can be used for planning which units to commit in each period so as to match demand, meeting
reserve constraints, and under a set of technological constraints. The algorithm iteratively calls a
general-purpose mixed-integer programming solver for tackling optimization subproblems, and uses
the solution to improve the accuracy of fuel cost approximation until reaching an error below a given
tolerance, or reaching a given limit on CPU usage.
The model can also be used for load dispatching, when only one period is considered and the subset
of units that will operate is already selected; this is known as the economic load dispatch problem
with valve-point effect; the method proposed was able to solve well known benchmark instances of
this problem for which the optimum was not known.
To the best of our knowledge, there are no standard benchmarks for unit commitment taking
into account the valve-point loading effect. We present a set of them, based on data from load
dispatch and unit commitment. Using our algorithm for their solution, the optimum was obtained
for a subset of instances, and very good approximations, with a relative error below 1%, were found
for the remaining.
Acknowledgements
This work was partly funded by project “NORTE-07-0124-FEDER-000057”, under the North
Portugal Regional Operational Programme (ON.2 O Novo Norte) and the National Strategic Reference Framework through the European Regional Development Fund, and by national funds through
Fundação para a Ciência e a Tecnologia (FCT), and by FCT (under Project PTDC/EGE-GES/099120/2008)
through “Programa Operacional Temático Factores de Competitividade (COMPETE)” of “Quadro
Comunitário de Apoio III”, partially funded by FEDER.
10
References
[1] Al-Sumait J, Al-Othman A, Sykulski J. Application of pattern search method to power system
valve-point economic load dispatch. International Journal of Electrical Power & Energy Systems
2007;29(10):720 –30.
[2] Hemamalini S, Simon SP. Dynamic economic dispatch using artificial immune system for
units with valve-point effect. International Journal of Electrical Power & Energy Systems
2011;33(4):868 –74.
[3] Roy P, Roy P, Chakrabarti A. Modified shuffled frog leaping algorithm with genetic algorithm
crossover for solving economic load dispatch problem with valve-point effect. Applied Soft
Computing 2013;13(11):4244 –52.
[4] Reddy AS, Vaisakh K. Shuffled differential evolution for economic dispatch with valve point
loading effects. International Journal of Electrical Power & Energy Systems 2013;46(0):342 –52.
[5] Viana A, Pedroso JP. A new MILP-based approach for unit commitment in power production
planning. International Journal of Electrical Power and Energy Systems 2013;44:997–1005.
[6] Sen S, Kothari D. Optimal thermal generating unit commitment: a review. International Journal
of Electrical Power & Energy Systems 1998;20(7):443–51.
[7] Padhy NP. Unit commitment – a bibliographical survey. IEEE Transactions in Power Systems
2004;19(2):1196–205.
[8] Yamin HY. Review on methods of generation scheduling in electric power systems. Electric
Power Systems Research 2004;69:227–48.
[9] López JÁ, Ceciliano-Meza JL, Moya IG, Gómez RN. A MIQCP formulation to solve the unit
commitment problem for large-scale power systems. International Journal of Electrical Power &
Energy Systems 2012;36(1):68 – 75.
[10] Simoglou CK, Biskas PN, Bakirtzis AG. Optimal self-scheduling of a thermal producer in shortterm electricity markets by milp. IEEE Transactions on Power Systems 2010;25(4):1965 –77.
[11] Lima RM, Marcovecchio MG, Novais AQ, Grossmann IE. On the computational studies
of deterministic global optimization of head dependent short-term hydro scheduling. IEEE
Transactions on Power Systems 2013;28(4):4336 –47.
[12] Kazarlis SA, Bakirtzis AG, Petridis V. A genetic algorithm solution to the unit commitment
problem. IEEE Transactions on Power Systems 1996;11:83–92.
[13] Wood A, Wollenberg B. Power Generation, Operation, and Control. New York, NY: John Wiley
& Sons; 1984.
[14] dos Santos Coelho L, Mariani V. Combining of chaotic differential evolution and quadratic
programming for economic dispatch optimization with valve-point effect. IEEE Transactions on
Power Systems 2006;21(2):989–96. (See also a correction to this paper).
[15] dos Santos Coelho L, Mariani VC. An efficient cultural self-organizing migrating strategy for
economic dispatch optimization with valve-point effect. Energy Conversion and Management
2010;51(12):2580 –7.
[16] Gurobi Optimization, Inc. .
http://www.gurobi.com; 2012.
Gurobi Optimizer
Reference Manual,
Version 5.0.
[17] Sinha N, Chakrabarti R, Chattopadhyay PK. Evolutionary programming techniques for
economic load dispatch. IEEE Transactions on Evolutionary Computation 2003;7(1):83–94.
11
Appendix A. Notation
Constants
• T – length of the planning horizon.
• T = {1, . . . , T } – set of planning periods.
• U – set of units.
• Pumin , Pumax – minimum and maximum production levels for unit u.
• Tuon , Tuoff – minimum number of periods that unit u must be kept switched on/off.
• Dt – system load requirements in period t.
• Rt – spinning reserve requirements in period t.
• au , bu , cu , eu , fu – fuel cost parameters for unit u.
cold
• ahot
– hot and cold start up costs for unit u.
u , au
• tcold
– number of periods after which the start up of unit u is evaluated as cold.
u
• yuprev – previous state of unit u (1 if on, 0 if off).
– number of periods unit u has been on or off prior to the first period of the planning
• tprev
u
horizon.
Decision variables
• yut – 1 if unit u is on in period t, 0 otherwise.
• put – production level of unit u, in period t.
Auxiliary variables
off
• xon
ut , xut – 1 if unit u is started/switched off in period t, 0 otherwise;
• shot
ut – 1 if unit u has a hot start in period t, 0 otherwise;
• scold
ut – 1 if unit u has a cold start in period t, 0 otherwise;
Production costs
• Fut – fuel cost for unit u in period t.
• Sut – start up cost for unit u in period t.
Appendix B. Conditions for concavity of the fuel costs
In this appendix westate the conditions for concavity of the fuel cost function F (p) = a + bp +
cp2 + e sin f (P min − p) (Equation 1) between two valve points. Recall that a differentiable function
is concave in a given region if its second derivative is less than or equal to zero in all points of that
region.
If the term within the absolute value,
e sin f (P min − p) , is positive, the first derivative of F (p) is
F ′ (p) = 2cp + b − ef cos f (P min − p) , and the second derivative is F ′′ (p) = 2c − ef 2 sin(f (P min − p)).
2
For the function F to be concave there must be F ′′ (p) ≤ 0, i.e., c ≤ ef2 sin f (P min − p) . As
sin(x) ≤ 1, ∀x, F is concave for c ≤ ef 2 /2.
Similarly, if the term within
the first derivative of F (p) is F ′ (p) =
the absolute value is negative,
min
′′
2cp + b + ef cos f (P
− p) , and the second derivative is F (p) = 2c + ef 2 sin f (P min − p) . Again,
12
2
for F to be concave there must be c ≤ − ef2 sin f (P min − p) . As sin(x) ≥ −1, ∀x, this condition is
observed for c ≤ ef 2 /2.
Therefore, for
c ≤ ef 2 /2
the function F (p) is concave between two valve points. This condition is valid for all the instances
analyzed in this paper.
13
| 5cs.CE
|
Tunable Efficient Unitary Neural Networks (EUNN) and their application to
RNNs
Li Jing * 1 Yichen Shen * 1 Tena Dubcek 1 John Peurifoy 1 Scott Skirlo 1 Yann LeCun 2 Max Tegmark 1
Marin Soljačić 1
arXiv:1612.05231v3 [cs.LG] 3 Apr 2017
Abstract
Using unitary (instead of general) matrices in
artificial neural networks (ANNs) is a promising way to solve the gradient explosion/vanishing
problem, as well as to enable ANNs to learn
long-term correlations in the data. This approach appears particularly promising for Recurrent Neural Networks (RNNs). In this work, we
present a new architecture for implementing an
Efficient Unitary Neural Network (EUNNs); its
main advantages can be summarized as follows.
Firstly, the representation capacity of the unitary space in an EUNN is fully tunable, ranging from a subspace of SU(N) to the entire unitary space. Secondly, the computational complexity for training an EUNN is merely O(1) per
parameter. Finally, we test the performance of
EUNNs on the standard copying task, the pixelpermuted MNIST digit recognition benchmark
as well as the Speech Prediction Test (TIMIT).
We find that our architecture significantly outperforms both other state-of-the-art unitary RNNs
and the LSTM architecture, in terms of the final performance and/or the wall-clock training
speed. EUNNs are thus promising alternatives
to RNNs and LSTMs for a wide variety of applications.
1. Introduction
Deep Neural Networks (LeCun et al., 2015) have been successful on numerous difficult machine learning tasks, including image recognition(Krizhevsky et al., 2012; Donahue et al., 2015), speech recognition(Hinton et al., 2012)
and natural language processing(Collobert et al., 2011;
Bahdanau et al., 2014; Sutskever et al., 2014). However,
deep neural networks can suffer from vanishing and ex*
Equal contribution 1 Massachusetts Institute of Technology
New York University, Facebook AI Research. Correspondence
to: Li Jing <[email protected]>, Yichen Shen <[email protected]>.
2
ploding gradient problems(Hochreiter, 1991; Bengio et al.,
1994), which are known to be caused by matrix eigenvalues far from unity being raised to large powers. Because
the severity of these problems grows with the the depth of
a neural network, they are particularly grave for Recurrent
Neural Networks (RNNs), whose recurrence can be equivalent to thousands or millions of equivalent hidden layers.
Several solutions have been proposed to solve these problems for RNNs. Long Short Term Memory (LSTM) networks (Hochreiter & Schmidhuber, 1997), which help
RNNs contain information inside hidden layers with gates,
remains one of the the most popular RNN implementations.
Other recently proposed methods such as GRUs(Cho et al.,
2014) and Bidirectional RNNs (Berglund et al., 2015) also
perform well in numerous applications. However, none of
these approaches has fundamentally solved the vanishing
and exploding gradient problems, and gradient clipping is
often required to keep gradients in a reasonable range.
A recently proposed solution strategy is using orthogonal hidden weight matrices or their complex generalization
(unitary matrices) (Saxe et al., 2013; Le et al., 2015; Arjovsky et al., 2015; Henaff et al., 2016), because all their
eigenvalues will then have absolute values of unity, and can
safely be raised to large powers. This has been shown to
help both when weight matrices are initialized to be unitary (Saxe et al., 2013; Le et al., 2015) and when they are
kept unitary during training, either by restricting them to a
more tractable matrix subspace (Arjovsky et al., 2015) or
by alternating gradient-descent steps with projections onto
the unitary subspace (Wisdom et al., 2016).
In this paper, we will first present an Efficient Unitary Neural Network (EUNN) architecture that parametrizes the entire space of unitary matrices in a complete and computationally efficient way, thereby eliminating the need for
time-consuming unitary subspace-projections. Our architecture has a wide range of capacity-tunability to represent
subspace unitary models by fixing some of our parameters;
the above-mentioned unitary subspace models correspond
to special cases of our architecture. We also implemented
an EUNN with an earlier introduced FFT-like architecture
which efficiently approximates the unitary space with min-
Tunable Efficient Unitary Neural Networks (EUNN) and their application to RNNs
imum number of required parameters(Mathieu & LeCun,
2014b).
We then benchmark EUNN’s performance on both simulated and real tasks: the standard copying task, the pixelpermuted MNIST task, and speech prediction with the
TIMIT dataset (Garofolo et al., 1993). We show that our
EUNN algorithm with an O(N ) hidden layer size can
compute up to the entire N × N gradient matrix using
O(1) computational steps and memory access per parameter. This is superior to the O(N ) computational complexity
of the existing training method for a full-space unitary network (Wisdom et al., 2016) and O(log N ) more efficient
than the subspace Unitary RNN(Arjovsky et al., 2015).
2. Background
2.1. Basic Recurrent Neural Networks
A recurrent neural network takes an input sequence and
uses the current hidden state to generate a new hidden state
during each step, memorizing past information in the hidden layer. We first review the basic RNN architecture.
Consider an RNN updated at regular time intervals t =
1, 2, ... whose input is the sequence of vectors x(t) whose
hidden layer h(t) is updated according to the following
rule:
h(t) = σ(Ux(t) + W h(t−1) ),
(1)
where σ is the nonlinear activation function. The output is
generated by
y(t) = Wh(t) + b,
(2)
where b is the bias vector for the hidden-to-output layer.
For t = 0, the hidden layer h(0) can be initialized to some
special vector or set as a trainable variable. For convenience of notation, we define z(t) = Ux(t) + Wh(t−1)
so that h(t) = σ(z(t) ).
2.2. The Vanishing and Exploding Gradient Problems
When training the neural network to minimize a cost function C that depends on a parameter vector a, the gradient
descent method updates this vector to a − λ ∂C
∂a , where λ
∂C
is a fixed learning rate and ∂a ≡ ∇C. For an RNN, the
vanishing or exploding gradient problem is most significant during back propagation from hidden to hidden layers, so we will only focus on the gradient for hidden layers.
Training the input-to-hidden and hidden-to-output matrices
is relatively trivial once the hidden-to-hidden matrix has
been successfully optimized.
In order to evaluate
∂C
∂Wij ,
one first computes the derivative
∂C
∂h(t)
using the chain rule:
∂C
∂h(t)
=
=
=
∂C ∂h(T )
∂h(T ) ∂h(t)
T −1
∂C Y ∂h(k+1)
∂h(T )
k=t
∂h(k)
T −1
∂C Y (k)
D W,
∂h(T ) k=t
(3)
(4)
(5)
where D(k) = diag{σ 0 (Ux(k) + Wh(k−1) )} is the Jacobian matrix ofQthe pointwise nonlinearity. For large times
T , the term
W plays a significant role. As long as
the eigenvalues of D(k) are of order unity, then if W has
eigenvalues λi 1, they will cause gradient explosion
| ∂h∂C
(T ) | → ∞, while if W has eigenvalues λi 1, they
can cause gradient vanishing, | ∂h∂C
(T ) | → 0. Either situation
prevents the RNN from working efficiently.
3. Unitary RNNs
3.1. Partial Space Unitary RNNs
In a breakthrough paper, Arjovsky, Shah & Bengio (Arjovsky et al., 2015) showed that unitary RNNs can overcome the exploding and vanishing gradient problems and
perform well on long term memory tasks if the hiddento-hidden matrix in parametrized in the following unitary
form:
W = D3 T2 F −1 D2 ΠT1 FD1 .
(6)
Here D1,2,3 are diagonal matrices with each element
eiωj , j = 1, 2, · · · , n. T1,2 are reflection matrices, and
bv
b†
v
b
T = I − 2 ||b
v||2 , where v is a vector with each of its entries as a parameter to be trained. Π is a fixed permutation
matrix. F and F −1 are Fourier and inverse Fourier transform matrices respectively. Since each factor matrix here
is unitary, the product W is also a unitary matrix.
This model uses O(N ) parameters, which spans merely
a part of the whole O(N 2 )-dimensional space of unitary
N × N matrices to enable computational efficiency. Several subsequent papers have tried to expand the space to
O(N 2 ) in order to achieve better performance, as summarized below.
3.2. Full Space Unitary RNNs
In order to maximize the power of Unitary RNNs, it is
preferable to have the option to optimize the weight matrix W over the full space of unitary matrices rather than
a subspace as above. A straightforward method for implementing this is by simply updating W with standard backpropagation and then projecting the resulting matrix (which
will typically no longer be unitary) back onto to the space
Tunable Efficient Unitary Neural Networks (EUNN) and their application to RNNs
∂C
of unitary matrices. Defining Gij ≡ ∂W
as the gradient
ij
with respect to W, this can be implemented by the procedure defined by (Wisdom et al., 2016):
A(t)
W(t+1)
†
†
(7)
≡ G(t) W(t) − W(t) G(k) ,
−1
λ
λ
≡
I + A(t)
I − A(t) W(t) .(8)
2
2
RN j for j = N − 1, · · · , 1. Once all elements of the last
row except the one on the diagonal are zero, this row will
not be affected by later transformations. Since all transformations are unitary, the last column will then also contain
only zeros except on the diagonal:
WN −1
0
WN RN,N −1 RN,N −2 · ·RN,1 =
(10)
0
eiwN
This method shows that full space unitary networks are superior on many RNN tasks (Wisdom et al., 2016). A key
limitation is that the back-propation in this method cannot avoid N -dimensional matrix multiplication, incurring
O(N 3 ) computational cost.
)
W
4. Efficient Unitary Neural Network (EUNN)
Architectures
In the following, we first describe a general parametrization
method able to represent arbitrary unitary matrices with up
to N 2 degrees of freedom. We then present an efficient
algorithm for this parametrization scheme, requiring only
O(1) computational and memory access steps to obtain the
gradient for each parameter. Finally, we show that our
scheme performs significantly better than the above mentioned methods on a few well-known benchmarks.
4.1. Unitary Matrix Parametrization
Any N × N unitary matrix WN can be represented as a
product of rotation matrices {Rij } and a diagonal matrix
QN Qi−1
D, such that WN = D i=2 j=1 Rij , where Rij is
defined as the N -dimensional identity matrix with the elements Rii , Rij , Rji and Rjj replaced as follows (Reck
et al., 1994; Clements et al., 2016):
iφ
Rii Rij
e ij cos θij −eiφij sin θij
=
. (9)
Rji Rjj
sin θij
cos θij
where θij and φij are unique parameters corresponding
to Rij . Each of these matrices performs a U (2) unitary
transformation on a two-dimensional subspace of the Ndimensional Hilbert space, leaving an (N −2)-dimensional
subspace unchanged. In other words, a series of U (2) rotations can be used to successively make all off-diagonal
elements of the given N × N unitary matrix zero. This
generalizes the familiar factorization of a 3D rotation matrix into 2D rotations parametrized by the three Euler angles. To provide intuition for how this works, let us briefly
describe a simple way of doing this that is similar to Gaussian elimination by finishing one column at a time. There
are infinitely many alternative decomposition schemes as
well; Fig. 1 shows two that are particularly convenient to
implement in software (and even in neuromorphic hardware (Shen et al., 2016)). The unitary matrix WN is multiplied from the right by a succession of unitary matrices
)
)
R
Figure 1. Unitary matrix decomposition: An arbitrary unitary
matrix W can be decomposed (a) with the square decomposition method of Clements et al. (Clements et al., 2016) discussed
in section 4.2; or approximated (b) by the Fast Fourier Transformation(FFT) style decomposition method (Mathieu & LeCun,
2014b) discussed in section 4.3. Each junction in the a) and b)
graphs above represent the U(2) matrix as shown in c).
The effective dimensionality of the the matrix W is thus
reduced to N −1. The same procedure can then be repeated
N − 1 times until the effective dimension of W is reduced
to 1, leaving us with a diagonal matrix:1
WN RN,N −1 RN,N −2 · · · Ri,j Ri,j−1 · · · R3,1 R2,1 = D,
(11)
where D is a diagonal matrix whose diagonal elements are
eiwj , from which we can write the direct representation of
WN as
WN
−1
−1
−1
= DR−1
2,1 R3,1 . . . RN,N −2 RN,N −1
= DR02,1 R03,1 . . . R0N,N −2 R0N,N −1 .
(12)
where
R0ij = R(−θij , −φij ) = R(θij , φij )−1 = R−1
ij
(13)
1
Note that Gaussian Elimination would make merely the upper triangle of a matrix vanish, requiring a subsequent series of
rotations (complete Gauss-Jordan Elimination) to zero the lower
triangle. We need no such subsequent series because since W is
unitary: it is easy to show that if a unitary matrix is triangular, it
must be diagonal.
Tunable Efficient Unitary Neural Networks (EUNN) and their application to RNNs
This parametrization thus involves N (N − 1)/2 different
θij -values, N (N − 1)/2 different φij -values and N different wi -values, combining to N 2 parameters in total and
spans the entire unitary space. Note we can always fix a
portion of our parameters, to span only a subset of unitary
space – indeed, our benchmark test below will show that
for certain tasks, full unitary space parametrization is not
necessary. 2
4.2. Tunable space implementation
The representation in Eq. 12 can be made more compact
by reordering and grouping specific rotational matrices, as
was shown in the optical community (Reck et al., 1994;
Clements et al., 2016) in the context of universal multiport
interferometers. For example (Clements et al., 2016), a unitary matrix can be decomposed as
(1) (1)
(1)
WN = D R1,2 R3,4 . . . RN/2−1,N/2
(2) (2)
(2)
× R2,3 R4,5 . . . RN/2−2,N/2−1
×...
(1)
(2)
where p = 2Ni , k ∈ {0, ..., 2i−1 } and j ∈ {1, ..., p}.
This requires only log(N ) matrices, so there are a total
of N log(N )/2 rotational pairs. This is also the minimal
number of rotations that can have all input coordinates interacting with each other, providing an approximation of
arbitrary unitary matrices.
4.4. Efficient implementation of rotation matrices
To implement this decomposition efficiently in an RNN,
we apply vector element-wise multiplications and permutations: we evaluate the product Fx as
Fx = v1 ∗ x + v2 ∗ permute(x)
where ∗ represents element-wise multiplication, F refers to
general rotational matrices such as FA/B in Eq. 14 and Fi
in Eq. 16. For the case of the tunable-space implementa(l)
tion, if we want to implement FA in Eq. 14, we define v
and the permutation as follows:
(l)
(14)
(l)
(l)
(l)
(l)
(l)
(l)
(l)
(l)
v2 = (−eiφ1 sin θ1 , sin θ1 , −eiφ2 sin θ2 , sin θ2 , · · · )
permute(x) = (x2 , x1 , x4 , x3 , x6 , x5 , · · · ).
where every
(l)
(l)
(l)
(l)
FA = R1,2 R3,4 . . . RN/2−1,N/2
is a block diagonal matrix, with N angle parameters in total, and
(l)
FB
(l)
v1 = (eiφ1 cos θ1 , cos θ1 , eiφ2 cos θ2 , cos θ2 , · · · )
(l)
(L)
= DFA FB . . . FB ,
(18)
=
(l)
(l)
R2,3 R4,5
(l)
. . . RN/2−2,N/2−1
Following this physics-inspired scheme, we decompose our
unitary hidden-to-hidden layer matrix W as
(1)
(2)
(3)
(4)
(L)
(15)
4.3. FFT-style approximation
Inspired by (Mathieu & LeCun, 2014a), an alternative way
to organize the rotation matrices is implementing an FFTstyle architecture. Instead of using adjacent rotation matrices, each F here performs a certain distance pairwise rotations as shown in Fig. 1b:
W = DF1 F2 F3 F4 · · · Flog(N ) .
(l)
(l)
(l)
(l)
(l)
(l)
(l)
(l)
v1 = (eiφ1 cos θ1 , eiφ2 cos θ2 , · · · , cos θ1 , cos θ2 , · · · )
(l)
with N −1 parameters, as is schematically shown in Fig. 1a.
By choosing different values for L , WN will span a different subspace of the unitary space. Specifically,when
L = N , WN will span the entire unitary space.
W = DFA FB FA FB · · · FB .
For the FFT-style approach, if we want to implement F1 in
Eq 16, we define v and the permutation as follows:
(l)
(l)
v2 = (−eiφ1 sin θ1 , −eiφ2 sin θ2 , · · · , sin θ1 , sin θ2 , · · · )
permute(x) = (x n2 +1 , x n2 +2 · · · xn , x1 , x2 · · · ).
In general, the pseudocode for implementing operation F
is as follows:
Algorithm 1 Efficient implementation for F with parameter θi and φi .
Input: input x, size N ; parameters θ and φ, size N/2;
constant permuatation index list ind1 and ind2 .
Output: output y, size N .
v1 ← concatenate(cos θ, cos θ * exp(iφ))
v2 ← concatenate(sin θ, - sin θ * exp(iφ))
v1 ← permute(v1 , ind1 )
v2 ← permute(v2 , ind1 )
y ← v1 ∗ x + v2 ∗ permute(x, ind2 )
(16)
Note that ind1 and ind2 are different for different F.
The rotation matrices in Fi are performed between pairs of
coordinates
(2pk + j, p(2k + 1) + j)
(17)
2
Our preliminary experimental tests even suggest that a fullcapacity unitary RNN is even undesirable for some tasks.
From a computational complexity viewpoint, since the operations ∗ and permute take O(N ) computational steps,
evaluating Fx only requires O(N ) steps. The product Dx
is trivial, consisting of an element-wise vector multiplication. Therefore, the product Wx with the total unitary
Tunable Efficient Unitary Neural Networks (EUNN) and their application to RNNs
matrix W can be computed in only O(N L) steps, and
only requires O(N L) memory access (for full-space implementation L = N , for FFT-style approximation gives
L = log N ). A detailed comparison on computational
complexity of the existing unitary RNN architectures is
given in Table 1.
4.5. Nonlinearity
We use the same nonlinearity as (Arjovsky et al., 2015):
(modReLU(z, b))i =
zi
∗ ReLU(|zi | + bi )
|zi |
(19)
where the bias vector b is a shared trainable parameter, and
|zi | is the norm of the complex number zi .
For real number input, modReLU can be simplified to:
(modReLU(z, b))i = sign(zi ) ∗ ReLU(|zi | + bi ) (20)
where |zi | is the absolute value of the real number zi .
We empirically find that this nonlinearity function performs
the best. We believe that this function possibly also serves
as a forgetting filter that removes the noise using the bias
threshold.
5. Experimental tests of our method
In this section, we compare the performance of our Efficient Unitary Recurrent Neural Network (EURNN) with
1. an LSTM RNN (Hochreiter & Schmidhuber, 1997),
2. a Partial Space URNN (Arjovsky et al., 2015), and
3. a Projective full-space URNN (Wisdom et al., 2016).
All models are implemented in both Tensorflow and
Theano, available from https://github.com/
jingli9111/EUNN-tensorflow and https:
//github.com/iguanaus/EUNN-theano.
5.1. Copying Memory Task
We compare these networks by applying them all to the
well defined Copying Memory Task (Hochreiter & Schmidhuber, 1997; Arjovsky et al., 2015; Henaff et al., 2016).
The copying task is a synthetic task that is commonly used
to test the network’s ability to remember information seen
T time steps earlier.
Specifically, the task is defined as follows (Hochreiter &
Schmidhuber, 1997; Arjovsky et al., 2015; Henaff et al.,
2016). An alphabet consists of symbols {ai }, the first n of
which represent data, and the remaining two representing
“blank” and “start recall”, respectively; as illustrated by the
following example where T = 20 and M = 5:
Input: BACCA--------------------:---Output: -------------------------BACCA
In the above example, n = 3 and {ai } = {A, B, C, −, :}.
The input consists of M random data symbols (M = 5
above) followed by T − 1 blanks, the “start recall” symbol
and M more blanks. The desired output consists of M + T
blanks followed by the data sequence. The cost function
C is defined as the cross entropy of the input and output
sequences, which vanishes for perfect performance.
We use n = 8 and input length M = 10. The symbol
for each input is represented by an n-dimensional one-hot
vector. We trained all five RNNs for T = 1000 with the
same batch size 128 using RMSProp optimization with a
learning rate of 0.001. The decay rate is set to 0.5 for EURNN, and 0.9 for all other models respectively. (Fig. 2).
This results show that the EURNN architectures introduced
in both Sec.4.2 (EURNN with N=512, selecting L=2) and
Sec.4.3 (FFT-style EURNN with N=512) outperform the
LSTM model (which suffers from long term memory problems and only performs well on the copy task for small time
delays T ) and all other unitary RNN models, both in-terms
of learnability and in-terms of convergence rate. Note that
the only other unitary RNN model that is able to beat the
baseline for T = 1000 (Wisdom et al., 2016) is significantly slower than our method.
Moreover, we find that by either choosing smaller L or by
using the FFT-style method (so that W spans a smaller unitary subspace), the EURNN converges toward optimal performance significantly more efficiently (and also faster in
wall clock time) than the partial (Arjovsky et al., 2015) and
projective (Wisdom et al., 2016) unitary methods. The EURNN also performed more robustly. This means that a fullcapacity unitary matrix is not necessary for this particular
task.
5.2. Pixel-Permuted MNIST Task
The MNIST handwriting recognition problem is one of the
classic benchmarks for quantifying the learning ability of
neural networks. MNIST images are formed by a 28×28
grayscale image with a target label between 0 and 9.
To test different RNN models, we feed all pixels of the
MNIST images into the RNN models in 28×28 time steps,
where one pixel at a time is fed in as a floating-point number. A fixed random permutation is applied to the order
of input pixels. The output is the probability distribution
quantifying the digit prediction. We used RMSProp with a
learning rate of 0.0001 and a decay rate of 0.9, and set the
batch size to 128.
As shown in Fig. 3, EURNN significantly outperforms
LSTM with the same number of parameters. It learns faster,
in fewer iteration steps, and converges to a higher classifi-
Tunable Efficient Unitary Neural Networks (EUNN) and their application to RNNs
Table 1. Performance comparison of four Recurrent Neural Network algorithms: URNN (Arjovsky et al., 2015), PURNN (Wisdom et al.,
2016), and EURNN (our algorithm). T denotes the RNN length and N denotes the hidden state size. For the tunable-style EURNN, L
is an integer between 1 and N parametrizing the unitary matrix capacity.
Model
URNN
PURNN
EURNN (tunable style)
EURNN (FFT style)
Time complexity of one
online gradient step
O(T N log N )
O(T N 2 + N 3 )
O(T N L)
O(T N log N )
number of parameters
in the hidden matrix
O(N )
O(N 2 )
O(N L)
O(N log N )
Transition matrix
search space
subspace of U(N )
full space of U(N )
tunable space of U(N )
subspace of U(N )
Table 2. MNIST Task result. EURNN corresponds to our algorithm, PURNN corresponds to algorithm presented in (Wisdom et al.,
2016), URNN corresponds to the algorithm presented in (Arjovsky et al., 2015).
Model
LSTM
URNN
PURNN
EURNN (tunable style)
EURNN (FFT style)
number of
parameters
16k
16k
16k
13.3k
9.0k
Copying Memory Task, delay time T=1000
EURNN with N=512 L=2
EURNN with N=512 FFT
PURNN with N=128
URNN with N=512
LSTM with N=80
baseline
0.08
0.07
0.06
0.05
0.04
0.03
0.02
validation
accuracy
0.908
0.942
0.922
0.940
0.928
0.9
0.8
0.7
0.6
EURNN with N=1024 L=2
EURNN with N=512 FFT
LSTM with N=80
0.01
0.00
0
500
1000
1500 2000 2500
Training iterations
3000
3500
4000
Figure 2. Copying Task for T = 1000. EURNN corresponds to
our algorithm, projective URNN corresponds to algorithm presented in (Wisdom et al., 2016), URNN corresponds to the algorithm presented in (Arjovsky et al., 2015). A useful baseline performance is that of the memoryless strategy, which outputs M +T
blanks followed by M random data symbols and produces a cross
entropy C = (M log n)/(T + 2 ∗ M ). [Note that each iteration
for PURNN takes about 32 times longer than for EURNN models, for this particular simulation, so the speed advantage is much
greater than apparent in this plot.]
cation accuracy. In addition, the EURNN reaches a similar
accuracy with fewer parameters. In Table. 2, we compare
the performance of different RNN models on this task.
test
accuracy
0.902
0.933
0.921
0.937
0.925
Permuted-Pixel MNIST Task
1.0
Accuracy
Cross Entropy
hidden size
(capacity)
80
512
116
1024 (2)
512 (FFT)
0.5
0
5000
10000
15000 20000
Training iterations
25000
30000
Figure 3. Pixel-permuted MNIST performance on the validation
dataset.
5.3. Speech Prediction on TIMIT dataset
We also apply our EURNN to real-world speech prediction task and compare its performance to LSTM. The main
task we consider is predicting the log-magnitude of future
frames of a short-time Fourier transform (STFT) (Wisdom
et al., 2016; Sejdi et al., 2009). We use the TIMIT dataset
(Garofolo et al., 1993) sampled at 8 kHz. The audio .wav
file is initially diced into different time frames (all frames
have the same duration referring to the Hann analysis window below). The audio amplitude in each frame is then
Tunable Efficient Unitary Neural Networks (EUNN) and their application to RNNs
Table 3. Speech Prediction Task result. EURNN corresponds to our algorithm, projective URNN corresponds to algorithm presented in
(Wisdom et al., 2016), URNN corresponds to the algorithm presented in (Arjovsky et al., 2015).
Model
LSTM
LSTM
EURNN (tunable style)
EURNN (tunable style)
EURNN (tunable style)
EURNN (FFT style)
hidden size
(capacity)
64
128
128 (2)
128 (32)
128 (128)
128 (FFT)
number of
parameters
33k
98k
33k
35k
41k
34k
MSE
(validation)
71.4
55.3
63.3
52.3
51.8
52.3
MSE
(test)
66.0
54.5
63.3
52.7
51.9
52.4
Figure 4. Example spectrograms of ground truth and RNN prediction results from evaluation sets.
Fourier transformed into the frequency domain. The logmagnitude of the Fourier amplitude is normalized and used
as the data for training/testing each model. In our STFT
operation we uses a Hann analysis window of 256 samples (32 milliseconds) and a window hop of 128 samples
(16 milliseconds). The frame prediction task is as follows:
given all the log-magnitudes of STFT frames up to time t,
predict the log-magnitude of the STFT frame at time t + 1
that has the minimum mean square error (MSE). We use
a training set with 2400 utterances, a validation set of 600
utterances and an evaluation set of 1000 utterances. The
training, validation, and evaluation sets have distinct speakers. We trained all RNNs for with the same batch size 32
using RMSProp optimization with a learning rate of 0.001,
a momentum of 0.9 and a decay rate of 0.1.
The results are given in Table. 3, in terms of the meansquared error (MSE) loss function. Figure. 4 shows prediction examples from the three types of networks, illustrat-
Tunable Efficient Unitary Neural Networks (EUNN) and their application to RNNs
ing how EURNNs generally perform better than LSTMs.
Furthermore, in this particular task, full-capacity EURNNs
outperform small capacity EURNNs and FFT-style EURNNs.
References
6. Conclusion
Bahdanau, Dzmitry, Cho, Kyunghyun, and Bengio,
Yoshua. Neural machine translation by jointly learning
to align and translate. arXiv preprint arXiv:1409.0473,
2014.
We have presented a method for implementing an Efficient
Unitary Neural Network (EUNN) whose computational
cost is merely O(1) per parameter, which is O(log N )
more efficient than the other methods discussed above. It
significantly outperforms existing RNN architectures on
the standard Copying Task, and the pixel-permuted MNIST
Task using a comparable parameter count, hence demonstrating the highest recorded ability to memorize sequential
information over long time periods.
It also performs well on real tasks such as speech prediction, outperforming an LSTM on TIMIT data speech prediction.
We want to emphasize the generality and tunability of our
method. The ordering of the rotation matrices we presented
in Fig. 1 are merely two of many possibilities; we used it
simply as a concrete example. Other ordering options that
can result in spanning the full unitary matrix space can be
used for our algorithm as well, with identical speed and
memory performance. This tunability of the span of the
unitary space and, correspondingly, the total number of parameters makes it possible to use different capacities for
different tasks, thus opening the way to an optimal performance of the EUNN. For example, as we have shown, a
small subspace of the full unitary space is preferable for the
copying task, whereas the MNIST task and TIMIT task are
better performed by EUNN covering a considerably larger
unitary space. Finally, we note that our method remains
applicable even if the unitary matrix is decomposed into a
different product of matrices (Eq. 12).
This powerful and robust unitary RNN architecture also
might be promising for natural language processing because of its ability to efficiently handle tasks with long-term
correlation and very high dimensionality.
Acknowledgment
We thank Hugo Larochelle and Yoshua Bengio for helpful
discussions and comments.
This work was partially supported by the Army Research
Office through the Institute for Soldier Nanotechnologies
under contract W911NF-13-D0001, the National Science
Foundation under Grant No. CCF-1640012 and the Rothberg Family Fund for Cognitive Science.
Arjovsky, Martin, Shah, Amar, and Bengio, Yoshua. Unitary evolution recurrent neural networks. arXiv preprint
arXiv:1511.06464, 2015.
Bengio, Yoshua, Simard, Patrice, and Frasconi, Paolo.
Learning long-term dependencies with gradient descent
is difficult. IEEE transactions on neural networks, 5(2):
157–166, 1994.
Berglund, Mathias, Raiko, Tapani, Honkala, Mikko,
Kärkkäinen, Leo, Vetek, Akos, and Karhunen, Juha T.
Bidirectional recurrent neural networks as generative
models. In Advances in Neural Information Processing
Systems, pp. 856–864, 2015.
Cho, Kyunghyun, Van Merriënboer, Bart, Bahdanau,
Dzmitry, and Bengio, Yoshua. On the properties of neural machine translation: Encoder-decoder approaches.
arXiv preprint arXiv:1409.1259, 2014.
Clements, William R., Humphreys, Peter C., Metcalf, Benjamin J., Kolthammer, W. Steven, and Walmsley, Ian A.
An optimal design for universal multiport interferometers, 2016. arXiv:1603.08788.
Collobert, Ronan, Weston, Jason, Bottou, Léon, Karlen,
Michael, Kavukcuoglu, Koray, and Kuksa, Pavel. Natural language processing (almost) from scratch. Journal
of Machine Learning Research, 12(Aug):2493–2537,
2011.
Donahue, Jeffrey, Anne Hendricks, Lisa, Guadarrama,
Sergio, Rohrbach, Marcus, Venugopalan, Subhashini,
Saenko, Kate, and Darrell, Trevor. Long-term recurrent convolutional networks for visual recognition and
description. In Proceedings of the IEEE Conference
on Computer Vision and Pattern Recognition, pp. 2625–
2634, 2015.
Garofolo, John S, Lamel, Lori F, Fisher, William M, Fiscus,
Jonathon G, and Pallett, David S. Darpa timit acousticphonetic continous speech corpus cd-rom. nist speech
disc 1-1.1. NASA STI/Recon technical report n, 93, 1993.
Henaff, Mikael, Szlam, Arthur, and LeCun, Yann. Orthogonal rnns and long-memory tasks. arXiv preprint
arXiv:1602.06662, 2016.
Hinton, Geoffrey, Deng, Li, Yu, Dong, Dahl, George E,
Mohamed, Abdel-rahman, Jaitly, Navdeep, Senior, Andrew, Vanhoucke, Vincent, Nguyen, Patrick, Sainath,
Tunable Efficient Unitary Neural Networks (EUNN) and their application to RNNs
Tara N, et al. Deep neural networks for acoustic modeling in speech recognition: The shared views of four
research groups. IEEE Signal Processing Magazine, 29
(6):82–97, 2012.
Sutskever, Ilya, Vinyals, Oriol, and Le, Quoc V. Sequence to sequence learning with neural networks. In
Advances in neural information processing systems, pp.
3104–3112, 2014.
Hochreiter, Sepp.
Untersuchungen zu dynamischen
neuronalen netzen. Diploma, Technische Universität
München, pp. 91, 1991.
Wisdom, Scott, Powers, Thomas, Hershey, John, Le Roux,
Jonathan, and Atlas, Les. Full-capacity unitary recurrent neural networks. In Advances In Neural Information
Processing Systems, pp. 4880–4888, 2016.
Hochreiter, Sepp and Schmidhuber, Jürgen. Long shortterm memory. Neural computation, 9(8):1735–1780,
1997.
Krizhevsky, Alex, Sutskever, Ilya, and Hinton, Geoffrey E.
Imagenet classification with deep convolutional neural
networks. In Advances in neural information processing
systems, pp. 1097–1105, 2012.
Le, Quoc V, Jaitly, Navdeep, and Hinton, Geoffrey E. A
simple way to initialize recurrent networks of rectified
linear units. arXiv preprint arXiv:1504.00941, 2015.
LeCun, Yann, Bengio, Yoshua, and Hinton, Geoffrey. Deep
learning. Nature, 521(7553):436–444, 2015.
Mathieu, Michael and LeCun, Yann. Fast approximation of rotations and hessians matrices. arXiv preprint
arXiv:1404.7195, 2014a.
Mathieu, Michal and LeCun, Yann. Fast approximation of
rotations and hessians matrices. CoRR, abs/1404.7195,
2014b.
URL http://arxiv.org/abs/1404.
7195.
Reck, Michael, Zeilinger, Anton, Bernstein, Herbert J.,
and Bertani, Philip.
Experimental realization of
any discrete unitary operator.
Phys. Rev. Lett.,
73:58–61, Jul 1994.
doi: 10.1103/PhysRevLett.
73.58. URL http://link.aps.org/doi/10.
1103/PhysRevLett.73.58.
Saxe, Andrew M, McClelland, James L, and Ganguli,
Surya. Exact solutions to the nonlinear dynamics of
learning in deep linear neural networks. arXiv preprint
arXiv:1312.6120, 2013.
Sejdi, Ervin, Djurovi, Igor, and Jiang, Jin. Timefrequency feature representation using energy concentration: An overview of recent advances. Digital Signal Processing, 19(1):153 – 183, 2009. ISSN 10512004.
doi: http://dx.doi.org/10.1016/j.dsp.2007.12.
004. URL http://www.sciencedirect.com/
science/article/pii/S105120040800002X.
Shen, Yichen, Harris, Nicholas C, Skirlo, Scott, Prabhu,
Mihika, Baehr-Jones, Tom, Hochberg, Michael, Sun,
Xin, Zhao, Shijie, Larochelle, Hugo, Englund, Dirk,
et al. Deep learning with coherent nanophotonic circuits.
arXiv preprint arXiv:1610.02365, 2016.
| 9cs.NE
|
Under review as a conference paper at ICLR 2017
N EURO -S YMBOLIC P ROGRAM S YNTHESIS
Emilio Parisotto1,2 , Abdel-rahman Mohamed1 , Rishabh Singh1 ,
Lihong Li1 , Dengyong Zhou1 , Pushmeet Kohli1
1
Microsoft Research, USA 2 Carnegie Mellon University, USA
[email protected] , {asamir,risin,lihongli,denzho,pkohli}@microsoft.com
arXiv:1611.01855v1 [cs.AI] 6 Nov 2016
A BSTRACT
Recent years have seen the proposal of a number of neural architectures for the
problem of Program Induction. Given a set of input-output examples, these architectures are able to learn mappings that generalize to new test inputs. While
achieving impressive results, these approaches have a number of important limitations: (a) they are computationally expensive and hard to train, (b) a model has
to be trained for each task (program) separately, and (c) it is hard to interpret or
verify the correctness of the learnt mapping (as it is defined by a neural network).
In this paper, we propose a novel technique, Neuro-Symbolic Program Synthesis,
to overcome the above-mentioned problems. Once trained, our approach can automatically construct computer programs in a domain-specific language that are
consistent with a set of input-output examples provided at test time. Our method
is based on two novel neural modules. The first module, called the cross correlation I/O network, given a set of input-output examples, produces a continuous
representation of the set of I/O examples. The second module, the RecursiveReverse-Recursive Neural Network (R3NN), given the continuous representation
of the examples, synthesizes a program by incrementally expanding partial programs. We demonstrate the effectiveness of our approach by applying it to the
rich and complex domain of regular expression based string transformations. Experiments show that the R3NN model is not only able to construct programs from
new input-output examples, but it is also able to construct new programs for tasks
that it had never observed before during training.
1
I NTRODUCTION
The act of programming, i.e., developing a procedure to accomplish a task, is a remarkable demonstration of the reasoning abilities of the human mind. Expectedly, Program Induction is considered
as one of the fundamental problems in Machine Learning and Artificial Intelligence. Recent progress
on deep learning has led to the proposal of a number of promising neural architectures for this problem. Many of these models are inspired from computation modules (CPU, RAM, GPU) (Graves
et al., 2014; Kurach et al., 2015; Reed & de Freitas, 2015; Neelakantan et al., 2015) or common
data structures used in many algorithms (stack) (Joulin & Mikolov, 2015). A common thread in this
line of work is to specify the atomic operations of the network in some differentiable form, allowing
efficient end-to-end training of a neural controller, or to use reinforcement learning to make hard
choices about which operation to perform. While these results are impressive, these approaches
have a number of important limitations: (a) they are computationally expensive and hard to train, (b)
a model has to be trained for each task (program) separately, and (c) it is hard to interpret or verify
the correctness of the learnt mapping (as it is defined by a neural network). While some recently
proposed methods (Kurach et al., 2015; Gaunt et al., 2016; Riedel et al., 2016; Bunel et al., 2016)
do learn interpretable programs, they still need to learn a separate neural network model for each
individual task.
Motivated by the need for model interpretability and scalability to multiple tasks, we address the
problem of Program Synthesis. Program Synthesis, the problem of automatically constructing programs that are consistent with a given specification, has long been a subject of research in Computer
Science (Biermann, 1978; Summers, 1977). This interest has been reinvigorated in recent years on
1
Under review as a conference paper at ICLR 2017
the back of the development of methods for learning programs in various domains, ranging from
low-level bit manipulation code (Solar-Lezama et al., 2005) to data structure manipulations (Singh
& Solar-Lezama, 2011) and regular expression based string transformations (Gulwani, 2011).
Most of the recently proposed methods for program synthesis operate by searching the space of
programs in a Domain-Specific Language (DSL) instead of arbitrary Turing-complete languages.
This hypothesis space of possible programs is huge (potentially infinite) and searching over it is a
challenging problem. Several search techniques including enumerative (Udupa et al., 2013), stochastic (Schkufza et al., 2013), constraint-based (Solar-Lezama, 2008), and version-space algebra based
algorithms (Gulwani et al., 2012) have been developed to search over the space of programs in the
DSL, which support different kinds of specifications (examples, partial programs, natural language
etc.) and domains. These techniques not only require significant engineering and research effort to
develop carefully-designed heuristics for efficient search, but also have limited applicability and can
only synthesize programs of limited sizes and types.
In this paper, we present a novel technique called Neuro-Symbolic Program Synthesis (NSPS) that
learns to generate a program incrementally without the need for an explicit search. Once trained,
NSPS can automatically construct computer programs that are consistent with any set of input-output
examples provided at test time. Our method is based on two novel module neural architectures. The
first module, called the cross correlation I/O network, produces a continuous representation of any
given set of input-output examples. The second module, the Recursive-Reverse-Recursive Neural
Network (R3NN), given the continuous representation of the input-output examples, synthesizes a
program by incrementally expanding partial programs. R3NN employs a tree-based neural architecture that sequentially constructs a parse tree by selecting which non-terminal symbol to expand
using rules from a context-free grammar (i.e., the DSL).
We demonstrate the efficacy of our method by applying it to the rich and complex domain of regularexpression-based syntactic string transformations, using a DSL based on the one used by FlashFill (Gulwani, 2011; Gulwani et al., 2012), a Programming-By-Example (PBE) system in Microsoft
Excel 2013. Given a few input-output examples of strings, the task is to synthesize a program built
on regular expressions to perform the desired string transformation. An example task that can be
expressed in this DSL is shown in Figure 1, which also shows the DSL.
Our evaluation shows that NSPS is not only able to construct programs for known tasks from new
input-output examples, but it is also able to construct completely new programs that it had not observed during training. Specifically, the proposed system is able to synthesize string transformation
programs for 63% of tasks that it had not observed at training time, and for 94% of tasks when
100 program samples are taken from the model. Moreover, our system is able to learn 38% of 238
real-world FlashFill benchmarks.
To summarize, the key contributions of our work are:
• A novel Neuro-Symbolic program synthesis technique to encode neural search over the
space of programs defined using a Domain-Specific Language (DSL).
• The R3NN model that encodes and expands partial programs in the DSL, where each node
has a global representation of the program tree.
• A novel cross-correlation based neural architecture for learning continuous representation
of sets of input-output examples.
• Evaluation of the NSPS approach on the complex domain of regular expression based string
transformations.
2
P ROBLEM D EFINITION
In this section, we formally define the DSL-based program synthesis problem that we consider in this
paper. Given a DSL L, we want to automatically construct a synthesis algorithm A such that given
a set of input-output example, {(i1 , o1 ), · · · , (in , on )}, A returns a program P ∈ L that conforms
to the input-output examples, i.e.,
∀j : 1 ≤ j ≤ n P (ij ) = oj .
2
(1)
Under review as a conference paper at ICLR 2017
1
2
3
4
5
Input v
William Henry Charles
Michael Johnson
Barack Rogers
Martha D. Saunders
Peter T Gates
String e
Substring f
Output
Charles, W.
Johnson, M.
Rogers, B.
Saunders, M.
Gates, P.
Position p
Direction Dir
Regex r
(a)
:=
:=
|
:=
|
:=
:=
Concat(f1 , · · · , fn )
ConstStr(s)
SubStr(v, pl , pr )
(r, k, Dir)
ConstPos(k)
Start | End
s | T1 · · · | Tn
(b)
Figure 1: An example FlashFill task for transforming names to lastname with initials of first name,
and (b) The DSL for regular expression based string transformations.
The syntax and semantics of the DSL for string transformations is shown in Figure 1(b) and Figure 7
respectively. The DSL corresponds to a large subset of FlashFill DSL (except conditionals), and
allows for a richer class of substring operations than FlashFill. A DSL program takes as input a
string v and returns an output string o. The top-level string expression e is a concatenation of a
finite list of substring expressions f1 , · · · , fn . A substring expression f can either be a constant
string s or a substring expression, which is defined using two position logics pl (left) and pr (right).
A position logic corresponds to a symbolic expression that evaluates to an index in the string. A
position logic p can either be a constant position k or a token match expression (r, k, Dir), which
denotes the Start or End of the k th match of token r in input string v. A regex token can either be a
constant string s or one of 8 regular expression tokens: p (ProperCase), C (CAPS), l (lowercase), d
(Digits), α (Alphabets), αn (Alphanumeric), ∧ (StartOfString), and $ (EndOfString). The semantics
of the DSL programs is described in the appendix.
A DSL program for the name transformation task shown in Figure 1(a) that is consistent with the examples is: Concat(f1 , ConstStr(“, ”), f2 , ConstStr(“.”)), where f1 ≡
SubStr(v, (“ ”, −1, End), ConstPos(−1)) and f2 ≡ SubStr(v, ConstPos(0), ConstPos(1)). The
program concatenates the following 4 strings: i) substring between the end of last whitespace and
end of string, ii) constant string “, ”, iii) first character of input string, and iv) constant string “.”.
3
OVERVIEW OF OUR A PPROACH
We now present an overview of our approach. Given a DSL L, we learn a generative model of programs in the DSL L that is conditioned on input-output examples to efficiently search for consistent
programs. The workflow of our system is shown in Figure 2, which is trained end-to-end using a
large training set of programs in the DSL together with their corresponding input-output examples.
To generate a large training set, we uniformly sample programs from the DSL and then use a rulebased strategy to compute well-formed input strings that satisfy the pre-conditions of the programs.
The corresponding output strings are obtained by running the programs on the input strings.
A DSL can be considered a context-free grammar with a start symbol S and a set of non-terminals
with corresponding expansion rules. The (partial) grammar derivations or trees correspond to (partial) programs. A naı̈ve way to perform a search over the programs in a DSL is to start from the start
symbol S and then randomly choose non-terminals to expand with randomly chosen expansion rules
until reaching a derivation with only terminals. We, instead, learn a generative model over partial
derivations in the DSL that assigns probabilities to different non-terminals in a partial derivation and
corresponding expansions to guide the search for complete derivations.
Our generative model uses a Recursive-Reverse-Recursive Neural Network (R3NN) to encode partial trees (derivations) in L, where each node in the partial tree encodes global information about
every other node in the tree. The model assigns a vector representation for every symbol and every
expansion rule in the grammar. Given a partial tree, the model first assigns a vector representation
to each leaf node, and then performs a recursive pass going up in the tree to assign a global tree
representation to the root. It then performs a reverse-recursive pass starting from the root to assign
a global tree representation to each node in the tree.
3
Under review as a conference paper at ICLR 2017
{
{
{
p1
DSL
Program
Sampler
Input Gen Rules
DSL
i1 – o 1
i2 – o 2
…
ik – o k
…
pj
i1 – o 1
i2 – o 2
…
ik – o k
…
pn
i1 – o 1
i2 – o 2
…
ik – o k
DSL
pj,0
i1 – o1
i2 – o2
…
ik – ok
R3NN
DSL
I/O Encoder
R3NN
..
DSL
pj,1
R3NN
DSL
I/O Encoder
pj,2
R3NN
R3NN
..
DSL
R3NN
pj
Learnt program
(a) Training Phase
(b) Test Phase
Figure 2: An overview of the training and test workflow of our synthesis appraoch.
The generative process is conditioned on a set of input-output examples to learn a program that is
consistent with this set of examples. We experiment with multiple input-output encoders including
an LSTM encoder that concatenates the hidden vectors of two deep bidirectional LSTM networks
for input and output strings in the examples, and a Cross Correlation encoder that computes the cross
correlation between the LSTM tensor representations of input and output strings in the examples.
This vector is then used as an additional input in the R3NN model to condition the generative model.
4
T REE -S TRUCTURED G ENERATION M ODEL
We define a program t-steps into construction as a partial program tree (PPT) (see Figure 3 for a
visual depiction). A PPT has two types of nodes: leaf (symbol) nodes and inner non-leaf (rule)
nodes. A leaf node represents a symbol, whether non-terminal or terminal. An inner non-leaf node
represents a particular production rule of the DSL, where the number of children of the non-leaf
node is equivalent to the arity of the RHS of the rule it represents. A PPT is called a program tree
(PT) whenever all the leaves of the tree are terminal symbols. Such a tree represents a completed
program under the DSL and can be executed. We define an expansion as the valid application of
a specific production rule (e → e op2 e) to a specific non-terminal leaf node within a PPT (leaf
with symbol e). We refer to the specific production rule that an expansion is derived from as the
expansion type. It can be seen that if there exist two leaf nodes (l1 and l2 ) with the same symbol
then for every expansion specific to l1 there exists an expansion specific to l2 with the same type.
4.1
R ECURSIVE -R EVERSE -R ECURSIVE N EURAL N ETWORK
In order to define a generation model over PPTs, we need an efficient way of assigning probabilities
to every valid expansion in the current PPT. A valid expansion has two components: first the production rule used, and second the position of the expanded leaf node relative to every other node in
the tree. To account for the first component, a separate distributed representation for each production rule is maintained. The second component is handled using an architecture where the forward
propagation resembles belief propagation on trees, allowing a notion of global tree state at every
node within the tree. A given expansion probability is then calculated as being proportional to the
inner product between the production rule representation and the global-tree representation of the
leaf-level non-terminal node. We now describe the design of this architecture in more detail.
The R3NN has the following parameters for the grammar described by a DSL (see Figure 3):
1. For every symbol s ∈ S, an M -dimensional representation φ(s) ∈ RM .
2. For every production rule r ∈ R, an M −dimensional representation ω(r) ∈ RM .
3. For every production rule r ∈ R, a deep neural network fr which takes as input a vector
x ∈ RQ·M , with Q being the number of symbols on the RHS of the production rule r,
and outputs a vector y ∈ RM . Therefore, the production-rule network fr takes as input a
concatenation of the distributed representations of each of its RHS symbols and produces
a distributed representation for the LHS symbol.
4. For every production rule r ∈ R, an additional deep neural network gr which takes as
input a vector x0 ∈ RM and outputs a vector y 0 ∈ RQ·M . We can think of gr as a reverse
4
Under review as a conference paper at ICLR 2017
(a) Recursive pass
(b) Reverse-Recursive pass
Figure 3: (a) The initial recursive pass of the R3NN. (b) The reverse-recursive pass of the R3NN
where the input is the output of the previous recursive pass.
production-rule network that takes as input a vector representation of the LHS and produces
a concatenation of the distributed representations of each of the rule’s RHS symbols.
Let E be the set of all valid expansions in a PPT T , let L be the current leaf nodes of T and N be
the current non-leaf (rule) nodes of T . Let S(l) be the symbol of leaf l ∈ L and R(n) represent the
production rule of non-leaf node n ∈ N .
4.1.1
G LOBAL T REE I NFORMATION AT THE L EAVES
To compute the probability distribution over the set E, the R3NN first computes a distributed representation for each leaf node that contains global tree information. To accomplish this, for every
leaf node l ∈ L in the tree we retrieve its distributed representation φ(S(l)) . We now do a standard
recursive bottom-to-top, RHS→LHS pass on the network, by going up the tree and applying fR(n)
for every non-leaf node n ∈ N on its RHS node representations (see Figure 3(a)). These networks
fR(n) produce a node representation which is input into the parent’s rule network and so on until we
reach the root node.
Once at the root node, we effectively have a fixed-dimensionality global tree representation φ(root)
for the start symbol. The problem is that this representation has lost any notion of tree position. To
solve this problem R3NN now does what is effectively a reverse-recursive pass which starts at the
root node with φ(root) as input and moves towards the leaf nodes (see Figure 3(b)).
More concretely, we start with the root node representation φ(root) and use that as input into the
rule network gR(root) where R(root) is the production rule that is applied to the start symbol in
T . This produces a representation φ0 (c) for each RHS node c of R(root). If c is a non-leaf node,
we iteratively apply this procedure to c, i.e., process φ0 (c) using gR(c) to get representations φ0 (cc)
for every RHS node cc of R(c), etc. If c is a leaf node, we now have a leaf representation φ0 (c)
which has an information path to φ(root) and thus to every other leaf node in the tree. Once the
reverse-recursive process is complete, we now have a distributed representation φ0 (l) for every leaf
node l which contains global tree information. While φ(l1 ) and φ(l2 ) could be equal for leaf nodes
which have the same symbol type, φ0 (l1 ) and φ0 (l2 ) will not be equal even if they have the same
symbol type because they are at different positions in the tree.
4.1.2
E XPANSION P ROBABILITIES
Given the global leaf representations φ0 (l), we can now straightforwardly acquire scores for each
e ∈ E. For expansion e, let e.r be the expansion type (production rule r ∈ R that e applies) and
let e.l be the leaf node l that e.r is applied to. ze = φ0 (e.l) · ω(e.r) The score of an expansion is
calculated using ze = φ0 (e.l) · ω(e.r). The probability of expansion e is simply the exponentiated
ze
normalized sum over all scores: π(e) = P 0 e eze0 .
e ∈E
An additional improvement that was found to help was to add a bidirectional LSTM to process the
global leaf representations right before calculating the scores. The LSTM hidden states are then
5
Under review as a conference paper at ICLR 2017
used in the score calculation rather than the leaves themselves. This serves primarily to reduce the
minimum length that information has to propagate between nodes in the tree. The R3NN can be
seen as an extension and combination of several previous tree-based models, which were mainly
developed in the context of natural language processing (Le & Zuidema, 2014; Paulus et al., 2014;
Irsoy & Cardie, 2013).
5
C ONDITIONING WITH I NPUT /O UTPUT E XAMPLES
Now that we have defined a generation process over tree-structured programs, we need a way of
conditioning this generation process on a set of input/output examples. The set of input/output
examples provide a nearly complete specification for the desired output program, and so a good
encoding of the examples is crucial to the success of our program generator. For the most part, this
example encoding needs to be domain-specific, since different DSLs have different inputs (some
may operate over integers, some over strings, etc.). Therefore, in our case, we use an encoding
adapted to the input-output strings that our DSL operates over. We also investigate different ways of
conditioning program search on the learnt example input-output encodings.
5.1
E NCODING INPUT / OUTPUT EXAMPLES
There are two types of information that string manipulation programs need to extract from inputoutput examples: 1) constant strings, such as “@domain.com” or “.”, which appear in all output
examples; 2) substring indices in input where the index might be further defined by a regular expression. These indices determine which parts of the input are also present in the output. To simplify the
DSL, we assume that there is a fixed finite universe of possible constant strings that could appear in
programs. Therefore we focus on extracting the second type of information, the substring indices.
In earlier hand-engineered systems such as FlashFill, this information was extracted from the inputoutput strings by running the Longest Common Substring algorithm, a dynamic programming algorithm that efficiently finds matching substrings in string pairs. To extract substrings, FlashFill runs
LCS on every input-output string pair in the I/O set to get a set of substring candidates. It then takes
the entire set of substring candidates and simply tries every possible regex and constant index that
can be used at substring boundaries, exhaustively searching for the one which is the most “general”,
where generality is specified by hand-engineered heuristics.
In contrast to these previous methods, instead of of hand-designing a complicated algorithm to
extract regex-based substrings, we develop neural network based architectures that are capable of
learning to extract and produce continuous representations of the likely regular expressions given
input/output strings.
5.1.1
BASELINE LSTM ENCODER
Our first I/O encoding network involves running two separate deep bidirectional LSTM networks for
processing the input and the output string in each example pair. For each pair, it then concatenates
the topmost hidden representation at every time step to produce a 4HT -dimensional feature vector
per I/O pair, where T is the maximum string length for any input or output string, and H is the
topmost LSTM hidden dimension.
We then concatenate the encoding vectors across all I/O pairs to get a vector representation of the entire I/O set. This encoding is conceptually straightforward and has very little prior knowledge about
what operations are being performed over the strings, i.e., substring, constant, etc., which might
make it difficult to discover substring indices, especially the ones based on regular expressions.
5.1.2
C ROSS C ORRELATION ENCODER
To help the model discover input substrings that are copied to the output, we designed an novel I/O
example encoder to compute the cross correlation between each input and output example representation. We used the two output tensors of the LSTM encoder (discussed above) as inputs to this
encoder. For each example pair, we first slide the output feature block over the input feature block
and compute the dot product between the respective position representation. Then, we sum over all
overlapping time steps. Features of all pairs are then concatenated to form a 2 ∗ (T − 1)-dimensional
6
Under review as a conference paper at ICLR 2017
vector encoding for all example pairs. There are 2 ∗ (T − 1) possible alignments in total between
input and output feature blocks. We also designed the following variants of this encoder.
Diffused Cross Correlation Encoder: This encoder is identical to the Cross Correlation encoder
except that instead of summing over overlapping time steps after the element-wise dot product, we
simply concatenate the vectors corresponding to all time steps, resulting in a final representation that
contains 2 ∗ (T − 1) ∗ T features for each example pair.
LSTM-Sum Cross Correlation Encoder: In this variant of the Cross Correlation encoder, instead
of doing an element-wise dot product, we run a bidirectional LSTM over the concatenated feature
blocks of each alignment. We represent each alignment by the LSTM hidden representation of the
final time step leading to a total of 2 ∗ H ∗ 2 ∗ (T − 1) features for each example pair.
Augmented Diffused Cross Correlation Encoder: For this encoder, the output of each character
position of the Diffused Cross Correlation encoder is combined with the character embedding at this
position, then a basic LSTM encoder is run over the combined features to extract a 4∗H-dimensional
vector for both the input and the output streams. The LSTM encoder output is then concatenated
with the output of the Diffused Cross Correlation encoder forming a (4∗H +T ∗(T −1))-dimensional
feature vector for each example pair.
5.2
C ONDITIONING PROGRAM SEARCH ON EXAMPLE ENCODINGS
Once the I/O example encodings have been computed, we can use them to perform conditional
generation of the program tree using the R3NN model. There are a number of ways in which the
PPT generation model can be conditioned using the I/O example encodings depending on where the
I/O example information is inserted in the R3NN model. We investigated three locations to inject
example encodings:
1) Pre-conditioning: where example encodings are concatenated to the encoding of each tree leaf,
and then passed to a conditioning network before the bottom-up recursive pass over the program
tree. The conditioning network can be either a multi-layer feedforward network, or a bidirectional
LSTM network running over tree leaves. Running an LSTM over tree leaves allows the model to
learn more about the relative position of each leaf node in the tree.
2) Post-conditioning: After the reverse-recursive pass, example encodings are concatenated to the
updated representation of each tree leaf and then fed to a conditioning network before computing
the expansion scores.
3) Root-conditioning: After the recursive pass over the tree, the root encoding is concatenated to
the example encodings and passed to a conditioning network. The updated root representation is
then used to drive the reverse-recursive pass.
Empirically, pre-conditioning worked better than either root- or post- conditioning. In addition,
conditioning at all 3 places simultaneously did not cause a significant improvement over just
pre-conditioning. Therefore, for the experimental section, we report models which only use preconditioning.
6
E XPERIMENTS
In order to evaluate and compare variants of the previously described models, we generate a dataset
randomly from the DSL. To do so, we first enumerate all possible programs under the DSL up to
a specific number of instructions, which are then partitioned into training, validation and test sets.
In order to have a tractable number of programs, we limited the maximum number of instructions
for programs to be 13. Length 13 programs are important for this specific DSL because all larger
programs can be written as compositions of sub-programs of length at most 13. The semantics of
length 13 programs therefore constitute the “atoms” of this particular DSL.
In testing our model, there are two different categories of generalization. The first is input/output
generalization, where we are given a new set of input/output examples as well as a program with a
specific tree that we have seen during training. This represents the model’s capacity to be applied
on new data. The second category is program generalization, where we are given both a previously
unseen program tree in addition to unseen input/output examples. Therefore the model needs to
7
Under review as a conference paper at ICLR 2017
I/O Encoding
LSTM
Cross Correlation (CC)
Diffused CC
LSTM-sum CC
Augmented diffused CC
Train
88%
67%
89%
90%
91%
Test
88%
65%
88%
91%
91%
Table 1: The effect of different input/output encoders on accuracy. Each result used 100 samples.
There is almost no generalization error in the results.
have a sufficient enough understanding of the semantics of the DSL that it can construct novel
combinations of operations. For all reported results, training sets correspond to the first type of
generalization since we have seen the program tree but not the input/output pairs. Test sets represent
the second type of generalization, as they are trees which have not been seen before on input/output
pairs that have also not been seen before.
In this section, we compare several different variants of our model. We first evaluate the effect of
each of the previously described input/output encoders. We then evaluate the R3NN model against a
simple recurrent model called io2seq, which is basically an LSTM that takes as input the input/output
conditioning vector and outputs a sequence of DSL symbols that represents a linearized program
tree. Finally, we report the results of the best model on the length 13 training and testing sets, as
well as on a set of 238 benchmark functions.
6.1
S ETUP AND HYPERPARAMETERS SETTINGS
For training the R3NN, two hyperparameters that were crucial for stabilizing training were the use
of hyperbolic tangent activation functions in both R3NN and cross-correlation I/O encoders and
the use of minibatches of length 8. Due to the difficulty of batching tree-based neural networks and
time-constraints, we were limited to 8 samples per batch but some preliminary experiments indicated
that increasing the batch size even further improved performance. Additionally, for all results, the
program tree generation is conditioned on a set of 10 input/output string pairs.
For each latent function and set of input/output examples that we test on, we report whether we had
a success after sampling 100 functions from the model and testing all 100 to see if one of these
functions is equivalent to the latent function. Here we consider two functions to be equivalent with
respect to a specific input/output example set if the functions output the same strings when run on
the inputs. Under this definition, two functions can have a different set of operations but still be
equivalent with respect to a specific input-output set.
6.2
E XAMPLE ENCODING
In this section, we evaluate the effect of several different input/output example encoders. To control
for the effect of the tree model, all results here used an R3NN with fixed hyperparameters to generate
the program tree. Table 1 shows the performance of several of these input/output example encoders.
We can see that the summed cross-correlation encoder did not perform well, which can be due to
the fact that the sum destroys positional information that might be useful for determining specific
substring indices. The LSTM-sum and the augmented diffused cross-correlation models did the
best. Surprisingly, the LSTM encoder was capable of finding nearly 88% of all programs without
having any prior knowledge explicitly built into the architecture. We use 100 samples for evaluating
the Train and Test sets. The training performance is sometimes slightly lower because there are
close to 5 million training programs but we only look at less than 2 million of these programs during
training. We sample a subset of only 1000 training programs from the 5 million program set to
report the training results in the tables. The test sets also consist of 1000 programs.
6.3
IO 2 SEQ
In this section, we motivate the use of the R3NN by testing whether a simpler model can also be
used to generate programs. The io2seq model is an LSTM whose initial hidden and cell states
8
Under review as a conference paper at ICLR 2017
Sampling
io2seq
Train
44%
Test
42%
Table 2: Testing the I/O-vector-to-sequence model. Each result used 100 samples.
Sampling
1-best
1-sample
10-sample
50-sample
100-sample
300-sample
Train
60%
56%
81%
91%
94%
97%
Test
63%
57%
79%
89%
94%
97%
Table 3: The effect of backtracking (sampling) multiple programs on accuracy. 1-best is deterministically choosing the expansion with highest probability at each step.
are a function of the input/output encoding vector. The io2seq model then generates a linearized
tree of a program symbol-by-symbol. An example of what a linearized program tree looks like is
(S (e (f (ConstStr “@”)ConstStr )f )e )S , which represents the program tree that returns the constant
string “@”. Predicting a linearized tree using an LSTM was also done in the context of parsing (Vinyals et al., 2015). For the io2seq model, we used the LSTM-sum cross-correlation I/O
conditioning model.
The results in Table 2 show that the performance of the io2seq model at 100 samples per latent test
function is far worse than the R3NN, at around 42% versus 91%, respectively. The reasons for that
could be that the io2seq model needs to perform far more decisions than the R3NN, since the io2seq
model has to predict the parentheses symbols that determine at which level of the tree a particular
symbol is at. For example, the io2seq model requires on the order of 100 samples for length 13
programs, while the R3NN requires no more than 13.
6.4
E FFECT OF BACKTRACKING SEARCH
For the best R3NN model that we trained, we also evaluated the effect that a different number of
samples per latent function had on performance. The results are shown in Table 3. The increase of
the model’s performance as the sample size increases hints that the model has a notion of what type
of program satisfies a given I/O pair, but it might not be that certain about the details such as which
regex to use, etc. By 300 samples, the model is nearing perfect accuracy on the test sets.
6.5
F LASH F ILL B ENCHMARKS
We also evaluate our learnt models on 238 real-world FlashFill benchmarks obtained from the Microsoft Excel team and online help-forums. These benchmarks involve string manipulation tasks
described using input-output examples. We evaluate two models – one with a cross correlation encoder trained on 5 input-output examples and another trained on 10 input-output examples. Both
the models were trained on randomly sampled programs from the DSL upto size 13 with randomly
generated input-output examples.
The distribution of the size of smallest DSL programs needed to solve the benchmark tasks is shown
in Figure 4(a), which varies from 4 to 63. The figure also shows the number of benchmarks for
which our model was able to learn the program using 5 input-output examples using samples of
top-2000 learnt programs. In total, the model is able to learn programs for 91 tasks (38.2%). Since
the model was trained for programs upto size 13, it is not surprising that it is not able to solve tasks
that need larger program size. There are 110 FlashFill benchmarks that require programs upto size
13, out of which the model is able to solve 82.7% of them.
The effect of sampling multiple learnt programs instead of only top program is shown in Figure 4(b).
With only 10 samples, the model can already learn about 13% of the benchmarks. We observe
a steady increase in performance upto about 2000 samples, after which we do not observe any
9
Under review as a conference paper at ICLR 2017
Number of Benchmarks
Number of FlashFill Benchmarks solved
50
45
40
35
30
25
20
15
10
5
0
Total
4
7
9
10
11
13
15
17
19
24
Solved
25
27
30
31
37
50
59
63
Size of smallest programs for FlashFill Benchmarks
Sampling
10
50
100
200
500
1000
2000
5000
(a)
Solved Benchmarks
13%
21%
23%
29%
33%
34%
38%
38%
(b)
Figure 4: (a) The distribution of size of programs needed to solve FlashFill tasks and the performance of our model, (b) The effect of sampling for trying top-k learnt programs.
Input v
[CPT-00350
[CPT-00340]
[CPT-114563]
[CPT-1AB02
[CPT-00360
Output
[CPT-00350]
[CPT-00340]
[CPT-114563]
[CPT-1AB02]
[CPT-00360]
(a)
Input v
Output
732606129
0x73
430257526
0x43
444004480
0x44
371255254
0x37
635272676
0x63
(b)
Input v
John Doyle
Matt Walters
Jody Foster
Angela Lindsay
Maria Schulte
(c)
Output
John D.
Matt W.
Jody F.
Angela L.
Maria S.
Figure 5: Some example solved benchmarks: (a) cleaning up medical codes with closing brackets,
(b) generating Hex numbers with first two digits, (c) transforming names to firstname and last initial.
significant improvement. Since there are more than 2 million programs in the DSL of length 11
itself, the enumerative techniques with uniform search do not scale well (Alur et al., 2015).
We also evaluate a model that is learnt with 10 input-output examples per benchmark. Surprisingly,
this model can only learn programs for about 29% of the FlashFill benchmarks. We hypothesize
that the space of consistent programs gets more constrained with additional input-output examples,
which makes it harder for R3NN to learn the desired program. Another possibility is that the inputoutput encoder gets more confused with the additional example pairs.
Our model is able to solve majority of FlashFill benchmarks that require learning programs with
upto 3 Concat operations. We now describe a few of these benchmarks, also shown in Figure 5. An Excel user wanted to clean a set of medical billing records by adding a missing “]”
to medical codes as shown in Figure 5(a). Our system learns the following program given these
5 input-output examples: Concat(SubStr(v,ConstPos(0),(d,-1,End)), ConstStr(“]”)). The program concatenates the substring between the start of the input string and the position of the last
digit regular expression with the constant string “]”. Another task that required user to transform some numbers into a hex format is shown in Figure 5(b). Our system learns the following
program: Concat(ConstStr(“0x”),SubStr(v,ConstPos(0),ConstPos(2))). For some benchmarks
with long input strings, it is still able to learn regular expressions to extract the desired substring, e.g. it learns a program to extract “NancyF” from the string “123456789,freehafer ,drew
,nancy,19700101,11/1/2007,[email protected],1230102,123 1st Avenue,Seattle,wa,09999”.
Our system is currently not able to learn programs for benchmarks that require 4 or more Concat operations. Two such benchmarks are shown in Figure 6. The task of combining names in
Figure 6(a) requires 6 Concat arguments, whereas the phone number transformation task in Figure 6(b) requires 5 Concat arguments. This is mainly because of the scalability issues in training
with programs of larger size. There are also a few interesting benchmarks where the R3NN models
gets very close to learning the desired program. For example, for the task “Bill Gates” → “Mr.
Bill Gates”, it learns a program that generates “Mr.Bill Gates” (without the whitespace), and for
the task “617-444-5454” → “(617) 444-5454”, it learns a program that generates the string “(617
444-5454”.
10
Under review as a conference paper at ICLR 2017
1
2
3
4
Input v
John James Paul
Tom Mike Bill
Marie Nina John
Reggie Anna Adam
Output
John, James, and Paul.
Tom, Mike, and Bill.
Marie, Nina, and John.
Reggie, Anna, and Adam.
(a)
1
2
3
4
Input v
(425) 221 6767
206.225.1298
617-224-9874
425.118.9281
Output
425-221-6767
206-225-1298
617-224-9874
425-118-9281
(b)
Figure 6: Some unsolved benchmarks: (a)Combining names by different delimiters. (b) Transforming phone numbers to consistent format.
7
R ELATED W ORK
We have seen a renewed interest in recent years in the area of Program Induction and Synthesis.
In the machine learning community, a number of promising neural architectures have been proposed to perform program induction. These methods have employed architectures inspired from
computation modules (Turing Machines, RAM) (Graves et al., 2014; Kurach et al., 2015; Reed &
de Freitas, 2015; Neelakantan et al., 2015) or common data structures such as stacks used in many
algorithms (Joulin & Mikolov, 2015). These approaches represent the atomic operations of the network in a differentiable form, which allows for efficient end-to-end training of a neural controller.
However, unlike our approach that learns comprehensible complete programs, many of these approaches learn only the program behavior (i.e., they produce desired outputs on new input data).
Some recently proposed methods (Kurach et al., 2015; Gaunt et al., 2016; Riedel et al., 2016; Bunel
et al., 2016) do learn interpretable programs but these techniques require learning a separate neural
network model for each individual task, which is undesirable in many synthesis settings where we
would like to learn programs in real-time for a large number of tasks. Liang et al. (2010) restrict
the problem space with a probabilistic context-free grammar and introduce a new representation
of programs based on combinatory logic, which allows for sharing sub-programs across multiple
tasks. They then take a hierarchical Bayesian approach to learn frequently occurring substructures
of programs. Our approach, instead, uses neural architectures to condition the search space of programs, and does not require additional step of representing program space using combinatory logic
for allowing sharing.
The DSL-based program synthesis approach has also seen a renewed interest recently (Alur et al.,
2015). It has been used for many applications including synthesizing low-level bitvector implementations (Solar-Lezama et al., 2005), Excel macros for data manipulation (Gulwani, 2011; Gulwani
et al., 2012), superoptimization by finding smaller equivalent loop bodies (Schkufza et al., 2013),
protocol synthesis from scenarios (Udupa et al., 2013), synthesis of loop-free programs (Gulwani
et al., 2011), and automated feedback generation for programming assignments (Singh et al., 2013).
The synthesis techniques proposed in the literature generally employ various search techniques including enumeration with pruning, symbolic constraint solving, and stochastic search, while supporting different forms of specifications including input-output examples, partial programs, program
invariants, and reference implementation.
In this paper, we consider input-output example based specification over the hypothesis space defined by a DSL of string transformations, similar to that of FlashFill (without conditionals) (Gulwani, 2011). The key difference between our approach over previous techniques is that our system
is trained completely in an end-to-end fashion, while previous techniques require significant manual
effort to design heuristics for efficient search. There is some work on guiding the program search using learnt clues that suggest likely DSL expansions, but the clues are learnt over hand-coded textual
features of examples (Menon et al., 2013). Moreover, their DSL consists of composition of about
100 high-level text transformation functions such as count and dedup, whereas our DSL consists of
tree structured programs over richer regular expression based substring constructs.
There is also a recent line of work on learning probabilistic models of code from a large number of
code repositories (big code) (Raychev et al., 2015; Bielik et al., 2016; Hindle et al., 2016), which
are then used for applications such as auto-completion of partial programs, inference of variable
and method names, program repair, etc. These language models typically capture only the syntactic
11
Under review as a conference paper at ICLR 2017
properties of code, unlike our approach that also tries to capture the semantics to learn the desired
program. The work by Maddison & Tarlow (2014) addresses the problem of learning structured
generative models of source code but both their model and application domain are different from
ours.
The R3NN model employed in our work is related to several tree and graph structured neural networks present in the NLP literature (Le & Zuidema, 2014; Paulus et al., 2014; Irsoy & Cardie, 2013).
The Inside-Outside Recursive Neural Network (Le & Zuidema, 2014) in particular is most similar to
the R3NN, where they generate a parse tree incrementally by using global leaf-level representations
to determine which expansions in the parse tree to take next.
8
C ONCLUSION
We have proposed a novel technique called Neuro-Symbolic Program Synthesis that is able to construct a program incrementally based on given input-output examples. To do so, a new neural
architecture called Recursive-Reverse-Recursive Neural Network is used to encode and expand a
partial program tree into a full program tree. Its effectiveness at example-based program synthesis
is demonstrated, even when the program has not been seen during training.
These promising results open up a number of interesting directions for future research. For example,
we took a supervised-learning approach here, assuming availability of target programs during training. In some scenarios, we may only have access to an oracle that returns the desired output given
an input. In this case, reinforcement learning is a promising framework for program synthesis.
R EFERENCES
Alur, Rajeev, Bodı́k, Rastislav, Dallal, Eric, Fisman, Dana, Garg, Pranav, Juniwal, Garvit, KressGazit, Hadas, Madhusudan, P., Martin, Milo M. K., Raghothaman, Mukund, Saha, Shamwaditya,
Seshia, Sanjit A., Singh, Rishabh, Solar-Lezama, Armando, Torlak, Emina, and Udupa, Abhishek. Syntax-guided synthesis. In Dependable Software Systems Engineering, pp. 1–25. 2015.
Bielik, Pavol, Raychev, Veselin, and Vechev, Martin T. PHOG: probabilistic model for code. In
ICML, pp. 2933–2942, 2016.
Biermann, Alan W. The inference of regular lisp programs from examples. IEEE transactions on
Systems, Man, and Cybernetics, 8(8):585–600, 1978.
Bunel, Rudy, Desmaison, Alban, Kohli, Pushmeet, Torr, Philip H. S., and Kumar, M. Pawan. Adaptive neural compilation. CoRR, abs/1605.07969, 2016. URL http://arxiv.org/abs/1605.07969.
Gaunt, Alexander L, Brockschmidt, Marc, Singh, Rishabh, Kushman, Nate, Kohli, Pushmeet, Taylor, Jonathan, and Tarlow, Daniel. Terpret: A probabilistic programming language for program
induction. arXiv preprint arXiv:1608.04428, 2016.
Graves, Alex, Wayne, Greg, and Danihelka, Ivo.
arXiv:1410.5401, 2014.
Neural turing machines.
arXiv preprint
Gulwani, Sumit. Automating string processing in spreadsheets using input-output examples. In
POPL, pp. 317–330, 2011.
Gulwani, Sumit, Jha, Susmit, Tiwari, Ashish, and Venkatesan, Ramarathnam. Synthesis of loop-free
programs. In PLDI, pp. 62–73, 2011.
Gulwani, Sumit, Harris, William, and Singh, Rishabh. Spreadsheet data manipulation using examples. Communications of the ACM, Aug 2012.
Hindle, Abram, Barr, Earl T., Gabel, Mark, Su, Zhendong, and Devanbu, Premkumar T. On the
naturalness of software. Commun. ACM, 59(5):122–131, 2016.
Irsoy, Orzan and Cardie, Claire. Bidirectional recursive neural networks for token-level labeling
with structure. In NIPS Deep Learning Workshop, 2013.
12
Under review as a conference paper at ICLR 2017
Joulin, Armand and Mikolov, Tomas. Inferring algorithmic patterns with stack-augmented recurrent
nets. In NIPS, pp. 190–198, 2015.
Kurach, Karol, Andrychowicz, Marcin, and Sutskever, Ilya. Neural random-access machines. arXiv
preprint arXiv:1511.06392, 2015.
Le, Phong and Zuidema, Willem. The inside-outside recursive neural network model for dependency
parsing. In EMNLP, pp. 729–739, 2014.
Liang, Percy, Jordan, Michael I., and Klein, Dan. Learning programs: A hierarchical Bayesian
approach. In ICML, pp. 639–646, 2010.
Maddison, Chris J and Tarlow, Daniel. Structured generative models of natural source code. In
ICML, pp. 649–657, 2014.
Menon, Aditya Krishna, Tamuz, Omer, Gulwani, Sumit, Lampson, Butler W., and Kalai, Adam. A
machine learning framework for programming by example. In ICML, pp. 187–195, 2013.
Neelakantan, Arvind, Le, Quoc V, and Sutskever, Ilya. Neural programmer: Inducing latent programs with gradient descent. arXiv preprint arXiv:1511.04834, 2015.
Paulus, Romain, Socher, Richard, and Manning, Christopher D. Global belief recursive neural
networks. pp. 2888–2896, 2014.
Raychev, Veselin, Vechev, Martin T., and Krause, Andreas. Predicting program properties from ”big
code”. In POPL, pp. 111–124, 2015.
Reed, Scott and de Freitas, Nando.
arXiv:1511.06279, 2015.
Neural programmer-interpreters.
arXiv preprint
Riedel, Sebastian, Bosnjak, Matko, and Rocktäschel, Tim. Programming with a differentiable forth
interpreter. CoRR, abs/1605.06640, 2016. URL http://arxiv.org/abs/1605.06640.
Schkufza, Eric, Sharma, Rahul, and Aiken, Alex. Stochastic superoptimization. In ASPLOS, pp.
305–316, 2013.
Singh, Rishabh and Solar-Lezama, Armando. Synthesizing data structure manipulations from storyboards. In SIGSOFT FSE, pp. 289–299, 2011.
Singh, Rishabh, Gulwani, Sumit, and Solar-Lezama, Armando. Automated feedback generation for
introductory programming assignments. In PLDI, pp. 15–26, 2013.
Solar-Lezama, Armando. Program Synthesis By Sketching. PhD thesis, EECS Dept., UC Berkeley,
2008.
Solar-Lezama, Armando, Rabbah, Rodric, Bodik, Rastislav, and Ebcioglu, Kemal. Programming by
sketching for bit-streaming programs. In PLDI, 2005.
Summers, Phillip D. A methodology for lisp program construction from examples. Journal of the
ACM (JACM), 24(1):161–175, 1977.
Udupa, Abhishek, Raghavan, Arun, Deshmukh, Jyotirmoy V., Mador-Haim, Sela, Martin, Milo
M. K., and Alur, Rajeev. TRANSIT: specifying protocols with concolic snippets. In PLDI, pp.
287–296, 2013.
Vinyals, Oriol, Kaiser, Lukasz, Koo, Terry, Petrov, Slav, Sutskever, Ilya, and Hinton, Geoffrey.
Grammar as a foreign language. In ICLR, 2015.
13
Under review as a conference paper at ICLR 2017
JConcat(f1 , · · · , fn )Kv
JConstStr(s)Kv
JSubStr(v, pl , pr )Kv
JConstPos(k)Kv
= Concat(Jf1 Kv , · · · , Jfn Kv )
= s
= v[Jpl Kv ..Jpr Kv ]
= k > 0? k : len(s) + k
J(r, k, Start)Kv
=
Start of k th match of r in v
from beginning (end if k < 0)
J(r, k, End)Kv
=
End of k th match of r in v
from beginning (end if k < 0)
Figure 7: The semantics of the DSL for string transformations.
A
D OMAIN - SPECIFIC L ANGUAGE FOR S TRING T RANSFORMATIONS
The semantics of the DSL programs is shown in Figure 7. The semantics of a Concat expression
is to concatenate the results of recursively evaluating the constituent substring expressions fi . The
semantics of ConstStr(s) is to simply return the constant string s. The semantics of a substring
expression is to first evaluate the two position logics pl and pr to p1 and p2 respectively, and then
return the substring corresponding to v[p1 ..p2 ]. We denote s[i..j] to denote the substring of string
s starting at index i (inclusive) and ending at index j (exclusive), and len(s) denotes its length.
The semantics of ConstPos(k) expression is to return k if k > 0 or return len + k (if k < 0).
The semantics of position logic (r, k, Start) is to return the Start of k th match of r in v from the
beginning (if k > 0) or from the end (if k < 0).
14
| 6cs.PL
|
ON STABLE COMMUTATOR LENGTHS OF DEHN TWISTS
ALONG SEPARATING CURVES
arXiv:1606.08643v1 [math.GT] 28 Jun 2016
NAOYUKI MONDEN AND KAZUYA YOSHIHARA
Abstract. We give new upper bounds on the stable commutator lengths of
Dehn twists along separating curves in the mapping class group of a closed
oriented surface. The estimates of these upper bounds are O(1/g), where g is
the genus of the surface.
1. Introduction
For x in the commutator subgroup [G, G] of a group G, we define the commutator
length clG (x) of x to be the smallest number of commutators in G whose product
is equal to x. The stable commutator length sclG (x) of x is the limit
clG (xn )
.
n→∞
n
sclG (x) = lim
Let Mg be the mapping class group of a closed oriented surface of genus g, and
let tc be the Dehn twist along a simple closed curve c on the surface. The natural
problem is to calculate sclMg (tc ). However, in general, computing scl is difficult.
Therefore, it makes sense to give upper and lower bounds on sclMg (tc ) (Note that
using Louwsma’s results [16], we find sclM1 (tc ) = 1/12).
The lower bounds on sclMg (tc ) were given by Endo-Kotschick [9] using Gauge
theory. For technical reasons, they showed that 1/(18g + 6) ≤ sclMg (tc ) only for
a separating curve c. This assumption is removed by Korkmaz [13]. He also gave
upper bounds on stable commutator lengths of Dehn twists in [13]. An upper bound
on sclMg (tc ) given in [13] (see also [17]) is constant for g. However, according to [15]
(see also [5]), there is an estimate sclMg (tc ) = O(1/g), that is, limg→∞ sclMg (tc ) =
0. Such an upper bound were given in [6] for a nonseparating curve c, and the
estimate is sclMg (tc ) ≤ 1/(4g + 6 + (2/g)) for g ≥ 1. On the other hand, to the best
of our knowledge, there is no such upper bound for a separating curve sh on Σg ,
where sh separates into two components with genera h and g − h For this reason,
we focus on separating curves. We prove the following.
Theorem 1. For
some integers k, h and r, we assume that genus g = kh + r
(h = 1, 2, . . . , g2 , r = 0, 1, . . . , h − 1). Then we have
1
h(2h + 1)(2g − 2h + 1)
sclMg (tsr ) + 1 .
sclMg (tsh ) ≤
(g + 1)(2g + 1) − (2g − 2h + 1)r 2r + 1
Note that ts0 = id in Mg since s0 bounds a disk, and therefore scl(ts0 ) = 0. As
a corollary, we obtain the following results.
Corollary 2. sclMg (ts1 ) ≤
3(2g − 1)
.
(g + 1)(2g + 1)
1
2
N. MONDEN AND K. YOSHIHARA
Corollary 3. If g = kh, then sclMg (tsh ) ≤
h(2h + 1)(2g − 2h + 1)
.
(g + 1)(2g + 1)
Using Theorem 1 and Corollary 2, we can inductively give an upper bound of
sclMg (tsh ) for any h.
Here is an outline of this paper. In Section 2.1, we review basic facts of stable
commutator lengths and quasi-morphisms. Especially, we present “Bavard’s duality
theorem” which gives a relationship between stable commutator lengths and quasimorphisms. Section 2.2 provides relations in mapping class groups. These relations
are need to prove Theorem 1. In the last section, we prove Theorem 1.
Remark 4. There are applications of giving lower and upper bounds on the stable
commutator length of a Dehn twist. Powell [20] showed that any element x in Mg
can be factorized as a product of commutators if g ≥ 3, that is, Mg is a perfect
group. The next problem is uniformly perfectness of Mg . Here, a group G is called
uniformly perfect if there is a natural number N such that clG (x) ≤ N for any
element x in G. It was conjectured by Morita [19] that Mg is not uniformly perfect,
more strongly, the map Hb2 (Mg ) → H 2 (Mg ; R) is not injective, where H 2 (Mg )
(resp. Hb2 (Mg )) is the second (resp. bounded) cohomology of Mg . Endo-Kotschick
[9] soloved them affirmatively by giving a lower bound of sclMg (tc ). Recently, the
first author [18] improved an upper bound on sclMg (tc ) for any simple closed curve
c and g ≥ 3 by giving an explicit factorization of tnc for any n. Using this result,
h (n)
he improved an upper bound on the limit of limn→∞ gn for odd g, where hg (n)
is the minimal h such that there exists a Σg -bundle over Σh with signature 4n.
Computing the limit is open problem in Problem 2.18 (B) of [8].
Remark 5. We introduce some background results on factorizations of some power
of a Dehn twist as a product of commutators. Korkmaz and Ozbagci [12] proved
that clMg (tc ) = 2 for any simple closed curve c if g ≥ 3. It was shown that
5
clMg (t10
d ) ≤ 2 for a nonseparating curve d if g ≥ 2 (see [12]) and that clM2 (ts1 ) ≤ 6
1
for a separating curve s1 (see [14]). For the mapping class group Mg of a compact
oriented surface of genus g ≥ 2 with a boundary curve δ, it was proved in [3] proved
that clM1g (tnδ ) = [n/2] for any n, so sclM1g (tδ ) = 1/2 (see also [2]). In the above
results, explicit factorizations of some power of a Dehn twist were given.
Remark 6. We explain a geometrical interpretation of (stable) commutator lengths
in Mg as Lefschetz fibrations, which play an important role in 4-dimensional topology. Note that by the works of [11] and [7], a 4-manifold is symplectic if and only if
it admits a Lefschetz fibration, up to blow-up. Let x be a product of right-handed
Qk
Dehn twists tv1 · · · tvn . If we give a relation x = i=1 [ai , bi ] in Mg , then we obtain
a Lefschetz fibration with fiber Σg over Σk with n singular fibers such that each
of them is obtained by collapsing simple closed curve vj on Σg to a point (The
Euler characteristic of the 4-manifold admitting this Lefschetz fibration is equal
to 4(g − 1)(k − 1) + n). Conversely, given a Lefschetz fibration, we get the above
relation. From this, computing clMg (x) means that calculating the minimal base
genus of such Lefschetz fibration and the minimal Euler characteristic of its total
space. Therefore, clMg (tnc ) gives the “smallest” Lefschetz fibraitons (in the sense
of the Euler characteristic) in the “simplest” ones (in the sense of singular fibers).
Thus, we can regard sclMg (tc ) as the growth rate of the genus of their bases.
ON STABLE COMMUTATOR LENGTHS OF DEHN TWISTS ALONG SEPARATING CURVES3
2. Preliminaries
2.1. Stable commutator lengths and quasi-morphisms. For a group G, let
[G, G] denote the commutator subgroup of G.
Definition 7. For x ∈ [G, G], we define the commutator length clG (x) of x to be
the smallest number of commutators in G whose product is equal to x. The stable
commutator length sclG (x) of x is the limit
clG (xn )
.
n→∞
n
By convention we define clG (x) = ∞ if x ∈ G is not in [G, G], and sclG (x) < ∞ if
and only if xm ∈ [G, G] for some integer m.
sclG (x) = lim
The limit exists since the non-negative function n → clG (xn ) is subadditive, and
clG and sclG are class functions. We need the theory of quasi-morphisms in order
to prove Theorem 1. In this section, we recall the definition and basic properties
of quasi-morphisms. We refer the reader to [5] for the details.
Definition 8. Let G be a group. A quasi-morphism on G is a function φ : G → R
for which there is a constant D(φ) ≥ 0 such that
|φ(xy) − φ(x) − φ(y)| ≤ D(φ)
for all x, y ∈ G. We call D(φ) a defect of φ. A quasi-morphism φ is called homogeneous if
φ(xn ) = nφ(x)
for all x ∈ G and all n ∈ Z.
We recall the following basic properties of homogeneous quasi-morphisms (for
example, see Section 5.5.2 of [5] and Lemma 2.1 (1) of [15] for proofs).
Lemma 9. Let φ : G → R be a homogeneous quasi-morphism on a group G. For
all x, y ∈ G, the following holds.
(a) φ(x) = φ(yxy −1 ),
(b) If xy = yx, then φ(xy) = φ(x) + φ(y).
Theorem 10 (Bavard’s Duality Theorem [1] ). Let Q be the set of all homogeneous
quasi-morphisms on a group G with positive defects. For any x ∈ [G, G], we have
sclG (x) =
sup
φ∈Q,D(φ)
|φ(x)|
.
2D(φ)
2.2. Relations in mapping class groups. Let Σg be closed connected oriented
surface of genus g ≥ 2, and let Mg be the mapping class group of Σg , that is the
group of isotopy classes of orientation preserving self-diffeomorphisms of Σg . Since
Mg /[Mg , Mg ] is isomorphic to Z12 if g = 1, Z10 if g = 2 (see [4]), and is trivial if
g ≥ 3 (see [20]), we can define sclMg (x) for any x ∈ Mg .
Let tc be the right-handed Dehn twist along a simple closed curve c on Σg . We
review some relations among Dehn twists. More details can be found in [10].
Lemma 11. For any two separating curves sh and s′h on Σg which separate into
two components with genera h and g − h, tsh is conjugate to ts′h and tsg−h .
Lemma 12. If c and d are two disjoint simple closed curves on Σg , then tc td = td tc .
4
N. MONDEN AND K. YOSHIHARA
Lemma 13 (The hyperelliptic involution). Let c1 , c2 , . . . , c2g+1 be nonseparating
curves in Σg such that ci and cj are disjoint if |i − j| ≥ 2, and that ci and ci+1
intersect at one point. Then, the product
ι := tc1 tc2 · · · tc2g t2c2g+1 tc2g · · · tc2 tc1 .
is the hyperelliptic involution. In particular, we have the relation ιtci = tci ι for
i = 1, 2, . . . , 2g + 1.
Lemma 14 (The even chain relation). For a positive integer h, let us consider
a sequence of simple closed curves c1 , c2 , . . . , c2h in Σg such that ci and cj are
disjoint if |i − j| ≥ 2, and that ci and ci+1 intersect at one point. Then, a regular
neighborhood of c1 ∪c2 ∪· · ·∪c2h is a subsurface of genus h with connected boundary,
denoted by dh . We then have
(tc1 tc2 · · · tc2h )4h+2 = tdh .
3. The proof of Theorem1
In this section, we prove Theorem 1. For this, we need the following Lemma.
Lemma 15. Let G be a group, and let x1 , x2 , . . . , xn be elements in G such that
xi xj = xj xi for |i−j| ≥ 2. Then, x1 x3 · · · x2m−1 ·x2 x4 · · · x2m (resp. x1 x3 · · · x2m+1 ·
x2 x4 · · · x2m ) is conjugate to x1 x2 · · · x2m if n = 2m (resp. n = 2m + 1).
Proof. We consider the case where n = 2m + 1. Set
X2k+1 = x1 x2 · · · x2k+1 · x2k+3 x2k+5 · · · x2m+1 · x2k+2 x2k+4 · · · x2m ,
X2k = x1 x2 · · · x2k · x2k+2 x2k+4 · · · x2m · x2k+1 x2k+3 · · · x2m+1 .
Note that X1 = x1 x3 · · · x2m+1 · x2 x4 · · · x2m and X2m+1 = x1 x2 · · · x2m+1 . Therefore, in order to prove Lemma 15, it is sufficient to show that Xi+1 is conjugate to
Xi . From the assumption, we have
(x2k+2 x2k+4 · · · x2m ) · X2k+1 · (x2k+2 x2k+4 · · · x2m )−1
= x2k+2 x2k+4 · · · x2m · x1 x2 · · · x2k−1 x2k x2k+1 · x2k+3 x2k+5 · · · x2m+1
= x1 x2 · · · x2k−1 · x2k x2k+2 · · · x2m · x2k+1 x2k+3 x2k+5 · · · x2m+1 = X2k .
Therefore, X2k+1 is conjugate to X2k . By a similar argument, we can show that
X2k is conjugate to X2k−1 . The proof for n = 2m is similar. This finishes the proof
of Lemma 15.
We now give the proof of Theorem 1.
The proof of Theorem 1. Let φ be a homogeneous quasi-morphism on Mg , and let
c1 , c2 , . . . , c2g+1 the simple closed curves in Lemma 13. For simplicity of notation,
we write ti instead of tci . For i = 2, 3, . . . , k − 1, we write
T1 := t21 t2 t3 · · · t2h ,
Tk := t2(k−1)h+1 t2(k−1)h+2 · · · t2(g−h) ,
Ti := t2(i−1)h+1 t2(i−1)h+2 · · · t2ih ,
Tk+1 := t2(g−h)+1 t2(g−h)+2 · · · t2g ,
Tk+2 := t22g+1 t2g t2g−1 · · · t2(g−h)+2 ,
S := t2(g−h)+1 t2(g−h) · · · t2 .
ON STABLE COMMUTATOR LENGTHS OF DEHN TWISTS ALONG SEPARATING CURVES5
Then, by Lemma 9 (a), 11 and 14,
1
φ(tsh ),
4h
1
φ(Ti ) = φ(Tk+1 ) =
φ(tsh ),
4h + 2
1
φ(Tk ) =
φ(tsr ),
4r + 2
1
φ(S) =
φ(tsh )
4(g − h) + 2
(1)
φ(T1 ) = φ(Tk+2 ) =
(2)
(3)
(4)
for i = 2, 3, . . . , k − 1. From the conjugate t1 ιt−1
1 and Lemma 13, we have
t21 t2 t3 · · · t2g t22g+1 t2g · · · t3 t2 = ι−1 = ι,
that is, T1 T2 · · · Tk+2 S = ι. In particular, we see that the relation
T1 T2 · · · Tk+2 = ι · S −1
(5)
holds in Mg . Since φ(ι) = 0 by the definition of homogeneous quasimorphisms,
from the equations (4), (5), Lemma 9 (b) and 13, we obtain
φ(T1 T2 · · · Tk+2 ) = −φ(S) = −
(6)
1
φ(tsh ).
4(g − h) + 2
Note that Ti Tj = Tj Ti if |i − j| ≥ 2 from Lemma 12. From this and Lemma 15, we
have
φ(T1 T3 · · · Tk+1 · T2 T4 · · · Tk+2 ) if k + 2 is even
φ(T1 T2 · · · Tk+2 ) =
φ(T1 T3 · · · Tk+2 · T2 T4 · · · Tk+1 ) if k + 2 is odd.
By this equation, the definition of quasimorphisms, Lemma 9 (b) and the equations
(1)-(3) and (6),
D(φ) ≥ |φ(T1 T2 · · · Tk+2 ) −
k+2
X
φ(Ti )|
i=1
= −
2
k−1
1
1
φ(tsh ) −
φ(tsh ) −
φ(tsh ) −
φ(tsr )
4(g − h) + 2
4h
4h + 2
4r + 2
This gives
(g + 1)(2g + 1) − (2g − 2h + 1)r
1
|φ(tsh )| ≤
|φ(tsr )| + D(φ)
2h(2h + 1)(2g − 2h + 1)
4r + 2
from r = g − kh. Hence, we obtain
h(2h + 1)(2g − 2h + 1)
|φ(tsh )|
≤
2D(φ)
(g + 1)(2g + 1) − (2g − 2h + 1)r
1 |φ(tsr )|
+1 .
2r + 1 2D(φ)
1
sclMg (tsr ) + 1 .
2r + 1
By Bavard’s Duality Theorem,
sclMg (tsh ) ≤
h(2h + 1)(2g − 2h + 1)
(g + 1)(2g + 1) − (2g − 2h + 1)r
This completes the proof of Theorem 1.
Acknowledgements. The first author was supported by Grant-in-Aid for Young
Scientists (B) (No. 13276356), Japan Society for the Promotion of Science. The
second author would like to thank Susumu Hirose, Noriyuki Hamada, and Takayuki
Okuda for helpful comments and invaluable advice on the mapping class groups of
6
N. MONDEN AND K. YOSHIHARA
the surfaces. Finally, he also would like to thank Professor Osamu Saeki for many
helpful suggestions and comments.
References
[1] C. Bavard, Longueur stable des commutateurs, Enseign. Math. (2) 37 (1991), no. 1-2,
109–150.
[2] R.I. Baykur, Flat bundles and commutator lengths, Michigan Math. J. 63 (2014), no. 2,
333–344.
[3] R.I. Baykur, M. Korkmaz and N. Monden, Sections of surface bundles and Lefschetz
fibrations, Transactions of the American Mathematical Society, 365, (2013), no. 11, 5999–
6016.
[4] J. Birman, H. Hilden, On mapping class groups of closed surfaces as covering spaces, In
Advances in the theory of Riemann surfaces, Ann. of Math. Studies 66 (1971), 81–115.
[5] D. Calegari, scl, MSJ Memoirs, 20. Mathematical Society of Japan, Tokyo, 2009.
[6] D. Calegari, N. Monden and M. Sato, On stable commutator length in hyperelliptic mapping class groups, Pacific Journal of Mathematics, 272 (2014), no. 2, 323–351.
[7] S. K. Donaldson; Lefschetz pencils on symplectic manifolds, J. Diff. Geom. 53 (1999),
205–236.
[8] R. Kirby, editor, Problems in low-dimensional topology, from: “Geometric topology
(Athens, GA, 1993)”, AMS/IP Stud. Adv. Math. 2, Amer. Math. Soc. (1997) 35–473.
[9] H. Endo and D. Kotschick, bounded cohomology and non-uniform perfection of mapping
class groups, Invent. Math. 144 (2001), no. 1, 169–175.
[10] B. Farb and D. Margalit, A primer on mapping class groups, Princeton Mathematical
Series, 49. Princeton University Press, Princeton,
[11] R. Gompf and A. Stipsicz; 4-manifolds and Kirby calculus, Graduate Studies in Mathematics, vol. 20, American Math. Society, Providence 1999.
[12] M. Korkmaz and B. Ozbagci, Minimal number of singular fibers in a Lefschetz fibration,
Proc. Amer. Math. Soc. 129 (2001), no. 5, 1545–1549.
[13] M. Korkmaz, Stable commutator length of a Dehn twist, Michigan Math. J. 52 (2004),
no. 1, 23–31.
[14] M. Korkmaz and A. Stipsicz, Lefschetz fibrations on 4-manifolds, Handbook of
Teichmüller theory. Vol. II, 271-296, IRMA. Lect. Math. Theor. Phys., 13, Eur. Math.
Soc., Zurich, 2009.
[15] D. Kotschick, Quasi-homomorphisms and stable lengths in mapping class groups, Proc.
Amer. Math. Soc. 132 (2004), no. 11, 3167–3175.
[16] J. Louwsma, Extremality of the Rotation Quasimorphism on the Modular Group, Dissertation (Ph.D.), California Institute of Technology.
[17] N. Monden, On upper bounds on stable commutator lengths in mapping class groups,
Topology Appl. 159 (2012), no. 4, 1085–1091.
[18] N. Monden, Signatures of surface bundles and stable commutator lengths of Dehn twists,
in preparation.
[19] S. Morita, Structure of the mapping class groups of surfaces: a survey and a prospect,
(English summary) Proceedings of the Kirbyfest (Berkeley, CA, 1998), 349–406 (electronic), Geom. Topol. Monogr., 2, Geom. Topol. Publ., Coventry, 1999.
[20] J. Powell, Two theorems on the mapping class group of a surface, Proc. Amer. Math. Soc.
68 (1978), no. 3, 347–350.
Department of Engineering Science, Osaka Electro-Communication University, Hatsucho 18-8, Neyagawa, 572-8530, Japan
E-mail address: [email protected]
| 4math.GR
|
MOEA/D with Angle-based Constrained Dominance
Principle for Constrained Multi-objective Optimization
Problems
arXiv:1802.03608v1 [cs.NE] 10 Feb 2018
Zhun Fana , Yi Fanga , Wenji Lia , Xinye Caib,∗, Caimin Weic , Erik Goodmand
a Department
of Electronic Engineering, Shantou University, Guangdong, 515063, China
of Computer Science and Technology, Nanjing University of Aeronautics and
Astronautics, Jiangsu, 210016, China
c Department of Mathematics, Shantou University, Guangdong, 515063, China
d BEACON Center for the Study of Evolution in Action, Michigan State University. East
Lansing, Michigan, USA
b College
Abstract
This paper proposes a novel constraint-handling mechanism named angle-based
constrained dominance principle (ACDP) embedded in a decomposition-based
multi-objective evolutionary algorithm (MOEA/D) to solve constrained multiobjective optimization problems (CMOPs). To maintain the diversity of the
working population, ACDP utilizes the information of the angle of solutions
to adjust the dominance relation of solutions during the evolutionary process.
This paper uses 14 benchmark instances to evaluate the performance of the
MOEA/D with ACDP (MOEA/D-ACDP). Additionally, an engineering optimization problem (which is I-beam optimization problem) is optimized. The
proposed MOEA/D-ACDP, and four other decomposition-based CMOEAs, including C-MOEA/D, MOEA/D-CDP, MOEA/D-Epsilon and MOEA/D-SR are
tested by the above benchmarks and the engineering application. The experimental results manifest that MOEA/D-ACDP is significantly better than the
other four CMOEAs on these test instances and the real-world case, which indicates that ACDP is more effective for solving CMOPs.
Keywords: Constraint-handling Mechanism, Angle-based Constrained
Dominance Principle (ACDP), Decomposition based Multi-objective
Algorithm (MOEA/D)
1. Introduction
Multi-objective optimization problems (MOPs) involve the optimization of
more than one objective function. In the real world, many optimization prob∗ Corresponding
author
Email address: [email protected] (Xinye Cai)
Preprint submitted to Elsevier
February 13, 2018
lems invariably involve a number of constraints and a multiple conflicting objectives. In general, a CMOP can mathematically be described as follows:
T
minimize F(x) = (f1 (x), . . . , fm (x))
subject to g (x) ≥ 0, i = 1, . . . , q
i
(1)
h
j (x) = 0, j = 1, . . . , p
x ∈ Rn
where F (x) = (f1 (x), f2 (x), . . . , fm (x))T ∈ Rm is an m-dimensional objective
vector, gi (x) ≥ 0 is the ith inequality constraint, and hj (x) = 0 is the j th
equality constraint. x ∈ Rn is an n-dimensional decision vector. The feasible
region S is defined as the set {x|gi (x) ≥ 0, i = 1, . . . , q and hj (x) = 0, j =
1, . . . , p}.
In CMOPs, there are usually more than one constraint. To demonstrate the
degree of constraint violation, these constraints are commonly summarized into
a scalar value as follows:
φ(x) =
q
X
| min(gi (x), 0)| +
i=1
p
X
|hj (x)|
(2)
j=1
when φ(x) = 0, the solution x is feasible, otherwise it is infeasible.
For any two feasible solutions xa ∈ S and xb ∈ S of a CMOP, it can be said
that xa dominates xb if the following condition is met:
∀i fi (xa ) ≤ fi (xb ) and ∃j fj (xa ) < fj (xb )
(3)
where i, j ∈ {1, 2, ..., m}. If there exists a solution x∗ ∈ S, which dominates
any other solutions in S, x∗ can be said as a Pareto optimal solution. The set
of all Pareto optimal solution belonging to S is called as Pareto set (PS). The
set of the mapping vectors of PS in the objective space is named as Pareto front
(PF), which can be defined in the form of P F = {F (x)| x ∈ P S}.
CMOPs are consist of a few objectives and constraints. To solve CMOPs,
the constraint-handling technique should be applied to the framework of multiobjective evolutionary algorithm (MOEA).
According to different selection strategies, MOEAs mainly can be classified
into three types: (1) Pareto-domination-based; (2) decomposition-based; (3)
indicator-based. The typical examples of domination-based MOEAs include
NSGA-II [1], MOGA [2], PAES-II [3], SPEA-II [4] and NPGA [5]. In recent
years, decomposition-based MOEAs attract a lot of attention. The most representative algorithm of this type is MOEA/D [6]. Some variants of MOEA/D include MOEA/D-DE [7], MOEA/D-M2M [8], EAG-MOEA/D [9] and MOEA/DSAS [10]. For indicator-based MOEAs, they use a scalar metric to assist the
selection, typical examples of this type are IBEA [11], SMS-EMOA [12], HypE
[13] and FV-MOEA [14].
To solve CMOPs, constraint-handling mechanisms are important. In recent
years, many different constraint-handling mechanisms have been proposed [15,
2
16]. According to [17], constraint-handling techniques can be generally classified
into (1) penalty functions; (2) special representations and operators; (3) repair
algorithms; (4) separate objectives and constraints; and (5) hybrid methods.
As a representative objective-constraint separating method, constraineddomination principle (CDP) proposed in [1] is widely used. It solves CMOPs by
treating constraints as the top priority. Stochastic ranking [18], ε-constrained
method [19] and non-greedy constraint-handling technique [20] are also in this
category.
Currently, CTPs [21] and CFs [22] are the most widely used CMOP test
instances. The common characteristic of these benchmarks is that they all
have large feasible regions in the objective space. However, constraint-handling
mechanisms do not work when the working population falls in feasible regions, so
these two series of instances are not actually suitable for testing the effectiveness
of constraint-handling mechanisms.
The rest of this paper is organized as follows: Section 2 briefly introduces
MOEA/D and four other decomposition-based CMOEAs. Section 3 introduces
the details of the angle-based constrained dominance principle embedded in
MOEA/D. Section 4 gives comprehensive experimental results of the proposed
algorithm MOEA/D-ACDP and four other CMOEAs on LIR-CMOPs and the
I-beam optimization problem. Finally, conclusions are made in section 5.
2. Relative Work
2.1. MOEA/D
In the original framework of MOEA/D [6], given a series of uniform distributed weight vectors, a MOP is decomposed into N scalar subproblems
(SOPs), and each SOP relates to one solution. In MOEA/D, a set of N uniformly spread weight vectors λ1 , . . . , λN is initially generated for N subproblems.
A weight vector λi satisfies the following conditions:
m
X
λik = 1
and λik ≥ 0
for each k ∈ {1, . . . , m}.
(4)
k=1
There are several approaches to decompose a MOP into a number of scalar
optimization subproblems [6, 23]. Three decomposition approaches, including
weighted sum [23], Tchebycheff [23] and boundary intersection approaches [6]
are commonly used. In this paper, Tchebycheff decomposition method is used
in the MOEA/D framework. The j-th subproblem is defined as follows:
)
(
1
∗
te
∗
|fi (x) − zi |
minimize g (x|λ, z ) = max
1≤i≤m
λji
subject to x ∈ S
(5)
∗
) is the ideal point, and zi∗ = min{fi (x)|x ∈ S}.
where z ∗ = (z1∗ , . . . , zm
3
2.2. Decomposition-based CMOEAs
Decomposition-based CMOEAs combine the MOEA/D with different constrainthandling mechanisms. In this paper, we introduce four representative decompositionbased CMOEAs including C-MOEA/D [24], MOEA/D-CDP [25], MOEA/DEpsilon [26], and MOEA/D-SR [25].
• C-MOEA/D [24] uses a variant of the epsilon constraint-handling technique. In this technique, the epsilon level is set to handle constraints
according to the constraint violation and the proportion of feasible solutions in the current population. When comparing any two solutions, if
overall constraint violations of the solutions are both less than the epsilon
level, the one with a better aggregation value dominates the other. Otherwise, the one with a smaller overall constraint violation dominates the
other.
• MOEA/D-CDP [25] uses CDP [1] to judge the domination relationship
between two arbitrary solutions. CDP can be simply summarized as following three rules:
1) When two feasible solutions are compared, the one with a better aggregation value dominates the other.
2) When a feasible solution is compared with an infeasible solution, the
feasible solution dominates the infeasible solution.
3) When two infeasible solutions are compared, the one with a smaller
degree of constraint violation dominates the other.
The second and the third rules can be combined as a single rule: When at
least one of two compared solutions is infeasible, the one with a smaller
degree of constraint violation dominates the other.
• MOEA/D-Epsilon [26] uses the original epsilon constraint-handling technique. The epsilon level setting can be referred to [19]. With the generation counter K increasing, the epsilon level will dynamically decrease.
• MOEA/D-SR [25] embeds the stochastic ranking method (SR) [18] in
MOEA/D to deal with constraints. A threshold parameter rf ∈ [0, 1] is
set to balance the selection between the objectives and the constraints
in MOEA/D-SR. When comparing two solutions, if a random number in
[0, 1] is less than rf , the one with a better aggregation value is retained
into the next generation. If the random number in [0, 1] is greater than rf ,
the whole framework of MOEA/D-SR is similar to that of MOEA/D-CDP.
In the case of rf = 0, MOEA/D-SR is equivalent to MOEA/D-CDP.
3. MOEA/D with Angle-based Constrained Dominance Principle
In this section, the definition of the proposed ACDP and the effectiveness of
this mechanism in MOEA/D are detailed.
4
3.1. Angle-based Constrained Dominance Principle
In the CDP approach [1], with its three basic rules, the overall constraint
violation is the most important factor during the evolutionary process, and some
useful information in the infeasible regions tends to be ignored.
The angle between any two solutions in the objective space is useful information, which is related to the similarity between these two solutions. The
definition of angle between any two solutions x1 and x2 is given as follows:
(F(x1 ) − z ∗ )T · (F(x2 ) − z ∗ )
1
2 ∗
(6)
angle(x , x , z ) = arccos
||F(x1 ) − z ∗ || · ||F(x2 ) − z ∗ ||
∗
where z ∗ = (z1∗ , . . . , zm
) is the ideal point, and zi∗ = min{fi (x|x ∈ S}. || · || is
the two-norm of a vector.
As shown in Fig. 1, given any two solutions x1 and x2 , the angle between
them in the objective space is θ12 . Obviously, the angle between any two solutions
is less than or equal to π/2, which means that the range of angle between any
two solutions belongs in [0, π/2].
Figure 1: Illustration of the angle between x1 and x2
Given any two solutions x1 and x2 , an threshold of angle θ, a random number
of Feasible Solutions
r and a parameter pf ( NumberPopulation
) which denotes the proportion
Size
of feasible solutions in the current population, the ACDP is defined as follows:
1. If x1 and x2 are both feasible, the one dominating the other is better.
2. If there is at lease one infeasible solution and angle(x1 , x2 , z ∗ ) ≤ θ, the
one with a smaller constraint violation dominates the other.
3. When there is at least one infeasible solution and angle(x1 , x2 , z ∗ ) > θ,
if r < pf , the one dominating the other is better, otherwise, they are
incomparable.
5
3.2. ACDP in the framework of MOEA/D
As we know, MOEA/D uses the value of decomposition function of a solution
to update its neighbors. In order to use ACDP to handle constraints in the
framework of MOEA/D, here we provide a version of ACDP which is suitable
to the algorithm.
Given a subproblem sp with the weight vector λ, for two solutions x1 and
2
x , their overall constraint violations are φ1 and φ2 , and their decomposition
values on the subproblem sp are g te (x1 |λ, z ∗ ) and g te (x2 |λ, z ∗ ). The ACDP
dominance θ in the framework of MOEA/D is defined as follows:
x1 θ x2 ⇔
Rule 1 if φ1 = 0, φ2 = 0 :
g te (x1 |λ, z ∗ ) < g te (x2 |λ, z ∗ );
1
2
Rule 2 if φ < φ :
angle(x1 , x2 , z ∗ ) ≤ θ;
Rule 3 otherwise :
angle(x1 , x2 , z ∗ ) > θ, r < pf ,
g te (x1 |λ, z ∗ ) < g te (x2 |λ, z ∗ ).
(7)
where θ is a threshold parameter, which is defined by users. In Eq. (7), the
constraint-handling method ACDP is equivalent to CDP [1] when θ ≥ π2 .
In Rule 1 of ACDP, when these two solutions are both feasible, the solution
with a lower aggregation value dominates the other, which is similar to the first
rule of CDP.
When at least one of x1 and x2 is infeasible, CDP only utilizes the constraint violations of these two solutions to compare, which is difficult to keep
the diversity of the working population when most of solutions in the population
are infeasible. Nevertheless, ACDP utilizes additional information to compare
the two solutions, which includes the angle between the two compared solutions
in the objective space and the proportion of feasible solutions in the current
population (pf ). More details of ACDP in this situation are listed as follows:
• In Rule 2 of ACDP, if the angle between x1 and x2 in the objective space
is smaller than the parameter θ, ACDP considers that these two solutions are similar and compares them according to their constraint violations. Because these two solutions are similar, based on the framework of
MOEA/D, they will be considered to relate to the same subproblem. In
this situation, using the constraint violations to compare the two solutions
will not cause the loss of the diversity.
• In Rule 3 of ACDP, if the angle between x1 and x2 in the objective space
is larger than the parameter θ, ACDP considers that these two solutions
are dissimilar, and the solution with a lower decomposition value will
dominate the other with a probability of pf . Some solutions with low
aggregation values but large constraint violations will have a chance to be
6
selected in the next generation, which can enhance the convergence of the
working population effectively.
• The probability in Rule 3 of ACDP is set to be the proportion of feasible
solutions in the current population. It keeps the balance of the exploration
of the working population between infeasible regions and feasible regions.
When pf is large, ACDP tends to explore infeasible regions. When pf is
small, ACDP tends to explore feasible regions.
3.3. Effectiveness of ACDP in MOEA/D
The evolutionary process of a CMOEA can be generally divided in three
stages according to the status of the working population.
In the first stage, a population is generated randomly, and most of the individuals are far away from the real PF as shown in Fig. 2 (a) and Fig. 2
(b).
In the second stage, the working population begins to explore the search
space. As shown in Fig. 2 (c), when using CDP in MOEA/D, the working population will be attracted to feasible regions and actually difficult to get across
infeasible regions. As shown in Fig. 2 (d), when ACDP is applied to MOEA/D,
the working population can maintain the diversity by using angle information.
Some individuals can enter infeasible regions, which can help the working population to go across infeasible regions effectively. Additionally, ACDP uses the
information of the proportion of feasible solutions in the current population as
the probability to select solutions, which can help to balance the search between
feasible and infeasible regions.
In the third stage, the working population will converge to its near feasible
regions. when using CDP, the population is trapped into local optimum, because
of the difficulty to get across infeasible regions in the second stage, as shown in
Fig. 2 (e). Conversely, when using ACDP, the working population can converge
to the real PF more completely as shown in Fig. 2 (f), because the population
can keep the diversity and explore infeasible regions in the second stage.
3.4. The Parameter Setting of Theta
In the early stage of evolutionary process, the population is commonly far
away from real PF. To prevent the population from being trapped into local optimum, the value of θ should be set small to maintain the diversity. In the later
stage of evolutionary process, the convergence to the feasible regions should be
emphasized, then the value of θ should become larger. Based on the above discussions, the threshold θ(k) should be dynamically increased with the generation
counter k increasing. A method of setting θ(k) is proposed as follows:
θ(k) =
(
θ0 1 +
k
Tmax
π
2
cp
, 1 ≤ k ≤ Tc
, Tc < k ≤ Tmax
7
(8)
(a) Stage 1 of CDP
(b) Stage 1 of ACDP
(c) Stage 2 of CDP
(d) Stage 2 of ACDP
(e) Stage 3 of CDP
(f) Stage 3 of ACDP
Figure 2: Illustrations of the evolutionary process of MOEA/D with CDP and ACDP.
8
where θ0 is an initial threshold value which is set as π/2N , N is the size of
population and Tmax is the maximum generation. α is a parameter, which is
set as 0.8. Tc = αTmax is the termination generation to control θ. Parameter
cp is initialized to log(N )/log(1 + α).
As we know, the uniform weight vectors defined in Eq. (4) decide that the
maximum angle between two vectors is π/2, and the average angle between
two adjacent vectors is π/2N , where N is the size of population. Then, θ0 is
initially set as π/2N . According to Eq. (8), when the generation counter k
reaches Tc , the value of θ(k) is π/2, and keeps constant afterwards. As shown
in Fig. 3, we assume that the population size N and the maximum generation
Tmax are set as 300 and 500, respectively. Meanwhile α is set as 0.8. We can
find that θ0 = π/2N . In the early stage of evolutionary process, θ(k) increases
continuously but slowly. It benefits the population to maintain diversity. When
k gets more and more closed to Tc , θ(k) rises faster, which helps to accelerate
the convergence speed to the feasible regions. When k reaches Tc , θ(k) is equal
to π/2, ACDP is transformed into CDP.
Figure 3: The changing trend of θ.
3.5. ACDP embedded in MOEA/D
The proposed MOEA/D-ACDP integrates the general framework of MOEA/D
and the angle-based constrained dominance principle.
The psuecode of MOEA/D-ACDP is listed in Algorithm 1. Lines 1-5 initialize some parameters in MOEA/D-ACDP. First, a CMOP is decomposed into
N subproblems which are associated with weight vectors λ1 , . . . , λN . Then the
population P , the initial increasing factor cp, the ideal point z ∗ and the neighbor
indexes B(i) are initialized. Lines 7-11 update the angle threshold value θ(k).
Line 12 updates the proportion of feasible solutions in the current population pf .
Lines 13-23 generate a set of new solutions and update the ideal point z ∗ . To be
more specific, lines 14-21 determine the set of neighboring solutions that may be
9
Algorithm 1: MOEA/D-ACDP
Input:
N : the number of subproblems.
Tmax : the maximal generation.
N weight vectors: λ1 , . . . , λN .
T : the size of the neighborhood.
δ: the selecting probability from neighbors.
nr : the maximal number of solutions replaced by a child.
θ0 , α: the parameters of ACDP method.
Output: N S : a set of feasible non-dominated solutions
1
N
1 Decompose a CMOP into N subproblems associated with λ , . . . , λ .
1
N
2 Generate an initial population P = {x , . . . , x }.
log(N )
3 Initialize cp to be log(1+α) .
∗
4 Initialize the ideal point z = (z1 , . . . , zm ).
i
i
5 For each i = 1, . . . , N , set B(i) = {i1 , . . . , iT }, where λ 1 , . . . , λ T are the
i
T closest weight vectors to λ .
6 for k ← 1 to Tmax do
7
if k ≤ αTmax then
k
8
Set θ(k) according to θ(k) = θ0 (1 + Tmax
)cp .
9
else
10
Set θ(k) to be equal to π2
11
end
12
Update pf in the current generation.
13
Generate a random permutation rp from {1, . . . , N }.
14
for i ← 1 to N do
15
Generate a random number r ∈ [0, 1].
16
j = rp(i).
17
if r < δ then
18
S = B(j)
19
else
20
S = {1, . . . , N }
21
end
22
Generate yj through DE and polynomial mutation operators.
23
Update the current ideal point.
24
Set c = 0.
25
while c 6= nr and S 6= ∅ do
26
select an index j from S randomly, S = S\{j}.
27
result = U pdateSubproblems(xj , yj , θ(k), pf )
28
if result == true then c = c + 1;
29
end
30
end
S
31
N S = NondominatedSelect(N S P )
32 end
10
updated by a newly generated solution yj . In line 22, the differential evolution
(DE) crossover operator is adopted to generate a new solution yj . Meanwhile,
yj is further mutated by the polynomial mutation operator. The ideal point
z ∗ is updated in line 23. Lines 24-39 update subproblems. In line 27, the subproblems are updated based on the ACDP approach whose detailed psuecode is
listed in Algorithm 2. At the end of each generation, non-dominated solutions
(N S) in the population are selected to update the external archive based on
non-dominated sorting in line 31.
Algorithm 2: Subproblem Update
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
Function result = UpdateSubproblems(xj , yj , θ(k), pf )
result = f alse
if φ(yj ) == 0 and φ(xj ) == 0 then
if g te (yi |λj , z ∗ ) ≤ g te (xj |λj , z ∗ ) then
xj = yj
result = ture
end
else
if angle(F(yj ), F(xj ), z ∗ ) < θ(k) then
if φ(yj ) < φ(xj ) then
xj = y j
result = ture
end
else
if rand() < pf then
if g te (yi |λj , z ∗ ) ≤ g te (xj |λj , z ∗ ) then
xj = yj
result = ture
end
end
end
end
return result
end
In Algorithm 2, the algorithm updates a subproblem in terms of Eq. (7).
Lines 3-7 denote that when two feasible solutions xj and yj are compared, the
one with a better aggregation value is selected. Lines 9-12 denote that when at
least one of two solutions xj and yj is infeasible, if the angle between them in
the objective space is lower than θ, the solution with a lower constraint violation
is selected. Lines 13-17 denote that when at least one of two solutions xj and
yj is infeasible, if the angle between them in the objective space is larger than
θ, the solution with a lower aggregation value will be selected with a probability
of pf .
11
4. Experimental Study
4.1. Test Instances LIR-CMOPs
To evaluate the performance of the proposed MOEA/D-ACDP, 14 constrained multi-objective test problems with large infeasible regions in the objective space are used [27, 28].
The general characteristic of LIR-CMOPs is that their real PFs are blocked
by a number of large infeasible regions, and thus hard to be found during an
evolutionary process. Their constraint functions are comprised of controllable
shape functions and distance functions [29]. More specifically, the shape functions are used to turn the PF shapes as convex or concave, while the distance
functions are adopted to adjust the convergence difficulty for CMOEAs. Fig. 4
and Fig. 5 plot the feasible regions of LIR-CMOPs with two or three objectives,
respectively.
4.2. Real-world Engineering Optimization: I-beam
To evaluate the performance of MOEA/D-ACDP for solving real world optimization problems, an engineering optimization problem with two conflicting
objectives is studied.
As defined in [30], an optimization problem of I-beam is a bi-objective constrained optimization problem which needs to minimize the following objectives
simultaneously:
1. Cross section area of the beam;
2. Static deflection of the beam for the displacement under the force P .
To study the landscape in the objective space of the I-beam optimization problem, 1,000,000 sampling solutions are generated, where 850,000 solutions are generated randomly, and the other 150,000 solutions are generated
by MOEA/D-ACDP. In Fig. 6, it is observed that there exist a few infeasible
regions (the proportion of feasible solutions in all sampling solutions p = 0.5339,
which means that nearly a half of selected points are infeasible.) in the objective
space for the I-beam optimization problem.
4.3. Experimental Settings
To evaluate the performance of the proposed MOEA/D-ACDP, four popular CMOEAs (C-MOEA/D, MOEA/D-CDP, MOEA/D-Epsilon and MOEA/DSR), with differential evolution (DE) crossover operator, are adopted and tested
on LIR-CMOP1-14 and I-beam optimization problem. The detailed parameters
are listed as follows:
1. Mutation probability P m = 1/n (n is the number of decision variables)
and its distribution index is set to 20. For DE operator, CR = 1.0, f = 0.5.
2. Population size: N = 300. Neighborhood size: T = 30.
3. Stopping condition: each algorithm runs for 30 times independently, and
stops when 150,000 function evaluations are reached.
12
(a) LIR-CMOP1
(b) LIR-CMOP2
(c) LIR-CMOP3
(d) LIR-CMOP4
(e) LIR-CMOP5
(f) LIR-CMOP6
(g) LIR-CMOP7
(h) LIR-CMOP8
(i) LIR-CMOP9
(j) LIR-CMOP10
(k) LIR-CMOP11
(l) LIR-CMOP12
Figure 4: Illustrations of the feasible and infeasible regions of LIR-CMOP1-12.
(a) LIR-CMOP13
(b) LIR-CMOP14
Figure 5: Illustrations of the infeasible regions of LIR-CMOP13-14.
13
4. Probability of selecting individuals in the neighborhood: δ = 0.9.
5. The maximal number of solutions replaced by a child: nr = 2.
6. Parameter setting in MOEA/D-ACDP: α = 0.8 and θ0 = π/2N .
7. Parameter setting in MOEA/D-Epsilon: Tc = 400, cp = 2 and θ = 0.05N .
8. Parameter setting in MOEA/D-SR: Sr = 0.01.
4.4. Performance Metric
To measure the performance of MOEA/D-ACDP, C-MOEA/D, MOEA/DCDP, MOEA/D-Epsilon and MOEA/D-SR, two widely used metrics inverted
generation distance (IGD) [31] and hypervolume (HV ) [32] are adopted as
evaluation metrics. Their definitions are listed as follows.
• Inverted Generational Distance (IGD):
IGD is a metric which evaluates the performance related to convergence and
diversity simultaneously. Let P ∗ be a set of uniformly distributed points in the
ideal PF. Let A denote an approximate PF achieved by a certain CMOEA. The
metric IGD that represents average distance from P ∗ to A is defined as:
P
d(y ∗ , A)
∗
∗
y ∈P
IGD(P ∗ , A) =
|P ∗ |
(9)
p
Pm
∗
2
d(y ∗ , A) = min{
i=1 (yi − yi ) }
y∈A
In our experiment, for CMOPs with two objectives, 1000 points are sampled uniformly from the PF to constitute P ∗ . For CMOPs with three objectives, 10000
points are sampled uniformly from the PF to constitute P ∗ . A smaller IGD
represents a better performance regarding to both diversity and convergence.
• Hypervolume (HV ):
HV reflects the closeness between the non-dominated set achieved by a CMOEA
and the representative PF. The larger HV means that the corresponding nondominated set is closer to the true PF.
!
[
r
HV (S) = V OL
[f1 (x), z1r ] × ...[fm (x), zm
]
(10)
x∈S
r T
where V OL(·) is the Lebesgue measure, zr = (z1r , ..., zm
) is a reference point
in the objective space. For the test instances LIR-CMOPs, the reference point
is set as 1.4 times the nadir point of the real PF. The HV with a larger value
represents the better performance regarding to both diversity and convergence.
14
Figure 6: The distribution of the I-Beam problem.
As the real PF of the I-beam optimization problem is not known, IGD metric
can not be calculated. The experiment uses the HV metric [32] to measure the
performance of these CMOEAs. In the I-beam optimization case, the reference
point is set as z r = [850, 0.0615]T .
4.5. Discussion of Experimental Results
4.5.1. Performance Evaluation on LIR-CMOP Test Instances
The results of the IGD values on LIR-CMOP1-14 achieved by five CMOEAs
in 30 independent runs are shown in Table 1.
As discussed in Section 4, LIR-CMOP1-14 all have large infeasible regions
in their objective space. For LIR-CMOP3-14, MOEA/D-ACDP significantly
outperforms the other four compared algorithms in terms of the IGD metric.
For LIR-CMOP1-2, MOEA/D-ACDP significantly outperforms C-MOEA/D,
MOEA/D-CDP and MOEA/D-Epsilon.
The results of the HV values on LIR-CMOP1-14 achieved by five CMOEAs
in 30 independent runs are shown in Table 2. For LIR-CMOP2-14, MOEA/DACDP significantly outperforms the compared algorithms in terms of the HV
metric. For the LIR-CMOP1, MOEA/D-ACDP significantly outperforms CMOEA/D, MOEA/D-CDP and MOEA/D-Epsilon.
Fig. 7 (a) shows the final external archives achieved by MOEA/D-ACDP
and other four CMOEAs with the median IGD values on LIR-CMOP3 during
30 independent runs. It is obvious that MOEA/D-ACDP can almost converge
to the whole real PF and has the best diversity among the five CMOEAs.
In Fig. 7 (b), the results of each CMOEA with the median IGD values
on LIR-CMOP5 during 30 independent runs are shown. The external archive
achieved by MOEA/D-ACDP covers the real PF. However, the other four
CMOEAs are trapped into local optimum. As shown in Fig. 7 (c), for LIRCMOP10, MOEA/D-ACDP performs the best in terms of convergency. In Fig.
15
7 (d), for LIR-CMOP11, it shows that MOEA/D-ACDP can get the most of
the PF, but the other four algorithms can only achieve a few parts of the PF.
It is worthwhile to point out that for three-objective test instances (LIRCMOP13 and LIR-CMOP14), MOEA/D-ACDP also performs significantly better than the other four CMOEAs.
Based on the above performance comparison on the fourteen test instances
LIR-CMOP1-14, it is clear that MOEA/D-ACDP outperforms the other four
decomposition-based CMOEAs on most of cases.
A common feature of the above test instances LIR-CMOPs is that they all
have large infeasible regions in their objective space. The experimental results
demonstrate that the proposed ACDP method can deal with CMOPs well by
taking advantage of angle information of the working population.
Table 1: IGD results of MOEA/D-ACDP and the other four CMOEAs on LIR-CMOP1-14
test instances
Test Instances
mean
std
mean
LIR-CMOP2
std
mean
LIR-CMOP3
std
mean
LIR-CMOP4
std
mean
LIR-CMOP5
std
mean
LIR-CMOP6
std
mean
LIR-CMOP7
std
mean
LIR-CMOP8
std
mean
LIR-CMOP9
std
mean
LIR-CMOP10
std
mean
LIR-CMOP11
std
mean
LIR-CMOP12
std
mean
LIR-CMOP13
std
mean
LIR-CMOP14
std
LIR-CMOP1
MOEA/D-ACDP
5.159E-02
1.815E-02
2.269E-02
9.418E-03
4.659E-02
1.850E-02
2.784E-02
1.477E-02
1.771E-02
2.965E-02
1.757E-01
4.129E-02
1.408E-01
4.385E-02
1.812E-01
4.854E-02
3.595E-01
5.345E-02
1.388E-01
1.148E-01
1.318E-01
4.487E-02
1.497E-01
9.985E-03
7.414E-02
2.727E-03
6.732E-02
1.918E-03
C-MOEA/D
1.591E-01†
3.534E-02
1.462E-01†
4.141E-02
2.309E-01†
4.135E-02
2.080E-01†
4.197E-02
1.162E+00†
2.180E-01
1.265E+00†
3.067E-01
1.620E+00†
3.036E-01
1.607E+00†
2.680E-01
4.981E-01†
6.991E-02
3.775E-01†
7.446E-02
4.422E-01†
1.759E-01
3.597E-01†
1.074E-01
1.266E+00†
2.173E-01
1.235E+00†
1.209E-01
MOEA/D-CDP
1.348E-01†
5.996E-02
1.549E-01†
2.966E-02
2.268E-01†
4.403E-02
2.188E-01†
3.766E-02
1.207E+00†
1.660E-02
1.303E+00†
2.319E-01
1.623E+00†
2.905E-01
1.631E+00†
2.464E-01
4.868E-01†
5.372E-02
3.774E-01†
6.858E-02
4.662E-01†
1.439E-01
3.236E-01†
1.023E-01
1.289E+00†
6.321E-02
1.103E+00†
3.857E-01
MOEA/D-Epsilon
8.234E-02†
5.321E-02
4.708E-02†
1.339E-02
7.858E-02†
2.978E-02
5.662E-02†
3.366E-02
1.201E+00†
1.963E-02
1.231E+00†
3.602E-01
1.568E+00†
4.101E-01
1.577E+00†
3.767E-01
4.962E-01†
6.987E-02
3.257E-01†
9.833E-02
4.154E-01†
1.508E-01
3.680E-01†
8.664E-02
1.183E+00†
3.456E-01
1.127E+00†
3.329E-01
MOEA/D-SR
4.406E-02
3.360E-02
2.057E-02
1.072E-02
1.529E-01†
7.688E-02
2.038E-01†
7.907E-02
1.123E+00†
2.842E-01
1.175E+00†
3.967E-01
1.136E+00†
7.315E-01
1.369E+00†
5.735E-01
4.813E-01†
4.571E-02
2.821E-01†
1.135E-01
3.489E-01†
1.129E-01
3.012E-01†
8.989E-02
1.093E+00†
4.269E-01
1.143E+00†
3.002E-01
Wilcoxons rank sum test at a 0.05 significance level is performed between MOEA/D-ACDP
and each of the other four CMOEAs. † and ‡ denote that the performance of the
corresponding algorithm is significantly worse than or better than that of MOEA/D-ACDP,
respectively. The best mean is highlighted in boldface.
4.5.2. Performance Evaluation on I-beam Optimization Problem
The experimental results of HV values of MOEA/D-ACDP and the four
other CMOEAs on the I-beam optimization problem are shown in Table 3. It
can be observed that MOEA/D-ACDP significantly outperforms the compared
CMOEAs on this engineering problem.
16
Table 2: HV results of MOEA/D-ACDP and the other four CMOEAs on LIR-CMOP1-14
test instances
Test Instances
mean
std
mean
LIR-CMOP2
std
mean
LIR-CMOP3
std
mean
LIR-CMOP4
std
mean
LIR-CMOP5
std
mean
LIR-CMOP6
std
mean
LIR-CMOP7
std
mean
LIR-CMOP8
std
mean
LIR-CMOP9
std
mean
LIR-CMOP10
std
mean
LIR-CMOP11
std
mean
LIR-CMOP12
std
mean
LIR-CMOP13
std
mean
LIR-CMOP14
std
LIR-CMOP1
MOEA/D-ACDP
1.365E+00
2.493E-02
1.737E+01
1.306E-02
1.188E+00
4.929E-02
1.421E+00
1.946E-02
1.903E+00
5.658E-02
1.280E+00
4.613E-02
3.408E+00
1.409E-01
3.330E+00
1.461E-01
4.080E+00
9.501E-02
3.755E+00
2.208E-01
5.004E+00
1.564E-01
6.713E+00
05.874E-02
7.897E+00
2.943E-02
8.641E+00
1.546E-02
C-MOEA/D
9.499E-01†
7.038E-02
1.395E+01†
8.154E-02
7.558E-01†
5.730E-02
1.069E+00†
6.952E-02
1.192E-01†
3.352E-01
7.863E-02†
3.011E-01
2.990E-01†
6.927E-01
3.246E-01†
5.878E-01
3.715E+00†
2.079E-01
3.274E+00†
1.623E-01
3.937E+00†
6.479E-01
5.977E+00†
3.855E-01
6.444E-01†
1.317E+00
7.766E-01†
6.140E-01
MOEA/D-CDP
1.009E+00†
1.298E-01
1.374E+01†
6.160E-02
7.600E-01†
5.809E-02
1.051E+00†
5.462E-02
5.805E-02†
4.042E-04
4.312E-02†
2.362E-01
2.886E-01†
6.348E-01
2.695E-01†
5.297E-01
3.755E+00†
1.600E-01
3.268E+00†
1.416E-01
3.842E+00†
5.507E-01
6.134E+00†
3.617E-01
4.728E-01†
2.689E-01
1.627E+00†
2.473E+00
MOEA/D-Epsilon
1.353E+00†
4.417E-02
1.705E+01†
1.693E-02
1.184E+00†
2.898E-02
1.390E+00†
4.405E-02
5.829E-02†
2.022E-04
1.325E-01†
4.251E-01
4.055E-01†
8.879E-01
3.859E-01†
8.166E-01
3.724E+00†
2.033E-01
3.385E+00†
2.122E-01
4.038E+00†
5.727E-01
6.010E+00†
3.074E-01
1.092E+00†
2.0522E+00
1.430E+00†
2.095E+00
MOEA/D-SR
1.376E+00
3.974E-02
1.736E+01†
1.890E-02
9.313E-01†
1.620E-01
1.089E+00†
1.360E-01
1.707E-01†
4.442E-01
1.682E-01†
4.061E-01
1.313E+00†
1.567E+00
8.287E-01†
1.244E+00
3.752E+00†
1.142E-01
3.477E+00†
2.383E-01
4.274E+00†
4.463E-01
6.240E+00†
2.950E-01
1.513E+00†
2.422E+00
1.269E+00†
1.919E+00
Wilcoxons rank sum test at a 0.05 significance level is performed between MOEA/D-ACDP
and each of the other four CMOEAs. † and ‡ denotes that the performance of the
corresponding algorithm is significantly worse than or better than that of MOEA/D-ACDP,
respectively. The best mean is highlighted in boldface.
17
(a) LIR-CMOP3
(b) LIR-CMOP5
(c) LIR-CMOP10
(d) LIR-CMOP11
Figure 7: The non-dominated solutions achieved by each algorithm with the median IGD in
the 30 independent runs for LIR-CMOP3, LIR-CMOP5, LIR-CMOP10 and LIR-CMOP11.
18
To further study the superiority of the proposed method MOEA/D-ACDP,
the non-dominated solutions achieved by each CMOEA during the 30 independent runs are plotted in Fig. 8 (a)-(e).The non-dominated set of all the above
solutions generates a set of ideal reference points. It is clear that the external
archive obtained by MOEA/D-ACDP has a better performance of convergence.
The box plot of HV values of the five CMOEAs is shown in Fig. 8 (f), which
further verifies that MOEA/D-ACDP outperforms the other four CMOEAs on
the I-beam optimization problem.
(a) MOEA/D-ACDP
(b) C-MOEA/D
(c) MOEA/D-CDP
(d) MOEA/D-Epsilon
(e) MOEA/D-SR
(f) The box plots of each
CMOEA
Figure 8: The non-dominated solutions achieved by each algorithm during the 30 independent
runs are plotted in (a)-(e). In (f), the box plots of each CMOEA are plotted.
Table 3: HV results of MOEA/D-ACDP and the other four CMOEAs on the I-Beam optimization problem
Test Instances
mean
std
MOEA/D-ACDP
3.583E+01
1.950E-01
C-MOEA/D
3.481E+01†
2.968E-01
MOEA/D-CDP
3.518E+01†
2.078E-01
MOEA/D-Epsilon
3.514E+03†
2.034E-01
MOEA/D-SR
3.477E+03†
1.248E+00
Wilcoxons rank sum test at a 0.05 significance level is performed between MOEA/D-ACDP
and each of the other four CMOEAs. † and ‡ denote that the performance of the
corresponding algorithm is significantly worse than or better than that of MOEA/D-ACDP,
respectively. The best mean is highlighted in boldface.
5. Conclusions
This paper proposes a new constraint-handling mechanism named ACDP.
It utilizes the angle information of any two solutions to dynamically maintain
the diversity of the population during the evolutionary process. A set of CMOP
19
instances named LIR-CMOP1-14 are tested. All the test instances have large
infeasible regions in their objective space, which make general CMOEAs difficult
to achieve the real PFs. Compared with the other four popular CMOEAs, the
proposed algorithm can help the population to go across large infeasible regions
more effectively. Additionally, the experimental results demonstrate that the
proposed algorithm can work well in the real-world engineering problem. Thus,
we can conclude that MOEA/D-ACDP outperforms the other four CMOEAs
when CMOPs. In summary, MOEA/D-ACDP has following advantages:
• The proposed MOEA/D-ACDP utilizes the angle information of solutions
to maintain the diversity of the population for CMOPs.
• MOEA/D-ACDP enhances the convergence to PF by exploring feasible
and infeasible regions simultaneously during the evolutionary process, instead of wasting the useful information of the infeasible solutions.
Future work will focus on novel constraint-handling mechanisms to solve
CMOPs. A study on developing new mechanisms of mining more useful information during the evolutionary process to further improve the performance of
the proposed algorithm will be conducted.
Acknowledgment
This work was supported in part by the National Natural Science Foundation of China under Grant (61175073, 61300159, 61332002, 51375287) , the
Guangdong Key Laboratory of Digital signal and Image Processing, the Science
and Technology Planning Project of Guangdong Province (2013B011304002)
and the Project of Educational Commission of Guangdong Province, China
2015KGJHZ014).
References
References
[1] K. Deb, A. Pratap, S. Agarwal, T. Meyarivan, A fast and elitist multiobjective genetic algorithm: Nsga-ii, IEEE Transactions on Evolutionary
Computation 6 (2) (2002) 182–197.
[2] T. Murata, H. Ishibuchi, Moga: Multi-objective genetic algorithms, in:
Evolutionary Computation, 1995., IEEE International Conference on,
Vol. 1, IEEE, 1995, p. 289.
[3] D. W. Corne, N. R. Jerram, J. D. Knowles, M. J. Oates, Pesa-ii: regionbased selection in evolutionary multiobjective optimization, in: Conference
on Genetic and Evolutionary Computation, 2001, pp. 283–290.
[4] E. Zitzler, M. Laumanns, L. Thiele, et al., Spea2: Improving the strength
pareto evolutionary algorithm (2001).
20
[5] J. Horn, N. Nafpliotis, D. E. Goldberg, A niched pareto genetic algorithm for multiobjective optimization, in: Evolutionary Computation,
1994. IEEE World Congress on Computational Intelligence., Proceedings
of the First IEEE Conference on, 2002, pp. 82–87 vol.1.
[6] Q. Zhang, H. Li, Moea/d: A multiobjective evolutionary algorithm based
on decomposition, IEEE Transactions on Evolutionary Computation 11 (6)
(2007) 712–731.
[7] H. Li, Q. Zhang, Multiobjective optimization problems with complicated
pareto sets, moea/d and nsga-ii, IEEE Transactions on Evolutionary Computation 13 (2) (2009) 284–302.
[8] H.-L. Liu, F. Gu, Q. Zhang, Decomposition of a Multiobjective Optimization Problem Into a Number of Simple Multiobjective Subproblems, IEEE
Transactions on Evolutionary Computation 18 (3) (2014) 450–455.
[9] X. Cai, Y. Li, Z. Fan, Q. Zhang, An External Archive Guided Multiobjective Evolutionary Algorithm Based on Decomposition for Combinatorial Optimization, IEEE Transactions on Evolutionary Computation 19 (4)
(2015) 508–523.
[10] X. Cai, Z. Yang, Z. Fan, Q. Zhang, Decomposition-Based-Sorting
and Angle-Based-Selection for Evolutionary Multiobjective and ManyObjective Optimization, IEEE Transactions on Cybernetics PP (99) (2016)
1–14.
[11] E. Zitzler, S. Künzli, Indicator-based selection in multiobjective search,
Lecture Notes in Computer Science 3242 (2004) 832–842.
[12] N. Beume, B. Naujoks, M. Emmerich, Sms-emoa: Multiobjective selection based on dominated hypervolume, European Journal of Operational
Research 181 (3) (2007) 1653–1669.
[13] J. Bader, E. Zitzler, Hype: an algorithm for fast hypervolume-based manyobjective optimization., Evolutionary Computation 19 (1) (2011) 45.
[14] S. Jiang, J. Zhang, Y.-S. Ong, A. N. Zhang, P. S. Tan, A Simple and
Fast Hypervolume Indicator-Based Multiobjective Evolutionary Algorithm,
IEEE Transactions on Cybernetics 45 (10) (2015) 2202–2213.
[15] X. Cai, Z. Hu, Z. Fan, A novel memetic algorithm based on invasive weed
optimization and differential evolution for constrained optimization, Soft
Computing 17 (10) (2013) 1893–1910.
[16] Z. Hu, X. Cai, Z. Fan, An improved memetic algorithm using ring neighborhood topology for constrained optimization, Soft Computing 18 (10)
(2013) 2023–2041.
21
[17] C. A. C. Coello, Theoretical and numerical constraint-handling techniques
used with evolutionary algorithms: a survey of the state of the art, Computer Methods in Applied Mechanics and Engineering 191 (11–12) (2002)
1245–1287.
[18] T. P. Runarsson, X. Yao, Stochastic ranking for constrained evolutionary
optimization, IEEE Transactions on evolutionary computation 4 (3) (2000)
284–294.
[19] T. Takahama, S. Sakai, Constrained optimization by the ε constrained
differential evolution with gradient-based mutation and feasible elites, in:
Evolutionary Computation, 2006. CEC 2006. IEEE Congress on, 2006, pp.
1–8.
[20] H. K. Singh, T. Ray, W. Smith, C-psa: Constrained pareto simulated annealing for constrained multi-objective optimization, Information Sciences
180 (13) (2010) 2499–2513.
[21] K. Deb, D. Kalyanmoy, Multi-Objective Optimization Using Evolutionary
Algorithms, John Wiley & Sons, Inc, 2001.
[22] Q. Zhang, A. Zhou, S. Zhao, P. N. Suganthan, W. Liu, S. Tiwari, Multiobjective optimization test instances for the cec 2009 special session and
competition, University of Essex, Colchester, UK and Nanyang technological University, Singapore, special session on performance assessment of
multi-objective optimization algorithms, technical report 264.
[23] K. Miettinen, Nonlinear multiobjective optimization, volume 12 of international series in operations research and management science (1999).
[24] M. Asafuddoula, T. Ray, R. Sarker, K. Alam, An adaptive constraint handling approach embedded moea/d, in: Evolutionary Computation, 2012,
pp. 1–8.
[25] M. A. Jan, R. A. Khanum, A study of two penalty-parameterless constraint
handling techniques in the framework of MOEA/D, Applied Soft Computing 13 (1) (2013) 128–148.
[26] Z. Yang, X. Cai, Z. Fan, Epsilon constrained method for constrained multiobjective optimization problems: some preliminary results, in: Companion
Publication of the 2014 Conference on Genetic and Evolutionary Computation, 2014, pp. 1181–1186.
[27] Z. Fan, W. Li, X. Cai, H. Li, K. Hu, Q. Zhang, K. Deb, E. D. Goodman,
Difficulty adjustable and scalable constrained multi-objective test problem
toolkit, arXiv preprint arXiv:1612.07603.
[28] Z. Fan, W. Li, X. Cai, H. Huang, Y. Fang, Y. You, J. Mo, C. Wei, E. Goodman, An improved epsilon constraint-handling method in moea/d for cmops
with large infeasible regions, arXiv preprint arXiv:1707.08767.
22
[29] S. Huband, P. Hingston, L. Barone, L. While, A review of multiobjective
test problems and a scalable test problem toolkit, IEEE Transactions on
Evolutionary Computation 10 (5) (2006) 477–506.
[30] A. Osyczka, Multicriteria optimization for engineering design, in: Design
Optimization, 1985, pp. 193–227.
[31] P. A. N. Bosman, D. Thierens, The balance between proximity and diversity in multiobjective evolutionary algorithms, IEEE Transactions on
Evolutionary Computation 7 (2) (2003) 174–188.
[32] E. Zitzler, L. Thiele, Multiobjective evolutionary algorithms: a comparative case study and the strength pareto approach, IEEE Transactions on
Evolutionary Computation 3 (4) (1999) 257–271.
23
| 9cs.NE
|
Working Draft: This is work in progress!
Datasheets for Datasets∗
Timnit Gebru1 , Jamie Morgenstern2 , Briana Vecchione3 ,
Jennifer Wortman Vaughan1 , Hanna Wallach1 ,
Hal Daumé III1,4 , and Kate Crawford1,5
arXiv:1803.09010v1 [cs.DB] 23 Mar 2018
1
Microsoft Research: {timnit.gebru, hal3, jenn, wallach, kate}@microsoft.com
2
Georgia Tech: [email protected]
3
[email protected]
4
University of Maryland
5
AI Now Institute
March 28, 2018
Abstract
Currently there is no standard way to identify how a dataset was created, and what
characteristics, motivations, and potential skews it represents. To begin to address
this issue, we propose the concept of a datasheet for datasets, a short document to
accompany public datasets, commercial APIs, and pretrained models. The goal of
this proposal is to enable better communication between dataset creators and users,
and help the AI community move toward greater transparency and accountability.
By analogy, in computer hardware, it has become industry standard to accompany
everything from the simplest components (e.g., resistors), to the most complex microprocessor chips, with datasheets detailing standard operating characteristics, test
results, recommended usage, and other information. We outline some of the questions
a datasheet for datasets should answer. These questions focus on when, where, and
how the training data was gathered, its recommended use cases, and, in the case of
human-centric datasets, information regarding the subjects’ demographics and consent as applicable. We develop prototypes of datasheets for two well-known datasets:
Labeled Faces in The Wild [33] and the Pang & Lee Polarity Dataset [45].
1
Introduction
Artificial Intelligence is rapidly moving from a purely academic discipline to a technology
that is embedded in everyday products. Our cars, homes, and computers are regularly
controlled by machine learning algorithms. These algorithms are also used by state and
federal agencies and corporations to predict our behavior: law enforcement uses facial
recognition software to catch suspects [30, 52], the US criminal justice system uses risk
assessment scores to estimate a person’s likelihood of committing a crime [5], and companies use models to filter job applications before requesting interviews [37, 32]. Critical
components of our world’s infrastructure rely on machine learning models, for example to
∗
Working Draft: This is work in progress, so writing may be less polished than usual and
is subject to revision. New versions forthcoming. We’d love to incorporate your feedback,
so if you have comments for us, please let us know!
1
Working Draft: This is work in progress!
monitor and manage our water systems [41] and power grids [11]. Since 2011, a majority
of financial trades made in US on our stock exchanges are made automatically [35].
By definition, all such machine learning models are trained from some data: indeed,
the datasets on which they are trained are an integral in determining their functionality.
The ubiquity with which data is gathered and models are trained and tested on that data
allows for incredible innovation, but also poses a number of risks and questions: Under
what circumstances do we expect such models to perform well? In different circumstances,
how will the model’s performance degrade? Is this dataset fixed, or is more data gathered
over time? Is it possible to observe and ameliorate any bias perpetuated and exacerbated
by these models when making choices affecting people? All of these questions depend
upon how the data was gathered, cleaned and processed, and how a model incorporates
that data. Without this information, even experts trained in machine learning cannot hope
to say with any certainty when a model might fail badly. Moreover, there is currently no
standard practice for carefully testing or describing these datasets, APIs, or freely available
models. This is of particular concern when we consider high-stakes uses of these models
or datasets.
In this paper, we argue that the first step towards transparency must involve attaching
significant, standardized information about any dataset, API, or pretrained model. We
concentrate specifically on datasets, and recommend a standardized description format
with standard questions. Even if the eventual goal is to understand pretrained models or
APIs, understanding datasets is an important first step: regardless of how they are trained,
models and APIs are typically evaluated against fixed datasets, and understanding the
characteristics of that evaluation is of paramount importance. We draw inspiration from
standardized forms of sharing information and rigorous testing conducted in the much
more mature field of hardware. This document, called henceforth a datasheet, would be
a short (typically 3-5 page) document detailing any tests that have been conducted on a
dataset, its recommended usage, its collection procedure, any regulations governing its use,
and so on. A datasheet for a pretrained model would contain information pertaining to
the model’s training data and tested behavior.
We structure this paper as follows. Section 2 discusses the motivation and context for
our work, Section 3 briefly discusses the evolution of safety standards in other industries
to draw a comparison with AI. Section 4 discusses the concept of datasheets in hardware, and Section 5 outlines the most important questions that should be answered by a
datasheet. Two prototypes of datasheets for datasets can be found in Appendix B. The
paper ends with a discussion of challenges and future work in Section 6.
2
Context
Many datasets have little or no documentation describing the settings under which they
were gathered, the characteristics of the training sets, how representative the dataset is of
a particular population, or recommended usage. This lack of information makes it difficult
to assess what contexts models and APIs trained on these datasets can be used for and
what scenarios should be avoided. Most of these APIs are not accompanied by detailed
information describing recommended usage, standard operating characteristics, and tests
performed to verify these conditions.
Of particular concern is the recently discovered extent to which AI systems exhibit and
amplify biases. Buolamwini and Gebru [8] showed that commercial gender classification
APIs have near perfect performance for light skinned males while error rates for darker
2
Working Draft: This is work in progress!
skinned females can be as high as 33%.1 In a different setting, Bolukbasi et al. [6] showed
that word embeddings trained on news articles exhibit gender bias, finishing the analogy
“Man is to computer programmer as woman is to X” with “home maker,” a stereotypical
role for women. Caliskan et al. [9] showed that racial biases also exist in word embeddings:
traditional European-American names, for example, are more closely related to words that
are considered pleasant (e.g., joy); those associated with African-American names however,
are closer to words such as agony. These biases can have dire consequences that might not
be easily discovered. For example, Bolukbasi et al. [6] argue that bias in word embeddings
can result in hiring discrimination. Much like a faulty resistor or a capacitor in a circuit,
the effects of a biased AI-based component can propagate throughout a system making
them difficult to track down.
One of the biggest challenges in the deployment of AI technology is deploying systems,
built using datasets or pretrained models, in unsuitable environments. Such systems can
exhibit poor or unpredictable performance when deployed: the models’ behavior on some
benchmark may say very little about their behavior in a different setting. Such unpredictability is of concern when these systems make high-stake real-time decisions, such as
controlling a large amount of trading volume on the stock exchanges or allocating valuable
resources to different markets. Unpredictability is of even greater concern when the system
is used to interact with or make decisions directly influencing humans.
This problem of unintentional misuse of datasets is often exacerbated when the users
are not domain experts. We believe that this problem can be mitigated, at least partially,
by accompanying datasets with datasheets that describe their creation, strengths and limitations. While this is not the same as making everyone a domain expert, it gives an
opportunity for domain experts to easily communicate what they know about the dataset
and its limitations to whomever may be using it. This is particularly important today,
when companies such as Google, Amazon, Microsoft, and Facebook are moving toward
“democratizing AI” by creating toolboxes such as Cloud AutoML that can be trained by
those with little-to-no machine learning expertise and domain knowledge [12]. Pre-trained
models and standard datasets are freely available for use with open source tools such as
Caffe [22], Tensorflow [2], and PyTorch [48]. As powerful machine learning tools become
available to a much broader set of users, it becomes even more important to enable those
users to understand all the implications of their work.
Part of the educational gap, outside traditional “ivory tower” education, is being covered
by organizations like Coursera [20], Udacity [53], Fast.ai [26], and others, which offer online
AI courses to those with no prior experience. A goal of these educational platforms is to
enable people around the world to use AI to solve problems in their communities. For
instance, one of Fast.ai’s missions is “to get deep learning into the hands of as many people
as possible, from as many diverse backgrounds as possible” [26]. These readily available
AI courses and toolkits belong to a movement whose laudable goal is to enable many
people to integrate AI into their systems. Coupling this educational strategy, which often
(in particular in the case of Fast.ai) includes explicit training in dataset bias and ethics
(topics sometimes lacking even in the “ivory tower”), with datasheets that can explain the
context and biases in existing datasets, can much more quickly enable progress by both
domain experts and AI experts.
1
The evaluated APIs provided the labels of female and male, failing to address the complexities of
gender beyond binary.
3
Working Draft: This is work in progress!
3
The Evolution of Safety Standards in Other Industries
We briefly discuss the evolution of safety standards in 3 different industries: automobiles,
health care and electronics. Understanding the dangers that were posed by the proliferation
of new technology in these industries, and the safety measures that were put in place to
combat them, can help us carve out a path forward for AI.
3.1
The Automobile Industry
Similar to our current hopes for AI to positively transform society, the introduction of
automobiles promised to expand mobility and provide additional recreational, social, and
economic opportunities. However, much like current AI technology, the automobile was
introduced with few safety checks or regulations in place. When cars first became available
in the United States, there were no speed limits, stop signs, traffic lights, driver education,
or regulations pertaining to seat belts or drunk driving [10]. Thus, the early 1900s saw
many deaths and injuries due to collisions, speeding, and reckless driving [31]. Much like
current debates regarding the future of AI, there were courtroom discussions and news
paper editorials outlining the possibility that the automobile was inherently evil [1].
It took many years in different parts of the world for laws, traffic signals, driver education and fines to be enacted. In the United States, for instance, driver’s licenses were
not fully implemented across all states until 1954 [43]. By the 1930s, a variety of technical safety responses were introduced such as four-wheel hydraulic brakes, shatter-resistant
windshields, and all-steel bodies [38]. Despite these safety standards, the automobile industry fell victim to similar “bad dataset” problems faced by AI technology, in particular
in the construction of the crash-test dummies used to evaluate vehicle safety. Although
crash-test dummies became a mandated part of U.S. safety standards in 1973, almost all the
crash-test dummies in use were modeled after prototypical male physiology [4]. It wasn’t
until almost four decades later that, in 2011, using “female” crash-test dummies became
mandatory for frontal crash tests [3]. Subsequent studies suggest that male-centric engineering design is responsible for disparate rates of vehicle injuries by sex: A safety study
of automobiles manufactured between 1998 and 2008 concluded that women wearing seat
belts were 47% more likely to be seriously injured than males in similar accidents [7].
Automobile safety standards in the US have continued to evolve since their introduction
in the early 1920s, and there are many countries without adequate road safety measures.
Road accidents are still the biggest global killer of teenagers [44]. In the case of seat belts
in particular, it was only in 1968 that features like padded dashboards and seat belts were
made mandatory in the United States [49]. Still, most motorists were reluctant to use
seat belts, and safety campaigns had to be sponsored to promote adoption. By analogy,
an “AI solution” is likely to require both laws and regulations (in particular in high-stakes
environments) and also social campaigns to promote best practices. This underscores the
need to aggressively work towards standardization of best practices for the creation and
proliferation of datasets and APIs in AI, and have a mechanism by which these practices
can continue to evolve.
3.2
Clinical Trials in Medicine
We can draw lessons from studying the evolution of safety measures for clinical trials, and
some of the harms that were caused by inadequate standards and unethical procedures.
Like the need for large scale data collection and experimentation before the deployment
of an AI system, clinical trials are an important step in any drug development. However,
4
Working Draft: This is work in progress!
the US legal system viewed clinical trials as a form of medical malpractice until well
into the 20th century, making standardized large-scale evaluations difficult [23]. After the
acceptance of certain clinical trials came various standards which were to be followed, most
of which were spurred by some atrocity or another committed in the name of science. For
example, the US government ran a number of experiments on its citizens without their
consent, from a public health study on syphilis where participants were not informed of
their disease [21], to radiation experiments [25, 39]. The poor, the imprisoned, minority
groups, pregnant women, and children comprised a majority of these study groups.
Currently, in the US, participants in a drug trial must be informed that the drug is
experimental and not proven to be effective, and subjects must be willing participants.
Prior to a drug being tested in a clinical trial, an Institutional Review Board and the Food
and Drug Administration must approve an application which shows evidence of the drug’s
relative safety (in terms of basic chemistry and animal testing results) and lays out the
design of the trial (including who will participate in the trial) [29].
The closest legal analog in AI are laws like the European Union’s General Data Protection Regulation (GDPR), which are starting to be deployed to ensure that people consent
to having their data used in the training of AI based models [47]. Data collection standards
are now a central topic of concern for scientific research broadly, and clinical trials are no
exception. The US National Institute of Health has a body of guidelines for how their
funded projects are to gather, store, and share human subject data [42].
Finally, the lack of diversity in clinical trial participants has led to the development
of drugs that do not work well for many groups of people. For example, eight out of ten
drugs pulled from circulation between 1997 and 2001 had more adverse effects for women,
suggesting clinical trials without representative samples did not accurately display risks
for those drugs for women [36]. As late as 2013, a majority of federally-funded clinical
trials still did not break down their results by sex [40]. In 2014, the FDA promoted an
action plan to make results of clinical trials broken down by subpopulation more easily
available [27]. In the late 1980s, the FDA moved to require different age groups participate
in clinical trials [28]. Not until 1998 was a regulation stating that safety and efficacy
data be provided broken down by sex, race, and age. These progressions parallel some
recent results showing disparities in accuracy of various AI based models by subpopulation
(e.g., [8]), and calls for more diverse datasets, inclusive testing, and standards in place to
reduce these disparities.
3.3
Electrical and Electronic Technologies
Similar to the current proliferation of AI within everyday products, electrical and electronic components are used in devices that are incredibly widespread. They are designed
into devices ranging from those used in communication (TV, radio, phones), transportation (automobiles, trains, planes), healthcare, military equipment, energy production, and
transmission. With the move towards smart homes and the internet of things [54], soon
one may be hard-pressed to find a synthetic object without electronic components.
Like datasets and the models trained on them, electronic components, such as resistors
or capacitors, are designed into a system whose larger goal may be far removed from the
task of that component. Thus, small deviations that may seem insignificant while studying
a component in isolation can result in dire consequences due to its interactions with the
rest of the system.
For example, while all types of resistors can be abstracted into an idealized mathematical model, different non-idealities are important depending on the context. The operating
temperature range of a power resistor meant for operation under high voltage conditions
5
Working Draft: This is work in progress!
is much more crucial than that for low power thin film resistors in a motherboard [55].
Even still, within the power resistor family, the safety considerations for those used in
power plants for instance are different from those in consumer electronics [55]. Thus,
the electronic component community has developed standards that specify ideal operation
characteristics, tests and manufacturing conditions for components manufactured with different tasks in mind.
Many of these standards are specified by the International Electrotechnical Comission
(IEC). According to the IEC, “Close to 20,000 experts from industry, commerce, government, test and research labs, academia and consumer groups participate in IEC Standardization work” [13]. After the International System of Electrical and Magnetic Units was
agreed to at the first International Electrical Congress in 1881, it became clear that many
other questions of standardization would arise [34]. The IEC was founded in 1906 and in
1938, it published an international vocabulary to unify terminology relating to electrical,
electronic and related technologies [13, 17]. There are currently 9, 000 IEC standards in
use today, with over 10 standards pertaining to different types of resistors alone [18]. For
example IEC 60195:2016 describes the recommended procedures to assess the magnitude
of current noise in fixed resistors of any type, IEC 60115-2:2014 provides standards for
leaded fixed low-power film resistors for use in electronic equipment, and IEC 60322 states
operating conditions and testing methodology for power resistors used in railway applications [14, 15, 16]. We argue that standards with similar detail and scope can be set in
place for datasets and pre-trained AI models used in different scenarios.
4
Datasheets for Electronic Components
We take our inspiration from the standardization of datasheets for electronic components.
All electronic components, ranging from the cheapest and most ubiquitous resistors, to
highly complex integrated circuits (like CPUs), are accompanied by datasheets characterizing their recommended operating conditions and other detailed technical characteristics.
While the information contained in any given datasheet depends on the specific product,
there are several aspects that are common to all datasheets (such as the manufacturer’s
name, and the product name and number).
Most datasheets start with a description of the component’s function and features, and
contain other specifications like the absolute maximum and minimum operating voltages.
In addition to the technical characteristics, datasheets contain physical details of the component (such as size and pin connections), and list of available packages. Datasheets can
also contain liability disclaimers to protect the manufacturer (e.g., in case the component
is used in high stakes environments like nuclear power plants or life support systems). If
the component design, manufacturing and testing adheres to some standard (e.g., an IEC
standard), this is typically also stated in the datasheet.
When one navigates to a product webpage, there is a datasheet associated with each
product. Figure 4 shows a screenshot of the the product page for a KEMET Corporation
tantalum capacitor [24]. The datasheet for this product (indicated by the red arrow), is
prominently featured along with other documentation. An example of a datasheet for a
miniature aluminum electrolytic capacitor is shown in Appendix A. Like many datasheets
for similar components, this one contains:
• A short description of the component’s function and notable features (including the
component’s compliance with the RoHS directive adopted by the European Union
restricting the use of certain hazardous materials [46])
6
Working Draft: This is work in progress!
Figure 1: A screenshot of the product webpage for a KEMET Corporation tantalum capacitor with the datasheet for the component highlighted in red.
• Various standard operating characteristics, such as its operating temperature range
and capacitance tolerance
• A diagram of the component showing its dimensions and pin connections
• Plots showing the change in various characteristics vs. time, temperature and frequency; for example, it is well known that capacitance decreases over time, and the
first graph measures this change across 1000 hours
Some examples of other datasheets are those for semiconductors [51] (56 pages), resistors [50] (2 pages), and other components [19] (18 pages).
4.1
What has driven the use of datasheets in hardware?
To better understand how we might hope for proliferation of datasheets for datasets, it is
useful to note some of the potential reasons for their standardization in hardware.
De facto industry standard. The “highest order bits” (one to two phrase summary describing a component, such as conductance or resistance) are nowhere near enough to
understand in what settings a component should/could be used, how it will behave
in a variety of settings, how robust it is, what size it is, and so forth. In order to
make informed purchasing decisions, one needs to know additional information as
provided in a datasheet. In the AI setting, many dataset characteristics need to be
outlined to understand their use cases, potential biases, and limitations.
Product Liability. The seller of a hardware component wants to clearly outline the appropriate settings for using their component. If the component fails during some use
and causes damage or injury, they could be liable if they have not clearly specified
that type of use as outside the component’s operating characteristics. In the AI
setting, many failure modes are not as clearly visible to all, and the liability may not
be easily traced back to datasets. This could make the adoption of semi-standardized
datasheets more difficult.
7
Working Draft: This is work in progress!
Market forces. A hardware builder would never buy a component that does not have a
datasheet since they would have no way of knowing how it would operate. In the
AI setting, practitioners are training custom models with specific datasets without
understanding the limitations of these datasets. The introduction of datasheets can
encourage the AI community to perform a thorough analysis of dataset characteristics
before applying them to specific settings.
Understanding out-of-spec behavior. Any of the testing done on components can be
described in the datasheet, and different tests are performed on different types of
components. However, there are a set of minimal tests that are usually included
in all datasheets. In the AI setting, datasets containing the same types of instances
(examples) meant for use in different settings will need different specifications. For
example, a dataset of faces used to train a model recognizing people from around the
world should contain a representative sample of people around the world.
5
Datasheets for Datasets
In the context of artificial intelligence and data science, datasets play a central role in both
training and evaluation. This is the case regardless of whether the dataset is used to build
a predictor that will be deployed as part of a system, or used to ask scientific questions
and reach scientific conclusions. In both cases, the specific properties of a dataset can
have profound impact on the quality of a learned predictor, or the quality of scientific
conclusions. Akin to how it is important to understand the operating characteristics of a
resistor when “debugging” a microcontroller, it is also important to understand the specific
properties of a dataset to understand how it fits into the larger data ecosystem.
Below we have proposed sample questions that a datasheet should arguably contain.
The prototypes in the appendix of this paper are provided as examples of how these might
be answered in practice. Several fundamental objectives drove our formation of these
questions. First, a practitioner should be able to decide, from reading this datasheet, how
appropriate this dataset is for their task, what its strengths and limitations are, and how
it fits into the broader dataset ecosystem. Second, the creators of a dataset should be able
to use the questions on a datasheet to help them think about aspects of data creation that
may not have otherwise occurred to them. Third, users should be able to understand—
based on the performance of a model or API on a dataset—what that performance measure
actually means, and when to be comfortable using such models.
The set of questions we provide here is not intended to be definitive. Instead, we
hope it will initiate a larger conversation about how data provenance, ethics, privacy,
and documentation might be handled by the community of data curators. Below are
our proposed questions, which include details about the gathering, cleaning, testing, and
releasing of a dataset. Not all questions will be applicable to all datasets, in which case
they can simply be left out.
Appendix B includes prototypes of datasheets for two datasets: Labeled Faces in The
Wild [33] and the Pang & Lee Polarity Dataset [45]. (In the creation of these datasheets,
sometimes information was unknown; this is marked in red text.)
8
Working Draft: This is work in progress!
Motivation for Dataset Creation
Who was involved in the data collection process?
(e.g., students, crowdworkers) and how were they comWhy was the dataset created? (e.g., was there a spe- pensated (e.g., how much were crowdworkers paid)?
cific task in mind? was there a specific gap that needed
to be filled?)
Over what time-frame was the data collected? Does
the collection time-frame match the creation timeframe of the instances?
What (other) tasks could the dataset be used for?
Has the dataset been used for any tasks already? If How was the data associated with each instance acso, where are the results so others can compare (e.g., quired? Was the data directly observable (e.g., raw
text, movie ratings), reported by subjects (e.g., survey
links to published papers)?
responses), or indirectly inferred/derived from other
data (e.g., part of speech tags; model-based guesses
Who funded the creation of the dataset?
for age or language)? If the latter two, were they validated/verified and if so how?
Any other comments?
Does the dataset contain all possible instances? Or is
it a sample (not necessarily random) of instances from
a larger set?
Dataset Composition
What are the instances? (that is, examples; e.g., documents, images, people, countries) Are there multiple If the dataset is a sample, then what is the populatypes of instances? (e.g., movies, users, ratings; peo- tion? What was the sampling strategy (e.g., deterministic, probabilistic with specific sampling probabilities)?
ple, interactions between them; nodes, edges)
Is the sample representative of the larger set (e.g., geAre relationships between instances made explicit in ographic coverage)? If not, why not (e.g., to cover a
the data (e.g., social network links, user/movie ratings, more diverse range of instances)? How does this affect
possible uses?
etc.)?
Is there information missing from the dataset and
How many instances are there? (of each type, if apwhy? (this does not include intentionally dropped inpropriate)?
stances; it might include, e.g., redacted text, withheld
documents) Is this data missing because it was unavailWhat data does each instance consist of? “Raw” able?
data (e.g., unprocessed text or images)?
Features/attributes? Is there a label/target associated Any other comments?
with instances? If the instances related to people, are
subpopulations identified (e.g., by age, gender, etc.)
and what is their distribution?
Data Preprocessing
What preprocessing/cleaning was done? (e.g., discretization or bucketing, tokenization, part-of-speech
tagging, SIFT feature extraction, removal of instances)
Is everything included or does the data rely on external resources? (e.g., websites, tweets, datasets) If
external resources, a) are there guarantees that they
will exist, and remain constant, over time; b) is there
an official archival version; c) are there access restrictions or fees?
Was the “raw” data saved in addition to the preprocessed/cleaned data? (e.g., to support unanticipated
future uses)
Are there recommended data splits and evaluation
Is the preprocessing software available?
measures? (e.g., training, development, testing; accuracy or AUC)
Does this dataset collection/processing procedure
achieve the motivation for creating the dataset stated
What experiments were initially run on this dataset? in the first section of this datasheet? If not, what are
Have a summary of those results.
the limitations?
Any other comments?
Any other comments?
Data Collection Process
Dataset Distribution
How was the data collected? (e.g., hardware appara- How will the dataset be distributed? (e.g., tarball on
tus/sensor, manual human curation, software program, website, API, GitHub; does the data have a DOI and
software interface/API)
is it archived redundantly?)
9
Working Draft: This is work in progress!
Legal & Ethical Considerations
When will the dataset be released/first distributed?
What license (if any) is it distributed under? Are there If the dataset relates to people (e.g., their attributes)
or was generated by people, were they informed about
any copyrights on the data?
the data collection? (e.g., datasets that collect writing, photos, interactions, transactions, etc.)
Are there any fees or access/export restrictions?
If it relates to people, were they told what the dataset
would be used for and did they consent? If so, how?
Were they provided with any mechanism to revoke their
consent in the future or for certain uses?
Any other comments?
Dataset Maintenance
Who is supporting/hosting/maintaining the dataset?
If it relates to people, could this dataset expose people to harm or legal action? (e.g., financial social or
otherwise) What was done to mitigate or reduce the
potential for harm?
Will the dataset be updated? If so, how often and by
whom?
If it relates to people, does it unfairly advantage or
disadvantage a particular social group? In what ways?
How will updates be communicated? (e.g., mailing How was this mitigated?
list, GitHub)
If it relates to people, were they provided with privacy
guarantees? If so, what guarantees and how are these
Is there an erratum?
ensured?
If the dataset becomes obsolete how will this be comDoes the dataset comply with the EU General Data
municated?
Protection Regulation (GDPR)? Does it comply with
any other standards, such as the US Equal Employment
Is there a repository to link to any/all papers/systems Opportunity Act?
that use this dataset?
If others want to extend/augment/build on this
dataset, is there a mechanism for them to do so? If
so, is there a process for tracking/assessing the quality
of those contributions. What is the process for communicating/distributing these contributions to users?
Any other comments?
6
Does the dataset contain information that might be
considered sensitive or confidential? (e.g., personally
identifying information)
Does the dataset contain information that might be
considered inappropriate or offensive?
Any other comments?
Challenges and Future Work
Our proposal for a set of standardized datasheets faces several challenges in implementation; we outline the most pressing of these below and urge the machine learning community
to make progress on these in future work. These challenges fall into several categories: how
to converge on the format and content of the datasheet, the incentives required to encourage
datasheet production and the need to overcome inertia, and the communication with outside experts that is necessary to properly address ethical and demographic considerations
of datasets containing data about people.
As a community, we will need to come to some consensus about what should be included
in a datasheet, and how that data can be most effectively solicited and communicated. Just
as in the context of hardware datasheets (Section 4), the most relevant information regarding each dataset will likely be context-specific; just as hardware has different categories
of components with differing relevant characteristics, datasets comprised of photographs
of human faces will have different relevant documentation needs than datasets of health
or weather records. We should not expect this consensus to come easily; researchers and
10
Working Draft: This is work in progress!
practitioners who work in an individual domain might first want to agree upon on a small
number of critical domain-specific attributes for their own datasets. However, there are
also universal questions relevant to all datasets (e.g., who paid for the collection of the data,
or whether there were human subjects generating the dataset), upon which the broader
community should perhaps come to an agreement. This will likely be part of a larger
conversation, both at a high level (datasheets for all types of datasets), as well as in a
domain-specific manner. Along the lines of the former, a group at the MIT Media Lab recently publicized a “Data Nutrition Label” idea2 , which, at the time of writing, has similar
goals to our proposal, though the details are not yet available.
It is also unclear to what extent a datasheet should delve into ethical questions such as
bias or privacy. Questions regarding ethical considerations should be framed in a manner
that encourages practitioners to use ethical procedures to gather data, without discouraging
them from providing as much information as possible about the process.
While this paper outlines questions that a datasheet for datasets would ideally answer,
a similar endeavor needs to be undertaken for datasheets pertaining to models that have
been pre-trained and their APIs. In particular, what are the important questions to ask
about the behavior of these models, and how should these be measured and communicated,
especially when the models are built based on multiple datasets, together with expert
knowledge and other sources of input? Institutions that produce such models should
iterate with customers and developers to arrive at the right set of questions and guidelines
in a “datasheet for models” that would parallel our proposal for datasets.
There will be overhead in creating datasheets, some of which we can mitigate by carefully designing an interactive survey that would automatically produce a datasheet based
on answers to questions. Moreover, hopefully a carefully crafted datasheet will, in the
long run, reduce the amount of time the dataset creators will need to spend answering
one-off questions about their data. Both large and small organizations will face hurdles
in producing these datasheets. For instance, extra details in a datasheet may result in an
organization being exposed to legal or PR risks, or such details might contain proprietary
information which give the organization a competitive edge. Organizations may also delay
releasing any datasheet—even an imperfect one—in order to “complete” it. Small organizations might consider the overhead in preparing a datasheet more onerous than large
organizations. On the other hand, datasheets also provide an opportunity for smaller organizations to differentiate themselves as more transparent than larger, more established
players. Ultimately, we believe the work involved in collecting and preparing a model or
dataset for public use far exceeds the cost of creating a datasheet, which can improve the
usefulness of this work for other users.
Finally, a large chunk of the work which remains in implementing datasheets for machine learning systems will be to communicate with experts in other areas. One example of
this need comes from considering demographic information for datasets related to people
(how the data is collected, collated, and analyzed). Other fields (such as anthropology)
are well-versed in the difficulties arising from demography, and we should avail ourselves of
that resource. It will also be important to consider that datasets are rarely gathered “from
the ground up” in such a way that it would be theoretically possible to gather all sorts
of additional information about the elements of the dataset. Instead, in many settings
datasets are scraped from some source without the ability to gather additional features,
demographic information, or consent. Some contextual information might still be available
(e.g., for the Enron email dataset, we might not have demographic information on a peremployee basis, but some demographic information about the employees of the company
2
See http://datanutrition.media.mit.edu/.
11
Working Draft: This is work in progress!
as a whole may be available). Again, other industries have considered these difficulties (as
discussed in Section 3) and we should learn from their best practices.
7
Acknowledgements
We would like to thank Meredith Whittaker, Erik Learned-Miller, Yoshua Bengio, Joy Buolamwini, Margaret Mitchell, Miroslav Dudík, and Rachel Thomas for valuable discussions
and feedback.
References
[1] Lewis v. amorous.
https://groups.google.com/forum/#!topic/alt.lawyers/
I-sU32WypvQ, 1907. [3 Ga.App. 50, 59 S.E. 338 (1907). Online accessed 18-March-2018].
[2] Martín Abadi, Paul Barham, Jianmin Chen, Zhifeng Chen, Andy Davis, Jeffrey Dean,
Matthieu Devin, Sanjay Ghemawat, Geoffrey Irving, Michael Isard, et al. Tensorflow: A
system for large-scale machine learning. In OSDI, volume 16, pages 265–283, 2016.
[3] National Highway Traffic Safety Administration. Final regulatory evaluation, amendment
to federal motor vehicle safety standards 208. https://www.nhtsa.gov/sites/nhtsa.dot.
gov/files/dummy_milestones_812189.pdf, 2006. [Online; accessed 18-March-2018].
[4] National Highway Traffic Safety Administration. Milestones for nhtsa’s crash test dummies. https://www.gpo.gov/fdsys/pkg/FR-2006-08-31/pdf/06-7225.pdf, 2015. [Online;
accessed 18-March-2018].
[5] Don A Andrews, James Bonta, and J Stephen Wormith. The recent past and near future of
risk and/or need assessment. Crime & Delinquency, 52(1):7–27, 2006.
[6] Tolga Bolukbasi, Kai-Wei Chang, James Y Zou, Venkatesh Saligrama, and Adam T Kalai.
Man is to computer programmer as woman is to homemaker? debiasing word embeddings. In
Advances in Neural Information Processing Systems, pages 4349–4357, 2016.
[7] Dipan Bose, Maria Segui-Gomez, and Jeff R. Crandall. Vulnerability of female drivers involved
in motor vehicle crashes: an analysis of us population at risk. American Journal of Public
Health, 2011.
[8] Joy Buolamwini and Timnit Gebru. Gender shades: Intersectional accuracy disparities in
commercial gender classification. In Conference on Fairness, Accountability and Transparency,
pages 77–91, 2018.
[9] Aylin Caliskan, Joanna J Bryson, and Arvind Narayanan. Semantics derived automatically
from language corpora contain human-like biases. Science, 356(6334):183–186, 2017.
[10] Bill Canis. Issues with federal motor vehicle safety standards. https://fas.org/sgp/crs/
misc/R44800.pdf, 2017. [Online; accessed 18-March-2018].
[11] Glennda Chui. Project will use ai to prevent or minimize electric grid failures. https:
//phys.org/news/2017-09-ai-minimize-electric-grid-failures.html, 2017. [Online;
accessed 14-March-2018].
[12] Google Cloud. Cloud automl. https://cloud.google.com/automl/, 2018. [Online; accessed
14-March-2018].
[13] International Electrotechnical Commission. About the iec: Overview. https://basecamp.
iec.ch/download/welcome-to-the-iec/, 2017.
12
Working Draft: This is work in progress!
[14] International Electrotechnical Commission. Iec 60195:2016. https://webstore.iec.ch/
publication/24478, 2018.
[15] International Electrotechnical Commission. Iec 60322:2001. https://webstore.iec.ch/
publication/768, 2018.
[16] International Electrotechnical Commission. Iec 60322:2001. https://webstore.iec.ch/
publication/1462, 2018.
[17] International Electrotechnical Commission. Welcome to the iec international electrotechnical
commission. http://www.iec.ch/about/history/overview/, 2018.
[18] International Electrotechnical Commission.
searchform&q=resistor, 2018.
Iec webstore.
https://webstore.iec.ch/
[19] KEMET Electronic Components. Surface mount multilayer ceramic chip capacitors (smd
mlccs. http://www.mouser.com/ds/2/212/KEM_C1035_C0G_PULSE_SMD-1103961.pdf, 2018.
[20] Coursera. Coursera. http://www.coursera.org/, 2017.
[21] William J Curran. The tuskegee syphilis study, 1973.
[22] Jeff Donahue, Yangqing Jia, Oriol Vinyals, Judy Hoffman, Ning Zhang, Eric Tzeng, and
Trevor Darrell. Decaf: A deep convolutional activation feature for generic visual recognition.
In International conference on machine learning, pages 647–655, 2014.
[23] Harry F Dowling. The emergence of the cooperative clinical trial. Transactions & studies of
the College of Physicians of Philadelphia, 43(1):20–29, 1975.
[24] Mouser Electronics.
Kemet t520b107m006ate040.
https://www.mouser.com/
ProductDetail/KEMET/T520B107M006ATE040/?qs=A%2FUypIgi4aDLVIJ%2FABrGAw==, 2018.
[25] Ruth R Faden, Susan E Lederer, and Jonathan D Moreno. Us medical researchers, the nuremberg doctors trial, and the nuremberg code: A review of findings of the advisory committee
on human radiation experiments. JAMA, 276(20):1667–1671, 1996.
[26] Fast.ai. Fast.ai. http://www.fast.ai/, 2017.
[27] Food and Drug Administration. Content and format of a new drug application (21 cfr
314.50 (d)(5)(v)). https://www.fda.gov/downloads/ScienceResearch/SpecialTopics/
WomensHealthResearch/UCM557761.pdf, 1985.
[28] Food and Drug Administration. Guidance for the study of drugs likely to be used in the
elderly, 1989.
[29] Food and Drug Administration. Fda clinical trials guidance documents. https://www.fda.
gov/RegulatoryInformation/Guidances/ucm122046.htm, 2018.
[30] Clare Garvie, Alvaro Bedoya, and Jonathan Frankle. The Perpetual Line-Up: Unregulated
Police Face Recognition in America. Georgetown Law, Center on Privacy & Technology, 2016.
[31] Ralph Hingson, Jonathan Howland, and Suzette Levenson. Effects of legislative reform to
reduce drunken driving and alcohol-related traffic fatalities. Public Health Reports, 1988.
[32] HireVue. Hirevue. https://www.hirevue.com/, 2018.
[33] Gary B Huang, Manu Ramesh, Tamara Berg, and Erik Learned-Miller. Labeled faces in the
wild: A database for studying face recognition in unconstrained environments. Technical
report, Technical Report 07-49, University of Massachusetts, Amherst, 2007.
[34] Randall K Kirschman. High temperature electronics. IEEE Press, 1999.
13
Working Draft: This is work in progress!
[35] Tom CW Lin. The new investor. UCLA L. Rev., 60:678, 2012.
[36] Katherine A Liu and Natalie A Dipietro Mager. Women’s involvement in clinical trials:
historical perspective and future implications. Pharmacy Practice (Granada), 14(1):0–0, 2016.
[37] G Mann and C O’Neil. Hiring algorithms are not neutral. Harvard Business Review, 2016.
[38] Clay McShane. The Automobile. Routledge, 2018.
[39] Jonathan D Moreno. Undue risk: secret state experiments on humans. Routledge, 2013.
[40] Martha R Nolan and Thuy-Linh Nguyen. Analysis and reporting of sex differences in phase iii
medical device clinical trials—how are we doing? Journal of Women’s Health, 22(5):399–401,
2013.
[41] Mary Catherine O’Connor. How ai could smarten up our water system. https://medium.
com/s/ai-for-good/how-ai-could-smarten-up-our-water-system-f965b87f355a, 2017.
[Online; accessed 14-March-2018].
[42] National Institute of Health. Nih sharing policies and related guidance on nih-funded research
resources. https://grants.nih.gov/policy/sharing.htm, 2018.
[43] U.S. Department of Transportation Federal Highway Administration. Year of first state driver
license law and first driver examination. https://www.fhwa.dot.gov/ohim/summary95/
dl230.pdf, 1997. [Online; accessed 18-March-2018].
[44] World Health Organization. Global status report on road safety 2015. Fillin, 2015.
[45] Bo Pang and Lillian Lee. A sentimental education: Sentiment analysis using subjectivity
summarization based on minimum cuts. In Proceedings of the 42nd annual meeting on Association for Computational Linguistics, page 271. Association for Computational Linguistics,
2004.
[46] The European Parliament and the Council of the European Union. Directive 2002/95/ec of
the european parliament and of the council of 27 january 2003 on the restriction of the use
of certain hazardous substances in electrical and electronic equipment. http://eur-lex.
europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2003:037:0019:0023:EN:PDF, 2003.
[47] THE EUROPEAN PARLIAMENT and THE COUNCIL OF THE EUROPEAN UNION.
General data protection regulation - european council. http://data.consilium.europa.
eu/doc/document/ST-5419-2016-INIT/en/pdf, 2016.
[48] Adam Paszke, Sam Gross, Soumith Chintala, and Gregory Chanan. Pytorch, 2017.
[49] Sam Peltzman. The effects of automobile safety regulation. Journal of Political Economy,
1975.
[50] Arcol Resistors. Hs aluminium housed resistors. http://www.arcolresistors.com/
wp-content/uploads/2014/03/HS-Datasheet.pdf, 2008.
[51] Freescale Semiconductor. Mac7100 microcontroller family hardware specifications. https:
//www.nxp.com/docs/en/data-sheet/MAC7100EC.pdf, 2006.
[52] Doha Suppy Systems. Facial recognition. http://doha.co.za/facialrecognition.html,
2017. [Online; accessed 14-March-2018].
[53] Udacity. Udacity. http://www.udacity.org/, 2017.
[54] Rolf H Weber and Romana Weber. Internet of things, volume 12. Springer, 2010.
[55] Frank A Wolff. The so-called international electrical units. Journal of the Institution of
Electrical Engineers, 34(170):190–207, 1905.
14
Working Draft: This is work in progress!
A
An Example of a Datasheet for a Hardware Component
‘
Miniature Aluminum Electrolytic Capacitors
XRL Series
FEATURES
• Low impedance characteristics
• Case sizes are smaller than conventional general-purpose capacitors,
with very high performance
• Can size larger than 9mm diameter has safety vents on rubber end seal
• RoHS Compliant
CHARACTERISTICS
Item
Operating Temperature Range
Capacitance Tolerance
Leakage Current
Dissipation Factor
(Tan δ, at 20°C 120Hz)
Characteristics
-40°C ~ +85°C
±20% at 120Hz, 20°C
≤100V
I = 0.01CWV or 3µA whichever is greater after 2 minutes of applied rated DC working voltage at 20°C
Where: C = rated capacitance in µF; WV = rated DC working voltage
>100V
CWV ≤ 1000 µF: I= 0.03 CWV + 15uA;
CWV ≥ 1000 µF: I= 0.02 CWV + 25uA;
Working voltage (WV)
Tan δ
C= rated capacitance in uF
WV= rated DC working voltage in V
6.3
0.23
10
0.20
16
0.16
25
0.14
35
0.12
50
0.10
63
0.09
100
0.08
160
0.12
250
0.17
350
0.20
450
0.25
6.3
8
6.3
6
8
10
18
10
13
10
4
6
8
16
16
20
16
3
4
6
12
25
32
25
3
4
6
10
35
44
35
2
3
4
8
50
63
50
2
3
3
8
63
79
63
2
3
3
6
100
125
100
2
3
3
6
160
200
160
3
3
4
4
250
300
250
8
8
10
10
350
400
350
12
12
16
16
450
500
450
16
16
20
20
For capacitors whose capacitance exceeds 1,000µF, the specification of tan δ is increased by 0.02 for every addition of 1,000µF
Working voltage (WV)
Surge voltage (SV)
Working voltage (WV)
Z(-25°C)/Z(+20°C) øD<16
øD≥16
Z(-40°C)/Z(+20°C) øD<16
øD≥16
Surge Voltage
Low Temperature
Characteristics
(Imp. ratio @ 120Hz)
When returned to +20°C after 2,000 hours application of working voltage at +85°C, the capacitor will meet the following limits: Capacitance change is ≤ ±20% of initial value; tan δ is < 200% of specified value; leakage current is
within specified value
Load Test
When returned to +20°C after 1,000 hours at +85°C with no voltage applied, the capacitor will meet the following limits: Capacitance change is ≤ ±20% of initial value; tan δ is < 200% of specified value; leakage current is within
specified value
Shelf Life Test
PART NUMBERING SYSTEM
1
4
0
Prefix
X
R
L
1
Series
6
V
1
Voltage
Actual Value
0
0
Capacitance (µF)
Actual Value
R
C
Suffix
RoHS Compliant
RIPPLE CURRENT AND FREQUENCY MULTIPLIERS
Capacitance (µF)
<100
100 ~ 1000
>1000
60 (50)
0.70
120
1.0
0.75
0.80
Frequency (Hz)
500
1.30
1.0
1.0
1.20
1.10
1K
1.40
≥10K
1.50
1.30
1.12
1.35
1.15
RIPPLE CURRENT AND TEMPERATURE MULTIPLIERS
Temperature (°C)
Multiplier
<50
1.78
70
1.4
85
1.0
XICON PASSIVE COMPONENTS • (800) 628-0544
XC-600178
Date Revised: 1/8/07
Specifications are subject to change without notice. No liability or warranty implied by this information. Environmental compliance based on producer documentation.
15
Working Draft: This is work in progress!
Miniature Aluminum Electrolytic Capacitors
XRL Series
DIMENSIONS AND PERMISSIBLE RIPPLE CURRENT
Vinyl sleeve
ød
Vent ≥ 6.3ø
P ±0.5
L ±1.5 max.
Value
(µF)
.10
.22
.33
.47
1.0
2.2
3.3
4.7
10
22
33
47
100
220
330
470
1000
2200
3300
4700
6800
10000
Value
(µF)
10
øD x L
5 x 11
5 x 11
5 x 11
5 x 11
5 x 11
6.3 x 11
8 x 11.5
8 x 11.5
10 x 12.5
13 x 20
13 x 20
16 x 25
16 x 25
18 x 36
.47
1.0
2.2
3.3
4.7
10
øD x L
5 x 11
5 x 11
6.3 x 11
8 x 11.5
8 x 11.5
10 x 16
47
100
220
13 x 25
16 x 25
18 x 36
22
33
330
13 x 20
13 x 20
18 x 40
mA
54
70
84
100
145
250
350
415
650
1240
1420
1980
2220
2880
160
20 min.
5
min.
Lead Spacing and Diameter (mm)
øD
5
6.3
8
10
P
2.0
ød
øD ±1
max.
0.5
2.5
0.5
3.5
0.6
5.0
0.6
13
5.0
0.6
16
7.5
5 x 11
5 x 11
5 x 11
5 x 11
5 x 11
5 x 11
5 x 11
6.3 x 11
8 x 11.5
8 x 11.5
10 x 12.5
10 x 16
13 x 20
16 x 25
16 x 32
16 x 32
18 x 36
mA
øD x L
mA
20
30
41
49
75
90
110
180
300
370
520
785
1295
1840
2260
2520
3080
5 x 11
5 x 11
5 x 11
5 x 11
5 x 11
5 x 11
5 x 11
5 x 11
5 x 11
6.3 x 11
8 x 11.5
10 x 12.5
10 x 16
13 x 20
16 x 25
16 x 32
18 x 36
18 x 36
22 x 40
6.0
10
16
25
31
54
80
97
115
190
320
470
620
1090
1660
2070
2520
2880
3440
0.8
øD x L
mA
5 x 11
5 x 11
5 x 11
6.3 x 11
6.3 x 11
8 x 11.5
10 x 12
10 x 16
10 x 16
13 x 20
16 x 32
18 x 36
18 x 36
22 x 41
40
58
87
115
145
240
420
570
740
1145
1890
2430
2700
2900
øD x L
5 x 11
5 x 11
5 x 11
5 x 11
5 x 11
5 x 11
5 x 11
5 x 11
5 x 11
5 x 11
6.3 x 11
6.3 x 11
8 x 11.5
10 x 16
13 x 20
13 x 20
16 x 25
18 x 40
22 x 40
25 x 40
mA
1.5
3.5
5.0
7.0
15
29
35
42
65
95
136
165
260
490
635
860
1530
2231
2785
3300
øD x L
5 x 11
5 x 11
5 x 11
5 x 11
5 x 11
5 x 11
5 x 11
5 x 11
5 x 11
6.3 x 11
8 x 11.5
8 x 11.5
10 x 12
10 x 20
13 x 20
16 x 25
16 x 25
18 x 40
22x 40
25 x 40
mA
3.0
4.5
7.5
9.5
17
28
34
45
70
115
150
190
320
565
765
1050
1700
2385
3000
3560
Working Voltage (WV); Dimensions: øD x L (mm); Ripple Current: mA/RMS @ 120Hz, 85°C
250
350
mA
13
20
34
50
60
115
216
270
354
582
900
1010
øD x L
8 x 11.5
8 x 11.5
8 x 11.5
10 x 12.5
10 x 16
10 x 20
13 x 20
13 x 25
16 x 25
18 x 40
22 x 40
22
0.8
1.0
25
10
12.5
1.0
Tape and box is 5.0mm lead space.
Working Voltage (WV); Dimensions: øD x L (mm); Ripple Current: mA/RMS @ 120Hz, 85°C
16
25
35
50
63
øD x L
18
7.5
mA
21
32
49
70
93
150
255
348
468
øD x L
8 x 11.5
8 x 11.5
10 x 16
10 x 16
10 x 20
13 x 20
13 x 25
16 x 32
16 x 36
822
1134
18 x 40
mA
21
32
63
78
103
174
282
438
500
685
øD x L
10 x 12.5
10 x 12.5
10 x 16
10 x 20
13 x 20
13 x 25
16 x 25
18 x 36
18 x 40
22 x 45
100
øD x L
5 x 11
5 x 11
5 x 11
5 x 11
5 x 11
5 x 11
5 x 11
5 x 11
6.3 x 11
8 x 11.5
10 x 16
10 x 16
10 x 20
13 x 25
16 x 32
18 x 36
22 x 40
450
mA
3.0
5.8
8.8
12
22
33
40
48
80
135
195
255
370
675
972
1135
2600
mA
26
38
63
86
120
192
354
426
555
750
XICON PASSIVE COMPONENTS • (800) 628-0544
XC-600178
Date Revised: 1/8/07
Specifications are subject to change without notice. No liability or warranty implied by this information. Environmental compliance based on producer documentation.
16
Working Draft: This is work in progress!
Miniature Aluminum Electrolytic Capacitors
XRL Series
1000µF 16V
1µF 50V
TYPICAL PERFORMANCE CHARACTERISTICS
Life Test
Temperature Characteristics
Capacitance Change vs. Temperature
Capacitance Change (%)
Capacitance Change (%)
Capacitance Change vs. Time (at +85°C)
+20
+10
0
-10
+10
10
-10
-20
-20
-40
500
750
Time (Hours)
1000
Dissipation Factor (tan δ) 120 Hz
Dissipation Factor vs. Time (at +85°C)
0.4
0.3
0.2
-20
0
+20 +40 +60
Temperature (°C)
+80 +100
Dissipation Factor vs. Temperature
Dissipation Factor (tan δ) 120 Hz
250
0.1
1.0
1.0
0.01
250
500
750
Time (Hours)
1000
-40
-20
0
+20 +40 +60
Temperature (°C)
+80 +100
Impedance vs. Frequency
10
Leakage Current vs. Time (at +85°C)
2
20
Impedance (Ω)
Leakage Current
25
15
10
10
-40°C
1
+20°C
-40°C
5
250
500
750
Time (Hours)
1000
0.1
+20°C
102
103
104
Frequency (Hz)
105
106
XICON PASSIVE COMPONENTS • (800) 628-0544
XC-600178
Date Revised: 1/8/07
Specifications are subject to change without notice. No liability or warranty implied by this information. Environmental compliance based on producer documentation.
17
Working Draft: This is work in progress!
18
Working Draft: This is work in progress!
B
Prototypes of Datasheets for Datasets
A Database for Studying Face Recognition in Unconstrained Environments
Motivation for Dataset Creation
Why was the dataset created? (e.g., was there a specific task in mind?
was there a specific gap that needed to be filled?)
Labeled Faces in the Wild was created to provide images that
can be used to study face recognition in the unconstrained setting
where image characteristics (such as pose, illumination, resolution, focus), subject demographic makeup (such as age, gender,
race) or appearance (such as hairstyle, makeup, clothing) cannot
be controlled. The dataset was created for the specific task of pair
matching: given a pair of images each containing a face, determine whether or not the images are of the same person.1
What (other) tasks could the dataset be used for?
The LFW dataset can be used for the face identification problem.
Some researchers have developed protocols to use the images in
the LFW dataset for face identification.2
Has the dataset been used for any tasks already? If so, where are the
results so others can compare (e.g., links to published papers)?
Papers using this dataset and the specified evaluation protocol are
listed in http://vis-www.cs.umass.edu/lfw/results.html
Who funded the creation of the dataset?
The building of the LFW database was supported by a United
States National Science Foundation CAREER Award.
Dataset Composition
What are the instances? (that is, examples; e.g., documents, images,
people, countries) Are there multiple types of instances? (e.g., movies,
users, ratings; people, interactions between them; nodes, edges)
Each instance is a pair of images labeled with the name of the
person in the image. Some images contain more than one face.
The labeled face is the one containing the central pixel of the
image—other faces should be ignored as “background”.
Are relationships between instances made explicit in the data (e.g.,
social network links, user/movie ratings, etc.)?
There are no known relationships between instances except for
the fact that they are all individuals who appeared in news sources
on line, and some individuals appear in multiple pairs.
What data does each instance consist of? “Raw” data (e.g., unprocessed text or images)? Features/attributes? Is there a label/target associated with instances? If the instances related to people, are subpopulations identified (e.g., by age, gender, etc.) and what is their distribution?
Each instance contains a pair of images that are 250 by 250 pixels in JPEG 2.0 format. Each image is accompanied by a label
indicating the name of the person in the image. While subpopulation data was not available at the initial release of the dataset, a
subsequent paper3 reports the distribution of images by age, race
and gender. Table 2 lists these results.
Is everything included or does the data rely on external resources?
(e.g., websites, tweets, datasets) If external resources, a) are there guarantees that they will exist, and remain constant, over time; b) is there an
official archival version; c) are there access restrictions or fees?
Everything is included in the dataset.
Are there recommended data splits and evaluation measures? (e.g.,
training, development, testing; accuracy or AUC)
The dataset comes with specified train/test splits such that none
of the people in the training split are in the test split and vice
versa. The data is split into two views, View 1 and View 2. View
1 consists of a training subset (pairsDevTrain.txt) with 1100 pairs
of matched and 1100 pairs of mismatched images, and a test subset (pairsDevTest.txt) with 500 pairs of matched and mismatched
images. Practitioners can train an algorithm on the training set
and test on the test set, repeating as often as necessary. Final
performance results should be reported on View 2 which consists
of 10 subsets of the dataset. View 2 should only be used to test
the performance of the final model. We recommend reporting
performance on View 2 by using leave-one-out cross validation,
performing 10 experiments. That is, in each experiment, 9 subsets should be used as a training set and the 10th subset should be
used for testing. At a minimum, we recommend reporting the estimated mean accuracy, µ̂ and the standard error of the mean:
SE for View 2.
µ̂ is given by:
P10
pi
(1)
µ̂ = i=1
10
where pi is the percentage of correct classifications on View 2
using subset i for testing. SE is given as:
How many instances are there? (of each type, if appropriate)?
The dataset consists of 13,233 face images in total of 5749 unique
individuals. 1680 of these subjects have two or more images and
4069 have single ones.
1 All information in this datasheet is taken from one of five sources.
Any errors
that were introduced from these sources are our fault.
Original
paper:
http://www.cs.cornell.edu/people/pabo/
movie-review-data/;
LFW
survey:
http://vis-www.cs.umass.
edu/lfw/lfw.pdf;
Paper measuring LFW demographic characteristics
:
http://biometrics.cse.msu.edu/Publications/Face/HanJain
UnconstrainedAgeGenderRaceEstimation MSUTechReport2014.pdf;
LFW website: http://vis-www.cs.umass.edu/lfw/.
2 Unconstrained face recognition:
Identifying a person of interest
from a media collection:
http://biometrics.cse.msu.edu/Publications/
Face/BestRowdenetal UnconstrainedFaceRecognition TechReport
MSU-CSE-14-1.pdf
Labeled Faces in the Wild
σ̂
SE = √
10
(2)
Where σ̂ is the estimate of the standard deviation, given by:
s
P10
2
i=1 (pi − µ̂)
σ̂ =
(3)
9
The multiple-view approach is used instead of a traditional
train/validation/test split in order to maximize the amount of data
available for training and testing.
3 http://biometrics.cse.msu.edu/Publications/Face/HanJain
UnconstrainedAgeGenderRaceEstimation MSUTechReport2014.pdf
19
Working Draft: This is work in progress!
A Database for Studying Face Recognition in Unconstrained Environments
Training Paradigms: There are two training paradigms that
can be used with our dataset. Practitioners should specify the
training paradigm they used while reporting results.
•
Image-Restricted Training This setting prevents the experimenter from using the name associated with each image
during training and testing. That is, the only available information is whether or not a pair of images consist of the same
person, not who that person is. This means that there would
be no simple way of knowing if there are multiple pairs of
images in the train/test set that belong to the same person.
Such inferences, however, might be made by comparing image similarity/equivalence (rather than comparing names).
Thus, to form training pairs of matched and mismatched images for the same person, one can use image equivalence to
add images that consist of the same person.
Property
Unrestricted Training In this setting, one can use the names
associated with images to form pairs of matched and mismatched images for the same person. The file people.txt in
View 2 of the dataset contains subsets of of people along
with images for each subset. To use this paradigm, matched
and mismatched pairs of images should be formed from images in the same subset. In View 1, the files peopleDevTrain.txt and peopleDevTest.txt can be used to create arbitrary pairs of matched/mismatched images for each person. The unrestricted paradigm should only be used to create training data and not for performance reporting. The test
data, which is detailed in the file pairs.txt, should be used
to report performance. We recommend that experimenters
first use the image-restricted paradigm and move to the unrestricted paradigm if they believe that their algorithm’s performance would significantly improve with more training
data. While reporting performance, it should be made clear
which of these two training paradigms were used for particular test result.
What experiments were initially run on this dataset? Have a summary
of those results.
The dataset was originally released without reported experimental
results but many experiments have been run on it since then.
Value
Database Release Year
Number of Unique Subjects
Number of total images
Number of individuals with 2 or more images
Number of individuals with single images
Image Size
Image format
Average number of images per person
2007
5649
13,233
1680
4069
250 by 250 pixels
JPEG
2.30
Table 1. A summary of dataset statistics extracted from the original paper: Gary B. Huang, Manu Ramesh, Tamara Berg, and Erik LearnedMiller. Labeled Faces in the Wild: A Database for Studying Face Recognition in Unconstrained Environments. University of Massachusetts,
Amherst, Technical Report 07-49, October, 2007.
Demographic Characteristic
Percentage of female subjects
Percentage of male subjects
Percentage of White subjects
Percentage of Black subjects
Percentage of Asian subjects
Percentage of people between 0-20 years old
Percentage of people between 21-40 years old
Percentage of people between 41-60 years old
Percentage of people over 61 years old
The files pairsDevTrain.txt and pairsDevTest.txt support
image-restricted uses of train/test data. The file pairs.txt in
View 2 supports the image-restricted use of training data.
•
Labeled Faces in the Wild
Table 2. Demographic characteristics of the LFW dataset as measured by
Han, Hu, and Anil K. Jain. Age, gender and race estimation from unconstrained face images. Dept. Comput. Sci. Eng., Michigan State Univ.,
East Lansing, MI, USA, MSU Tech. Rep.(MSU-CSE-14-5) (2014).
Data Collection Process
How was the data collected? (e.g., hardware apparatus/sensor, manual
human curation, software program, software interface/API)
The raw images for this dataset were obtained from the Faces in
the Wild database collected by Tamara Berg at Berkeley4 . The
images in this database were gathered from news articles on the
web using software to crawl news articles.
Who was involved in the data collection process? (e.g., students,
crowdworkers) and how were they compensated (e.g., how much were
crowdworkers paid)?
Unknown
Over what time-frame was the data collected? Does the collection timeframe match the creation time-frame of the instances?
Unknown
Any other comments?
Table 1 summarizes some dataset statistics and Figure 1 shows
examples of images. Most images in the dataset are color, a few
are black and white.
4 Faces
20
Value
22.5%
77.5%
83.5%
8.47%
8.03%
1.57%
31.63%
45.58%
21.2%
in the Wild: http://tamaraberg.com/faceDataset/
Working Draft: This is work in progress!
A Database for Studying Face Recognition in Unconstrained Environments
How was the data associated with each instance acquired? Was the
data directly observable (e.g., raw text, movie ratings), reported by subjects (e.g., survey responses), or indirectly inferred/derived from other data
(e.g., part of speech tags; model-based guesses for age or language)? If
the latter two, were they validated/verified and if so how?
The names for each person in the dataset were determined by an
operator by looking at the caption associated with the person’s
photograph. Some people could have given incorrect names particularly if the original caption was incorrect.
Does the dataset contain all possible instances? Or is it a sample (not
necessarily random) of instances from a larger set?
The dataset does not contain all possible instances.
If the dataset is a sample, then what is the population? What was the
sampling strategy (e.g., deterministic, probabilistic with specific sampling
probabilities)? Is the sample representative of the larger set (e.g., geographic coverage)? If not, why not (e.g., to cover a more diverse range of
instances)? How does this affect possible uses?
The original Faces in the Wild dataset is a sample of pictures of
people appearing in the news on the web. Labeled Faces in the
Wild is thus also a sample of images of people found on the news
on line. While the intention of the dataset is to have a wide range
of demographic (e.g. age, race, ethnicity) and image (e.g. pose,
illumination, lighting) characteristics, there are many groups that
have few instances (e.g. only 1.57% of the dataset consists of
individuals under 20 years old).
Is there information missing from the dataset and why? (this does
not include intentionally dropped instances; it might include, e.g., redacted
text, withheld documents) Is this data missing because it was unavailable?
Unknown
Data Preprocessing
What preprocessing/cleaning was done? (e.g., discretization or bucketing, tokenization, part-of-speech tagging, SIFT feature extraction, removal
of instances)
The following steps were taken to process the data:
1. Gathering raw images: First the raw images for this
dataset were obtained from the Faces in the Wild dataset
consisting of images and associated captions gathered from
news articles found on the web.
2. Running the Viola-Jones face detector5 The OpenCV version 1.0.0 release 1 implementation of Viola-Jones face detector was used to detect faces in each of these images, using
the function cvHaarDetectObjects, with the provided Haar
classifier—cascadehaarcascadefrontalfacedefault.xml. The
scale factor was set to 1.2, min neighbors was set to 2, and
the flag was set to CV HAAR DO CANNY PRUNING.
3. Manually eliminating false positives: If a face was detected and the specified region was determined not to be a
face (by the operator), or the name of the person with the
5 Paul
Viola and Michael Jones. Robust real-time face detection. IJCV, 2004
21
Labeled Faces in the Wild
detected face could not be identified (using step 5 below),
the face was omitted from the dataset.
4. Eliminating duplicate images: If images were determined
to have a common original source photograph, they are defined to be duplicates of each other. An attempt was made to
remove all duplicates but a very small number (that were not
initially found) might still exist in the dataset. The number
of remaining duplicates should be small enough so as not
to significantly impact training/testing. The dataset contains
distinct images that are not defined to be duplicates but are
extremely similar. For example, there are pictures of celebrities that appear to be taken almost at the same time by different photographers from slightly different angles. These
images were not removed.
5. Labeling (naming) the detected people: The name associated with each person was extracted from the associated
news caption. This can be a source of error if the original news caption was incorrect. Photos of the same person were combined into a single group associated with one
name. This was a challenging process as photos of some
people were associated with multiple names in the news captions (e.g.“Bob McNamara” and “Robert McNamara”). In
this scenario, an attempt was made to use the most common
name. Some people have a single name (e.g. “Madonna” or
“Abdullah”). For Chinese and some other Asian names, the
common Chinese ordering (family name followed by given
name) was used (e.g. “Hu Jintao”).
6. Cropping and rescaling the detected faces: Each detected
region denoting a face was first expanded by 2.2 in each dimension. If the expanded region falls outside of the image,
a new image was created by padding the original pixels with
black pixels to fill the area outside of the original image.
This expanded region was then resized to 250 pixels by 250
pixels using the function cvResize, and cvSetImageROI as
necessary. Images were saved in JPEG 2.0 format.
7. Forming pairs of training and testing pairs for View 1
and View 2 of the dataset: Each person in the dataset was
randomly assigned to a set (with 0.7 probability of being in
a training set in View 1 and uniform probability of being in
any set in View 2). Matched pairs were formed by picking
a person uniformly at random from the set of people who
had two or more images in the dataset. Then, two images
were drawn uniformly at random from the set of images of
each chosen person, repeating the process if the images are
identical or if they were already chosen as a matched pair).
Mismatched pairs were formed by first choosing two people uniformly at random, repeating the sampling process if
the same person was chosen twice. For each chosen person,
one image was picked uniformly at random from their set of
images. The process is repeated if both images are already
contained in a mismatched pair.
Working Draft: This is work in progress!
A Database for Studying Face Recognition in Unconstrained Environments
Labeled Faces in the Wild
Was the “raw” data saved in addition to the preprocessed/cleaned
data? (e.g., to support unanticipated future uses)
What license (if any) is it distributed under? Are there any copyrights
on the data?
The raw unprocessed data (consisting of images of faces and
names of the corresponding people in the images) is saved.
The crawled data copyright belongs to the news papers that the
data originally appeared in. There is no license, but there is
a request to cite the corresponding paper if the dataset is used:
Gary B. Huang, Manu Ramesh, Tamara Berg, and Erik LearnedMiller. Labeled Faces in the Wild: A Database for Studying Face
Recognition in Unconstrained Environments. University of Massachusetts, Amherst, Technical Report 07-49, October, 2007.
Is the preprocessing software available?
While a script running a sequence of commands is not available,
all software used to process the data is open source and has been
specified above.
Does this dataset collection/processing procedure achieve the motivation for creating the dataset stated in the first section of this
datasheet? If not, what are the limitations?
There some potential limitations in the dataset which might bias
the data towards a particular demographic, pose, image characteristics etc.
•
•
•
•
The Viola-Jones detector can have systematic errors by race,
gender, age or other categories
Due to the Viola-Jones detector, there are only a small number of side views of faces, and only a few views from either
above or below
The dataset does not contain many images that occur under
extreme (or very low) lighting conditions
The original images were collected from news paper articles.
These articles could cover subjects in limited geographical
locations, specific genders, age, race, etc. The dataset does
not provide information on the types of garments worn by
the individuals, whether they have glasses on, etc.
There are no fees or restrictions.
Dataset Maintenance
Who is supporting/hosting/maintaining the dataset?
The dataset is hosted at the University of Massachusetts
and all and comments can be sent to: Gary Huang - [email protected].
Will the dataset be updated? If so, how often and by whom?
Unknown
How will updates be communicated? (e.g., mailing list, GitHub)
All changes to the dataset will be announced through the LFW
mailing list. Those who would like to sign up should send an
email to [email protected].
Is there an erratum?
Errata are listed under the “Errata” section of http://vis-www.cs.
umass.edu/lfw/index.html
If the dataset becomes obsolete how will this be communicated?
•
The majority of the dataset consists of White males
•
There are very few images of people who under 20 years old
•
Are there any fees or access/export restrictions?
The proposed train/test protocol allows reuse of data between View 1 and View 2 in the dataset. This could potentially introduce very small biases into the results
All changes to the dataset will be announced through the LFW
mailing list.
Is there a repository to link to any/all papers/systems that use this
dataset?
Papers using this dataset and the specified training/evaluation
protocols are listed under “Methods” section of http://vis-www.cs.
umass.edu/lfw/results.html
Dataset Distribution
How will the dataset be distributed? (e.g., tarball on website, API,
GitHub; does the data have a DOI and is it archived redundantly?)
The dataset can be downloaded from http://vis-www.cs.umass.edu/
lfw/index.html#download. The images can be downloaded as a
gzipped tar file.
When will the dataset be released/first distributed?
The dataset was released in October, 2007.
22
If others want to extend/augment/build on this dataset, is there a
mechanism for them to do so? If so, is there a process for tracking/assessing the quality of those contributions. What is the process for
communicating/distributing these contributions to users?
Unknown
Working Draft: This is work in progress!
A Database for Studying Face Recognition in Unconstrained Environments
Labeled Faces in the Wild
Figure 1. Examples of images from our dataset (matched pairs)
Legal & Ethical Considerations
If the dataset relates to people (e.g., their attributes) or was generated by people, were they informed about the data collection? (e.g.,
datasets that collect writing, photos, interactions, transactions, etc.)
No. The data was crawled from public web sources, and the individuals appeared in news stories. But there was no explicit informing of these individuals that their images were being assembled into a dataset.
If it relates to people, were they told what the dataset would be used
for and did they consent? If so, how? Were they provided with any
mechanism to revoke their consent in the future or for certain uses?
No (see first question).
If it relates to people, could this dataset expose people to harm or legal action? (e.g., financial social or otherwise) What was done to mitigate
or reduce the potential for harm?
There is minimal risk for harm: the data was already public.
If it relates to people, does it unfairly advantage or disadvantage a
particular social group? In what ways? How was this mitigated?
Unknown
If it relates to people, were they provided with privacy guarantees? If
so, what guarantees and how are these ensured?
No. All subjects in the dataset appeared in news sources so the
images that we used along with the captions are already public.
Does the dataset comply with the EU General Data Protection Regulation (GDPR)? Does it comply with any other standards, such as the US
Equal Employment Opportunity Act?
The dataset does not comply with GDPR because subjects were
not asked for their consent.
Does the dataset contain information that might be considered sensitive or confidential? (e.g., personally identifying information)
The dataset does not contain confidential information since all
information was scraped from news stories.
Does the dataset contain information that might be considered inappropriate or offensive?
No. The dataset only consists of faces and associated names.
23
Working Draft: This is work in progress!
Movie Review Polarity
Thumbs Up? Sentiment Classification using Machine Learning Techniques
Motivation for Dataset Creation
Why was the dataset created? (e.g., was there a specific task in mind?
was there a specific gap that needed to be filled?)
The dataset was created to enable research on predicting sentiment polarity: given a piece of (English) text, predict whether it
has a positive or negative affect or stance toward its topic. It was
created intentionally with that task in mind, focusing on movie reviews as a place where affect/sentiment is frequently expressed.1
these are words that could be used to describe the emotions of john sayles’
characters in his latest , limbo . but no , i use them to describe myself after
sitting through his latest little exercise in indie egomania . i can forgive many
things . but using some hackneyed , whacked-out , screwed-up * non * ending on a movie is unforgivable . i walked a half-mile in the rain and sat
through two hours of typical , plodding sayles melodrama to get cheated by a
complete and total copout finale . does sayles think he’s roger corman ?
Figure 1. An example “negative polarity” instance, taken from the file
neg/cv452 tok-18656.txt.
What (other) tasks could the dataset be used for?
The dataset could be used for anything related to modeling or
understanding movie reviews. For instance, one may induce a
lexicon of words/phrases that are highly indicative of sentiment
polarity, or learn to automatically generate movie reviews.
Has the dataset been used for any tasks already? If so, where are the
results so others can compare (e.g., links to published papers)?
At the time of publication, only the original paper http://xxx.lanl.
gov/pdf/cs/0409058v1. Between then and 2012, a collection of papers that used this dataset was maintained at http://www.cs.cornell.
edu/people/pabo/movie%2Dreview%2Ddata/otherexperiments.html.
Who funded the creation of the dataset?
Funding was provided though five distinct sources: the National
Science Foundation, the Department of the Interior, the National
Business Center, Cornell University, and the Sloan Foundation.
Dataset Composition
What are the instances? (that is, examples; e.g., documents, images,
people, countries) Are there multiple types of instances? (e.g., movies,
users, ratings; people, interactions between them; nodes, edges)
The instances are movie reviews extracted from newsgroup postings, together with a sentiment rating for whether the text corresponds to a review with a rating that is either strongly positive
(high number of stars) or strongly negative (low number of stars).
The polarity rating is binary {positive,negative}. An example instance is shown in Figure 1.
Are relationships between instances made explicit in the data (e.g.,
social network links, user/movie ratings, etc.)?
None explicitly, though the original newsgroup postings include
poster name and email address, so some information could be
extracted if needed.
How many instances are there? (of each type, if appropriate)?
There are 1400 instances in total in the original (v1.x versions)
and 2000 instances in total in v2.0 (from 2014).
What data does each instance consist of? “Raw” data (e.g., unprocessed text or images)? Features/attributes? Is there a label/target asso1 Information in this datasheet is taken from one of five sources; any errors
that were introduced are our fault. http://www.cs.cornell.edu/people/pabo/
movie-review-data/; http://xxx.lanl.gov/pdf/cs/0409058v1; http://www.cs.
cornell.edu/people/pabo/movie-review-data/rt-polaritydata.README.1.
0.txt; http://www.cs.cornell.edu/people/pabo/movie-review-data/poldata.
README.2.0.txt.
24
Features
unigrams (freq.)
unigrams
unigrams+bigrams
bigrams
unigrams+POS
adjectives
top 2633 unigrams
unigrams+position
corrected
NB
79.0
81.5
80.5
77.3
81.5
76.8
80.2
80.8
——–in paper——–
NB
ME
SVM
78.7
81.0
80.6
77.3
81.5
77.0
80.3
81.0
n/a
80.4
80.8
77.4
80.4
77.7
81.0
80.1
72.8
82.9
82.7
77.1
81.9
75.1
81.4
81.6
Table 1. Results on the original dataset (first column is after data repair
specified in the erratum, later).
ciated with instances? If the instances related to people, are subpopulations identified (e.g., by age, gender, etc.) and what is their distribution?
Each instance consists of the text associated with the review, with
obvious ratings information removed from that text (some errors
were found and alter fixed). The text was down-cased and HTML
tags were removed. Boilerplate newsgroup header/footer text was
removed. Some additional unspecified automatic filtering was
done. Each instance also has an associated target value: a positive (+1) or negative (-1) rating based on the number of stars that
that review gave (details on the mapping from number of stars to
polarity is given below in “Data Preprocessing”).
Is everything included or does the data rely on external resources?
(e.g., websites, tweets, datasets) If external resources, a) are there guarantees that they will exist, and remain constant, over time; b) is there an
official archival version; c) are there access restrictions or fees?
Everything is included.
Are there recommended data splits and evaluation measures? (e.g.,
training, development, testing; accuracy or AUC)
The instances come with a “cross-validation tag” to enable replication of cross-validation experiments; results are measured in
classification accuracy.
What experiments were initially run on this dataset? Have a summary
of those results.
Several experiments are reported in the README for baselines
on this data, both on the original dataset (Table 1) and the
cleaned version (Table 2). In these results, NB=Naive Bayes,
ME=Maximum Entropy and SVM=Support Vector Machine. The
feature sets include unigrams (with and without counts), bigrams,
part of speech features, and adjectives-only.
Working Draft: This is work in progress!
Movie Review Polarity
Features
unigrams (freq.)
unigrams
unigrams+bigrams
bigrams
unigrams+POS
adjectives
top 2631 unigrams
unigrams+position
Thumbs Up? Sentiment Classification using Machine Learning Techniques
# features
NB
ME
SVM
16162
16162
32324
16162
16688
2631
2631
22407
79.0
81.0
80.7
77.3
81.3
76.6
80.9
80.8
n/a
80.2
80.7
77.5
80.3
77.6
81.3
79.8
73.0
82.9
82.8
76.5
82.0
75.3
81.2
81.8
Data Preprocessing
What preprocessing/cleaning was done? (e.g., discretization or bucketing, tokenization, part-of-speech tagging, SIFT feature extraction, removal
of instances)
Table 2. Results on the cleaned dataset (first column is the number of
unique features).
Data Collection Process
How was the data collected? (e.g., hardware apparatus/sensor, manual
human curation, software program, software interface/API)
The data was collected by downloading reviews from the IMDb
archive of the rec.arts.movies.reviews newsgroup, at
http://reviews.imdb.com/Reviews.
Who was involved in the data collection process? (e.g., students,
crowdworkers) and how were they compensated (e.g., how much were
crowdworkers paid)?
Unknown
Over what time-frame was the data collected? Does the collection timeframe match the creation time-frame of the instances?
Unknown
How was the data associated with each instance acquired? Was the
data directly observable (e.g., raw text, movie ratings), reported by subjects (e.g., survey responses), or indirectly inferred/derived from other data
(e.g., part of speech tags; model-based guesses for age or language)? If
the latter two, were they validated/verified and if so how?
The data was mostly observable as raw text, except the labels
were extracted by the process described below.
Does the dataset contain all possible instances? Or is it a sample (not
necessarily random) of instances from a larger set?
The dataset is a sample of instances.
If the dataset is a sample, then what is the population? What was the
sampling strategy (e.g., deterministic, probabilistic with specific sampling
probabilities)? Is the sample representative of the larger set (e.g., geographic coverage)? If not, why not (e.g., to cover a more diverse range of
instances)? How does this affect possible uses?
The sample of instances collected is English movie reviews from
the rec.arts.movies.reviews newsgroup, from which a
“number of stars” rating could be extracted. The sample is limited
to forty reviews per unique author in order to achieve broader
coverage by authorship. Beyond that, the sample is arbitrary.
Is there information missing from the dataset and why? (this does
not include intentionally dropped instances; it might include, e.g., redacted
text, withheld documents) Is this data missing because it was unavailable?
No data is missing.
25
Instances for which an explicit rating could not be found
were discarded. Also only instances with strongly-positive
or strongly-negative ratings were retained. Star ratings were
extracted by automatically looking for text like “**** out of
*****” in the review, using that as a label, and then removing
the corresponding text. When the star rating was out of five stars,
anything at least four was considered positive and anything at
most two negative; when out of four, three and up is considered
positive, and one or less is considered negative. Occasionally half
stars are missed which affects the labeling of negative examples.
Everything in the middle was discarded. In order to ensure that
sufficiently many authors are represented, at most 20 reviews
(per positive/negative label) per author are included.
In a later version of the dataset (v1.1), non-English reviews were
also removed.
Some preprocessing errors were caught in later versions. The following fixes were made: (1) Some reviews had rating information
in several places that was missed by the initial filters; these are
removed. (2) Some reviews had unexpected/unparsed ranges and
these were fixed. (3) Sometimes the boilerplate removal removed
too much of the text.
Was the “raw” data saved in addition to the preprocessed/cleaned
data? (e.g., to support unanticipated future uses)
Yes.
Is the preprocessing software available?
No.
Does this dataset collection/processing procedure achieve the motivation for creating the dataset stated in the first section of this
datasheet? If not, what are the limitations?
The overarching goal of this dataset is to study the task of sentiment analysis. From this perspective, the current dataset represents a highly biased sample of all texts that express affect. In
particular: the genre is movie reviews (as opposed to other affective texts), the reviews are all in English, they are all from
the IMDb archive of the rec.arts.movies.reviews newsgroup, and all from a limited time frame. As mentioned above,
at most forty reviews were retained per author to ensure better
coverage of authors. Due to all these sampling biases, it is unclear whether models trained on this dataset should be expected
to generalize to other review domains (e.g., books, hotels, etc.)
or to domains where affect may be present but where affect is not
the main point of the text (e.g., personal emails).
Working Draft: This is work in progress!
Movie Review Polarity
Thumbs Up? Sentiment Classification using Machine Learning Techniques
Dataset Distribution
How will the dataset be distributed? (e.g., tarball on website, API,
GitHub; does the data have a DOI and is it archived redundantly?)
The dataset is distributed on Bo Pang’s webpage at Cornell: http:
If others want to extend/augment/build on this dataset, is there a
mechanism for them to do so? If so, is there a process for tracking/assessing the quality of those contributions. What is the process for
communicating/distributing these contributions to users?
//www.cs.cornell.edu/people/pabo/movie-review-data.
Others may do so and should contact the original authors about
incorporating fixes/extensions.
When will the dataset be released/first distributed?
Legal & Ethical Considerations
The dataset does
not have a DOI and there is no redundant archive.
The dataset was first released in 2002.
What license (if any) is it distributed under? Are there any copyrights
on the data?
If the dataset relates to people (e.g., their attributes) or was generated by people, were they informed about the data collection? (e.g.,
datasets that collect writing, photos, interactions, transactions, etc.)
The crawled data copyright belongs to the authors of the reviews
unless otherwise stated. There is no license, but there is a request
to cite the corresponding paper if the dataset is used: Thumbs up?
Sentiment classification using machine learning techniques. Bo
Pang, Lillian Lee, and Shivakumar Vaithyanathan. Proceedings
of EMNLP, 2002.
No. The data was crawled from public web sources, and the authors of the posts presumably knew that their posts would be public, but there was no explicit informing of these authors that their
posts were to be used in this way.
Are there any fees or access/export restrictions?
No (see first question).
No.
If it relates to people, were they told what the dataset would be used
for and did they consent? If so, how? Were they provided with any
mechanism to revoke their consent in the future or for certain uses?
If it relates to people, could this dataset expose people to harm or legal action? (e.g., financial social or otherwise) What was done to mitigate
or reduce the potential for harm?
Dataset Maintenance
There is minimal risk for harm: the data was already public, and
in the preprocessed version, names and email addresses were removed.
Who is supporting/hosting/maintaining the dataset?
Bo Pang is supporting/maintaining the dataset.
Will the dataset be updated? If so, how often and by whom?
Since its initial release (v0.9) there have been three later releases
(v1.0, v1.1 and v2.0).
How will updates be communicated? (e.g., mailing list, GitHub)
If it relates to people, does it unfairly advantage or disadvantage a
particular social group? In what ways? How was this mitigated?
Unknown
If it relates to people, were they provided with privacy guarantees? If
so, what guarantees and how are these ensured?
Updates are listed on the dataset web page.
Is there an erratum?
There is not an explicit erratum, but updates and known errors are specified in higher version README and diff files.
There are several versions of these: v1.0: http://www.cs.cornell.
edu/people/pabo/movie-review-data/README;
v1.1:
http://www.
cs.cornell.edu/people/pabo/movie%2Dreview%2Ddata/README.1.1
and
http://www.cs.cornell.edu/people/pabo/movie-review-data/diff.txt;
v2.0: http://www.cs.cornell.edu/people/pabo/movie%2Dreview%2Ddata/
poldata.README.2.0.txt. (This datasheet largely summarizes these
sources.)
No; however, while most names have been removed from the
preprocessed/tokenized versions of the data, the original data includes names and email addresses, which were also present on
the IMDb archive.
Does the dataset comply with the EU General Data Protection Regulation (GDPR)? Does it comply with any other standards, such as the US
Equal Employment Opportunity Act?
The preprocessed dataset may comply with GDPR; the raw data
does not because it contains personally identifying information.
Does the dataset contain information that might be considered sensitive or confidential? (e.g., personally identifying information)
If the dataset becomes obsolete how will this be communicated?
The raw form of the dataset contains names and email addresses,
but these are already public on the internet newsgroup.
This will be posted on the dataset webpage.
Is there a repository to link to any/all papers/systems that use this
dataset?
There is a repository, maintained by Pang/Lee through April
2012, at http://www.cs.cornell.edu/people/pabo/movie%2Dreview%
2Ddata/otherexperiments.html.
26
Does the dataset contain information that might be considered inappropriate or offensive?
Some movie reviews might contain moderately inappropriate or
offensive language, but we do not expect this to be the norm.
| 2cs.AI
|
arXiv:1803.04095v2 [math.GT] 4 Apr 2018
Action dimensions of some simple complexes
of groups
Michael W. Davis
Giang Le
Kevin Schreve
April 5, 2018
Abstract
The action dimension of a discrete group G is the minimum dimension
of contractible manifold that admits a proper G-action. We compute
the action dimension of the direct limit of a simple complex of groups
for several classes of examples including: 1) Artin groups, 2) graph
products of groups, and 3) fundamental groups of aspherical complements of arrangements of affine hyperplanes.
AMS classification numbers. Primary: 20F36, 20F55, 20F65,
57S30, 57Q35, Secondary: 20J06, 32S22
Keywords: action dimension, Artin group, Coxeter group, complex
of groups, graph product, hyperplane arrangement
Introduction
Suppose G is a discrete, torsion-free group with classifying space BG. Its
geometric dimension, gdim(G), is the smallest dimension of a model for its
classifying space BG by a CW complex. This number is equal to cd G, the
cohomological dimension of G (provided cd G 6= 2). Its action dimension,
actdim G, is the smallest dimension of a model for BG by a manifold. In other
words, actdim G is the minimum dimension of a thickening of a CW model
for BG to a manifold, possibly with boundary. It follows that gdim G ≤
actdim G with equality if and only if BG is homotopy equivalent to a closed
manifold. From general principles, actdim G ≤ 2 gdim G.
A common method of constructing groups and their classifying spaces
is to use the notion of a “complex of groups” (cf. [6]). Here we will only
1
use the easier notion of a simple complex of groups over a poset Q. By
definition, this means a functor, GQ, from Q to the category of groups
and monomorphisms. So, GQ is the following data: a collection of groups
{Gσ }σ∈Q and monomorphisms φστ : Gτ → Gσ , defined when τ < σ and
satisfying φστ φτ µ = φσµ when µ < τ < σ. Suppose we have models for the
BGσ and realizations for the homomorphisms φστ by maps φστ : BGτ →
BGσ . One then can glue together the {BGσ }σ∈Q (or more precisely iterated
mapping cylinders of the φστ ) to form a space BGQ called the aspherical
realization of GQ. If the geometric realization of Q is simply connected, then
it follows from van Kampen’s Theorem that π1 (BGQ) is the direct limit, G,
of the system of groups {Gσ , φστ }. The space BGQ may or may not be
aspherical. This is the “K(π, 1)-Question” for GQ. When the answer is
affirmative, BGQ is a model for BG. In this case, we get an upper bound for
gdim G in terms of the geometric dimensions of the Gσ . Similarly, if each BGσ
is modeled by a manifold with boundary, Mσ , and each φστ is homotopic to
an embedding fστ : Mτ → ∂Mσ , then we can glue together suitably thickened
versions of the Mσ to get a thickening of BGQ to a manifold with boundary
M. So, provided the K(π, 1)-Question for GQ has a positive answer, one
gets an upper bound for the action dimension of G in terms of the action
dimensions of the {Gσ }σ∈Q
In [4], Bestvina, Kapovich, and Kleiner define a number, obdim G, called
the “obstructor dimension” of G. It is a lower bound for the action dimension
of G. It is based on the classical van Kampen obstruction, vkn (K), for
embedding a finite simplicial complex K into Rn . This obstruction is a
cohomology class with Z2 coefficients in the configuration space of unordered
pairs of distinct points in K. Suppose EG denotes the universal cover of
BG. The idea of [4] is to find a complex K and a coarse embedding of
Cone∞ K into EG, where Cone∞ K means the cone of infinite radius on K.
It is proved in [4] that vkn (K) is also an obstruction to a coarse embedding
of Cone∞ K into any contractible (n + 1)-manifold; hence, when vkn (K) 6=
0, actdim G ≥ n + 2. In [4] the obstructor dimension of G is defined to
be n + 2, where n is the largest integer so that there exists a complex K
with vkn (K) 6= 0, together with a coarse embedding of Cone∞ K into EG.
We also shall have occasion to use a variation of this notion due to Yoon
[36], called the “proper obstructor dimension of G.” His idea is to consider
coarse embeddings T → EG where T is a contractible simplicial complex,
not necessarily of the form T = Cone∞ K.
In this paper we use the following two techniques to compute the action
2
dimension for certain groups which are direct limits of simple complexes of
groups.
(I) (Gluing). Construct a thickening of BGQ by gluing together manifolds
with boundary that are models for the BGσ , hence, establishing an
upper bound for actdim G. The pieces that are to be glued together
will have the form Mσ ×Dσ where Mσ ∼ BGσ and where Dσ is a “dual
disk.” Two such pieces will be glued together along a piece that is a
common codimension-0 submanifold of both boundaries. (The details
of this method are described in Section 2.)
(II) (Obstructors). Lower bounds for obdim G (and hence, for actdim G)
are established by finding obstructors for G. In most of our examples
the coarse obstructor will be a finite union of contractible manifolds,
containing a common basepoint, each of which is the universal cover
of some closed aspherical manifold. These contractible manifolds are
called sheets. When a sheet can be compactified to a disk, it is homeomorphic to the cone on a sphere and the coarse obstructor has the
form Cone∞ K where K is some configuration of spheres (K will often
be a “polyhedral join” of spheres, cf. Definition 4.6). So, such cases
reduce to calculating van Kampen obstructions vkn (K).
A necessary condition for BGQ to be aspherical is that the geometric
realization |Q| of the poset Q is contractible (see Remark 1.6). Often this will
be automatic, since if Q has a minimum element for which the corresponding
local group is the trivial group, then |Q| is a cone. If Q has such a minimum
element, then at the final stage of (I) we will need to glue a disk onto the
result of previous gluings. This will entail that each of previous manifolds
Mσ has nonempty boundary. However, if Q has no such minimum, then for
any minimal element σ of Q one can allow Mσ to be a closed manifold. We
shall return to this point later in the Introduction.
In most applications Q will be the poset S(L) of simplices in some simplicial complex L, including the empty simplex (so |S(L)| will be a cone).
A prototypical example is the case where G = AL , the right-angled Artin
group (or “RAAG”) associated to a d-dimensional flag complex L. Then
the simple complex of groups is the Artin complex, AS(L) = {Aσ }σ∈S(L) of
spherical Artin subgroups, BAL is the standard model for its classifying space
as a union of tori, and gdim AL = d + 1. It turns out that the appropriate
3
obstructor is the polyhedral join of 0-spheres O1 L, called the octahedralization
of L. The following two results are proved in [1, Theorems 5.1 and 5.2].
(i) If Hd (L, Z2 ) 6= 0, then vk2d (O1 L) 6= 0. Hence, actdim AL = obdim AL =
2d + 2.
(ii) If Hd (L, Z2 ) = 0 and d 6= 2, then actdim AL ≤ 2d + 1.
We discuss below three generalizations of RAAGs: 1) general Artin groups,
2) graph products of fundamental groups of closed aspherical manifolds, and
3) fundamental groups of aspherical complements of affine hyperplane arrangements. In each case we prove results similar to (i) and (ii) above. In all
three cases the relevant obstructor will be a polyhedral join Om L of (m − 1)spheres. Although we conjecture that a result similar to (ii) holds in both
cases 1) and 2), the proof of (ii) for RAAGs uses a special argument. (AL
is a subgroup of the right-angled Coxeter group corresponding to O1 L; if
vk2d (O1L) = 0, then O1 L embeds in a flag triangulation of S 2d and hence,
the Coxeter group is a subgroup of a Coxeter group that acts cocompactly
on a contractible (2d + 1)-manifold.) When the group is not a RAAG, we
instead use gluing methods to prove the analog of (ii) in the case where L
embeds in a contractible simplicial complex of the same dimension d. We
abbreviate this condition by saying that L is EDCE. (Note: if L is EDCE,
then Hd (L; Z2 ) = 0.)
1) (General Artin groups). Suppose AL is the Artin group, where the simplicial complex L is the nerve of the associated Coxeter system. The Artin
complex AS(L) is the simple complex of groups {Aσ }σ∈S(L) of spherical Artin
subgroups. The group AL is the direct limit of the system of groups defined
by AS(L). Conjecturally, the K(π, 1)-Question has an affirmative answer
for all Artin complexes. This is known in many cases (see [7]). When the
answer is affirmative, BAS(L) is covered by the “Salvetti complex” of AL
and gdim AL = dim BAS(L) = d + 1. The next result is proved in [15] and
[30]. We shall give the details of the arguments in Sections 2 and 4.
Theorem A (cf. [15] and Proposition 3.13). Suppose the K(π, 1)-Question
has a positive answer for AS(L).
(i) If Hd (L; Z2 ) 6= 0, then actdim AL = obdim AL = 2d + 2 = 2 gdim AL .
(ii) If L is EDCE, then actdim AL ≤ 2d + 1.
4
In [15] it is proved that the relevant obstructor for the Artin complex
is a polyhedral join of 0-spheres, O1 L⊘ , where L⊘ is a certain subdivision
of L whose simplices index the “standard free abelian subgroups” of AL .
As before, Cone(O1 L⊘ ) coarsely embeds in EAL . The calculation of the
van Kampen obstruction in part (i) of Theorem A is then the same as its
calculation for O1 L in the case of a RAAG.
2) (Graph products). Suppose {Gv }v∈V is a collection of groups indexed by
the vertex set V of a simplicial graph L1 . The graph product G is the quotient
of the free product of the Gv by the relations that Gv and Gw commute
whenever {v, w} is an edge of L1 . Let L be the flag complex associated to L1 .
For each simplex σ ∈ S(L), Gσ denotes the direct product of the Gv over the
vertex set of σ. The graph product complex GS(L) is the simple complex of
groups {Gσ }σ∈S(L) where the monomorphisms φστ are the natural inclusions.
Obviously, G is the direct limit of the Gσ . Moreover, the K(π, 1)-Question for
GS(L) always has a positive answer (see 1.3). One can essentially determine
actdim G in terms of the actdim Gv and we do so in Sections 2 and 4. The
most interesting case is when each Gv is the fundamental group of a closed
aspherical manifold Mv . A RAAG is the special case where each Mv = S 1 .
To simplify the statements of our results, assume each vertex manifold Mv
has the same dimension m. Then gdim G = m(d + 1). Using appropriate
thickenings of the Mσ we can use gluing technique (I) to construct a manifold
M of dimension (m + 1)(d + 1) which is a model for BG. By gluing together
standard lifts of the Mσ , we get a coarsely embedded Cone∞ (Om−1 L) in EG.
We then get the following analog of Theorem A.
Theorem B (cf. Corollaries 3.3, 4.25 and 3.15). Suppose, as above, that G
is the graph product of fundamental groups of closed, aspherical m-manifolds
Mv over a d-dimensional flag complex L.
(i) If Hd (L, Z2 ) 6= 0, then actdim G = obdim G = (m + 1)(d + 1).
(ii) If L is EDCE, then actdim G ≤ (m + 1)(d + 1) − 1.
A mild generalization of this is the case where each local group Gσ is
the fundamental group of a closed aspherical manifold Mσ of dimension
m(dim(σ)+1) and where the φστ are realized by embeddings fστ : Mτ ֒→ Mσ .
In Subsection 3.1, we call such a system {Mσ }σ∈S(L) a simple complex of
closed aspherical manifolds. When L is a flag complex, the K(π, 1)-Question
5
for GS(L) has a positive answer (cf. Theorem 1.19) and the conclusion of
Theorem B holds without change.
3) (Aspherical complements of hyperplane arrangements). Suppose A is an
arrangement
of affine hyperplanes in Cn . Let M(A) denote the complement
S
n
C − A. The relevant poset Q is the intersection poset of A. Its elements
are the proper subspaces σ of Cn which are intersections of hyperplanes in
A, ordered by reverse inclusion. The minimal elements of Q are a family of
parallel subspaces, and the arrangement is essential if these are zero dimensional. For each σ ∈ Q, there is a central arrangement Aσ in the subspace
normal to σ in Cn . Put G = π1 (M(A)) and Gσ = π1 (M(Aσ )). This is the
data for a simple complex of groups GQ. Of course, M(A) need not be aspherical; however, if it is, then so are the M(Aσ ). Let us assume that M(A)
is aspherical.
Since M(A) is a 2n-manifold, actdim G ≤ 2n. If A is central (meaning that the hyperplanes are linear), then M(A) deformation retracts onto
the complement of the hyperplane arrangement in the unit sphere S 2n−1 in
Cn and hence, actdim G ≤ 2n − 1. If A is not essential, then the parallel
subspaces can be deformation retracted, and again actdim G ≤ 2n − 1. On
the other hand, for essential aspherical arrangements we have the following
theorem.
Theorem C (cf. Theorem 5.11). Let A be an essential arrangement of affine
hyperplanes in Cn . Suppose M(A) is aspherical. Let G = π1 (M(A)). If A
does not decompose as a product with a factor equivalent to a nontrivial
central arrangement, then actdim G = obdim G = 2n.
This theorem implies that if A decomposes as a product of irreducibles
and k is the number of factors which are irreducible central arrangements,
then actdim G = 2n − k.
To understand why this is an analog of the previous theorems, two points
require explanation. First, |Q(A)| is homotopy equivalent to a wedge of
(n − 1)-spheres and, when A is not central, then there is at least one sphere
in the wedge. In particular, Hn−1 (|Q|, Z2 ) 6= 0. Secondly, there is a simplicial complex IQ(A), called the “irreducible complex,” such that IQ(A) is
homotopy equivalent to |Q(A)|, and so that the simplices of IQ(A) index
the standard free abelian subgroups in G. So, IQ(A) is the analog to L⊘ .
As before, the relevant obstructor is the polyhedral join O1 (IQ(A)).
The computations are evidence for the following conjecture connecting
action dimension to L2 -cohomology.
6
The Action Dimension Conjecture. (Davis-Okun [18]). If the ith L2 Betti number of G is nonzero, then actdim G ≥ 2i.
For example, if A is an irreducible, essential, affine hyperplane arrangement in Cn such that M(A) is aspherical, then the L2 -Betti number of
π1 (M(A)) are zero in degrees 6= n and if the arrangement is irreducible
and not central, then the nth L2 -Betti number of π1 (M(A)) is nonzero, cf.
[16].
In a forthcoming paper, we will determine the action dimensions for some
more examples of simple complexes of groups. These computations provide
further evidence for the Action Dimension Conjecture.
This paper is organized as follows. In Section 1, we review simple complexes of groups and explain our main examples. In Section 2, we discuss
thickenings of simplicial complexes and explain our method of gluing together
manifolds. In Section 3, we perform this operation to give upper bounds on
action dimension for Artin groups, graph products and hyperplane complements. In Section 4, we review the van Kampen obstruction, introduce our
main example of an obstructor complex, and use it to give lower bounds
for the action dimension of graph products and other simple complexes of
groups. In Section 5, we again use obstructor complexes to compute the
action dimension of fundamental groups of hyperplane complements.
Acknowledgements. This material is based upon work supported by the
National Science Foundation under Grant No. DMS-1440140 while the authors were in residence at the Mathematical Sciences Research Institute in
Berkeley, California, during the fall semester of 2016. The first author was
partially supported by an NSA grant and he received support in the spring
of 2017 as a Simons Fellow at the Isaac Newton Institute. The third author
is partially supported by NSF grant DMS-1045119. This material is based
upon work supported by the National Science Foundation under Award No.
1704364.
1
1.1
Simple complexes of groups
The basic construction
We begin by reviewing the theory of simple complexes of groups as developed
in Bridson-Haefliger [6, II.12].
7
Let Q be a poset. As in the Introduction, a simple complex of groups GQ
over Q is a collection of groups {Gσ }σ∈Q and monomorphisms φστ : Gτ → Gσ
defined whenever τ < σ. The Gσ are the local groups. Furthermore, GQ must
be a functor from Q to the category of groups and monomorphisms in the
sense that φστ φτ µ = φσµ whenever µ < τ < σ. (In [6, II.12.11, p. 375] the
order relation on Q is reversed.) A simple morphism ψ = (ψσ ) from GQ
to a group G is a function which assigns to each σ ∈ Q a homomorphism
ψσ : Gσ → G such that ψτ = ψσ φστ whenever τ < σ. The simple morphism
ψ is injective on local groups if each ψσ is injective. Such a simple complex
of groups GQ = {Gσ , φστ }; has a direct limit, denoted lim GQ.
For each σ ∈ Q, there is a canonical homomorphism ισ : Gσ → lim GQ,
hence, a canonical simple morphism ι : GQ → lim GQ. The simple complex
of groups GQ is developable if ι is injective on local groups. The direct
limit has the universal property that for any group H and simple morphism
ψ : GQ → H, there is a unique homomorphism ψ̂ : lim GQ → H such that
ψσ = ψ̂ισ (see [6, II.12.13, p. 376]).
The order complex of a poset P is the simplicial complex whose simplices
are the totally ordered finite subsets {τ0 , . . . , τk } of elements of P (where τ0 <
· · · < τk ). The underlying topological space of order complex of P is denoted
|P| and is called the geometric realization of P. If P opp denotes the opposite
poset where the order relations are reversed, then |P opp | is isomorphic to |P|.
There are two natural stratifications of |P| both indexed by P:
|P|σ := |P≤σ | and |P|σ := |P≥σ |.
(1.1)
In the first stratification, inclusion of one stratum into another corresponds
to the original order relation on P; in the second one, the order relation
is reversed. So, we should regard {|P|σ } as being indexed by P opp . Given
x ∈ |P|, let σ(x) be the index of the smallest stratum |P|σ containing x.
Given a simple complex of groups GQ and a simple morphism ψ : GQ →
G that is injective on local groups, one can define a poset D(Q, ψ) equipped
with a G-action, as well as, a space D(|Q|,
`ψ) also equipped with a G-action.
The poset D(Q, ψ) is the disjoint union Q G/Gσ , i.e., it is the set of pairs
(gGσ , σ), where σ ∈ Q and g ∈ G. (Here we are identifying ψσ (Gσ ) with
Gσ .) The order relation is defined by inclusion of cosets, i.e.,
(gGσ , σ) < (g ′Gσ′ , σ ′ ) ⇐⇒ σ < σ ′ and (g ′)−1 g ∈ Gσ′
The space D(|Q|, ψ) is called the basic construction or the development of
(|Q|, ψ). It is the quotient of G × |Q| by the equivalence relation ∼ defined
8
by
(g, x) ∼ (g ′, x′ ) ⇐⇒ x = x′ and gGσ(x) = g ′Gσ(x) .
(1.2)
One checks that D(|Q|, ψ) is the geometric realization of D(Q, ψ). Let [g, x]
denote the equivalence class of (g, x). The natural G-action on D(|Q|, ψ)
is induced from the action of G on itself by left translation; the isotropy
subgroup at [g, x] is gGσ(x) g −1 , and projection onto the second factor identifies the orbit space with |Q|. The orbit projection D(|Q|, ψ) → |Q| has
a a section i : |Q| → D(|Q|, ψ) defined by i : x 7→ [1, x]. Thus, i(|Q|) is
a strict fundamental domain for the G-action on D(|Q|, ψ). (To say that a
closed subspace of a G-space is a strict fundamental domain means that it
intersects each orbit in exactly one point.) Note that this implies that |Q| is
a retract of D(|Q|, ψ) (the orbit projection is the retraction).
Remark 1.1. Suppose G acts on a space D with a strict fundamental domain
Y so that the stratification of Y by closures of points of the same orbit type
{Y σ }σ∈Q is indexed by some poset Qopp and so that for any point y ∈ Yσ , the
isotropy subgroup Gy contains Gσ . This gives the data for a simple complex
of groups GQ over Q, where the local group Gσ is the isotropy subgroup at
a generic point of Y σ . There is a canonical simple morphism ψ = (ψσ ) from
GQ to G corresponding to the inclusions Gσ ֒→ G. As before, one defines
the development of Y with respect to ψ by D(Y, ψ) = (G × Y )/ ∼, where
the equivalence relation ∼ is defined as in (1.2). Moreover, the inclusion
Y ֒→ D extends to a G-equivariant homeomorphism D(Y, ψ) → D (see
[6, Prop. 12.20 (1), II.12]). In other words, D is determined by the strict
fundamental domain Y , the group G and the simple morphism from GQ to
G. (In previous work of the first author, e.g., [13, §5.1], the basic construction
is denoted by U(G, Y ) rather than by D(Y, ψ).)
Next, we recall a basic lemma, which can be found as [6, Prop. 12.20 (4),
II.12] or [35, Thms. 6, 10, pp. 32, 39].
Lemma 1.2. Let GQ be a developable simple complex of groups over Q. Let
ψ be a simple morphism from GQ to a group G and let ψ̂ : lim GQ → G be the
induced homomorphism. Suppose |Q| is simply connected. Then D(|Q|, ψ)
is simply connected if and only if ψ̂ is an isomorphism. (In particular, if
G = lim GQ, then D(|Q|, ι) is simply connected.)
Remark 1.3. Although we will not define the concepts of the “universal
cover” or the “fundamental group” for a general complex of groups, we will
9
give definitions for simple complexes of groups which agree with the more
general definitions in [6]. Put G = lim GQ and let ι : GQ → G be the
canonical simple morphism. First suppose |Q| is simply connected. Then,
since D(|Q|, ι) is simply connected (by Lemma 1.2), D(|Q|, ι) is the universal
cover of GQ and π1 (GQ) = G (cf. bh [6, III.C.3.11(1), p. 551]). If |Q| is
not connected, then each component of |Q| gives its own simple complex of
groups and can be treated separately. So, suppose |Q| is connected, but not
necessarily simply connected. Put π = π1 (|Q|). The poset structure on |Q|
lifts to a poset structure P on the universal cover of |Q| (so that the universal
cover of |Q| is |P|). The group of deck transformations π acts on |P| and on
P. Let p : P → Q be the projection. We have a simple complex of groups
GP defined by Gσ̃ = Gσ where σ̃ ∈ P lies above σ. Put G̃ = lim GP and let
ι̃ : GP → G̃ be the canonical simple morphism. By Lemma 1.2, the basic
construction D(|P|, ι̃) is simply connected. The group π acts on GP and
hence, on G̃. So, the semidirect product G̃ ⋊ π acts on D(|P|, ι̃) with orbit
space |P|/π = |Q|. Therefore, D(|P|, ι̃) is the universal cover of GQ and
π1 (GQ) = G̃ ⋊ π.
Aspherical realizations. The classifying space of a discrete group H is
denoted BH. The universal cover of BH is denoted EH. A simple complex of
groups GQ gives the data for a poset of spaces {BGσ , φστ }, where τ < σ ∈ Q
and where φστ : BGτ → BGσ is the map induced by the monomorphism
φστ : G`
τ → Gσ . Using this data we can glue together the disjoint union of
spaces |Q|σ × BGσ by using iterated mapping cylinders. For each τ < σ,
|Q|σ is a subcomplex of |Q|τ and one glues the subspace |Q|σ × BGτ of
|Q|τ × BGτ to |Q|σ × BGσ via the map:
I × φστ : |Q|σ × BGτ → |Q|σ × BGσ ,
where I denotes the identity map on |Q|σ . The resulting space BGQ is the
aspherical realization of GQ. It is well-defined up to homotopy equivalence.
If |Q| is connected and simply connected, then it follows from van Kampen’s
Theorem that π1 (BGQ) = lim GQ. We note that
dim BGQ = sup{(dim BGσ + dim |Q|σ ) | σ ∈ Q}
(1.3)
Proposition 1.4. Suppose GQ is a simple complex of groups over Q with
|Q| simply connected. Let G = lim GQ and let D = D(|Q|, ι) be the basic
construction. When GQ is developable, BGQ is homotopy equivalent to the
Borel construction EG ×G D.
10
Proof. Projection on the second factor induces a projection p : EG ×G D →
D/G = |Q| so that the inverse image of the vertex σ is homotopy equivalent
to BGσ . This uses the fact that GQ → G is injective on local groups,
otherwise, p−1 (σ) is homotopy equivalent to BGσ , where Gσ means the image
of Gσ in G. It follows that EG ×G D is an aspherical realization of GQ.
Recall that the K(π, 1)-Question for GQ is the following.
The K(π, 1)-Question. Is BGQ aspherical?
Corollary 1.5. Suppose GQ is a developable simple complex of groups with
|Q| simply connected. Then the K(π, 1)-Question for GQ has a positive
answer if and only if D is contractible.
Proof. By Proposition 1.4, BGQ ∼ EG ×G D. Hence, BGQ is aspherical if
and only if the universal cover of EG ×G D is contractible. This universal
cover is EG × D, which yields the corollary.
Remark 1.6. Since |Q| is a retract of D, a necessary condition for D to be
contractible is that |Q| is contractible.
In the construction of BGQ we can assume that for each σ, dim BGσ =
gdim Gσ . There is a simple condition which implies that the maximum value
of the quantity dim BGσ + dim |Q|σ in (1.3) occurs when σ is a maximal
element of Q, i.e., when |Q|σ is a point. It is:
gdim Gσ > gdim Gτ ,
whenever σ > τ .
(1.4)
Since a k-simplex in |Q|τ corresponds to a chain τ = τ0 < · · · < τκ , condition
(1.4) implies gdim Gτk ≥ gdim Gτ +k ≥ gdim Gτ +dim |Q|τ ; so the maximum
value occurs when σ is maximal.
Proposition 1.7. Suppose GQ is a developable simple complex of groups
and that the K(π, 1)-Question for GQ has a positive answer. Then
gdim G ≤ dim BGQ = sup{gdim Gσ + dim |Q|σ }.
σ∈Q
If (1.4) holds, then gdim G = supσ∈Q {gdim Gσ }.
Proof. Since gdim G ≤ dim BGQ, the first formula follows from (1.3). So, if
condition (1.4) holds, gdim G ≤ sup{gdim Gσ | σ ∈ Q}. Since EG/Gσ is a
model for BGσ , gdim G ≥ gdim Gσ , so the previous inequality must be an
equality.
11
1.2
Examples where Q is a poset of simplices
Given a simplicial complex L, its poset of simplices (including the empty
simplex) is denoted by S(L). Its geometric realization |S(L)| is the cone on
the barycentric subdivision of L. (The vertex corresponding to the empty
simplex is the cone point.) Most of this paper concerns simple complexes
of groups over posets Q of the form S(L). Given such a simple complex
of groups GS(L), we often will write G for lim GS(L) and D for the basic
construction D(|S(L)|, ι). In this subsection we introduce examples of main
interest of such complexes of groups coming from Coxeter groups, Artin
groups, and graph products.
Example 1.8. (Coxeter groups) Suppose (W, S) is a Coxeter system (cf. [5]
or [13]). This means that W is a group, that S is a distinguished set of
generators and that W has a presentation of the form
W := hsi ∈ S|s2i = (si sj )mij = 1i
For any subset T of S, the subgroup generated by T is denoted WT and called
the special subgroup corresponding to T . It is a standard fact that (WT , T )
also is a Coxeter system (cf. [5, pp.12-13]). The subset T is spherical if WT is
finite, in this case WT is a spherical special subgroup. Let S(W, S) denote the
poset of spherical subsets of S. There is a simplicial complex L (= L(W, S)),
called the nerve of (W, S). Its vertex set is S and a subset T ≤ S spans a
simplex of L if and only if T is spherical. Thus, S(L) = S(W, S), the poset of
spherical subsets. This gives a simple complex of groups over S(L), denoted
W S(L), and called the complex of spherical Coxeter groups (or simply the
Coxeter complex ). The local group Wσ at a simplex σ ∈ S(L) is the spherical
subgroup generated by the vertices of σ. The direct limit of W S(L) is the
Coxeter group W .
Example 1.9. (Artin groups). Given a Coxeter system (W, S) there is an
associated Artin group A. This group has one generator xs for each s ∈ S;
its relations are the braid relations:
xs xt · · · = xt xs · · ·,
| {z } | {z }
mst terms
mst terms
where both sides of the equation are alternating words in xs and xt , where
{s, t} ranges over the edges of the nerve L, and where mst denotes the order
12
of st in W . The matrix (mst ) is called the Coxeter matrix. For any T ≤ S,
let AT denote the Artin group corresponding to the Coxeter system (WT , T ).
As with Coxeter groups, AT can be identified with the special subgroup of
A generated by {xt }t∈T . (When T is a spherical subset of S, this is proved
in [20, Thèoréme 4.13 (iii)] and in general in [29, Theorem 4.14].) The
Artin group AT is spherical if T is a spherical subset of S. As with Coxeter
groups, let S(L) be the poset of spherical subsets of S. The spherical special
subgroups of A give a simple complex of groups AS(L) called the Artin
complex. When σ is a simplex of L and T = Vert σ, we shall often write
Aσ instead of AT . It is clear that the direct limit lim AS(L) is A. Since Aσ
is isomorphic to a subgroup of A, AS(L) is developable. Note that if L′ is
any subcomplex of the full simplex on S with the same 1-skeleton as L, then
lim AS(L′ ) = A.
By Deligne’s Theorem in [20], any spherical Artin group Aσ has a classifying space BAσ which is a finite CW complex of dimension one greater
than dim σ. (There is a specific model for BAσ called the Salvetti complex,
see [8] or Subsection 3.2). The “K(π, 1)-Conjecture” for Artin groups is the
conjecture that the K(π, 1)-Question has a positive answer for any Artin
poset AS(L). By Proposition 1.5 this is equivalent to the conjecture that
D(|AS(L)|, A) is contractible. It is the most important unsolved problem
concerning general Artin groups. A detailed discussion can be found in [7],
where the conjecture is proved whenever L is a flag complex (we generalize
this in Theorem 1.19 below).
The discussion in Example 1.9 yields the following proposition.
Proposition 1.10. Let A be an Artin group such that the nerve L of its
associated Coxeter system is d-dimensional. If the K(π, 1)-Question for the
associated Artin poset has a positive answer, then gdim A = d + 1.
Proof. Since the aspherical realization BAS(L) is formed by gluing together
the BAσ × |S(L)|σ with σ ∈ S(L) and since dim BAσ = dim σ + 1, we have
dim BAS(L) = d + 1. Since BAS(L) is a model for BA, gdim A ≤ d + 1. On
the other hand, for any d-simplex σ ∈ S(L), the spherical Artin group Aσ
contains a free abelian subgroup of rank d+1 (e.g., see [15]). So, cd AL ≥ d+1.
Hence, d+1 ≥ gdim AL ≥ cd AL ≥ d+1; so all inequalities are equalities.
Definition 1.11. A simplicial complex L is a flag complex if it satisfies the
following: if T is any finite set of vertices of L which are pairwise connected
13
by edges, then T spans a simplex of L. A simplicial graph L1 determines a
flag complex L: the simplices of L are the cliques in L1 . (This is also called
the “clique complex” of L1 .)
Definition 1.12. Suppose L1 is a simplicial graph with vertex set V and
edge set E. Let {Gv }v∈V be aQcollection of groups indexed by V . The graph
product of the Gv , denoted L1 Gv , is the quotient of the free product of
the Gv , v ∈ V , by the normal subgroup generated by all commutators of the
form, [gv , gw ], where {v, w} ∈ E, gv ∈ Gv and gw ∈ Gw .
Q
Example 1.13. (The graph product complex ). Suppose L1 Gv is a graph
product and that L is the flag complex determined by L1 . There is a simple
complex of groups GS(L) over S(L) called the graph product complex. It is
defined by putting Gσ equal to the direct product,
Y
Gv ,
v∈Vert σ
for each simplex σ ∈ L and letting φστQ: Gτ → Gσ be the natural inclusion
whenever τ < σ. It is immediate that L1 Gv = lim GS(L).
Remark 1.14. Another approach to the graph product complex is given
in [12] or [14] using the notion of a “polyhedral product”. Suppose L is a
simplicial complex with vertex set V and that we are given a collection of
pairs of spacesQ(X, Y ) = {(Xv , Yv )}v∈V together with a choice of basepoint
∗v ∈ Yv . Let v∈V Xv denote the subspace of the Cartesian product consisting of all V -tuples (xv )v∈V such that xv = ∗v for all but finitely many v.
Given a V -tuple, x = (xv ), put σ(x) = {v Q
∈ V | xv ∈ Xv − Yv }. The polyL
hedral product (X, Y ) is the subspace of v∈V Xv consisting of all x such
that σ(x) is a simplex in L. (Usually, we only shall be concerned with the
case where each Yv equals the basepoint ∗v , in which case the notation will
be simplified to X L .) For any τ ∈ S(L),
Q the set of all x with σ(x) ≥ τ , can
be identified with the product, X τ := v∈Vert τ Xv . Thus, X L is the union of
the X τ , with τ ∈ S(L).
′
Next let L1 be any simplicial graph and LQ
any simplicial complex
with
Q
1
1-skeleton = L . Let G be the graph product L1 Gv and H = v∈V Gv be
the direct product. Let ι : GS(L1 ) → G and ψ : GS(L1 ) → G be the natural
simple morphisms. Consider the polyhedral product:
′
Z(L′ ) = (Cone Gv , Gv )L .
14
Then Z(L′ ) is locally isomorphic to a product of cones on discrete sets.
Moreover, Z(L′ ) can be identified with the development D(|S(L′ )|, ψ). The
fundamental group of Z(L′ ) can be identified with the kernel of the natural
epimorphism G → H. So, the H-action on Z(L′ ) lifts to a G-action on the
universal cover Z̃(L′ ) with the same strict fundamental domain. It follows
from Remark 1.1 that Z̃(L′ ) = D(|S(L′ )|, ι). When L′ = L, Z̃(L) can be
identified with the standard realization of a right-angled building (cf. [14,
§2.2]). Therefore, Z̃(L) has a CAT(0) structure and hence, is contractible.
A corollary to these observations is the following result.
Q
Proposition 1.15. (cf. [14, Theorem 2.22] and [17]). Suppose G = L1 Gv
is the graph product of nontrivial groups over a simplicial graph L1 , and let
L be the flag complex determined by L1 .. Then the K(π, 1)-Question for the
graph product complex GS(L) has a positive answer.
Since BG1 × BG2 is a model for B(G1 × G2 ), it is obvious that
gdim(G1 × G2 ) ≤ gdim G1 + gdim G2 .
On the other hand, by using certain torsion-free subgroups of RACGs, Dranishnikov [24] showed that there are groups G1 and G2 for
Q which the inequality
is strict (cf.P[13, Example 8.5.9]). Hence, for Gσ = v∈σ Gv , we have that
gdim Gσ ≤ v∈σ gdim Gv and the inequality can be strict.
A corollary to Proposition 1.15 is the following calculation of the geometric dimension of any graph product of groups.
Q
Corollary 1.16. Suppose G = L1 Gv is the graph product of nontrivial
groups over a simplicial graph L1 . Let L be the flag complex determined by
L1 . Then gdim G = sup{gdim Gσ | σ ∈ S(L)}.
1.3
Flag complexes and the K(π, 1)-Question
We will use the following result from [35].
Proposition 1.17. ([35, Prop. 3, p. 6]). Let Gi be a collection of groups
with common subgroup A and let A Gi denote the amalgamated product. Let
Hi ⊂ Gi be subgroups and suppose the intersection B = Hi ∩A is independent
of i. Then the natural homomorphism B Hi → A Gi is injective.
∗
∗
15
∗
As usual, GS(L) is a simple complex of groups. For any full subcomplex
L of L, put GL′ = lim GS(L′ ) and let GL′ denote the image of GL′ in GL .
For any σ ∈ S(L), let Gσ denote the image of Gσ in GL . (If GS(L) is
developable, then Gσ → Gσ is an isomorphism.) The intersection of local
groups condition for simplices σ and τ of L is the following:
′
Gσ ∩ Gτ = Gσ∩τ .
(1.5)
Lemma 1.18. Suppose GS(L) is developable and that (1.5) holds for all
σ, τ ∈ S(L). If L is a flag complex, then for any full subcomplex L′ of L, the
natural map GL′ → GL is an injection.
We first prove this in a special case where L is the cone on another flag
complex. We will use the notation St(u) for the cone and Lk(u) for the base
of the cone; regarding u as the cone vertex.
Special Case: We will prove the following:
(i) The natural map GLk(u) → GSt(u) is injective.
(ii) Suppose L0 , L1 are full subcomplexes of Lk(u) with L0 ⊂ L1 . Then
GL1 ∩ GL0 ∗u = GL0 .
Proof of the Special Case. The proof is by induction on the number of vertices of St(u). When St(u) is a simplex, (i) and (Ii) follow from (1.5). If
St(u) is not a simplex, then, since Lk(u) is a flag complex, there is a vertex
v in Lk(u) which is not connected by an edge to some other vertex of Lk(u).
Denote the star of v in St(u) simply by St(v). So, St(v) is a proper subcomplex of St(u). By induction on the number of vertices in the cone, (i) holds
for St(v), i.e., GLk(v) → GSt(v) is injective, where Lk(v) := Lk(v, St(v)). By
induction on the number of vertices, the natural maps,
GLk(u)−v → GSt(u)−v , GSt(v,Lk(u)) → GSt(v) , and GLk(v,Lk(u)) → GLk(v) ,
are injective. We have decompositions as amalgamated products:
GSt(u) = GSt(u)−v ∗GLk(v) GSt(v)
GLk(u) = GLk(u,St(u)−v) ∗GLk(v,Lk(u)) GLk(u,St(v))
By induction on the number of vertices, we have that (ii) holds in two cases:
first with L1 = Lk(u, St(u) − v) = Lk(u) − v and L0 = Lk(v, Lk(u)) and
16
Lk(u, Lk(v))
Lk(u)
Lk(u, St(v)) = St(v, Lk(u))
St(u)
u
v
St(v)
Figure 1: Setup for Lemma 1.19
second with L1 = St(v) and L0 = Lk(v, Lk(u)). This yields
GLk(u,St(u)−v) ∩ GLk(v,Lk(u))∗u = GLk(v,Lk(u)) ,
GSt(v) ∩ GLk(v,Lk(u))∗u = GLk(v,Lk(u)) .
Applying Proposition 1.17, we see that GLk(u) → GSt(u) is injective.
Completion of Proof. We can now complete the proof of Lemma 1.18. The
argument is again by induction on the number of vertices. Let L′ be a full
subcomplex of L. If L = L′ ∗ v, we are done by the special case. Otherwise,
there is a vertex v such that L 6= St(v) and v ∈
/ L′ . There is an amalgamated
product decomposition:
GL = GL−v ∗GLk(v) GSt(v) .
By inductive hypothesis for the proper subcomplexes L − v and St(v), we
have inclusions GLk(v) → GL−v and GLk(v) → GSt(v) . Since both factors inject
into the amalgamated product, GL−v → GL is an injection. Continuing by
deleting one vertex at a time, we see the same holds for GL′ .
Theorem 1.19. (cf. [7, Remark on p. 619]). Suppose L is a flag complex,
that GS(L) is developable, and that condition (1.5) holds for all τ , σ in S(L).
Then the K(π, 1)-Question for GS(L) has a positive answer.
17
Proof. The proof is by induction on the number of maximal simplices in
L. The base case is when L is a single simplex σ. Then Gσ = lim GS(σ)
and BGS(σ) ∼ BGσ . So, the answer to the K(π, 1)-Question for GS(σ) is
positive.
Suppose L is not a simplex. Since L is a flag complex, there are distinct
vertices v1 , v2 in V = Vert L so that v1 and v2 are not joined by an edge of L.
Let L1 , L2 and L0 be the full subcomplexes of L spanned by V −{v1 }, V −{v2 }
and V − {v1 , v2 }, respectively, and let G1 , G2 and G0 be the respective direct
limits. Since GL is a direct limit, it is the amalgamated product GL =
G1 ∗G0 G2 . By Lemma 1.18, the natural maps from G0 → Gi and Gi → GL
are injections for i = 1, 2. A lemma of Whitehead states that if two aspherical
complexes are glued together along an aspherical subcomplex so that the
fundamental group injects into either side, then the result of the gluing is
also aspherical (for example, see [13, Thm. E.1.15]). (This is a special case
of theorem that we are proving.) By inductive hypothesis, BGS(Li ) ∼ BGi
and, by its definition, BGS(L) is the union of BGS(L1 ) and BGS(L2 ) along
BGS(L0 ). Hence, Whitehead’s Lemma shows that BGS(L) ∼ BGL .
Remark 1.20. Theorem 1.19 shows that if GS(L) is developable, (1.5)
holds and L is a flag complex, then D(|S(L)|, GL ) is contractible. Moreover, D(|S(L′ )|, GL′ ) is contractible for any full subcomplex L′ ≤ L. For
graph product complexes, these developments are right-angled buildings and
hence, are CAT(0). This raises the question of nonpositive curvature in the
context of Theorem 1.19. This is equivalent to the question of whether the
link of each simplex in D(|S(L)|, GL ) is CAT(1), (see [6]). For bounded curvature to make sense, we should first put a piecewise spherical structure on L.
Since L is already assumed to be a flag complex we might as well assume that
each simplex in L is an all right spherical simplex so that D(|S(L)|, GL ) becomes a cube complex, see [13]. The link, Lkσ , corresponding to a nonempty
simplex σ in L is the development of the simplex of groups GS(∂σ) with
respect to the natural simple morphism ψ : GS(L) → Gσ , so the question
becomes whether Lkσ = D(|S(∂σ)|, ψ) is CAT(1). By Gromov’s Lemma (cf.
[13, Appendix I.6, pp.516-517]), this is equivalent to the question of whether
it is a flag complex. Note that this is implied by the condition that the development of the simplex of groups, D(|S(∂σ)|, G∂σ ), is a flag complex. (Here
G∂σ = lim GS(∂σ)).
Similar considerations led R. Charney and the first author to conjecture
in [7] that the development of any Artin complex in Example 1.9 can be
18
given CAT(0) structure. This would imply the K(π, 1)-Conjecture for all
Artin groups. The piecewise spherical structure on L should be the natural
one in which σ is isometric to a fundamental spherical simplex in the round
sphere on which Wσ acts as reflection group; in other words, the spherical
simplex which makes the spherical realization of the Coxeter complex for Wσ
into a round sphere. In the Artin complex, Lkσ is the Deligne complex for
Aσ . So, the conjecture of [7] is that the natural piecewise spherical metric
on the Deligne complex for Aσ is CAT(1).
1.4
Q is the poset of nonempty simplices in L
Suppose L is a full subcomplex of another simplicial complex L̄. Then every
simplex σ̄ ∈ S(L̄) can be decomposed as a join σ̄ = σ ∗ τ , where σ = σ̄ ∩ L
and τ is a simplex whose vertices lie in L̄ − L. Suppose GS(L) and GS(L̄)
are simple complexes of groups such that GS(L) is the restriction of GS(L̄)
to S(L). Then GS(L̄) is a trivial extension of GS(L) if Gσ̄ = Gσ , whenever
σ̄ = σ ∗ τ decomposes as a join as above.
When L is a subcomplex of L̄, we can replace L̄ by a subdivision relative
to L so that L becomes a full subcomplex of L̄. If L is a flag complex,
then the subdivision L̄ can be assumed to be flag. So, any simple complex
of groups GS(L) over S(L) has a trivial extension to a simple complex of
groups over S(L̄) as above. The following lemma is clear.
Lemma 1.21. Suppose GS(L̄) is a trivial extension of GS(L). Then
(i) lim GS(L̄) = lim GS(L).
(ii) GS(L̄) is developable if and only if GS(L) is developable.
(iii) BGS(L̄) is homotopy equivalent to BGS(L).
For a given simplicial complex L, let S o (L) denote its poset of nonempty
simplices, i.e., S o (L) = S(L)>∅ . The geometric realization of S o (L) is the
barycentric subdivision of L. Let GS(L) be a simple complex of groups
over S(L) and let GS o (L) denote its restriction to S o (L). For example,
S o (Cone L) can be identified with S(L) and any simple complex of groups
GS(L) can be identified with a simple complex of groups over S o (Cone L).
Since we shall always assume that the local group G∅ attached to the empty
simplex is the trivial group, then simple complexes of groups GS o (L) and
19
GS(L) have the same direct limit, which we denote by G. The next lemma
is immediate.
Lemma 1.22. The complex of groups GS o (L) is developable if and only if
GS(L) is developable.
Lemma 1.23. Suppose L is connected. Then the following statements are
equivalent
(i) L is contractible.
(ii) The inclusion D(|S o (L)|, G) ֒→ D(|S(L)|, G) of developments is a Gequivariant homotopy equivalence.
(iii) The inclusion BGS o (L) ֒→ BGS(L) of aspherical realizations is a homotopy equivalence.
(iv) The K(π, 1)-Questions for GS o (L) and for GS(L) have the same answers.
Proof. By Remark 1.3, the following three conditions are equivalent:
• L is simply connected.
• D(|S o (L)|, G) is simply connected.
• π1 (BGS o (L)) = G.
To simplify notation, put D = D(|S(L)|, G) and D o = D(|S o (L)|, G). Let
C = |S(L)| − |S o (L)| be the open dual cone of the vertex in |S(L)| corresponding to ∅. The inverse image of C in D(|S(L)|, G) consists of G copies
of C. Hence,
M
H∗ (Cone L, L), and
H∗ (D, D o) ∼
=
G
H∗ (EGS(L), EGS o (L)) ∼
=
M
H∗ (Cone L, L).
G
The equivalence of conditions (i), (ii) and (iii) follows. The equivalence of
condition (iv) follows from Corollary 1.5.
20
We will use the above lemma in the following way. Given GS(L), first
embed L as a full subcomplex of a contractible simplicial complex Lc and
then take a trivial extension of GS(L) to GS(Lc ). By Lemmas 1.21 and
1.23, there are homotopy equivalences BGS(L) ∼ BGS(Lc ) ∼ BGS o (Lc ),
i.e., BGS o (Lc ) is another model for BGS(L). If dim Lc = dim L, then
dim(|S o (L)|) = dim(|S o (L)|) − 1 and we will sometimes be able to use this
to reduce upper bounds on the action dimension or the geometric dimension
by 1.
Definition 1.24. A d-dimensional simplicial complex L is equidimensionally, contractibly embeddable (abbreviated EDCE) if it can be embedded in
a contractible complex Lc of the same dimension d.
Remark 1.25. For d 6= 2 the condition that L be EDCE is equivalent to
the following two conditions:
Hd−1 (L, Z) is free abelian and Hd (L, Z) = 0.
By the Universal Coefficient Theorem, the above conditions are equivalent
to the condition that H d (L, Z) = 0. Indeed, when these conditions hold, one
can use standard methods to attach cells of dimension ≤ d to kill all the
homology of L. When d = 2, we will only end up with an Lc which is acyclic.
A conjecture of Kervaire asserts that one cannot kill a nontrivial group by
adding the same number of generators and relations. So, in the many situations where Kervaire’s Conjecture is known to hold, it is not possible to
obtain a contractible complex by adding 1 and 2-cells to an acyclic complex.
2
Gluing
Suppose we are given a collection of manifolds with boundary {Mτ }τ ∈Q indexed by a poset Q. Further suppose that whenever τ < σ, we have an
embedding iτ σ : Mτ ֒→ ∂Mσ with trivial normal bundle. This means, in particular, that whenever σ is not a minimal element of the poset, ∂Mσ must be
nonempty. The poset of manifolds {Mτ }τ ∈Q is n-dimensional if for each maximal σ, dim Mσ = n. Henceforth, we assume this. Let c(τ ) = n − dim Mτ
and let Dτ be a disk of dimension c(τ ). The basic idea in this section is
that we can glue together the Mτ × Dτ along codimension-zero submanifolds of their boundaries to obtain M, an n-manifold with boundary. Let
21
Gτ := π1 (Mτ ). We assume each inclusion Mτ ֒→ Mσ is π1 -injective, and that
GQ = {Gτ }τ ∈Q is a simple complex of groups. If |Q| is simply connected,
then π1 (M) = lim GQ is the direct limit of the π1 (Mτ ). So, if each Mτ is
aspherical, M will be a model for BGQ. In practice Q will be S(L) or S o (L)
for some L.
The main work in Subsection 2.1 is to describe the “dual disk” Dµ , for
each µ ∈ S(L) and a decomposition of its boundary sphere into pieces Tµ (τ ).
For τ > µ, Mµ × Dµ will be glued onto Mτ × Dτ along Mµ × Tµ (τ ). The dual
disk is a thickening of the dual cone, Cone(Lµ ), where Lµ means the normal
link of µ ∈ L (i.e., Lµ is the geometric realization of S(L)>µ ). If Dµ is a
k-disk, then it should be attached to other pieces along a submanifold Tµ of
codimension 0 in ∂Dµ (= S k−1). The manifold Tµ is a thickening of Lµ in
S k−1 (Tµ is the “thick link”). The thick link Tµ is further decomposed into
pieces Tµ (τ ) on which the piece corresponding to τ is to be attached.
Here is a picture to keep in mind. Suppose L is a simplicial graph, so
that L embeds in S 3 . The dual disk D∅ is D 4 and T∅ is a thickening of L
in S 3 to a 3-manifold with boundary. For each vertex µ, T∅ (µ) is a 3-ball
neighborhood of µ and for each edge τ , T∅ (τ ) is a tubular neighborhood of
the edge as a solid cylinder. (See Figure 2.1.) The dual disk to a vertex µ
is a 2-disk. If the degree of µ is p, then Lµ consists of p points and Tµ is a
thickening to p intervals in S 1 . The dual cell to an edge (i.e. to a maximal
simplex) is a 0-disk.
The simplicial complex |S(L)| is equal to Cone L′ , where L′ means the
barycentric subdivision of L. So, a k-simplex in Cone L′ is a chain {τ0 , . . . , τk }
of length k + 1 in S(L). We denote the geometric realization of this simplex
by [τ0 , . . . , τk ]. (We will always write such chains in increasing order, i.e.,
τ0 < · · · < τk .) A chain of length 1, {τ }, is either the cone point [∅] or it
corresponds to a vertex [τ ] of L′ (thought of as the barycenter of τ ). Thus,
[τ0 , . . . , τk ] is the k-simplex in Cone L′ spanned by the vertices [τ0 ], . . . , [τk ].
Given a simplex α = [τ0 , . . . τk ] in Cone L′ , its minimum vertex is defined by
min α = τ0 .
To understand the decompositions of dual disks, one first needs to understand the stratification of |S(L)| into “dual cones.” In this section we shall
often use the notation K (or K∅ ) instead of |S(L)|. Similarly, Kσ is |S(L)|≥σ
and called the dual cone of σ. (Here we are reversing the use of superscripts
and subscripts from notation in (1.1).) We will use ∂Kσ or L′σ for |S(L)|>σ ,
the barycentric subdivision of the link of σ. Thus, a simplex α = [τ0 , . . . τk ]
of K lies in Kσ (resp., ∂Kσ ) if and only if min α ≤ σ (resp., min α < σ).
22
2.1
Thick links
Suppose L is a finite simplicial complex of dimension d. We recall a method
for thickening L to a manifold with boundary T . First, piecewise linearly
embed L into a sphere S n−1 , where n ≥ 2d + 2. Thus, L is a full subcomplex
of some PL triangulation S of S n−1 . Denote the barycentric subdivisions of L
and S by L′ and S ′ , respectively. Let T denote the first derived neighborhood
of L in S. In other words, T is the union of simplices in S ′ which have
nonempty intersection with L′ .
If ρ0 < · · · < ρk is a chain of simplices in S(S), then [ρ0 , . . . , ρk ] denotes
the simplex in S ′ spanned by their barycenters.
For each vertex ν in L, let T (ν) denote the closed star of [ν] in S ′ , i.e.,
[
T (ν) = {γ ∈ S ′ | ν ≤ min γ}.
S
Then T (ν) is an (n − 1)-disk. Moreover, T = T (ν), where the union is over
all vertices ν ∈ L. If τ is a simplex of L, then let T (τ ) denote the normal
star of τ in S, i.e.,
[
T (τ ) = {γ ∈ S ′ | τ ≤ min γ} = [τ ] ∗ Lk(τ, S)′ .
So, T (τ ) is the cone on Lk(τ, S)′. Since Lk(τ, S) is a sphere of dimension
n−k−2, where k = dim τ , we see that T (τ ) is PL homeomorphic to a (n−k−
1)-disk. Moreover, if Vert τ = {ν0 , . . . , νk }, then T (τ ) = T (ν0 ) ∩ · · · ∩ T (νk ).
So, T is an (n − 1)-manifold with boundary embedded in S n−1 = ∂D n
Next we want to apply this construction to links in L. For each simplex
µ ∈ S(L), let Lµ = Lk(µ, L). We want to thicken Lµ in a sphere Sµ := S c(µ)−1
of an appropriate dimension c(µ) − 1 to obtain a manifold with boundary
Tµ called a thick link, embedded in a disk Dµ = D c(µ) , called the dual disk.
Similarly, whenever µ < τ , we will have Tµ (τ ), the normal star of τ in Sµ .
Thus, Tµ (τ ) is a thickening of ∂Kµ (τ ). In particular, when µ is the empty
simplex we will have T∅ = T , D∅ = D n and T∅ (τ ) = T (τ ).
To specify the dimensions of the dual disks suppose we are given a function
c : S(L) → N so that
• For any maximal simplex σ of L, c(σ) = 0.
(2.1)
• If τ < σ, then c(τ ) − c(σ) ≥ 2 codim(τ, σ)
(2.2).
23
µ
τ
σ
T (µ)
Tµ (σ)
T (τ )
[µ]
[τ ]
[σ]
Figure 2: A thickening of a graph in S 3 , and some of the associated dual
disks.
Put n = c(∅). (If we are using S o (L) instead of S(L), then we don’t
require the second condition for τ = ∅.) Thus, the dual disk Dµ will be a
thickening of the dual cone Kµ and the thick link Tµ will be a thickening of
∂Kµ (= L′µ ).
The link L′µ naturally is a subcomplex of L′∅ and, in fact, whenever µ < τ ,
L′τ is a subcomplex of L′µ . Similarly, if Sµ′ means the barycentric subdivision
of S c(µ)−1 , then we want to arrange that Sτ′ is a subcomplex of Sµ′ . This
amounts to requiring that Sτ′ is PL embedded in Lk(τ, S c(µ)−1 )′ ⊂ Sµ′ . For
example, if µ = ∅ and L∅ is a graph with a vertex τ , then dim L′∅ = 1 and
dim L′τ = 0. We can thicken L′∅ in S 3 = S∅ , while L′τ should be thickened in
Sτ′ = S 1 , see Figure 2.
Next we want to explain how dual disks can be regarded as manifolds
with corners. Recall that an n-manifold with boundary, P , is a smooth
manifold with corners if it is locally differentiably modeled on the simplicial
cone [0, ∞)n . This can be extended to a definition for topological manifolds
by requiring that the overlap maps preserve the stratification of [0, ∞)n by
intersections with coordinate subspaces. The stratification of [0, ∞)n by its
faces then induces a stratification of P . A codimension-one stratum of P is
24
called a facet.
Lemma 2.1. For each µ ∈ S(L), the dual disk Dµ is a c(µ)-manifold with
corners. The facets are {Tµ (τ )} where µ is a codimension one face of τ (i.e.,
where [τ ] is a vertex of L′µ ) together with ∂Dµ − Tµ .
The facet ∂Dµ − Tµ is called a boundary piece; the other facets are ordinary facets.
Proof. If µ is a codimension one face of τ , then Tµ (τ ) ⊂ ∂Dµ is a disk
of codimension one in Dµ . In general, if µ is a codimension-k face of a
simplex σ in L and {[τ0 ], . . . , [τk ]} are the vertices of σ in L′µ , then Tµ (σ) =
Tµ (τ0 ) ∩ · · · ∩ Tµ (τ0 ) is a disk of codimension k in Dµ . Hence, the Tµ (τ )
intersect in the same fashion as the facets of the simplicial cone [0, ∞)c(µ) .
2.2
Gluing complexes of manifolds with boundary
A complex of manifolds with boundary over S(L) is a collection of manifolds
with boundary, {Mτ }τ ∈S(L) , together with embeddings iστ : Mτ ֒→ ∂Mσ defined whenever τ < σ. In particular, we must have that ∂Mσ is nonempty
whenever σ > ∅; however, the minimum manifold M∅ can have empty boundary, and we usually assume this. In other words, the manifolds are indexed by
the vertices of Cone(L′ ) (the cone on the barycentric subdivision of L), while
the embeddings iστ are indexed by the edges of Cone(L′ ). In addition, we
require that there are certain (k − 1)-parameter families of isotopies between
the iστ which are indexed by the k-simplices of Cone(L′ ). We eventually
will want to require that the codimension of Mτ in Mσ is c(τ ) − c(σ) where
c : S(L) → N is a function as in Subsection 2.1, and that the image of Mτ
in ∂Mσ has trivial normal bundle. Before giving the precise requirements let
us mention that we also will be using the notion of a complex of manifolds
over S 0 (L), where the empty simplex is not needed and where Cone(L′ ) is
replaced by L′ .
We want to describe how to glue together the Mτ × Dτ , where Dτ is the
dual disk defined in Subsection 2.1. It is easier to first describe how to glue
together the Mτ × Kτ where Kτ is the dual cone of τ (i.e., Kτ = [τ ] ∗ L′τ
is a subcomplex of the |S(L)| = [∅] ∗ L′ ). The gluing is accomplished using
various embeddings:
hα∗µ : Mµ × α ֒→ ∂Mmin α × α,
25
[σ]
Kτ
[τ ]
...
...
Kµ
[µ]
Figure 3: Neighborhoods in the barycentric subdivision of L, the link of ∅ in
S(L).
where α is a simplex in L′ and µ ∈ S(L) is a proper face of min α. The
embedding hα∗µ will be used to glue Mµ × (α ∗ [µ]) onto Mmin α × Kmin α .
For the gluing to be well-defined the hα∗µ must satisfy certain compatiblity
relations which we will now describe.
First suppose α is a vertex of L′ , i.e., α = [τ ], where τ is a simplex of
L. Then h[τ ]∗[µ] := iτ µ × I[τ ] : Mµ × [τ ] → ∂Mτ × [τ ]. Essentially, h[τ ]∗[µ]
is iτ µ . Next, suppose α = [τ, σ] is an edge in L′ so that h[τ,σ]∗[µ] : Mµ ×
[τ, σ] → Mτ × [τ, σ] is an isotopy. The restriction of this isotopy to Mµ × [τ ]
is h[τ ]∗[µ] : Mµ × [τ ] → Mτ × [τ ]. Its restriction to the other end when
precomposed with h[σ]∗[τ ] should equal h[σ]∗[µ] , that is,
(h[σ]∗[τ ] )(h[τ,σ]∗[µ] |Mµ ×[σ] ) = h[σ]∗[µ] .
(2.3)
In other words, the composition of the two gluing maps defined on the left
hand side of (2.3) is equal to the gluing map on the right hand side.
Given a k-simplex α = [τ0 , . . . , τk ] in L′ , let αi = [τ0 , . . . , τˆi , . . . , τk ] denote
the face opposite [τi ]. Then hα∗[µ] : Mµ × α → ∂Mτ0 × α is a k-parameter
isotopy. For i 6= 0, we require:
hα∗[µ] |Mµ ×αi = hαi ∗[µ] ,
(2.4)
(hα0 ∗[τ0 ] )(hα∗[µ] |Mµ ×α0 ) = hα0 ∗[µ]
(2.5)
while for i = 0,
26
There is one further condition which our isotopies should satisfy. If τ =
min α and if µ and µ′ are two faces of τ and ρ = µ ∩ µ′ , then we require that
Im(hα∗[µ] ) ∩ Im(hα∗[µ′ ] ) = Im(hα∗[ρ] )
(2.6)
In other words, on the complement of Im(hα∗[ρ] ), the embeddings hα∗[µ] :
Mµ → Mτ and hα∗[µ′ ] : Mµ′ → Mτ must have disjoint images.
Next we describe how to glue together {Mτ × Kτ }τ ∈S(L) to obtain a space
X
` together with a projection map p : X → K. Start with the disjoint union
Mτ × Kτ . We will construct X(0) ⊂ · · · ⊂ X(k) ⊂ · · · ⊂ X(d + 1) = X so
that X(k) will be the inverse image of `
the k-skeleton of K in X. The space
X(0) is defined to be the disjoint union Mσ ×[σ]. Next, given an edge [τ, σ]
in [∅] ∗ L′ , we glue Mτ × [τ, σ] to Mσ × [σ] via h[σ]∗[τ ] : Mτ × [σ] → ∂Mσ × [σ].
(Recall that h[σ]∗[τ ] = iστ .) After doing this gluing for each edge [τ, σ], we
′
obtain X(1). Notice that if τ is a (d−1)-simplex of L, then the
τ , is the
`link, LS
disjoint union of the vertices [σ] where τ < σ and Kτ = [τ ] ∗ [σ] = [τ, σ];
hence, after building X(1) we will have glued Mτ × Kτ onto X(0). Next,
consider a 2-simplex [µ, τ, σ]. Glue Mµ × [µ, τ, σ] onto Mτ × [τ, σ] using
h[τ,σ]∗[µ] : Mµ × [τ, σ] → ∂Mτ × [τ, σ]. By (2.3) this is compatible with the
previously defined gluing map Mµ × [σ] → ∂Mσ × [σ]. Hence, the union of
the two gluing maps gives a well-defined map Mµ × [τ, σ] → (∂Mτ × [τ, σ]) ∪
(∂Mσ × [σ]) which we can use to glue Mµ × [µ, τ, σ] onto X(1).
Continue by induction. Suppose X(k) has been defined over the kskeleton of K. For each k-simplex α in L′ and µ ∈ S(L) with µ < min α, we
have hα∗µ : Mµ × α → ∂Mmin α × α. By (2.4) and (2.5), this is compatible
with previously defined gluing maps hβ∗[µ] , where β is a face of α. So, for
α = [τ0 , . . . , τk ], we get a well-defined map from Mµ × α onto the image of
(∂Mτ0 × [τ0 , . . . , τk ]) ∪ (∂Mτ1 × [τ1 , . . . , τk ]) ∪ · · · ∪ (∂Mτk × [τk ])
in X(k).
We can summarize the above as follows. The union of the hα∗[µ] , with
min α = τ , define an embedding:
Hτ µ : Mµ × ∂Kµ (τ ) → ∂Mτ × Kτ .
(2.7)
(Recall ∂Kµ (τ ) = Kτ .) Formulas (2.3), (2.4) and (2.5) imply that whenever
µ < τ < σ:
(Hστ |∂Mτ ×∂Kτ (σ) )(Hτ µ |∂Kµ (σ) ) = Hσµ .
(2.8)
27
h[σ]∗[τ ] (Mτ × [σ])
Mσ
∂Mσ
Mτ
Mσ
Mτ
h[τ ]∗[µ] (Mµ × [τ ])
∂Mτ
Mµ
Mµ
X(0)
h[σ]∗[µ] (Mµ × [σ])
X(1)
Mσ
Mτ
h[τ,σ]∗[µ] (Mµ × [τ, σ])
Mµ
X(2)
Figure 4: The first stages of our gluing procedure before thickening
Hence, if X>µ = p−1 (∂Kµ ), then the union of the Hτ µ fit together to give
a well-defined map Hµ : Mµ × ∂Kµ → X>µ , that specifies the gluing of
Mµ × ∂Kµ onto X>µ . By (2.6) Hµ is an embedding.
Remark 2.2. If each Mτ is aspherical, then X is a model for the aspherical
realization BGS(L).
Next we want to replace dual cones by dual disks. We suppose that
(a) M∅ is a point.
(b) For all maximal simplices σ in L, the manifolds Mσ all have the same
dimension n.
(c) For each τ < σ, dim Mσ − dim Mτ ≥ 2 codim(τ, σ).
The conditions in (c) are called the codimension ≥ 2 conditions. The
dimensions of the Mτ give us the data for a function c : S(L) → N as in
Subsection 2.1, defined by
c(τ ) = n − dim Mτ .
28
As in Subsection 2.1, we can use the function c to define the thick link Tµ
for each µ ∈ S(L).
Whenever µ is a codimension-one face of τ , Tµ (τ ) is a regular neighborhood of [τ ] in Sµ′ .
Moreover, Tµ (τ ) is homeomorphic to E × Dτ where E is a disk of dimension equal to the codimension of Mµ in ∂Mτ . Since the normal bundle
of Mµ in ∂Mτ is trivial, Mµ × E can be embedded as a codimension-zero
submanifold of ∂Mτ and hence, the embedding Hτ µ defined by (2.7) extends
to an embedding:
Jτ µ : Mµ × Tµ (τ ) ֒→ ∂Mτ × Dτ .
(2.9)
When codim(µ, τ ) > 1, Tµ (τ ) remains a thickening of ∂Kµ (τ ) (as well as a
thickening of Dτ ) and the embedding Hτ µ again extends to an embedding
Jτ µ : Mµ × Tµ (τ ) → ∂Mτ × Dτ . Moreover, the Jτ µ satisfy the analogous
formulas to (2.8).
Finally, we build an n-manifold with boundary M in exactly the same
fashion we constucted the space X above, namely,
a
M :=
Mτ × Dτ / ∼
(2.10)
τ ∈S(L)
where the equivalence relation ∼ is defined as before except that we use as
gluing maps the Jτ µ rather than the Hτ µ .
At this point we should explain why M is a n-manifold with boundary.
Since Dµ is a c(µ)-manifold with corners (cf. Lemma 2.1) and Mµ is a (n −
c(µ))-manifold with boundary, Mµ × Dµ is a n-manifold with corners. Each
facet is either the product of Mµ with a facet of Dµ or it has the form
∂Mµ × Dµ . If µ < τ is a codimension-one face, then Mµ × Dµ is glued onto
Mτ × Dτ by the embedding Jτ µ : Mµ × Tµ (τ ) → ∂Mτ × Dτ from a facet of
Mµ × Dµ to a facet of Mτ × Dτ . Similarly, if {[τ0 ], . . . , [τk ]} is the vertex set
of σ in L′µ , then Mµ × Dµ is glued onto Mσ × Dσ via a map from the stratum
Mµ × Tµ (σ) to an intersection of strata in ∂Mσ → Dσ .
Let {Mτ }τ ∈S(L) be a complex of manifolds with boundary over S(L). Let
Gτ = π1 (Mτ ). As usual suppose the induced homomorphisms φστ = (iστ )∗ :
Gτ → Gσ are injective and the system GS(L) = {Gτ }τ ∈S(L) is a simple
complex of groups. Let G = lim GS(L) be the direct limit. Also suppose
• GS(L) is developable, and
29
• each Mτ is homotopy equivalent to BGτ ,
Theorem 2.3. Suppose {Mτ }τ ∈S(L) is a complex of manifolds with boundary
over S(L) satisfying the above conditions and let M be the manifold with
boundary defined by (2.10). Then M is a thickening of BGS(L). If the
K(π, 1)-Question for GS(L) has a positive answer, then M ∼ BG, so
actdim G ≤ dim M.
2.3
Complexes of manifolds with boundary over S o (L)
We turn to the case where the manifolds Mv associated to the vertices v of L
are allowed to have empty boundary. When this happens our algorithm does
not tell us how to glue on the final disk M∅ × D∅ . (If ∂Mv = ∅, there is no
place to embed M∅ × T∅ .) One can still try to accomplish the gluings without
the final disk. For each higher-dimensional simplex τ , we still require ∂Mτ
to be nonempty. By excluding the empty simplex, we consider a complex of
manifolds with boundary over S o (L) where the embeddings iστ and gluing
maps Hτ µ , Jτ µ satisfy the same conditions as in the previous subsection.
We can glue together the pieces together as before; however, the resulting
manifold will usually not be a model for BG.
So, let us consider a complex of manifolds with boundary {Mτo }τ ∈S o (L) ,
where ∂Mvo is allowed to be empty for v ∈ Vert L, but ∂Mτo 6= ∅ if dim τ > 0.
The other conditions in the previous section are satisfied mutatis mutandis.
The complex is n-dimensional if dim Mσo = n for each maximal simplex σ.
As in (2.10), we can glue together the {Mτo × Dτ }τ ∈S o (L) to obtain an nmanifold with boundary M o . As before, M o will a model for BGS o (L);
however, as explained in Subsection 1.4, BGS o (L) will not be homotopy
equivalent to BG unless L is contractible (see Lemma 1.23). When L is
EDCE (see Definition 1.24), we can use the methods of Subsection 1.4 to
conclude that actdim G ≤ n.
Given the n-dimensional system {Mτo }τ ∈S o (L) over S o (L), there is an easy
way to extend it to an (n + 1)-dimensional system over S(L): simply take
the product of each manifold Mτo with the unit interval. In other words, put
Mτ = Mτo × [0, 1]. So, the vertex manifold Mvo is replaced by the manifold
with boundary Mv = Mvo × [0, 1]. Let M∅ be a point and iτ ∅ : M∅ → ∂Mτ an
appropriate embedding.
Since π1 (Mτo ) = π1 (Mτ ), the systems of fundamental groups {π1 (Mτ )}
and {π1 (Mτo )} define the same simple complex of groups GS(L) over S(L)
30
given by Gτ = π1 (Mτ ). Let G = lim GS(L). Let M o and M denote, respectively, the results of gluing together the systems {Mτo }τ ∈S o (L) and {Mτ }τ ∈S(L) .
We assume each Mτ is connected, so that π1 (M) = G. If L is simply connected, then π1 (M o ) is also equal to G. (In general, π1 (M o ) is the semidirect
product described in Remark 1.3.)
From Lemma 1.23 we get the following.
Lemma 2.4. The inclusion M o ֒→ M is a homotopy equivalence if and only
if L is contractible.
Suppose L is a full subcomplex of another simplicial complex L̄. In Subsection 1.4 we defined the notion of a trivial extension of a simple complex
of groups over S(L) to one over S(L̄). Similarly, we can define the notion of
a trivial extension of a complex of manifolds with boundary over S(L). Let
{Mτ }τ ∈S(L) be such a system. For simplicity, suppose that the dimension of
Mτ depends only on the dimension of the simplex τ , i.e., if dim Mτ = n(k)
for each k-simplex τ . Recall any simplex σ̄ can be decomposed as a join
σ̄ = σ ∗ τ , where σ ∈ S(L) and where vertices of τ lie in L̄ − L. A complex of manifolds with boundary {Nτ }τ ∈S(L̄) is called a trivial extension of
{Mτ }τ ∈S(L) if Nσ̄ = Mσ × D n(k) , whenever σ̄ = σ ∗ τ as above and D n(k) is
the disk Nτ . A trivial extension of a complex over S o (L) is defined similarly.
The next lemma follows immediately from Lemma 1.21.
Lemma 2.5. Suppose {Mσ }σ∈S(L) is a complex of manifolds and {Nσ̄ }σ̄∈S(L̄)
is a trivial extension of it over L̄. Let M and N be the result of gluing these
systems together. Then M is homotopy equivalent to N.
Proposition 2.6. Suppose L is a full subcomplex of a contractible complex Lc
of the same dimension as L. Let {Mτo }τ ∈S o (L) be an n-dimensional complex
of manifolds with boundary over S o (L) and {Nτo }τ ∈S o (Lc ) a trivial extension
of it to Lc . Let N o be the result of gluing together {Nτo } and let M and N
be the result of gluing the corresponding (n + 1)-dimensional complexes over
S(L) and S(Lc ), respectively. Then M is homotopy equivalent to N o
Proof. By Lemma 2.5, M is homotopy equivalent to N and by Lemma 2.4,
N is homotopy equivalent to N o .
For the next theorem we suppose that {Mσo } is a n-dimensional complex
of manifolds with boundary over S o (L) where the vertex manifolds Mvo are allowed to have empty boundary. Further suppose that the conditions for The31
orem 2.3 are satisfied, i.e., each Mσo is aspherical, the associated simple complex of groups GS(L) is developable and BGS(L) ∼ BG for G = lim GS(L)
(so the K(π, 1)-Question has a positive answer).
Theorem 2.7. Let {Mσo }σ∈S o (L) be an n-dimensional complex of aspherical
manifolds with boundary. Then, with hypotheses as above:
(i) actdim G ≤ n + 1.
(ii) If L is EDCE, then actdim G ≤ n.
Proof. Statement (i) follows from Theorem 2.3 applied to the (n+1)-dimensional
system {Mσ }, where Mσ = Mσo × [0, 1]. When L is EDCE, L embeds in a
contractible complex Lc of the same dimension; so, by Proposition 2.6, M is
homotopy equivalent to the n-manifold N o . Hence, actdim G ≤ n.
Remark 2.8. Most of the constructions in Subsections 2.2 and 2.3 work
if one replaces the poset of simplices S(L) by a more arbitrary poset Q.
Specifically, suppose Q is a poset with a minimum element m and that Qo =
Q − {m}. As before, one can define the notion of a posets of manifolds with
boundary over Q and Qo , respectively, and prove versions of Theorems 2.3
and 2.7.
3
3.1
Examples
Simple complexes of closed aspherical manifolds
We begin by discussing graph products. Notation is continued from Definition 1.12 and Example 1.13: L1 is a simplicial graph with vertex set
V , L is the associated
flag complex, {Gv }v∈V is a collection of groups of
Q
type FQ
, G = L1 Gv denotes their graph product and, for each σ ∈ S(L),
Gσ = v∈Vert σ Gv is the direct product. As in Example 1.13, this defines
a simple complex of groups, GS(L) = {Gσ }σ∈S(L) . By Corollary 1.16, the
K(π, 1)-Question has a positive answer for GS(L). For each v ∈ V , let Mv
be a modelQfor BGv by a manifold of minimum dimension mv = actdim Gv .
Let Mσ = v∈Vert σ Mv .
Suppose each Mv P
has nonempty boundary and has dimension at least 2.
Let mσ = dim Mσ = v∈Vert σ dim Mv and put
n = sup{mσ | σ ∈ S(L)}
32
(3.1)
By taking products with disks of suitable dimensions, we can assume that
for each maximal simplex σ of L, dim Mσ = n. It is straightforward to
give {Mσ }σ∈S(L) the structure of an n-dimensional complex of manifolds
with boundary satisfying the conditions in Subsection 2.2. Here are the
details. Choose basepoints xv ∈ ∂Mv . Whenever µ is a face of a simplex
τ ∈QS(L), put V (τ µ) = Vert τ − Vert µ and xτ µ = (xv )v∈V (τ µ) be a basepoint
in v∈V (τ µ) ∂Mv . This gives an inclusion
iτ µ : Mµ ֒→ Mµ × xτ µ ⊂ ∂Mτ
with trivial normal bundle. For a k-simplex α = [τ0 , τ1 , . . . , τk ] ∈ L′ , define
h[α∗τ0 ] : Mµ × α → ∂Mτ0 × α
by h[α∗τ0 ] (z, x) = (iτ µ (z), x). The h[α∗τ0 ] (z, x) obviously satisfy the conditions
in Subsection 2.2; so, {Mσ′ }σ∈S(L) is a complex of manifolds with boundary.
Using Theorem 2.3, we get an n-dimensional manifold M which is a model
for BG. This gives the following.
Proposition 3.1. (cf. Theorem 2.3 and Corollary 1.16). Suppose each Gv is
the fundamental
Q group of an aspherical manifold Mv with nonempty boundary. Let G = L1 Gv be the graph product. Then
actdim G ≤ sup{mσ | σ ∈ S(L)},
where mσ = dim Mσ .
We turn to the case where each Mv is a closed aspherical manifold not
equal to a point. (For example, when G is a RAAG each Mv is a circle.)
We can convert this case into the first case by the simple expedient of taking
the product of each Mv with [0, 1]. Then Mv′ = Mv × [0, 1] is a manifold
with boundary of dimension mv + 1. Proposition 3.1 then has the following
corollary.
Corollary 3.2. Suppose each G
Qv is the fundamental group of a closed aspherical manifold Mv . Let G = L1 Gv be the graph product. Then
actdim G ≤ sup{m′σ | σ ∈ S(L)},
where Mσ′ = Mσ × [0, 1]Vert σ and m′σ = dim Mσ′ = dim Mσ + dim σ + 1.
33
The argument in Proposition 3.1 and Corollary 3.2 is easily modified to
give a sharp upper bound for actdim G in the case when some Mv have empty
boundary and some do not.
When each Mv is closed and of the same dimension m, then Corollary 3.2
has the following corollary.
Corollary 3.3. Suppose each Gv is the fundamental group of a closed aspherical
Q m-manifold Mv , that the flag complex L has dimension d, and that
G = L1 Gv is the graph product.Then
actdim G ≤ (m + 1)(d + 1)
Proof. If σ is a d-simplex, then dim Mσ′ = (m + 1)(d + 1).
The arguments above for the graph product complex of fundamental
groups of closed aspherical m-manifolds can be generalized to a simple complex of fundamental groups of closed aspherical manifolds as defined below.
Definition 3.4. A simple complex of closed manifolds over S(L) is a collection of connected, closed manifolds {Mσ }σ∈S(L) and for each τ < σ a
π1 -injective embedding iστ : Mτ ֒→ Mσ as a submanifold. There are a few
more requirements:
• M∅ is a point.
• If Gσ = π1 (Mσ ) and φστ : Gτ → Gσ is the homomorphism defined by
iστ , then the system {Gσ , φστ } is a simple complex of groups GS(L).
• If τ1 , . . . , τk are faces of σ, then the Mτi intersect transversely in Mσ .
• If τ is a face of σ, then Mτ has trivial normal bundle in Mσ .
For Gσ = π1 (Mσ ), let GS(L) = {Gσ }σ∈S(L) be the associated simple complex
of groups. If each Mσ is a model for BGσ , then {Mσ }σ∈S(L) is a simple
complex of closed aspherical manifolds.
Definition 3.5. The system {Mσ , iστ } satisfies codimension-m conditions if
Mτ has codimension m in Mσ whenever τ is a codimension one face of σ.
(This implies that for any face τ of σ, codim(Mτ , Mσ ) = m codim(τ, σ).)
34
Note that since dim M∅ = 0, the codimension-m conditions imply that
dim Mσ = m(dim σ + 1).
For the graph product complex, if each vertex manifold Mv is a closed
aspherical m-manifold, then {Mσ }σ∈S(L) is a simple complex of closed aspherical manifolds satisfying the codimension-m conditions.
In the more general case of a complex of closed manifolds, follow the
same procedure as for graph products and replace each manifold Mσ by the
manifold with boundary Mσ′ = Mσ ×[0, 1]Vert σ . Then {Mσ′ }σ∈S(L) is a complex
of manifolds with boundary as in Subsection 2.2. Theorem 2.3 allows us glue
together the {Mσ′ } to get a manifold M ′ .
Suppose GS(L) is developable, that the intersection of local groups condition (1.5) holds and that L is a flag complex (so that the K(π, 1)-Question
for GS(L) has a positive answer). Then we get an upper bound for the action
dimension as follows.
Theorem 3.6. Suppose that {Mσ }σ∈S(L) is a simple complex of closed aspherical manifolds over S(L) satisfying the codimension-m conditions. Let
G = lim GS(L) be the direct limit of the π1 (Mσ ). Also suppose as above
that L is a d-dimensional flag complex and that the K(π, 1)-Question has a
positive answer for GS(L). Then
actdim(G) ≤ (m + 1)(d + 1).
In section 4, we will prove that if Hd (L, Z2 ) 6= 0, then actdim(G) =
(m + 1)(d + 1).
Intersecting submanifolds. One way to get examples of simple complexes of closed manifolds is to start with an ambient manifold M together
with a collection of connected, smooth submanifolds (e.g., hypersurfaces),
{M(i)}i∈I , so that the M(i) intersect
T transversely and so that for each subset J of I, the intersection M(J) = i∈J M(i) is nonempty. In order to make
the indexing compatible with previous notation we must replace subsets of I
by their complements. So, we will write v(i) for I − {i} and V for {v(i)}i∈I ,
the set of complements of singletons. A subset J ⊂ I corresponds to the
complementary subset σ(J) := {v(i)}i∈I−J of V . For example, in the case
of the Q
graph product complex, all
Q manifolds are subspaces of the manifold
M = v∈V Mv , while M(i) = j∈I−{i} Mv(j) . The case of a RAAG is a
further specialization: M is the T I , the torus on I, the T (i) are coordinate
35
subtori of codimension one, the Tv(i) are coordinate circles and the Tσ are
coordinate subtori.
To simplify the discussion, suppose that I = {1, . . . , p}, that dim M = mp
and that each M(i) has the same codimension m in M. Since the intersections
are transverse and nonempty, the intersection M(I) of all the M(i) is a
nonempty finite set of points. Choose one, x0 , as the basepoint. For each
σ = σ(J) ⊂ V , let Mσ be the component of M(J) containing x0 . Thus,
dim Mσ = m(dim σ + 1).
If M is locally CAT(0) and each M(i) is totally geodesic, then each
Mσ is aspherical with fundamental group Gσ := π1 (Mσ ). By uniqueness
of geodesics, for each τ < σ the inclusion Mτ → Mσ is π1 -injective. For the
same reason, the intersection of local subgroups condition (1.5) holds. Thus,
for any simplicial complex L, GS(L) is a simple complex of groups and when
L is a flag complex, the K(π, 1)-Question has a positive answer.
Example 3.7. (Complexes of hyperbolic manifolds). First we use the above
technique to construct a system√of hyperbolic manifolds satisfying the codimension1 conditions. Suppose K = Q( d) is a totally real quadratic extension of Q
and A is the ring of algebraic integers in K. Choose ε ∈ A so that ε > 0 and
ε < 0. Define a quadratic form ϕ : Ap+1 × Ap+1 → A by
(
δij , if (i, j) 6= (0, 0),
ϕ(ei , ej ) =
−ε, if (i, j) = (0, 0),
where {ei }0≤i≤p is the standard basis. Let O(ϕ) ⊂ GLp+1 (A) be the subgroup
which preserves the quadratic form ϕ. The signature of ϕ on Ap+1 ⊗A R ∼
=
p+1
R
is (p, 1); so, over R, the group of isometries of ϕ is identified with
O(p, 1) and O(ϕ) is a uniform lattice in O(p, 1). Let Γ be a normal torsionfree subgroup of O(ϕ) (for example, for almost any prime ideal, we could take
Γ to be the corresponding congruence subgroup of√O(ϕ)). Then M p = Hp /Γ
is a closed hyperbolic manifold. The image of ( ε, 0, . . . , 0) in M p is the
basepoint. For 1 ≤ i ≤ p, let ri ∈ O(ϕ) be the reflection which sends ei
to −ei . There is an induced involution of r i on M p . Its fixed point set
is a totally geodesic submanifold of codimension one and the component
containing the basepoint is the manifold M(i). If we require Γ to be a
subgroup of SO(ϕ), then M(i) will be orientable and have trivial normal
bundle in M. For any flag complex L with vertex set in V we then get
a simple complex of closed hyperbolic manifolds {Mσ }S(L) . This system
36
behaves similarly to a complex of coordinate tori in Tp . It is easy to modify
this construction to get a subsystem of {Mσ } satisfying the codimension-m
conditions. Let p = pm. Group the first m commuting involutions together
to get an involution s1 = r1 r2 . . . rm . Continue in this fashion, defining
sj = rm(j−1)+1 · · · rmj . The fixed set of sj on M is a hyperbolic submanifold
M(j) of codimension-m. If L is a flag complex with p vertices we can use the
intersections of the M(j) as above to get a system of hyperbolic manifolds
satisfying codimension-m
conditions.
S
We have that Mσ is a model for BGS(L). The union is a piecewise
hyperbolic space. Since L is a flag complex, its all right, piecewise spherical
metric is CAT(1). Since all intersections in M were orthogonal, the relevant
S
links of the Mσ in the union are full subcomplexes of L. It follows that Mσ
is a CAT(−1) space. Hence, G = lim GS(L) is word hyperbolic.
3.2
Models for spherical Artin groups
Suppose L is a nerve of a Coxeter system (W, S) and let AS(L) be the
associated Artin complex as in Example 1.9. For any simplex σ of L, there is
a corresponding spherical Coxeter group Wσ and a spherical Artin group Aσ .
In this subsection we construct a model for BAσ by a manifold with boundary.
The group Wσ is an orthogonal linear reflection group on Rd(σ)+1 , where
d(σ) = dim σ. By complexification, Wσ acts on Cd(σ)+1 . If Aσ denotes the
arrangement of reflecting hyperplanes in Cd(σ)+1 , then by Deligne’s Theorem
in [20], the arrangement complement M(Aσ ) is a manifold model for the
classifying space of the pure Artin group P Aσ (where P Aσ denotes the kernel
of Aσ → Wσ ). Hence, M(Aσ )/Wσ is a manifold model for BAσ . Similarly,
if S(Aσ ) := S 2d(σ)+1 ∩ M(Aσ ), where S 2d(σ)+1 denotes the unit sphere in
Cd(σ)+1 , then S(Aσ )/Wσ is a model for BAσ by a manifold of dimension
2d(σ) + 1. Our actual approach will be to define a certain Wσ -invariant
bordification of S(Aσ ) (which we will denote by the same symbol) and then
use Nσ := S(Aσ )/Wσ .
Hyperplane arrangements. A hyperplane arrangement A is a finite
T collection of affine hyperplanes in Cn . The arrangement is central if H∈A H
is nonempty. Its rank, rk(A) is the maximum codimension of any nonempty
intersection of hyperplanes in A. An arrangement is essential if its rank
is n. A subspace of A is either the ambient space Cn or a nonempty intersection of hyperplanes. The set of subspaces of A, partially ordered by
37
N?
reverse inclusion, is denoted Q(A) and is called the intersection poset. So, if
F, E ∈ Q(A), then F < E ⇐⇒ F ⊃ E.
′
′′
Suppose A′ and A′′ are arrangements in Cn and Cn , respectively. Define
′
′′
A′ × A′′ to be the arrangement in Cn × Cn consisting of all hyperplanes
′′
′
of the form H ′ × Cn or Cn × H ′′ for H ′ ∈ A, H ′′ ∈ A′′ . An arrangement
A is reducible if it is isomorphic to one which admits a nontrivial product
decomposition as above. Otherwise, it is irreducible. Note that the product
of two central arrangements is central.
The codimension c(E) of a subspace E in Q(A) is the complex dimension of a complementary subspace E ⊥ ⊂ Cn . Given E ∈ Q(A) its normal
arrangement AE is defined by
AE := {H | H ∈ A and H ≤ E}.
(Often we will identify AE with the essential, central arrangement in E ⊥
obtained by intersecting the hyperplanes with the orthogonal complement
E ⊥ of E in Cn .) There is also an arrangement AE in E, called the restriction
of A to E, defined by
AE := {H ∩ E | H ∩ E is a hyperplane in E}.
Arrangement complements and their bordifications. The arrangement complement is
[
M(A) := Cn −
A.
Suppose A is an essential, central arrangement in Cn with {0} the maximum
element of Q(A).
Put
S(A) := S 2n−1 ∩ M(A) and D(A) := D 2n ∩ M(A),
where S 2n−1 and D 2n denote the unit sphere and disk in Cn . Next we want
to attach boundaries to each of these manifolds to obtain a manifold with
corners. The idea is to remove a tubular neighborhood of each E ∈ Q(A),
starting with the E of smallest dimension. There is a canonical way to do
this which we describe below.
Suppose V → E is a vector bundle over a manifold E. If s : E → V
denotes the 0-section, define the associated sphere bundle S(V ) and cylinder
bundle C(V ) by
S(V ) := (V − s(E))/R+ ,
and C(V ) := (V − s(E)) ×R+ [0, ∞),
38
where R+ is the group of positive real numbers. So, if V → E has fiber Rm ,
then the fiber of C(V ) → E is the cylinder S m−1 × [0, ∞). Note that C(V ) is
a manifold with boundary with interior V − s(E). Next, suppose that X is
a manifold, that E ⊂ X is a submanifold and that VE is the normal bundle.
Let f : VE → X be a tubular neighborhood. Define X ⊙ E := C(V ) ∪ X − E
where C(V ) is glued onto X − E via the restriction of the tubular map to
the open subset VE − s(E). The manifold with boundary X ⊙ E is called the
blowup of X along E; it is formed from X − E by adding the sphere bundle
S(VE ) as boundary.
Next we define a bordification of M(A), called the blowup of Cn along
A. Start with Cn and then blowup the subspaces E of minimum dimension
to obtain a manifold with boundary. Each element of F ∈ Q(A)<E is also
blown up to a submanifold with boundary. We continue by blowing up
subspaces of increasing dimension to obtain a manifold with corners, which
we continue to denote by M(A). (A similar procedure is described in [11, Ch.
IV].) Bordifications of S(A) and D(A) are defined in the same fashion. The
boundary of M(A) is a union of manifolds with boundary, ∂E M(A), indexed
by the proper subspaces E ∈ Q(A), where ∂E M(A) means the part of the
boundary which results from blowing up E, i.e.,
∂E M(A) = S(AE ) × Ê,
(3.2)
where S(AE ) is the blowup of the normal arrangement in the unit sphere
of E ⊥ and Ê = M(AE ) is the blowup of E along AE . (Note that the right
hand side of (3.2) is a product since the normal bundle of E in Cn is trivial.)
Thus, S(AE ) is a submanifold of ∂M(A) and for each F < E, S(AF ) ∩ E is
also a submanifold of ∂F (Ê).
If the central arrangement A decomposes as A = A1 × · · · × Ak , then
there is an obvious homotopy equivalence S(A) ∼ S(A1) × · · · × S(Ak ).
Reflection arrangements. Now suppose (Wσ , Sσ ) is a spherical Coxeter
system, where Sσ = Vert(σ). Let ARσ be the associated real hyperplane
arrangement in Rd(σ)+1 and Aσ its complexification. The intersection posets
Q(ARσ ) and Q(A) are canonically identified. As usual, S(σ) denotes the
face poset of σ. Since σ is the dual of the fundamental simplex for Wσ on
S d(σ)+1 , each face τ ≤ σ is dual to a face which corresponds to a subspace
E R (τ ) ⊆ Rd(σ)+1 or equally well to E(τ ) ⊆ Cd(σ)+1 . This gives an orderpreserving injection τ 7→ E(τ ) from S(σ) to Q(Aσ ). The subspace E(τ ) is the
39
subspace of Cd(σ)+1 fixed by Wτ ; hence, Wτ acts as a reflection group on the
normal space E(τ )⊥ . By Deligne’s Theorem, S(Aσ )/Wσ is a model for BAσ
by a manifold with boundary of dimension 2d(σ) + 1. Hence, actdim Aσ ≤
2d(σ) + 1. When (Wσ , Sσ ) is reducible this estimate can be improved. So,
suppose its irreducible components are (Wi , Si ) = (Wσi , Sσi ), where 1 ≤ i ≤
k. Put Ai = Aσi and ni = dim σi + 1. Then W = W1 × · · · × Wk and
S(A1 )/W1 × · · · × S(Ak )/Wk is a manifold model for BAσ . This gives the
following.
Proposition 3.8. Suppose the decomposition of a spherical Coxeter group
Wσ into irreducibles is given by Wσ = W1 × · · · × P
Wk . Then the spherical
Artin group Aσ has action dimension ≤ 2n − k (= 2d(σi ) + 1).
The Artin complex. Consider an Artin complex AS(L) for which the
K(π, 1)-Question has a positive answer. Suppose the dimension of L is d. As
explained in Example 1.9, since the Salvetti complex for A is of dimension
d + 1, gdim A = d + 1. So, on general principles, actdim A ≤ 2d + 2. As we
explained below, one can use the gluing technique of Subsection 2.2 to obtain
the same estimate. To this end define a complex of aspherical manifolds with
boundary {Mσ }σ∈S(L) by putting
Mσ := M(Aσ )/Wσ .
(3.3)
It is a manifold with boundary of dimension 2d(σ) + 2 and a model for
BAσ . Next we need to define embeddings iστ : Mτ ֒→ ∂Mσ , whenever
τ < σ. For a fixed σ, Aσ is an arrangement in Cd(σ)+1 . If τ < σ, then
E(τ ) is a subspace of Aσ and its normal arrangement AE(τ ) (∼
= Aτ ) is an
⊥
arrangement in E(τ ) . Choose a basepoint x ∈ Ê(σ) and identify S(AE(τ ) )
with S(AE(τ ) ) × x ⊂ ∂E(τ ) S(Aσ ). (S(AE(τ ) ) is the fiber of the sphere bundle
of the normal bundle of S(Ê(τ )) in S(Aσ ).) Hence, we get an embedding
S(AE(τ ) ) ֒→ ∂S(Aσ ). Since M(Aτ ) = S(AE(τ ) ) × [0, ∞) and M(Aσ ) =
S(Aσ ) × [0, ∞) by taking the product with the identity map on [0, ∞), we
get the embedding M(Aτ ) ֒→ ∂M(Aσ ). Taking quotients by Wσ and Wτ (=
the stabilizer of E(τ ) in Wσ ), this induces an embedding iστ : Mτ ֒→ ∂Mσ .
Here a small remark is needed: if Wτ and Wτ ′ are conjugate subgroups of Wσ ,
then, as defined, Mτ and Mτ ′ are the same submanifold of ∂Mσ ; however,
if τ 6= τ ′ , we want their images to be disjoint. This is easily arranged by
picking a different point x′ ∈ Ê(τ ′ ) for τ ′ , so that Mτ and Mτ′ will be parallel
40
submanifolds in ∂Mσ . It is then straightforward to define the dual disk Dτ
to Mτ and isotopies as in (2.9) so that {Mτ }τ ∈S(L) becomes a complex of
manifolds with boundary. Applying Theorem 2.3 we get a manifold with
boundary M of dimension 2d + 2 which is a model for BA. This gives an
alternate proof for the following.
Proposition 3.9. Suppose the K(π, 1)-Question has a positive answer for
AS(L). Let A = lim AS(L) and d = dim L. Then actdim A ≤ 2d + 2.
Permutohedra. When L is EDCE and the manifolds over the vertices of
L are closed, it is necessary to use a trick with permutohedra in order to
apply the method of Subsection 2.3 to get sharp upper bounds for the action
dimensions. This trick is already needed in the case of Artin groups, indeed
for RAAGs. In the case of a RAAG, AL , our complex of groups is given by the
fundamental groups of a complex of tori {Mτ }τ ∈S(L) , where Mτ = (S 1 )Vert τ .
In Corollary 3.3 we produced a manifold model for AL of dimension 2d + 2
(where d = dim L) by using as a complex of manifolds with boundary Mτ′ :=
Mτ × I Vert τ . When L is EDCE the dimension can be decreased by one using
the complex of manifolds with boundary, Nτ = Mτ × P (τ ) where P (τ ) is a
certain d(τ )-dimensional polytope called a “permutohedron”. We shall see
in Subsection 3.3 below that the same trick works for any complex of closed
aspherical manifolds.
Definition 3.10. Suppose σ is a d-simplex. The permutohedron on σ, denoted by P (σ), is the d-dimensional convex simple polytope obtained by
truncating the proper nonempty faces of σ. The facets of P (σ) are indexed
by the elements of the interval (∅, σ) in S(σ). (A facet is a face of codimension
one). Denote the facet corresponding to τ by ∂τ P (σ). Alternatively, P (σ)
can be defined by blowing up the proper faces of σ by a procedure similar to
that described in the paragraph on bordifications in Subsection 3.2.
Whenever τ < σ, there is a natural inclusion iστ : P (τ ) → ∂τ P (σ).
Permutohedra arise naturally in blowups of hyperplane complements.
Example 3.11. Suppose A denotes the coordinate hyperplane arrangement
in Cd+1 , defined by zi = 0, 0 ≤ i ≤ d. Let ∆ be the spherical d-simplex
defined by ∆ = [0, ∞)d+1 ∩ S d and define p : S 2d+1 → ∆ by (z0 , . . . , zk ) 7→
(|z1 |2 , . . . , |zk |2 ). As in subsection 3.2, let S(A) denote the blowup of the
coordinate hyperplane arrangement in the unit sphere of Cd+1 . The map p
41
induces a map p̂ : S(A) → P (∆) which is the projection map of a trivial
bundle with fiber T d+1 . Hence, the coordinate hyperplane complement S(A)
is diffeomorphic as a manifold with corners to T d+1 × P (∆).
Example 3.12. More generally, suppose A is a central hyperplane arrangement in Cn and that A = A0 × · · · × Ak is its decomposition into irreducible
components. Since M(A) ∼
= M(A0 ) × · · · × M(Ak ), we see that S(A) is homotopy equivalent to S(A0 )×· · ·×S(Ak ). In fact, by using a permutahedron
we get a corresponding diffeomorphism of manifolds with corners,
∼
=
S(A) −→ [S(A0 ) × · · · × S(Ak )] × P (∆),
(3.4)
where P (∆) is a permutohedron of dimension k. If Ai is an arrangement in
Cn(i) , then Cn = Cn(0) ×· · ·×Cn(k) . A vector in Cn is given by (z(0), . . . , z(k)),
where z(i) ∈ Cn(i) . Define p : S 2n−1 → ∆ by (z(0), . . . , z(k)) 7→ (|z(0)|2 , . . . , |z(k)|2 ).
There is an induced map on blowups, p̂ : S(A) → P (∆). Using p̂ and the
various projections we get (3.4). For example, suppose Wσ is a spherical
Coxeter group and that Wσ = W0 × · · · × Wk is its decomposition into irreducibles. As in the paragraph above on reflection arrangements, let Ai be
the reflection arrangement corresponding to Wi and Aσ the arrangement for
W . As in (3.3), put Mσ = S(Aσ )/Wσ and Mi = S(Ai )/Wi . By (3.4) we have
a diffeomorphism of manifolds with corners:
∼
=
Mσ −→ [M0 × · · · × Mk ] × P (∆).
3.3
L is EDCE
When L is EDCE (cf. Definition 1.24) we can decrease by 1 our estimates
of upper bounds for the action dimension in Propositions 3.1 and 3.9, Theorem 3.6 and Corollaries 3.2 and 3.3. In each case we apply Theorem 2.7 of
Subsection 2.3. We assume throughout this subsection that dim L = d.
We first consider the Artin group case. When L is EDCE we can improve
the upper bound in Proposition 3.9 to get the following result, first proved
in [30].
Proposition 3.13. Suppose the K(π, 1)-Question has a positive answer for
AS(L). If L is EDCE, then actdim A ≤ 2d + 1 (= 2 gdim A − 1).
Sketch of Proof. To prove this we essentially use the same complex of manifolds with boundary as in the paragraph on the Artin complex in Subsection 3.2, except that M(Aσ )/Wσ is replaced by S(Aσ )/Wσ . So, we start with
42
the complex of aspherical manifolds {Mσo }σ∈S o (L) , where Mσo = S(Aσ )/Wσ .
By taking products with other disks, we can arrange that for all maximal
simplices σ, each Mσo has dimension 2d + 1. Next embed L in a contractible
simplicial complex Lc of the same dimension d. As in Proposition 2.6, there
is a trivial extension of this to a complex of manifolds with boundary over
S o (Lc ). Finally, apply Theorem 2.7 to get the result.
Essentially the same argument gives the following improvement of Theorem 3.6.
Theorem 3.14. Suppose that {Mσ }σ∈S(L) is a simple complex of closed aspherical manifolds over S(L) satisfying the codimension-m conditions. Let
G = lim GS(L) be the direct limit of the π1 (Mσ ). Also suppose as before that
L is a d-dimensional flag complex and that the K(π, 1)-Question for GS(L)
has a positive answer. If L is EDCE, then
actdim(G) ≤ (m + 1)(d + 1) − 1.
Sketch of Proof. For each σ ∈ S o (L), let Nσo = Mσ × P (σ), where P (σ) is
a permutohedron (cf. Definition 3.10). By taking products with other disks
we can arrange that for all maximal simplices σ the dimensions of the Nσo are
equal. Then the complex of manifolds with boundary {Nτo }τ ∈S o (L) is a complex of manifolds with boundary satisfying the conditions in Subsection 2.3.
The proof is finished exactly as in the proof of the previous proposition: embed L in a contractible simplicial complex Lc of the same dimension d; there
is a trivial extension of {Nσo } to a complex of manifolds with boundary over
S o (Lc ); then use Theorem 2.7 to complete the proof.
For the graph product complex of fundamental groups, Theorem 3.14 has
the following corollary (cf. Corollary 3.3), which gives part (ii) of Theorem
B in the Introduction.
Corollary 3.15. Suppose L is a flag complex, that for each v ∈ Vert L,
Gv isQthe fundamental group of a closed aspherical m-manifold Mv and that
G = L1 Gv is the graph product. If L is EDCE, then
actdim G ≤ (m + 1)(d + 1) − 1
The case of a RAAG is where m = 1. Then, it is proved in [1] that for
d 6= 2, the EDCE condition, can be replaced with the weaker condition that
Hd (L, Z2 ) = 0.
43
Remark 3.16. On the other hand, Corollaries 3.3 and 3.15 have advantages
over the results of [1]. For example, suppose dim L = d and that G is
the graph product over L1 of free abelian groups of rank m. Then gdim G =
m(d+1). The group G also is the RAAG associated to the simplicial complex
L̄, which is the polyhedral join over L of (m − 1)-simplices. (The notion of
a “polyhedral join” is defined in Definition 4.6 below.) So, dim L̄ = m(d +
1) − 1. Corollary 3.3 yields, actdim G ≤ (m + 1)(d + 1), while [1] only gives,
actdim G ≤ 2 dim L̄ + 2 = 2m(d + 1). (When L is EDCE both estimates can
be improved by 1: Corollary 3.15 gives actdim G ≤ (m + 1)(d + 1) − 1 while
[1] gives actdim G ≤ 2m(d + 1) − 1).
4
Obstructors
˜
The ordered 2-point configuration space C(X)
of a space X is the space of
ordered pairs of distinct points in X, i.e.,
˜
C(X)
= (X × X) − D,
where D denotes the diagonal (in many situations it will be better to remove
a neighborhood of the diagonal). The 2-point configuration space C(X) is
the space of unordered pairs of distinct points:
˜
C(X) := C(X)/Z
2,
˜
where Z2 acts by switching the factors. The double cover C(X)
→ C(X)
∞
is classified by a map c : C(X) → RP = BZ2 . Let w1 denote the nontrivial element of H 1 (RP ∞ , Z2 ), so that (w1 )n is the nontrivial element of
H n (RP ∞ , Z2 ).
Definition 4.1. The Z2 -valued van Kampen obstruction for X in dimension
n, vkn (X) ∈ H n (C(X); Z2 ), is defined by vkn (X) = c∗ (w1 )n .
If vkn (X) 6= 0, then we say X is an n-obstructor.
Remark. One can also define a Z-valued van Kampen obstruction by replacing w1 by the nontrivial element of H 1 (RP ∞ ; Z− ) where Z− means twisted
integer coefficients (cf. [1]). We will not use this refinement in this paper.
44
Definition 4.2. A map f : X → Y between metric spaces is a coarse
embedding if there exist two nondecreasing functions ρ+ , ρ− : R+ → R+ such
that limt→∞ ρ− (t) = ∞ and
ρ− (d(x, y)) ≤ d(f (x), f (y)) ≤ ρ+ (d(x, y)).
Given a finite simplicial complex K, let
Cone∞ K := K × [0, ∞)/K × {0}
denote the cone of infinite radius on K. Equip Cone∞ K with a proper metric
so that for each pair of disjoint simplices σ and τ , the distance between
σ × [t, ∞) and τ × [t, ∞) goes to infinity as t → ∞.
Suppose, for simplicity, that the group G is of type F . The method of [4]
consists of the following two steps.
(1) Find a coarse embedding Cone∞ K → EG for a suitable complex K.
(2) Compute the van Kampen obstruction of K in degree n. (By the Linking Lemma of [4, p. 223], this is an obstruction to coarsely embedding
Cone∞ K in a contractible (n + 1)-manifold).
Putting this together, we have the following definition from [4].
Definition 4.3. The obstructor dimension of G, denoted obdim G, is the
maximal n + 2 such that there exists a complex K with nonzero van Kampen
obstruction in degree n and a coarse embedding of Cone∞ (K) → EG.
Remarks 4.4. (i) Since Bestvina-Kapovich-Kleiner [4] want to define obstructors for a general group G, instead of using (1) they consider proper,
expanding, Lipschitz maps from the 0-skeleton of Cone∞ K to G. When
G acts cocompactly on EG this amounts to finding a coarse embedding
Cone∞ (K) → EG.
(ii) For a finite complex K, the cohomology class vkn (K) is the classical obstruction for finding a PL embedding of K into Rn . Indeed, if K
embeds in Rn , then C(K) embeds in C(Rn ) ∼ RP n−1, i.e., C(K) classifies
into RP n−1 and hence, vkn (K) = c∗ (w1 )n = 0. In the converse direction,
suppose F : K → Rn is a PL map in general position and that Σ is a mod
two n-cycle in C(K). Then the result of evaluating the cohomology class
on the cycle, hvkn (K), Σi, counts the self-intersections of F which lie in Σ.
45
(This is explained in [4, §2.1].) In Subsection 4.4 we will use this method
of calculating self-intersections of general position maps to prove certain van
Kampen obstructions are nonzero.
(iii) If G is a word-hyperbolic group or if EG is a CAT(0)-space, then EG
has a Z-set compactification EG. Put ∂G := EG − EG. If a finite simplicial
complex K is a subspace of ∂G, we get a coarse embedding Cone∞ K → EG
by choosing a basepoint in EG and coning off K.
The coarse van Kampen obstruction. A generalization of (1) is used by
Yoon in [36]. He considers instead coarse embeddings f : T → EG for some
contractible CW complex T with a proper metric into EG. We are assuming
BG is a finite complex and that EG has a length metric induced from a
length metric on BG. As in [4], Yoon considers the van Kampen obstruction
for embedding T in a contractible (n+1)-manifold. The 2-point configuration
space of a contractible (n + 1)-manifold W is homotopy equivalent to RP n .
˜ ) ⊂ C(W
˜ ) and hence, c : C(T ) → RP ∞ factors
If T embeds in W , then C(T
n+1
n
through RP . So, if vk (T ) 6= 0, then T does not embed in a contractible
(n + 1)-manifold. The following lemma of [4, Lemma 8] is important, at least
psychologically, to understanding the case T = Cone∞ K.
Lemma 4.5. (The Cone Lemma of [4]). If K is an n-obstructor, then
Cone K is a (n + 1)-obstructor, i.e., vkn+1 (Cone K) = vkn (K).
One actually needs to show the stronger result that T does not coarsely
embed in any contractible (n + 1)-manifold. For T = Cone∞ K this is proved
in [4] by using the Linking Lemma. In the case of a more general contractible
complex T , Yoon considers the “deleted configuration spaces” C˜r (T ) := [(T ×
T )−Nr (D)], where Nr (D) means a Z2 -stable r-neighborhood of the diagonal.
One then needs to show that the van Kampen obstruction remains nonzero
on the quotients, Cr (T ) := C˜r (T )/Z2 . So, we define the coarse van Kampen
obstruction to be the image of vkn+1 (T ) in limr→∞ H n+1 (Cr (T ); Z2 ). We
define the proper obstructor dimension of G, denoted pobdim(G), to be the
maximal n+1 such that there is a coarse embedding of a contractible complex
T into EG such that the coarse van Kampen obstruction of T in dimension
n is nonzero. Yoon shows that pobdim(G) ≤ actdim(G).
46
4.1
Configurations of subgroups and sheets
Definition 4.6. Suppose {Xv }v∈V is a collection of spaces indexed by the
vertex set V of a simplicial complex L. For σ ∈ S o (L), let X(σ) denote the
join v∈Vert σ Xv . Define the polyhedral join over L of the {Xv }v∈V by
[
X(σ).
(4.1)
L Xv :=
∗
∗
σ∈S o (L)
As in Subsection 1.1, suppose that GQ = {Gσ }σ∈Q is a developable complex of groups with |Q| simply connected, that BGQ is its aspherical realization and that G = π1 (BGQ) = lim GQ. Put
[
G :=
Gσ
(4.2)
σ∈Q
and call it a configuration of standard subgroups.
Suppose each finite subset
T
{σ1 , . . . σk } has a greatest lower bound, σi . With the word metrics, each
inclusion Gσ ֒→ G is a coarse embedding. Furthermore, given any two subgroups H1 and H2 of G, the coarse intersection of H1 and H2 in G is coarsely
equivalent to their actual intersection
T H1 ∩ H2 (see [32] for precise definitions
of the coarse intersection). Since Gσi = GT σi , this implies the inclusion of
the configuration G into G is also a coarse embedding.
Let EGQ denote the universal cover of BGQ. For each σ, choose a
basepoint b′σ ∈ BGσ and a path connecting it to the basepoint b′ ∈ BGQ
(BGσ is a subcomplex of BGQ). Choose a lift of b′ to a basepoint b ∈ EGQ.
The path from b′ to b′σ lifts to a path from b to a point bσ . Let EGσ denote
the component of the inverse image of BGσ in EGQ containing the basepoint
bσ (so, EGσ is a copy of the universal cover of BGσ ). Put
[
EG :=
EGσ
(4.3)
σ∈Q
and call it a standard configuration of sheets in EGQ. Identify the Gσ -orbit
of bσ with the group Gσ . If each Gσ is type F , then EG is quasi-isometric
to the union of orbits Gb. Hence, EG ֒→ EGQ also is a coarse embedding in
the type F case.
Example 4.7. (RAAGs). As in Example 1.9, suppose AL is the RAAG
associated to a flag complex L and that AS(L) is the Artin complex. For
47
each σ ∈ S(L), let Rσ denote the Euclidean space with basis Vert σ, let
Zσ ⊂ Rσ be the integer lattice and let T σ = Rσ /Zσ be the torus. The local
group Aσ is Zσ . The spaces BAσ and EAσ are identified with T σ and Rσ ,
respectively. Let d(σ) = dim σ. The octahedron on σ, denoted Oσ, is the
(d(σ) + 1)-fold join of S 0 ’s, where the copies of S 0 are indexed by Vert σ. So,
each standard sheet Rσ is identified with Cone∞ Oσ and the configuration of
standard sheets EG is identified with Cone∞ OL, where, as in Definition 4.6,
OL denotes the polyhedral join of 0-spheres, i.e.,
[
OL := L S 0 =
Oσ.
(4.4)
∗
σ∈S o (L)
Sometimes we shall consider finer configurations of subgroups. Suppose
each local group Gσ contains a simple complex of groups Q⊘ (σ), where the
poset Q⊘ (σ) has geometric realization homeomorphic to that of Q≤σ . Moreover, the union of these posets will be the poset of simplices in a simplicial
complex Q⊘ with the same geometric realization as Q. For each α ∈ QS
⊘ (σ),
the corresponding local group Hα is a subgroup of Gσ . S
Then H(σ) := Hα
is a configuration of subgroups in Gσ and EH(σ) := EHα is a configuration of sheets in EGσ . Taking
S the union over all σ ∈ Q, we get a configuration
S of subgroups H := H(σ) ⊂ G and a configuration of sheets
EH := EH(σ) ⊂ EG. The archetype is the case of a general Artin group
A considered in [15]. This is explained in the next example.
Example 4.8. (The configuration of standard free abelian subgroups in an
Artin group). As in Example 1.9, let AS(L) denote the Artin complex associated to a Coxeter system (W, S) with nerve L. Let AL be the associated
Artin group. For each σ ∈ S(L), Wσ is the corresponding spherical Coxeter
group and Dσ is its Coxeter diagram. As explained in [15], there is a subdivision σ⊘ of σ whose vertices correspond to the connected subdiagrams of
Dσ . In other words the vertices of σ⊘ are the irreducible special subgroups of
Wσ . Corresponding to each vertex we have the infinite cyclic group generated
by the element ∆2σ in the pure spherical Artin group P Aσ . So, the group
corresponding to a vertex s of L is the square of the corresponding Artin
generator xs . The simplices of σ⊘ index the standard free abelian subgroups
of Aσ . These subdivisions of simplices fit together to give a subdivision L⊘
of L. For example, the edge {s, t} of L is subdivided into two edges exactly
when 3 ≤ mst < ∞. This leads to the configuration of standard free abelian
48
subgroups in AL and a configuration of standard flats in AS(L):
[
[
Zα ⊂ AL and
Rα ⊂ EAS(L).
α∈S(L⊘ )
α∈S(L⊘ )
Moreover, the configuration of standard flats is isometric to Cone∞ OL⊘ ,
where, as in (4.4), OL⊘ , is a polyhedral join of 0-spheres. So, when the
K(π, 1)-Question for AS(L) has a positive answer, Cone∞ OL⊘ is coarsely
embedded in EAL .
It follows from [15] that the inclusion of standard infinite subgroups corresponding to the vertices of L⊘ defines a homomorphism Φ : AL⊘ → AL
from the RAAG AL⊘ to the Artin group AL . This leads us to the following.
Conjecture 4.9. The homomorphism Φ : AL⊘ → AL is injective.
Conjecture 4.9 is related to a conjecture of Tits which was proved by
proved by Paris and Crisp in [10]. Let Γ denote the subgraph of L1 consisting
of the edges labeled 2. Let AΓ be the RAAG defined by Γ. There is a
homomorphism AΓ → AL which sends each generator for AΓ to the square
of the corresponding generator for AL . Since the flag complex determined by
Γ is a full subcomplex of L⊘ , the Tits Conjecture amounts to the conjecture
that the homomorphism Φ in Conjecture 4.9 is injective. Conjecture 4.9 is
still open even for spherical Artin groups. For example, if A is the braid group
B4 , the Tits Conjecture states that there is an injective homomorphism from
Z2 ∗ Z into B4 , whereas our conjecture predicts an injective homomorphism
from the RAAG, ACone(C5 ) to B4 , where C5 is a five-cycle.
There are similar configurations of abelian subgroups for affine hyperplane
complements (cf. section 5). The configurations of free abelian and nilpotent
groups in [3] as well as the configurations of free abelian subgroups generated
by Dehn twists and“Mess subgroups” in the mapping class group in [23]
follow similar lines.
4.2
The complex Om L
Given a d-dimensional flag complex L, let Om L denote the polyhedral join
of (m − 1)-spheres, as in Definition 4.6, i.e.,
[
Om L := L S m−1 :=
Om σ,
∗
σ∈S o (L)
49
where Om σ denotes the (d(σ) + 1)-fold join of (m − 1)-spheres, Sv , indexed
by Vert σ (eventually each of these (m − 1)-spheres will be given a simplicial
structure). Thus, Om σ is a sphere of dimension m(d(σ) + 1) − 1. So, the
dimension of Om L is m(d + 1) − 1. We denote this dimension by δm (L) (or
simply by δ):
δ = δm (L) := dim Om L = m(d + 1) − 1
(4.5)
Let OL = O1 L. In [1] the van Kampen obstruction of OL was computed in
many cases.
Theorem 4.10. ([1]). Let L be any d-dimensional flag complex. If Hd (L; Z2 ) 6=
0, then vk2d (OL) 6= 0. Therefore, actdim AL = 2 gdim AL = 2d + 2.
The idea for the proof of this in [1] was to construct a specific 2d-cycle
Ω in the 2-point configuration space C(OL) so that vk2d (OL) evaluates nontrivially on Ω. In the following subsections, we will generalize this to Om L.
The main result in this section is the following.
Theorem 4.11. Suppose L is a d-dimensional flag complex and that δ =
dim Om L = m(d + 1) − 1. If Hd (L; Z2 ) 6= 0, then Om L is a (δ + d)-obstructor.
The proof of Theorem 4.11 will occupy Subsection 4.5. A similar result
holds for polyhedral joins of spheres over L when the spheres are allowed be
of different dimensions, and the proof is essentially the same as the proof of
Theorem 4.11. Note that δ + d = m(d + 1) − 1 + d = (m + 1)(d + 1) − 2.
Before proving Theorem 4.11, we note in the following proposition that
the vanishing of the van Kampen obstruction of Om L in degrees higher than
δ + d follows from the gluing constructions as in Corollaries 3.3 and 3.15.
Proposition 4.12. Suppose L is a d-dimensional flag complex and that δ =
dim Om L.
(i) vkδ+d+1 (Om L) = 0.
(ii) If L is EDCE, then vkδ+d (Om L) = 0.
Proof. For each v ∈ Vert L, choose
Q a closed, nonpositively curved m-manifold
Mv . Put Gv = π1 (Mv ) and let L Gv be the graph product of the {Gv }. As
before, BGS(L) is the polyhedral product of the Mv . Then Cone∞ Om L can
be identified with the configuration of standard sheets in EG. By Proposition 3.1, BG thickens to a manifold of dimension (m + 1)(d + 1) = δ + d + 2.
50
So, Cone∞ Om L coarsely embeds into a contractible (δ + d + 2)-manifold
and hence, vkn (Om L) = 0 for n ≥ δ + d + 1, giving statement (i). Similarly, if L is EDCE, then BG thickens to a (δ + d + 1)-manifold, so that
vkδ+d (Om L) = 0.
Remark 4.13. One can give a different argument for Proposition 4.12 (i)
by showing directly that Om L has an embedding of codimension (d + 1) in
Euclidean space and hence, that vkδ+d+1 (Om L) = 0.
4.3
Sheets of contractible manifolds
As in Definitions 3.4 and 3.5, suppose {Mσ }σ∈S(L) is a simple complex of
closed aspherical manifolds over S(L) satisfying the codimension-m conditions. Let GS(L) be the associated simple complex of groups. Put G =
lim GS(L). Assume the K(π, 1)-Question has a positive answer for GS(L).
fσ be the copy of
Each Mσ is a subspace of BG (= BGS(L)). Let M
S
fσ
its universal cover containing a given basepoint b ∈ EG. Let EG = M
fσ is CAT(0) and if its visual boundary,
be the union of sheets. If each M
fσ , is homeomorphic to the sphere Om σ, then M
fσ is homeomorphic to
∂∞ M
Cone∞ (Om σ) = Rm(d(σ)+1) . Hence, EG is homeomorphic to Cone∞ (Om L).
fτ intersect transversely; so that for
This uses the assumption that the M
fτ is identified with the standard subsphere
τ < σ, the visual sphere of M
Om τ ⊂ Om σ. By Theorem 4.11, if Hd (L; Z2 ) 6= 0, then vkδ+d (Om L) 6= 0 and
hence, obdim G ≥ δ + d + 2.
Our goal in this subsection is to show how to generalize this without the
fσ has a Z-set compactification with boundary a sphere. In
assumption that M
fσ is simply connected at infinity.
particular, we do not need to assume that M
So, assuming Theorem 4.11 (which will be proved in the next subsection),
we here prove the following.
Theorem 4.14. Suppose that {Mσ }σ∈S(L) is a simple complex of closed aspherical manifolds over S(L), where L is a d-dimensional flag complex. Take
hypotheses and notation as above. If Hd (L, Z2 ) 6= 0, then the coarse van
Kampen obstruction of EG in degree δ + d + 1 is nonzero. So, pobdim G ≥
δ + d + 2. Hence, actdim G = δ + d + 2.
This theorem applies, for example, when G is the graph product of fundamental groups of closed aspherical manifolds.
51
f
To simplify notation write
S Eσ instead ofSMσ and Cσ instead of Cone(Om σ).
Also, write E for EG = Eσ and C for Cσ . We can identify Cσ with an
open neighborhood of the basepoint in Eσ . Thus, C is an open neighborhood of the basepoint b in E and C × C is an open neighborhood of (b, b) in
E × E. The inclusion C × C ֒→ E × E takes the diagonal to the diagonal
˜
˜
so we have a Z2 -equivariant inclusion C(C)
֒→ C(E)
inducing an inclusion of
2-point configuration spaces, i : C(C) ֒→ C(E).
˜
˜
Lemma 4.15. The inclusions C(C)
֒→ C(E)
and i : C(C) ֒→ C(E) are both
homotopy equivalences.
We will assume that each Eσ comes with a proper Gσ -invariant metric
so that the inclusions Eτ ֒→ Eσ are isometries. Extend these metrics to a
metric on E by taking the induced path metric. This implies that if x and
y are points in E such that x ∈ Eσ , y ∈ Eτ , then there is a point z ∈ Eσ∩τ
with d(x, z) + d(y, z) = d(x, y). As in [36], let Nr be an r-neighborhood of
the diagonal D in E × E. Write C˜r (E) for (E × E) − Nr and Cr (E) for its
quotient by the free Z2 -action.
Lemma 4.16. The inclusions Cr (E) ֒→ C(E) induce an isomorphism on
cohomology:
∼
=
H ∗ (C(E))−→ lim H ∗ (Cr (E)),
r→∞
where lim means direct limit.
Both Lemmas 4.15
S and 4.16 have similar proofs.
Note that E = Eσ is a poset of contractible manifolds
over S(L). In
S
particular, that Eσ ∩ Eτ = Eσ∩τ . Similarly, E × E = (σ,τ ) Eσ × Eτ is a poset
of contractible manifolds over S(L)×S(L). The diagonal D(E) intersects the
terms in this decomposition as follows: (Eσ ×Eτ )∩D(E) = Dσ∩τ , where Dσ∩τ
denotes the diagonal in Eσ∩τ × Eσ∩τ . It is a properly embedded, contractible
submanifold with trivial normal bundle in the contractible manifold Eσ∩τ ×
Eσ∩τ . Thus,
[
˜
C(E)
:= (E × E) − D(E) =
(Eσ × Eτ ) − Dσ∩τ .
(σ,τ )
The manifold (Eσ × Eτ ) − Dσ∩τ is homotopy equivalent to a normal sphere
S c(σ,τ )−1 , where c(σ, τ ) is the codimension of Dσ∩τ in Eσ × Eτ . The normal
vector space of Dσ∩τ in Eσ ×Eτ decomposes as V a + V b + V d , where V a is the
52
normal space of Eσ∩τ in Eσ , V b is the normal space of Eσ∩τ in Eτ , and V d is
the normal space of Dσ∩τ in Eσ∩τ . Thus, S c(σ,τ )−1 has a join decomposition
as S a−1 ∗S b−1 ∗S d−1 . The involution (switching factors) maps V a and V b into
different factors and acts by the antipodal map on V d . It follows that the
image of the normal sphere to Dσ∩τ in (Eσ × Eτ ) in the 2-point configuration
space C(E) is homotopy equivalent to S a−1 ∗S b−1 ∗RP d−1 , i.e., to a suspension
of projective space.
The previous
S paragraph goes through, mutatis mutandis, for the union
of cones C = Cσ , as well as, for its ordered 2-point configuration space,
˜
C(C).
˜
˜
Proof of Lemma 4.15. Both C(C)
and C(E)
are posets of spaces over (S(L)×
S(L))>(∅,∅) . The geometric realization of this poset is the join, L ∗ L. The
˜
˜
relative homology groups of (C(E),
C(C))
can be computed from a spectral
sequence for the poset of spaces, e.g., see [19]. Its E 1 -page is
1
Epq
= Cp (L ∗ L; Hq ((Eσ × Eτ ) − D, (Cσ × Cτ ) − D)).
(The coefficients in this spectral sequence are not locally constant). Since
Cσ ×Cτ −D ֒→ Eσ ×Eτ −D is a homotopy equivalence, Hq (Eσ ×Eτ −D, Cσ ×
˜
˜
Cτ −D) = 0 for all q. Hence, H∗ (C(E),
C(C))
vanishes in all degrees. When L
˜
is connected, L ∗ L is simply connected; so, by van Kampen’s Theorem, C(C)
˜
˜
and C(E) are simply connected. Hence, by Whitehead’s Lemma, C(C) ֒→
˜
C(E)
is a homotopy equivalence. A more careful analysis yields the same
statement even when L is not connected. We shall not give the argument
since all we need is that the map induces an isomorphism on homology.
˜
˜
Since C(C)
֒→ C(E)
is Z2 -equivariant it induces a homotopy equivalence
C(C) → C(E).
To prove Lemma 4.16, first note that C˜r (E) also has a decomposition as
a poset of contractible manifolds:
[
C˜r (E) =
(Eσ × Eτ ) − Nr (Dσ∩τ ),
(σ,τ )
where Nr (Dσ∩τ ) means the r-neighborhood of Dσ∩τ in Eσ × Eτ . By coarse
Alexander duality (e.g., see [36]), (Eσ × Eτ ) − Nr (Dσ∩τ ) has the same prohomology type as (Eσ ×Eτ )−Dσ∩τ (which is homotopy equivalent to S c(σ,τ )−1 );
53
so, the inclusions induce an isomorphisms:
H ∗ (S c(σ,τ )−1 ) = H ∗ ((Eσ × Eτ ) − Dσ∩τ ) → lim H ∗ ((Eσ × Eτ ) − Nr (Dσ∩τ )).
r→∞
(4.6)
Proof of Lemma 4.16. The cohomology spectral sequences for the poset of
spaces give spectral sequences with E1 -pages:
E1pq = C p (L ∗ L; H q ((Eσ × Eτ ) − Dσ∩τ ))
E1pq (r) = C p (L ∗ L; H q ((Eσ × Eτ ) − Nr (Dσ∩τ )))
By (4.6), the inclusions induce an isomorphism, E1pq → lim E1pq (r) and hence,
by the comparison theorem for spectral sequences, an isomorphism,
∼
=
˜
−→ lim H ∗ (C˜r (E)).
H ∗ (C(E))
r→∞
There is a similar isomorphism for H ∗ (Cr (E)).
Proof of Theorem 4.14. By Theorem 4.11, vkδ+d (Om L) 6= 0. By Lemma 4.5,
this implies vkδ+d+1 (Cone(Om L)) 6= 0. By Lemma 4.15, its image vkδ+d+1 (E) ∈
H δ+d+1 (C(E)) also is not zero. Finally, by Lemma 4.16, the coarse van Kampen obstruction (i.e., the image of this class in lim H δ+d+1 (Cr (E))) is 6= 0.
Therefore, pobdim G ≥ δ + d + 2. Since, by Proposition 3.1, actdim G ≤
δ + d + 2, the last sentence of the theorem follows.
4.4
The van Kampen obstruction and general position
For a finite simplicial complex K there is an equivalent definition of the van
Kampen obstruction in terms of a general position map of K into Euclidean
space which we now describe. First, replace C(K) by the simplicial 2-point
configuration space of K:
C(K) = [(K × K) − D]/Z2 ,
(4.7)
where D = {(σ, τ ) ∈ K × K | σ ∩ τ 6= ∅} is a simplicial thickening of
the diagonal. Since the 2-point configuration space and the simplicial 2point configuration space are homotopy equivalent, we can denote both C(K)
without risking confusion.
54
Definition 4.17. Let K be a k-dimensional simplicial complex, and let f :
K → Rn be a general position map. This means, in particular, that if σ
and τ are two disjoint simplices of K with dim σ + dim τ = n, then the
images of σ and τ intersect in a finite number of points. The van Kampen
obstruction vkn (K) ∈ H n (C(K); Z2 ) is the cohomology class of the cocycle
νκ (= νκn (K)) defined by
hνκ, {σ, τ }i = |f (σ) ∩ f (τ )| mod 2,
where {σ, τ } means an unordered pair of disjoint simplices in K (we are using
|X| to denote the cardinality of a finite set X).
Generalizing [31, Appendix D], we give the following description of a
cocycle representing vkn (K). Given any total ordering of the vertices of K,
there is a general position map f from K to Rn defined by sending the ith
vertex in K to λ(i), where λ = (t, t2 , . . . , tn ) ∈ Rn is the moment curve,
and extending linearly. Suppose σ, τ ∈ K with dim σ + dim τ = n. The
convex hull of the union of vertices of f (σ) and f (τ ) is the cyclic polytope
C(n + 2, n). If σ and τ intersect, then neither of them can be contained
in faces of C(n + 2, n). The faces of C(n + 2, n) are completely determined
by Gale’s Evenness Condition, which in this case says that a set T of n
vertices of C(n + 2, 2) spans a face if and only if the two missing elements in
Vert(C(n + 2, n)) − T are separated by an even number of elements of T .
Two simplices σ and τ with dim(σ) + dim(τ ) = n are said to be meshed
if the order on their vertices is either
v0 < w0 < v1 < w1 < · · · < vn/2 < wn/2 , or
v0 < w0 < v1 < w1 < · · · < w(n−1)/2 < v(n+1)/2 .
Lemma 4.18. Two simplices σ and τ with dim(σ) + dim(τ ) = n intersect
under the map f if and only if they are meshed.
Proof. If σ and τ are not meshed, there are two vertices vi and vi+1 of σ with
no vertex of τ between them. In C(n + 2, n) the union of the vertices of f (τ )
and all other vertices of f (σ) except vi and vi+1 spans a face by the evenness
condition. Therefore, f (τ ) is contained in a face of the cyclic polytope and
so cannot intersect f (σ).
If σ and τ are meshed, then the evenness condition implies that f (σ) and
f (τ ) are not proper faces of C(n + 2, n).
55
Suppose that f (σ) and f (τ ) do not intersect. Let H be a hyperplane
separating f (σ) and f (τ ), so that H partitions the vertices of C(n + 2, n)
into Vert f (σ) and Vert f (τ ). If f (σ) (or f (τ )) is in the interior of C(n+2, n),
then another vertex of C(n + 2, n) is on the same side of H; hence, f (σ) ⊂
∂C(n + 2, n), a contradiction.
Note that if the difference between the dimensions of σ and τ is greater
than one, then f (σ) and f (τ ) are disjoint.
4.5
Proof of Theorem 4.11
We recall the construction in [1]. Suppose that L is a d-dimensional complex
with Hd (L; Z2 ) 6= 0, and suppose C is a d-cycle in L with coefficients in
Z2 . Identify C with its support. Choose a d-simplex ∆ ∈ C with vertices
v0 , . . . , vd . Let vi± denote the two vertices in OC lying above vi . Let D C (∆)
be the full subcomplex of OL containing C − and the vertices v0+ , . . . , vd+ of
∆+ . We say D C (∆) is C doubled over the simplex ∆. Suppose α, β are
disjoint d-simplices in D C (∆). Define a chain Ω ∈ C2d (C(D C (∆)); Z2 ) by
declaring the 2d-cell {α, β} of C(D C (∆)) to be in Ω if and only if
• α ∩ β = ∅, and
• Vert ∆ ⊂ p(Vert α) ∪ p(Vert β). (Here p : Vert OL → Vert L is the
natural projection.)
It is proved in [1] that Ω is a cycle and that νκ2d (D C (∆)) evaluates
nontrivially on Ω.
C
Next, we define a subcomplex Dm
(∆) of Om L. We assume that each
C
sphere in Om L is triangulated as the boundary of an m-simplex.
Let Dm
(∆)
S
be the full subcomplex of Om L containing Vert(C)×{1} Vert(∆)×{2, 3, . . . m}.
C
So, Dm
(∆) is constructed by replacing each vertex v ∈ ∆ with the boundary
of a m-simplex. As before, let δ = δm (L) denote the dimension of Om L.
Surprisingly, the above definition of Ω works in the case of Om L. Define
C
a chain Ωm in Cd+δ (C(Dm
(∆)); Z2 ) to be the union of all cells {σ, τ } such
that
• σ∩τ =∅
• Vert ∆ ⊂ p(Vert σ) ∪ p(Vert τ ).
56
It will be shown in Theorem 4.22 below that Ωm is a cycle. We first need
C
a few lemmas which restrict the possible (d + δ)-cells in C(Dm
(∆)).
Definition 4.19. For any w ∈ Vert ∆ and σ, τ ∈ Om L, let Mwστ be the
collection of missing vertices in p−1 (w), i.e., Mwστ is the set of vertices in
p−1 (w) that are not contained in σ ∪ τ .
Note that if p(σ) misses a vertex w in Vert ∆, then |Mwστ | ≥ 1 for any τ ,
since the preimage p−1 (w) does not span a simplex in Om (L).
Lemma 4.20. If {σ, τ } ∈ Ωm , then for any w ∈ Vert ∆, |Mwστ | ≤ 1.
Proof. The cardinality of Vert(σ ∪ τ ) is the same as that of Vert p−1 (∆).
Assume Vert(p(σ) ∪ p(τ )) includes l vertices not contained in ∆, so that
Vert(σ ∪ τ ) contains d + δ − l vertices in p−1 (∆). If Vert σ contains a vertex
outside∆, then p(σ) misses a vertex w of ∆, which implies that |Mwστ | ≥ 1.
Furthermore, if v and v ′ are distinct vertices in L − ∆ which are contained
in Vert σ ∪ τ , then there are distinct vertices w and w ′ so that |Mwστ | and
|Mwστ′ | are both ≥ 1. Otherwise, σ and τ would both miss a vertex w ∈ ∆
and {σ, τ } would not be contained in Ωm . Similarly, if there are l vertices
which are not contained in ∆, then there are l vertices w1 , . . . , wl of ∆ with
|Mwστi | ≥ 1. Therefore, if |Mwστ | > 1 for any w, the number of total missing
vertices in p−1 (∆) is greater than l, a contradiction.
Lemma 4.21. If {σ, τ } ∈ Ωm then p(σ) and p(τ ) are in L(d) .
Proof. Assume Vert(p(σ) ∪ p(τ )) includes l vertices not contained in ∆, so
that p(σ) ∪ p(τ ) contains d + l + 1 vertices. The proof of Lemma 4.20 implies
there are l vertices w1 , . . . , wl of ∆ such that |Mwστi | = 1. For the other
d + 1 − l vertices of Vert ∆, |Mwστ | = 0. Neither Vert σ nor Vert τ can contain
Vert p−1 (w), so each such w is contained in p(σ) and p(τ ). Thus, p(σ) ∩ p(τ )
contains at least d+1−l vertices. Since | Vert p(σ)| and | Vert p(τ )| is bounded
above by d + 1, the equality
| Vert p(σ) ∪ Vert p(τ )| = | Vert(p(σ) ∪ p(τ ))| + | Vert(p(σ) ∩ p(τ ))|
implies that | Vert p(σ)| and | Vert p(τ )| both equal d + 1.
The next two theorems are our computation of the van Kampen obstruction of Om L.
57
Theorem 4.22. Let L be a d-dimensional flag complex with Hd (L, Z2 ) 6= 0.
Let C be a d-dimensional cycle contained in L, and ∆ ⊂ C a d-simplex.
C
Then Ωm ∈ Cd+δ (C(Dm
(∆)); Z2 ) is a (d + δ)-cycle.
Proof. We assume that m > 1, since the m = 1 case was proved in [1] (this
C
slightly simplifies the argument). Let {σ, α} be a (d+δ−1)-cell in C(Dm
(∆)).
We claim the sum of the cardinality of the sets
C
V1 := {v ∈ Vert Dm
(∆)|{σ ∗ v, α} ∈ Ωm }
C
V2 := {v ∈ Vert Dm
(∆)|{σ, α ∗ v} ∈ Ωm }
C
is even. Note that some vertices of Dm
(∆) may be contained in both V1 and
V2 .
First, suppose p(σ) and p(α) are in C (d) . In this case, if v ∈ Vi , then
p(v) ∈ ∆. By Lemma 4.21, we can assume |Mwσα | = 0, 1 or 2 for all w ∈ ∆;
otherwise, V1 and V2 would be empty.
If Vert σ ∩Vert p−1 (w) 6= ∅ and Vert α ∩Vert p−1 (w) 6= ∅, then each vertex
of Mwσα is in V1 and V2 , hence w contributes an even number to the sum of
|V1 | and|V2 |. If Vert σ ∩ Vert p−1 (w) = ∅ and Vert α ∩ Vert p−1 (w) = ∅, then
V1 and V2 are empty.
Next, suppose that Vert σ ∩Vert p−1 (w) 6= ∅ and Vert α∩Vert p−1 (w) = ∅,
so that Mwσα makes no contribution to V2 . If |Mwσα | = 1, then the missing
vertex is not in V1 since p−1 (w) does not span a simplex in Om L. If |Mwσα | = 2,
then each vertex in Mwσα is contained in V1 , so again Mwσα contributes an even
number to |V1 |. The same argument works if Vert σ ∩ Vert p−1 (w) = ∅ and
Vert α ∩ Vert p−1 (w) 6= ∅.
Now, assume p(σ) is a d-simplex of L and p(α) is a (d − 1)-simplex of L.
In this case, V1 is empty by Lemma 4.21. Again, we consider the sets Mwσα
for w ∈ Vert ∆.
Note that |Mwσα | = 2 for at most one w ∈ Vert ∆ by Lemma 4.20, and
if |Mwσα | = 2 for some w ∈ ∆, then V2 is contained in p−1 (w). In this case,
there are 0 or 2 vertices in V2 , depending on whether or not w is in the link
6 2 for all w ∈ ∆. Since C is a cycle and p(α) is
of α. Suppose |Mwσα | =
(d − 1)-dimensional, the link LkC (p(α)) is an even number of vertices. For
each w ∈ LkC (p(α)) ∩ ∆, by assumption there is precisely one vertex in V2
which is in Mwασ (if there were zero vertices, then σ would contain all of
p−1 (w)).
Now, we claim that all the vertices in LkC (p(α)) − ∆ are in V2 . Such a
vertex v is not in V2 if and only if it is contained in σ. Since p(σ) ∪ p(α)
58
contains ∆, if v were in σ this would imply that ∆ ∪ v is a simplex in L,
which contradicts L being d-dimensional and flag. Therefore, each vertex in
LkC (p(α)) − ∆ is in V2 , and since |Mwασ | = 1 for all w ∈ LkC (p(α)) ∩ ∆,
the total cardinality of the set V2 is even (and equal to the cardinality of
LkC (p(α))).
C
Theorem 4.23. Let C be the support of a cycle in Hd (L; Z2 ), let Dm
(∆) be
C doubled over a d-simplex ∆ ⊂ C and let Ωm ∈ Zd+δ (C(Om L); Z2 ) be as
above. Then νκd+δ evaluates nontrivially on Ωm .
Proof. Order the vertices of ∆ so that v0 < · · · < vd+1 and then order the
other vertices of L so that each vertex of ∆ is < each vertex of L−∆. Extend
this to an ordering on the vertex set of Om L, by
1
m
v01 < v02 < · · · < v0m < v11 < v12 < · · · < v1m < · · · < vd+1
< · · · < vd+1
.
We have the following decomposition of the obstruction cocycle νκd+δ
evaluated on Ωm :
X
X
X
νκd+δ ({σ, τ }) =
νκd+δ ({σ, τ }).
{σ,τ }∈Ωm
{a,b}∈M
{σ,τ }∈Ωm
Vert ∆⊂a∪b p(σ)=a
p(τ )=b
If a = b = ∆, then there is exactly one meshed pair, because the union
of vertices of σ and τ is precisely the set of vertices of Om ∆, and for each
m-simplex in Dm (∆) there is a unique pair of meshed faces. Now, suppose
a 6= ∆. Let b such that Vert ∆ ⊂ a ∪ b, and let σ ∈ p−1 (a). If p(τ ) = b, then
{σ, τ } ∈ Ωm if and only if σ ∩ τ = ∅. For all w ∈ ∆ − p(σ), if τ contains
more than two vertices of p−1 (w), then σ and τ do not mesh by our choice of
ordering. On the other hand, the vertices of σ ∪ τ can omit at most 1 vertex
of p−1 (w) by Lemma 4.20; hence, no meshing can occur. Therefore, the only
contribution comes from the unique meshed pair with a = b = ∆, and hence,
νκd+δ evaluates nontrivially on Ωm .
Putting this all together, we get the following.
Theorem 4.24. Let L be a d-dimensional flag complex and let Om L be a
polyhedral join over L of (m − 1)-spheres. Let δ = dim Om L. If Hd (L; Z2 ) 6=
0, then vkd+δ (Om L) 6= 0.
Theorems 4.24 and 3.6 have the following corollary.
59
σ
Figure 5: D2 (∆) when L is a 1-cycle and each sphere is 1-dimensional.
Corollary 4.25. Suppose L is a d-dimensional flag complex, and G =
Q
L1 Gv is a graph product over L, where each Gv is the fundamental group
of a closed aspherical m-manifold. If Hd (L; Z2 ) 6= 0, then
obdim G = actdim G = (m + 1)(d + 1) = gdim G + (d + 1)
Combining this corollary with Theorem 3.14, gives Theorem B in the
Introduction.
Remark. It may be confusing why we chose to replace each vertex in Om L
with the boundary of an m-simplex. In fact, at first it seemed more natural
to us to replace each vertex with an (m − 1)-octahedron, as this would give
Om L a simple flag triangulation. However, we could not find a way to extend
the definition of [1] to this case. We’ll illustrate this with a simple example,
see Figure 5.
Suppose L is a 1-cycle, and replace two of the vertices with cellulated S 1 ’s.
We need to construct a 4-cycle β ∈ C4 (C(Dm (∆)); Z2 ). For this to be the case,
then for any 3-cell σ in C(D2 (∆)), the collection of 1-cells {τ |{σ, τ } ∈ β} must
form a 1-cycle. If we triangulate the S 1 ’s as the boundary of a 2-simplex,
then for each such σ there is a natural 1-cycle containing all the vertices
not contained in σ. On the other hand, if we replace each vertex with a
1-octahedron, then we have to make a choice of 1-cycle to pair with σ. We
could not find a way to do this consistently.
Remark 4.26. (Homology below the top dimension). In Section 5, we will
need a slight generalization of the previous arguments, where we consider
complexes with homology below the top dimension.
60
Suppose L is a d-dimensional flag complex, and let C be the support of a
cycle in Hk (L, Z2 ) for k < d. If C is a full subcomplex, then the arguments
in Theorem 4.22 and Theorem 4.23 generalize to show that vkk+δ (Om L) 6= 0.
If C is not full, then Ωm may not be a cycle if we choose ∆ incorrectly.
However, the argument generalizes if the following ∗-condition is satisfied,
see [1]:
For all σ, τ ∈ C with ∆0 ⊂ σ ∪ τ we have σ ∩ τ ⊂ ∆.
(∗)
We do not know an example of a d-dimensional complex L and a class
φ ∈ Hk (L; Z2 ) such that the ∗-condition fails for the support of every representative C for φ.
One instance where the ∗-condition is automatically satisfied is if the
cycle is in the top dimension.
Theorem 4.27. If L is a d-dimensional flag complex and Hd (L; Z2 ) 6= 0,
then vkd+δ (Om L) 6= 0.
5
Obstructors for hyperplane complements
In Subsection 4.1 we defined various configurations of standard subgroups
for simple complexes of groups. In this section, we will show that for any
finite arrangement A of affine hyperplanes in Cn there is a configuration of
abelian subgroups in the fundamental group of the complement π1 (M(A)),
indexed by the simplices in a certain simplicial complex, which is homeomorphic to the geometric realization |Q(A)| of the intersection poset. If A
satisfies certain conditions, this simplicial complex will satisfy the ∗-condition
in Remark 4.26 below. When these conditions hold, the obstructor dimension method will imply that if A is irreducible, essential, and not central,
then actdim(π1 (M(A))) ≥ 2n. In particular, when M(A) is aspherical,
actdim(π1 (M(A))) = 2n.
5.1
Free abelian subgroups
Many of the terms which we use in this subsection were defined earlier in
Subsection 3.2. Recall that the intersection poset Q(A) is ordered by reverse
inclusion. Given G ∈ Q(A), let AG := {H ∈ A | H ≤ G} be the induced
61
central subarrangement of hyperplanes containing G. We will use these central subarrangements to construct free abelian subgroups of π1 (M(A)). The
same construction of these free abelian groups is given in [22].
Lemma 5.1. For any H ≤ G ∈ Q(A), π1 (M(AH )) injects into π1 (M(AG )).
Proof. There is a natural inclusion j : M(AG ) → M(AH ). We define a
map f : M(AH ) → M(AG ) by first choosing a point x in H and a small
ball Bx that only intersects hyperplanes in M(AH ). We can deformation
retract M(AH ) to Bx and then compose with the inclusion Bx → M(AG ).
Clearly, j ◦ f is homotopic to the identity, and therefore f∗ : π1 (M(AH )) →
π1 (M(AG )) is injective.
Lemma 5.2. For any central arrangement A, π1 (M(A)) has an infinite
center.
Proof. There is a projectivization map p : Cn − {0} → CPn−1 with fiber C∗ .
The restriction to M(A) is a trivial bundle ([33, Proposition 5.1]). Then
γ = i(π1 (C∗ )) ⊂ M(A) is in the center of π1 (M(A)).
Of course, if the central arrangement A is reducible, then the center
of π1 (M(A)) has rank greater than one (take central elements from each
factor). If A is irreducible, central, and M(A) is aspherical, it turns out that
the center is infinite cyclic.
Next, suppose G ∈ Q(A) is such that AG is irreducible. By the previous
lemma, there is an element γG of infinite order in the center of π1 (M(AG )).
Furthermore, if G1 < G2 < · · · < Gn is a chain in Q(A) with each AGi
irreducible, then since
π1 (M(AG1 )) ⊂ π1 (M(AG2 )) ⊂ · · · ⊂ π1 (M(AGn )),
we obtain a free abelian group of rank n generated by γG1 , γG2 , . . . , γGn (its
rank is n by Theorem 5.6 below). On the other hand, suppose AG decomposes
as a product of irreducibles:
A(G) ∼
= A G1 × · · · × A Gk .
Then
M(AG ) ∼
= M(AG1 ) × M(AG2 ) × · · · × M(AGk )
and we obtain further free abelian groups as products of the free abelian
subgroups in the fundamental groups of the factors.
62
A
B
C
γD
D
γA
γB
γC
γA∩B∩C
Figure 6: A real line arrangement and an associated configuration of abelian
groups for its complexification.
We will produce a configuration of abelian groups based on a simplicial
complex with vertex set {G ∈ Q(A) | AG is irreducible}. Two elements G
and H of Q(A) are comparable if H < G or G < H. Distinct vertices vG and
vH are connected by an edge if and only if 1) G and H are comparable or 2)
AG ∩ H = AG × AH (see Figure 5.1).
To properly describe the simplicial complex and the corresponding configuration of abelian groups, we need the notion, introduced by De Concini
and Procesi [21], of a building set for Q(A).
5.2
Building sets
Given a collection of subspaces G in Q(A) and an element X ∈ Q(A), let
G≤X denote the set of elements in G that contain X. Let max G≤X be the set
of maximal elements of G≤X .
Definition 5.3. A collection G of subspaces in Q(A) is a building set if for
any X ∈ Q(A) such that max G≤X = {G1 , G2 , . . . Gk }, we have
AX ∼
= A G1 × A G2 × · · · × A Gk .
There are two canonical choices for a building set. Note that Q(A) is
itself a building set, since max Q(A)≤X = X. Also, note that the poset
V IQ(A) = {G ∈ Q(A) | AG is irreducible}
is a building set. The set V IQ(A) is called the set of irreducibles in Q(A);
eventually, V IQ(A) will be the vertex set of a simplicial complex IQ(A)
63
called the irreducible complex. In the case of V IQ(A), if we decompose AX
into irreducible components
AX ∼
= A G1 × A G2 × · · · × A Gk ,
then max V IQ(A)≤X = {G1 , G2 , . . . , Gk }. In fact, by considering X ∈ Q(A)
such that AX is irreducible, it is obvious that every building set must contain
V IQ(A).
Any building set determines a collection of “nested subsets”. These subsets will be the simplices of a simplicial complex on which our configuration
of abelian groups will be based.
Definition 5.4. Let G be a building set for an affine arrangement A. A
subset α ⊂ G is G-nested if for any subset {Xi } of α consisting of pairwise
incomparable elements Xi ∈ α, the intersection ∩Xi is nonempty and does
not belong to G.
Note that if X1 > X2 > · · · > Xn is any chain in G, then {X1 , . . . , Xn }
is a G-nested subset. It is also obvious from the definition that the nested
subsets form a simplicial complex, that is, if β ⊂ α and α is G-nested, then
β is G-nested. For example, if the building set is Q(A), then the nested
set complex is the barycentric subdivision |Q(A)|, as the nested subsets are
precisely chains in Q(A). Let IQ(A) denote the simplicial realization of the
V IQ(A)-nested subsets.
Lemma 5.5. Let α be a simplex in IQ(A). For each vertex of α corresponding to G ∈ V IQ(A), let γG denote the central element in π1 (M(AG ))
corresponding to the fiber of the Hopf fibration as defined in Lemma 5.1.
Then the subgroup generated by {γG }G∈Vert α is free abelian.
Proof. We claim if G and H are connected by an edge in V IQ(A), then
γG and γH commute. Two elements G and H of V IQ(A) are comparable if
G < H or H < G. A two element subset {G, H} with two elements is nested
if and only if H and G are comparable or if G ∩H 6= ∅ and G ∩H ∈
/ V IQ(A).
In the first case, γG and γH commute by Lemma 5.1. For the second case, we
have that AG∩H is reducible, hence AG∩H = AG1 ×AG2 ×· · ·×AGk . If AG and
AH are contained in a single AGi , this would imply that Gi ∈ G ∩ H, which
is a contradiction. This implies γG and γH commute. Since each γG ∼
= Z we
are done.
64
Theorem 5.6 ([22, Corollary 4.5]). For each G ∈ V IQ(A), the image γG of
γG in H1 (M(A), Z) satisfies the relation
X
γG =
γH .
H∈A
H≤G
Furthermore, for any simplex α of IQ(A), {γG | G ∈ Vert α} is linearly
independent.
Corollary 5.7. For any simplex α ∈ IQ(A), the free abelian subgroup constructed in Lemma 5.5 is free abelian of rank dim α + 1.
In general, the simplicial complex IQ(A) formed from the V IQ(A)-nested
subsets is not a flag complex. For example, if A is the complexification of
the real arrangement which consists of n general position lines in R2 , then
IQ(A) for the complexification is the one-skeleton of an n-simplex. Our
configuration of abelian groups will always be based on the flag completion
of IQ(A), where the flag completion is the unique flag complex with the
same one-skeleton as IQ(A).
Theorem 5.8. Let A be an affine arrangement, and let F IQ(A) be the flag
completion of IQ(A). Then π1 M(A) admits a configuration of free abelian
groups based on F IQ(A).
Proof. Assume that σ and τ are two simplices in F IQ(A), and Zσ and Zτ
the corresponding free abelian subgroups we have constructed. We have seen
above that the subgroups Zσ and Zτ have ranks equal to dim σ + 1 and
dim τ + 1, respectively. We must show that these subgroups intersect in the
subgroup corresponding to Zσ∩τ . Since each of these subgroups maps isomorphically onto its image in H1 (M(A), Z), it suffices to prove that the images
of the subgroups intersect correctly. However, this follows immediately from
Theorem 5.6: it is obvious that Zσ∩τ ⊂ Zσ ∩ Zτ and since each of the γG are
linearly independent we have Zσ ∩ Zτ ⊂ Zσ∩τ .
Remark 5.9. Note that the simplicial complex we construct does not capture all of the commuting relations between the standard abelian subgroups.
For example, for the arrangement depicted in Figure, 5.1, the elements γD
and γA∩B∩C commute, since γD commutes with γA , γB and γC . In this configuration of abelian groups it is only important that Zσ ∩ Zτ = Zσ∩τ .
65
5.3
The homotopy type of IQ(A)
Suppose A is a finite arrangement of affine hyperplanes in Cn of rank l. By a
theorem of Folkman [27], |Q(A)|, the geometric realization of the intersection
poset, is homotopy equivalent to a wedge of spheres, each of dimension (l−1).
The number of spheres in this wedge is an integer, βA . Alternatively, βA =
|χ(M(A))|, where χ(M(A)) is the Euler characterisitic of the complement
(see [33]). So, if
X
pA (t) =
bi (M(A))ti
i
is the Poincaré polynomial of M(A), then χ(M(A)) = pA (−1).
If A is central, then |Q(A)| is a cone and hence, βA = 0 and pA (t) has
(1 + t) as a factor. Conversely, by a theorem of Crapo [9], if βA = 0, then A
decomposes as A ∼
= A′ × A1 where A1 is a nontrivial central arrangement. It
follows that pA (t) has (1 + t)k as a factor if and only if A can be decomposed
as A′ × A1 × · · · × Ak , where Ai are nontrivial central arrangements.
Feichtner and Müller showed that if G and G ′ are two building sets
for a hyperplane arrangement, the simplicial complexes corresponding to
the nested subsets are homeomorphic via a series of stellar subdivisions
[26]. In particular, this implies that IQ(A) is a simplicial complex with
Hrk(A)−1 (IQ(A), Z2 ) 6= 0 if A is irreducible and has no central factor.
If A is a central arrangement, there is an affine arrangement d(A) ⊂ Cn−1 ,
called the “deconing” of A, which is obtained by projectivizing A and then
removing any projectivized hyperplane. The realization of the intersection
poset |Q(A)| is isomorphic to the cone on |Q(d(A))|, so therefore the Poincaré
polynomials satisfy pA (t) = (1 + t)pd(A) (t). If A is essential and irreducible,
this implies by Crapo’s theorem that d(A) is essential and has no central
factor.
5.4
Obstructor dimensions of arrangement complements
Suppose that A is an irreducible, essential, and noncentral arrangement in
Cn . We constructed a simplicial complex IQ(A) with Hn−1 (IQ(A), Z) 6= 0.
The configuration of abelian groups is obtained by taking the flag completion
F IQ(A). Since the dimension of |Q(A)| is always rk(A) − 1, it is a flag
simplicial complex with top dimensional homology if A is essential and has
no central factors.
66
Therefore, we can apply Theorem 4.11 if F IQ(A) is (n − 1)-dimensional.
We first show this holds for the case that M(A) is aspherical.
Lemma 5.10. Let A be a complex hyperplane arrangement such that M(A)
is aspherical. Then dim(F IQ(A)) ≤ n − 1.
Proof. It is a standard fact that M(A) is homotopy equivalent to an ndimensional complex. If M(A) is aspherical, then gdim(π1 (M(A))) ≤ n.
Therefore, the rank of any abelian subgroup of M is ≤ n, which implies
dim(F IQ(A)) ≤ n − 1.
This along with Theorem 4.11 and Theorem 5.8 immediately implies Theorem C from the introduction.
Theorem 5.11. If M(A) is an essential, aspherical arrangement with no
central factors, then actdim(π1 (M(A))) = 2n. In particular, M(A) is not
homotopy equivalent to a (2n − 1)-manifold.
A similar argument shows a general result for central arrangements.
Theorem 5.12. Let A be an aspherical, irreducible, essential, central arrangement in Cn . Then actdim(π1 (M(A))) = 2n − 1.
Proof. If A is essential and irreducible, then Theorem 5.16 implies that if
d(A) is the deconing of A, then obdim(π1 (M(d(A)))) = 2n − 2. Then since
M(A) ∼
= M(d(A)) × S 1 , we have π1 (M(A)) = Z × π1 (M(d(A))) and hence
obdim(π1 (M(d(A)))) = actdim(π1 (M(d(A)))) = 2n − 1.
The product formula for obstructor dimension gives the following corollary which is the general answer for the obstructor dimension of aspherical
hyperplane arrangements.
Corollary 5.13. Let A be an affine aspherical arrangement in Cn and suppose that
A∼
= A1 × A2 × · · · × Ak × A′
where each Ai is irreducible and central, and A′ has no central factor. Then
obdim(π1 (M(A))) = actdim(π1 (M(A))) = 2n − k.
Using Theorem 5.11, this gives the following computation of the action
dimension of any spherical Artin group (cf. Proposition 3.8).
67
Corollary 5.14 (Le [30]). Suppose Aσ is an irreducible spherical Artin group
of rank d + 1. Then obdim Aσ = actdim Aσ = 2d + 1. Therefore, the action
dimension of a spherical Artin group is the sum of the action dimensions of
its irreducible factors.
When M(A) is not aspherical, F IQ(A) could have much larger dimension than IQ(A). For example, we can take any arrangement and add new
hyperplanes in general position. Then IQ(A) for the new arrangement will
have arbitrarily high dimensional flag completion, as the new hyperplanes
themselves induce the 1-skeleton of a n-simplex in IQ(A). We now give
a condition on our arrangement that guarantees that F IQ(A) contains a
simplex which satisfies the ∗-condition from Subsection 4.26.
Definition 5.15. Let A be a complex hyperplane arrangement. A complete
chain of irreducibles is a chain of subspaces G0 > G1 > · · · > Gn such that
each AGi is irreducible.
We claim that the simplex σ := [G0 , G1 , . . . Gn ] in F IQ(A) satisfies the
∗-condition. Note that if a simplex does not satisfy the ∗-condition, then
there is a vertex in F IQ(A) that is connected to each of the vertices of that
simplex by an edge. So, suppose to the contrary that H is a subspace which
is connected to each Gi by an edge in F IQ(A). Now, since H is connected
to Gn in F IQ(A) and Gn is 0-dimensional, it must contain Gn . Let Gi be
the maximal subspace in the chain that is not contained in H. Since H and
Gi are connected by an edge in IQ(A), we must have AH∩Gi ∼
= A H × A Gi .
Since H contains Gi+1 we must have H ∩ Gi = Gi+1 . Therefore, the splitting
AH∩Gi ∼
= AH × AGi would contradict Gi ∈ V IQ(A).
Therefore, we have constructed a d-dimensional flag complex F IQ(A)
such that Hn−1 (F IQ(A), Z2 ) 6= 0. Since (F IQ(A), σ) satisfies the ∗-condition,
we can apply [1] to the complex O(F IQ(A)) to get the following:
Theorem 5.16. Let A be an arrangement in Cn that is essential and not
central. If A contains a complete chain of irreducibles, then
actdim(π1 (M(A))) ≥ obdim(π1 (M(A))) ≥ 2n.
If A is an inessential arrangement, then we can still compute lower bounds
for the action dimension. This is because M(A) splits as Ck × A′ , where
A′ is an essential arrangement in Cn−k , and if A is not central then A′
is not central. Conversely, our results say nothing about general position
68
hyperplane arrangements, though this is not very interesting in this context.
Hattori showed in [28] that the complement of a general position arrangement
has free abelian fundamental group and that the arrangement is homotopy
equivalent to a certain skeleton of a k-torus.
Example 5.17. We now describe another type of arrangement whose complement is always aspherical. First, an arrangement A is said to be strictly
linearly fibered over AG if G is a line and the restriction of the projection
πG : Cn → Cn /G to M(A) is a fiber bundle projection. A fiber-type arrangement is defined inductively: A ⊂ Cn is fiber-type if there is a line G
such that A is strictly linearly fibered over G and the induced arrangement
π(A) ⊂ Cn−1 is fiber-type. For example, the braid arrangement is fiber-type.
The action dimension of these examples was already known by work of Falk
and Randell in [25] and results in [4]. Indeed, Falk and Randell showed
that the fundamental group of the complement of a fiber-type arrangement
is an iterated semidirect product of free groups, so the computation of action
dimension followed from Corollary 27 in [4].
Example 5.18. A complex reflection is a periodic affine automorphism of
Cn whose fixed point set a complex hyperplane. A complex reflection group is
a finite group acting on Cn by complex reflections. For example, every finite
Coxeter group is a complex reflection group by complexification of the action
on Rn . There groups were completely classified by Shepard and Todd [34],
who showed that they fit into several infinite families depending on 3 parameters and 34 exceptional cases. The complement of the fixed hyperplanes is
a central arrangement, and the fundamental groups of such hyperplane complements can be thought of as generalizations of spherical Artin groups. It is
known that all such hyperplane complements are aspherical (the remaining
exceptional cases were resolved in [2]). Therefore, if the arrangement for a
finite reflection group is essential and irreducible, then the action dimension
of π1 (M(A)) is precisely 2n − 1.
6
Questions
Here are four questions that came up during our work. When the d-dimensional
flag complex L is EDCE and G is the fundamental group for graph product complex of closed aspherical m-manifolds (or more generally, the group
associated to a complex of closed aspherical manifolds), we showed that
69
actdim G ≤ (m + 1)(d + 1) − 1. On the other hand, in order to show that
the corresponding van Kampen obstruction is 0, we only need the weaker
assumption Hd (L, Z2 ) = 0.
Question 6.1. Is our upper bound for actdim G still valid when the hypothesis that L is EDCE is replaced by the hypothesis Hd (L, Z2 ) = 0?
Question 6.2. If OL piecewise linearly embeds in a sphere of codimension k,
does Om L piecewise linearly embed in a sphere of codimension k? Together
with the main theorem of [1] this would imply that if L is a flag complex with
Hn (L, Z2 ) = 0, then embdim(Om L) < d + δ. (Here embdim(Om L) means
the minimum dimension of a sphere into which there is a PL embedding of
Om L.)
Question 6.3. Let KL be a polyhedral join of simplicial complexes Ks over
L. Is there a formula for the van Kampen obstruction of KL in terms of the
van Kampen obstructions of the Ks and the homology of L?
Question 6.4. Suppose that A is an essential, noncentral arrangement which
admits a complete chain of irreducibles (see Definition 5.15). Is it possible
for M(A) to be homotopy equivalent to a (2n − 1)-manifold?
References
[1] G. Avramidi, M. W. Davis, B. Okun, and K. Schreve, Action dimension of right-angled
Artin groups, Bull. of the London Math. Society 48 (2015), no. 1, 115–126.
[2] D. Bessis, Finite complex reflection arrangements are K(π, 1)., Annals of Mathematics
181 (2015), no. 3, 809–904.
[3] M. Bestvina and M. Feighn, Proper actions of lattices on contractible manifolds, Invent. Math. 150 (2002), no. 2, 237–256.
[4] M. Bestvina, M. Kapovich, and B. Kleiner, Van Kampen’s embedding obstruction for
discrete groups, Invent. Math. 150 (2002), no. 2, 219–235.
[5] N. Bourbaki, Lie groups and Lie algebras. Chapters 4–6, Elements of Mathematics
(Berlin), Springer-Verlag, Berlin, 2002. Translated from the 1968 French original by
Andrew Pressley. MR1890629
[6] M. R. Bridson and A. Haefliger, Metric spaces of non-positive curvature, Grundlehren
der Mathematischen Wissenschaften [Fundamental Principles of Mathematical Sciences], vol. 319, Springer-Verlag, Berlin, 1999. MR1744486
70
[7] R. Charney and M. W. Davis, The K(π, 1)-problem for hyperplane complements associated to infinite reflection groups, J. Amer. Math. Soc. 8 (1995), no. 3, 597–627,
DOI 10.2307/2152924. MR1303028
[8]
, Finite K(π, 1)s for Artin groups, Prospects in topology (Princeton, NJ, 1994),
Ann. of Math. Stud., vol. 138, Princeton Univ. Press, Princeton, NJ, 1995, pp. 110–
124. MR1368655
[9] H. Crapo, A Higher Invariant for Matroids, Journal of Combinatorial Theory 2
(1967), no. 2, 406-417.
[10] J. Crisp and L. Paris, The solution to a conjecture of Tits on the subgroup generated
by the squares of the generators of an Artin group, Inventiones 145 (2001), no. 1,
19-36.
[11] M. Davis, Smooth G-manifolds as collections of fiber bundles, Pacific J. Math. 77
(1978), no. 2, 315–363. MR510928
[12] M. W. Davis, Buildings are CAT(0), Geometry and cohomology in group theory (Durham, 1994), London Math. Soc. Lecture Note Ser., vol. 252, Cambridge
Univ. Press, Cambridge, 1998, pp. 108–123, DOI 10.1017/CBO9780511666131.009.
MR1709955
[13]
, The geometry and topology of Coxeter groups, London Mathematical Society Monographs Series, vol. 32, Princeton University Press, Princeton, NJ, 2008.
MR2360474
[14]
, Right-angularity, flag complexes, asphericity, Geom. Dedicata 159 (2012),
239–262, DOI 10.1007/s10711-011-9654-4. MR2944529
[15] M. W. Davis and J. Huang, Determining the action dimension of an Artin group by
using its complex of abelian subgroups, preprint, arXiv:1608.03572 (2016).
[16] M. W. Davis, T. Januszkiewicz, and I. J. Leary, The L2 -Cohomology of Hyperplane
Complements, Groups, Geometry and Dynamics 1 (2007), 301-309.
[17] M. W. Davis and P. H. Kropholler, Criteria for asphericity of polyhedral products:
corrigenda to “right-angularity, flag complexes, asphericity”, Geom. Dedicata 179
(2015), 39–44, DOI 10.1007/s10711-015-0066-8. MR3424656
[18] M. W. Davis and B. Okun, Vanishing theorems and conjectures for the ℓ2 -homology
of right-angled Coxeter groups, Geom. Topol. 5 (2001), 7–74.
[19]
, Cohomology computations for Artin groups, Bestvina-Brady groups, and
graph products, Groups Geom. Dyn. 6 (2012), no. 3, 485–531, DOI 10.4171/GGD/164.
MR2961283
[20] P. Deligne, Les immeubles des groupes de tresses généralisés, Invent. Math. 17 (1972),
273–302 (French). MR0422673
[21] C. De Concini and C. Procesi, Wonderful Models of Subspace Arrangements, Selecta
Mathematica 1 (1995), no. 3, 459–494.
71
[22] G. Denham, A. Suciu, and S. Yuzvinsky, Combinatorial Covers and Vanishing of
cohomology, Selecta Mathematica 22 (2016), no. 2, 561–594.
[23] Z. Despotovic, Action Dimension of Mapping Class Groups, Ph.D. Thesis, Department of Mathematics, University of Utah, 2006.
[24] A. N. Dranishnikov, On the virtual cohomological dimensions of Coxeter groups, Proc.
Amer. Math. Soc. 125 (1997), no. 7, 1885–1891, DOI 10.1090/S0002-9939-97-04106-3.
MR1422863
[25] M. Falk and R. Randall, The lower central series of a fiber-type arrangement, Invent.
Math. 82 (1985), 77–88.
[26] E. M. Feichtner and I. Müller, On the Topology of Nested Set Complexes, Proc. Amer.
Math. Soc. 131 (2003), 1695–1704.
[27] J. Folkman, The homology groups of a lattice, J. Math. Mech. 15 (1966), 631-636.
[28] A. Hattori, Topology of Cn minus a finite number of affine hyperplanes in general
position, J. Fac. Sci. Univ. Tokyo 22 (1975), 205-219.
[29] H. van der Lek, Extended Artin groups, Singularities, Part 2 (Arcata, Calif., 1981),
Proc. Sympos. Pure Math., vol. 40, Amer. Math. Soc., Providence, RI, 1983, pp. 117–
121. MR713240
[30] G. Le, The Action Dimension of Artin Groups, Ph.D. Thesis, Department of Mathematics, Ohio State University, 2016.
[31] J. Matoušek, M. Tancer, and U. Wagner, Hardness of embedding simplicial complexes
in Rd , J. Eur.Math.Soc.(JEMS) 13 (2011), no. 2, 259–295.
[32] L. Mosher, M. Sageev, and K. Whyte, Quasi-actions on trees I. Bounded valence,
Annals of Mathematics 158 (2003), 115–164.
[33] P. Orlik and H. Terao, Arrangements of hyperplanes, Springer-Verlag, Berlin Heidelberg GmbH, 1992.
[34] G. C. Shepard and J. A. Todd, Finite Unitary Reflection Groups, Canadian Journal
of Mathematics 6 (1954), 274-304.
[35] J.-P. Serre, Trees, Springer-Verlag, Berlin-New York, 1980. Translated from the French
by John Stillwell. MR607504
[36] S. Y. Yoon, A lower bound to the action dimension of a group, Algebr. Geom. Topol.
4 (2004), 273–296, DOI 10.2140/agt.2004.4.273. MR2059192
Michael W. Davis, Department of Mathematics, The Ohio State University, 231 W. 18th Ave., Columbus, Ohio 43210, [email protected]
Giang Le, Department of Mathematics, Oregon State University, 368 Kidder Hall, Corvallis, OR 97331, [email protected]
Kevin Schreve, University of Michigan-Ann Arbor, Department of Mathematical Sciences, PO Box 413, Ann Arbor, MI 48109, [email protected]
72
| 4math.GR
|
arXiv:1305.1422v4 [cs.DC] 9 Jun 2017
Somoclu: An Efficient Parallel Library for
Self-Organizing Maps
Peter Wittek1,2 , Shi Chao Gao3 , Ik Soo Lim4 , and Li Zhao3
1
2
University of Borås
ICFO-The Institute of Photonic Sciences
3
Tsinghua University
4
Bangor University
Abstract
Somoclu is a massively parallel tool for training self-organizing
maps on large data sets written in C++. It builds on OpenMP for
multicore execution, and on MPI for distributing the workload across
the nodes in a cluster. It is also able to boost training by using
CUDA if graphics processing units are available. A sparse kernel is
included, which is useful for high-dimensional but sparse data, such
as the vector spaces common in text mining workflows. Python, R
and MATLAB interfaces facilitate interactive use. Apart from fast
execution, memory use is highly optimized, enabling training large
emergent maps even on a single computer.
1
Introduction
Visual inspection of data is crucial to gain an intuition of the underlying
structures. As data often lies in a high-dimensional space, we use embedding
techniques to reduce the number of dimensions to just two or three.
Methods that rely on eigenvalue decomposition, such as multidimensional
scaling [4], achieve a global optimum for such an embedding: The global
topology of the space will be preserved.
1
Often the data points lie on a high-dimensional manifold that is curved
and nonlinear. These structures are difficult to find with eigenvalue decomposition. Manifold learning generalizes embedding further, assuming that
data in a high-dimensional space aligns to a manifold in a much lower dimensional space. For example, the algorithm Isomap finds a globally optimal
solution for an underlying nonlinear manifold and it builds on multidimensional scaling [21]. Isomap, however, fails to find nonconvex embeddings [28].
Nonconvex structures are one strong motivation to look at solutions that
are not globally optimal, but preserve the local topology of the space instead.
Self-organizing maps (SOMs) are a widespread visualization tool that embed
high-dimensional data on a two-dimensional surface – typically a section
of a plane or a torus – while preserving the local topological layout of the
original data [10]. These maps provide a visual representation of groups of
similar data instances, and they are also useful in analyzing the dynamics
of evolving data collections, as updates are easily made. Emergent selforganizing maps contain a much larger number of target nodes for embedding,
and thus capture the topology of the original space more accurately [24].
Training a map is computationally demanding, but a great advantage of
SOMs is that the computations are easy to parallelize. They have been accelerated on massively parallel graphics processing units (GPUs [14]). Tools
exist that scale to large data sets using cluster resources [20], and also combining GPU-accelerated nodes in clusters [29]. These tools focus on batch
processing. On the other end of the spectrum, interactive environments for
training SOMs are often single-core implementations [24], not making full
use of contemporary hardware.
We develop a common computational core that is highly efficient with the
available resources. This common core is used for a command-line interface
to enable batch processing on cluster resources, but the same core is used
as the computational back-end for environments popular in data analysis.
The tool, named Somoclu (originally standing for SOM on a cluster), has
the following improvements over other implementations:
• It is highly efficient in single-node multicore execution.
• Memory use is reduced by up to 50 per cent.
• Large emergent maps are feasible.
• A kernel for sparse data is introduced to facilitate text mining applications.
2
• Training time is reduced by graphics processing units when available.
• It improves the efficiency of distributing the workload across multiple
nodes when run on a cluster.
• An extensive command-line interface is available for batch processing.
• Python [25], R [17] and MATLAB [22] interfaces facilitate interactive
processing.
• Compatibility with Databionic ESOM Tools [24] ensures easy visualization.
The source code is available under GNU Public License Version 3 (http:
//peterwittek.github.io/Somoclu/). The Python version is also listed
in the Python package index (https://pypi.python.org/pypi/Somoclu/).
The R version is available from the Comprehensive R Archive Network (CRAN)
at https://CRAN.R-project.org/package=RSomoclu/.
2
Self-organizing maps in batch mode
The SOM training algorithm constructs a nonlinear topology preserving mapping of the input data set X = {x(t)|t ∈ {t0,...,tf }}, where t0 and tf are the
beginning and the end of the current training session, onto a set of neurons
M = {n1 , . . . , nk } of a neural network [10]. The neurons of the network are
arranged in a grid, with associated weight vectors
W = {w1 (t), . . . , wk (t)}
(1)
at a given time step t. W is known as the code book.
Each data point x(t) is mapped to its best matching unit
bm(x(t)) = nb ∈ M,
(2)
d(x(t), wb (t)) ≤ d(x(t), wj (t)) ∀wj (t) ∈ W,
(3)
such that
where d is the distance function on the data set in the feature space. The
neurons are arranged on a two dimensional map: Each neuron i has a two
coordinates in a grid. Next the weight vector of the best match neuron
3
and its neighbors are adjusted toward the input pattern using the following
equation:
wj (t + 1) = wj (t) + αhbj (t)(x(t) − wj (t)),
(4)
where 0 < α < 1 is the learning factor, and hbj (t) is the neighborhood
function that decreases for neurons further away from the best match neuron
in grid coordinates. A frequently used neighborhood function is the Gaussian:
−krb − rj k
,
(5)
hbj = exp
δ(t)
where rb and rj stand for the coordinates of the respective nodes. The width
δ(t) decreases from iteration to iteration to narrow the area of influence.
The training is repeated on the same data set to increase the fit, a training
cycle is called an epoch. Eventually, the neighborhood function decreases to
an extent that training might stop. The time needed to train an SOM grows
linearly with the data set size, and it grows linearly with the number of
neurons in the SOM. SOM has a batch formulation of updating the weights,
which is widely used in parallel implementations:
Ptf
0
0
t0 =t0 hbj (t )x(t )
.
(6)
wj (tf ) = P
tf
0)
h
(t
0
bj
t =t0
While not directly related to the training, it is worth mentioning the Umatrix associated with a SOM, which depicts the average Euclidean distance
between the code book vectors of neighboring neurons. Let N (j) denote the
immediate neighbors of a node j. Then the height value of the U-matrix for
a node j is calculated as
U (j) =
X
1
d(wi , wj ).
|N (j)|
(7)
i∈N (j)
The purpose of the U-matrix is to give a visual representation of the topology
of the network.
There is no shortage of implementations of SOM training algorithms. It
comes integrated in data mining suites such as RapidMiner [8]. Dedicated
visualization and training tools also exist, such as the Databionic ESOM
Tools [24]. Popular languages used in data analytics all have SOM modules,
including MATLAB [26], Python [7], and R [27]. Common to these tools is
4
that they seldom make use of parallel computing capabilities, although the
batch formulation of SOM training invites such implementations. Further
constraints include memory requirements, which increase fast with the size
of the neuron grid.
Lower level libraries address such scalability issues. Distributing the
workload across multiple nodes is feasible via standard methods such as MPI
and MapReduce [11, 20]. The inherent parallelism is easy to exploit with
graphics processing units (GPUs [14]). A method combining distributed
computing with parallelism on GPUs is also available [29].
With Somoclu, we bridge high-level languages and massively parallel architectures, while also simplifying the distribution of workload compared to
earlier implementations. We use a common core written in C++, supplemented by OpenMP [5], MPI [19], and CUDA [16]. This common core is
used by an extensive command-line interface, and wrappers in Python, R,
and MATLAB.
3
High-performance core for training
The starting point was a MapReduce-based distributed implementation of
SOM [20]. This implementation was later accelerated by GPUs [29]. We
found the MapReduce framework unnecessary, and derived a purely MPIbased implementation, that is more modular, faster, and includes a sparse
kernel. Design details are provided in Section 3.1. Distributing the workload
across multiple nodes is an extension of the parallel formulation (Section 3.2).
3.1
Parallelism
The dense CPU kernel is a straightforward implementation of the batch formulation in Equation 6, and it resembles the one implemented by Ref. [20].
For an overview of the parallel organization, refer to Figure 1. The MapReduce calls were replaced by MPI functions, leading to a more streamlined
code. Furthermore, single-node parallelism on multicore CPUs is redesigned
to use OpenMP instead of MPI. This strategy avoids duplicating the code
book: Each MPI process must have a copy of the code book, but OpenMP
threads can work on the same copy. The simplification leads to a minimum
fifty per cent reduction in memory even when only two threads are used.
5
A performance bottleneck in the original implementation was the accumulation of local weights into a new global code book by one single process
on the master node. This is parallelized by an OpenMP directive. Furthermore, the influence radius δ(t) of a best matching node is thresholded, which
translates to speed improvements without compromising the quality of the
trained map.
The GPU variant is more complex compared to the CPU kernel. The
complexity stems from the way the distance function is evaluated between the
nodes of the SOM and the training data. To maximize parallelism, the Gram
matrix is calculated, that is, a matrix of the distances between every data
instance and the nodes of the SOM. A naı̈ve approach would be to extend an
efficient matrix multiplication algorithm, replacing the dot product by the
distance function. Opting for a Euclidean distance, it is possible to derive an
alternative formulation of calculating the Gram matrix using linear algebra
operations [13]. Benchmarking the two approaches, we found that the latter
approach is a magnitude faster on the GPU, mainly due to a more favorable
memory access pattern.
We implemented the GPU kernel with Thrust [2], a C++ template library for CUDA, which has high-performance primitives, avoiding the need
to manually tune individual GPU calls. Compared to the implementation
by Ref. [29], the device memory use of the GPU code is reduced to approximately one-third, and the new implementation completely avoids costly
matrix transposing operations.
Further complexity arises from the disparity between the number of GPUs
and the number of cores in a computer. The CPU kernel achieves maximum
speed by running an MPI process on each available core, resulting in a far
lower number of data instances per core and a speedier local update of the
weights. For instance, if there are eight cores and two GPUs, than each
GPU has four times more data to process and its corresponding MPI thread
would have four times more data to update the local weights. While the
GPU handles the load efficiently, it would be highly inefficient to use a single
thread to update the local weights. We thus hybridized the kernel and rely
on OpenMP to parallelize the weight update. The GPU implementation runs
as many MPI processes on a node as there are GPUs, and uses all CPU cores
in the weight update.
The sparse kernel is a straightforward extension of the dense CPU kernel,
and its main virtue is the reduced memory use. A vector space coming from
a text processing pipeline typically contains 1–5% nonzero elements, leading
6
Code book
Data chunk
Best matching units
Memory structures
OpenMP/CUDA
threads
Process
Figure 1: Overview of the parallel organization of the batch training. The
global code book is replicated in each process, therefore it is more efficient to
use OpenMP-based parallelization than to rely on MPI on multicore CPUs.
If a GPU is available, it will overtake most data parallel operations from the
CPU, replacing OpenMP threads.
to a 20–100× reduction in memory use when using a sparse representation.
This kernel does not have a GPU implementation, as the irregular access
patterns that are inevitable with sparse data structures are not efficient on
streaming architectures.
3.2
Workload in distributed environment
The training procedure has a simple communication structure in a distributed
memory system. Finding the best matching unit in Equation 2 is independent
for every data instance, resembling the parallel version. This means that we
can distribute equally sized parts of the data to each node, without any
further communication of training data later on.
The update of the code book requires two way communication between a
master node and the slave nodes. Once all weight updates are calculated in a
slave node, the local updates are sent to the master node, which accumulates
the changes to the code book. The new code book is broadcast to all slave
7
nodes.
This communication structure ensures a near-linear scaling for smaller
code books. Emergent maps with high-dimensional data, however, scale
poorly. The code book is always a dense structure, even if the training data
is sparse, as there are hardly any zero entries. Storing the code book in
memory is the primary constraint for single node execution, and it is also
the key constraint in distributed workloads.
Compared to an earlier GPU-accelerated, distributed implementation of
SOM [29] that used MapReduce, we found that ordinary MPI calls are sufficient. Execution time did not improve significantly, but the overall code
simplified, and our implementation does not have to rely on a little-used,
MPI-based MapReduce library.
4
Interfaces
We regard the package libsvm for training support vector machines as a role
model: Using an efficient computational core, numerous wrappers were added
to the library to interface with other languages and environments [3]. The
package fastcluster is also similar in its approach [15].
We provide an extensive command-line interface, which is able to access all functionality provided by the computational core (Section 4.1). The
training functionality is exposed via an application programming interface,
a single function that performs one epoch of training (Section 4.2). This
function is wrapped to be called from Python, R, and MATLAB without
duplicating data structures (Section 4.3).
4.1
Command-line interface
One sparse and two dense data formats are supported. All of them are plain
text files. The entries can be separated by any white-space character. One
row represents one data instance across all formats. Comment lines starting
with a hash mark are ignored.
The basic dense format includes the coordinates of the data vectors, separated by a white-space. This file is parsed twice to get the basic dimensions
right. The second dense format is identical, but it includes a header that
contains information about the layout of the matrix. This second format is
compatible with Databionic ESOM Tools.
8
The sparse representation is similarly row-oriented, and it uses the same
sparse format as libsvm [3]. For instance, the vector [1.2 0 0 3.4] is represented
as the following line in the file: 0:1.2 3:3.4. The file is parsed twice: once to
get the number of instances and features, and the second time to read the
data in the individual threads.
Example files are available in the package. Extension to further matrix
types is simple to add.
The tool is used via the command line. Somoclu takes a plain text input
file – either dense or sparse data. The basic execution is as follows:
$ [mpirun -np NPROC] Somoclu [OPTIONs] INPUT_FILE OUTPUT_PREFIX
The mpirun is required only when multiple nodes are used, or when there
is more than one GPU in the system. The parameter INPUT_FILE is selfexplanatory. Instead of names of output files for the best matching units,
code books, and U-matrices, an output prefix is requested in OUTPUT_PREFIX.
The resulting files will be differentiated by the extension, and, if interim snapshots are requested, also by the indices of the epochs in which the snapshots
are taken.
The rest of the arguments are as follows.
-c FILENAME
The parameter specifies an initial code book for the map. The default is
random initialization.
-e NUMBER
The number of training epochs, that is, the number of times each data
instances will be presented to the learner.
-g TYPE
The type of the grid type; the default is square and the other option is
hexagonal.
-k NUMBER
This parameter defines the kernel type. The value 0 stands for the dense
CPU kernel, 1 is for the dense GPU kernel, and 2 is for the sparse CPU
kernel.
9
-m TYPE
The map type is either planar or toroid; the default is planar.
-n FUNCTION
This option chooses the neighborhood function, which can be Gaussian
or bubble; the default being the former.
-p NUMBER
If the neighborhood function is Gaussian, setting this parameter to 1 will
cut off the update of nodes beyond the current radius.
-t STRATEGY
Radius cooling strategy is either linear or exponential; the default is linear.
-r NUMBER
The parameter defines the start radius. The default value is half of the
map size in the smaller direction.
-R NUMBER
The final radius; it defaults to 1.
-T STRATEGY
Learning rate cooling strategy is either linear or exponential; the default
is linear.
-l NUMBER
The starting learning rate; with a default value of 1.0.
-L NUMBER
The final learning rate; the default is 0.01.
10
-s NUMBER
This parameter decides whether to save interim files. The default value is
0, which means that no interim files will be saved. Setting the parameter to
1 will calculate and save the U-matrix in each time step. If the value passed
is 2, then the code book and the best matching units are also saved in each
epoch. Since the code book is enormous for large emergent maps, passing a
value of 2 may significantly slow down each epoch.
-x, --columns NUMBER
This is the number of columns in map, that is, the size of the SOM in
direction x; the default value is 50.
-y, --rows
NUMBER
The number of rows in map is defined by this value, that is, the size of
the SOM in direction y; the default value is 50. Examples:
$ Somoclu data/rgbs.txt data/rgbs
$ mpirun -np 4 --hostfile hostfilename Somoclu -k 0 --rows 20 --columns 20 \
>
data/rgbs.txt data/rgbs
4.2
As an application programming interface
Designed to work with MPI, Somoclu was not conceived to be used as an
API. Yet, given sufficient preparation on the calling side, it is possible to
interface with Somoclu as an API. The primary entry point for training is
the following function, as specified in Somoclu.h:
void trainOneEpoch(int itask, float *data, svm_node **sparseData,
float *codebook, int *globalBmus, unsigned int nEpoch,
unsigned int currentEpoch, unsigned int nSomX, unsigned int nSomY,
unsigned int nDimensions, unsigned int nVectors,
unsigned int nVectorsPerRank, unsigned int radius0,
unsigned int radiusN, string radiusCooling, float scale0, float scaleN,
string scaleCooling, unsigned int kernelType, string mapType,
string gridType, bool compact_support, bool gaussian)
11
The parameters nSomX, nSomY, nEpoch, kernelType, and so on, are selfexplanatory, they are the same as in the command-line interface.
The parameter itask specifies the rank of the current MPI process. If
the calling environment does not use MPI, the value should be set as zero.
Data are either stored in data or sparseData, depending on whether the
data are dense or sparse. Only data belonging to the process is expected,
not the full matrix. The parameter nVectors stores the total number of
instances, whereas nVectorsPerRank the number of instances belonging to
one MPI thread.
4.3
Python, R and MATLAB interfaces
Solutions for scalable data processing in higher level languages tend to be ad
hoc. Focusing on R as an example, the R Installation and Administration
manual states that the language is ill-suited for working with data structures
larger than about 10–20% of the main memory [18]. The key problem is
with the overheads on the data structures. Parallel processing is scarcely
addressed. Some modules aim to overcome these barriers [9].
Distributed computing is also challenging for such languages. Most solutions work entirely on a case by case basis, such as the distributed text
mining module for R [23].
The aim of the interfaces is to address the problem of memory use and
parallel execution. The Python package easily installable from the Python
package index. The R package is available from CRAN. These packaged
variants rely on the OpenMP parallelism alone. To get the massive CUDA
parallelism through the interfaces, users with basic software building knowledge can easily follow the instructions on the project site. MATLAB users
need to follow the instructions on the project site to build the module as no
central package distribution site is available. Distributed workloads directed
from a high-level language remain for future development.
Starting with the Python interface, our primary concern is to avoid memory copies and duplicating large structures in memory. The native variable
system of Python is not strictly typed, hence we require the use of numpy.
Using numpy float32 data type for storing arrays, we map directly to the
single-precision floats used in the C++ code. We pass pointers between the
two languages, making the best use of memory and almost zero computational overhead. This interface encapsulates the training routines in a class
to simplify the workflow.
12
An example use of the interface is as follows:
>>>
>>>
>>>
>>>
>>>
>>>
import Somoclu
import numpy
data = numpy.loadtxt(’data/random.dat’)
n_rows, n_columns = 50, 50
som = Somoclu.Somoclu(n_columns, n_rows, data = data)
som.train()
The final code book is in the class variable Somoclu.codebook, the best
matching units are in Somoclu.bmus, and the U-matrix is also calculated in
Somoclu.umatrix.
The R interface uses the Rcpp package to cast pointers and provide type
conversions between R and C++ [6]. Since R uses double precision matrices
by default, and Somoclu uses single-precision floats internally, we must convert between double and float arrays of the input and output. This makes
the interface less efficient than the Python version. The interface integrates
with the popular R SOM package kohonen to facilitate use. The following is
an example on how to call the wrapper function from R:
R>
R>
R>
R>
R>
R>
R>
R>
R>
R>
R>
R>
+
library("RSomoclu")
data("rgbs", package = "RSomoclu")
input_data <- data.matrix(rgbs)
nSomX <- 50; nSomY <- 50
nEpoch <- 10
radius0 <- 0; radiusN <- 0
radiusCooling <- "linear"
scale0 <- 0; scaleN <- 0.01
scaleCooling <- "linear"
kernelType <- 0
mapType <- "planar"
res <- RSomoclu.train(input_data, nEpoch, nSomX, nSomY, radius0, radiusN,
radiusCooling, scale0, scaleN, scaleCooling, kernelType, mapType)
The code book is returned in res$codebook, the best matching units are
in res$globalBmus, and the calculated final U-matrix is in res$uMatrix.
Most R users will probably want to work with the map through the package
kohonen:
13
R> sommap <- RSomoclu.kohonen(input_data, res)
The MATLAB interface uses the official MEX-file mechanism to interface
with C++. As with R, MATLAB also defaults to double precision variables,
rendering some overhead of type conversion inevitable. We designed a similar training function call to that of the SOM Toolbox [26]. And provided
examples on visualization using both SOM Toolbox and Databionic ESOM
Tools. The following is an example call from the MATLAB interface.
>> data = importdata(’data/random.dat’);
>> msize = [50 50];
>> sMap = som_randinit(D, ’msize’, msize);
>> nEpoch = 10;
>> radius0 = 0;
>> radiusN = 0;
>> radiusCooling = ’linear’;
>> scale0 = 0;
>> scaleN = 0.01;
>> scaleCooling = ’linear’;
>> kernelType = 0;
>> mapType = ’planar’;
>> gridType = ’rectangular’;
>> compactSupport = false;
>> neighborhood = ’gaussian’;
>> [sMap, sTrain, globalBmus, uMatrix] = ...
Somoclu_train(sMap, data, ’msize’, msize, ’radius0’, radius0, ...
’radiusN’, radiusN, ’radiusCooling’, radiusCooling, ...
’scale0’, scale0, ’scaleN’, scaleN, ’scaleCooling’, scaleCooling, ...
’kernelType’, kernelType, ’mapType’, mapType, ...
’gridType’, gridType, ’compactSupport’, compactSupport, ...
’neighborhood’, neighborhood, ’nEpoch’, nEpoch);
The returned variables are identical to the Python version.
4.4
Visualization
The primary purpose of generating a map is visualization. Yet – apart from
the Python interface – Somoclu does not come with its own functions for visualization, since there are countless generic and SOM-specific tools that are
14
capable of plotting high-quality figures. The code book, the best matching
units, and the U-matrix are exported at the end of the training, or even after
each epoch.
The simplest procedure is to use a generic plotting library, such as gnuplot. For instance, the following simple gnuplot script plots the U-matrix in
PNG format:
gnuplot>
gnuplot>
gnuplot>
gnuplot>
gnuplot>
gnuplot>
gnuplot>
gnuplot>
gnuplot>
gnuplot>
gnuplot>
gnuplot>
gnuplot>
gnuplot>
gnuplot>
gnuplot>
gnuplot>
gnuplot>
gnuplot>
set datafile commentschars "#!%"
set autoscale
unset log
unset label
set lmargin at screen 0
set rmargin at screen 1
set bmargin at screen 0
set tmargin at screen 1
unset xtic
unset ytic
set notitle
set pm3d at b
set pm3d map
set nokey
set nocolorbox
unset surface
set term pngcairo transparent size 500,500
set output ’umatrix.png’
splot "filename" matrix
The dimensions of the picture should be adapted to the size of the network
to avoid distortion.
The Python interface is equipped with plotting routines. For instance, a
map can be plotted along with the labels or class colors:
>>> som.view_umatrix(bestmatches = True)
We may also zoom in to a specific part of the map:
>>> som.view_umatrix(bestmatches = True, zoom = ((n_rows//2, n_rows), (0, n_column
15
(a) The complete map.
(b) A close-up of region.
Figure 2: The U-matrix of a toroid map with labels trained on a toy example
plotted in Python.
(a) Codebook.
(b) U-matrix.
Figure 3: Visualizing a toy example trained by Somoclu and plotted by
kohonen in R.
Using a toy example included with the code, we obtained a visualization
shown in Figure 2.
The R interface allows visualization through the package kohonen. This
is entirely external to the library. A conversion to kohonen’s format is nec16
U−matrix
Variable1
1.13
1
0.564
0.5
6.46e−14
2.7e−10
d
Variable2
Variable3
1
1
0.5
0.5
1.01e−14
d
1.96e−05
d
SOM 07−Jan−2016
Figure 4: Visualizing a toy example trained by Somoclu and plotted by SOM
Toolbox in MATLAB.
essary:
R> sommap <- RSomoclu.kohonen(input_data, res)
R> plot(sommap, type = "codes", main = "Codes"))
R> plot(sommap, type = "dist.neighbours")
A toy example is shown in Figure 3.
The results of the MATLAB interface allows visualization through the
SOM Toolbox, which is also external to the library.
>> som_show(sMap);
The toy example is shown Figure 4.
More advanced, SOM-specific tools may also offer an interactive GUI to
select gradients and other parameters. One such tool is Databionic ESOM
Tools [24], with which the output formats of Somoclu are compatible. The
result of such visualization is shown in Section 5.3.
17
104
CPU
GPU
R
Running time (s)
Running time (s)
10
5
104
103
102
12500 25000
50000
Data instances
CPU
GPU
103
102
1250 2500
100000
(a) 50×50 map.
5000
Data instances
10000
(b) 200×200 emergent map.
Figure 5: Training time on a single node with CPU and GPU kernels and
the R package kohonen. The time axis is logarithmic. The data instances
had 1,000 dimensions.
5
Experimental results
To ensure replicability of the results, we benchmarked with publicly available
cluster GPU instances provided by Amazon Web Services. The instance type
was cg1.4xlarge,1 equipped with 22 GiB of memory, two Intel Xeon X5570
quad-core CPUs, and two NVIDIA Tesla M2050 GPUs, running Ubuntu
12.04.
5.1
Single-node performance
The most direct comparison should be with the implementations by Refs. [20,
29]. Unfortunately the former was not able to handle the matrix sizes we
were benchmarking with. The implementation by Ref. [29] is sensitive to
the size of map, and it did not scale to the map sizes benchmarked here,
and thus we left it out from the comparison. To compare with single-core
performance, we included the R package kohonen [27]. The number of data
instances ranged from 12,500 to 100,000, the number of dimensions was fixed
at 1,000 for a regular 50 × 50 self-organizing map. The data elements were
randomly generated, as we were interested in scalability alone. We also tested
an emergent map of 200 × 200 nodes, with the number of training instances
ranging from 1,250 to 10,000. This large map size with the largest data
1
https://aws.amazon.com/ec2/instance-types/
18
2500
Dense
Sparse
Maximum memory use
(MByte)
Running time (s)
3000
2000
1500
1000
500
0
12500 25000
50000
Data instances
100000
450
Dense
400
Sparse
350
300
250
200
150
100
50
0
12500 25000
50000
Data instances
(a) Running time.
100000
(b) Memory use.
Figure 6: Training time on a single node with dense and sparse kernels. The
data instances had 1,000 dimensions, with five per cent of the elements being
nonzero.
matrix filled the memory of a single GPU, hence giving an upper limit to
single-node experiments. Emergent maps in the package kohonen are not
possible, as the map is initialized with a sample from the data instances. If
the map has more nodes than data instances, kohonen exits with an error
message. The map size did not affect the relative speed of the different
kernels (Figure 5). The comparison was based on the command-line version
of Somoclu.
Compared to the R package, even the CPU version is at least ten times
faster. The difference increases with the data size, indicating serious overhead
problems in the R implementation.
The GPU results show at least a two-times speedup over the CPU version.
This is less than expected, but this result considers a single GPU in the
dual configuration, and the CPU is also a higher end model. These results,
nevertheless, show that the Thrust template library is not efficient on twodimensional data structures.
Comparing the sparse and dense kernels on a 50 × 50 map, we benchmarked with random data instances of 1,000 dimensions that contained five
per cent of nonzero elements (Figure 6). Execution time was about two
times faster with the sparse kernel. The reduction in memory use was far
more dramatic, the sparse kernel using only twenty per cent of the memory
of the dense one with 100,000 instances. Naturally, the difference with emergent maps would be less apparent, as the code book is always stored in a
dense format.
19
Maximum memory use
(MByte)
9000
C++
8000
MATLAB
7000
R
6000
Python
5000
4000
3000
2000
1000
0
12500 25000
50000
Data instances
100000
Figure 7: Memory overhead of the Python, R, and MATLAB interfaces
compared to the command-line version (indicated as C++).
Measuring the memory overhead of the interfaces compared to the native
version, we are not surprised to see that the Python variant is the closest
(Figure 7). As the data structures are not duplicated in this interface, it
is still counter-intuitive that the gap increases with larger data sets. The R
and MATLAB versions have predictably larger and growing gaps compared to
the command-line interface, as they both must duplicate all data structures.
Apart from the time spent on duplicating the data structures in the R and
MATLAB versions, the computational overhead is negligible in all interfaces.
5.2
Multi-node scaling
Using 100,000 instances and a map of 50 × 50 nodes, the calculations scale
in a linear fashion (Figure 8). This was expected, as there is little communication between nodes, apart from the weight updates. As calculations
cannot overlap with communication, we did not benchmark the GPU kernel
separately, as its scaling is identical to that of the CPU kernel.
5.3
Visualization on real data
We used the Reuters-21578 document collection for an example on text mining visualization [12]. We used Lucene 3.6.2 [1] to create an inverted index of
the document collection. Terms were stemmed and we discarded those that
occurred less than three times or were in the top ten per cent most frequent
ones. Thus we had 12,347 index terms, lying in an approximately twentythousand dimensional space. We trained a toroid emergent self-organizing
20
8
CPU
Speedup
7
6
5
4
3
2
1
1
2
4
Number of nodes
8
Figure 8: Speedup on multiple nodes with CPU kernel compared to a single
node. The data instances had 1,000 dimensions.
Figure 9: The U-matrix of a toroid emergent self-organizing map after ten
epochs of training on the feature space of sparse data. The individual dots
are neurons with a weight vector that match a data instance. The other
neurons reflect the distances in the original high-dimensional space.
map of 336 × 205 dimensions. The initial learning rate was 1.0, which decreased linearly over ten epochs to 0.1. The initial radius for the neighborhood was a hundred neurons, and it also decreased linearly to one. The
21
neighborhood function was a noncompact Gaussian.
We studied the U-matrix of the map. Visualizing this with the Databionic
ESOM Tools [24], we plotted the global structure of the map in Figure 9. The
map clearly shows dense areas where index terms are close and form tight
clusters. Other parts of the map are sparse, with large barriers separating
index terms into individual semantic regions.
6
Limitations
The most constraining limitation is the storing of the code book in the main
memory. While memory use has been optimized, and only the number of
computing nodes sets a limit to the amount of data to be processed, each node
keeps a full copy of the code book. This is not a problem for feature spaces of
a few thousand dimensions – even emergent maps are easy to compute. Yet,
if the feature space has over tens of thousands or more features, emergent
maps are no longer feasible.
Currently only the command-line interface is able to unlock all the capabilities of the computing core. The R, Python and MATLAB interfaces can
use capabilities of the OpenMP and CUDA core, but these wrappers cannot
use a distributed cluster for the calculations.
The R interface cannot support the GPU kernel easily on Windows due
to incompatibilities between the R supported compiler GCC and the CUDA
supported compiler Visual C++, while on Linux and OS X it can be built
easily.
7
Conclusions
Do we need another implementation of self-organizing maps? We believe the
answer is yes. Libraries in high-level languages do not have a scalable training
module, and even implementations on parallel and distributed architectures
could be improved on. Our solution scales from a single-thread execution
to massively parallel GPU-accelerated clusters using a common core. Batch
processing is encouraged by a command-line interface, whereas interactive
use is enabled by Python, R, and MATLAB interfaces. Even when called
interactively, execution is parallelized.
• Memory-efficient multicore execution.
22
• Purely MPI-based, highly efficient distributed implementation.
• Optimized hybrid CPU-GPU kernel for boosting training on dense
data.
• Sparse kernel.
• Common computational back-end for popular data-processing languages:
Python, R, and MATLAB.
• Windows, OS X, Linux support of the command-line interface, with
full parallel capability.
• Highly efficient on large emergent maps.
• Format compatibility with ESOM Tools for visualization.
As emergent maps are especially computationally intensive, we believe
that the primary usage scenario is a single-node, multi-GPU configuration for
data exploration, which was only feasible for small maps and small volumes
of data until now. Larger volumes of data are also easy to compute on a
cluster.
Acknowledgment
The first author was supported by the European Commission Seventh Framework Programme under Grant Agreement Number FP7-601138 PERICLES
and by the AWS in Education Machine Learning Grant award.
References
[1] Apache Software Foundation. Apache Lucene: Free and Open-Source
Information Retrieval Software Library, 2012. Version 3.6.2.
[2] Nathan Bell and Jared Hoberock. Thrust: A productivity-oriented library for CUDA. In GPU Computing Gems, volume 7. Morgan Kaufmann, 2011.
[3] Chih-Chung Chang and Chih-Jen Lin. libsvm: A Library for Support
Vector Machines, 2001.
23
[4] Trevor F. Cox and Michael A.A. Cox. Multidimensional Scaling. Chapman and Hall, 1994.
[5] Leonardo Dagum and Ramesh Menon. OpenMP: An industry standard
API for shared-memory programming. Computational Science & Engineering, 5(1):46–55, 1998.
[6] Dirk Eddelbuettel and Romain François. Rcpp: Seamless R and C++
integration. Journal of Statistical Software, 40(8):1–18, 2011.
[7] Michael Hanke, Yaroslav O Halchenko, Per B Sederberg, Stephen José
Hanson, James V Haxby, and Stefan Pollmann. PyMVPA: A Python
toolbox for multivariate pattern analysis of fMRI data. Neuroinformatics, 7(1):37–53, 2009.
[8] Markus Hofmann and Ralf Klinkenberg. RapidMiner: Data Mining Use
Cases and Business Analytics Applications. Chapman and Hall, 2013.
[9] Michael Kane, John W. Emerson, and Stephen Weston. Scalable strategies for computing with massive data. Journal of Statistical Software,
55(14):1–19, 2013.
[10] Teuvo Kohonen. Self-Organizing Maps. Springer-Verlag, 2001.
[11] Richard D. Lawrence, George S. Almasi, and Holly E. Rushmeier. A
scalable parallel algorithm for self-organizing maps with applications to
sparse data mining problems. Data Mining and Knowledge Discovery,
3(2):171–195, 1999.
[12] David D. Lewis. Reuters-21578 text categorization test collection distribution 1.0, 1999.
[13] Qi Li, Vojislav Kecman, and Raied Salman. A chunking method for
Euclidean distance matrix calculation on large dataset using multi-GPU.
In Proceedings of ICMLA-10, 9th International Conference on Machine
Learning and Applications, pages 208–213, Washington, DC, USA, 2010.
[14] Zhongwen Luo, Hongzhi Liu, Zhengping Yang, and Xincai Wu. Selforganizing maps computing on graphic process unit. In Proceedings of
ESANN-05, 13th European Symposium on Artificial Neural Networks,
2005.
24
[15] Daniel Müllner. fastcluster: Fast hierarchical, agglomerative clustering
routines for R and Python. Journal of Statistical Software, 53(9):1–18,
2013.
[16] NVidia Corporation. NVida Compute Unified Device Architecture Programming Guide 6.0, 2014.
[17] R Core Team. R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria, 2017.
[18] R Core Team. R Installation and Administration. R Foundation for
Statistical Computing, Vienna, Austria, 2017.
[19] Marc Snir, Steve W. Otto, Steven Huss-Lederman, David W. Walker,
and Jack Dongarra. MPI – The Complete Reference: The MPI Core,
volume 1. MIT Press, 1998.
[20] Seung-Jin Sul and Andrey Tovchigrechko. Parallelizing BLAST and
SOM algorithms with mapreduce-mpi library. In Proceedings of IPDPS11, 25th International Parallel and Distributed Computing Symposium,
pages 476–483, Anchorage, AK, USA, 2011.
[21] Joshua B. Tenenbaum, Vin de Silva, and John C. Langford. A global
geometric framework for nonlinear dimensionality reduction. Science,
290(5500):2319–2323, 2000.
[22] The MathWorks Inc. MATLAB: The language of technical computing,
version R2011b, 2011.
[23] Stefan Theußl, Ingo Feinerer, and Kurt Hornik. A tm plug-in for distributed text mining in R. Journal of Statistical Software, 51(5):1–31,
2012.
[24] Alfred Ultsch and Fabian Mörchen. ESOM-Maps: Tools for clustering,
visualization, and classification with emergent SOM. Technical report,
Data Bionics Research Group, University of Marburg, 2005.
[25] Guido van Rossum. Python Programming Language, 2014.
[26] Juha Vesanto, Johan Himberg, Esa Alhoniemi, and Juha Parhankangas.
Self-organizing map in MATLAB: The SOM Toolbox. Proceedings of the
MATLAB DSP Conference, pages 35–40, 1999.
25
[27] Ron Wehrens and Lutgarde M. C. Buydens. Self- and super-organizing
maps in R: The kohonen package. Journal of Statistical Software,
21(5):1–19, 2007.
[28] Kilian Q. Weinberger, Fei Sha, and Lawrence K. Saul. Learning a kernel
matrix for nonlinear dimensionality reduction. In Proceedings of ICML04, 21st International Conference on Machine Learning, pages 106–113,
Banff, Canada, 2004.
[29] Peter Wittek and Sándor Darányi. A GPU-accelerated algorithm for
self-organizing maps in a distributed environment. In Proceedings of
ESANN-12, 20th European Symposium on Artificial Neural Networks,
Computational Intelligence and Machine Learning, Bruges, Belgium,
2012.
26
| 9cs.NE
|
END-TO-END AUDIOVISUAL SPEECH RECOGNITION
Stavros Petridis1, Themos Stafylakis2, Pingchuan Ma1 , Feipeng Cai1
Georgios Tzimiropoulos2, Maja Pantic1
1
Dept. of Computing, Imperial College London, UK
Computer Vision Laboratory, University of Nottingham, UK
[email protected], [email protected]
arXiv:1802.06424v2 [cs.CV] 22 Feb 2018
2
ABSTRACT
Several end-to-end deep learning approaches have been recently presented which extract either audio or visual features
from the input images or audio signals and perform speech
recognition. However, research on end-to-end audiovisual
models is very limited. In this work, we present an end-toend audiovisual model based on residual networks and Bidirectional Gated Recurrent Units (BGRUs). To the best of our
knowledge, this is the first audiovisual fusion model which
simultaneously learns to extract features directly from the image pixels and audio waveforms and performs within-context
word recognition on a large publicly available dataset (LRW).
The model consists of two streams, one for each modality,
which extract features directly from mouth regions and raw
waveforms. The temporal dynamics in each stream/modality
are modeled by a 2-layer BGRU and the fusion of multiple
streams/modalities takes place via another 2-layer BGRU. A
slight improvement in the classification rate over an end-toend audio-only and MFCC-based model is reported in clean
audio conditions and low levels of noise. In presence of high
levels of noise, the end-to-end audiovisual model significantly
outperforms both audio-only models.
Index Terms— Audiovisual Speech Recognition, Residual Networks, End-to-End Training, BGRUs, Audiovisual
Fusion
1. INTRODUCTION
Traditional audiovisual fusion systems consist of two stages,
feature extraction from the image and audio signals and combination of the features for joint classification [1, 2, 3]. Recently, several deep learning approaches for audiovisual fusion have been presented which aim to replace the feature extraction stage with deep bottleneck architectures. Usually a
transform, like principal component analysis (PCA), is first
applied to the mouth region of interest (ROI) and spectrograms or concatenated Mel-Frequency Cepstral Coefficients
ACCEPTED TO ICASSP 2018
(MFCCs) and a deep autoencoder is trained to extract bottleneck features [4, 5, 6, 7, 8, 9]. Then these features are fed to
a classifier like a support vector machine or a Hidden Markov
Model.
Few works have been presented very recently which
follow an end-to-end approach for visual speech recognition. The main approaches followed can be divided into two
groups. In the first one, fully connected layers are used to extract features and LSTM layers model the temporal dynamics
of the sequence [10, 11]. In the second group, a 3D convolutional layer is used followed either by standard convolutional
layers [12] or residual networks (ResNet) [13] combined with
LSTMs or GRUs. End-to-end approaches have also been
successfully used for speech emotion recognition using 1D
CNNs and LSTMs [14].
However, work on end-to-end audiovisual speech recognition has been very limited. To the best of our knowledge,
there are only two works which perform end-to-end training
for audiovisual speech recognition [15, 16]. In the former, an
attention mechanism is applied to both the mouth ROIs and
MFCCs and the model is trained end-to-end. However, the
system does not use the raw audio signal or spectrogram but
relies on MFCC features. In the latter, fully connected layers together with LSTMs are used in order to extract features
directly from raw images and spectrograms and perform classification on the OuluVS database [17].
In this paper, we extend the work of [10], which mainly
works for small databases, using ResNets as proposed in
[13]. To the best of our knowledge, this is the first endto-end model which performs audiovisual word recognition
from raw mouth ROIs and waveforms on a large in-the-wild
database. The proposed model consists of two streams, one
per modality, which extract features directly from the raw
images and waveforms, respectively. Each stream consists of
a ResNet which extracts features from the raw inputs. This
is followed by a 2-layer BGRU network which models the
temporal dynamics in each stream. Finally, the information of
the different streams/modalities is fused via another 2-layer
BGRU which models the joint temporal dynamics. A similar
architecture has been proposed by [18] for audiovisual emo-
Target
Classes
Softmax (500)
BGRU (1024)
BGRU (1024)
(a)
(b)
Fig. 1. Example of mouth ROI extraction.
tion recognition. The main differences of our work are the
following: 1) we use a ResNet for the audio stream instead
of a rather shallow 2-layer CNN, 2) we do not use a pretrained ResNet for the visual stream but we train a ResNet
from scratch, 3) we use BGRUs in each stream which help
modeling the temporal dynamics of each modality instead of
using just one BLSM layer at the top and 4) we use a training
procedure which allows for efficient end-to-end training of
the entire network.
We perform classification of 500 words from the LRW
database achieving state-of-the-art performance for audiovisual fusion. The proposed system results in an absolute increase of 0.3% in classification accuracy over the end-to-end
audio-only model and an MFCC-based system. The end-toend audiovisual fusion model also significantly outperforms
(up to 14.1% absolute improvement) the audio-only models
under high levels of noise.
2. LRW DATABASE
For the purposes of this study we use the Lip Reading in the
Wild (LRW) database [19] which is the largest publicly available lipreading dataset in the wild. The database consists of
short segments (1.16 seconds) from BBC programs, mainly
news and talk shows. It is a very challenging set since it contains more than 1000 speakers and large variation in head pose
and illumination. The number of words, 500, is also much
higher than existing lipreading databases used for word recognition, which typically contain 10 to 50 words [20, 21, 17].
Another characteristic of the database is the presence of
several words which are visually similar. For example, there
are words which are present in their singular and plural forms
or simply different forms of the same word, e.g., America and
American. We should also emphasise that words appear in the
middle of an utterance and there may be co-articulation of the
lips from preceding and subsequent words.
3. END-TO-END AUDIOVISUAL SPEECH
RECOGNITION
The proposed deep learning system for audiovisual fusion is
shown in Fig. 2. It consists of two streams which extract
BGRU (1024)
BGRU (1024)
BGRU (1024)
BGRU (1024)
ResNet-34
ResNet-18
3D Conv.
Image Sequence
Audio Waveform
Fig. 2. Overview of the end-to-end audiovisual speech recognition system. Two streams are used for feature extraction
directly from the raw images and audio waveforms. The temporal dynamics are modelled by BGRUs in each stream. The
top two BGRUs fuse the information of the audio and visual
streams and jointly model their temporal dynamics.
features directly from the raw input images and the audio
waveforms, respectively. Each stream consists of two parts:
a residual network (ResNet) [22] which learns to automatically extract features from the raw image and waveform,
respectively and a 2-layer BGRU which models the temporal
dynamics of the features in each stream. Finally, 2 BGRU
layers on top of the two streams are used in order to fuse the
information of the audio and visual streams.
3.1. Visual Stream
The visual stream is similar to [13] and consists of a spatiotemporal convolution followed by a 34-layer ResNet and
a 2-layer BGRU. A spatiotemporal convolutional layer is capable of capturing the short-term dynamics of the mouth region and is proven to be advantageous, even when recurrent
networks are deployed for back-end [12]. It consists of a
convolutional layer with 64 3D kernels of 5 by 7 by 7 size
(time/width/height), followed by batch normalization and rectified linear units.
We use the 34-layer identity mapping version, which was
proposed for ImageNet [23]. The ResNet drops progressively
the spatial dimensionality until its output becomes a single dimensional tensor per time step. We should emphasize that we
did not make use of pretrained models, as they are optimized
for completely different tasks (e.g. static colored images from
ImageNet or CIFAR). Finally, the output of ResNet-34 is fed
to a 2-layer BGRU which consists of 1024 cells in each layer.
3.2. Audio Stream
The audio stream consists of an 18-layer ResNet followed by
two BGRU layers. There is no need to use a spatiotemporal
convolution front-end in this case as the audio waveform is an
1D signal. We use the standard architecture for the ResNet18 with the main difference being that we use 1D instead of
2D kernels which are used for image data. A temporal kernel
of 5ms with a stride of 0.25ms is used in the first convolutional layer in order to extract fine-scale spectral information.
The output of the ResNet is divided into 29 frames/windows
using average pooling in order to ensure the same frame rate
as the video is used. These audio frames are then fed to the
following ResNet layers which consist of the default kernels
of size 3 by 1 so deeper layers extract long-term speech characteristics. The output of the ResNet-18 is fed to a 2-layer
BGRU which consists of 1024 cells in each layer (using the
same architecture as in [13]).
3.3. Classification Layers
The BGRU outputs of each stream are concatenated and fed to
another 2-layer BGRU in order to fuse the information from
the audio and visual streams and jointly model their temporal
dynamics. The output layer is a softmax layer which provides
a label to each frame. The sequence is labeled based on the
highest average probability.
4. EXPERIMENTAL SETUP
4.1. Preprocessing
Video: The first step is the extraction of the mouth region of
interest (ROI). Since the mouth ROIs are already centered, a
fixed bounding box of 96 by 96 is used for all videos as shown
in Fig. 1. Finally, the frames are transformed to grayscale and
are normalized with respect to the overall mean and variance.
Audio: Each audio segment is z-normalised, i.e., has zero
mean and standard deviation one to account for variations in
different levels of loudness between the speakers.
4.2. Evaluation Protocol
The video segments are already partitioned into training, validation and test sets. There are between 800 and 1000 sequences for each word in the training set and 50 sequences
in the validation and test sets, respectively. In total there are
488766, 25000, and 25000 examples in the training, validation and test sets, respectively.
4.3. Training
Training is divided into 2 phases: first the audio/visual
streams are trained independently and then the audiovisual
network is trained end-to-end. During training data augmentation is performed on the video sequences of mouth ROIs.
This is done by applying random cropping and horizontal
flips with probability 50% to all frames of a given clip. Data
augmentation is also applied to the audio sequences. During
training babble noise at different levels (between -5 dB to 20
db) might be added to the original audio clip. The selection
of one of the noise levels or the use of the clean audio is done
using a uniform distribution.
4.3.1. Single Stream Training
Initialisation: First, each stream is trained independently.
Directly training end-to-end each stream leads to suboptimal
performance so we follow the same 3-step procedure as in
[13]. Initially, a temporal convolutional back-end is used instead of the 2-layer BGRU. The combination of ResNet and
temporal convolution (together with a softmax output layer)
is trained until there is no improvement in the classification
rate on the validation set for more than 5 epochs. Then the
temporal convolutional back-end is removed and the BGRU
back-end is attached. The 2-layer BGRU (again with a sotfmax output layer) is trained for 5 epochs, keeping the weights
of the 3D convolution front-end and the ResNet fixed.
End-to-End Training: Once the ResNet and the 2-layer
BGRU in each stream have been pretrained then they are put
together and the entire stream is trained end-to-end (using a
softmax output layer). The Adam training algorithm [24] is
used for end-to-end training with a mini-batch size of 36 sequences and an initial learning rate of 0.0003. Early stopping
with a delay of 5 epochs was also used.
4.3.2. Audiovisual Training
Initialisation: Once the single streams have been trained then
they are used for initialising the corresponding streams in
the multi-stream architecture. Then another 2-layer BGRU is
added on top of all streams in order to fuse the single stream
outputs. The top BGRU is first trained for 5 epochs (with a
softmax output layer), keeping the weights of the audio and
visual streams fixed.
End-to-End Training: Finally, the entire audiovisual network is trained jointly using Adam with a mini-batch size of
18 sequences and an initial learning rate of 0.0001. Early
stopping is also applied with a delay of 5 epochs.
5. RESULTS
Results are shown in Table 1. We report the performance of
the end-to-end audio-only, visual-only and audiovisual models. For comparison purposes, since there are no previous
100
A (End-to-End)
A (MFCC)
V (End-to-End)
V [13]*
V [15]
V [19]
A + V (End-to-End)
97.7
97.7
82.0
83.0
76.2
61.1
98.0
audio/audiovisual results on the LRW database we also compute the performance of a 2-layer BGRU network trained with
MFCC features which are the standard features for acoustic
speech recognition. We use 13 coefficients (and their deltas)
using a 40ms window and a 10ms step. The network is trained
in the same way as the BGRU networks in section 4.3 with
the only difference that it was trained for longer using early
stopping.
The end-to-end audio system results in a similar performance to MFCCs which is a significant result given that the
input to the system is just the raw waveform. However, we
should note that the effort required in order to train the endto-end system is significantly higher than the 2-layer BGRU
used with MFCCs. The end-to-end audiovisual system leads
to a small improvement over the audio-only models of 0.3%.
This is expected since the contribution of the visual modality
is usually marginal in clean audio conditions as reported in
previous works as well [1, 16].
In order to investigate the robustness to audio noise of the
audiovisual fusion approach we run experiments under varying noise levels. The audio signal for each sequence is corrupted by additive babble noise from the NOISEX database
[25] so as the SNR varies from -5 dB to 20 dB.
Results for the audio, visual and audiovisual models under noisy conditions are shown in Fig. 3. The video-only
classifier (blue solid line) is not affected by the addition of
the audio noise and therefore its performance remains constant over all noise levels. On the other hand, as expected, the
performance of the audio classifier (red dashed line) is significantly affected. Similarly, the performance of the MFCC
classifier (purple solid line) is also significantly affected by
noise. It is interesting to point out that although the MFCC
and end-to-end audio models result in the same performance
when audio is clean or under low levels of noise (10 to 20
dB), the end-to-end audio model results in much better performance under high levels of noise (-5 dB to 5 dB). It results
95
90
85
CR
Table 1. Classification Rate (CR) of the Audio-only (A),
Video-only (V) and audiovisual models (A + V) on the LRW
database. *This is a similar end-to-end model which uses a
different mouth ROI, computed based on tracked facial landmarks, in each video. In this work, we use a fixed mouth ROI
for all videos.
Stream
CR
80
75
70
V
A
AV
MFCC
65
60
-5
0
5
10
15
20
SNR (dB)
Fig. 3. Classification Rate (CR) as a function of the noise
level. A: End-to-End audio model. V: End-to-End visual
model, AV: End-to-End audiovisual model. MFCC: A 2-layer
BGRU trained with MFCCs.
in an absolute improvement of 0.9%, 3.5% and 7.5% over the
MFCC classifier, at 5 dB, 0 dB and -5 dB, respectively.
The audiovisual model (yellow dotted line) is more robust to audio noise than the audio-only models. It performs
slightly better under low noise levels (10 dB to 20 dB) but
it significantly outperforms both of them under high noise
levels (-5 dB to 5 dB). In particular, it leads to an absolute
improvement of 1.3%, 3.9% and 14.1% over the end-to-end
audio-only model at 5 dB, 0 dB and -5 dB, respectively.
6. CONCLUSION
In this work, we present an end-to-end visual audiovisual fusion system which jointly learns to extract features directly
from the pixels and audio waveforms and performs classification using BGRUs. Results on the largest publicly available database for within-context word recognition in the wild
show that the end-to-end audiovisual model slightly outperforms a standard MFCC-based system under clean conditions
and low levels of noise. It also significantly outperforms the
end-to-end and MFCC-based audio models in the presence of
high levels of noise. A natural next step would be to extend
the system in order to be able to recognise sentences instead
of isolated words. Finally, it would also be interesting to investigate in future work an adaptive fusion mechanism which
learns to weight each modality based on the noise levels.
7. ACKNOWLEDGEMENTS
This work has been funded by the European Community
Horizon 2020 under grant agreement no. 645094 (SEWA).
Themos Stafylakis has been partly funded by the European
Commission program Horizon 2020, under grant agreement
no. 706668 (Talking Heads).
8. REFERENCES
[1] G. Potamianos, C. Neti, G. Gravier, A. Garg, and A. W.
Senior, “Recent advances in the automatic recognition
of audiovisual speech,” Proceedings of the IEEE, vol.
91, no. 9, pp. 1306–1326, Sept 2003.
[2] S. Dupont and J. Luettin, “Audio-visual speech modeling for continuous speech recognition,” IEEE Trans. on
Multimedia, vol. 2, no. 3, pp. 141–151, 2000.
[3] S. Petridis and M. Pantic, “Prediction-based audiovisual
fusion for classification of non-linguistic vocalisations,”
IEEE Transactions on Affective Computing, vol. 7, no.
1, pp. 45–58, 2016.
[4] J. Ngiam, A. Khosla, M. Kim, J. Nam, H. Lee, and A. Y
Ng, “Multimodal deep learning,” in Proc. of ICML,
2011, pp. 689–696.
[5] D. Hu, X. Li, and X. Lu, “Temporal multimodal learning in audiovisual speech recognition,” in IEEE CVPR,
2016, pp. 3574–3582.
[6] H. Ninomiya, N. Kitaoka, S. Tamura, Y. Iribe, and
K. Takeda, “Integration of deep bottleneck features for
audio-visual speech recognition,” in Interspeech, 2015.
[7] Y. Mroueh, E. Marcheret, and V. Goel, “Deep multimodal learning for audio-visual speech recognition,” in
IEEE ICASSP, 2015, pp. 2130–2134.
[8] Y. Takashima, R. Aihara, T. Takiguchi, Y. Ariki, N. Mitani, K. Omori, and K. Nakazono, “Audio-visual speech
recognition using bimodal-trained bottleneck features
for a person with severe hearing loss,” Interspeech, pp.
277–281, 2016.
[9] S. Petridis and M. Pantic, “Deep complementary bottleneck features for visual speech recognition,” in ICASSP,
2016, pp. 2304–2308.
[10] S. Petridis, Z. Li, and M. Pantic, “End-to-end visual
speech recognition with LSTMs,” in IEEE ICASSP,
2017, pp. 2592–2596.
[11] M. Wand, J. Koutnik, and J. Schmidhuber, “Lipreading
with long short-term memory,” in IEEE ICASSP, 2016,
pp. 6115–6119.
[12] Y. M. Assael, B. Shillingford, S. Whiteson, and
N. de Freitas, “Lipnet: Sentence-level lipreading,” arXiv
preprint arXiv:1611.01599, 2016.
[13] T. Stafylakis and G. Tzimiropoulos, “Combining residual networks with LSTMs for lipreading,” in Interspeech, 2017, vol. 9, pp. 3652–3656.
[14] G. Trigeorgis, F. Ringeval, R. Brueckner, E. Marchi,
M. Nicolaou, B. Schuller, and S. Zafeiriou, “Adieu
features? end-to-end speech emotion recognition using a deep convolutional recurrent network,” in IEEE
ICASSP, 2016, pp. 5200–5204.
[15] J. S. Chung, A. Senior, O. Vinyals, and A. Zisserman,
“Lip reading sentences in the wild,” IEEE CVPR, 2017.
[16] S. Petridis, Y. Wang, Z. Li, and M. Pantic, “End-toend audiovisual fusion with LSTMs,” in Auditory-Visual
Speech Processing Conference, 2017.
[17] I. Anina, Z. Zhou, G. Zhao, and M. Pietikäinen,
“Ouluvs2: A multi-view audiovisual database for nonrigid mouth motion analysis,” in IEEE FG, 2015, pp.
1–5.
[18] P. Tzirakis, G. Trigeorgis, M. A. Nicolaou, B. Schuller,
and S. Zafeiriou, “End-to-end multimodal emotion
recognition using deep neural networks,” IEEE Journal
of Selected Topics in Signal Processing 2017.
[19] J. S. Chung and A. Zisserman, “Lip reading in the wild,”
in ACCV. Springer, 2016, pp. 87–103.
[20] M. Cooke, J. Barker, S. Cunningham, and X. Shao, “An
audio-visual corpus for speech perception and automatic
speech recognition,” The Journal of the Acoustical Society of America, vol. 120, no. 5, pp. 2421–2424, 2006.
[21] E. Patterson, S. Gurbuz, Z. Tufekci, and J. Gowdy,
“Moving-talker, speaker-independent feature study, and
baseline results using the CUAVE multimodal speech
corpus,” EURASIP J. Appl. Signal Process., vol. 2002,
no. 1, pp. 1189–1201, Jan. 2002.
[22] K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual
learning for image recognition,” in IEEE CVPR, 2016,
pp. 770–778.
[23] K. He, X. Zhang, S. Ren, and J. Sun, “Identity mappings
in deep residual networks,” in ECCV. Springer, 2016,
pp. 630–645.
[24] D. Kingma and J. Ba, “Adam: A method for stochastic
optimization,” arXiv preprint arXiv:1412.6980, 2014.
[25] A. Varga and H. Steeneken, “Assessment for automatic
speech recognition: Ii. NOISEX-92: A database and
an experiment to study the effect of additive noise on
speech recognition systems,” Speech communication,
vol. 12, no. 3, pp. 247–251, 1993.
| 1cs.CV
|
New Algorithms for Heavy Hitters in Data Streams ∗
arXiv:1603.01733v1 [cs.DS] 5 Mar 2016
David P. Woodruff
IBM Research Almaden
[email protected]
Abstract
An old and fundamental problem in databases and data streams is that of finding the heavy
hitters, also known as the top-k, most popular items, frequent items, elephants, or iceberg
queries. There are several variants of this problem, which quantify what it means for an item
to be frequent, including what are known as the ℓ1 -heavy hitters and ℓ2 -heavy hitters. There
are a number of algorithmic solutions for these problems, starting with the work of Misra and
Gries, as well as the CountMin and CountSketch data structures, among others.
In this survey paper, accompanying an ICDT invited talk, we cover several recent results
developed in this area, which improve upon the classical solutions to these problems. In particular, with coauthors we develop new algorithms for finding ℓ1 -heavy hitters and ℓ2 -heavy
hitters, with significantly less memory required than what was known, and which are optimal
in a number of parameter regimes.
1
The Heavy Hitters Problem
A well-studied problem in databases and data streams is that of finding the heavy hitters, also
known as the top-k, most popular items, frequent items, elephants, or iceberg quries. These
can be used for flow identification at IP routers [21], in association rules and frequent itemsets
[1, 25, 26, 44, 47], and for iceberg queries and iceberg datacubes [7, 22, 24]. We refer the reader
to the survey [18], which presents an overview of known algorithms for this problem, from both
theoretical and practical standpoints.
There are various different flavors of guarantees for the heavy hitters problem. We start with
what is known as the ℓ1 -guarantee:
Definition 1 (ℓ1 -(ǫ, φ)-Heavy Hitters Problem) In the (ǫ, φ)-Heavy Hitters Problem, we are
given parameters 0 < ǫ < φ < 1, as well as a stream a1 , . . . , am of items aj ∈ {1, 2, . . . , n}. Let fi
denote the number of occurrences of item i, i.e., its frequency. The algorithm should make one pass
over the stream and at the end of the stream output a set S ⊆ {1, 2, . . . , n} for which if fi ≥ φm,
then i ∈ S, while if fi ≤ (φ − ǫ)m, then i ∈
/ S. Further, for each item i ∈ S, the algorithm should
output an estimate f˜i of the frequency fi which satisfies |fi − f˜i | ≤ ǫm.
We are interested in algorithms which use as little space (i.e., memory) in bits as possible to
solve the ℓ1 -(ǫ, φ)-Heavy Hitters Problem. We allow the algorithm to be randomized and to
succeed with probability at least 1 − δ, for 0 < δ < 1. We do not make any assumption on the
∗
A preliminary version of this paper appeared as an invited paper in ICDT 2016.
1
ordering of the stream a1 , . . . , am . This is desirable, as often in applications one cannot assume a
best-case or even a random order. We will assume m is known in advance, though many of the
algorithms below (including ours) can deal with unknown m.
The first algorithm for the ℓ1 -(ǫ, φ)-Heavy Hitters Problem was given by Misra and Gries
[39], who achieved O(ǫ−1 log n) bits of space for any φ > 2ǫ. This algorithm was rediscovered
by Demaine et al. [20], and again by Karp et al. [32]. Other than these algorithms, which are
deterministic, there are a number of randomized algorithms, such as the CountSketch [15], CountMin sketch [19], sticky sampling [35], lossy counting [35], space-saving [37], sample and hold [21],
multi-stage bloom filters [13], and sketch-guided sampling [33]. Berinde et al. [6] show that using
O(kǫ−1 log(mn)) bits of space, one can achieve the stronger guarantee of reporting, for each item
res(k)
res(k)
, where F1
< m denotes the sum of frequencies of items
i ∈ S, f˜i with |f˜i − fi | ≤ kǫ F1
in {1, 2, . . . , n} excluding the frequencies of the k most frequent items. This is particularly useful
res(k)
will depend only on the
when there are only a few large frequencies, since then the error kǫ F1
remaining small frequencies.
While the ℓ1 -heavy hitters have a number of applications, there is also a sometimes stronger
notion known as the ℓ2 -heavy hitters, which we now define.
Definition 2 (ℓ2 -(ǫ, φ)-Heavy Hitters Problem) In the (ǫ, φ)-Heavy Hitters Problem, we are
given parameters 0 < ǫ < φ < 1, as well as a stream a1 , . . . , am of items aP
j ∈ {1, 2, . . . , n}. Let fi
denote the number of occurrences of item i, i.e., its frequency. Let F2 = ni=1 fi2 . The algorithm
should make one pass over the stream and at the end of the stream output a set S ⊆ {1, 2, . . . , n}
for which if fi2 ≥ φF2 , then i ∈ S, while if fi2 ≤ (φ − ǫ)F2 , then i ∈
/ S. Further, for each item
√ i ∈ S,
the algorithm should output an estimate f˜i of the frequency fi which satisfies |fi − f˜i | ≤ ǫ F2 .
One of the algorithms for ℓ1 -heavy hitters mentioned above, the CountSketch [16], refined in
[46], actually solves the ℓ2 -(ǫ, φ)-Heavy Hitters Problem. Notice that this guarantee can be
significantly stronger than the aforementioned ℓ1 -guarantee that fi ≥ ǫm. Indeed, if fi ≥ φm, then
fi2 ≥ φ2 m2 ≥ φ2 F2 . So, an algorithm for finding the ℓ2 -heavy hitters, with φ replaced by φ2 , will
find all items satisfying the ℓ1 -guarantee with parameter φ. On the other hand, given a stream
√
of n distinct items in which fi∗ = n for an i∗ ∈ [n] = {1, 2, 3, . . . , n}, yet fi = 1 for all i 6= i∗ ,
an algorithm satisfying the ℓ2 -heavy hitters guarantee will identify item i with constant φ, but an
√
√
algorithm which only has the ℓ1 -guarantee would need to set φ = 1/ n, therefore using Ω( n) bits
of space. In fact, ℓ2 -heavy hitters are in some sense the best one can hope for with a small amount
of space in a data stream, as it is known for p > 2 that finding those i for which fip ≥ φFp requires
n1−2/p bits of space even for constant φ [5, 14].
The ℓ2 -heavy hitter algorithms of [16, 46] have broad applications in compressed sensing [23,
38, 43] and numerical linear algebra [10, 17, 36, 41], and are often used as a subroutine in other
data stream algorithms, such as ℓp -sampling [3, 30, 40], cascaded aggregates [29], and frequency
moments [9, 28].
Given the many applications of heavy hitters, it is natural to ask what the best space complexity
for them is. For simplicity of presentation, we make the common assumption that the stream length
m is polynomially related to the universe size n.
It is clear that for constant ǫ and φ, that there is an Ω(log n) bit lower bound, as this is just
the number of bits needed to specify the identity of the heavy hitter.
For constant ǫ, given the aforementioned results, this is actually tight for the ℓ1 -(ǫ, φ)-Heavy
Hitters Problem. The main focus then, for the ℓ1 -(ǫ, φ)-Heavy Hitters Problem is on obtaining
2
tight bounds as a function of ǫ and φ.
On the other hand, for the ℓ2 -(ǫ, φ)-Heavy Hitters Problem, even for constant ǫ and φ, the
best previous algorithms of [16] and the followup [46] achieve Θ(log2 n) bits of space. It is known
that if one allows deletions in the stream, in addition to insertions, then Θ(log2 n) bits of space is
optimal [4, 30]. However, in many cases we just have a stream of insertions, such as in the model
studied in the seminal paper of Alon, Matias, and Szegedy [2]. Thus, for the ℓ2 -(ǫ, φ)-Heavy
Hitters Problem, our focus will be on the regime of constant ǫ and φ and on understanding the
dependence on n.
There are a number of other desirable properties one would want out of a heavy hitters algorithm. For instance, one is often also interested in minimizing the update time and reporting time
of such algorithms. Here, the update time is defined to be the time the algorithm needs to update
its data structure when processing a stream insertion. The reporting time is the time the algorithm
needs to report the answer after having processed the stream. In this article we will focus primarily
on the space complexity. For other very interesting recent work on improving the reporting time
in a stream of insertions and deletions, see [34]. The results in this survey are focused on a stream
of insertions only (for which, as mentioned above, smaller space bounds are possible).
2
Our Recent Results
In several recent works [8, 11, 12], we significantly improve known algorithms for finding both
ℓ1 -heavy hitters as well as ℓ2 -heavy hitters. For many settings of parameters, our algorithms are
optimal.
2.1
ℓ1 -Heavy Hitters
In joint work with Bhattacharyya and Dey [8], we improve upon the basic algorithm of Misra and
Gries [39] for the ℓ1 -(ǫ, φ)-Heavy Hitters Problem, the latter achieving O(ǫ−1 log n) bits of space
for any φ ≥ 2ǫ. There are two algorithms of [8], the first a bit simpler and already achieving a large
improvement over [39], and the second an optimal algorithm. We first discuss the first algorithm.
We first recall the algorithm of Misra and Gries. That algorithm initializes a table of 1/ǫ + 1
pairs of (v, c) to (⊥, 0), where v is an element in the universe {1, 2, . . . , n} ∪ ⊥, and c is a nonnegative integer. When receiving a new stream insertion ai , the algorithm checks if v = ai for some
(v, c) pair in the table. If so, it replaces (v, c) with (v, c + 1). Otherwise, if there is a (v, c) in the
table with v = ⊥, then the algorithm replaces that (v, c) pair with (ai , 1). If neither of the previous
two cases hold, the algorithm takes each (v, c) pair in the table, and replaces it with (v, c − 1). If
c − 1 = 0, then the corresponding v is replaced with ⊥.
Note that the algorithm, as described in the previous paragraph, naturally can be implemented
using O(ǫ−1 log n) bits of space (recall we assume the stream length m and the universe size n
are polynomially related, so log m = Θ(log n)). Moreover, a nice property is that the algorithm is
deterministic.
For the correctness, note that if an item i occurs fi ≥ 2ǫm times, then it will appear in the
table at the end of the stream. Indeed, notice that for each occurrence of i in the stream, if it is
not included in the table via the operation of replacing a pair (i, c) with (i, c + 1) for some value
of c, or replacing a pair (⊥, 0) with (i, 1), then this means that there were at least 1/ǫ + 1 stream
updates that were removed from the table upon seeing this occurrence of i, since each counter c
3
for each (v, c) pair in the table is decremented by 1. We can therefore charge those stream updates
to this occurrence of i. Moreover, if (i, c) is in the table for some value of c and is replaced with
(i, c − 1) or (⊥, 0), this means we can charge at least 1/ǫ stream updates to items not equal to i
to this occurrence of i. Since we are charging distinct stream updates for each occurrence of i, we
have the relationship that fi · (1/ǫ) ≤ m, which is a contradiction to fi ≥ 2ǫm. Therefore, i will
occur in a pair in the table at the end of the stream. The same analysis in fact implies that at most
ǫm occurrences of i will not be accounted for in the table at the end of the stream, which means
that for the (i, c) pair in the table, we have fi ≥ c ≥ fi − ǫm. This latter guarantee enables us to
solve the ℓ1 -(ǫ, φ)-Heavy Hitters Problem for any φ ≥ 2ǫ.
One shortcoming of the algorithm above is that if φ is much larger than ǫ, say φ is constant,
then the above algorithm still requires O(ǫ−1 log n) bits of space, that is, it is insensitive to the
value of φ. Consider for instance, the case when ǫ = 1/ log n and φ = 1/10, so one wants a very
high accuracy estimate to each of the item frequencies for items occurring at least 10% of the time.
The above algorithm would use O(log2 n) bits of space for this problem. In this case, the only
known lower bound is Ω(log n) bits, which just follows from the need to return the identities of the
heavy hitters. Is it possible to improve this O(log2 n) bits of space upper bound?
This is precisely what we show in [8]. Here we sketch how to achieve a bound of O((1/φ) log n +
(1/ǫ) log(1/ǫ)) bits of space and refer to [8] for further optimizations as well as extensions to related
problems. Note that this translates to a space bound of O(log n log log n) bits for the above setting
of parameters.
The first observation is that if we randomly sample r = Θ(1/ǫ2 ) stream updates, then with
probability 99%, simultaneously for every universe item i, if we let fˆi denote its frequency among
the samples, and fi its frequency in the original stream, then we have
fi
ǫ
fˆi
−
≤ .
r
m
2
This follows by Chebyshev’s inequality and a union bound. Indeed, consider a given i ∈ [n] with
frequency fi and suppose we sample each of its occurrences pairwise-independently with probability
r/m, for a parameter r. Recall that pairwise independence here implies that any single occurrence
is sampled with probability r/m and any two occurrences are jointly sampled with probability
exactly r 2 /m2 , though we do not impose any constraints on the joint distribution of any three or
more samples. Also, a pairwise independent hash function can be represented with only O(log n)
bits of space. Then the expected number E[fˆi ] of sampled occurrences is fi · r/m and the variance
Var[fˆi ] is fi · r/m(1 − r/m) ≤ fi r/m (here we use pairwise independence to conclude the same
variance bound as if the samples were fully independent). Applying Chebyshev’s inequality,
h
4fi r
rǫ i Var[fˆi ]
≤
≤
.
Pr fˆi − E[fˆi ] ≥
2
(rǫ/2)2
mr 2 ǫ2
4fi
. By the union bound, if we
Setting r = ǫC2 for a constant C > 0 makes this probability at most Cm
r
sample each element in the stream independently with probability m
, then the probability there
Pn 4fi
4
1
exists an i for which |fˆi − E[fˆi ]| ≥ rǫ
i=1 Cm ≤ C , which for C ≥ 400 is at most 100 ,
2 is at most
as desired.
After sampling so that the stream length is reduced to O(1/ǫ2 ), it follows that the number
of distinct items in the stream is also O(1/ǫ2 ), and therefore if we hash the item identifiers to a
4
universe of size O(1/ǫ4 ), by standard arguments with probability 99% the items will be perfectly
hashed, that is, there will be no collisions. This follows even with a pairwise-independent hash
function h. The high level idea then is to run the algorithm of Misra and Gries, but the pairs (v, c)
correspond to the hashed item identity and the count in the sampled stream, respectively. Notice
that it takes only O(log(1/ǫ)) bits to represent such pairs and so the algorithm of Misra and Gries
would take O(ǫ−1 log(1/ǫ)) bits of space.
However, we still want to return the actual item identifiers! To do this, we maintain a parallel
data structure containing actual item identifiers in [n], but the data structure only contains O(1/φ)
items. In particular, these item identities correspond to the items v for which (h(v), c) is stored in
the algorithm of Misra and Gries, for which the c values are largest. Namely, the items with top 1/φ
c-values have their actual identities stored. This can be maintained under stream insertions since
given a new stream update, one has the actual identity in hand, and therefore can appropriately
update the identities of the items with top O(1/φ) counts. Moreover, when we subtract one from
all counters in the algorithm of Misra and Gries, the only thing that changes in the top O(1/φ)
identities is that some of them may now have zero frequency, and so can be thrown out. Thus, we
can always maintain the actual top O(1/φ) identities in the original (before hashing) universe.
The second algorithm of [8] achieves an optimal O(ǫ−1 log φ−1 + φ−1 log n + log log m) bits of
space. The algorithm can be seen as an extension of our first algorithm. The idea of the optimal
algorithm, as in our first algorithm, is to have a list of the top O(1/φ)-heavy hitters with exact
identities, and to use a separate data structure to approximate their individual frequencies up to
ǫ · m. In the earlier algorithm, this was an accompanying Misra-Gries data structure on the hashed
universe identities and sample count values; in the new one we optimize this data structure to use
O(ǫ−1 log φ−1 ) bits instead of the earlier O(ǫ−1 log ǫ−1 ) bits. We have O(1/ǫ) counts, as before,
but now in each count we spend O(1) bits on average. We also eliminate the need to maintain
hashed identities in the earlier algorithm by partitioning the items into O(1/ǫ) buckets using a hash
function and maintaining the approximate sum in each bucket. We note that the counts need to
be randomized, but in a different sense than probabilistic counters since we want them to achieve
additive error O(1/ǫ) rather than the relative error guarantee of probabilistic counters. We call
these accelerated counters since their relative error improves as the count gets larger. We are able to
compress the counts since they sum up to O(1/ǫ2 ), which is the length of the sampled stream. Each
count is individually only correct with constant probability, so we have O(log(1/φ)) repetitions and
take a median across the repetitions to get a correct count for each of the O(1/φ) heavy hitters in
our list.
We refer the reader to [8] for further details about both algorithms.
2.2
ℓ2 -Heavy Hitters
In joint work with Braverman, Chestnut, and Ivkin [12], we improve upon the CountSketch data
structure [16] for the ℓ2 -(ǫ, φ)-Heavy Hitters Problem. To illustrate the algorithm of [12], we
consider ǫ and φ to be constants in what follows, and further, we suppose there is only a single
i∗ ∈ [n] for which fi2∗ ≥ φF2 and there is no i for which (φ − ǫ)F2 ≤ fi2 < φF2 . It is not hard to
reduce to this case by first hashing into O(1) buckets (recall φ, ǫ are constants for this discussion),
since the O(1/φ) heavy hitters will go to separate buckets with large constant probability (if, say,
we have Ω(1/φ2 ) buckets). Thus, we focus on this case. In this case the CountSketch algorithm
would use Θ(log2 n) bits of space, whereas in [12] we achieve O(log n log log n) bits of space, nearly
matching the trivial Ω(log n) bit lower bound.
5
We first explain the CountSketch data structure. The idea is to assign each item i ∈ [n] a random
sign σ(i) ∈ {−1, 1}. WePalso randomly partition [n] into B buckets via a hash function h and
maintain a counter cj = i|h(i)=j σ(i) · fi in the j-th bucket. Then, to estimate any given frequency
P
fi , we estimate it as σ(i) · ch(i) . Note that E[σ(i) · ch(i) ] = E[σ(i)2 fi + j6=i,h(j)=h(i) fj σ(j)σ(i)] =
fi , using that E[σ(i)σ(j)] = 0 for i 6= j. Moreover, by computing the variance and applying
Chebyshev’s inequality, one has that
p
|σ(i) · ch(i) − fi | = O( F2 /B)
with probability at least 9/10. The intuitive explanation is that due to the random sign combination
of remaining items in the same hash bucket as i, the absolute value of this linear combination
concentrates to the Euclidean norm of the frequency vector of these items. The idea then is to
repeat this independently O(log n) times in parallel. Then we estimate fi by taking the median
of the estimates across each of the O(log n) repetitions. By Chernoff bounds,
p we have that with
2
probability 1 − 1/n , say, the resulting estimate is within an additive O( F2 /B) of the true
frequency fi . This then holds for every i ∈ [n] simultaneously by a union bound, at which point
one can then find the ℓ2 -heavy hitters, if say, one sets B = Θ(1/ǫ2 ).
Notice that it is easy to maintain the CountSketch data structure in a data stream since we
just need to hash the new item i to the appropriate bucket and add σ(i) to the counter in that
bucket, once for each of the O(log n) repetitions. The total space complexity of the CountSketch
algorithm is O(B · log2 n), where the “B” is the number of hash buckets, one log n factor is to
store the counter in each bucket, and the other log n factor is for the number of repetitions. For
constant ǫ and B = Θ(1/ǫ2 ) this gives O(log2 n) bits of space. It is also not hard to see that the
CountSketch data structure can be maintained in a stream with deletions as well as insertions,
since given a deletion to item i, this just corresponds to subtracting σ(i) from the bucket i hashes
to in each repetition. Moreover, as mentioned earlier, this O(log2 n) space bound is optimal for
streams with deletions.
To give some intuition for our new algorithm, let i∗ ∈ [n] be the identity of the single ℓ2 -heavy
√
hitter that we wish to find. Suppose first that fi∗ ≥ n log n and that fi ∈ {0, 1} for all i ∈ [n]\{i∗ }.
For the moment, we are also going to ignore the issue of storing random bits, so assume we can
store poly(n) random bits for free (which can be indexed into using O(log n) bits of space). We will
later sketch how to remove this assumption. As in the CountSketch algorithm, we again assign a
random sign σ(i) to each item i ∈ [n]. Suppose we randomly partition [n] into twoPbuckets using a
hash function
two counters c1 = i|h(i)=1 σ(i) · fi
P h : [n] → {1, 2}, and correspondingly maintain
∗
and c2 = i|h(i)=2 σ(i) · fi . Suppose for discussion that h(i ) = 1. A natural question is what the
values c1 and c2 look like as we see more updates in the stream.
Consider the values c1 − σ(i∗ ) · fi∗ and c2 . Then, since all frequencies other than i∗ are assumed
to be 0 or 1, and since the signs σ(j) are independent, these two quantities evolve as random walks
starting at 0 and incrementing by +1 with probability 1/2, and by −1 with probability 1/2, at each
step of the walk. By standard theory of random walks (e.g., Levy’s theorem), there is a constant
C > 0 so that with probability at least 9/10, simultaneously at all times during the stream we
√
have that |c1 − σ(i∗ ) · fi∗ | and |c2 | are upper bounded by C n. The constant of 9/10, like typical
constants in this paper, is somewhat arbitrary. This suggests the following approach to learning
√
√
i∗ : at some point in the stream we will have that fi∗ > 2C n, and at that point |c1 | > C n, but
then we know that i∗ occurs in the first bucket. This is assuming that the above event holds for
the random walks. Since we split [n] randomly into two pieces, this gives us 1 bit of information
6
about the identity of i∗ . If we were to repeat this O(log n) times in parallel, we would get exactly
the CountSketch data structure, which would use Θ(log2 n) bits of space. Instead, we get much
better space by repeating Θ(log n) times sequentially!
To repeat this sequentially, we simply wait until either |c1 | or |c2 | exceeds Cn1/2 , at which point
we learn one bit of information about i∗ . Then, we reset the two counters to 0 and perform the
√
procedure again. Assuming fi∗ = Ω( n log n), we will have Ω(log n) repetitions of this procedure,
each one succeeding independently with probability 9/10. By Chernoff bounds, there will only be
a single index i ∈ [n] which match a 2/3 fraction of these repetitions, and necessarily i = i∗ .
2.2.1
Gaussian Processes
√
In general we do not have fi∗ = Ω( n log n), nor do we have that fi ∈ {0, 1} for all i ∈ [n] \ {i∗ }.
We fix both problems using the theory of Gaussian processes.
Definition 3 A Gaussian process is a collection {Xt }t∈T of random variables, for an index set
T , for which every finite linear combination of the random variables is Gaussian.
We assume E[Xt ] = 0 for all t, as this will suffice for our application. It then follows that the
Gaussian process is entirely determined by its covariances E[Xs Xt ]. This fact is related to the
fact that a Gaussian distribution is determined by its mean and covariance. The distance function
d(s, t) = (E[(Xs − Xt )2 ])1/2 is then a pseudo-metric on T (the only property it lacks of a metric is
that d(s, t) may equal 0 if s 6= t).
The connection to data streams is the following. Suppose we replace the signs σ(i) with standard
normal random variables
g(i) in our counters above, and consider a counter c at time t, denoted
P
c(t), of the form i g(i) · fi (t). Here fi (t) is the frequency of item i after processing t stream
insertions. The main point is that c(t) is a Gaussian process! Indeed, any linear combination of
the c(t) values for different t is again Gaussian since the sum of normal random variables is again
a normal random variable.
The reason we wish to make such a connection to Gaussian processes is the following powerful
inequality called the “chaining inequality”.
Theorem 4 (Talagrand [45]) Let {Xt }t∈T be a Gaussian process and let T0 ⊆ T1 ⊆ T2 ⊆ · · · ⊆ T
i
be such that |T0 | = 1 and |Ti | ≤ 22 for i ≥ 1. Then,
X
E sup Xt ≤ O(1) · sup
2i/2 d(t, Ti ),
t∈T
t∈T i≥0
where d(t, Ti ) = mins∈Ti d(t, s).
We wish to apply Theorem 4 to the problem of finding ℓ2 -heavy hitters. Let F2 (t) be the value of
the second moment F2 after seeing t stream insertions. We now describe how to choose the sets Ti
in order to apply the chaining inequality; the intuition is that we recursively partition the stream
based on its F2 value.
Let at be the first stream update for which F2 (m)/2 ≤ F2 (t). Then T0 = {t}. We then let Ti be
i
the set of 22 times t1 , t2 , . . . , t22i in the stream for which tj is the first point in the stream for which
i
j · F2 (m)/22 ≤ F2 (tj ). Then, we have created a nested sequence of subsets T0 ⊆ T1 ⊆ T2 ⊆ · · · ⊆ T
i
with |T0 | = 1 and |Ti | ≤ 22 for i ≥ 1.
7
We are now in position to apply Theorem 4. A straightforward computation based on our
recursive partitioning of the stream around where F2 changes (see [12] for details) shows that for
any stream position t and set Ti we have created,
1/2
F2
2 1/2
.
d(t, Ti ) = min E[|c(t) − c(s)| ]
=O
s∈Ti
22i
Applying Theorem 4, we have
E[sup Xt ] ≤ O(1) sup
t∈T
X
i/2
2
t∈T i≥0
F2
22i
1/2
1/2
= O(F2 ).
This P
is exactly the same bound that the theory for random walks gave us earlier! (recall in that
case i6=i∗ fi2 < n).
Using Gaussian processes has therefore allowed us to remove our earlier assumption that fi ∈
{0, 1} for all i ∈ [n] \ {i∗ }. The same
random walk based algorithm will now work; however, we
√
still need to assume the fi∗ = Ω( F2 log n) in order to learn log n bits of information
to identify
√
F
i∗ , as before. This is not satisfactory, as an ℓ2 -heavy hitter only satisfies
f
=
Ω(
)
(recall we
i
2
√
have assumed φ and ǫ are constants), which is weaker than the fi∗ = Ω( F2 log n) that the above
analysis requires.
2.2.2
Amplification
√
To remove the assumption that fi∗ = Ω( F2 log n), our work [12] designs what we call an “amplification” procedure. This involves for j = 1, 2, . . . , O(log log n), independently choosing a pairwise
independent
hash function hj : [n]P→ {1, 2}. For each j, we as before maintain two counters
P
j
c1 = i|hj (i)=1 gj (i) · fi and cj2 = i|hj (i)=2 gj (i) · fi , where the gj (i) are independent standard
normal random variables.
Applying the chaining inequality to each of the O(log log n) counters created, we have that with
j
j
large constant probability,
√ both counters c1 and c2
√ in a constant fraction of the O(log log n) pairs,
will be bounded by O( F2 ) in magnitude. It follows that if fi∗ ≥ C F2 for a sufficiently large
constant C > 0 (which we can assume by first hashing the universe into O(1) buckets before the
streaming algorithm begins), then in say, a 9/10 fraction of pairs j, the counter cjk , k ∈ {1, 2},
of larger magnitude will contain i∗ . Moreover, by Chernoff bounds, only a log1c n fraction of other
i ∈ [n] will hash to the larger counter in at least a 9/10 fraction of such pairs, where c > 0 is a
constant that can be made arbitrarily large by increasing the constant in the number O(log log n)
of pairs of counters created. Now the idea is to effectively run our previous algorithm only on items
which hash to the heavier counter in at least a 9/10 fraction of pairs. By definition, this will contain
i∗ , and now the expected second moment of the√other items for which we run the algorithm on will
be F2 / logc n, which effectively makes fi∗ = Ω( F2 log n), where F2 is now measured with respect
to the items for which we run the algorithm on. Now we can sequentially learn O(log n) bits of
information about i∗ in our algorithm, as before.
One thing√to note about this approach is that after seeing a sufficiently large number of insertions
∗
of i , i.e., Θ( F2 ) such insertions, then most of the pairs of counters will have the property that
the larger counter (in absolute value) stays larger forever. This is due to the chaining inequality.
This can be used to fix the itemset for which we run the algorithm on. In fact, this is precisely
why this does not result in a 2-pass algorithm, which one might expect since one does not know the
8
itemset to run our algorithm on in advance. However, we always run the algorithm on whichever
current itemset agrees with at least a 9/10 fraction of the larger counters, and just accept the fact
that in the beginning of the stream the bits we learn about i∗ are nonsense; however, after enough
updates to i∗ have occurred in the stream then the counters “fix” themselves in the sense that the
larger counter does not change. At this point the bits we learn about i∗ in our algorithm are the
actual bits that we desire. At the end of the stream, we only look at a suffix of these bits to figure
out i∗ , thereby ignoring the nonsensical bits at the beginning of the stream. We refer the reader to
[12] for more details.
2.2.3
Derandomization
The final piece of the algorithm is to account for the randomness used by the algorithm. We need
to derandomize the counters, which use the theory of Gaussian processes to argue their correctness.
We also cannot afford to maintain all of the hash functions that were used to learn specific bits of
i∗ (which we need ad the end of the stream to figure out what i∗ is).
To derandomize the Gaussian processes, we use a derandomized Johnson Lindenstrauss transform of Kane, Meka, and Nelson [31]. The rough idea is to first apply a Johnson-Lindenstrauss
transform to the frequency vectors for which we take inner products with independent Gaussian
random variables in our counters. This will reduce the dimension from n to O(log n), for which we
can then afford to take an inner product with fully independent Gaussian random variables. The
nice thing about Johnson-Lindenstrauss transforms is that they preserve all the covariances up to
a constant factor in our specific Gaussian process, and therefore we can use Slepian’s Lemma (see
[12] for details) to argue that the Gaussian process is roughly the same as before, since it is entirely
determined by its covariances. Here the derandomized Johnson-Lindenstrauss transform of [31] can
be represented using only O(log n log log n) bits of space. Also, instead of using Gaussian random
variables, which require truncation, we can directly use sign random variables (+1 with probability
1/2, −1 with probability 1/2), which results in what are called Bernoulli processes, together with
a comparison theorem for Bernoulli processes and Gaussian processes. This enables us to avoid
arguments about truncating Gaussians.
To derandomize the hash functions, we use Nisan’s pseudorandom generator in a similar way
that Indyk uses it for derandomizing his algorithms for norm estimation [27, 42]. Please see [12]
for further details.
2.3
Followup Work
Very recently, in followup work by Braverman et al. [11], we improved the space bound further
to the optimal O(log n) bits of space (for constant ǫ, φ). The high level idea of using Gaussian or
Bernoulli processes is the same, but several additional insights were needed. This involves both a
new algorithm which we call BPTree, which avoids the amplification step and Nisan’s pseudorandom
generator described above, as well as a better derandomization of the Bernoulli processes using
O(1)-wise independence. We refer the reader to that work for further details.
3
Conclusions
We presented new algorithms for finding ℓ1 -heavy hitters and ℓ2 -heavy hitters in a data stream.
We refer the reader to the original papers cited above for further details. As these problems are
9
inspired from applications in practice, it is very interesting to see how the improved theoretical
algorithms perform in practice. In ongoing work we are testing these algorithms in practice on real
datasets.
Another interesting aspect is that the technique of using Gaussian processes in the ℓ2 -heavy
hitters algorithm has led to a number of other improvements to data stream algorithms, including
for example the ability to estimate the second moment F2 at all times in a stream of insertions.
Previously, given a stream of length n and a universe of size n, to estimate F2 at all points in a
stream up to a constant factor would require Θ(log2 n) bits of space, since it takes Θ(log n log(1/δ))
bits to estimate it at a single point with failure probability δ, and one needs to union bound over
n stream positions. Using Gaussian processes, [12] achieves only O(log n log log n) bits of space for
this task. It would be interesting to see if Gaussian processes are useful for other problems in data
streams.
References
[1] Rakesh Agrawal and Ramakrishnan Srikant. Fast algorithms for mining association rules in
large databases. In VLDB’94, Proceedings of 20th International Conference on Very Large
Data Bases, September 12-15, 1994, Santiago de Chile, Chile, pages 487–499, 1994.
[2] Noga Alon, Yossi Matias, and Mario Szegedy. The space complexity of approximating the
frequency moments. J. Comput. Syst. Sci., 58(1):137–147, 1999.
[3] Alexandr Andoni, Robert Krauthgamer, and Krzysztof Onak. Streaming algorithms via precision sampling. In IEEE 52nd Annual Symposium on Foundations of Computer Science, FOCS
2011, Palm Springs, CA, USA, October 22-25, 2011, pages 363–372, 2011.
[4] Khanh Do Ba, Piotr Indyk, Eric Price, and David P. Woodruff. Lower bounds for sparse
recovery. CoRR, abs/1106.0365, 2011.
[5] Ziv Bar-Yossef, T. S. Jayram, Ravi Kumar, and D. Sivakumar. An information statistics
approach to data stream and communication complexity. J. Comput. Syst. Sci., 68(4):702–
732, 2004.
[6] Radu Berinde, Piotr Indyk, Graham Cormode, and Martin J. Strauss. Space-optimal heavy
hitters with strong error bounds. ACM Trans. Database Syst., 35(4):26, 2010.
[7] Kevin S. Beyer and Raghu Ramakrishnan. Bottom-up computation of sparse and iceberg cubes.
In SIGMOD 1999, Proceedings ACM SIGMOD International Conference on Management of
Data, June 1-3, 1999, Philadelphia, Pennsylvania, USA., pages 359–370, 1999.
[8] Arnab Bhattacharyya, Palash Dey, and David P. Woodruff. An optimal algorithm for l1-heavy
hitters in insertion streams and related problems. PODS, 2016.
[9] Lakshminath Bhuvanagiri, Sumit Ganguly, Deepanjan Kesh, and Chandan Saha. Simpler
algorithm for estimating frequency moments of data streams. In Proceedings of the Seventeenth
Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2006, Miami, Florida, USA,
January 22-26, 2006, pages 708–713, 2006.
10
[10] Jean Bourgain and Jelani Nelson. Toward a unified theory of sparse dimensionality reduction
in euclidean space. CoRR, abs/1311.2542, 2013.
[11] Vladimir Braverman, Stephen R. Chestnut, Nikita Ivkin, Jelani Nelson, Zhengyu Wang, and
David P. Woodruff. BPTree: an ℓ2 heavy hitters algorithm using constant memory. CoRR,
abs/1603.00759, 2016.
[12] Vladimir Braverman, Stephen R. Chestnut, Nikita Ivkin, and David P. Woodruff. Beating
countsketch for heavy hitters in insertion streams. STOC, 2016.
[13] Yousra Chabchoub, Christine Fricker, and Hanene Mohamed. Analysis of a bloom filter algorithm via the supermarket model. In 21st International Teletraffic Congress, ITC 2009, Paris,
France, September 15-17, 2009, pages 1–8, 2009.
[14] Amit Chakrabarti, Subhash Khot, and Xiaodong Sun. Near-optimal lower bounds on the
multi-party communication complexity of set disjointness. In 18th Annual IEEE Conference
on Computational Complexity (Complexity 2003), 7-10 July 2003, Aarhus, Denmark, pages
107–117, 2003.
[15] Moses Charikar, Kevin Chen, and Martin Farach-Colton. Finding frequent items in data
streams. Theoretical Computer Science, 312(1):3–15, 2004.
[16] Moses Charikar, Kevin Chen, and Martin Farach-Colton. Finding frequent items in data
streams. Theor. Comput. Sci., 312(1):3–15, 2004.
[17] Kenneth L. Clarkson and David P. Woodruff. Low rank approximation and regression in input
sparsity time. In Symposium on Theory of Computing Conference, STOC’13, Palo Alto, CA,
USA, June 1-4, 2013, pages 81–90, 2013.
[18] Graham Cormode and Marios Hadjieleftheriou. Finding frequent items in data streams. Proceedings of the VLDB Endowment, 1(2):1530–1541, 2008.
[19] Graham Cormode and S Muthukrishnan. An improved data stream summary: the count-min
sketch and its applications. Journal of Algorithms, 55(1):58–75, 2005.
[20] Erik D Demaine, Alejandro López-Ortiz, and J Ian Munro. Frequency estimation of internet
packet streams with limited space. In AlgorithmsESA 2002, pages 348–360. Springer, 2002.
[21] Cristian Estan and George Varghese. New directions in traffic measurement and accounting:
Focusing on the elephants, ignoring the mice. ACM Trans. Comput. Syst., 21(3):270–313,
2003.
[22] Min Fang, Narayanan Shivakumar, Hector Garcia-Molina, Rajeev Motwani, and Jeffrey D.
Ullman. Computing iceberg queries efficiently. In VLDB’98, Proceedings of 24rd International
Conference on Very Large Data Bases, August 24-27, 1998, New York City, New York, USA,
pages 299–310, 1998.
[23] Anna C. Gilbert, Yi Li, Ely Porat, and Martin J. Strauss. Approximate sparse recovery:
optimizing time and measurements. In Proceedings of the 42nd ACM Symposium on Theory
of Computing, STOC 2010, Cambridge, Massachusetts, USA, 5-8 June 2010, pages 475–484,
2010.
11
[24] Jiawei Han, Jian Pei, Guozhu Dong, and Ke Wang. Efficient computation of iceberg cubes
with complex measures. In Proceedings of the 2001 ACM SIGMOD international conference
on Management of data, Santa Barbara, CA, USA, May 21-24, 2001, pages 1–12, 2001.
[25] Jiawei Han, Jian Pei, and Yiwen Yin. Mining frequent patterns without candidate generation.
In Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data,
May 16-18, 2000, Dallas, Texas, USA., pages 1–12, 2000.
[26] Christian Hidber. Online association rule mining. In SIGMOD 1999, Proceedings ACM SIGMOD International Conference on Management of Data, June 1-3, 1999, Philadelphia, Pennsylvania, USA., pages 145–156, 1999.
[27] Piotr Indyk. Stable distributions, pseudorandom generators, embeddings, and data stream
computation. J. ACM, 53(3):307–323, 2006.
[28] Piotr Indyk and David P. Woodruff. Optimal approximations of the frequency moments of
data streams. In Proceedings of the 37th Annual ACM Symposium on Theory of Computing,
Baltimore, MD, USA, May 22-24, 2005, pages 202–208, 2005.
[29] T. S. Jayram and David P. Woodruff. The data stream space complexity of cascaded norms.
In 50th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2009, October
25-27, 2009, Atlanta, Georgia, USA, pages 765–774, 2009.
[30] Hossein Jowhari, Mert Saglam, and Gábor Tardos. Tight bounds for lp samplers, finding
duplicates in streams, and related problems. In Proceedings of the 30th ACM SIGMODSIGACT-SIGART Symposium on Principles of Database Systems, PODS 2011, June 12-16,
2011, Athens, Greece, pages 49–58, 2011.
[31] Daniel M. Kane, Raghu Meka, and Jelani Nelson. Almost optimal explicit johnsonlindenstrauss families. In Approximation, Randomization, and Combinatorial Optimization.
Algorithms and Techniques - 14th International Workshop, APPROX 2011, and 15th International Workshop, RANDOM 2011, Princeton, NJ, USA, August 17-19, 2011. Proceedings,
pages 628–639, 2011.
[32] Richard M Karp, Scott Shenker, and Christos H Papadimitriou. A simple algorithm for finding
frequent elements in streams and bags. ACM Transactions on Database Systems (TODS),
28(1):51–55, 2003.
[33] Abhishek Kumar and Jun (Jim) Xu. Sketch guided sampling - using on-line estimates of flow
size for adaptive data collection. In INFOCOM 2006. 25th IEEE International Conference on
Computer Communications, Joint Conference of the IEEE Computer and Communications
Societies, 23-29 April 2006, Barcelona, Catalunya, Spain, 2006.
[34] Kasper Green Larsen, Jelani Nelson, Huy Le Nguyen, and Mikkel Thorup. Optimal space
heavy hitters with fast update and query time. 2016.
[35] Gurmeet Singh Manku and Rajeev Motwani. Approximate frequency counts over data streams.
In Proceedings of the 28th international conference on Very Large Data Bases, pages 346–357.
VLDB Endowment, 2002.
12
[36] Xiangrui Meng and Michael W. Mahoney. Low-distortion subspace embeddings in inputsparsity time and applications to robust linear regression. In Symposium on Theory of Computing Conference, STOC’13, Palo Alto, CA, USA, June 1-4, 2013, pages 91–100, 2013.
[37] Ahmed Metwally, Divyakant Agrawal, and Amr El Abbadi. Efficient computation of frequent
and top-k elements in data streams. In Proceedings of the 10th International Conference on
Database Theory, ICDT’05, pages 398–412, Berlin, Heidelberg, 2005. Springer-Verlag.
[38] Gregory T. Minton and Eric Price. Improved concentration bounds for count-sketch. In Proceedings of the Twenty-Fifth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA
2014, Portland, Oregon, USA, January 5-7, 2014, pages 669–686, 2014.
[39] Jayadev Misra and David Gries. Finding repeated elements. Sci. Comput. Program., 2(2):143–
152, 1982.
[40] Morteza Monemizadeh and David P. Woodruff. 1-pass relative-error lp -sampling with applications. In Proceedings of the Twenty-First Annual ACM-SIAM Symposium on Discrete
Algorithms, SODA 2010, Austin, Texas, USA, January 17-19, 2010, pages 1143–1160, 2010.
[41] Jelani Nelson and Huy L. Nguyen. OSNAP: faster numerical linear algebra algorithms via
sparser subspace embeddings. In 54th Annual IEEE Symposium on Foundations of Computer
Science, FOCS 2013, 26-29 October, 2013, Berkeley, CA, USA, pages 117–126, 2013.
[42] Noam Nisan. Pseudorandom generators for space-bounded computation. Combinatorica,
12(4):449–461, 1992.
[43] Eric Price. Efficient sketches for the set query problem. In Proceedings of the Twenty-Second
Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2011, San Francisco, California, USA, January 23-25, 2011, pages 41–56, 2011.
[44] Ashok Savasere, Edward Omiecinski, and Shamkant B. Navathe. An efficient algorithm for
mining association rules in large databases. In VLDB’95, Proceedings of 21th International
Conference on Very Large Data Bases, September 11-15, 1995, Zurich, Switzerland., pages
432–444, 1995.
[45] Michel Talagrand. Majorizing measures: The generic chaining. The Annals of Probability,
24(3), 1996.
[46] Mikkel Thorup and Yin Zhang. Tabulation-based 5-independent hashing with applications to
linear probing and second moment estimation. SIAM J. Comput., 41(2):293–331, 2012.
[47] Hannu Toivonen. Sampling large databases for association rules. In VLDB’96, Proceedings
of 22th International Conference on Very Large Data Bases, September 3-6, 1996, Mumbai
(Bombay), India, pages 134–145, 1996.
13
| 8cs.DS
|
Text-based Adventures of the Golovin AI Agent
Bartosz Kostka, Jarosław Kwiecień, Jakub Kowalski, Paweł Rychlikowski
arXiv:1705.05637v1 [cs.AI] 16 May 2017
Institute of Computer Science
University of Wrocław, Poland
Email: {bartosz.kostka,jaroslaw.kwiecien}@stud.cs.uni.wroc.pl, {jko,prych}@cs.uni.wroc.pl
Abstract—The domain of text-based adventure games has been
recently established as a new challenge of creating the agent that
is both able to understand natural language, and acts intelligently
in text-described environments.
In this paper, we present our approach to tackle the problem.
Our agent, named Golovin, takes advantage of the limited game
domain. We use genre-related corpora (including fantasy books
and decompiled games) to create language models suitable to
this domain. Moreover, we embed mechanisms that allow us
to specify, and separately handle, important tasks as fighting
opponents, managing inventory, and navigating on the game map.
We validated usefulness of these mechanisms, measuring
agent’s performance on the set of 50 interactive fiction games.
Finally, we show that our agent plays on a level comparable to the
winner of the last year Text-Based Adventure AI Competition.
I. I NTRODUCTION
The standard approach to develop an agent playing a given
game is to analyze the game rules, choose an appropriate AI
technique, and incrementally increase the agent’s performance
by exploiting these rules, utilizing domain-dependent features
and fixing unwanted behaviors. This strategy allowed to beat
the single games which were set as the milestones for the AI
development: Chess [1] and Go [2].
An alternative approach called General Game Playing
(GGP), operating on a higher level of abstraction has recently
gained in popularity. Its goal is to develop an agent that can
play any previously unseen game without human intervention.
Equivalently, we can say that the game is one of the agent’s
inputs [3].
Currently, there are two main, well-established GGP domains providing their own game specification languages and
competitions [4]. The first one is the Stanford’s GGP, emerged
in 2005 and it is based on the Game Description Language
(GDL), which can describe all finite, turn-based, deterministic
games with full information [5], and its extensions (GDL-II
[6] and rtGDL [7]).
The second one is the General Video Game AI framework
(GVGAI) from 2014, which focuses on arcade video games
[8]. In contrast to Stanford’s GGP agents are provided with the
forward game model instead of the game rules. The domain is
more restrictive but the associated competition provides multiple tracks, including procedural content generation challenges
[9], [10].
What the above-mentioned approaches have in common is
usually a well-defined game state the agent is dealing with.
It contains the available information about the state (which
may be partially-observable), legal moves, and some kind of
scoring function (at least for the endgame states). Even in a
GGP case, the set of available moves is known to the agent,
and the state is provided using some higher-level structure
(logic predicates or state observations).
In contrast, the recently proposed Text-Based Adventure AI
Competition, held during the IEEE Conference on Computational Intelligence and Games (CIG) in 2016, provides a new
kind of challenge by putting more emphasis on interaction
with the game environment. The agent has access only to the
natural language description about his surroundings and effects
of his actions.
Thus, to play successfully, it has to analyze the given
descriptions and extract high-level features of the game state
by itself. Moreover, the set of possible actions, which are also
expected to be in the natural language, is not available and an
agent has to deduct it from his knowledge about the game’s
world and the current state.
In some sense, this approach is coherent with the experiments on learning Atari 2600 games using the Arcade Learning Environment (ALE), where the agent’s inputs were only
raw screen capture and a score counter [11], [12]. Although
in that scenario the set of possible commands is known in
advance.
The bar for text-based adventure games challenge is set
high – agents should be able to play any interactive fiction
(IF) game, developed by humans for the humans. Such environment, at least in theory, requires to actually understand the
text in order to act, so completing this task in its full spectrum,
means building a strong AI.
Although some approaches tackling similar problems exist
since early 2000s ([13], [14]), we are still at the entry point
for this kind of problems, which are closely related to the
general problem solving. However, recent successes of the
machine learning techniques combined with the power of
modern computers, give hope that some vital progress in the
domain can be achieved.
We pick up the gauntlet, and in this work we present our
autonomous agent that can successfully play many interactive
fiction games. We took advantage of the specific game domain,
and trained agent using matching sources: fantasy books and
texts from decompiled IF games. Moreover, we embed some
rpg-game-based mechanisms, that allow us to improve fighting
opponents, managing hero’s inventory, and navigating in the
maze of games’ locations.
We evaluated our agent on a set of 50 games, testing
the influence of each specific component on the final score.
Also, we tested our agent against the winner of the last year
competition [15]. The achieved results are comparable. Our
agent scored better in 12 games and worse in 11 games.
The paper is organized as follows. Section II provides background for the domain of interactive fiction, Natural Language
Processing (NLP), Text-Based Adventure AI Competition,
and the related work. In Section III, we presented detailed
description of our agent. Section IV contains the results of the
performed experiments. Finally, in Section V, we conclude and
give perspective of the future research.
II. BACKGROUND
A. Interactive Fiction
Interactive Fiction (IF), emerged in 1970s, is a domain of
text-based adventure or role playing games, where the player
uses text commands to control characters and influence the
environment. One of the most famous example is the Zork
series developed by the Infocom company. From the formal
point of view, they are single player, non-deterministic games
with imperfect information. IF genre is closely related to
MUDs (Multi-User Dungeons), but (being single-player) more
focused on plot and puzzles than fighting and interacting
with other players. IF was popular up to late 1980s, where
the graphical interfaces become available and, as much user
friendlier, more popular. Nevertheless, new IF games are still
created, and there are annual competitions for game authors
(such as The Interactive Fiction Competition).
IF games usually (but not always) take place in some fantasy
worlds. The space the character is traversing has a form of
labyrinth consisting of so called rooms (which despite the
name can be open areas like forest). Entering the room, the
game displays its description, and the player can interact with
the objects and game characters it contains, or try to leave
the room moving to some direction. However, reversing a
movement direction (e.g. go south ↔ go north) not necessarily
returns the character to the previous room.
As a standard, the player character can collect objects from
the world, store them in his equipment, and combine with
other objects to achieve some effects on the environment (e.g.
put the lamp and sword in the case). Thus, many games
require solving some kind of logical puzzle to push the action
forward. After performing an action, the game describes its
effect. Many available actions are viable, i.e. game engine
understands them, but they are not required to solve the game,
or even serve only for the player amusement.
Some of the games provide score to evaluate the player’s
progress, however the change in the score is often the result of
a complex series of moves rather than quick “frame to frame”
decisions, or the score is given only after the game’s end.
Other games do not contain any scoring function and the only
output is win or lose.
B. Playing Text-Based Games
Although the challenge of playing text-based games was
not take on often, there are several attempts described in the
literature, mostly based on the MUD games rather than the
classic IF games.
Adventure games has been carefully revised as the field of
study for the cognitive robotics in [14]. First, the authors identify the features of “tradition adventure game environment” to
point-out the specifics of the domain. Second, they enumerate
and discuss existing challenges, including e.g. the need for
commonsense knowledge (its learning, revising, organization,
and using), gradually revealing state space and action space,
vague goal specification and reward specification.
In [13], the agent able to live and survive in an existing
MUD game have been described. The authors used layered
architecture: high level planning system consisting of reasoning engine based on hand-crafted logic trees, and a low level
system responsible for sensing the environment, executing
commands to fulfill the global plan, detecting and reacting
in emergency situations.
While not directly-related to playing algorithms, it is worth
to note the usage of computational linguistics and theorem
proving to build an engine for playing text-based adventure
games [16]. Some of the challenges are similar for both
tasks, as generating engine requires e.g. object identification
(given user input and a state description) and understanding
dependencies between the objects.
The approach focused on tracking the state of the world
in text-based games, and translating it into the first-order
logic, has been presented in [17]. Proposed solution was able
to efficiently update agent’s belief state from a sequence of
actions and observations.
The extension of the above approach, presents the agent that
can solve puzzle-like tasks in partially observable domain that
is not known in advance, assuming actions are deterministic
and without conditional effects [18]. It generates solutions by
interleaving planning (based on the traditional logic-based approach) and execution phases. The correctness of the algorithm
is formally proved.
Recently, an advanced MUD playing agent has been described in [19]. Its architecture consists of two modules. First,
responsible for converting textual descriptions to state representation is based on the Long Short-term Memory (LSTM)
networks [20]. Second, uses Deep Q-Networks [11] to learn
approximated evaluations for each action in a given state.
Provided results show that the agent is able to to successfully
complete quests in small, and even medium size, games.
C. Natural Language Processing
Natural Language Processing is present in the history of
computers almost from the very beginning. Alan Turing in
his famous paper [21] state (approximately) that “exhibit
intelligent behavior” means “understand natural language and
use it properly in conversations with human being”. So, since
1950 Turing test is the way of checking whether computer has
reached strong AI capability.
First natural language processing systems were rule based.
Thanks to the growing amount of text data and increase of
the computer power, during last decades one can observe the
shift towards the data driven approaches (statistical or machine
learning). Nowadays, NLP very often is done “almost from
scratch”, as it was done if [22] where the authors have used
neural network in order to solve many NLP tasks, including
part-of-speech tagging, named entity recognition and semantic
role labeling. The base for this was the neural language model.
Moreover, this systems produced (as a side effect) for every
word in a vocabulary a dense vector which reflected word
properties. This vectors are called word embeddings and can
be obtained in many ways. One of the most popular is the one
proposed in [23] that uses very simple, linear language model
and is suitable to large collections of texts.
Language models allow to compute probability of the sentence treated as a sequence of items (characters, morphemes
or words). This task was traditionally done using Markov
models (with some smoothing procedures, see [24]). Since
predicting current words is often dependent on the long part
of history, Markov models (which, by definition, looks only
small numbers of words behind) are outperformed by the
modern methods that can model long distance dependencies.
This methods use recursive (deep) neural networks, often
augmented with some memory.
We will use both word embeddings (to model words similarity) and LSTM neural networks [25] with attention mechanism
(see [26] and [27]). We are particularly interested in the
information given from the attention mechanism, which allows
us to estimate how important is each word, when we try to
predict the next word in the text.
D. The Text-Based Adventure AI Competition
The first Text-Based Adventure AI Competition1 , organized
by the group from the University of York, has been announced
in May 2016 and took place at the 2016 IEEE CIG conference
in September. The second, will be held this year, also colocated with CIG.
The purpose of the competition is to stimulate research
towards the transcendent goal of creating General Problem
Solver, the task stated nearly six decades ago [28]. The organizers plan to gradually increase the level of given challenges,
with time providing more complex games that require more
sophisticated approaches from the competitors. Thus, finally
force them to develop agents that can autonomously acquire
knowledge required to solve given tasks from the restricted
domain of text-based games.
The domain of the competition is specified as any game that
can be described by the Z-machine, the classic text adventuring
engine. Interactive Fiction games are distributed as compiled
byte code, requiring the special interpreter to run them. The
first Z-machine has been developed in 1979 by Infocom,
and supports games developed using a LISP-like programming language named Infocom’s ZIL (Zork Implementation
1 http://atkrye.github.io/IEEE-CIG-Text-Adventurer-Competition/.
Language). The Text-based AI Competition uses Frotz2 , the
modern version of the Z-machine, compatible with the original
interpreter.
The competition organizers provide a Java package managing the communication between a game file and an agent
process. Also, example random agents in Java and Python 3 are
available. The interpreter is extended by the three additional
commends, allowing players to quit the game, restart it with
a new instance of the agent, and restart without modifying
the agent. Given that, the text-based AI framework supports
learning and simulation-based approaches.
Little details about the competition insides are available. In
particular, the number of participants is unknown, and the test
environment game used to evaluate agents remained hidden,
as it is likely to be used again this year. The game has been
developed especially for the purpose of the competition and
supports graduated scale of scoring points, depending on the
quality of agent’s solution.
The winner of the first edition was the BYU-Agent3 from
the Perception Control and Cognition lab at Brigham Young
University, which achieved a score 18 out of 100. The idea
behind the agent has been described in [15]. It uses Q-learning
[29] to estimate the utility of an action in a given game state,
identified as the hash of its textual description.
The main contribution concerns affordance detection, used
to generating reasonable set of actions. Based on the word2vec
[30], an algorithm mapping words into a vector representations
based on their contextual similarities, and the Wikipedia as the
word corpus, the verb-noun affordances are generated. Thus,
the algorithm is able to detect, for an in-game object, words
with a similar meaning, and provide a set of actions that are
possible to undertake with that object.
Provided results, based on the IF games compatible with Zmachine interpreter, shows the overall ability of the algorithm
to successfully play text-based games. Usually, the learning
process results in increasing score, and requires playing a game
at least 200 times to reach the peek. However, there are some
games that achieve that point much slower, or even the score
drops as the learning continues.
III. T HE G AME P LAYING AGENT
A. Overview
Our agent is characterized by the following features.:
•
•
•
it uses a huge set of predefined command patterns,
obtained by analyzing various domain-related sources; the
actual commands are obtained by suitable replacements;
it uses language models based on selection of fantasy
books;
it takes advantage of the game-specific behaviors, natural
for adventure games, like fight mode, equipment management, movement strategy;
2 http://frotz.sourceforge.net.
3 The agent is open source and available at https://github.com/danielricks/
BYU-Agent-2016.
it memorizes and uses some aspects of the current play
history;
• it tries to imitate human behavior: after playing several
games and exploring the game universe it repeats the most
promising sequence of commands. We treat the result
reached in this final trial as the agent’s result in this game.
The agent was named “Golovin”, as one of the first answers
it gives after asking Hey bot, what is your name?, was your
name is Golovin, a phrase from the game Doomlords.
•
B. Preprocessing
1) Language Models: We used language models for two
purposes. First, they allow us to define words similarity (which
in turns gives us opportunity to replace some words in commands with their synonyms). For this task we use word2vec
[30] (and its implementation in TensorFlow [31]). Secondly,
we use neural network language models to determine which
words in the scene description plays more important role than
other (and so are better candidates to be a part of the next
command). We use the LSTM neural networks operating on
words [25], augmented by the attention mechanism ([26] and
[27]). This combination was previously tested in [32].
Since the action of many games is situated in fantasy
universe, we decided to train our models on the collection
of 3000 fantasy books from bookrix.com (instead of using
Wikipedia, as in [15]).
2) Commands: In order to secure out agent against overfitting, we fix the set of games used in tests (the same 50 games
as in [15]). No data somehow related to this games were used
in any stage of preprocessing.
We considered three methods to gather commands:
• walkthroughs – for several games, sequence of commands from winning path can be found in the Internet.
This source provides raw valid commands, that are useful
in some games.
• tutorials – on the other hand, some games have tutorials
written in natural language. Analyzing such tutorials4
seemed to be a promising way of getting valid command.
Concept of reading manuals has been successfully used
to learn how to play Civilization II game [33].
• games – at the end, there are many games that don’t have
tutorials nor walkthroughs. We downloaded a big collection of games, decompiled their codes, and extracted all
texts from them.
The last two sources required slightly more complicated
preprocessing. After splitting texts into sentences, we parsed
them using PCFG parser from NLTK package [34]. Since
commands are (in general) verb phrases, we found all minimal
VP phrases from parse trees. After reviewing some of them,
we decided not to take every found phrase, but manually
create the list of conditions which characterizes ’verb phrases
useful in games’. In this way we obtained the collections of
4 This tutorials were downloaded from the following sites: http://www.
ifarchive.org/, https://solutionarchive.com/, http://www.gameboomers.com/,
http://www.plover.net/~davidw/sol/
approximately 250,000 commands (or, to be more precisely,
command patterns). We also remember the count of every
command (i.e. the number of parse tree it occurs in).
Some of the commands have special tag: “useful in the
battle”. We have manually chosen five verbs, as the most
commonly related to fighting: attack, kill, fight, shoot, and
punch. Approximately 70 most frequent commands containing
one of these verbs received this tag.
The commands used by our agent were created from these
patterns by replacing (some) nouns by nouns taken from the
game texts.
C. Playing Algorithm
The algorithm uses 5 types of command generators: battle
mode, gathering items, inventory commands, general actions
(interacting with environment), and movement. The generators
are fired in the given order, until a non-empty set of commands
is proposed.
There are multiple reasons why some generator may not
produce any results, e.g. the agent reaches the predefined limit
of making actions of that type, all the candidates are blacklisted, or simply we cannot find any appropriate command in
the database. We will describe other special cases later.
When the description of the area changes, all the command
lists are regenerated.
1) Generating Commands: Our general method to compute
available commands and choose the one which is carried out,
looks as follows:
1) Find all nouns in the state description and agent’s
equipment. (We accept all type of nouns classified by
the nltk.pos_tag function.)
2) Determine their synonyms, based on the cosine similarity between word vectors. (We use n-best approach with
n being subject to Spearmint optimization; see IV-A.)
3) Find the commands containing nouns from the above
described set. If a command contains a synonym, it is
replaced by the word originally found in the description.
4) Score each command taking into account:
• cosine similarity between used synonyms and the
original words
• uniqueness of the words in command, computed as
the inverse of number of occurrences in the corpora.
• the weight given by the neural network model
• the number of words occurring both in the description and in the command
The score is computed as the popularity of the command
(number of occurrences in the command database) multiplied by the product of the above. The formula uses
some additional constants influencing the weights of the
components.
5) Then, using the score as the command’s weight, randomly pick one command using the roulette wheel
selection.
2) Battle Mode: The battle mode has been introduced to
improve the agent’s ability to survive. It prevents from what
has been the main cause of agent’s death before – careless
walking into an enemy or spending too much time searching
for the proper, battle-oriented and life-saving, action.
The agent starts working in battle mode after choosing
one of the “fight commands”. Being in this mode, the agent
strongly prefers using battle command, moreover it repeats
the same command several times (even if it fails), because
in many games the opponent has to be attacked multiple
times to be defeated. Therefore, between the consecutive
fighting actions we prevent using standard commands (like
look, examine), as wasting precious turns usually gives the
opponent an advantage.
3) Inventory Management (gathering and using items):
In every new area, the algorithm searches its description for
interesting objects. It creates a list of nouns ordered by the
weight given by the neural network model and their rarity.
Then, the agent tries take them.
If it succeeds (the content of the inventory has changed), a
new list of commands using only the newly acquired item is
generated (using the general method). The constant number of
highest scored commands is immediately executed.
4) Exploration: The task of building an IF game map is
difficult for two reasons. One, because a single area can be
presented using multiple descriptions and they may change as
the game proceeds. Two, because there may be different areas
described by the same text. Our map building algorithm tries
to handle these problems.
We have found that usually the first sentence of the area
description remains unchanged, so we use it to label the
nodes of the graph (we have tried other heuristics as well
but they performed worse). This heuristic divides all visited
nodes into the classes suggesting that corresponding areas may
be equivalent. The edges of the graph are labeled by the move
commands used to translocate between the nodes (we assume
that movement is deterministic).
We initialize the map graph using the paths corresponding
to the past movements of the agent. Then, the algorithm takes
all pairs of nodes with the same label and considers them in
a specific, heuristic-based, order. For every pair, the MergeNodes procedure (Listing 1) is fired. The procedure merges two
states joining their outcoming edges and recursively proceeds
to the pairs of states that are reachable using the same move
command. If the procedure succeeds, we replaces current map
graph with the minimized one, otherwise the changes are
withdrawn.
We use a small fixed set of movement commands (south,
northwest, up, left, etc.) to reveal new areas and improve the
knowledge about the game layout. When the agent decides
to leave the area, it tries a random direction, unless it already discovered all outgoing edges – then it uses map to
find a promising destination. We evaluate destination nodes
minimizing the distance to that node plus the number of
tested commands divided by the node’s curiosity (depending
on scores of available commands and untested movement
commands). Then, the agent follows the shortest path to the
best scored destination.
Algorithm 1 MergeNodes(A, B)
1: if A = B then return True end if
2: if label(A)6=label(B) then return False end if
3: mergelist ← {}
4: for all m ∈ M oveCommands do
5:
if A.moveby(m)6=None ∧ B.moveby(m)6=None then
6:
mergelist.append((A.moveby(m), B.moveby(m)))
7:
end if
8: end for
9: JoinIncomingAndOutgoingEdges(A, B)
10: for all (A0 , B 0 ) ∈ mergelist do
11:
if ¬ MergeNodes(A0 , B 0 ) then return False end if
12: end for
13: return True
5) Failing Commands: When, after executing a command,
the game state (description) remains unchanged, we assume
the command failed. Thus, the algorithm puts it on a blacklist
assigned to the current location. The command on the location’s black list is skipped by the command generators.
After any change in the agent’s inventory, all blacklists are
cleared.
6) Restarts: The Frotz environment used for the contest
allows to restart the game, i.e. abandon current play and start
again from the beginning.
Me make use of this possibility in a commonsense imitating
of the human behavior. When the agent dies, it restarts the
game and, to minimize the chance of the further deaths, it
avoids repeating the last commands of his previous lives. The
agent also remembers the sequence of moves that lead to the
best score and eventually repeats it. The final trial’s result is
used as the agent’s result in the game.
IV. E XPERIMENTS
Our experiments had two main objectives: creating the most
effective agent, and analyze how some parameters influence
the agents performance.
The most natural way to measure the agent performance is
to use the score given by the game (divided by the maximum
score, when we want to compare different games). However,
there are many games in which our agent (as well as BYUAgent) has problems with receiving non zero points. So, we
have decided to reward any positive score and add to the
positive agent result arbitrarily chosen constant 0.2. Therefore,
optimal (hypothetical) agent would get 1.2 in every game.
We selected 20 games for the training purposes, for all
of them the maximum score is known. The performance of
the agent is an averaged (modified) score computed on these
games.
A. Creating The Best Agent
The agent’s play is determined by some parameters, for
instance:
• the set of command patterns,
• the number of synonyms taken from word2vec,
the number of items, we are trying to gather, after visiting
new place,
• the number of standard command, tried after gathering
phase,
• how to reward the commands containing many words
from description (the actual reward is bk , where k is the
number of common words, and b is a positive constant),
• how to punish the commands containing words with no
good reason to be used (neither in state description nor in
generated synonyms), the score is divided by pk , where
k is the number of such words, and p is a constant,
• how many command should be done before trying movement command.
Furthermore we wanted to check, whether using battle mode
or a map has an observable effect on agent performance. The
number of parameter combinations was too large for grid
search, so we decided to use Spearmint5 .
We started this optimization process with (total) score equal
to 0.02, and after some hours of computation we end with
0.08 (which means that the score has been multiplied 4 times).
From now all parameters (if not stated otherwise) will be taken
from the final Spearmint result.
•
optimal configuration uses only two sources: T and W6 . We,
however, still believe that decompiled games can be a useful
source for game commands. But they cannot be found in
descriptions, but in command interpreter – which requires
more advanced automated code analysis. We left it as a future
work.
Fig. 2. Comparison of agent using different sources of commands. Best
variant scaled to 100%.
B. Evaluation of Domain-based Mechanisms
D. Gameplay Examples
We wanted to check whether some more advanced features
of our agent give observable influence on agent performance.
We checked the following 4 configurations with battle-mode
and map turned on or off. The results are presented in Figure
1. One can see that map is useful (but only to some extent),
and battle mode is undoubtedly useful.
While playing detective, our agent finds himself in a
closet. We get the following state description:
Game: You are in a closet. There is a gun on the
floor. Better get it. To exit, go east.
Our agent determines items: closet, gun, floor, exit. Our agent
is choosing from the commands listed in Table I. We see that
what is the most important for the agent is gun and how to
take it, which is reasonable and even suggested by the game.
Moreover, the agent also tries to search using synonyms of
the word gun in order to find proper commands (for instance:
we can see that he recognizes gun as some kind of weapon,
and some weapons, as for example knife, can be sharpened).
Fortunately, after using a command get gun, Golovin obtains
a black little pistol.
TABLE I
B EST 10 ( OUT OF 25) COMMANDS PROPOSED BY OUR AGENT FOR THE
SITUATION DESCRIBED IN THE D E T E C T I V E EXAMPLE (S ECTION IV-D)
Fig. 1. Comparison of agent version with and without map and battle mode.
Best variant scaled to 100%.
C. Evaluation of Language Model Sources
Commands were taken from 3 sources: tutorials (T), walkthroughs (W), and state description from games (G). We
compared the agents used command from all combination
of these sources. The results are presented in Figure 2. The
5 Spearmint
is a package which performs Bayesian optimization of hyperparameters. It allows to treat the optimized function as a black-box, and tries
to choose the parameters for the next run considering the knowledge gathered
during previous runs. See [35].
action
get gun
drop gun
take gun
open closet
examine gun
fire gun
load gun
examine closet
buy gun
sharp gun
score
0.1736
0.1129
0.0887
0.0557
0.0309
0.0252
0.0237
0.0128
0.0042
0.0006
Another example comes from zork3. We start with the
following location description:
6 The difference between T+W and G+T+W is not very big. In the previous
version of this experiment the winner was G+T+W.
Game: You are in a shadowy land of low, rolling
hills stretching out to the west and south. The
land is bordered to the north by a massive stone
wall. Ancient and weathered, the wall has crumbled
enough at one point to permit passage. A cloaked
and hooded person, carrying a sword not unlike your
own, is standing blocking the way to the northeast.
The hooded figure has a great deal of strength,
perhaps matching your own.
Golovin: examine figure
Game: There is nothing special to be seen. Your
quick reflexes cannot stop the hooded figure’s stroke!
You are hit!
In this very moment, in the agent’s inventory are: a sword,
a lamp. In the command list we can find for instance kill
man with sword. As the word man is close enough to figure,
and Golovin also have sword, he chooses to use command
kill figure with sword. Because the fighting command was
chosen, the battle mode is turned on, and the game continues
as follows:
Golovin: kill figure with sword
Game: The hooded figure is hit with a quick slash!
The figure has a light wound which hasn’t affected
its seemingly great strength.
the agent’s score improves and the fight continues. . .
Golovin: kill figure with sword
Game: You charge, but the hooded figure jumps
nimbly aside. The hooded figure stabs nonchalantly
with its sword and misses.
E. The Comparison with BYU-Agent
Finally, we validate our approach by comparing it with the
BYU-Agent. We were using the same set of 50 Z-machine
games7 as in [15].
The results of the comparison are presented in Table II.
The BYU agent was trained for 1000 epochs (each epoch
containing 1000 game steps), and its score was noted after
each epoch. Because the learning curves vary depending on
the game, including degeneration of the results (see [15,
Figure 5]), as the main measure we took the maximum score
achieved over all epochs.
As for the Golovin, we restricted his playing time to
1000 steps (i.e. an equivalent of one epoch) and use our
commonsense restarting mechanism.
The BYU-Agent results are obtained using the verb and
action space reduction algorithm, except the games marked
with an asterisk, where the verb space reduction experienced
errors, so we present scores obtained by the action space
reduction variant instead.
Eventually, there are 24 games, out of 50, where some of
the agents received any positive reward. Golovin scored better
in 12 games, including 7 games where BYU-Agent received
no reward. BYU-Agent scored better in 11 games, including
7 The game set is available at https://github.com/danielricks/textplayer/tree/
master/games.
6 games where Golovin scored no points. One game is a nonzero tie.
Thus, despite significantly shorter learning time (i.e. available number of steps), our agent is able to outperform BYUAgent on a larger number of games than he is outperformed on.
On the other hand, BYU-Agent gains in the games where the
Q-learning is effective and gradually increases score through
the epochs, e.g. curses, detective or Parc.
Last observation concerns the number of games where only
one of the agents scored 0, which is surprisingly large. This
may suggest that the two compared approaches are effective
on a different types of games, and may, in some sense,
complement each other.
TABLE II
AVERAGE SCORES FOR 10 RUNS OF EACH GAME . F OR BYU-AGENT WE
TOOK THE MAXIMUM ACHIEVED SCORE DURING THE 1000 EPOCHS
TRAINING . G OLOVIN PLAYS FOR ONE EPOCH . I N THE GAMES THAT ARE
NOT LISTED BOTH AGENTS GAIN NO REWARD . T HE ASTERISK MARKS
GAMES THAT USES OTHER VERSION OF BYU-AGENT
game
balances
break-in
bunny
candy
cavetrip
curses
deephome
detective
gold
library
mansion
Murdac
night
omniquest
parallel
Parc
reverb
spirit
tryst205
zenon
zork1
zork2
zork3
ztuu
better in:
Golovin
9.0
0
2.7
10.0
15.0
0.4
1.0
71.0
0.3
5.0
0.1
10.0
0.8
7,5
0
1.6
0
3.2
0.2
0
13.5
-0.1
0.7
0
12
BYU-Agent
0
0.3
2.0
10.0
10.5
1.9
0
213.0
0
0
2.2
0
0
5.0
5.0
5.0
1.8
2.0
2.0
2.8
*8.8
*3.3
*0
0.5
11
max score
51
150
60
41
500
550
300
360
100
30
68
250
10
50
150
50
50
250
350
20
350
400
7
100
games
V. C ONCLUSIONS AND F UTURE W ORK
We have presented an agent able to play any interactive fiction game created for human players, on the level comparable
to the winner of the last year Text-Based Adventure AI Competition. Due to the number of domain-based mechanisms, our
agent can successfully handle the game in a limited number
of available steps. The results of the presented experiments
show that the mechanisms we embed (battle mode, mapping)
and a choice of learning sources, indeed improves the agent’s
performance.
Although the results are promising, we are still at the
beginning of the path towards creating the agent that can
really understand the natural language descriptions in order
to efficiently play the text-based adventure games.
There are multiple future work directions we would like to
point out. First, and one of the most important, is to embed
a learning mechanisms: the in-game learning, that uses restart
functionality to improve player efficiency in one particular
game; and preliminary learning, that is able to gain useful
knowledge from playing entire set of games. Also, we plan to
take a closer look at the decompiled game codes, as we believe
that analyzing them may provide very useful knowledge.
We would like to improve the battle mode behavior, especially mitigate the agent and make it more sensitive to the
particular situation. We hope that the mapping mechanism can
be further extended to allow the casual approach, where the
agent travels to distant locations for some specific reason (e.g.
item usage), instead of a simple reactive system that we have
now.
Lastly, we would like to continue the domain-based approach, and so focus our efforts on discovering the subgames
(like we did with fighting and exploring) that we are able to
properly detect, and handle significantly better than the general
case.
ACKNOWLEDGMENTS
The authors would like to thank Szymon Malik for his
valuable contribution in the early stage of developing Golovin.
We would also like to thank Nancy Fulda for helpful
answers to our questions and providing up-to date results of
the BYU-Agent.
R EFERENCES
[1] M. Campbell, A. J. Hoane, and F. Hsu, “Deep Blue,” Artificial intelligence, vol. 134, no. 1, pp. 57–83, 2002.
[2] D. Silver, A. Huang, C. J. Maddison, A. Guez, L. Sifre, G. van den
Driessche, J. Schrittwieser, I. Antonoglou, V. Panneershelvam, M. Lanctot, S. Dieleman, D. Grewe, J. Nham, N. Kalchbrenner, I. Sutskever,
T. Lillicrap, M. Leach, K. Kavukcuoglu, T. Graepel, and D. Hassabis,
“Mastering the game of Go with deep neural networks and tree search,”
Nature, vol. 529, pp. 484–503, 2016.
[3] M. Genesereth and M. Thielscher, General Game Playing. Morgan &
Claypool, 2014.
[4] M. Genesereth, N. Love, and B. Pell, “General Game Playing: Overview
of the AAAI Competition,” AI Magazine, vol. 26, pp. 62–72, 2005.
[5] N. Love, T. Hinrichs, D. Haley, E. Schkufza, and M. Genesereth,
“General Game Playing: Game Description Language Specification,”
Stanford Logic Group, Tech. Rep., 2006.
[6] M. Thielscher, “A General Game Description Language for Incomplete
Information Games,” in AAAI Conference on Artificial Intelligence,
2010, pp. 994–999.
[7] J. Kowalski and A. Kisielewicz, “Towards a Real-time Game Description Language,” in International Conference on Agents and Artificial
Intelligence, vol. 2, 2016, pp. 494–499.
[8] D. Perez, S. Samothrakis, J. Togelius, T. Schaul, S. Lucas, A. Couëtoux,
J. Lee, C. Lim, and T. Thompson, “The 2014 General Video Game
Playing Competition,” IEEE Transactions on Computational Intelligence
and AI in Games, vol. 8, no. 3, pp. 229–243, 2015.
[9] D. Perez, S. Samothrakis, J. Togelius, T. Schaul, and S. M. Lucas,
“General Video Game AI: Competition, Challenges and Opportunities,”
in AAAI Conference on Artificial Intelligence, 2016, pp. 4335–4337.
[10] A. Khalifa, D. Perez, S. Lucas, and J. Togelius, “General Video
Game Level Generation,” in Genetic and Evolutionary Computation
Conference, 2016, pp. 253–259.
[11] V. Mnih, K. Kavukcuoglu, D. Silver, A. A. Rusu, J. Veness, M. G.
Bellemare, A. Graves, M. Riedmiller, A. K. Fidjeland, G. Ostrovski
et al., “Human-level control through deep reinforcement learning,”
Nature, vol. 518, no. 7540, pp. 529–533, 2015.
[12] S. Kelly and M. I. Heywood, “Emergent Tangled Graph Representations
for Atari Game Playing Agents,” in EuroGP 2017: Genetic Programming, ser. LNCS, 2017, vol. 10196, pp. 64–79.
[13] M. A. DePristo and R. Zubek, “being-in-the-world,” in Proceedings
of the 2001 AAAI Spring Symposium on Artificial Intelligence and
Interactive Entertainment, 2001, pp. 31–34.
[14] E. Amir and P. Doyle, “Adventure games: A challenge for cognitive
robotics,” in Proc. Int. Cognitive Robotics Workshop, 2002, pp. 148–
155.
[15] N. Fulda, D. Ricks, B. Murdoch, and D. Wingate, “What can you do with
a rock? Affordance extraction via word embeddings,” in International
Joint Conference on Artificial Intelligence, 2017, (to appear).
[16] A. Koller, R. Debusmann, M. Gabsdil, and K. Striegnitz, “Put my
galakmid coin into the dispenser and kick it: Computational linguistics
and theorem proving in a computer game,” Journal of Logic, Language
and Information, vol. 13, no. 2, pp. 187–206, 2004.
[17] B. Hlubocky and E. Amir, “Knowledge-gathering agents in adventure
games,” in AAAI-04 workshop on Challenges in Game AI, 2004.
[18] A. Chang and E. Amir, “Goal Achievement in Partially Known, Partially
Observable Domains,” in Proceedings of the Sixteenth International
Conference on International Conference on Automated Planning and
Scheduling, 2006, pp. 203–211.
[19] K. Narasimhan, T. Kulkarni, and R. Barzilay, “Language Understanding
for Text-based Games using Deep Reinforcement Learning,” in Proceedings of the 2015 Conference on Empirical Methods in Natural Language
Processing, 2015, pp. 1–11.
[20] S. Hochreiter and J. Schmidhuber, “Long Short-Term Memory,” Neural
Comput., vol. 9, no. 8, pp. 1735–1780, 1997.
[21] A. M. Turing, “Computing machinery and intelligence,” Mind,
vol. 59, no. 236, pp. 433–460, 1950. [Online]. Available: http:
//www.jstor.org/stable/2251299
[22] R. Collobert, J. Weston, L. Bottou, M. Karlen, K. Kavukcuoglu, and P. P.
Kuksa, “Natural language processing (almost) from scratch,” CoRR, vol.
abs/1103.0398, 2011. [Online]. Available: http://arxiv.org/abs/1103.0398
[23] T. Mikolov, K. Chen, G. Corrado, and J. Dean, “Efficient estimation
of word representations in vector space,” CoRR, vol. abs/1301.3781,
2013. [Online]. Available: http://arxiv.org/abs/1301.3781
[24] S. F. Chen and J. Goodman, “An empirical study of smoothing
techniques for language modeling,” in Proceedings of the 34th
Annual Meeting on Association for Computational Linguistics, ser.
ACL ’96. Stroudsburg, PA, USA: Association for Computational
Linguistics, 1996, pp. 310–318. [Online]. Available: http://dx.doi.org/
10.3115/981863.981904
[25] Y. Bengio, R. Ducharme, P. Vincent, and C. Jauvin, “A neural probabilistic language model,” JOURNAL OF MACHINE LEARNING RESEARCH, vol. 3, pp. 1137–1155, 2003.
[26] C. Raffel and D. P. W. Ellis, “Feed-forward networks with attention can
solve some long-term memory problems,” CoRR, vol. abs/1512.08756,
2015. [Online]. Available: http://arxiv.org/abs/1512.08756
[27] J. Cheng, L. Dong, and M. Lapata, “Long short-term memory-networks
for machine reading,” CoRR, vol. abs/1601.06733, 2016. [Online].
Available: http://arxiv.org/abs/1601.06733
[28] A. Newell, J. C. Shaw, and H. A. Simon, “Report on a general problem
solving program,” in Proceedings of the International Conference on
Information Processing, 1959, pp. 256–264.
[29] C. J. Watkins and P. Dayan, “Q-learning,” Machine learning, vol. 8, no.
3-4, pp. 279–292, 1992.
[30] T. Mikolov, K. Chen, G. Corrado, and J. Dean, “Efficient estimation of
word representations in vector space,” 2013, arXiv:1301.3781 [cs.CL].
[31] M. A. et al., “TensorFlow: Large-scale machine learning on
heterogeneous systems,” 2015, software available from tensorflow.org.
[Online]. Available: http://tensorflow.org/
[32] S. Malik, “Application of artificial neural networks with attention mechanism for discovering distant dependencies in time series,” Bachelor
Thesis, University of Wrocław, 2016.
[33] S. Branavan, D. Silver, and R. Barzilay, “Learning to Win by Reading
Manuals in a Monte-Carlo Framework,” Journal of Artificial Intelligence
Research, vol. 43, pp. 661–704, 2012.
[34] S. Bird, E. Klein, and E. Loper, Natural Language Processing with
Python, 1st ed. O’Reilly Media, Inc., 2009.
[35] J. Snoek, H. Larochelle, and R. P. Adams, “Practical bayesian optimization of machine learning algorithms,” in Advances in Neural Information
Processing Systems 25, F. Pereira, C. J. C. Burges, L. Bottou, and K. Q.
Weinberger, Eds. Curran Associates, Inc., 2012, pp. 2951–2959.
| 2cs.AI
|
Reduction of some homological conjectures to excellent unique factorization domains
arXiv:1607.00025v2 [math.AC] 28 Jul 2016
E HSAN TAVANFAR∗
I N THE MEMORY OF MY FATHER , M ANOUCHEHR TAVANFAR ,
WHO PASSED AWAY AT THE TIME OF WRITING THIS PAPER
A BSTRACT. In this article, applying the quasi-Gorenstein analogous of the Ulrich’s
deformation of certain Gorenstein rings we show that some homological conjectures,
including the Monomial Conjecture, Big Cohen-Macaulay Algebra Conjecture as well as
the Small Cohen-Macaulay Conjecture reduce to the excellent unique factorization domains. Some other reductions of the Monomial Conjecture are also proved. We, moreover, show that certain almost complete intersections adhere the Monomial Conjecture.
1 Introduction
Throughout this article, (R, m) denotes a commutative Noetherian local ring of dimension d
with identity where m denotes the unique maximal ideal of R.
In the early seventies, in [29], Hochster proposed the following two equivalent conjectures and proved them for the equicharacteristic rings.
Monomial Conjecture: Suppose that x1 , . . . , xd is a system of parameters for R. Then,
t
x1 · · · xdt ∉ (x1t+1 , . . . , xdt+1 ) for each t ≥ 1.
Direct Summand Conjecture: Suppose that A is a regular local ring and R is a module
finite extension of A. Then the inclusion A → R splits, in the category of A-modules.
The foregoing conjectures have been around for decades in the mixed characteristic case.
In the sequel we succinctly review certain substantial advances in the study of the aforementioned conjectures. In the eighties, in his extraordinary paper [28], among other things,
Hochster introduced the following further equivalent forms of the Monomial Conjecture.
Canonical Element Conjecture: Suppose that (F• , ∂• ) is a free resolution of R/m and consider the natural projection π : Fd → syzdR (R/m) which defines an element,
∗
¢
¡
ǫR := [π] ∈ ExtdR R/m, syzdR (R/m) .
This research was in part supported by a grant from IPM and supported in part by NSF grant DMS 1162585.
2010 Mathematics Subject Classification. 13D22, 13H10.
Key words and phrases. Almost complete intersections, big Cohen-Macaulay algebra, homological conjectures, linkage, Monomial Conjecture, quasi-Gorenstein rings, unique factorization domains.
1
2
R EDUCTION
OF SOME HOMOLOGICAL CONJECTURES TO
...
Set, ηR := φ(ǫR ), wherein,
¡
¢
¡
¢
¡ d
¢
d
n
d
d
φ : ExtdR R/m, syzdR (R/m) → lim
Ext
R/
m
,
syz
(R/
m
)
=
H
syz
(R/
m
)
,
m
R
R
R
−→
n∈N
is the natural map. Then ηR 6= 0.
CE Property, also known as the Canonical Element Conjecture: Assume that F• is minimal resolution of R/m. Consider the Koszul complex K• (x, R) of a system of parameters x of R.
Then for any lifting, φ : K• (x, R) → F• , of the natural surjection R/(x) → R/m, we have φd 6= 0.
In [28], Hochster, moreover shows that the mentioned equivalent forms of the Monomial
Conjecture imply the following conjecture:
Improved New Intersection Conjecture: Suppose
¡
¢that F• : 0 → Fs → Fs−1 → · · · → F0 → 0
is a complex of finite free modules such that ℓ Hi (F• ) < ∞ for each i > 1 and H0 (F• ) has a
minimal generator whose generated R-module has finite length. Then s ≥ d .
The important point here is that a slightly stronger version of the Improved New Intersection Conjecture, wherein H0 (F0 ) has finite length as well, has been settled in full generality
by Roberts (see,[47]). The validity of this stronger form, which is called the New Intersection
Theorem, itself established a bunch of other old conjectures, most notably the Bass’s question regarding the Cohen-Macaulayness of rings having a non-zero finite module of finite
injective dimension (see, [10, Chapter 9.] and [44]). Originally the Improved New Intersect
Conjecture is, implicitly, stated in [16] among the proof of [16, Theorem 1.1]. Subsequently,
miraculously, in [12] Dutta showed that the improved new intersection is, in fact, an another
equivalent form of the Monomial Conjecture. Recently, in [14] Dutta also proved that all of
the equivalent forms of the Monomial Conjecture are in addition equivalent to the following
conjecture which has its origin, again, in [16] (see, [16, Proposition 1.6.]).
Order Ideal Conjecture: Assume that R is a regular ring and M is an R-module. Suppose
that x is a minimal generator of the i th-syzygy of M for some i > 0. Then the ideal,
¡
¢
O syzi (M) (x) = { f (x) : f ∈ HomR syzi (M), R },
has height greater than or equal to i .
An R-module M (algebra A) is said to be a balanced big Cohen-Macaulay module ( big
Cohen-Macaulay algebra) if mM 6= M (mA 6= A) and any system of parameters x of R is a regular sequence on M (on A). The existence of balanced big Cohen-Macaulay module (big
Cohen-Macaulay algebra), which is a long standing conjecture, settles the Monomial Conjecture affirmatively. In [32] Hochster showed that any equicharacteristic ring has a balanced
big Cohen-Macaualy module. Moreover, in [35] Hochster and Huneke proved that if R is an
excellent domain of prime characteristic, then, R+ , the integral closure of R in the algebraic
closure of its fraction field is a big Cohen-Macaulay algebra. Unfortunately, using the trace
map, we can deduce that the analogous statement about R+ in equal characteristic zero does
not hold provided dim(R) ≥ 3. In spite of this obstruction, in [33] Hochster and Huneke established the existence of big Cohen-Macaulay algebras in the equicharacteristic case.
Although the Monomial Conjecture is quite easy in dimension less than or equal to two,
but not in dimension three. In [24] Heitmann provided a very complicated proof of the validity of Monomial Conjecture in dimension three of mixed characteristic. In fact he proved
more, that is, if R is a mixed characteristic excellent normal domain of dimension three then
E HSAN TAVANFAR
3
H2m (R+ ) is almost zero, i.e. R+ is an almost Cohen-Macaulay R-algebra1. Quite obviously, the
existence of almost Cohen-Macaulay algebra is stronger than the existence of big CohenMacaulay algebras. In general the Monomial Conjecture follows from the existence of almost Cohen-Macaulay algebra(see, e.g. [49, Proposition 1.3]). In [27] when R has dimension three and mixed characteristic Hochster constructed a big Cohen-Macaulay algebra using the Heitmann’s result regarding the almost Cohen-Macaulayness of R+ . Recently, in [8],
Bhattacharyya showed that the Big Cohen-Macaulay Algebra Conjecture follows from the existence of almost big Cohen-Macaulay algebras. The question whether R+ is always almost
Cohen-Macaulay in mixed characteristic is open in dimension greater than or equal to 4. Although the Monomial Conjecture, has been proved in equal characteristic zero but the question whether R+ is almost Cohen-Macaulay in equal characteristic zero is of self interest and
is open in dimension greater than or equal to 3. But the three dimensional equal characteristic zero case for the Segre product of Cohen-Macaulay N-graded rings has been investigated
in [49], where the authors apply the Albanese varieties to deduce that the image of non-top
local cohomologies of R are almost zero in R+ . Recently, in [48] Roberts showed that the image of non-top local cohomologies of R in R+ are almost zero provided R is a Segre product
of N-graded Cohen-Macaulay rings of mixed characteristic. Moreover, recently, applying the
Almost Purity Theorem, in [52] Shimomoto proved that R has a big Cohen-Macaulay algebra
provided R has mixed characteristic p > 0 such that R[1/p] is an étale extension of A[1/p]
wherein A is a Noether normalization of R.
A finitely generated big Cohen-Macaulay R-module is said to be a small Cohen-Macaulay
module or maximal Cohen-Macaulay module. Hochster’s Small Cohen-Macaulay Conjecture states that every complete ring has a small Cohen-Macaulay Module. This conjecture is
even open in three dimensional equicharacteristic rings.
In Section 2 we prove that for the validity of the Monomial Conjecture it suffices to take
into account only systems of parameters of R which form a part of a minimal basis of m.
This fact will be used in Section 4 to deduce the main result of that section. Here, it is worth
to point out that, since for proving this reduction we descend to a finite free extension of
R with complete intersection fibers, we can merge some of other known reductions of the
Monomial Conjecture with our reduction. For instance, it suffices to confine our attention
only on such system of parameters x := x1 , . . . , xd for almost complete intersections. In view
of [13] the Monomial Conjecture reduces to the almost complete intersections.
In Section 3 we show that the aforementioned homological conjectures reduce to the
class of excellent (homomorphic image of regular) unique factorization domains. The main
idea of the proof is the fact that the Ulrich’s deformation of certain Gorenstein rings to the
class of unique factorization domains, developed in [55], has a quasi-Gorenstein counterpart. But prior to applying this reduction, for a normal domain R with canonical ideal ωR , we
L
endow R ωR with a ring structure such that it is a quasi-Gorenstein domain which is a complete intersection in codimension 1 (recall that the trivial extension is never a domain). For
the Monomial Conjecture with the aid of Hochster’s first general grade reduction technique
developed in [31], we deduce that the reduction to excellent unique factorization domains
is dimensionwise in the sense that the Monomial Conjecture for d -dimensional local rings
1
Here, almost zero means that each element of H2m (R+ ) is killed by elements of arbitrary small valuation,
with respect to a fixed rank one valuation which is non-negative on R and positive on m.
4
R EDUCTION
OF SOME HOMOLOGICAL CONJECTURES TO
...
descends to d -dimensional excellent unique factorization local domains. It is noteworthy to
mention that in the light of Heitmann’s remarkable paper, [23], loosely speaking, any complete ring with depth at least 2 is a completion of a unique factorization domain! But, unfortunately, Heitmann’s unique factorization domains are neither excellent nor catenary 2 .
For instance, his unique factorization domains are not supposed to have a maximal CohenMacaulay module or even a canonical module. So the excellence property can be important
from this point of view. Besides the known good properties of unique factorization domains,
they may have even more tacit important properties as we will point out them in the sequel.
The first example of a non-Cohen-Macaulay unique factorization domain was constructed
by virtue of the invariant theory, in Bertin’s paper [7]. In fact at that time, Bertin’s counterexample settled negatively Samuel’s conjecture regarding the Cohen-Macaulayness of unique
factorization domains. In spite of the existence of this counterexample, complete unique
factorization domains at least in equal characteristic zero, have very good properties. For
instance, as stated in [42, Page 539] (see, also [21]), if R is a complete equicharacteristic zero
unique factorization domain of depth ≥ 3, then R satisfies S 3 . Moreover, if the residue field
is algebraically closed (char 0), then the depth condition is superfluous. Furthermore, in
view of [42, Page 540], any complete unique factorization domain with algebraically closed
residue field of characteristic zero is Cohen-Macaulay provided dim(R) ≤ 4. So it might be,
fairly, more helpful, if we can take more steps and reduce any of the homological conjectures
to the class of complete unique factorization domains.
In Section 4, we investigate the homological conjectures for almost complete intersections satisfying m2 ⊆ (x) for some system of parameters x of R. In mixed characteristic we
furthermore assume that x1 = p, the residual characteristic of R. We will see that in this
case R has a balanced big Cohen-Macaulay algebra. In the sequel, we explain our motivation behind this investigation. As we mentioned before, the Monomial Conjecture is proved
for equicharacteristic rings of arbitrary dimension and for (at most) 3-dimensional rings of
any characteristic. Due to the Goto’s paper [20], another subclass of rings which adhere the
Monomial Conjecture ¡is Buchsbaum
rings. In fact any system
of parameters x of¢ a Buchs¢
S ¡ t+1
lim
lim
(x1 , . . . , xdt+1 ) : x1t · · · xdt . This inbaum ring satisfies, m {x}R ⊆ (x), wherein {x}R =
t∈N
clusion immediately settles the Monomial Conjecture. Now set A to be the class of rings
consisting of rings R satisfying,
¡
¢
m2 {x}lim
⊆ (x),
R
for some system of parameters x of R. Note that A contains, properly, the class of Buchsbaum rings (see, [54, Theorem 5.12(ii)]). In order to see why this inclusion is proper, note
that in the light of [19], there exists a non-Buchsbaum quasi-Buchsbaum ring R such that
there are exactly two non-zero non-top local cohomologies of R which both of them are R/mvector spaces. Then applying the argument of the proof of [46, Proposition 1.] we can conclude that R belongs to the class A . Note also that by [54, Theorem 5.12.(i)], roughly speaking, A is a subclass of generalized Cohen-Macaulay rings. Quite obviously, if the Monomial Conjecture is valid for any system of parameters x of any ring R with m2 ⊆ (x), then
2
In fact Heitmann’s construction of such unique factorization domains provided us with an example of a
non-catenary local unique factorization domain. Prior to this counterexample, it was conjectured that any
local unique factorization domain is catenary.
5
E HSAN TAVANFAR
any member of A satisfies the Monomial Conjecture. Although, at this time, we could not
prove the validity of the Monomial Conjecture in this general setting, but we succeeded to
deduce our desired statement for almost complete intersections satisfying m2 ⊆ (x) with the
extra assumption that x1 = p in the mixed characteristic p > 0. For justifying our investigation in this restricted case, from another point of view, recall that in the light of Dutta’s
result [13, 1.2 Proposition] in conjunction with [28, (6.1) Theorem] Monomial Conjecture reduces to the case where R is an almost complete intersection of mixed characteristic p > 0
and x1 , . . . , xd is a system of parameters for R with x1 = p. The key ingredient of our proof is
the fact that those almost complete intersections have multiplicities up to two in the nonCohen-Macaulay case. We give an example of a non-Cohen-Macaulay ring R ∈ A such that
its multiplicity is strictly greater than two (so, R is not an almost complete intersection).
In view of the Monomial Conjecture, we end the paper with a question regarding existence of a particular non-commutative R-algebra.
2 Reduction of the Monomial Conjecture to systems of parameters which
are part of a minimal basis of m
This section is devoted to prove that for the validity of the Monomial Conjecture it suffices
only to check systems of parameters of the ring which can be extended to a minimal set of
generators of the maximal ideal. This result will be used in the Section 4 to prove that certain
almost complete intersections satisfy the Monomial Conjecture.
L
Remark 2.1. Let a ∈ R. Then the free R-module R R acquires a ring structure via the following rule,
(r, s)(r ′ , s ′ ) = (r r ′ + ss ′ a, r s ′ + r ′ s).
L
We use the notation R(a 1/2 ) to denote the forgoing ring structure of R R. In fact it is easily
seen that the map, R(a 1/2 ) → R[X]/(X 2 − a), which takes (r, s) to (sX + r ) + (X 2 − a)R[X] is an
isomorphism of R-algebras. We are given the extension map R → R(a 1/2 ) by the rule r 7→
(r, 0) which turns R(a 1/2 ) into a free R-module with the basis {(1, 0), (0, 1)}. Consequently this
extension is an integral extension of R and it is subject to the following properties which all
are easy to verify.
¡
¢
(i) dim(R) = dim R(a 1/2 ) and a has a square root in R(a 1/2 ), namely (0, 1).
(ii) If a ∈ m then R(a 1/2 ) is a local ring with unique maximal ideal m
L
R.
(iii) If a, x2 , . . . , xd is a system of parameters of R then a 1/2 , x2 , . . . , xd is a system of parameters for R(a 1/2 ).
(iv) If ϕ : R → S is an R-algebra wherein, ϕ(a) has a square root in S, then there exists a
natural induced R-algebra homomorphism Ψ : R(a 1/2 ) → S defined by (r, s) 7→ ϕ(r ) +
ϕ(s)ϕ(a)1/2 , extending ϕ. Moreover, assuming that R and S are domains, Ψ is injective
if and only if ϕ is injective and a does not have a square root in Frac(R).
6
R EDUCTION
OF SOME HOMOLOGICAL CONJECTURES TO
...
(v) If R is a domain, then R(a 1/2 ) is a domain if and only if a does not have a square
root in Frac(R). For one implication we note that if a does not have a square root in
K := Frac(R), then K[x]/(x 2 −a) is a field extension of R. Therefore, by applying the preceding part we get an embedding R(a 1/2 ) → K[x]/(x 2 − a) which shows that R(a 1/2 )
is an integral domain. For the reverse implication note that if a has a square root
r /s ∈ Frac(R) then the identity (r, s)(r, −s) = 0 shows that R(a 1/2 ) is not a domain.
The following remark is in fact the proof of Corollary 2.3(i).
Remark 2.2. Let x1 , . . . , xl be a sequence of elements of R contained in the maximal ideal of
R. We, inductively, construct the local ring (Ri , mi ) by taking a square root of xi in Ri −1 . Then
in Rl we have,
),
xi1/2 = (
0
, 0, . . . , 0, 1, 0, . . .,
0
|{z}
|{z}
0-th coordinate
(2l −1)-th coordinate
whose 2(i −1) -th coordinate is 1 and others are zero.
(i) Let 1 ≤ j ≤ l and 0 ≤ k ≤ 2l − 1. We denote the element (0, . . . , 0,
1
|{z}
, 0, . . . , 0) of Rl
k−th coordinate
by e k . Then we have,
e k x 1/2
j =
(
e k+2 j −1 ,
( j − 1)- th digit of k in base 2 is 0
x j e k−2 j −1 , ( j − 1)- th digit of k in base 2 is 1.
In order to see why this is the case we induct on the least natural number s ≥ j such that
k ≤ 2s − 1. In the case where s = j it is easily seen that the ( j − 1)-th digit of k in its 2-th
base representation is 0 (is 1) if and only if k ≤ 2 j −1 − 1 (k ≥ 2 j −1 ). So an easy use of the
L
multiplication rule of the ring R j := R j −1 R j −1 proves the claim (Recall that R j is subring of
Rl ). Now assume that s > j . Then we have,
³
¢ 1/2 ´
¡
,
0,
.
.
.
,
0
xj .
e k x 1/2
=
0,
.
.
.
,
0
,
0,
.
.
.
,
0,
1
j
|{z}
|{z}
2s−1 −1-th coordinate
(k−2s−1 )-th coordinate
Now set k ′ := k − 2s−1 . Note that the ( j − 1)-th digit of the base 2 representation of k and
k are equal. Consequently the statement follows from our inductive hypothesis.
′
(ii) We are going to show that for each 1 ≤ i ≤ l the projection map τ2(i −1) : m2l → R, which is
the projection to the (2(i −1) )-th coordinate, is not surjective. In the case where l = 1 we have
L
m2l = (m2 + x1 R) m. So, we assume that l ≥ 2 and the statement is true for smaller values of
l . Then,
¡
¢M
m2l = m2l −1 + xl Rl −1
ml −1 .
(1)
Now, if i = l then 2l −1 -th coordinate of m2l is just the first coordinate of,
M M M
ml −1 = m R · · · R.
Hence, clearly, τ2(l −1) is not surjective. On the other hand if i l then by our inductive hypothesis τ2(i −1) : m2l −1 → R is not surjective which, in the light of the equality (1), implies the
statement immediately.
7
E HSAN TAVANFAR
(iii) In continuation of our investigation in the previous part, we need to show, also, that the
projection map τ2(i −1) : x 1/2
Rl −1 → R is not surjective unless i = j (1 ≤ i ≤ l − 1 and 1 ≤ j ≤
j
l − 1). Let (r k )0≤k≤2l −1 −1 ∈ Rl −1 . Then we have,
(r k )0≤k≤2l −1 −1 x 1/2
j
2l −1
P−1
k=0
( j −1)−th digit of k in base 2 is 0
r k e k+2 j −1 +
=
2l −1
P−1
k=0
r k e k x 1/2
=
j
2l −1
P−1
k=0
( j −1)−th digit of k in base 2 is 1
r k x j e k−2 j −1 .
Thus if i < j then evidently τ2i −1 is not surjective. On the other hand if i > j and there
exits 0 ≤ k ≤ 2l −1 − 1 with k + 2 j −1 = 2i −1 then k = 2i −1 − 2 j −1 which after a straightforward
computation shows that the ( j −1)-th digit of k in base 2 is 1. This proves the non-surjectivity
of τ2i −1 .
(iv) By means of the arguments of the forgoing part we can, directly, conclude that,
1/2
xi1/2 ∉ m2l −1 + (x11/2 , . . . , xd
, . . . , xl1/2
−1 , x l )Rl −1 , (i
i
l)
otherwise we must have τ2(i −1) : (x 1/2
)Rl −1 → R for some 1 ≤ j ≤ l − 1 and j 6= i or τ2(i −1) :
j
m2l −1 → R is surjective.
The above remark yields the following corollary, as claimed before. In the second part
of the subsequent corollary the important point is the equality embdim(R) = d + u which
equals to the embedding dimension of the regular local ring V[[X 2 , . . . , X d , Y1 , . . . , Yu ]].
Corollary 2.3.
(i) The Monomial Conjecture holds if and only if every system of parameters
x1 , . . . , xd which is a part of a minimal basis for the maximal ideal satisfies the Monomial
Conjecture.
(ii) For the Monomial Conjecture, without loss of generality, we can assume that,
³
´
1/2
R = (V, p )[[X 2 , . . . , X d , Y1 , . . . , Yu ]] /I,
and the system of parameters x1 , . . . , xd is the image of p 1/2 , X 2 , . . . , X d in R where the
discrete valuation ring (V, p 1/2 ) is a subring of R and embdim(R) = d + u.
Proof. (i) Let x1 , . . . , xd be a system of parameters for R. Consider the ring Rd as in Remark
2.2. It suffices to show that x11/2 , . . . , xd1/2 is a part of a minimal basis for the unique maximal
L
ideal md of Rd . Let (α1 , β1 ), . . . , (αd , βd ) ∈ Rd = Rd−1 Rd−1 be such that,
¢M
¡
md−1 .
(αk , βk )xk1/2 + (αd , βd )(0Rd −1 , 1Rd −1 ) ∈ m2d = m2d−1 + (xd )Rd−1
{z
}
|
k=1
d−1
X
=xd1/2
Then by a simple computation we get
d−1
X
k=1
αk xk1/2 + βd xd ∈ m2d−1 + xd Rd−1 ,
(2)
8
R EDUCTION
OF SOME HOMOLOGICAL CONJECTURES TO
...
and,
d−1
X
k=1
βk xk1/2 + αd ∈ md−1 .
(3)
So the identity (3) yields αd ∈ md−1 and thence (αd , βd ) ∈ md . Moreover, for each 1 ≤ k ≤
L
d − 1 we must have (αk , βk ) ∈ md = md−1 Rd−1 , otherwise we get αi ∉ md−1 for some 1 ≤
1/2
i ≤ d − 1 which in view of the identity (2) yields x 1/2 ∈ m2 + (x 1/2 , . . . , xd
, . . . , x 1/2 , x )R
i
d−1
1
i
d−1
d
d−1
violating Remark 2.2 (iv). Consequently, (αk , βk ) ∈ md for each 1 ≤ k ≤ d . This implies that
x11/2 + m2d , . . . , xd1/2 + m2d is a linearly independent subset of md /m2d over Rd /md and thence
x11/2 , . . . , xd1/2 is part of a minimal basis for md .
(ii) By [28, (6.1) Theorem], for the validity of the Monomial Conjecture it suffices to verify
it only for systems of parameters x1 , . . . , xd of R wherein x1 = p is the residual characteristic
and (V, pV) is a coefficient ring of the complete local ring R. So the statement follows from
the argument in the proof of the preceding part.
3 Reduction to excellent unique factorization domains
In this section we show that some homological conjectures reduce to excellent unique factorization domains. Here, by homological conjectures we mean one of the Small CohenMacaulay Conjecture, Big-Cohen-Macaulay Algebra Conjecture as well as the Monomial Conjecture.
Lemma 3.1. Suppose that R is a Noetherian local domain which is not a field. Then there
exists a ∈ m such that a does not have a square root in F := Frac(R).
Proof. We first claim that there exists a ∈ R without a square root in Frac(R). Assume to the
contrary that each element of R has a square root in F. Then F is square root closed. Let
p be a height one prime ideal of the integral closure R of R which is a Krull domain (see,
[39, Theorem 4.10.5]). Since Rp is an integrally closed domain, so the discrete valuation ring
(Rp , xRp ) is square root closed in Frac(R). But then x has a square root in Rp . This observation
violates x ∉ p2 Rp .
Hence there exists an element a ∈ R without a square root in Frac(R). If a ∈ m then we are
done, so suppose that a is an invertible element of R. Then for any 0 6= t ∈ m we have, t , or,
t a, does not have a square root in Frac(R).
Remark 3.2. Suppose that R is a domain. Since the trivial extension R ⋉ ωR R by its canonical module (even the amalgamated duplication ring of R with its canonical ideal3) is not a
L
domain we will use a different multiplication on R ωR . To be more precise, since R is a
domain so [4, (3.1)] implies that ωR is an ideal of R. By applying the preceding lemma we can
L
choose a ∈ m such that a does not have a square root in Frac(R). We may endow S := R ωR
with a ring structure such that,
(r, x)(r ′ , x ′ ) = (r r ′ + xx ′ a, r x ′ + r ′ x),
3
See, [6].
9
E HSAN TAVANFAR
L
for each (r, x), (r ′ , x ′ ) ∈ R ωR . In particular, S is a subring of R(a 1/2 ) and it is a domain by
Remark 2.1(v). Furthermore, ηR : R → S which maps an element r ∈ R to (r, 0) is an R-algebra
L
homomorphism. Note that S is a local ring with the maximal ideal n := m ωR and η is a local
monomorphism. As we will see in the following remark, S endowed with the aforementioned
multiplication is an integral domain which is a complete intersection in low dimension, provided R is a normal ring. The fact that it is a complete intersection in the low dimension is
essential for reducing the homological conjectures to the subclass of unique factorization
domains.
Lemma 3.3. Suppose that R is a normal domain and that ωR is the canonical ideal of R. Let
a ∈ Frac(R) be an element of m without a square root in Frac(R). Then the following statements
hold.
(i) R(a 1/2 ) is locally complete intersection at codimension ≤ 1.
L
(ii) The subring R ωR of R(a 1/2 ) is locally complete intersection at codimension ≤ 1.
¡
¢
T
Proof. (i) Let p ∈ Spec R(a 1/2 ) be a height one prime ideal and set q := p R. Firstly note
that ht¡R (q) = htR(a
¢ 1/2 ) p, as we have going down, going up and incomparability. In particular,
1/2
p ∈ ass qR(a ) . Since R is normal, Rq is a regular local ring. Consequently, Rq [x] is a regular domain. Hence Rq [x]/(x 2 − a)Rq [x] ∼
= Rq (a 1/2 ) is locally complete intersection. An easy
verification shows that,
l∈ass
Note that qR(a 1/2 ) = q
L
¢
l = {(r, s) ∈ R(a 1/2 ) : r 2 − s 2 a ∈ q}.
(4)
qR(a 1/2 )
q. Set, S := R(a 1/2 )\
l∈ass
¡
S
¢ l. Then there exists the natural em-
qR(a 1/2 )
¢
bedding ϕ : Rq → S R(a ) defined by a/s → (a, 0)/(s, 0). On the other hand a does not
have a square root in Frac(Rq ) = Frac(R). Thus by Remark 2.1(iv) ϕ induces the injection
¡
¢
Ψ : Rq (a 1/2 ) → S −1 R(a 1/2 ) ,
−1
¡
¡
[
1/2
such that maps any
(a/b, a ′ /b ′ ) ∈ Rq (a 1/2 ) to (ab ′ , a ′ b)/(bb ′ , 0). For each element
¡ element
¢
′ ′
−1
1/2
(r, s)/(r , s ) ∈ S R(a ) we have, by(4) , r ′2 − s ′2 a ∉ q and,
¡
¢
Ψ (r r ′ − ss ′ a)/(r ′2 − s ′2 a), (r ′ s − r s ′ )/(r ′2 − s ′2 a) = (r, s)/(r ′ , s ′ ).
¡
¢
−1
1/2
Hence, Ψ is an isomorphism.
So,
S
R(a
)
, is¡ locally ¢complete intersection. Conse¡
¢
quently, as p ∈ ass qR(a 1/2 ) , we have R(a 1/2 )p ∼
= S −1 R(a 1/2 ) S −1 p is a complete intersection.
L
(ii) Let p′ ∈ Spec(R ωR ) be a height¡ one prime
ideal. Since R(a 1/2 ) is an integral exten¢
L
sion of R ωR , so there exists p ∈ Spec R(a 1/2 ) lying over p′ . Let q be the contraction of p′
in R. Note that htR (q) = htR(a 1/2 ) (p), because R(a 1/2 ) is an integral flat extension of R. On
L
the other hand, because R is integrally closed so R → R ωR has the going down property.
Hence, htR(a 1/2 ) (p) = htR (q) ≤ htR L ωR (p′ ). This shows that htR(a 1/2 ) (p) = 1, as well.
L
If ωR * q, then it is easily verified that the natural map (R ωR )p′ → R(a 1/2 )p is an isomorphism.
10
R EDUCTION
OF SOME HOMOLOGICAL CONJECTURES TO
...
L
L
Now, we deal with the case where ωR ⊆ q. Note that (R ωR )p′ is a localization of (R ωR )q .
L
So, it suffices to show that the latter is (locally) complete intersection. Moreover, (R ωR )q is
L
an Rq -algebra by the map r /t 7→ (r, 0)/t and this underlying Rq -module structure of (R ωR )q
L
L
L
is the same Rq module (R ωR )q ∼
= Rq Rq . In particular, (R ωR )q is a flat Rq -algebra. So it
L
is sufficient to show that the closed fiber of Rq → (R ωR )q is a complete intersection. Since
(ωR )q ⊆ qRq so it is easily seen that there exists a natural ring isomorphism,
M
M
(R
ωR )q /(q
qωR )q → Rq /qRq ⋉ (ωR )q /q(ωR )q ,
such that maps an element (r, s)/t to (r /t , s/t). Now from the fact that (ωR )q ∼
= Rq , we can
deduce that Rq /qRq ⋉ (ωR )q /q(ωR )q is isomorphic to to the complete intersection ring,
(Rq /qRq )[X]/(X 2 ).
In [55] the author proves that any Gorenstein ring which is a homomorphic image of
a regular ring and it is a complete intersection at codimension ≤ 1 is a specialization of a
unique factorization domain. The first part of the proof of the following proposition is more
or less repeating the proof of the Ulrich’s result, and is stated here for the convenience of the
reader and also for the sake of completeness.
Proposition 3.4. Suppose that P is a regular ring and R := P/a is a quasi-Gorenstein ring.
Assume, furthermore, that R is locally complete intersection at codimension ≤ 1. Then there
exists a unique factorization domain S (which is of finite type over P) and a regular sequence
y of S such that R ∼
= S/(y).
Proof. The general idea, here, is similar as given in [55, Proposition 1]. Firstly, we are going
to use the idea of generic linkage presented in [40] to be sure that the almost complete intersection linked to a is a prime ideal which is a complete intersection at codimension ≤ 1. To
be more precise, let a1 , . . . , an be a system of generators for a and assume that grade(a) = g .
n
P
Yi ,j a j . Then, in the light of, [40, ProposiSet, Q = P[Yi ,j : 1 ≤ i ≤ g , 1 ≤ j ≤ n] and ci =
j =1
tion 2.9.(b)] and [40, Proposition 2.6], the linked ideal b = (c1 , . . . , c g ) :Q aQ, to aQ, is a prime
almost complete intersection which is a complete intersection at codimension ≤ 1. In particular, in the light of [38, (5), page 268] one can deduce that b is generated by a d-sequence
and thence [38, Theorem 3.1.] implies that sym(b) ∼
= R(b) wherein R(b) denotes the Rees algebra of b and sym(b) stands for the symmetric algebra of b. Suppose that, b = (c1 , . . . , c g , h).
Now, in the light of [37, Theorem 2.2] in conjunction with [30, Thoerem 1], the extended Rees
algebra Q[t −1 , bt ] is a unique factorization domain and whence so is
U := Q[t −1 , bt ]ht = Q[bt ]ht = sym(b)ht = (Q[Z 0 , . . . , Z g ]/d)Z0 ,
wherein, d =< {
g
P
i =0
r i Z i |r 0 h +
g
P
i =1
r i ci = 0} >. Now, as stated in [55, Proposition 1], U has an
Z-grading structure such that,
V := Q[Z 0 , Z 1 , . . . , Z g ]/(d + (Z 0 − 1)),
11
E HSAN TAVANFAR
is its degree zero subring and since the unique factorization domain U has an invertible
element of degree one it is easily seen that V is also a unique factorization domain.
The reminder of the proof differs with [55, Proposition 1]. Note that if we localize V at its
maximal ideal n := (m, Y1 , . . . , Yng , Z 1 , . . . , Z g , Z 0 −1) then R = Vn /(Y1 , . . . , Yng , Z 1 , . . . , Z g ). Hence
in order to deduce the statement it suffices to show that Z 1, . . . , Z g forms a regular sequence of
V, i.e. Z 0 −1, Z 1 , . . . , Z g is a regular sequence on sym(b). We achieve this with the aid of theory
of Z -complexes which is introduced and investigated in [26]. We use the notation Z i to denote the i -th cycles of the Koszul complex of Q with respect to the sequence c := h, c1 , . . . , c g .
Let S = Q[Z 0 , . . . , Z g ], be the polynomial ring over Q. Then the Z -complex associated to the
sequence c is the complex,
Z := 0 → Z g
O
S(−g ) → · · · → Z 2
Q
O
Q
whose differential is defined by the rule,
S(−2) → Z 1
O
S(−1) → S → 0,
Q
i
O
O ¢ X ¡X
¡X
¢
∂ ( q j e j1 ∧ · · · ∧ e ji )
Zk f .
f = qj
(−1)k e j 1 ∧ · · · ∧ ec
jk ∧ · · · ∧ e ji
j
j
k=1
It is easily seen that H0 (Z ) = sym(b) = S/d. Moreover, Z is acyclic by virtue of [26, Theorem
12.5] because any d -sequence is a proper sequence(see, [26, Definition 6.1.]). Using these
two facts and by considering the spectral sequence arising from the double complex,
O
Z
K• (Z 0 − 1, Z 1 , . . . , Z g ; S),
S
we can deduce that Z 0 − 1, Z 1 , . . . , Z g is a regular sequence on sym(b) if and only if,
O
S/(Z 0 − 1, Z 1 , . . . , Z g ),
Z
S
remains acyclic. Let e 0 denotes the basis of K1 (h, c1 , . . . , c g ; Q) = Qg +1 corresponding to the
element h. Then each element ζi of Z i can be represented as ζi = z i + z i′ ∧ e 0 such that z i ∈
L
L
′
j 1 6=0 Qe j 1 ∧···∧e j i −1 ( Ki −1 (h, c 1 , . . . , c g ; Q). Note
j 1 6=0 Qe j 1 ∧···∧e j i ( Ki (h, c 1 , . . . , c g ; Q) and z i ∈
that,
O¡
¢
Z
S/(Z 0 − 1, Z 1 , . . . , Z g ) =
S
0 → Zg
O
Q
→ Z1
O
Q[Z 0 ]/(Z 0 − 1) → · · · → Z 2
O
Q[Z 0 ]/(Z 0 − 1) →
Q[Z 0 ]/(Z 0 − 1) → Q[Z 0 ]/(Z 0 − 1) → 0,
Q
¡
N ¢
N
whose differentials satisfy, ∂ (z i + z i′ ∧ e 0 ) f = (−1)i −1 z i′ f ,4 , for each z i + z i′ ∧ e 0 ∈ Z i .
N
Let, α, be a cycle in Z i . Without loss of generality we can say, α = (z i + z i′ ∧ e 0 ) 1. Thus,
N
More precisely, note that Z S S/(Z 0 − 1, Z 1 , . . . , Z g ) is a subcomplex of the complex,
O
O
O
K := 0 → Kg +1
S/(Z 0 − 1, Z 1 , . . . , Z g ) → Kg
S/(Z 0 − 1, Z 1 , . . . , Z g ) → · · · → K0
S/(Z 0 − 1, Z 1 , . . . , Z g ) → 0,
4
Q
Q
Q
12
R EDUCTION
OF SOME HOMOLOGICAL CONJECTURES TO
...
N
N
z i′ 1 = 0 which implies that, z i′ = 0. Hence, α = z i 1. In particular, z i ∈ Z i (c1 , . . . , c g ; Q).
Now the exactness of K• (c1 , . . . , c g ; Q) implies that there exists ζi ∈ Ki +1 (c1 , . . . , c g ; Q) such that
∂(ζi ) = z i . In particular, −hζi + (−1)i z i ∧ e 0 ∈ Z i +1 . Now using the algebra structure we get,
α = zi
O
³¡
¢O ´
1 = ∂ − hζi + (−1)i z i ∧ e 0
1 .
This observation concludes the proof.
Recall that by homological conjectures we mean one of the Small Cohen-Macaulay Conjecture, Big-Cohen-Macaulay Algebra Conjecture as well as the Monomial Conjecture. The
first part of the subsequent theorem reduces the homological conjectures to the class of
quasi-Gorenstein domains. As pointed out in the introduction, as the main result of this
section, the second part of the subsequent theorem gives the promised descent to excellent unique factorization domains. The integral closure of a complete quasi-Gorenstein ring
is not necessarily quasi-Gorenstein. Therefore, we could not reduce to the normal complete quasi-Gorenstein domains directly by taking integral closure in the first part. But by
virtue of the second part this is achievable which is stated separately in the third part. Note
that, as stated in [55], the completion of the unique factorization domains in [55] are not
unique factorization domain necessarily. However any possible reduction of the homological conjectures to the complete unique factorization domains would be fairly helpful as the
complete unique factorization domains have even more interesting properties at least in
the equal characteristic zero. More precisely, any equal characteristic zero complete unique
factorization domain with algebraically closed residue field of dimension up to 4 is CohenMacaulay. Furthermore, with mild conditions, any complete unique factorization domain of
equal characteristic zero with algebraically closed residue field satisfies the Serre-condition
S 3 (see, [42, page 540] or [21] for both of the aforementioned results).
Theorem 3.5. The following statements holds.
(i) If each complete quasi-Gorenstein domain, which is locally complete intersection at
codimension ≤ 1, satisfies the homological conjectures then, each local ring satisfies homological conjectures. This reduction is dimensionwise, in the sense that homological
conjectures for d -dimensional local rings reduce to the d -dimensional complete quasiGorenstein domains.
(ii) The homological conjectures reduce to the excellent (and homomorphic image of regular) unique factorization domains. This reduction is dimensionwise for the Monomial
Conjecture.
wherein Ki denotes the i -th component of the Koszul complex K• (h, c 1 , . . . , c g ; Q). The differential of K is dei
N
P
N
fined by, ∂(e j 1 ∧· · ·∧e j i f ) =
(−1)k e j 1 ∧· · ·∧ ec
Z k f . The complex K has a DG-algebra structure.
j k ∧· · ·∧e j i
k=1
Using this DG-algebra structure of K the identity can be easily verified because in view of the definition of ∂
in conjunction with the fact Z i has zero image in S/(Z 0 − 1, Z 1 , . . . , Z g ) for each 1 ≤ i ≤ g we can conclude that
∂(zi ) = ∂(zi′ ) = 0. This DG-algebra technique is used in the proof of [22, Lemma 4.3].
13
E HSAN TAVANFAR
(iii) The homological conjectures reduce to quasi-Gorenstein normal complete domains. This
reduction is dimensionwise for the Monomial Conjecture.
(iv) For the Canonical Element Conjecture it suffices only to consider mixed characteristic
complete normal quasi-Gorenstein rings of minimum possible depth, i.e. depth 2.
Proof. (i) We may suppose that R is a complete normal domain. In particular R satisfies the
L
S 2 -condition. Let ωR be the canonical ideal of R and set S := R ωR as stated in the Remark
3.2. Note that S is a complete local ring. By [4, Proposition 1.2] we have,
M d
¡ d
¢
¡
¢
Hm (R), E(R/m)
HomR Hdn (S), E(R/m) ∼
= HomR Hm (ωR )
O
¡ d
¡
¢
¢M
∼
ωR , E(R/m)
HomR Hd (R), E(R/m)
= HomR H (R)
m
m
R
∼
= HomR (ωR , ωR )
M
∼
ωR = S.
=R
M
ωR
¡
¢
Hence we get an isomorphism, S → HomR Hdn (S), E(R/m) , of R-modules which is an Sisomorphism too5 . In particular, Hdn (S) ∼
= HomR (S, E(R/m)), as S-modules because on the
category of S-modules two functors HomR (−, E(R/m)) and HomS (−, E(S/n)) are naturally
equivalent . So,
³
O
¡
¢
¡
¢´
¢
¡
HomS S/n, Hdn (S) ∼
S, E(R/m)
= HomS S/n, HomR S, E(R/m) ∼
= HomR S/n
S
¡
¢
∼
= HomR R/m, E(R/m)
∼
= R/m
∼
= S/n.
This observation implies that Hdn (S) has one dimensional socle. Since a does not have a
square root in Frac(R), so Remark 2.1 (v) implies that R(a 1/2 ) and whence its subring S is an
integral domain. Thus, by [54, Theorem 5.7], S is a quasi-Gorenstein domain. Since S is a
finitely generated (as R-module) complete quasi-Gorenstein extension domain of R so the
statement follows.
(ii) Using the previous part in conjunction with Lemma 3.3 and Proposition 3.4 we may
assume that R is a complete quasi-Gorenstein domain such that R = S/yS wherein (S, n) is a
5
In order to see why this is also an S-isomorphism, we fix an R-isomorphism,
¡
¢
ϕ : ωR → HomR Hdm (R), E(R/m) .
Then ¡the composition
of the above isomorphisms which is the mentioned R-isomorphism S →
¢
L
HomR Hdn (S), E(R/m) maps an element (r, α) ∈ R ωR = S to the R-homomorphism defined by the rule,
[(r ′ , α′ ) + (xn )] ∈ Hdn (R
wherein x is a system of parameters for R.
homomorphism.
M
¡
¢¡
¢
ωR ) 7→ ϕ(r α′ + r ′ α) [1 + (xn )] ,
Then it is easily verified that the map is, moreover, an S-
14
R EDUCTION
OF SOME HOMOLOGICAL CONJECTURES TO
...
unique factorization domain and y := y 1 , . . . , y n is a regular sequence contained in S. Clearly,
if S satisfies the homological conjectures then so does R. This proves the first claim. For
proving the second claim we invoke the Hochster’s first general grade reduction technique
developed in [31]. Let a1 , . . . , ad be a system of parameters for R. Assume that the Monomial
Conjecture is valid for every d -dimensional unique factorization domain but, to the contrary,
a1t · · · adt ∈ (a1t+1 , . . . , adt+1 ),
for some t ∈ N. So we get the system of parameters y 1 , . . . , y n , y n+1 , . . . , y n+d for S such that
y i +n is a lift of ai in S for each 1 ≤ i ≤ d and
t
t
t+1
t+1
y n+1
· · · y n+d
∈ (y 1 , . . . , y n , y n+1
, . . . , y n+d
).
t+1
t+1
Since R satisfies the S 2 -condition so y 1 , . . . , y n , y n+1
, y n+2
is a regular sequence of S. As n +2 ≥
3 so [31, Theorem. c)] implies that the first general grade reduction,
T = S[X 1 , . . . , X n+2 ]/(
n
X
t+1
t+1
y k X k + y n+1
X n+1 + y n+2
X n+2 ),
k=1
of S is again a (non-local) unique factorization domain and so is its localization at nT. We
have, dim(TnT ) = dim(S)−1. Furthermore, as X 1 is invertible in TnT so y 2 , . . . , y n+d is a system
t+1
t+1
of parameters for TnT , y 2 , . . . , y n , y n+1
, y n+2
is a regular sequence of TnT and
t
t
t+1
t+1
y n+1
· · · y n+d
∈ (y 2 , . . . , y n , y n+1
, . . . , y n+d
)TnT .
Proceeding in this way, we get a unique factorization domain U with dim(U) = dim(R) = d
such that the image of y n+1 , . . . , y n+d in U is a system of parameters for U which does not
satisfy the Monomial Conjecture. This is a contradiction.
(iii) This is followed by taking the completion of the unique factorizations of the second
part, because by [17, Lemma (2.4)] any unique factorization domain with a canonical module is quasi-Gorenstein. Note also that the completion remains normal, as the formal fibers
of an excellent ring are regular.
(iv) In order to see why this is the case firstly note that by [28] the Canonical Element
Conjecture for all local rings is valid if and only if all local rings satisfies the Monomial Conjecture. Therefore in view of Theorem 3.5 (iii) the Canonical Element Conjecture reduces
to the mixed characteristic normal quasi-Gorenstein complete domains. So let R be such
a quasi-Gorenstein normal domain. Without loss of generality we may assume that R has
infinite residue field. If Depth(R) 2 then applying [43, Theorem 4.4(Local Bertini Theorem)] there exist x ∈ R such that R/xR is a normal domain. In particular R/xR satisfies the
S 2 -condition and thence R/xR is a quasi-Gorenstein normal domain in view of [54, CorolS
lary 3.4.(i)]. Consequently, [54, Proposition 3.1.] implies that x ∉
¡
¢ p. In particular,
p∈Att Hdm−1 (R)
if R/xR satisfies the Canonical Element Conjecture then so does R in the light of [28, (5.3)
Theorem]. Proceeding in this fashion the claim follows.
The theory of generic linkage had an important role in the reduction of the homological
conjectures to unique factorization domains. In the second part of the subsequent remark
15
E HSAN TAVANFAR
we, again, observe that how the linkage theory is related to the homological conjectures. In
the first part we show that the validity of the Canonical Element Conjecture in an open subset
implies the validity in general.
Remark 3.6. (i) The following approach to the Monomial Conjecture might be helpful: The
Canonical Element Conjecture is valid if it is valid, in some sense, in an open dense subset. More precisely, in view of the first part of Theorem 3.5(iii), we can assume that R is a
complete normal quasi-Gorenstein domain of mixed characteristic with Depth(R) ≥ 3. Let
(V, πV , k) be a coefficient ring of R. Let x0 , . . . , xn be a minimal generating set of m. If there exists a dense Zariski open subset O ⊆ Pd (k) such that for any a = (a0 : · · · : an ) in the preimage
n
P
ai xi satisfies the Canonical
of O in Pn (V), as described in [43, Definition 2.1.], we have R/
i =0
Element Conjecture then the Canonical Element Conjecture holds. Indeed, if this is the case
then we can apply [43, Theorem 4.4(Local Bertini Theorem)] to find an element a ∈ R such
that R/aR is a normal domain satisfying the Canonical Element Conjecture. Then [54, Theorem 3.4(i)] and [54, Propositino 3.1.] in conjunction with [28, (5.3) Theorem] imply that R
satisfies the Canonical Element Conjecture.
(ii) In [53, page 158] the following question is proposed. Suppose a and b are ideals in
a d -dimensional Gorenstein ring R which are geometrically linked w.r.t. the empty regular
sequence. Suppose R possess a maximal Cohen-Macaulay module M with 0 :R M = a. Does R
possess a maximal Cohen-Macaulay module N with 0 :R N = b? We show that if this question
has an affirmative answer then Small Cohen-Macaulay Conjecture is true in dimension 3.
Furthermore if Monomial Conjecture analogous of this question has an affirmative answer
then the Monomial Conjecture holds in any dimension.
By Theorem3.5(i) the Small Cohen-Macaulay Conjecture reduces, dimensionwise, to the
class of complete quasi-Gorenstein domains. Let P be a regular local ring and a be a quasiGorenstein prime ideal of P. As in the proof of [13, 1.2. Proposition] Choose a maximal regular sequence x1 , . . . , xh contained in a such that aPa = (x1 , . . . , xh )Pa . Then, a and (x1 , . . . , xh ) :P
a are geometrically linked and since a is a quasi-Gorenstein ideal so b := (x1 , . . . , xh ) :P a is
an unmixed almost complete intersection. Therefore P/b has positive depth and whence
Lemma 4.1(ii) implies that Depth(ωP/b ) ≥ 3. In particular, in the case of dimension three we
have ωP/b is a maximal Cohen-Macaulay P/b-module and therefore an affirmative answer
to the mentioned question implies the validity of the Small Cohen-Macaulay Conjecture in
dimension 3.
For the Monomial Conjecture analogous of the Strooker and Stückrad’s question assume
in addition that a is a normal quasi-Gorenstein prime ideal of P. Then the claim follows by
[15, step 2., page 238]. In spite of this observation, it is by no means clear for us that how the
theory of linkage can be helpful for this type of problems, in this point of view.
Any successful proof of the Monomial Conjecture for the class of generalized CohenMacaulay domains will settle the Monomial Conjecture in dimension three (by means of
a new proof). Although we do not know how to prove the Monomial Conjecture for this
type of rings but we show that again the problem reduces to the class of quasi-Gorenstein
generalized Cohen-Macaulay rings.
Proposition 3.7. The following statements hold.
16
R EDUCTION
OF SOME HOMOLOGICAL CONJECTURES TO
...
(i) If every complete quasi-Gorenstein generalized Cohen-Macaulay ring satisfies the Monomial Conjecture then so does every generalized Cohen-Macaulay ring.
(ii) Monomial Conjecture holds for every complete generalized Cohen-Macaulay domain if
and only if every complete generalized Cohen-Macaualy quasi-Gorenstein domain satisfies Monomial Conjecture.
Proof. (i) Let R be a complete generalized Cohen-Macaulay ring. Denote by S the S 2-ification
of R. By [3, Corollary 4.3] ωRp , for each p ∈ Spec(R), is either the canonical module of the
∼
Cohen-Macaulay
ring
¡
¢ Rp or is zero. Hence, for every p ∈ Spec(R)\m either S p is zero or S p =
∼
∼
HomRp (ωR )p , (ωR )p = HomRp (ωRp , ωRp ) = Rp . On the other hand we have,
\
¡
¢
AssR (S) = AssR HomR (ωR , ωR ) = SuppR (ωR ) AssR (ωR ) = AsshR (R).
Therefore, by [9, 9.5.7 Exercise] S is a generalized Cohen-Macaulay R-module. Let n ∈ Max(S)
such that dim(S) = dim(S n ). Now, we show that S n is a generalized Cohen-Macaulay ring.
Denote the natural map R → S by η. We know that S is a finitely generated R-module. So
S
p and whence
dim(R/ker η) = dim(S). By [28, (4.2) Lemma] we have a := ker(η) ⊆
p
∈Assht(R)
T
dim(S) = dim(R). Since S is integral over R/a so m/a = n R/a and thereby mS n is an nS n primary ideal by the incomparability property of R/a → S. There exists l ≥ 0 such that
ml Him (S) = 0 (0 ≤ i ≤ dim(S) − 1). So that ml HimS n (S n ) = 0 (0 ≤ i ≤ dim(S) − 1) for some l ≥ 0.
Thus, (nS n )k HinS n (S n ) = 0 (0 ≤ i ≤ dim(S n ) − 1). Hence S n is a generalized Cohen-Macaulay
ring. We have S n is S 2 . Hence by passing to the completion if necessary, we can assume that
R is an S 2 -complete generalized Cohen-Macaulay ring. Therefore, in view of [3, Theorem
2.11.] the trivial extension T of R by its canonical module is a complete quasi-Gorenstein
ring. We prove that T is a generalized Cohen-Macaulay ring. Clearly if T satisfies the Monomial Conjecture then so does R.
Let q ∈ Spec(T)\{m ⋉ ω}. Then there exists p ∈ Spec(R)\{m} such that q = p ⋉ ωR . So
∼
Tq = (R ⋉ ωR )p⋉ωR ∼
= Rp ⋉ (ωR )p ∼
= Rp ⋉ ωRp . Hence, Tq is a Cohen-Macaulay ring. As T is
equidimensional, [9, 9.5.7 Exercise] implies that T is generalized Cohen-Macaulay.
(ii) Let R be a complete generalized Cohen-Macaulay domain. Set, S := HomR (ωR , ωR ).
Then, by virtue of [34, (3.6)] S is local6 . Also we know that S is complete and domain. By
a similar argument as in the preceding part, S is generalized Cohen-Macaulay. Hence, as
L
stated in the proof of Theorem 3.5(i), T = S ωS ⊆ S(a 1/2 ), is a local quasi-Gorenstein complete domain wherein a is an element of S without a square root in Frac(S). It is enough to
show that T is a generalized Cohen-Macaulay ring.
L
L
L
Let p ∈ Spec(S)\{m}. Then (S ωS )p ∼
= S p (ωS )p ∼
= S p ωS p , is a Cohen-Macaulay S p L
S
module. On the other hand, AssS (S ωS ) = AssS (S) AsshS (ωS ) = AssS (S) = {0}. Hence T is
a generalized Cohen-Macaulay S-module. Now, a similar argument as in the preceding part
shows that T is a generalized Cohen-Macaulay domain.
6
Since S is local so we do not need to localize S. This is important because the completion of a domain is
not necessarily a domain.
17
E HSAN TAVANFAR
4 A class of rings satisfying the Monomial Conjecture
As stated in the introduction for the validity of the Monomial Conjecture it suffices only to
check the almost complete intersections and system of parameters of the form p, x2 , . . . , xd
where p is the residual characteristic. This section is devoted to prove either the Small
Cohen-Macaulay Conjecture or the Big Cohen-Macaulay Algebra Conjecture for an almost
complete intersection R satisfying the extra assumption that,
m2 ⊆ (x)R,
(5)
for some system of parameters x1 , . . . , xd of R. In the mixed characteristic case we moreover
assume that x1 = p.
A motivation behind this consideration is that this case seems to be the most simple
non-trivial case of the Monomial Conjecture. For another motivation see the introduction.
But, parallel, to this aim, several other interesting facts about this class of almost complete
intersections are also given. The following lemma is not required for the next theorem which
is the main result of the section but it is needed for its subsequent remark.
Lemma 4.1. Assume that (A, n) is a regular local ring. Let a = (x1 , . . . , xd ) (resp. b = (y 1 , . . . , y s ))
be a complete intersection (resp. an almost complete intersection) ideal of A. Suppose furthermore that, x1 , . . . , xd , y 1 , . . . , y s−1 , forms a regular sequence of A and that ht(a) + ht(b) =
d + s − 1 = dim(A). Set, R := A/b. Then the following statements hold.
(i) There exists an exact sequence,
0 → H2 (x, R) → ωR /aωR → ωR/a → H1 (x, R) → 0.
(ii) We have Hi (x, R) ∼
= Hi −2 (x, ωR ) for each i ≥ 3. In particular,
(
Depth(ωR ) = Depth(R) + 2, Depth(R) ≤ d − 2
Depth(ωR ) = d ,
Depth(R) ≥ d − 1.
(iii) The system of parameters x of R satisfies the Monomial Conjecture if and only if,
¡
¢
¡
¢
ℓ H2 (x, R)
ℓ ωR /aωR .
Definitely, this is equivalent to say that, ωR → ωR/a , is non-zero in the above exact sequence.
Proof. (i) and (ii): We have,
´
³ ¡
¢O
H1 (x1 , . . . , xd ; R) ∼
(A/y s A) .
= Hi K• x1 , . . . , xd ; A/(y 1 , . . . , y s−1 )
A
¡
¢N
¡
¢
′
This encouraged us to consider the spectral sequence, K• x; A/(y′ )
A K• y s ; A , where y denotes
y 1 , . . . , y s−1 . So we take into account the bicomplex Mp,q :=
¡ the ′truncated
¢N
¡ sequence
¢
Kp x; A/(y )
A Kq y s ; A in which here, as usual, p stands for the column p. Note that,
( ¡
¢
¡
¢
¡
¢
Hi Tot(M) ∼
i ≥ 2.
= Hi x, y s ; A/(y′ ) ∼
= Hi y s ; A/(x, y′ ) = 0,
¡
¢
¡
¢
¡
¢
(6)
′ ∼
′ ∼
∼
Hi Tot(M) = Hi x, y s ; A/(y ) = Hi y s ; A/(x, y ) = ωR/a , i = 1.
18
R EDUCTION
OF SOME HOMOLOGICAL CONJECTURES TO
...
Furthermore we have,
II 2
Ep,q
Hq (x; R),
p =0
µ ³¡
´¶
¢
= Hq x; (y′ ) : y s /(y′ ) = Hq (x; ωR ), p = 1
0,
p 6= 0, 1.
Now the desired exact sequence is just the five term exact sequence of this spectral sequence
(see, [50, Theorem 10.31 (Homology of Five-Term Exact Sequence)]).
For the second part note that according to the vanishings of (6) for i ≥ 2, all of the maps,
d 2 : Hi +2 (x; R) → Hi (x; ωR ), (i ≥ 1)
arising from the second page of the spectral sequence are isomorphisms.
¡
¢
(iii): By [13, 1.3. Proposition] our statement is equivalent to the assertion that ℓ H1 (x; R)
ℓ(R/a). Hence in the light of the exact sequence of the first part we are done once we can
show that,
³¡
´
¢
ℓ(R/a) = ℓ(ωR/a ) = ℓ (x, y′ ) : y s /(x, y′ ) .
But this is clear from the following exact sequence,
¡
¢
ys
0 → (x, y′ ) : y s /(x, y′ ) → R/(x, y′ ) → R/(x, y′ ) → R/a → 0.
In the following example we consider a subclass of almost complete intersections satisfying (5) and we show that they satisfy the Small Cohen-Macaulay Conjecture. The main idea
behind this observation is that this class of almost complete intersections are the same free
square root extensions R(a 1/2 ) of Remark 2.1. This is not the case for the more general setting
of Theorem 4.4. However, in Theorem 4.4, with aid of the multiplicity theory we will again
descend to a similar case of quadratic extensions.
Example 4.2. Suppose that R = (V, pV)[[X 2 , . . . , X d , Z 1 , Z 2 ]]/I, such that I = (g 1 −Z21 , g 2 −Z22 , g 3 −
Z 1 Z 2 ) wherein g 1 , g 2 , g 3 ∈ V[[X 2 , . . . , X d ]] are non-zero. Set, (A, n) := V[[X 2 , . . . , X d , Z 1 , Z 2 ]]. Presume that R is an almost complete intersection, i.e. ht(I) = 2. Note that,
p, x2 := X 2 + I, . . . , xd := X d + I,
forms a system of parameters for R satisfying (5). In this example we show that R has a maximal Cohen-Macaulay module. Setting,
S := V[[X 2 , . . . , X d , Z 1 ]]/(g 1 − Z21 ),
then S is a free extension of B := V[[X 2 , . . . , X d ]] wherein Z 1 is the square root of g 1 , i.e. S =
B(g 11/2 ). If g 1 has a square root in B then the polynomials g 1 −Z21 is reducible and therefore any
p ∈ assht(I) contains an element a ∈ n\n2 . In particular, then, p/aA is a height one prime ideal
of the regular local ring A/aA which implies that p is generated by two elements and thence
19
E HSAN TAVANFAR
A/p is a complete intersection and a maximal Cohen-Macaulay R-module. So without loss
of generality we can assume that g 1 does not have a square root in B and whence in Frac(B).
Consequently, S is a domain hypersurface by Remark 2.1(v). Next set,
T := V[[X 2 , . . . , X d , Z 1 , Z 2 ]]/(g 1 − Z21 , g 2 − Z22 ).
Therefore, T is the free extension of S wherein Z 2 is a square root of g 2 , i.e. T = S(g 21/2 ). In
particular, T is a domain if and only if g 2 does not have a square root Frac(S). But since our
almost complete intersection I is an ideal of height two generated by three elements so indeed
g 2 has a square root in Frac(S). Therefore by Remark 2.1(iv) there exists an induced map from T
to the integral closure S of S, denoted by Ψ. Since the kernel of this map is an associated prime
of the defining ideal of T so, as will be seen later, without loss of generality we can presume
that the kernel of Ψ contains the ideal, I, and thence we get an induced map R → S. Hence it is
enough to prove the statement for S (recall that S is finitely generated as S-module). Note that,
[Frac(S) : Frac(B)] = [Frac(S) : Frac(B)] = 2.
Here the residual characteristic of B is either two or p > 2. In the first case [41, Theorem 3.8.]
implies that R has a maximal Cohen-Macaulay module, while in the second case S is a CohenMacaulay ring in the light of [45]7 .
It remains to show that why we can assume that, I ⊆ ker Ψ. We claim that T has at most
two associated primes. In order to see why this is the case note that, in the light of [18, TheN
orem 1.], E S T is an injective T-module provided E is an injective S-module. In particular,
N
E(S) S T, is an injective T-module which contains T and thence contains ET (T). Therefore,
L
ET (T), as S-module, is an injective submodule of E(S) E(S). Since S is a domain so E(S) is an
indecomposable injective module. This observation shows that ET (T) has at most two direct
summands and, as an immediate consequence, T has at most two associated primes. Now
if α1 and α2 are distinct square roots of g 2 in Frac(S)8 then it is easily verified that the rules
(r, s) 7→ r + sαi , (1 ≤ i ≤ 2) define distinct ring homomorphisms, Ψi : T → S, with distinct
kernels, p1 , p2 ∈ Ass(T). Now the claim, easily, follows from the fact that T has at most two
associated primes.
Example 4.3. It is worth to give a concrete and explicit non-Cohen-Macaulay example of the
class of the rings of the previous example. We do this, but in the equal characteristic case,
where we can use the Macaulay2 system for computations. Set,
R = K[[Y1 , . . . , Y6 , Z 1 , Z 2 ]]/I,
such that,
I = (Y26 Y35 + Z22 , Y33 Y48 + Z21 , Y23 Y34 Y44 + Z 1 Z 2 ).
Then we have, Depth(R) = 4 and dim(R) = 6. In particular, Lemma 4.1 implies that ωR is, also,
a maximal Cohen-Macaulay R-module.
7
By an argument as in the proof of Theorem 4.4 we can deduce that S is necessarily Cohen-Macaulay regardless of the residual characteristic, because we have a quadratic extension. This fact is asserted in Theorem
4.5.
8
Recall that S has mixed characteristic and therefore Frac(S) has characteristic zero. So we have two distinct
roots.
20
R EDUCTION
OF SOME HOMOLOGICAL CONJECTURES TO
...
Theorem 4.4. Suppose that R is an almost complete intersection satisfying (5). Then R has a
b has a maximal Cohen-Macaulay module which is
big Cohen-Macaulay algebra. A fortiori, R
b
an R-algebra.
Proof. If R is a Cohen-Macaulay then there is nothing to prove, so assume that R is not
Cohen-Macaulay (and is complete). The multiplicity theory plays a pivotal role in the proof.
The same idea of the proof of Corollary 2.3 can be applied to impose the extra assumption
that x is a part of minimal
generating
set¡ of m9¢. Consider a minimal Cohen-presentation
¡
¢
R = A/I of R so embdim (A, n) = embdim (R, m) and I ⊆ n2 . Firstly, we have,
³ ¡
¡
¢
¢´
ℓ R/(x) = ℓ A/ (x) + I) = ℓ(A/I),
wherein the notation, , means modulo (x). But, I = n2 , as n2 ⊆ I + (x) and I ⊆ n2 simultaneously. It turns out that,
¡
¢
ℓ R/(x) = ℓ(A/n2 ) = embdim(A) + 1 = embdim(R) − dim(R) + 1.
We claim that, embdim(R) − dim(R) ≤ 2, but before proving this claim let us conclude
the
¡
¢
statement from it. The above inequality in conjunction with our claim implies that ℓ R/(x) ≤
3. Now, in the light of [51, Theorem 1, page. 57] together with [51, Corollary , page 90] we
can deduce a very strong implication that e(x, R) ≤ 3. But if e(x, R) = 3 then R is CohenMacaulay by [25, (1.5) Proposition]. Thus we have even stronger condition that e(x, R) ≤ 2.
In the case where e(x, R) = 1 using [25, (1.10.1)] and [25, (6.8) Theorem] there exists a prime
ideal p ∈ Assht(R) such that R/p is regular, hence is s a maximal Cohen-Macaulay R-module.
It remains to deal with the case where e(x, R) = 2. In this case by a similar argument as above
without loss of generality we can assume that there exists p ∈ Assht(R) for which R/p satisfies
e(x, R/p) = 2. There exists a regular local subring B of R/p, containing a coefficient field (in
the mixed characteristic case, containing a complete discrete valuation ring whose maximal
ideal is generated by the element p 1/2 of R/p and with the same residue field of R), wherein
x forms a minimal basis for its maximal ideal and R/p is module finite over B. Therefore,
[Frac(R/p) : Frac(B)] = 2, in the light of [25, (6.5) Corollary]. Let S be the integral closure
of B in Frac(R/p). Since B is a complete local ring so by [39, Theorem 4.3.4] S is finitely
generated over B. Moreover, by virtue of, [36] the inclusion B → S splits10. Consequently, we
L
may assume that S = B I for some finitely generated B-module I. Since we have quadratic
extension of fraction fields so we can deduce that I has rank 1. In particular, we may presume
that, I is an ideal of B (since S is a domain so I is torsion-free). Using the S 2 -property of R for
each prime ideal p of B we conclude that Ip ∼
= Bp provided Depth(Bp ) = dim(Bp ) ≤ 1 and
Depth(Ip ) ≥ 2 provided Depth(Bp ) = dim(Bp ) ≥ 2. Consequently, I is a reflexive ideal of B in
the light of [10, Proposition 1.4.1]. Now the result follows from the fact that reflexive ideals of
unique factorization domains are principal.
9
Here it is important to point out that the extensions used in the proof of Corollary 2.3 preserves the condition (5) as well as the almost complete intersection property.
10
Hence, the Monomial Conjecture for the system or parameters x of R follows from [36].
21
E HSAN TAVANFAR
Now we are going to prove the above claim, i.e., embdim(R)−dim(R) ≤ 2. Let us use a presentation p 1/2 , X 2 , . . . , X d for the sequence x in R where R = (V, p 1/2 )[[X 2 , . . . , X d , Z 1 , . . . , Z u ]]/I11
is a homomorphic image of the regular local ring (A, n) = (V, p 1/2 )[[X 2 , . . . , X d , Z 1 , . . . , Z u ]]. So,
n2 ⊆ (p 1/2 , Y2 , . . . , Yd ) + I. Set, I = ( f 1 , . . . , f l ) where l = µ(I). We denote by f iX the sum of those
monomials of f i whose power of X i is non-zero for some 2 ≤ i ≤ d . Subsequently, we set,
p 1/2
fi
, to be the sum of those monomials of f i − f iX whose coefficients are multiple of p 1/2 . It
p 1/2
follows that, f iZ := f i − f iX − f i
∈ V[[Z 1 , . . . , Z u ]], and that the coefficients of the monomials
Z
of f i are all invertible. Now, set ≥3fiZ (resp., ≤2fiZ ) to be the sum of the monomials of f iZ of
total degree greater than or equal to 3 (resp., less than or equal to 2). Since, I ⊆ n2 , so it turns
out that, ≤2fiZ , is an V-linear combination of the elements of the form {Z i Z i : 1 ≤ i , j ≤ u}
with invertible coefficients in V. Otherwise, ≤2fiZ and thence f i , would have a summand of
the form kZαj where, α ∈ {0, 1}, 1 ≤ j ≤ u and k ∈ V\p 1/2 V. But this contradicts with f i ∈ n2 . In
particular, ≤2fiZ ∈ (Z 1 , . . . , Z u )2 .
On the other hand the fact that, Z i Z j ∈ (p 1/2 , X 2 , . . . , X d ) + ( f 1 , . . . , f l ) yields,
Z k Z s = g 1 p 1/2 +
d
X
i =2
g i Xi +
l
X
i =1
hi
≥3 Z
fi +
l
X
i =1
hi
≤2 Z
fi ,
for each 1 ≤ k, s ≤ u and power series h i , g i . Thus an elementary, quite easy, computation
shows that (Z 1 , . . . , Z u )2 ⊆ ( ≤2f1Z , . . . , ≤2flZ ). This in conjunction with the concluding assertion
of the preceding paragraph yields (Z 1 , . . . , Z u )2 = ( ≤2f1Z , . . . , ≤2flZ ).
Since R is an almost complete intersection, so we have, l = µ(I) = ht(I) + 1 = dim(A) −
dim(R) + 1 = u + 1. Consequently, we get,
³X
´
l
¡
¢
u +1 = l ≥ µ
( ≤2fiZ )V[[X 2 , . . . , X d , Z 1 , . . . , Z u ]] = µ (Z 1 , . . . , Z u )2 = u(u + 1)/2,
i =1
i.e. u ≤ 2.
The proof of the above theorem implies also the following result which is worth stating it
separately as a theorem. Recall that by [45] the integral closure of a regular local ring A in a
finite Galois extension L of K := Frac(A) with Abelian Galois group GalL/K is Cohen-Macaulay
provided the order of GalL/K is not divisible by the characteristic of the residue field of A. In
view of the following theorem for the quadratic extension case there is no restriction on the
characteristic of the residue field, provided A is a complete regular local ring.
Theorem 4.5. Suppose that A is a complete regular local ring and L is a quadratic field extension of Frac(A). Then the integral closure of A in L is Cohen-Macaulay.
11
We choose a presentation of A in the mixed characteristic, because the Monomial Conjecture is open in the
mixed characteristic. But the proof is characteristic free and someone can use presentation of A in equicharacteristic zero. Furthermore, we write p 1/2 instead of p, because we applied our square root technique, developed
in the proof of Corollary 2.3, to have the extra assumption that x1 , . . . , xd is a part of a minimal generating set of
m.
22
R EDUCTION
OF SOME HOMOLOGICAL CONJECTURES TO
...
Remark 4.6. In this remark we will state some nice properties as well as several questions
about the class of rings of Theorem 4.4. So we are in the case of the Theorem 4.4 with an
extra assumption that the system of parameters x of (5) is a part of a minimal basis of m
whence embdim(R) − dim(R) ≤ 2.
(i) All of the examples of such almost complete intersections that we have computed in
Macaulay2 system had Depth ≥ d − 2. So we guess Depth(R) ≥ d − 2 whence ωR is a
maximal Cohen-Macaulay module by Lemma 4.1 (ii). This observation leads us to the
following question.
Question 4.7. Suppose that U is an almost complete intersection. Then do we have,
Depth(U) ≥ dim(U) − e(U)?
(7)
Question 4.7 is certainly true in dimension ≤ 1. But even in dimension two we need to
use the validity of the Monomial Conjecture for the confirmation of the inequality (7).
Namely, in dimension two we only need to show that if Depth(U) = 0 then e(U) ≥ 2.
But if Depth(U) = 0 then we have H2 (y, U) 6= 0, wherein y is a system of parameters for
U. Hence,
¡
¢ ¡
¢ ¡
¢
e(U) = ℓ U/(y) − ℓ H1 (y, U) + ℓ H2 (y, U) ≥ 2,
¡
¢ ¡
¢
as the validity of the Monomial Conjecture implies that, ℓ U/(y) − ℓ H1 (y, U)
0 by
[13, 1.3. Proposition].
For another case where inequality (7) holds, consider an almost complete intersection
ideal a of an equicharacteristic complete regular local ring A with infinite residue field
such that Assh(A/a) = {p/a}. Set, U := A/a. Suppose, furthermore, that dim(U) = 3
and S := A/p is an integrally closed domain12. If the inequality (7) fails for U then we
must have Depth(U) = 0 and e(U) ≤ 2. It is easily seen that ωU = ωS . On the other
hand, Lemma 4.1(ii) implies that Depth(ωU ) = 2 and thence ωU = ωS is not a maximal
Cohen-Macaulay module. In particular, S is not a Cohen-Macaulay ring. By [25, (4.15)
Remark.] there exists a system of parameters x of U such that e(x, U) = 2. Since we
are in the equicharacteristic case so there exists a complete regular local subring B of
S with the same residue field as S such that x forms a minimal basis of the maximal
ideal of B. Consequently, in view of [25, (1.10.1.)], e(x, S) ≤ 2. If e(x, S) = 1 then [25, (6.8)
Theorem] implies that S is regular, a contradiction. On the other hand if e(x, S) = 2,
then [25, (6.5) Corollary] implies that [Frac(S) : Frac(B)] = 2. Now S is Cohen-Macaulay
by Theorem 4.5, again, a contradiction.
Note that the inequality (7) does not hold if we relax the almost complete intersection
condition. More precisely, taking into account the Abhyankar’s local domains [1, (3)],
we can construct local domains with multiplicity two and depth 1 of arbitrary dimension.
12
In each prime ideal q of A we can find an almost complete intersection ideal a ⊆ q such that Assh(A/a) =
{q/a} (see, the proof of [13, 1.2 Proposition]). So, indeed, there exists concrete examples of such almost complete intersections.
23
E HSAN TAVANFAR
(ii) In view of [13, 1.3. Proposition] the Monomial Conjecture for the system of parameters
x := p 1/2 , X 2 , . . . , X d of R is equivalent to the assertion that,
¡
¢
¡
¢
¡
¢
ℓ H1 (x, R)
ℓ R/(x) = ℓ K[[Z 1 , Z 2 ]]/(Z21 , Z22 , Z 1 Z 2 ) = 3.
On the other hand in the light of Lemma 4.1(i) the Monomial Conjecture holds for x if
and only if H1 (x, R) is a quotient of (Z 1 , Z 2 )/(Z21 , Z22 ) by a non-zero submodule. It is easily seen that this is equivalent to the assertion that mH1 (x, R) = 0. Accordingly, in the
light
4.4.], there exists a complex, denoted by, 0 Z •+ (x, Z 1 ), such that
¡ of+[22, Theorem
¢
H0 0 Z • (x, Z 1 ) = R/m and H1 (0 Z •+ (x, Z 1 )) = 0 if and only if the Monomial Conjecture
holds for R. Consequently, using Theorem
¡ +4.4, we¢ have H1 (x, R) is a non-zero at most
two dimensional vector space and H1 0 Z • (x, Z 1 ) = 0. Here it is noteworthy to mention that, we strongly, guess more, i.e. Z •+ (x, Z 1 ) is an acyclic finite complex consisting
of Koszul cycles of x1 , . . . , xd , Z 1 which resolves the residue field of R (This is equivalent
to say that mHi (x, R) = 0 for each i ≥ 1).
(iii) We claim that the parameter ideal a = (p 1/2 , x2 , . . . , xd ) of R is a Lech ideal in the sense
that a/a2 is a free R/a-module. Before proving, we wish to clear why this claim sounds
interesting to us. This fact in conjunction with the exact sequence in the paragraph
prior to [11, Proposition 2.6] shows that H1 (x, R) ∼
= δ1 (a) wherein,
\
¡
¢
¡
¢
δ1 (a) = Z1 (x, R) (aRd ) /B1 (x, R) ∼
= ker sym2 (a) → a2 ,
by [26, Corollary 2.6.]. So [2, XV., Proposition 12] implies that H1 (x, R) is the second
André-Quillen homology D2(R, R/a, R/a). Hence, in view of the preceding part, it would
be highly desirable to give a proof of the validity of the Monomial Conjecture for the
sequence x of R with aid of the André-Quillen homology avoiding, [36]. The fact that a
is Lech ideal follows from the following two steps.
Step 1: Bearing in mind the notations of the proof of Theorem 4.4, this step is devoted
to prove that, without loss of generality, we can assume that f 1Z = Z21 , f 2Z = Z22 and f 3Z =
Z 1 Z 2 . Recall that R is a homomorphic image of (A, n) = (V, p 1/2 V)[[X 2 , . . . , X d , Z 1 , Z 2 ]], by
the ideal ( f 1 , f 2 , f 3 ). As we have seen in the proof of Theorem 4.4, ( f 1Z , . . . , f 3Z ) ⊆ (Z 1 , Z 2 )2 .
d
3
P
P
On the other hand, by our hypothesis, Z i Z j =
X k g k + p 1/2 h +
f kZ l k , for some,
k=2
k=1
g 2 , . . . , g d , h, l 1 , l 2 , l 3 ∈ A.
We use a similar method as in the case of f i and write h = h X +h Z,p
for each 1 ≤ s ≤ 3, so that h Z,p
Z i Z j − p 1/2 h Z,p
1/2
1/2
−
Z,p 1/2
, l1
3
X
k=1
which implies that,
Z i Z j = p 1/2 h Z,p
Z,p 1/2
, . . . , l3
Z,p 1/2
lk
1/2
+
3
X
k=1
f kZ =
Z,p 1/2
and l s = l sX +l s
∈ V[[Z 1 , Z 2 ]]. Therefore,
d
X
k=2
Z,p 1/2
lk
1/2
X k g k + p 1/2 h X +
3
X
k=1
f kZ ∈ ( f 1Z , f 2Z , f 3Z , p 1/2 ).
f kZ l kX ,
24
R EDUCTION
OF SOME HOMOLOGICAL CONJECTURES TO
...
Set, B := A/p 1/2 = k[[X 2 , . . . , X d , Z 1 , Z u ]] where k is the residue field of V. By the above
argument we have ( f 1Z , f 2Z , f 3Z ) = (Z 1 , Z 2 )2 in B. Thus there exists a square matrix H =
[h st ] such that H[ f 1Z , f 2Z , f 3Z ]τ = [Z21 , Z22 , Z 1 Z 2 ]τ , in B. Let us to denote the maximal ideal
of B by nB . In particular, H := [h st ], is the change of basis matrix with respect to the two
basis { f 1Z , f 2Z , f 3Z } and {Z21 , Z22 , Z 1 Z 2 } of the K-vector space (Z 1 , Z 2 )2 /nB (Z 1 , Z 2 )2 . Whence,
det(H) 6= 0, in K. Let Y = [y i j ] be a square matrix which lifts the matrix H. Then det(Y) ∉
n. So Y is invertible. Hence, if we put, Y[ f 1 , f 2 , f 3 ]τ = [ f 1′ , f 2′ , f 3′ ]τ , then I = ( f 1′ , f 2′ , f 3′ ).
Moreover for each 1 ≤ i ≤ 3 we have the identity,
f i′ =
3
X
j =1
y i j f jX +
3
X
j =1
p 1/2
yi j f j
+
3
X
j =1
y i j f jZ .
(8)
On the other hand, since H[ f 1Z , f 2Z , f 3Z ]τ = [Z21 , Z22 , Z 1 Z 2 ] in B, so we get
3
X
j =1
y 1j f jZ ≡ Z21 ,
3
X
j =1
y 2j f jZ ≡ Z22 and
3
X
j =1
y 3j f jZ ≡ Z 1 Z 2 , mod p 1/2 A.
(9)
So our claim follows from (8) and (9).
Step 2: In this step we assume that
d
P
i =1
r i xi = 0 ∈ R and we prove that,
r i ∈ a = (p 1/2 , x2 , . . . , xd ),
for each 1 ≤ i ≤ d (x1 = p 1/2 )13 . If so, then there are s 1 , . . . , s d ∈ (A, n) such that,
d
X
(r i + s i )X i = Z21 h 1 + Z22 h 2 + Z 1 Z 2 h 3 ,
(10)
i =1
because f 1Z = Z21 , f 2Z = Z22 , and f 3Z = Z 1 Z 2 . Clearly, we must have, h i ∈ n, for each 1 ≤
p 1/2
i ≤ 3. Hence, s i ∈ n2 , for every 1 ≤ i ≤ d , because f jX + f j
other hand, (10) shows that,
d
P
i =1
∈ n2 (1 ≤ j ≤ 3). On the
(r i + s i )X i + (Z21 , Z22 , Z 1 Z 2 ) = 0 in the Cohen-Macaulay
ring A/(Z21 , Z22 , Z 1 Z 2 ) whence r i + s i ∈ (X 1 , . . . , X d , Z21 , Z22 , Z 1 Z 2 ), for each 1 ≤ i ≤ d . Consequently,
r i ∈ (X 1 , . . . , X d , Z21 , Z22 , Z 1 Z 2 ) = (X 1 , . . . , X d , f 1 , f 2 , f 3 ),
for each 1 ≤ i ≤ d , because s i ∈ n2 .
Example 4.8. We give an example to show that, in general, the inclusion m2 ⊆ (x) in conjunction with the non-Cohen-Macaulayness does not imply that e(x, R) = 2 (without assuming that
R is an almost complete intersection). Set,
R = Q[X 1 , . . . , X 4 , Z 1 , Z 2 , Z 3 ],
13
This, immediately, shows that a is a Lech ideal.
25
E HSAN TAVANFAR
wherein X 1 , X 2 , X 3 have degree 1 and X 4 , Z 1 , Z 2 , Z 3 have degree 2. Let,
I := (Z21 + X 23 Z 2 + X 4 Z 2 , Z22 − X 1 X 2 Z 3 + X 4 Z 3 , Z23 , Z 1 Z 2 , Z 1 Z 3 , Z 2 Z 3 ).
Then, in S = R/I the image of the sequence x := X 1 , X 2 , X 3 , X 4 forms a system of parameters
satisfying (5) while e(x, R) = 3. Note that Depth(R) = 3 and R is not Cohen-Macaulay.
5 A question
We end the paper with the following question.
Question 5.1. In prime characteristic, Hdm (R) = lim R/(xn ), is a cyclic module over the Frobe−→
n∈N
nius Skew Polynomial ring R[x; f ], which is generated by [1/(x)]. This shows, in particular,
that, [1/(x)] 6= 0, by the Grothendieck’s non-vanishing theorem, i.e. the Monomial Conjecture
holds. In characteristic zero also the Frobenius-like endomorphism exists in a faithfully flat
extension with aid of the Schoutens’s Lefschetz extensions (see, [5]). Hence probably the same
strategy works in the equal characteristic zero. Here it seems to be natural to ask whether in
the mixed characteristic there exists an R-algebra S such that Hdm (R) is a cyclic S-module generated by [1/(x)]? It is worth to point out that if this question has an affirmative answer then
S is necessarily a non-commutative ring. To be more precise suppose that there exists such
an R-algebra S, but to the contrary S is commutative. Then since Hdm (R) is a cyclic S-module
by our assumption so Hdm (R) carries a commutative R-algebra structure. In particular there
N d
Hdm (R) induced by the multiplication. But on the
exists a surjective map Hdm (R) R H
m (R) →
¢
¡
N
other hand Hdm (R) R Hdm (R) ∼
= Hdm Hdm (R) = 0 which contradicts with the Grothendieck’s nonvanishing theorem (here, we assume that d > 0).
Acknowledgement
We would like to express our deepest gratitude to Massoud Tousi, Anurag K. Singh, Linquan
Ma, S. H. Hassanzadeh as well as Kazuma Shimomoto for their helpful comments and valuable suggestions. We also would like to thank the University of Utah for its hospitality during
our visit in the academic year 2015-2016 as well as for its support for this research.
References
[1] S. S. Abhyankar, Local rings of high embedding dimension, Amer. J. Math. 89 (1967), 1073–1077.
[2] M. André, Homologie des algèbres commutatives, Springer-Verlag, Berlin-New York, 1974. Die Grundlehren
der mathematischen Wissenschaften, Band 206.
[3] Y. Aoyama, Some basic results on canonical modules, J. Math. Kyoto Univ. 23 (1983), no. 1, 85–94.
[4] Y. Aoyama and S. Goto, On the endomorphism ring of the canonical module, J. Math. Kyoto Univ. 25 (1985),
no. 1, 21–30.
26
R EDUCTION
OF SOME HOMOLOGICAL CONJECTURES TO
...
[5] M. Aschenbrenner and H. Schoutens, Lefschetz extensions, tight closure and big Cohen-Macaulay algebras,
Israel J. Math. 161 (2007), 221–310.
[6] A. Bagheri, M. Salimi, E. Tavasoli and S. Yassemi, A construction of quasi-Gorenstein rings, J. Algebra Appl.,
11, (2012), no. 1, 9 pages.
[7] M. -J. Bertin, Anneaux d’invariants d’anneaux de polynomes, en caractéristique p, C. R. Acad. Sci. Paris Sér.
A-B 264 (1967), A653–A656.
[8] R. Bhattacharyya, Existence of almost Cohen-Macaulay algebras implies the existence of big CohenMacaulay algebras., J. Algebra 457 (2016), 1–6.
[9] M. P. Brodmann and R. Y. Sharp, Local cohomology, Second, Cambridge Studies in Advanced Mathematics,
vol. 136, Cambridge University Press, Cambridge, 2013. An algebraic introduction with geometric applications.
[10] W. Bruns and J. Herzog, Cohen-Macaulay rings, Cambridge Studies in Advanced Mathematics, vol. 39,
Cambridge University Press, Cambridge, 1993.
[11] A. Corso, C. Huneke, D. Katz and W. V. Vasconcelos, Integral closure of ideals and annihilators of homology.,
Boca Raton, FL: Chapman & Hall/CRC, 2006.
[12] S.P. Dutta, On the canonical element conjecture, Trans. Amer. Math. Soc. 299 (1987), no. 2, 803–811.
[13]
, The monomial conjecture and order ideals, J. Algebra 383 (2013), 232–241.
[14]
, The monomial conjecture and order ideals II, J. Algebra 454 (2016), 123–138.
[15] S.P. Dutta and P. Griffith, Intersection multiplicity, canonical element conjecture and the syzygy problem.,
Mich. Math. J. 57 (2008), 227–247.
[16] E. G. Evans and P. Griffith, The syzygy problem, Ann. of Math. (2) 114 (1981), no. 2, 323–333.
[17] R. Fossum, H. -B. Foxby, P. Griffith and I. Reiten, Minimal injective resolutions with applications to dualizing modules and Gorenstein modules., Publ. Math., Inst. Hautes Étud. Sci. 45 (1975), 193–215.
[18] H. -B. Foxby, Injective modules under flat base change., Proc. Am. Math. Soc. 50 (1975), 23–27.
[19] S. Goto, A note on quasi-Buchsbaum rings, Proc. Amer. Math. Soc. 90 (1984), no. 4, 511–516.
[20]
, On the associated graded rings of parameter ideals in Buchsbaum rings, J. Algebra 85 (1983), no. 2,
490–534.
[21] R. Hartshorne and A. Ogus, On the factoriality of local rings of small embedding codimension, Comm.
Algebra 1 (1974), 415–437.
[22] S. H. Hassanzade and J. Naéliton, Residual Intersections and the Annihilator of Koszul Homologies, Algebra
Number Theory 10 (2016), no. 4, 737–770.
[23] R. C. Heitmann, Characterization of completions of unique factorization domains, Trans. Amer. Math. Soc.
337 (1993), no. 1, 379–387.
[24]
, The direct summand conjecture in dimension three, Ann. of Math. (2) 156 (2002), no. 2, 695–712.
[25] M. Herrmann, S. Ikeda and U. Orbanz, Equimultiplicity and blowing up, Springer-Verlag, Berlin, 1988. An
algebraic study, With an appendix by B. Moonen.
[26] J. Herzog, A. Simis and W. V. Vasconcelos, Koszul homology and blowing-up rings, Commutative algebra
(Trento, 1981), pp. 79–169.
[27] M. Hochster, Big Cohen-Macaulay algebras in dimension three via Heitmann’s theorem, J. Algebra 254
(2002), no. 2, 395–408.
[28]
, Canonical elements in local cohomology modules and the direct summand conjecture, J. Algebra 84
(1983), no. 2, 503–553.
E HSAN TAVANFAR
[29]
, Contracted ideals from integral extensions of regular rings, Nagoya Math. J. 51 (1973), 25–43.
[30]
, Criteria for equality of ordinary and symbolic powers of primes, Math. Z. 133 (1973), 53–65.
[31]
27
, Properties of Noetherian rings stable under general grade reduction., Arch. Math. 24 (1973), 393–
396.
[32]
, The equicharacteristic case of some homological conjectures on local rings, Bull. Amer. Math. Soc.
80 (1974), 683–686.
[33] M. Hochster and C. Huneke, Applications of the existence of big Cohen-Macaulay algebras, Adv. Math. 113
(1995), no. 1, 45–117.
[34]
, Indecomposable canonical modules and connectedness, Contemp. Math., vol. 159, Amer. Math.
Soc., Providence, RI, 1994.
[35]
, Infinite integral extensions and big Cohen-Macaulay algebras, Ann. of Math. (2) 135 (1992), no. 1,
53–89.
[36] M. Hochster and J. E. McLaughlin, Splitting theorems for quadratic ring extensions, Illinois J. Math. 27
(1983), no. 1, 94–103.
[37] C. Huneke, Almost complete intersections and factorial rings, J. Algebra 71 (1981), no. 1, 179–188.
[38]
, On the symmetric and Rees algebra of an ideal generated by a d-sequence., J. Algebra 62 (1980),
268–275.
[39] C. Huneke and I. Swanson, Integral closure of ideals, rings, and modules. (2006), xiv + 431.
[40] C. Huneke and B. Ulrich, Divisor class groups and deformations, Amer. J. Math. 107 (1985), no. 6, 1265–1303
(1986).
[41] D. Katz, On the existence of maximal Cohen-Macaulay modules over pth root extensions, Proc. Amer. Math.
Soc. 127 (1999), no. 9, 2601–2609.
[42] J. Lipman, Unique factorization in complete local rings, Algebraic geometry (Proc. Sympos. Pure Math.,
Vol. 29, Humboldt State Univ., Arcata, Calif., 1974), 1975, pp. 531–546.
[43] T. Ochiai and K. Shimomoto, Bertini theorem for normality on local rings in mixed characteristic (applications to characteristic ideals)., Nagoya Math. J. 218 (2015), 125–173.
[44] C. Peskine and L. Szpiro, Dimension projective finie et cohomologie locale. Applications à la démonstration
de conjectures de M. Auslander, H. Bass et A. Grothendieck, Inst. Hautes Études Sci. Publ. Math. 42 (1973),
47–119.
[45] P. C. Roberts, Abelian extensions of regular local rings, Proc. Amer. Math. Soc. 78 (1980), no. 3, 307–310.
[46]
, Fontaine rings and local cohomology, J. Algebra 323 (2010), no. 8, 2257–2269.
[47]
, Le théorème d’intersection, C. R. Acad. Sci. Paris Sér. I Math. 304 (1987), no. 7, 177–180.
[48]
, Local cohomology of Segre product type rings, J. Pure Appl. Algebra 219 (2015), no. 3, 652–665.
[49] P. C. Roberts, A. K. Singh and V. Srinivas, Annihilators of local cohomology in characteristic zero, Illinois J.
Math. 51 (2007), no. 1, 237–254 (electronic).
[50] J. J. Rotman, An introduction to homological algebra, Second, Universitext, Springer, New York, 2009.
[51] J. -P. Serre, Local algebra, Springer Monographs in Mathematics, Springer-Verlag, Berlin, 2000. Translated
from the French by CheeWhye Chin and revised by the author.
[52] K. Shimomoto, An application of the almost purity theorem to the homological conjectures, J. Pure Appl.
Algebra 220 (2016), no. 2, 621–632.
[53] J. R. Strooker and J. Stückrad, Monomial conjecture and complete intersections., Manuscr. Math. 79 (1993),
no. 2, 153–159.
28
R EDUCTION
OF SOME HOMOLOGICAL CONJECTURES TO
...
[54] E. Tavanfar and M. Tousi, A Study of Quasi-Gorenstein Rings, arXiv:1508.04597 [math.AC].
[55] B. Ulrich, Gorenstein rings as specializations of unique factorization domains, J. Algebra 86 (1984), no. 1,
129–140.
E HSAN TAVNAFAR , D EPARTMENT OF M ATHEMATICS , S HAHID B EHESHTI U NIVERSITY, G.C., T EHRAN ,
I RAN .
E-mail address: [email protected]
| 0math.AC
|
Fair comparison of skin detection approaches on publicly available datasets
Alessandra Luminia and Loris Nannib
a.
b
DISI, Università di Bologna, Via Sacchi 3, 47521 Cesena, Italy.
DEI - University of Padova, Via Gradenigo, 6 - 35131- Padova, Italy.
Abstract
Skin detection is the process of discriminating skin and non-skin regions in a digital image and it is widely used in several applications
ranging from hand gesture analysis to tracking body parts and face detection. Skin detection is a challenging problem which has drawn
extensive attention from the research community, nevertheless a fair comparison among approaches is very difficult due to the lack of a
common benchmark and a unified testing protocol. In this work, we investigate the most recent research in this field and we propose a
fair comparison among approaches using several different datasets.
The major contributions of this work is a framework to evaluate and combine different skin detector approaches, whose source code
will be made freely available for future research, and an extensive experimental comparison among several recent methods which have
also been used to define an ensemble that works well in many different problems.
Experiments are carried out in 10 different datasets including more than 10000 labelled images: experimental results confirm that the
ensemble here proposed obtains a very good performance with respect to other stand-alone approaches, without requiring ad hoc
parameter tuning.
A MATLAB version of the framework for testing and ensemble proposed in this paper will be freely available from
(https://www.dei.unipd.it/node/2357 + Pattern Recognition and Ensemble Classifiers).
Keywords: skin classification, skin detection, skin segmentation, skin database.
1. Introduction
Skin texture and color are important signs that people use to understand variety of culture-related aspects about each other, as: health,
ethnicity, age, beauty, wealth and so on. The presence of skin color in images and videos is a signal of the presence of humans in such
media. Therefore in the last two decades extensive research has focused on skin detection in video and images. Skin detection is the
process of discriminating skin and non-skin regions in a digital image and consists in performing a binary classification of pixels between
the classes “skin”/ “not skin” and in executing a fine segmentation to define the boundaries of the skin regions.
Skin detection is used within many application domains: it is used as a preliminary step for face detection and tracking [1], body
tracking [2], hand gesture recognition, biometric authentication (i.e. palm print recognition) [3], objectionable content filtering [4],
medical imaging.
A useful feature for the discrimination of skin and non-skin pixels is the pixel color; nevertheless, obtaining skin color consistency
across variations in illumination, diverse ethnicity and different acquisition devices is a very challenging task. Moreover, skin detection
when used as preliminary step of other applications is required to be computationally efficient, invariant against geometrics
transformations, partial occlusions or changes of posture/facial expression, insensitive to complex or pseudo-skin background, robust
against the quality of the acquisition device. The factor that worst influence skin detection is color constancy problem [5]: i.e. the
dependency of pixel intensity on both reflection and illumination which have a nonlinear and unpredictable behavior. To be effective
when the illumination conditions vary rapidly some skin detection approaches use image preprocessing strategies based on color
constancy (i.e. a color correction method based on an estimate of the illuminant color) and/or dynamic adaptation techniques (i.e. the
transformation of a skin-color model according to the changing illumination conditions). Static skin color approaches that rely on image
preprocessing can only partially solve this problem and their performance strongly degrades in real-world application. A feasible solution
consists in considering additional data acquired out the visual spectrum (i.e. infrared images [6] or spectral imaging [7]), however the use
of such sensors is not appropriate for all applications and requires higher acquisition costs which limit their use to specific problems.
Skin detection is a challenging problem and has been extensive studied from the research community. Despite the large number of
methods, there are only few surveys in this topic: the works in [8][9] are quite old and cover only the methods proposed before 2005, the
survey in [10][11] are more recent and contain a good investigation of methods, benchmarking datasets and performance related to a
period of about two decades. The aim of the present work is not limited to survey the most recent research in this field (which is now
enriched of methods based on deep learning [12][13][14]), but also, and above all, to propose a framework for a fair comparison among
approaches.
In this research, a novel framework is proposed that integrates different skin color classification approaches and compare their
performance and their combination on several publicly available datasets. The major contributions of this research work is:
A framework to evaluate and combine different skin detector approaches is presented. The source code of the framework and many
of the tested methods will be made freely available for future research and comparisons. The system can be tuned according to the
target application: on the basis of the application requirement, the acceptance threshold can be tuned to prune a large percentage of
false accepts at a small cost of reduction in genuine accepts or vice versa a larger number of false accepts can be admitted to maximize
the number of genuine accepts. The framework include training and testing protocols for most used benchmark datasets in this field.
A fair comparison among the most recent research and methods in the skin detection field is carried out, using the same testing
protocols, benchmark datasets and performance indicators. A discussion about performance can help researchers and practitioners in
evaluating the approaches most suited to their requirements according to computational complexity, memory requirements, detection
rate and sensitivity.
The arrangement of this paper is as follows. In section 2 related works in skin detection are presented, including a discussion about
taxonomy of existing approaches and a detailed description of the approaches tested in this work. In section 3 the evaluation problem is
treated, the most known datasets used for performance evaluation are listed and commented, testing protocols and performance indicators
used in our experiment are discussed. In section 4 the experiments conducted using the proposed framework are reported and discussed.
Finally, section 5 includes the conclusions and some future research directions.
2. Skin detection approaches
Several skin detection methods are based on the assumption that skin color can be recognized from background colors according to
some clustering rule in a specific color space. Even if this assumption can be valid in a constrained environment where both ethnicity of
the people and background colors are known, it is a very challenging task in complex images captured under unconstrained conditions
and when individuals show a large spectrum of human skin coloration [9]. There are a lot of challenging factors that influence the
performance of a skin detector:
Human characteristics as ethnicity and age: skin color ranges from white to dark brown among human racial groups, the transition
from fresh skin to dry skin related to the age determines a strong variation of tones.
Acquisition conditions: factors such as camera characteristics or illumination variations strongly influence the skin appearance.
Generally, a variation in the illumination level or in the light source distribution determines the presence of shadows and changes in
the color of the skin.
Skin painting: the presence of makeup or tattoo coverage affects the appearance of skin.
Complex background: sometimes the skin detector can be deceived by the presence of objects that have skin-like color in the
background.
Skin detection approaches can be classified according to several taxonomy schemes which evaluates different aspects of the methods:
1. considering the presence or not of preprocessing steps such as color correction and illumination cancelation [15] or dynamic adaptation
[16] designed to reduce the effects of different acquisition conditions;
2. considering the color space used for pixel classification [9]. Most of research papers dealing with the skin detection have to face the
problem of selecting the most appropriate skin color model. The performance of several different color models are compared in [9]:
basic models (i.e. RGB, normalized RGB), perceptual models (i.e. HIS, HSV) perceptual uniform models (i.e. CIE-Lab, CIE-Luv) and
orthogonal models (i.e. YCbCr, YIQ) with the finding that orthogonal model are characterized by a reduced redundancy/correlation
among channels, therefore they are the most suited for skin detection.
3. examining the problem formulation, which can be based on the segmentation of an image in the regions where human skin is present
(segmentation based approaches) or on treating each pixel as skin or non-skin without considering its neighbors (pixel-based
approaches). Despite the presence of a huge number of pixel-based approaches [9], the region-based skin color detection techniques
are very few [17][18][19][20]. Some recent methods [13][14] based on convolutional neural network can be included in this category.
4. distinguish among methods for performing pixel classification (i.e. explicitly defined skin region, parametric approaches, nonparametric approaches) [21]. The first category, also named rule based, defines explicit rules to define the skin color (in an opportune
color space), The other categories includes machine learning approaches that makes use non-parametric or parametric approaches to
estimate the color distribution from a training set (returning a lookup table or a parametric model, respectively).
5. considering the type of classifier used for machine learning approaches: in [11] a taxonomy of 8 not exclusive groups is proposed
which extends the simple division in parametric and non-parametric approaches. Statistical methods includes parametric methods
based on Bayesian rule o Mixture models [22], neural networks models [23][24] are used for the segmentation of color images based
on both color and texture information, diffusion based methods [25][26] extends analysis on neighboring pixels to improve the
classification performance: after an initial pixel based extraction a seed growing method is applied to include neighborhood in the skin
region. Adaptive methods [27] are based on the tuning of models in order to adapt to specific conditions (i.e. lighting, skin tone,
background); the model calibration often grants performance advantages, but at the cost of increased computation time. Hyperspectral
models [28] are based on acquisition devices with hyperspectral capabilities: despite the advantage due to the presence of spectral
information, these approaches will be not considered in this work since they are only applicable to specifically collected datasets. SVM
based systems are parametric models based on SVM classifier: this class also overlaps adaptive methods if the SVM classifier is trained
using active learning [29]. The last class includes the mixture techniques which are the mixture of different methods [30][31].
In the last few years the research in skin detection has taken two main directions, according to the following consideration: even if in
the most general applications nothing should be assumed about the background and the acquisition conditions, in many applications the
difference between skin and background is large, the acquisition conditions are controlled and the skin region is quite easy to detect. For
example, in many gesture recognition applications the hand images are acquired using flatbed scanners and have dark unsaturated
backgrounds [32]. For this reason, in addition to many approaches that adopt sophisticated and computationally expensive techniques,
several simple rule-based methods have been proposed, which are preferred in some applications since they are easier to understand,
implement and reuse, more efficient, while at the same time, adequately effective. Usually simple rule-based methods are not even tested
on benchmarks for pure skin detection but as a step of a more complex task (i.e. face detection, hand gesture recognition). A recent
example of method belonging to this class is the work in [32], which performs a study on different color models, drawing the conclusion
that there are no apparent advantages of using a perceptual uniform color space: therefore they propose an approach based on a simple
RGB lookup table. The work in [33] proposes a dynamic but very straightforward method based on parametric modeling the Cr or Cb
channel from YCbCr color space through a single Gaussian: the final approach requires a limited amount of storage space, is fast and can
be trained using a small training set with small time delay. In [34] a simple skin detector based on RGB histogram thresholding is
employed as a preliminary fast step for motion-based skin region of interest detection. A dynamic skin color model method based on
space switching is proposed in [35], where in order to handle with natural changes in illumination, a system with three robust algorithms
has been built based on different color spaces which are switched according to the statistical mean of value of the skin pixels in the image.
In [36] a new 3D hybrid color space named SKN is proposed, obtained by using Principal Component Analysis and a Genetic Algorithm
to discover the optimal representation of skin color over 17 color spaces, then a pixel-wise skin classification is performed employing a
general purpose trained classifier (i.e. Naïve Bayes, Random Forest, Multilayer Perceptron and Support Vector Machines).
The first class of methods, based on sophisticated and computationally expensive techniques, include recently proposed approaches
based on deep learning [12][13][14]. Convolutional neural networks have recently achieved remarkable results for a variety of computer
vision tasks, including several applications based on pixel-wise prediction (i.e. scene labelling, semantic image segmentation). In [12] a
patch-wise skin segmentation approach is described based on deep neural networks, which uses image patches as processing units instead
of pixels; a dataset of image patches have been appositely collected for training purposes and the trained DSMs are integrated into a
sliding window framework to detect skin regions of the human body parts achieving competitive performance on pixel-wise skin
detection. In [14] an integration of some recurrent neural networks layers into the fully convolutional neural networks is proposed as a
solution to develop an end-to-end network for human skin detection, while in [13] the authors propose a inception-like convolutional
network-in-network structure, which consists of convolution and rectified linear unit layers only (without pooling and subsampling layers).
All the proposed architectures report comparable or better performances than other the state-of-the-art methods, anyway a fair comparison
with traditional existing approaches is always difficult due to the different testing protocols.
In this work, we evaluate and combine several skin detectors with the aim of comparing their performance and we propose an ensemble
able of maximizing their classification performance. The base approaches used to create the ensemble have been selected according to
their effectiveness, their availability to research scopes and their efficiency:
GMM [22] is a simple and efficient Gaussian mixture model for skin detection trained to classify non-skin vs. skin pixels in the RGB
space.
Bayes [22] is a fast and effective method based on a Bayesian classifier. In this work we used a classifier trained in the RGB color
space using 2000 images from the ECU data set.
SPL(τ) [37]1 is a pixel-based skin detection approach which determines skin probability in the RGB domain using a look up table
(LUT). For a testing image the probability of being skin for each pixel x is calculated, then a threshold τ is applied to decide skin/nonskin.
Cheddad(τ) [38] is a pixel-based and real-time approach which reduces the RGB color space to a 1D space derived from
differentiating the grayscale map and the non-red encoded grayscale version. The classification is performed using a skin probability
which delimits the lower and upper bounds of the skin cluster and the final decision depends on a classification threshold τ;
Chen [39] is a statistical skin color model, which is specifically suited to be implemented on hardware. The 3D skin cube is
represented as three 2D sides calculated as the difference of two color channels: sR=R-G, sG=G-B, sB=R-B. The skin cluster region
is delineated in the transformed space, fixing the boundaries to the following ranges: −142<sR<18, −48< sG <92, and −32< sB <192.
SA1(τ) [40] is a method for skin detection based on spatial analysis. Starting from a skin probability map obtained using a color pixelwise detector, the starting step to the spatial analysis is the proper selection of the high probability pixels as “skin seeds”. The second
step consists in finding the shortest routes from each seed to every single pixel, in order to propagate the “skinness”. All the pixels
not adjoined during the propagation process are labeled as non-skin. The performance depends on the threshold τ used to classify.
SA2(τ) [41] is another recent method based on spatial analysis which uses both color and textural features to determine the presence
of skin. The basic idea is to extract the textural features from the skin probability maps rather than from the luminance channel:
therefore simple textural statistics are computed from each pixel’s neighborhood in the probability map using kernels of different
sizes (i.e the median, the minimal values, the difference between the maximum and minimum and the standard deviation). Then skin
and non-skin pixels are transformed into two classes of feature vectors whose size is reduced by Linear Discriminant Analysis (LDA)
to increase their discriminating power. Finally the spatial analysis method proposed in [40] and described above is used for seed
extraction and propagation using the distance transform. The classification depends on a threshold τ used to classify pixels in the
distance domain.
SA3(τ) [27] is a self-adaptive method that consists in combining a local skin color model created using a probability map and spatial
analysis to fix the boundaries of the skin regions. It is an evolution of approach proposed in [41] based on spatial analysis, skin color
model adaptation and textural features. The main difference from previous approach is a new technique for extracting adaptive seeds,
based on the analysis of the skin probability map calculated from the input color image. The performance depends on a classification
threshold τ.
DYC [42]2 is a skin detection approach which works in the YCbCr color space and takes into account the lighting conditions. The
method is based on the dynamic generation of the skin cluster range both in the YCb and YCr subspaces of YCbCr and on the
definition of correlation rules between the skin color clusters.
A rough classification of the method tested in this work according to the criteria reported in section 2 is reported in Table 1
1
2
http://clickdamage.com/sourcecode/index.php
https://github.com/nadiabrancati/skin_detection/
Table 1. Rough classification of the tested approaches
GMM
Bayes
SPL
Cheddad
Chen
x
x
x
x
x
SA1
SA2
SA3
DYC
x
x
x
x
x
x
x
Preprocessing steps
None
Illumination cancellation
Dynamic adaptation
Color consistency
Color space
Basic color spaces
x
x
x
Perceptual color spaces
Orthogonal color spaces
x
Perceptually uniform color spaces
Other (e.g. Color ratio)
x
x
x
x
x
x
x
x
Problem formulation
Segmentation based
x
Pixel based
x
x
x
x
x
x
x
Type of pixel classification
Rule based
Machine learning: parametric
Machine learning: non-parametric
x
Type of classifier
Statistical
x
Mixture techniques
x
x
Adaptive methods
x
x
x
Other
3. Skin detection evaluation: Datasets and performance indicators
To assist research in the area of skin detection, there are some well-known color image datasets provided with ground truth. The use
of a standard and representative benchmark is essential to execute a fair empirical evaluation of skin detection techniques.
3.1. Datasets
In Table 2 some of the most used datasets are summarized and in this section a brief description of each of them is given.
Table 2. Some of the most used datasets per skin detection
Name
Compaq
Ref
[22]
Images
4675
TDSD
UChile
[43]
[44]
555
103
ECU
Schmugge
[45]
[46]
4000
845
Feeval
[47]
8991
MCG
Pratheepan
VDM
SFA
[48]
[49]
[50]
[51]
1000
78
285
1118
HGR
SDD
[27]
[52]
1558
21000
Ground truth
Semisupervised
Imprecise
Medium
Precision
Precise
Precise (3
classes)
Low quality,
imprecise
Imprecise
Precise
Precise
Medium
Precision
Precise
Precise
Download
ask to the authors
Year
2002
http://lbmedia.ece.ucsb.edu/research/skin/skin.htm
http://agami.die.uchile.cl/skindiff/
2004
2004
http://www.uow.edu.au/~phung/download.html (currently not available)
https://www.researchgate.net/publication/257620282_skin_image_Data_se
t_with_ground_truth
http://www.feeval.org/Data-sets/Skin_Colors.html
2005
2007
http://mcg.ict.ac.cn/result_data_02mcg_skin.html (ask to authors )
http://web.fsktm.um.edu.my/~cschan/downloads_skin_dataset.html
http://www-vpu.eps.uam.es/publications/SkinDetDM/
http://www1.sel.eesc.usp.br/sfa/
2011
2012
2013
2013
http://sun.aei.polsl.pl/~mkawulok/gestures/
Not available yet
2014
2015
2009
Compaq [22] is one of the first and most used large skin datasets; it consists of images collected by crawling Web: 9731 images
containing skin pixels (but only 4675 skin images have been segmented and included in the ground truth) and 8965 images with no skin
pixels. This dataset have been extensity used for testing and comparing methods, but without using a standard testing protocol, therefore
comparisons using this dataset are not always fair. Moreover, the ground truth for this dataset has been obtained using an automatic
software tool leading to imprecise results.
TDSD [43] is an old dataset containing 555 images with very imprecise annotations (automatic labeling).
The UChile [44] dbskin2 complete set includes 103 images acquired in different lighting conditions and with complex background.
The ground truth has been manually annotated with medium precision (in some images the boundaries between skin and non-skin pixels
are not marked precisely).
ECU [45] skin and face datasets are a collection of about 4000 color images annotated with relatively accurate ground truth. ECU
dataset is quite challenging, since it includes diversity in terms of the lighting conditions, background scenes, and skin types.
The skin dataset named Schmugge [46] is a collection of 845 images taken from different face datasets (i.e. the UOPB dataset, the AR
face dataset, and University of Chile database). The ground truth is very accurate since all images are labelled in 3 classes: skin/ notskin/don’t care.
Feeval [47] is a dataset based on 8991 frames extracted from 25 online videos of low quality. The ground truth is not precisely
annotated. Here, the performance indicator is calculated for each of the 25 videos then the results are averaged.
MCG skin database [29] contains 1000 images selected from internet in order to include confusing backgrounds, variable ambient
lights and diversity of human races. The ground-truth is obtained through manually labeling, but it is not very precise since eyes, eyebrows,
and even bracelets are sometimes marked as skin.
VMD [50] is obtained selecting 285 images from several public datasets for human activity recognition (i.e. LIRIS, EDds, UT, AMI
and SSG). The dataset is already divided in subsets for training and testing, anyway in this work we used all the images for testing. The
images cover a wide range of illumination levels and situations.
SFA dataset [51] includes images from FERET (876 images) and AR (242 images) face databases manually labelled (with medium
precision). SFA includes an internal organization in folders in order to separate 1118 original images (ORI), 1118 ground truths (GT)
masks, 3354 samples of skin (SKIN) and 5590 samples of nonskin (NS) ranging differently from 1 to 35×35 dimensions. We have used
ORI/GT for assessing the performance.
Pratheepan [49] is a small dataset which includes 78 images downloaded randomly from Google; the dataset is divided in two subsets:
FacePhoto including 32 single subject images with simple background and FamilyPhoto including 46 images with multiple subjects and
complex background.
HGR [27] is a dataset for gesture recognition which contains also ground truth binary skin presence masks; the dataset includes 1558
images representing gestures from Polish and American sign language with controlled and uncontrolled background divided in 3 subsets
(HGR1, HGR2A, HGR2B). In our experiments the size of the images of HGR2A and HGR2B has been reduced of a factor 0.3.
SDD [52] is a dataset of 21000 images acquired using different imaging devices, in a variety of illumination conditions and including
different skin colors from people all around the world. The dataset is composed from some images extracted from videos and others
belonging to popular face datasets. Images are provided in four sets: a set including mainly single face images, made for training purposes,
and other three sets to be used for testing.
FvNF [53] (Face vs. NonFace) is not a real skin dataset, it is composed by 800 face and 770 non-face images, extracted from Caltech
dataset [54]. This dataset has been collected and used in [53] to evaluate the capability of a skin detector method to detect the presence of
a face, based on the number of pixels classified as skin. The average precision (AP) is used as performance indicator, AP[0,100]. The
AP summarizes the shape of the precision/recall curve, since it is the area under the precision-recall curve.
3.2. Performance indicators
Skin detection is a two-class classification problem, therefore standard measures for general classification problems [55] can be used
for performance evaluation: including Accuracy, Precision, Recall, F-measure, Kappa, ROC-Curve, Area Under Curve, and others.
Anyway, due to the particular nature of this problem which is based on pixel-level classification and on unbalanced distribution, the
following measures are usually considered for performance evaluation: the confusion matrix, the F-measure, the True Positive Rate (TPR)
and the False Positive Rate (FPR).
The confusion matrix is obtained comparing results with the ground-truth data to determine the number of true negatives (tn), false
negatives (fn), true positives (tp) and false positives (fp). Several useful measures can be obtained from the confusion matrix, including
precision=tp/(tp+fp), that is the percentage of correctly classified pixels out of all the pixels classified as skin and recall =tp/(fn+tp), that
is the percentage of the ground-truth skin pixels correctly classified as skin.
The F1 measure is the harmonic mean of precision and recall and it is calculated according to the following formula F1 = 𝑡𝑝/(2𝑡𝑝 +
𝑓𝑛 + 𝑓𝑝) , F1[0,1]. According to other works in the literature F1 is averaged at pixel level not at image level; in such a way the final
indicator is not dependent on the image size in the different databases. Besides F1 several papers use the True Positive Rate (TPR=
recall=tp/(fn+tp)) and the False Positive Rate (FPR= fp/(fp+tn)).
Even if the F1 measure is able to evaluate algorithms only at a fixed operating threshold, and therefore it is a worse way to quantify
the accuracy of an algorithm evaluation with respect to ROC curve or precision-recall curve, we use F1 is used in this work since it is
widely used in the literature for skin classification and allow a better comparison. Moreover, several methods evaluated here work at fixed
threshold and do not allow tuning for true positives and false positives rates.
4. A fair experimental comparison
A fair comparison among different approaches is very difficult due to the lack of a universal standard in evaluation: most of published
works are tested on self-collected datasets which often are not available for further comparison; in many cases the testing protocol is not
clearly explained, many datasets are not of high quality and the precision of the ground truth is questionable since sometimes lips, mouth,
rings and bracelets have been labelled as skin. In this section, we carry out a comparison of some well-known approaches whose source
code is freely available. In order to accomplish a fair comparison we do not perform re-training of methods in each dataset, conversely,
we use the knowledge provided by the original authors, therefore all the datasets have been used only for testing purposes. When the
performance depends on a classification threshold, we tested several values in order to select the one that performs best in all the datasets.
In Table 3 we report the performance in 10 datasets of the nine stand-alone approaches described in section 2 and four ensembles
combined by the vote rule. Both the stand-alone approaches and the ensembles have been tested using different thresholds (only the best
one is reported in Table 3 for sake of space, the complete version of the table is included as supplementary material):
GMM [22], Bayes [22] (τ[50,70,90,110,140]), SPL [37] (τ[-2.5,-2,-1.5,-1,-0.5]), Cheddad [38], Chen [39], SA1 [40]
(τ[100,150,175,200,225]), SA2 [41] (τ[30,40,50,85,120]), SA3 [27] (τ[25,50,75,100,125]), DYC [42]
OldVote is the best ensemble based on vote rule proposed in [56], it is based on the weighted vote rule among SPL (weight 0.1),
GMM (weight 0.9) and SA2(weight 1). After weighting the responses from different classifiers, a pixel is classified as skin if it
receives more than one vote for the class Skin. In [56] we have tested different rules for the fusion of classifiers, finding that the vote
rule is the best suited for this particular problem.
Vote1, Vote2 and Vote3 are the ensembles proposed in this work and based on the weighed fusion of the following methods using
the vote rule: w1×SA1(175) + w2× SA2(50) + w3×SA3(50) + w4× Cheddad(125) + w5×DYC + w6×Bayes(110) > (w1+ w2+ w3+ w4+
w5+ w6)/ wτ, where w=(w1, w2, w3, w4, w5, w6) is the weight vector and wτ[1.25,1.5,1.75,2] is a threshold parameter used to tune the
sensitivity of the method. The weight vector used for the three ensemble are, respectively:
w1=(0.5, 1.5, 1, 1.5, 0.5, 1),
w2=(0.5, 1.5, 1, 1.5, 0, 1),
w3=(0, 1, 1, 1, 0, 1);
For each dataset the best result is highlighted and in the last column the rank (calculated as the rank of the average rank) is reported.
Table 3. Performance in 10 different datasets
Dataset
Perf. indicator
Method
τ/ wτ
GMM
110
Bayes
-2
SPL
Cheddad 125
Chen
175
SA1
50
SA2
50
SA3
DYC
OldVote
1.25
Vote1
1.25
Vote2
1.5
Vote3
F1 measure
Feeval Pratheepan
UChile
Compaq
SFA
HGR
Schmugge
VMD
AP
FnF
Rank
MCG
0.513
0.581
0.688
0.615
0.600
0.789
0.658
0.595
0.130
91.590
10
0.565
0.631
0.694
0.661
0.599
0.760
0.871
0.569
0.252
92.380
7
0.544
0.551
0.621
0.568
0.494
0.700
0.845
0.490
0.321
89.380
11.5
0.596
0.597
0.667
0.649
0.588
0.683
0.767
0.571
0.261
89.200
9
0.287
0.540
0.656
0.598
0.549
0.791
0.732
0.571
0.165
87.200
13
0.558
0.613
0.664
0.567
0.593
0.788
0.768
0.482
0.199
86.770
11.5
0.515
0.693
0.755
0.663
0.645
0.771
0.806
0.594
0.156
91.910
6
0.539
0.709
0.762
0.625
0.647
0.863
0.877
0.586
0.147
89.800
5
0.588
0.599
0.680
0.663
0.618
0.569
0.616
0.613
0.275
88.710
8
0.552
0.701
0.755
0.664
0.666
0.757
0.725
0.590
0.259
94.680
4
0.594
0.717
0.754
0.670
0.666
0.737
0.849
0.625
0.269
92.980
1
0.575
0.714
0.754
0.676
0.667
0.731
0.800
0.616
0.262
93.250
2
0.571
0.711
0.753
0.671
0.658
0.739
0.802
0.616
0.265
93.240
3
Maybe some approaches can be advantaged in some datasets, in case that they used some images of the dataset for training (i.e. LUT
creation), anyway considering the results on all the 10 datasets, the comparison is quite fair.
From the results in Table 3 it is clear that no approach overcomes the others in all the problems, on the contrary it is very difficult to
find a solution that works well in all the datasets without retraining and performing a parameter tuning. The design of an ensemble method
able to exploit the good performance of each of its composing approaches is a feasible solution to this problem. Our three proposed
ensembles based on the vote rule grant good performance on average in almost all the datasets and reach the first 3 positions in the rank
column. This is a valuable result considering that our experiments compares 13 approaches on 10 different datasets.
From a comparison among stand-alone approaches in Table 3, the following conclusions can be drawn:
There is a noticeable difference among performance of different approaches in each dataset. The best stand-alone method is different
for each dataset, anyway SA2 and SA3 work better than others, this is the reason why we gave them the higher weights in our vote
rule.
In particular SA3 reaches the best performance in three datasets: MCG, SFA, HGR. In our opinion, it is a very valuable method in
particular for problems where the background is quite simple (e.g. gesture recognition).
The method Bayes perform very well (it is ranked third among stand-alone methods) even though it is a very simple approach with
low computational requirements.
On the contrary the statistical color model proposed by Chen is very efficient but at the expense of performance.
The methods SPL is the best in VMD but performs very poorly in Compact.
For many approaches, the selection of an appropriate threshold is crucial for performance: the most appropriate choice depends of the
specific application, since a strict value decreases the number of false positives despite of the true positive rate, vice versa a low threshold
increases the true positive rate but also the number of false positives.
The ensemble that we propose as the best solution is Vote1(1.25); besides F1 we also report TPR and FPR as performance indicators
for Vote1(1.25) in the MGC and UChile datasets, for an easier comparison with several methods in the literature that use these two
indicators in these datasets [48]:
MGC (TPR=0.772, FPR=0.091),
UChile (TPR=0.7231, FPR=0.0915).
5. Conclusion and future research directions
In this work, a framework to evaluate and combine different skin detector approaches is presented and an extensive evaluation of
several approaches is carried out on 10 different datasets including more than 10000 labelled images. A survey of most recent existing
approaches is carried out and a new ensemble based on the combination of six methods is proposed and evaluated. Experimental results
confirm that our proposed ensemble obtains a very good performance with respect to other stand-alone approaches. The proposed
ensemble can be used in a wide range of skin detection applications such as body tracking, face detection, detection of objectionable
content and hand gesture analysis. The performance obtained on 10 different datasets confirms that the proposed ensemble is well suited
for detecting skin in a wide range of images without requiring re-training and ad hoc parameter optimization.
In conclusion, we show that skin detection is a very difficult problem, which can be hardly solved by a stand-alone approach. The
performance of any stand-alone method for skin detection depends on many factors, such as the color space used, the parameters used,
the nature of data, the image characteristics, the shape of the distribution, the size of samples for training, the presence of data noise, etc.
Our experiments show that our ensemble suffers less of these problems, since it is able to exploit the advantages of each composing
method and it is a feasible solution for problems where training is impracticable.
Future work for designing an effective skin-color detector can be done by adding a preprocessing module able to deal with the color
constancy problem in order to improve the robustness to illumination changes. Another idea to improve the precision of the detection is
the use of morphological operators as a post-processing step. Finally, in order to exploit the diversity in stand-alone approaches to be
fused in an ensemble, recent deep learning methods can be considered in the fusion, as soon as freely available method is provided.
References
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
S. Kawato, J. Ohya, Automatic skin-color distribution extraction for face detection and tracking, WCC 2000 - ICSP 2000. 2000 5th Int. Conf. Signal
Process. Proceedings. 16th World Comput. Congr. 2000. 2 (2000). doi:10.1109/ICOSP.2000.891809.
A. Argyros, M. Lourakis, Real-time tracking of multiple skin-colored objects with a possibly moving camera, Eccv 2004. vol3 (2004) 368–379.
doi:10.1007/978-3-540-24672-5_29.
H. Sang, Y. Ma, J. Huang, Robust Palmprint Recognition Base on Touch-Less Color Palmprint Images Acquired, J. Signal Inf. Process. 4 (2013) 134–
139. doi:10.4236/jsip.2013.42019.
J.-S. Lee, Y.-M. Kuo, P.-C. Chung, E.-L. Chen, Naked image detection based on adaptive and extensible skin color model, Pattern Recognit. 40 (2007)
2261–2270. doi:10.1016/j.patcog.2006.11.016.
R. Khan, A. Hanbury, J. St??ttinger, A. Bais, Color based skin classification, Pattern Recognit. Lett. 33 (2012) 157–163.
doi:10.1016/j.patrec.2011.09.032.
S.G. Kong, J. Heo, B.R. Abidi, J. Paik, M.A. Abidi, Recent advances in visual and infrared face recognition - A review, Comput. Vis. Image Underst.
97 (2005) 103–135. doi:10.1016/j.cviu.2004.04.001.
G. Healey, M. Prasad, B. Tromberg, Face recognition in hyperspectral images, IEEE Trans. Pattern Anal. Mach. Intell. 25 (2003) 1552–1560.
doi:10.1109/TPAMI.2003.1251148.
C. Prema, M. Manimegalai, Survey on Skin Tone Detection using Color Spaces, Int. J. Appl. Inf. Syst. 2 (2012) 18–26.
P. Kakumanu, S. Makrogiannis, N. Bourbakis, A survey of skin-color modeling and detection methods, Pattern Recognit. 40 (2007) 1106–1122.
doi:10.1016/j.patcog.2006.06.010.
W. Chen, K. Wang, H. Jiang, M. Li, Skin color modeling for face detection and segmentation: a review and a new approach, Multimed. Tools Appl. 75
(2016) 839–862.
M.R. Mahmoodi, S.M. Sayedi, A Comprehensive Survey on Human Skin Detection, Int. J. Image, Graph. Signal Process. 8 (2016) 1–35.
doi:10.5815/ijigsp.2016.05.01.
T. Xu, Z. Zhang, Y. Wang, Patch-wise skin segmentation of human body parts via deep neural networks, J. Electron. Imaging. 24 (2015) 43009.
doi:10.1117/1.JEI.24.4.043009.
Y. Kim, I. Hwang, N.I. Cho, A New Convolutional Network-in-Network Structure and Its Applications in Skin Detection, Semantic Segmentation, and
Artifact Reduction, arXiv Prepr. arXiv1701.06190. (2017).
H. Zuo, H. Fan, E. Blasch, H. Ling, Combining Convolutional and Recurrent Neural Networks for Human Skin Detection, IEEE Signal Process. Lett.
24 (2017) 289–293.
B.D. Zarit, B.J. Super, F.K.H. Quek, Comparison of five color models in skin pixel classification, Proc. Int. Work. Recognition, Anal. Track. Faces
Gestures Real-Time Syst. Conjunction with ICCV’99 (Cat. No.PR00378). (1999) 58–63. doi:10.1109/RATFG.1999.799224.
N.B. Ibrahim, M.M. Selim, H.H. Zayed, A Dynamic Skin Detector Based on Face Skin Tone Color, in: 2012 8th Int. Conf. Informatics Syst., 2012: pp.
1–5.
R.P.K. Poudel, J.J. Zhang, D. Liu, H. Nait-Charif, Skin Color Detection Using Region-Based Approach, Int. J. Image Process. 7 (2013) 385.
W.C. Chen, M.S. Wang, Region-based and content adaptive skin detection in color images, Int. J. Pattern Recognit. Artif. Intell. 21 (2007) 831–853.
doi:10.1142/s0218001407005715.
H. Kruppa, M.A. Bauer, B. Schiele, Skin Patch Detection in Real-World Images, in: Annu. Symp. Pattern Recognit. DAGM 2002, 2002: p. 109f.
doi:10.1007/3-540-45783-6.
N. Sebe, I. Cohen, T.S. Huang, T. Gevers, Skin detection: a Bayesian network approach, Proc. 17th Int. Conf. Pattern Recognit. 2004 ICPR 2004. 2
(2004) 2–5. doi:10.1109/ICPR.2004.1334405.
A. Kumar, S. Malhotra, Pixel-Based Skin Color Classifier: A Review, Int. J. Signal Process. Image Process. Pattern Recognit. 8 (2015) 283–290.
M.J. Jones, J.M. Rehg, Statistical color models with application to skin detection, Int. J. Comput. Vis. 46 (2002) 81–96.
doi:10.1023/A:1013200319198.
[23]
[24]
[25]
[26]
[27]
[28]
[29]
[30]
[31]
[32]
[33]
[34]
[35]
[36]
[37]
[38]
[39]
[40]
[41]
[42]
[43]
[44]
[45]
[46]
[47]
[48]
[49]
[50]
[51]
[52]
[53]
[54]
[55]
[56]
QingXiang Wu, R. Cai, L. Fan, C. Ruan, G. Leng, Skin detection using color processing mechanism inspired by the visual system, in: IET Conf. Image
Process. (IPR 2012), 2012: pp. B10–B10. doi:10.1049/cp.2012.0459.
L. Chen, J. Zhou, Z. Liu, W. Chen, G. Xiong, A skin detector based on neural network, in: Commun. Circuits Syst. West Sino Expo. IEEE 2002 Int.
Conf., 2002: pp. 615–619 vol.1. doi:10.1109/ICCCAS.2002.1180694.
M.R. Mahmoodi, S.M. Sayedi, Leveraging spatial analysis on homogonous regions of color images for skin classification, in: Comput. Knowl. Eng.
(ICCKE), 2014 4th Int. eConference, 2014: pp. 209–214.
R. Nidhu, M.G. Thomas, Real Time Segmentation Algorithm for Complex Outdoor Conditions, Int. J. Sci. Technoledge. 2 (2014) 71.
M. Kawulok, J. Kawulok, J. Nalepa, B. Smolka, Self-adaptive algorithm for segmenting skin regions, EURASIP J. Adv. Signal Process. 2014 (2014)
1–22. doi:10.1186/1687-6180-2014-170.
A.S. Nunez, M.J. Mendenhall, Detection of Human Skin in Near Infrared Hyperspectral Imagery, Int. Geosci. Remote Sens. Symp. 2 (2008) 621–624.
doi:10.1109/IGARSS.2008.4779069.
J. Han, G.M. Award, A. Sutherland, H. Wu, Automatic skin segmentation for gesture recognition combining region and support vector machine active
learning, in: FGR 2006 Proc. 7th Int. Conf. Autom. Face Gesture Recognit., 2006: pp. 237–242. doi:10.1109/FGR.2006.27.
Z. Jiang, M. Yao, W. Jiang, Skin Detection Using Color, Texture and Space Information, Fourth Int. Conf. Fuzzy Syst. Knowl. Discov. (FSKD 2007).
(2007) 366–370. doi:10.1109/FSKD.2007.518.
H.K. Al-Mohair, J. Mohamad Saleh, S.A. Suandi, Hybrid Human Skin Detection Using Neural Network and K-Means Clustering Technique, Appl.
Soft Comput. 33 (2015) 337–347. doi:10.1016/j.asoc.2015.04.046.
F.E. Sandnes, L. Neyse, Y.-P. Huang, Simple and practical skin detection with static RGB-color lookup tables: A visualization-based study, in: Syst.
Man, Cybern. (SMC), 2016 IEEE Int. Conf., 2016: pp. 2370–2375.
S. Jairath, S. Bharadwaj, M. Vatsa, R. Singh, Adaptive Skin Color Model to Improve Video Face Detection, in: Mach. Intell. Signal Process., Springer,
2016: pp. 131–142.
W. Song, D. Wu, Y. Xi, Y.W. Park, K. Cho, Motion-based skin region of interest detection with a real-time connected component labeling algorithm,
Multimed. Tools Appl. (2016) 1–16.
A. Gupta, A. Chaudhary, Robust skin segmentation using color space switching, Pattern Recognit. Image Anal. 26 (2016) 61–68.
M.M. Oghaz, M.A. Maarof, A. Zainal, M.F. Rohani, S.H. Yaghoubyan, A hybrid Color space for skin detection using genetic algorithm heuristic
search and principal component analysis technique, PLoS One. 10 (2015). doi:10.1371/journal.pone.0134828.
C.Ó. Conaire, N.E. O’Connor, A.F. Smeaton, Detector adaptation by maximising agreement between independent data sources, in: Proc. IEEE
Comput. Soc. Conf. Comput. Vis. Pattern Recognit., 2007. doi:10.1109/CVPR.2007.383448.
A. Cheddad, J. Condell, K. Curran, P. Mc Kevitt, A skin tone detection algorithm for an adaptive approach to steganography, Signal Processing. 89
(2009) 2465–2478. doi:10.1016/j.sigpro.2009.04.022.
Y.H. Chen, K.T. Hu, S.J. Ruan, Statistical skin color detection method without color transformation for real-time surveillance systems, Eng. Appl.
Artif. Intell. 25 (2012) 1331–1337. doi:10.1016/j.engappai.2012.02.019.
M. Kawulok, Fast propagation-based skin regions segmentation in color images, in: 2013 10th IEEE Int. Conf. Work. Autom. Face Gesture
Recognition, FG 2013, 2013. doi:10.1109/FG.2013.6553733.
M. Kawulok, J. Kawulok, J. Nalepa, Spatial-based skin detection using discriminative skin-presence features, Pattern Recognit. Lett. 41 (2014) 3–13.
doi:10.1016/j.patrec.2013.08.028.
N. Brancati, G. De Pietro, M. Frucci, L. Gallo, Human skin detection through correlation rules between the YCb and YCr subspaces based on dynamic
color clustering, Comput. Vis. Image Underst. 155 (2017) 33–42. doi:10.1016/j.cviu.2016.12.001.
Q. Zhu, C.-T. Wu, K. Cheng, Y. Wu, An adaptive skin model and its application to objectionable image filtering, Proc. 12th Annu. ACM Int. Conf.
Multimed. - Multimed. ’04. (2004) 56. doi:10.1145/1027527.1027538.
J. Ruiz-Del-Solar, R. Verschae, Skin detection using neighborhood information, in: Proc. - Sixth IEEE Int. Conf. Autom. Face Gesture Recognit.,
2004: pp. 463–468. doi:10.1109/AFGR.2004.1301576.
S.L. Phung, A. Bouzerdoum, D. Chai, Skin segmentation using color pixel classification: Analysis and comparison, IEEE Trans. Pattern Anal. Mach.
Intell. 27 (2005) 148–154. doi:10.1109/TPAMI.2005.17.
S.J. Schmugge, S. Jayaram, M.C. Shin, L. V. Tsap, Objective evaluation of approaches of skin detection using ROC analysis, Comput. Vis. Image
Underst. 108 (2007) 41–51. doi:10.1016/j.cviu.2006.10.009.
J. Stöttinger, A. Hanbury, C. Liensberger, R. Khan, Skin paths for contextual flagging adult videos, in: Lect. Notes Comput. Sci. (Including Subser.
Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), 2009: pp. 303–314. doi:10.1007/978-3-642-10520-3_28.
L. Huang, T. Xia, Y. Zhang, S. Lin, Human skin detection in images by MSER analysis, 2011 18th IEEE Int. Conf. Image Process. (2011) 1257–1260.
doi:10.1109/ICIP.2011.6115661.
W.R. Tan, C.S. Chan, P. Yogarajah, J. Condell, A Fusion Approach for Efficient Human Skin Detection, Ind. Informatics, IEEE Trans. 8 (2012) 138–
147. doi:10.1109/TII.2011.2172451.
J.C. Sanmiguel, S. Suja, Skin detection by dual maximization of detectors agreement for video monitoring, Pattern Recognit. Lett. 34 (2013) 2102–
2109. doi:10.1016/j.patrec.2013.07.016.
J.P.B. Casati, D.R. Moraes, E.L.L. Rodrigues, SFA: A human skin image database based on FERET and AR facial images, in: IX Work. Visao
Comput. Rio Janeiro, 2013.
M.R. Mahmoodi, S.M. Sayedi, F. Karimi, Z. Fahimi, V. Rezai, Z. Mannani, SDD: A skin detection dataset for training and assessment of human skin
classifiers, in: Knowledge-Based Eng. Innov. (KBEI), 2015 2nd Int. Conf., 2015: pp. 71–77.
L. Nanni, A. Lumini, Skin Detection for Reducing False Positive in Face Detection, in: V.M. Petrova (Ed.), Adv. Eng. Res. vol.16, Nov. Publ. 2017,
Nova Publisher, 2017. https://www.novapublishers.com/catalog/product_info.php?products_id=60326&osCsid=.
A. Angelova, Y. Abu-Mostafa, P. Perona, Pruning training sets for learning of object categories, in: Proc. IEEE Comput. Soc. Conf. Comput. Vis.
Pattern Recognit., 2005: pp. 494–501. doi:10.1109/CVPR.2005.283.
D.M.W. POWERS, Evaluation: From Precision, Recall and F-Measure To Roc, Informedness, Markedness & Correlation, J. Mach. Learn. Technol. 2
(2011) 37–63. doi:10.1.1.214.9232.
L. Nanni, A. Lumini, M. Migliardi, Learning-based Skin Classification, Autom. Identif. Technol. (2016).
Extended version of Table 2 (including results for different thresholds)
Dataset
Perf. indicator
Method
τ/ wτ
GMM
SPL
-2.5
-2
-1.5
-1
-0.5
Bayes
50
70
90
110
140
Cheddad
75
100
125
150
175
Chen
SA1
225
200
175
150
100
SA2
30
40
50
85
120
SA3
125
100
75
50
25
DYC
OldVote
Vote1
1.25
1.5
1.75
2
Vote2
1.25
1.5
1.75
2
Vote3
1.25
1.5
1.75
2
F1 measure
Feeval Prath.
0.513
0.581
0.549
0.537
0.544
0.551
0.544
0.567
0.529
0.578
0.512
0.582
0.552
0.672
0.564
0.663
0.567
0.649
0.565
0.631
0.547
0.599
0.561
0.633
0.619
0.641
0.596
0.597
0.518
0.513
0.439
0.448
0.287
0.540
0.486
0.579
0.535
0.603
0.558
0.613
0.575
0.615
0.560
0.576
0.524
0.683
0.519
0.690
0.515
0.693
0.513
0.665
0.497
0.626
0.506
0.638
0.521
0.674
0.536
0.699
0.539
0.709
0.544
0.707
0.588
0.599
0.552
0.701
0.594
0.717
0.594
0.717
0.593
0.684
0.593
0.684
0.575
0.714
0.576
0.711
0.576
0.694
0.575
0.664
0.567
0.713
MCG
0.688
0.615
0.621
0.627
0.624
0.615
0.702
0.711
0.706
0.694
0.667
0.668
0.704
0.667
0.585
0.526
0.656
0.639
0.657
0.664
0.668
0.645
0.739
0.749
0.755
0.749
0.714
0.715
0.738
0.755
0.762
0.752
0.680
0.755
0.754
0.754
0.733
0.733
0.754
0.751
0.740
0.722
0.750
UChile
0.615
0.562
0.568
0.565
0.554
0.543
0.605
0.643
0.660
0.661
0.642
0.563
0.637
0.649
0.567
0.484
0.598
0.511
0.553
0.567
0.571
0.543
0.656
0.661
0.663
0.647
0.623
0.575
0.592
0.608
0.625
0.631
0.663
0.664
0.670
0.670
0.684
0.684
0.676
0.655
0.655
0.669
0.636
Compaq
0.600
0.492
0.494
0.497
0.494
0.485
0.613
0.617
0.609
0.599
0.574
0.615
0.608
0.588
0.567
0.540
0.549
0.536
0.580
0.593
0.599
0.588
0.641
0.644
0.645
0.627
0.591
0.591
0.613
0.633
0.647
0.647
0.618
0.666
0.666
0.666
0.635
0.635
0.667
0.656
0.641
0.620
0.664
SFA
0.789
0.726
0.700
0.628
0.583
0.521
0.473
0.593
0.686
0.760
0.830
0.281
0.468
0.683
0.550
0.581
0.791
0.809
0.823
0.788
0.730
0.572
0.758
0.760
0.771
0.799
0.801
0.897
0.896
0.886
0.863
0.817
0.569
0.757
0.737
0.737
0.792
0.792
0.731
0.793
0.793
0.820
0.662
HGR
0.658
0.845
0.845
0.845
0.828
0.801
0.711
0.793
0.840
0.871
0.885
0.357
0.596
0.767
0.850
0.812
0.732
0.752
0.787
0.768
0.732
0.614
0.842
0.831
0.806
0.508
0.354
0.498
0.667
0.785
0.877
0.893
0.616
0.725
0.849
0.849
0.872
0.872
0.800
0.837
0.837
0.852
0.729
Schmugge
0.595
0.501
0.490
0.482
0.462
0.435
0.508
0.547
0.565
0.569
0.555
0.571
0.601
0.571
0.384
0.349
0.571
0.453
0.479
0.482
0.471
0.440
0.580
0.590
0.594
0.584
0.553
0.511
0.535
0.566
0.586
0.591
0.613
0.590
0.625
0.625
0.611
0.611
0.616
0.611
0.611
0.597
0.569
VMD
0.130
0.302
0.321
0.341
0.354
0.367
0.264
0.272
0.268
0.252
0.221
0.209
0.274
0.261
0.151
0.067
0.165
0.087
0.153
0.199
0.234
0.276
0.169
0.163
0.156
0.130
0.108
0.101
0.114
0.129
0.147
0.172
0.275
0.259
0.269
0.269
0.250
0.250
0.262
0.245
0.245
0.219
0.209
AP
FnF
91.590
87.580
89.380
90.290
91.180
92.140
95.710
94.680
93.100
92.380
90.510
93.710
92.860
89.200
80.700
75.110
87.200
76.980
83.860
86.770
88.500
90.780
91.660
91.770
91.910
92.100
91.480
86.640
87.930
89.150
89.800
90.980
88.710
94.680
92.980
92.980
92.980
92.980
93.250
93.250
93.250
93.250
93.240
0.571
0.711
0.753
0.671
0.658
0.739
0.802
0.616
0.265
93.240
0.571
0.700
0.745
0.671
0.648
0.739
0.802
0.616
0.265
93.240
0.571
0.678
0.732
0.671
0.632
0.739
0.802
0.616
0.265
93.240
Rank
10
11.5
7
9
13
11.5
6
5
8
4
1
2
3
| 1cs.CV
|
Discrete Extremes
arXiv:1707.05033v1 [math.ST] 17 Jul 2017
Adrien Hitz, Richard Davis and Gennady Samorodnitsky
Our contribution is to widen the scope of extreme value analysis applied to discretevalued data. Extreme values of a random variable X are commonly modeled using
the generalized Pareto distribution, a method that often gives good results in practice.
When X is discrete, we propose two other methods using a discrete generalized Pareto
and a generalized Zipf distribution respectively. Both are theoretically motivated and
we show that they perform well in estimating rare events in several simulated and real
data cases such as word frequency, tornado outbreaks and multiple births.
1
Introduction
Extreme quantile estimation is an important but difficult problem in statistics, especially
when the quantile is beyond the range of the data. In the univariate case, extreme value
theory motivates the choice of a parametric family called the generalized Pareto distribution
(GPD) which is used to model the tail and estimate the probability of rare events (Pickands
[1975]). Let X be a random variable taking values in [0, xF ) with survival function F̄X ,
where xF ∈ R+ ∪ {∞} and R+ = (0, ∞). Suppose that there exists a strictly positive
sequence au such that
d
a−1
u (X − u) | X ≥ u → Z,
(1)
as u → xF , for some Z following a non-degenerate probability distribution on [0, ∞), where
d
→ denotes weak convergence. A stunning result is that this assumption is sufficient to
characterize the limiting distribution: Z follows a generalized Pareto distribution (GPD),
defined by its survival function
x −1/ξ
1{x<τ } ,
1 − FGPD (x; σ, ξ) = F̄GPD (x; σ, ξ) = 1 + ξ
σ
x ≥ 0,
with τ = ∞ if ξ ≥ 0, τ = σ/|ξ| if ξ < 0, where 1{x<τ } is 1 if x < τ and 0 otherwise, and
σ > 0. We use the convention that if ξ = 0, then (1 + ξx)1/ξ = ex . Condition (1), written
as X ∈ MDAξ , means that X is in the maximum domain of attraction of an extreme value
distribution with shape parameter ξ (see e.g. Resnick [1987]). Sometimes one says that the
Adrien Hitz, University of Oxford, 24-29 St Giles, Oxford OX1 3LB, UK.
Gennady Samorodnitsky, Cornell University, 220 Rhodes Hall, Ithaca, NY.
Richard Davis, Columbia University, 1255 Amsterdam Avenue, New York, NY.
law F of X is in MDAξ . In this case, the sequence of cumulative distribution functions of
a−1
u (X − u) | X ≥ u converges uniformly to FGPD on [0, ∞). Thus, for large u,
−1
P (X − u > x | X ≥ u) = P {a−1
u (X − u) > au x | X ≥ u}
is often approximated by
≈ F̄GPD (x; σau , ξ) ,
(2)
motivating the approximation of the distribution of exceedances of X above a large threshold u by a GPD (Davison and Smith [1990]). In the continuous case, where X is assumed
to have a continuous distribution, most common distributions belong to some maximum
domain of attraction, and the GPD approximation to the tail of the distribution can be
applied. This approximation often works well in practice, although it can be poor when u
is not large enough, for instance if X is normal and u is around the 90th percentile of its
distribution.
Two issues are apparent with applying the GPD method of approximating the distribution tail to a discrete distribution. First, a necessary condition for a discrete distribution FX to be in some maximum domain of attraction in the case xF = ∞ is that FX
is long-tailed, i.e., F̄X (u + 1)/F̄X (u) → 1 as u → ∞, see Shimura [2012] and Anderson
[1970, 1980]. Without being in a maximum domain of attraction the GPD approximation
(2) does not necessarily apply. Note that many common discrete distributions, including
geometric, Poisson and negative binomial distributions, are not long-tailed. The second
issue in approximating a discrete distribution by a GPD, a continuous distribution, is that
ties are not allowed. To overcome these limitations, we suggest two alternative methods
of modeling the tails of discrete observations, each one relying on a specific assumption
on the underlying distribution. For this work, we will only consider approximations to
distributions with infinite support.
We say that a discrete random variable X with non-negative values is in the discrete
maximum domain of attraction, which we write as X ∈ D-MDAξ , if there exists a random
variable Y ∈ MDAξ with ξ ≥ 0 such that Pr(X ≥ k) = Pr(Y ≥ k) for k = 0, 1, 2, . . . , i.e.,
d
the equality in distribution, X = bY c, holds. We call Y an extension of X and such an
extension is not unique. Shimura [2012] showed that X ∈ MDAξ for some ξ ≥ 0 if and only
if X ∈ D-MDAξ and X is long-tailed. It was also shown by Shimura [2012] that geometric,
Poisson and negative binomial distributions are in D-MDA. This set is, therefore, strictly
larger than the set of all discrete distributions in MDAξ .
d
Let X ∈ D-MDAξ and Y ∈ MDAξ be the corresponding extension satisfying X = bY c.
Then, for large integers u,
P (X − u = k | X ≥ u) = P (Y − u ≥ k | Y ≥ u) − P (Y − u ≥ k + 1 | Y ≥ u)
2
which we will approximate as in (2) by
≈ pD-GPD (k; σau , ξ),
(3)
where pD-GPD is the probability mass function of the discrete generalized Pareto distribution (D-GPD) defined by
pD-GPD (k; σ, ξ) = F̄GPD (k; σ, ξ) − F̄GPD (k + 1; σ, ξ),
(4)
for k = 0, 1, 2, . . .. The discrete generalized Pareto distribution has been used by Prieto
et al. [2014] to model road accidents, while various aspects of discrete Pareto-type distributions were studied in Krishna and Pundir [2009], Buddana and Kozubowski [2014], and
Kozubowski et al. [2015]. Notice that the scale parameter in (3) is undetermined since the
extension Y is non-unique.
We now discuss an alternative assumption on the distribution of the discrete random
variable X that will allow us to construct another approximation of its tail. Let pX be
the probability mass function of X and suppose that there exists a non-negative random
variable Y ∈ MDAξ/(1+ξ) with ξ ≥ 0 such that pX (k) = c F̄Y (k) for k = d, d + 1, d + 2, . . . ,
for some c > 0 and d ∈ N0 = {0, 1, . . .}. We denote this condition by pX ∈ D-MDAξ/(1+ξ)
and call F̄Y an extension of pX . Then for large integers u,
pX (u + k)/pX (u)
P (X − u = k | X ≥ u) = P∞
i=0 pX (u + i)/pX (u)
P (Y > u + k)/P (Y > u)
= P∞
i=0 P (Y > u + i)/P (Y > u)
which can be approximated as in (2),
≈ pGZD k; (1 + ξ)σau , ξ ,
(5)
where
1 + ξ σk
pGZD (k; σ, ξ) = P
∞
i=0
−1/ξ−1
1 + ξ σi
−1/ξ−1 ,
k = 0, 1, 2, . . . .
(6)
We call the probability mass function in (6) generalized Zipf distribution (GZD). In the
case ξ > 0, the GZD is a Zipf–Mandelbrot distribution whose probability mass function is
usually written in the form p(k) = (k + q)−s /Hs,q , for k = 0, 1, 2, . . . , s > 1 and q > 0,
where Hs,q is the Hurwitz-Zeta function (Mandelbrot [1953]). The GZD is of this form
with s = 1 + 1/ξ and q = σ/ξ. When q = 1 the distribution is a Zipf law which is
sometimes presented as the counterpart of the Pareto distribution because its probability
mass function, after a shift, can be written in a homogeneous form (Arnold [1983]). Zipftype families of discrete distributions have been fitted to various data sets such as word
3
frequencies (Booth [1967]), city sizes (Gabaix [1999]), company sizes (Axtell [2001]) and
numbers of website hits (Clauset et al. [2009]). In the case ξ = 0, the generalized Zipf
distribution is a geometric distribution with probability of success p = 1 − e−1/σ (and so
is the discrete generalized Pareto distribution).
We will show that the geometric, Poisson and negative binomial probability mass functions belong to D-MDA0 , so the tail approximation (5) makes sense in these cases. In
addition, we will see that pX ∈ D-MDAξ/(1+ξ) for ξ ≥ 0 implies X ∈ MDAξ (under an
additional condition in the case ξ = 0).
Equations (3) and (5) motivate the approximation of the tails of some discrete distributions by a D-GPD and GZD, respectively. If ξ ≥ 0, then
sup
k=0,1,2...
fGPD (k; σ, ξ)
− 1 −→ 0,
σ→∞
q(k; σ, ξ)
for either q = pD-GPD or q = pGZD . One thus expects the GPD, D-GPD and GZD approximations to give similar results when the scale parameter σ is large.
In Section 2, we justify theoretically the three approximations in the case ξ > 0 by
showing that if pX ∈ MDAξ/(1+ξ) , then for any sequence ku ⊂ N0 such that supu ku /u < ∞,
P (X = ku + u | X ≥ u)
→ 1,
q(ku ; ξu, ξ)
k = 0, 1, 2, . . . ,
where q ≡ fGPD , pD-GPD and pGZD (see Theorem 2.3 and Proposition 2.4). A similar
justification is provided in the case ξ = 0 for the D-GPD and GZD approximations (Theorem 2.5). We further present an important invariance property satisfied by the D-GPD
(Proposition 2.7).
In Section 3, we simulate data from different discrete distributions and compare the
ability of the three approximations for estimating the probability of regions far from the
origin. The D-GPD and GZD approximations outperform the GPD when there are many
tied observations, otherwise the results are similar. As opposed to the GZD, the D-GPD
has a closed-form survival and probability mass function allowing for an exact likelihood
based inference.
In Section 4, we study a data set counting the occurrence of British words in a corpus
and show that the three distributions are appropriate to describe the tails of these word
frequencies. We also use the D-GPD and GZD to model the length of French words, the
number of tornado outbreaks in the United States over 50 years, and the number of births
in the United States in the last 20 years, illustrating how they offer potential methods for
estimating the probability of rare events when the data are discrete.
4
2
Theoretical Results
In this section we describe a number of properties of the approximation procedures introduced in Section 1.
Proposition 2.1. If X ∈ D-MDAξ , then there exists a positive sequence (au , u = 1, 2, . . .)
such that
lim
sup
u∈N0 , u→∞ k=0,1,2,...
P (X = u + k | X ≥ u) − pD-GPD (k; au , ξ) = 0 ,
(7)
where pD-GPD is defined in (4).
We remark that if au → ∞, then the result is less interesting because the two terms in
(7) converge to 0.
Proof. By assumption, there exists a random variable Y ∈ MDAξ for ξ ≥ 0 and a positive
d
function (ãu , u > 0) such that X = bY c and the sequence of functions P ã−1
u (Y − u) ≥ x |
Y ≥ u , x ≥ 0, converges uniformly, as u → ∞, to the function F̄GPD (x; σ, ξ), x ≥ 0, for
some σ > 0 and ξ ≥ 0. For a positive integer u we let au = ãu σ. Then
| P (X = u + k | X ≥ u) − pD-GPD (k; au , ξ) |
sup
k=0,1,2,...
=
sup
k=0,1,2,...
−1
−1
−1
P ã−1
u (Y − u) ≥ ãu k | Y ≥ u − P ãu (Y − u) ≥ ãu (k + 1) | Y ≥ u
− F̄GPD (k; au , ξ) + F̄GPD (k + 1; au , ξ)
≤ 2 sup P ã−1
u (Y − u) ≥ x | Y ≥ u − F̄GPD (x; σ, ξ) → 0
x≥0
as u → ∞ over the integers.
The following auxiliary lemma is elementary (as the sum can be sandwiched between
two integrals).
Lemma 2.2. If ξ > 0, then, as u → ∞,
u1/ξ H1+1/ξ,u → ξ,
where Hs,q =
P∞
i=0 (q
+ i)−s is the Hurwitz-Zeta function.
Recall that a positive and measurable function f on [1, ∞) is regularly varying if there
exists a positive function ` such that
lim
u→∞
f (ux)
→ `(x),
f (u)
5
x ≥ 1.
In this case, there exists α ∈ R such that `(x) = xα and we write f ∈ RVα (see e.g.
Bingham et al. [1989]). If f ∈ RV−α for α ≥ 0, then
lim sup
u→∞ x∈[1,b]
f (ux)
− x−α → 0,
f (u)
(8)
for b = ∞ if α > 0, and for any b < ∞ if α = 0. If f ∈ RV−α for α > 0, then by Potter’s
bounds (see e.g. Resnick [1987]) for any > 0 there is u ∈ (0, ∞) such that
e− x−α− ≤
f (ux)
≤ e x−α+ ,
f (u)
x ≥ 1,
(9)
for u ≥ u . We say that X is regularly varying if F̄X ∈ RV−α for some α > 0, a necessary
and sufficient condition for X ∈ MDA1/α .
The following result sheds some light on the approximation suggested in (5).
Theorem 2.3. If pX ∈ D-MDAξ/(1+ξ) for ξ > 0, then X ∈ MDAξ and for any sequence
of nonnegative integers (ku , u = 1, 2, . . .) such that supu ku /u < ∞,
lim
u∈N0 , u→∞
P (X = ku + u | X ≥ u)
= 1.
pGZD (ku ; ξu, ξ)
(10)
Proof. By assumption, there exists a survival function F̄ such that F̄ (k) = c pX (k) for c >
0, k large enough and F̄ ∈ RV−1/ξ−1 . The last condition is equivalent to F̄ (b·c) ∈ RV−1/ξ−1
(Shimura [2012]). Therefore,
P∞
R duxe
R∞
F̄ (byc)dy − ux F̄ (byc)dy
Pr(X ≥ ux)
i=duxe pX (i)
ux
R∞
=
= P∞
Pr(X ≥ u)
i=u pX (i)
u F̄ (byc)dy
R∞
u x F̄ (buzc)/F̄ (buc)dz − (duxe − ux)F̄ (buxc)/F̄ (buc)
R∞
=
→ x−1/ξ , x ≥ 1,
u 1 F̄ (buzc)/F̄ (buc)dz
applying (9) and dominated convergence. Thus, F̄X ∈ RV−1/ξ and X ∈ MDAξ .
For the second part of the theorem, we have
P
−1/ξ−1
F̄ (u + ku )/F̄ (u) ∞
P (X = ku + u | X ≥ u)
i=0 (1 + i/u)
P
=
.
pGZD (ku ; ξu, ξ)
(1 + ku /u)−1/ξ−1 ∞
i=0 F̄ (u + i)/F̄ (u)
By the uniform convergence (8) and the the fact that ku grows at most linearly fast, we
conclude that
F̄ (u + ku )/F̄ (u)
→ 1,
(1 + ku /u)−1/ξ
as u → ∞ over the integers. Second, Lemma 2.2 yields
u−1
∞
X
(1 + i/u)−1/ξ−1 → ξ.
i=0
6
Third, it follows from (9) that for ∈ (0, 1/ξ), there exists u > 0 such that for u ≥ u ,
∞
∞
X
X
ξe
i −1−1/ξ+
→
,
u−1
F̄ (u + i)/F̄ (u) ≤ u−1 e
1+
u
1 − ξ
i=0
i=0
using again Lemma 2.2. A lower bound is found in the same manner and we let → 0 to
conclude.
We now present a tail equivalence property between the probability mass and density
functions of the GZD, D-GPD and GPD. A direct consequence is that the denominator
pGZD in (10) can be replaced either by pD-GPD or by fGPD .
Proposition 2.4. If ξ ≥ 0, then
lim
sup
σ→∞ k=0,1,2,...
pD-GPD (k; σ, ξ)
pD-GPD (k; σ, ξ)
− 1 = lim sup
− 1 = 0.
σ→∞
pGZD (k; σ, ξ)
k=0,1,2,... fGPD (k; σ, ξ)
Proof. Suppose first that ξ > 0. Then
−1/ξ
−1/ξ
1 + ξ σk
− 1 + ξ k+1
pD-GPD (k; σ, ξ)
σ
=
1
k −1/ξ−1
fGPD (k; σ, ξ)
1
+
ξ
σ
σ
(
−1/ξ )
ξ
= 1− 1+
(σ + ξk) → 1,
σ + ξk
uniformly in k = 0, 1, 2, . . .. Furthermore,
∞
X
fGPD (k; σ, ξ)
= σ −1
(1 + ξi/σ)−1/ξ−1 → 1
k=0,1,2,... pGZD (k; σ, ξ)
sup
i=0
by Lemma 2.2. In the case ξ = 0,
pD-GPD (k; σ, 0)/fGPD (k; σ, 0) = pGZD (k; σ, 0)/fGPD (k; σ, 0) = σ(1 − e−1/σ ) → 1
as σ → ∞.
Next we extend Theorem 2.3 to the case ξ = 0. Recall that a distribution F is in MDA0
if and only if the survival function has a representation
Z x
1
F̄ (x) = c(x) exp −
dy , −∞ < x < xF ,
(11)
0 a(y)
where c(·) is a positive function with c(x) → c > 0 as x ↑ xF , and a(·) is a positive,
differentiable function a(·) with limx↑xF a0 (x) = 0. If c(x) = c on (d, xF ) for some d < xF ,
then we say that the distribution F satisfies the von Mises condition. The function a(·)
in (11) is sometimes called the auxiliary function. Note, however, that it is only uniquely
defined (on (d, xF )) under the von Mises condition; see Embrechts et al. [2013]. Recall that
in the sequel we only consider the case of unbounded support, i.e. xF = ∞.
7
Theorem 2.5. Suppose that pX ∈ D-MDA0 and, moreover, that a distribution F such that
pX (k) = F̄ (k) has the property that an auxiliary function of F̄ satisfies limx→∞ a(x) = σ ∈
[0, ∞]. Then
lim
u∈N0 , u→∞
P (X = k + u | X ≥ u) = pGe (k; σ),
k = 0, 1, 2, . . . ,
(12)
where pGe (k; σ) = (1 − e−1/σ ) e−k/σ is the probability mass function of a geometric distribution if 0 < σ < ∞, and pGe (k; ∞) = pGe (k; 0) = 0. Furthermore, if σ ∈ [0, ∞), then
X ∈ D-MDA0 .
Proof. Note that for large integers u,
F̄ (k + u)/F̄ (u)
.
P (X = k + u | X ≥ u) = P∞
i=0 F̄ (i + u)/F̄ (u)
(13)
We have for every i = 0, 1, 2, . . .,
Z i
c(i + u)
exp −
1/a(u + y)dy → e−i/σ
F̄ (i + u)/F̄ (u) =
c(u)
0
as u → ∞. If 0 < σ < ∞, then the dominated convergence theorem gives us
∞
X
F̄ (i + u)/F̄ (u) →
∞
X
e−i/σ = 1/(1 − e−1/σ ) ,
i=0
i=0
and (12) follows. If σ = ∞,
∞
X
F̄ (i + u)/F̄ (u) → ∞
i=0
by Fatou’s lemma, and (12), once again, follows. If σ = 0, the claim follows from the fact
that the denominator in (13) cannot be smaller than 1.
For the second part of the proposition, it follows from
Z n
1
pX (n) = c(n) exp −
dy
0 a(y)
for all n and a(y) → σ ∈ [0, ∞) that
pX (n)
= 1 − e−1/σ ∈ (0, ∞) ,
n→∞ P (X ≥ n)
lim
which immediately implies that X ∈ D-MDA0 as well.
To summarize, for a discrete random variable X, the conditions X ∈ MDA, X ∈
D-MDA and pX ∈ D-MDA are related to each other as follows. If ξ ≥ 0, then X ∈ MDAξ
if and only if X ∈ D-MDAξ and X is long-tailed. If ξ > 0, then pX ∈ D-MDAξ/(1+ξ) implies
8
X ∈ D-MDAξ ; the same implication holds in the case ξ = 0 if the auxiliary function of the
extension of pX satisfies a(x) → σ ∈ (0, ∞) as x → ∞.
The condition pX ∈ D-MDA is satisfied, among others, by the Zipf–Mandelbrot, geometric, Poisson and negative binomial distributions, as shown in the next example.
Example 2.6. The probability mass function of a Zipf–Mandelbrot distribution with parameters s > 1 and q > 0 is in D-MDA1/s because it is regularly varying of order −s.
The probability mass function of a geometric distribution belongs to D-MDA0 as it
coincides up to a constant with the survival function of an exponential distribution. The
latter distribution clearly satisfies the von Mises condition and thus is a member of MDA0 .
The auxiliary function is, in fact, equal (eventually) to 1/λ, where λ is the rate of the
exponential distribution.
The probability mass function p of a Poisson distribution with rate λ > 0 coincides on
k = 0, 1, 2, . . . with the function
λx e−λ
,
g(x) =
Γ(x + 1)
a continuous function on R+ satisfying limx→∞ g(x) = 0. Moreover,
d
log g(x) = −ψ0 (x + 1) + log λ ,
dx
where ψ0 is the polygamma function of order 0. Since ψ0 (x) → ∞ as x → ∞, we see that
g 0 (x) < 0 for x sufficiently large. Therefore, F̄Y (x) = g(x)/g(d) is a survival function on
[d, ∞) for some d ≥ 0. Furthermore,
1
ψ1 (x + 1)
d
− 0
=−
,
dx
g (x)
(ψ0 (x + 1) − log λ)2
where ψ1 = ψ00 is is the polygamma function of order 1. Since ψ1 (x) → 0 as x → ∞,
we conclude that F satisfies the von Mises condition, with the auxiliary function a(x) =
(ψ0 (x + 1) − log λ)−1 → 0 as x → ∞. Therefore, the Poisson probability mass function is
in D-MDA0 .
Similarly, the probability mass function of the negative binomial distribution with probability of success p ∈ (0, 1) and number of successes r > 0 is also in D-MDA0 because it
coincides on {0, 1, 2, . . .} with the function
g(x) =
pr Γ(x + r)
(1 − p)x ,
Γ(r) Γ(x + 1)
a continuous function on R+ . It is simple to check that limx→∞ g(x) = 0, and g 0 (x) < 0 for
x large enough, so that F̄Y (x) = g(x)/g(d) is a survival function on [d, ∞) for some d ≥ 0.
9
Furthermore, g(x) ∼ cxr−1 (1 − p)x for large x, where c is a positive constant. Therefore,
F̄Y is of the form (11) with the auxiliary function
a(x) =
1
, x large,
− log(1 − p) − (r − 1)/x
and so it converges to −1/ log(1 − p) as x → ∞.
We conclude this section with a discussion designed to provide some intuition on how
the approximation methods suggested above differ, assuming that both apply in a given
situation. First of all, one would expect the D-GPD and GZD approximations to perform
similarly when ξ is close to zero because both approximating distributions coincide with a
geometric distribution when ξ = 0. Second, Proposition 2.4 suggests that, regardless of the
underlying justification, if one uses either pD-GPD (k; σ, ξ), fGPD (k; σ, ξ) or pGZD (k; σ, ξ) as
an approximation to P (X − u = k | X ≥ u), one should not expect major differences as
long as one chooses the scale parameter σ to be large. This would always be the case if X
is long-tailed, since the scale parameter is chosen to be proportional to the normalization
sequence au defined in (1), which grows to infinity if and only if X is long-tailed.
When using a continuous distribution, such as the generalized Pareto distribution, to
approximate the probabilities related to a discrete distribution, it is also common to use a
“continuity correction” and shift the argument in the continuous approximation by some
δ ∈ [0, 1). In our situation this amounts to replacing fGPD (k; σ, ξ) by fGPD (k + δ; σ, ξ),
some δ ∈ [0, 1). When ξ > 0, it is elementary to check that, as σ → ∞,
pD-GPD(σ,ξ) (k)
(1 + ξ)(2δ − 1)
=1+
+ O(σ −2 )
fGPD(σ,ξ) (k + δ)
2σ
for every k = 0, 1, 2, . . .. Therefore, the approximations by pD-GPD(σ,ξ) (k) and fGPD (k +
δ; σ, ξ) with large σ are most similar when δ = 1/2, a property that will be illustrated in
the empirical part. Similarly, in the case ξ = 0, as σ → ∞,
pD-GPD(σ,ξ) (k)
2δ − 1
= σeδ/σ (1 − e−1/σ ) = 1 +
+ O(σ −2 )
fGPD(σ,ξ) (k + δ)
2σ
for every k = 0, 1, 2, . . ., and the fastest convergence to the unity is again found when
δ = 1/2.
The final result of this section accomplishes two things. Its first part is related to the
well-known invariance property of the generalized Pareto distribution: its residual lifetime
is again generalized Pareto distributed. More precisely, if Y has the generalized Pareto
distribution with scale parameter σ and shape parameter ξ ≥ 0, then the exceedance Y − u
has, given Y ≥ u, the generalized Pareto distribution with scale parameter σ+ξu and shape
parameter ξ, for all u ≥ 0. This invariance property is important when approximating
10
the exceedance distribution using generalized Pareto distributions because changing the
threshold does not alter the distributional assumptions used in the approximation. It is
easily checked that the D-GPD has an analogous property. Moreover, the D-GPD also
exhibits the property that discretizing a GPD using different types of rounding does not
affect the fact that a D-GPD is obtained, and the shape parameter remains invariant.
Proposition 2.7. Let Y follow a GPD with scale parameter σ > 0 and shape parameter
ξ ≥ 0. Let 0 < h ≤ 1. If X = bλY + 1 − hc, then for any integer u ≥ 1 − h, the distribution
of X −u | X ≥ u is a D-GPD with shape parameter λσ +ξ(u+h−1) and scale parameter ξ.
3
Empirical Results
0.0
0.5
1.0
1.5
2.0
2.5
3.0
0.0 0.5 1.0 1.5 2.0 2.5 3.0
●
Fitted Quantiles
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
2.0
1.5
1.0
0.0
0.5
Fitted Quantiles
2.5
3.0
We now assess the performance of the generalized Pareto distribution (GPD), the discrete
generalized Pareto distribution (D-GPD) and the generalized Zipf distribution (GZD) approximations for estimating extreme quantiles from several simulated and real data sets,
starting with a simple example to illustrate the methods.
●
Empirical Quantiles
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
0.0
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
0.5
1.0
1.5
2.0
2.5
3.0
Empirical Quantiles
Figure 1: Quantile-quantile plots for the fit of a GPD (left) and D-GPD (right) to X − 3 | X ≥ 3,
where X is Poisson distributed with rate 1 and the sample size is 5000. A good fit occurs on the
right because the points are contained between the two lines, but not on the left.
3.1
Simulated Data
Let X be Poisson distributed with rate λ = 1 and consider an i.i.d. sample of size n = 5000.
We are interested in inferring the distribution of the exceedances X − u | X ≥ u above a
11
large threshold u, say u = 3 which is the 95th empirical percentile of the data in this
case. Since X ∈ D-MDA0 , we can approximate the distribution of X − u | X ≥ u
by a D-GPD as explained in Section 1. Moreover, pX , the probability mass function
of X, also belongs to D-MDA0 and satisfies the additional assumption in Theorem 2.5 as
shown in Example 2.6, motivating the D-GPD and GZD approximations. However, X is
not in MDA and thus the GPD approximation does not necessarily apply. In order to
compare these three approximations, we fit a GPD, D-GPD and GZD to the observations
above u = 3, estimating their two parameters σ and ξ by maximum likelihood. Figure 1
compares the fitted quantiles of the GPD (left) and D-GPD (right) relative to the empirical
quantiles. Since the data are discrete, we applied a slightly different graphical method
−1
than the standard quantile-quantile (QQ) plots: FGPD
{i/(n + 1); σ, ξ}, for i = 1, . . . , n,
were plotted against empirical quantiles, where (σ, ξ) are the estimated parameters. A
good fit occurs when the points accumulate between the two diagonal lines in Figure 1
and touch the bottom line, as would be the case if the quantiles of a continuous random
variable Y were plotted against those of bY c. One clearly sees that the D-GPD fits well the
observations compared to the GPD which delivers a poor fit. We mention that the D-GPD
and GZD approximations produce very similar estimates in this case; the QQ-plot of the
GZD (not displayed here) looks visually identical to the one of the D-GPD. The estimated
scale parameters σ for the GPD, D-GPD and GZD are 1.91, 0.71 and 0.69 respectively.
Increasing λ would increase these estimates and render the three methods indistinguishable
as expected from Proposition 2.4.
We now compare the performances of the GPD, D-GPD and GZD approximations in
estimating the probability of a rare event in the following simulated case. Let
Y ∼ IG(2, 1),
X = bY c,
(14)
where IG(α, β) denotes an inverse-gamma distribution with probability density function
f (x) = Γ(α)−1 β α x−α−1 exp(−β/x), x > 0. We repeat 500 times the experiment described
below. An i.i.d. sample of size 8000 is drawn from the distribution of X. From these
observations, the goal is to estimate the probability of the extreme region
pe = P (X ≥ bqe c),
(15)
where qe is the 99.99 percentile of Y, i.e., the value exceeded once every 10 000 times
on average. The strategy pursued is to select an integer threshold u as the 95th empirical
percentile of the sample, fit a parametric distribution to the exceedances X −u | X ≥ u, and
use it to extrapolate the tail and estimate pe . It holds X ∈ D-MDA1/2 and X ∈ MDA1/2 ,
which motivates the choice of a GPD and D-GPD as seen in Section 1. We implement two
variants of the GPD approximation: the first has no continuity correction and the second
12
250
150
100
50
Frequency
200
100 150 200 250 300
0
0
50
Frequency
0
20
40
60
80
100
100
1000
10000
Word Frequency
Figure 2: On the left: frequency plot of a sample of X − 2 | X ≥ 2 of size 701 for X defined in
(14). On the right: frequency plot of the 5588 most frequent words in a British corpus (x axis on
log-scale).
shifts the observations by −δ = − 21 . It is not immediate if the probability mass function
of X is in D-MDA and we thus apply the GZD approximation heuristically.
As a benchmark, we will also estimate pe from a sample of the continuous variable Y
(as opposed to its discretization X). In this context, the GPD approximation is motivated
by the fact that Y ∈ MDA1/2 , and we thus fit a GPD to Y − u | Y ≥ u.
A frequency plot of a sample of X − u | X ≥ u is displayed in Figure 2 on the lefthand side. For each model, we compute maximum likelihood estimators for σ and ξ by
performing a two dimensional maximization using the function optim of R (R Core Team
[2015]) with starting values (1, 1). We then compute pe and approximate 90% confidence
intervals under asymptotic normality of the estimators. Table 1 displays: the average
parameters pe , ξ and σ over the 500 experiments, the average length of the confidence
intervals, the true length and their coverage. True length is the length the intervals should
have had to contain the estimates across the 500 experiments 90% of the time. Coverage
indicates the proportion of time the truth lies in the confidence interval.
It appears that the D-GPD and GZD approximations accurately estimate pe from the
discretized data with a coverage close to the correct one of 90%, and that their performance
is good relative to the situation of full information where the continuous data are available.
On the other hand, the GPD approximation with δ = 21 is inaccurate and the GPD
with δ = 0 performs very poorly (misleadingly, the latter has a larger likelihood at the
13
pe × 103
truth
Y −u|Y ≥u
GPD
X −u|X ≥u
D-GPD
GZD
GPDδ= 21
GPDδ=0
ξ
σ
mean (cov, len)
0.10
true length
mean (cov, len)
0.5
mean (len)
0.10 (87%, 0.16)
0.16
0.49 (95%, 0.22)
1.19 (0.30)
0.10 (86%, 0.17)
0.11 (88%, 0.17)
0.04 (20%, 0.07)
7.93 (83%, 23.97)
0.16
0.17
0.08
11.25
0.49 (95%, 0.23)
0.50 (95%, 0.24)
0.37 (22%, 0.18)
8.27 (0%, 1.24)
1.19 (0.33)
1.39 (0.29)
1.43 (0.32)
0.00 (0.00)
Table 1: Performance of several methods in estimating the probability pe of a rare event defined
in (15). A generalized Pareto distribution (GPD) is fitted to the observations of Y exceeding
u = 2, and the following distributions are fitted to exceedances of X = bY c: a discrete generalized
Pareto distribution (D-GPD), a generalized Zipf distribution (GZD) and a GPD with continuity
correction δ. The table displays average maximum likelihood estimators for pe , ξ and σ accross
500 experiments. Coverage (cov) and average length (len) of 90% confidence intervals are shown
between brackets. In each experiment, about 700 observations exceeded the threshold.
maximum likelihood estimate than the former). This illustrates why the D-GPD or GZD
approximations should be preferred to the GPD approximation in situations similar to this
simulated case.
We know that the D-GPD and GZD coincide with a geometric distribution when ξ = 0
and that they are asymptotically equivalent when ξ > 0 and σ → ∞ (Proposition 2.4).
Although σ is not particularly large in the above simulated case, the D-GPD and GZD
approximations deliver very similar results. We point out that they outperform the Poisson
and negative binomial distributions which would estimate pe very poorly.
We remark few differences between the GPD fitted to exceedances of Y and the D-GPD
fitted to exceedances of its discretization X, except that the former method yields slightly
shorter confidence intervals. As a consequence of the invariance property in Proposition 2.7,
the two methods would still give similar estimates of ξ if X would be defined by other forms
of rounding than X = bY c, such as using rounding or ceiling function.
In conclusion, we showed that the D-GPD and GZD approximations were able to estimate the probability of rare events in this example. These findings are supported by
two complementary simulated cases with Y ∈ MDAξ for ξ = 0 and ξ < 0 (Hitz [2016],
Chapter 2). The D-GPD provides a more efficient method because its probability mass,
survival and quantile functions are closed-form, but both distributions are useful to describe extreme values of discrete random variables, which we will further illustrate on real
data sets.
14
600
800
●
●
0
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
400
Fitted Quantiles
10000
●
200
50000
30000
●
●
0
Fitted Quantiles
●
0 10000
30000
50000
●●
●
●●
●●
●●
●
●
●
●●
●
●
●
●
●●
●
●●
●
●
●
●
●
●
●●
●
●
●
●
●●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
0
Empirical Quantiles
200
400
600
800
Empirical Quantiles
Figure 3: QQ-plots for a D-GPD fitted to the frequencies of the 5588 most frequent words in a
British corpus. On the right, only percentiles below 99% are plotted. Dashed lines denote pointwise
90% confidence intervals.
3.2
Word Frequencies and Word Lengths
We consider a data set based on the British National corpus counting written and spoken
English words (British National Corpus, [2007]) and are interested in modeling the frequency of the most popular words. The six most frequent words in the corpus are: “the”,
“of”, “and”, “a”, “in” and “to.” Let X be the frequency at which a word occurs. We select
a large threshold u and fit a GPD, a D-GPD and a GZD to X − u | X ≥ u by maximum likelihood. The GPD is implemented with continuity correction (δ = 12 ) and without
(δ = 0). Selecting an appropriate threshold is crucial when estimating high quantiles and
can be based on techniques such as mean residual plots (see e.g. Davison and Smith [1990]).
As our focus here is rather on describing the tail distribution of these word frequencies,
we choose a relatively low threshold exceeded by 5588 observations. A frequency plot of
X | X ≥ u is displayed on the right-hand side in Figure 2.
The D-GPD delivers a good fit as revealed by the QQ-plot in Figure 3; indeed, most
observations lie within the pointwise 90% confidence intervals obtained by simulating 2000
times from the fitted model and computing empirical quantiles at each simulation. Table 2
presents maximum likelihood estimators for σ and ξ with 90% confidence intervals. Apart
from the case of the GPD with δ = 0, all models provide similar results as expected from
Proposition 2.4 when σ is large. A Kolmogorov–Smirnov test for discrete data (Arnold
and Emerson [2011]) leads to the same conclusion (in order to perform the test for the
15
0
●
●
●
●
●
●
●
●
●
10
8
6
2
Fitted Quantiles
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
0
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
2
●
4
12
8
6
4
0
2
Fitted Quantiles
10
●
●
●
●
●
●
4
6
8
10
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
0
Empirical Quantiles
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
2
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
4
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
6
●
●
●
●
●
●
●
●
●
●
8
Empirical Quantiles
Figure 4: QQ-plots for a D-GPD (left) and GPD with δ = 12 (right) fitted to the length of the
2875 French words consisting of 15 letters or more. A good fit occurs when the lowest part of each
accumulation of points is close to the line.
GPD, which is a continuous distribution, we assumed that data were rounded realizations
of the fitted model). The analysis of frequencies of French words in a collection of books
and movie subtitles leads to analogous results (Hitz [2016], Chapter 2). Since the GZD
coincides with a Zipf–Mandelbrot distribution when ξ > 0, the above results are consistent
with a common hypothesis in linguistic that word frequencies follow a Zipf-type law (see
e.g. Booth [1967]).
We now consider the set of 150 000 words in the French lexical (New et al. [2004]) and
denote by X the length of a word. The longest French word, for instance, is “anticonstitutionnellement”, consisting of 25 letters. Contrary to the word frequencies, this data
set contains many tied observations and we want to see if this translates into a marked
difference between the methods. We thus fit the models to X − u | X ≥ u with u = 15
(the 98% empirical percentile of the data), leaving 2875 exceedances. The D-GPD and
GZD deliver a good fit and similar estimations between each other, and this time they
clearly outperform the GPD approximation with δ = 21 as shown by QQ-plots in Figure 4
and discrete Kolmogorov–Smirnov tests in Table 2 (p-values are here computed by Monte
Carlo simulation). Notice that the negative binomial also fits well the observations in this
case.
To summarize, we have illustrated the adequacy of the D-GPD and GZD in describing
the frequencies of the most common and longest words from large corpora. This data
analysis supports the conclusion drawn earlier from the simulated case: the D-GPD and
16
Model
p-value
Word Frequency
British
D-GPD
GZD
GPDδ= 12
GPDδ=0
Negative binomial
0.56
0.56
0.55
0.00
0.00
Word length
French
D-GPD
GZD
GPDδ= 12
Negative binomial
0.85
0.84
0.00
0.75
NLL
ξ
σ
27896.6
27896.6
0.88[0.84,0.93]
0.88[0.84,0.93]
0.88[0.84,0.93]
0.93[0.89,0.97]
22.38[21.42,23.34]
22.82[21.87,23.77]
22.39[21.43,23.34]
20.89[19.96,21.81]
0.02[−0.01,0.06]
0.02[−0.01,0.06]
−0.04[−0.06,−0.01]
1.36[1.30,1.43]
1.37[1.32,1.43]
1.51[1.45,1.57]
29663.2
3894.0
3894.0
3893.9
Table 2: Fit of a GPD, D-GPD and GZD to frequencies of the most frequent words in a British corpus and length of the longest French words. The table displays the p-value of discrete Kolmogorov–
Smirnov tests, negative log-likelihood (NLL) and maximum likelihood estimators with 90% confidence intervals. The sample sizes are 5588 for word frequencies and 2875 for word lengths.
GZD are preferred over the GPD to model extremes of discrete data when tied observations
are frequent.
3.3
Tornadoes
Accurately assessing the risk of environmental hazards is crucial for insurance companies in
particular, and we illustrate here how the D-GPD and GZD approximations can be useful
techniques for this purpose.
We consider the data set studied in Tippett et al. [2016] which reports the number of
extreme tornadoes per outbreak in the United States between 1965 and 2015. They defined
an “extreme outbreak” as a sequence of twelve or more tornadoes occurring close to one
another in time and that are rated F1 and greater on the Fujita scale, or EF1 and greater
on the enhanced Fujita scale [Fuhrmann et al., 2014].
Let X be the number of such tornadoes per extreme outbreak. The authors found that
observations from X − u | X ≥ u for u = 12 were well modeled by a GPD with linear
temporal trend in the scale parameter and continuity correction δ = 12 . The GPD, however,
is not a discrete distribution and the D-GPD and GZD seem appropriate choices for this
type of data. We fit these three distributions and find that they all achieve comparable
quality of fit as shown in Table 3; linear trend in σ leads to significative improvements in
17
each case.
Model
D-GPD
GPDδ= 12
NLL
1439.92
1439.93
ξ
0.27[0.16,0.37]
0.26[0.16,0.37]
σ0
4.81[3.64,5.99]
4.86[3.68,6.04]
σt
6.11[3.74,8.48]
6.13[3.75,8.50]
Table 3: Fit of a D-GPD and GPD (with linear trend in the scale parameter) to the number of
tornadoes per extreme tornado outbreak in the United States. Only the 435 outbreaks with more
than 12 tornadoes were considered. The table displays negative log-likelihood (of the discretized
model in the case of the GPD) and maximum likelihood estimates with 90% confidence intervals.
3.4
Multiple Births
We now turn our attention to a data set consisting of very small integer values to see if
the D-GPD and GZD can describe tail distributions in this special case. We examine data
counting multiple births in the United States from 1995 to 2014 (Hamilton et al. [2015]);
its frequency table reads
single
78 178 588
twin
2 500 340
triplet
117 603
quadruplet
8 108
quint. or more
1 353.
Let X be the number of children at birth. We fit a right-censored D-GPD, GZD,
negative binomial and Poisson distribution to X C − u | X C ≥ u for u = 1, where X C =
min(X, 5). As shown in the table below, which displays Bayesian information criteria (BIC)
and maximum likelihood estimates, the D-GPD and GZD outperform the Poisson and
negative binomial distributions, and are useful methods if one must estimate, for example,
the probability that an American women delivers sextuplets.
D-GPD
GZD
Negative binomial
Poisson
BIC
546 441.2
546 440.6
546 547
552 284
ξ
0.06[0.06,0.06]
0.06[0.06,0.07]
σ
0.30[0.30,0.30]
0.32[0.32,0.32]
The applicability of the D-GPD and GZD approximations for estimating tail distributions when the selected threshold u is a small integer should be more rigorously explored.
Future work could also assess the validity of the approximations in the case ξ < 0, and
compare them to a broader class of discrete distributions such as discrete compound Poisson distributions. Since the D-GPD and GZD delivered similar performances in the data
18
analysis carried out in this article, it would be interesting to further understand how they
relate to one another.
Acknowledgements The first author is grateful to the Berrow Foundation for financial support and would like to thank Robin Evans, Gesine Reinert, David Steinsaltz and
Jonathan Tawn for valuable advice and encouragement. This research was partially supported by the ARO grant W911NF-12-10385.
References
C. W. Anderson. Extreme value theory for a class of discrete distributions with applications to
some stochastic processes. Journal of Applied Probability, 7:99–113, 1970.
C. W. Anderson. Local limit theorems for the maxima of discrete random variables. Mathematical
Proceedings of the Cambridge Philosophical Society, 88(1):161–165, 1980.
B. C. Arnold. Pareto distribution. International Cooperative Publishing House, Maryland, 1983.
T. B. Arnold and J. W. Emerson. Nonparametric goodness-of-fit tests for discrete null distributions.
The R Journal, 3(2):34–39, 2011.
R. L. Axtell. Zipf distribution of US firm sizes. Science, 293:1818–1820, 2001.
N. H. Bingham, C. M. Goldie, and J. L. Teugles. Regular Variation. Cambridge University Press,
1989.
A. D. Booth. A law of occurrences for words of low frequency. Information and Control, 10(4):
386–393, 1967.
British National Corpus. Version 3 BNC XML edition, 2007.
A. Buddana and T. J. Kozubowski. Discrete Pareto distributions. Economic Quality Control, 29
(2):143–156, 2014.
A. Clauset, C. R. Shalizi, and M. E. J. Newman. Power-law distributions in empirical data. SIAM
Review, 51(4):661–703, 2009.
A. C. Davison and R. L. Smith. Models for exceedances over high thresholds. Journal of the Royal
Statistical Society. Series B. Methodological, 52(3):393–442, 1990.
P. Embrechts, C. Klüppelberg, and T. Mikosch. Modelling extremal events: for insurance and
finance. Springer, New York, 2013.
C. M. Fuhrmann, C. E. Konrad, M. M. Kovach, J. T. McLeod, W. G. Schmitz, and P. G. Dixon.
Ranking of tornado outbreaks across the United States and their climatological characteristics.
Weather and Forecasting, 29(3):684–701, 2014.
19
X. Gabaix. Zipf’s law and the growth of cities. The American Economic Review, 89(2):129–132,
1999.
B. E. Hamilton, J. A. Martin, M. J. Osterman, S. C. Curtin, and M. TJ. Births: Final data for
2014. National Vital Statistics Reports, 64(1), 2015.
A. S. Hitz. Modelling of Extremes. PhD thesis, University of Oxford, 2016.
T. J. Kozubowski, A. K. Panorska, and M. L. Forister. A discrete truncated Pareto distribution.
Statistical Methodology, 26:135–150, 2015.
H. Krishna and P. S. Pundir. Discrete Burr and discrete Pareto distributions. Statistical Methodology, 6(2):177–188, 2009.
B. Mandelbrot. Contribution à la théorie mathématique des jeux de communication. Publications
de l’Institut de statistique de l’Université de Paris, 1953.
B. New, C. Pallier, M. Brysbaert, and L. Ferrand. Lexique 2: A new French lexical database.
Behavior Research Methods, Instruments, & Computers, 36(3):516–524, 2004.
J. Pickands, III. Statistical inference using extreme order statistics. The Annals of Statistics, 3:
119–131, 1975.
F. Prieto, E. Gómez-Déniz, and J. M. Sarabia. Modelling road accident blackspots data with the
discrete generalized Pareto distribution. Accident Analysis & Prevention, 71:38–49, 2014.
R Core Team. R: A Language and Environment for Statistical Computing. R Foundation for
Statistical Computing, 2015.
S. I. Resnick. Extreme values, regular variation, and point processes. Springer, New York, 1987.
T. Shimura. Discretization of distributions in the maximum domain of attraction. Extremes, 15(3):
299–317, 2012.
M. K. Tippett, C. Lepore, and J. E. Cohen. More tornadoes in the most extreme US tornado
outbreaks. Science, 354(6318):1419–1423, 2016.
20
| 10math.ST
|
Near-Optimal UGC-hardness of Approximating Max k-CSPR
Pasin Manurangsi, Preetum Nakkiran, and Luca Trevisan
arXiv:1511.06558v1 [cs.CC] 20 Nov 2015
University of California, Berkeley
{pasin,preetum,luca}@berkeley.edu
Abstract
In this paper, we prove an almost-optimal hardness for Max k-CSPR based on Khot’s Unique Games
Conjecture (UGC). In Max k-CSPR , we are given a set of predicates each of which depends on exactly
k variables. Each variable can take any value from 1, 2, . . . , R. The goal is to find an assignment to
variables that maximizes the number of satisfied predicates.
Assuming the Unique Games Conjecture, we show that it is NP-hard to approximate Max k-CSPR
to within factor 2O(k log k) (log R)k/2 /Rk−1 for any k, R. To the best of our knowledge, this result improves
on all the known hardness of approximation results when 3 ≤ k = o(log R/ log log R). In this case, the
previous best hardness result was NP-hardness of approximating within a factor O(k/Rk−2 ) by Chan.
When k = 2, our result matches the best known UGC-hardness result of Khot, Kindler, Mossel and
O’Donnell.
In addition, by extending an algorithm for Max 2-CSPR by Kindler, Kolla and Trevisan, we provide
an Ω(log R/Rk−1 )-approximation algorithm for Max k-CSPR . This algorithm implies that our inapproximability result is tight up to a factor of 2O(k log k) (log R)k/2−1 . In comparison, when 3 ≤ k is a constant,
the previously known gap was O(R), which is significantly larger than our gap of O(polylog R).
Finally, we show that we can replace the Unique Games Conjecture assumption with Khot’s d-to-1
Conjecture and still get asymptotically the same hardness of approximation.
1
1
Introduction
Maximum Constraint Satisfaction Problem (Max CSP) is an optimization problem where the inputs are
a set of variables, an alphabet set, and a set of predicates. Each variable can be assigned any alphabet
from the alphabet set and each predicate depends only on the assignment to a subset of variables. The
goal is to find an assignment to the variables that maximizes the number of satisfied predicates.
Many natural optimization problems, such as Max Cut, Max k-CUT and Max k-SAT, can be formulated as Max CSP. In addition, Max CSP has been shown to help approximate other seemingly-unrelated
problems such as Densest k-Subgraph [CHK11]. Due to this, Max CSP has long been researched by
the approximation algorithm community [Tre98, Has05, CMM09, MM14, KKT15, GM15]. Furthermore,
its relation to PCPs ensures that Max CSP is also well-studied on the hardness of approximation
side [ST00, Eng05, ST06, KKMO07, AM08, GR08, EH08, Cha13].
The main focus of this paper is on Max k-CSPR , a family of Max CSP where the alphabet set is of size
R and each predicate depends on only k variables. On the hardness of approximation side, most early
works focused on boolean Max k-CSP. Samorodnitsky
and Trevisan first showed that Max k-CSP2 is
√
NP-hard to approximate to within factor 2O( k) /2k [ST00]. Engebretsen and Holmerin
later improved
√
√
O( k)
k
constant factors in the exponent O( k) but still yielded hardness of a factor 2
/2 [EH08]. To break
this barrier, Samorodnitsky and Trevisan proved a hardness of approximation conditioned on Khot’s
Unique Games Conjecture (UGC), which will be discussed in more detail later; they achieved a ratio of
O(k/2k ) hardness, which is tight up to a constant for the boolean case [ST06]. Chan later showed that
NP-hardness of approximation at this ratio can be achieved unconditionally and, thus, settled down the
approximability of Max k-CSP2 [Cha13].
Unlike the boolean case, the approximability
of Max k-CSPR when R > 2 is still not resolved. In
√
this case, Engebretsen showed RO( k) /Rk NP-hardness of approximation [Eng05]. Under the Unique
Games Conjecture, a hardness of approximation of O(kR/Rk−1 ) factor was proven by Austrin and
Mossel [AM08] and, independently, by Guruswami and Raghavendra [GR08]. For the case k = 2, results
by Khot et al. [KKMO07] implicitly demonstrate UGC-hardness of approximation within O(log R/R),
made explicit in [KKT15]. Moreover, Austrin and Mossel proved UGC-hardness of approximation of
O(k/Rk−1 ) for infinitely many ks [AM08], but in the regime k ≥ R. Recently, Chan was able to remove
the Unique Game Conjecture assumption from these results [Cha13]. More specifically, Chan showed
NP-hardness of approximation of factor O(kR/Rk−1 ) for every k, R and that of factor O(k/Rk−1 ) for
every k ≥ R. Due to an approximation algorithm with matching approximation ratio by Makarychev
and Makarychev [MM14], Chan’s result established tight hardness of approximation for k ≥ R. On the
other hand, when k < R, Chan’s result gives O(kR/Rk−1 ) hardness of approximation whereas the best
known approximation algorithm achieves only Ω(k/Rk−1 ) approximation ratio [MM14, GM15]. In an
attempt to bridge this gap, we prove the following theorem.
Theorem 1 (Main Theorem) Assuming the Unique Games Conjecture, it is NP-hard to approximate
Max k-CSPR to within 2O(k log k) (log R)k/2 /Rk−1 factor, for any k ≥ 2 and any sufficiently large R.
When k = o(log R/ log log R), our result improves upon the previous best known hardness of approximation result in this regime, due to Chan. In particular, when k is constant, our results are tight up to
a factor of O(polylog R). While Chan’s results hold unconditionally, our result, similar to many of the
aforementioned results (e.g. [ST06, AM08, GR08]), rely on the Unique Games Conjecture.
A unique game is a Max 2-CSP instance where each constraint is a permutation. The Unique Games
Conjecture (UGC), first proposed by Khot in his seminal paper in 2002 [Kho02], states that, for any
sufficiently small η, γ > 0, it is NP-hard to distinguish a unique game where at least 1 − η fraction of constraints can be satisfied from a unique game where at most γ fraction of constraints can be satisfied. The
UGC has since made a huge impact in hardness of approximation; numerous hardness of approximation
results not known unconditionally can be derived assuming the UGC. More surprisingly, UGC-hardness
of approximation for various problems, such as Max Cut [KKMO07], Vertex Cover [KR08] and any
2
Range of k, R
k=2
3≤k<R
R≤k
Any k, R
NP-Hardness
√R
O log
R
k
O Rk−2
k
O Rk−1
–
UGC-Hardness
O logRR
–
–
O(k log k)
2
(log R)
Rk−1
k/2
Approximation
Ω logRR
k
Ω Rk−1
k
Ω Rk−1
log R
Ω R
k−1
References
[Cha13, KKMO07, KKT15]
[Cha13, MM14, GM15]
[Cha13, MM14]
this work
Figure 1: Comparison between our work and previous works. We list the previous best known results
alongside our results. From previous works, there is either an NP-hardness or a UGC-hardness result
matching the best known approximation algorithm in every case except when 3 ≤ k < R. Our hardness
result improves on the best known hardness result when k = o(log R/ log log R), and our approximation
algorithm improves on the previously known algorithm when k = o(log R).
Max CSP [Rag08]1 , are known to be tight. For more details on UGC and its implications, we refer
interested readers to Khot’s survey [Kho10] on the topic.
Another related conjecture from [Kho02] is the d-to-1 Conjecture. In the d-to-1 Conjecture, we consider
d-to-1 games instead of unique games. A d-to-1 game is an instance of Max 2-CSP where the constraint
graph is bipartite. Moreover, each constraint must be a d-to-1 function, i.e., for each assignment to a
variable on the right, there exists d assignments to the corresponding variable on the left that satisfy the
constraint. The d-to-1 Conjecture states that, for any sufficiently small γ > 0, it is NP-hard to distinguish
between a fully satisfiable d-to-1 game and a d-to-1 game where at most γ fraction of constraints can be
satisfied. Currently, it is unknown whether the d-to-1 Conjecture implies the Unique Games Conjecture
and vice versa.
While the d-to-1 Conjecture has yet to enjoy the same amount of influence as the UGC, it has been proven
successful in providing a basis for hardness of graph coloring problems [DMR09, DS10, GS11] and for
Max 3-CSP with perfect completeness [OW09b, Tan09]. Here we show that, by assuming the d-to-1
Conjecture instead of UGC, we can get a similar hardness of approximation result for Max k-CSPR as
stated below.
Theorem 2 Assuming the d-to-1 Games Conjecture holds for some d, it is NP-hard to approximate
Max k-CSPR to within 2O(k log k) (log R)k/2 /Rk−1 factor, for any k ≥ 2 and any sufficiently large R.
As mentioned earlier, there has also been a long line of works in approximation algorithms for Max
k-CSPR . In the boolean case, Trevisan first showed a polynomial-time approximation algorithm with
approximation ratio 2/2k [Tre98]. Hast later improved the ratio to Ω(k/(2k log k)) [Has05]. Charikar,
Makarychev and Makarychev then came up with an Ω(k/2k )-approximation algorithm [CMM09]. As
stated when discussing hardness of approximation of Max k-CSP2 , this approximation ratio is tight up
to a constant factor.
For the non-boolean case, Charikar, Makarychev, and Makarychev’s algorithm achieve Ω(k log R/Rk )
ratio for Max k-CSPR . Makarychev, and Makarychev later improved the approximation ratio to
Ω(k/Rk−1 ) when k = Ω(log R) [MM14]. Additionally, the algorithm was extended by Goldshlager and
Moshkovitz to achieve the same approximation ratio for any k, R [GM15]. On this front, we show the
following result.
Theorem 3 There exists a polynomial-time Ω(log R/Rk−1 )-approximation algorithm for Max k-CSPR .
In comparison to the previous algorithms, our algorithm gives better approximation ratio than all the
known algorithms when k = o(log R). We remark that our algorithm is just a simple extension of Kindler,
Kolla and Trevisan’s polynomial-time Ω(log R/R)-approximation algorithm for Max 2-CSPR [KKT15].
1 Raghavendra showed in [Rag08] that it is hard to approximate any Max CSP beyond what a certain type of semidefinite
program can achieve. However, determining the approximation ratio of a semidefinite program is still not an easy task. Typically,
one still needs to find an integrality gap for such a program in order to establish the approximation ratio.
3
1.1
Summary of Techniques
Our reduction from Unique Games to Max k-CSPR follows the reduction of [KKMO07] for Max 2-CSPs.
We construct a k-query PCP using a Unique-Label-Cover “outer verifier”, and then design a k-query Long
Code test as an “inner verifier”. For simplicity, let us think of k as a constant. We essentially construct a
k-query Dictator-vs.-Quasirandom test for functions f : [R]n → [R], with completeness Ω(1/(log R)k/2 )
and soundness O(1/Rk−1 ). Our test is structurally similar to the 2-query “noise stability” tests of
[KKMO07]: first we pick a random z ∈ [R]n , then we pick k weakly-correlated queries x(1) , . . . , x(k) by
choosing each x(i) ∈ [R]n as a noisy copy of z, i.e., each coordinate (x(i) )j is chosen as zj with some
probability ρ or uniformly at random otherwise. We accept iff f (x(1) ) = f (x(2) ) = · · · = f (x(k) ). The
key technical step is our analysis of the soundness of this test. We need to show that if f is a balanced
function with small low-degree influences, then the test passes with probability O(1/Rk−1 ). Intuitively,
we would like to say that for high enough noise, the values f (x(i) ) are roughly independent and uniform,
so the test passes with probability around 1/Rk−1 . To formalize this intuition, we utilize the Invariance
Principle and Hypercontractivity.
More precisely, if we let f i (x) : [R]n → {0, 1} be the indicator function for f (x) = i, then the test accepts
iff f i (x(1) ) = · · · = f i (x(k) ) = 1 for some i ∈ [R]. For each i ∈ [R], this probability can be written as
the expectation of the product: E[f i (x(1) )f i (x(2) ) . . . f i (x(k) )]. Since x(i) ’s are chosen as noisy copies of
z, this expression is related to the k-th norm of a noisy version of f i . Thus, our problem is reduced to
bounding the k-norm of a noisy function fei : [R]n → [0, 1], which has bounded one-norm E[fei ] = 1/R
since f is balanced. To arrive at this bound, we first apply the Invariance Principle, which essentially
states that a low-degree low-influence function on [R]n behaves on random input similarly to its “boolean
analog” over domain {±1}nR . Here “boolean analog” refers to the function over {±1}nR with matching
Fourier coefficients.
Roughly speaking, now that we have transfered to the boolean domain, we are left to bound the k-norm of
a noisy function on {±1}nR based on its one-norm. This follows from Hypercontractivity in the boolean
setting, which bounds a higher norm of any noisy function on boolean domain in terms of a lower norm.
The description above hides several technical complications. For example, when we pass from a function
[R]n → [0, 1] to its “boolean analog” {±1}nR → R, the range of the resulting function is no longer
bounded to [0, 1]. This, along with the necessary degree truncation, means we must be careful when
bounding norms. Further, Hypercontractivity only allows us to pass from k-norms to (1 + ε)-norms for
small ε, so we cannot use the known 1-norm directly. For details on how we handle these issues, see
Section 3. This allows us to prove soundness of our dictator test without passing through results on
Gaussian space, as was done to prove the “Majority is Stablest” conjecture [MOO10] at the core of the
[KKMO07] 2-query dictator test.
To extend our result to work with d-to-1 Games Conjecture in place of UGC, we observe that our proof
goes through even when we assume a conjecture weaker than the UGC, which we name the One-Sided
Unique Games Conjecture. The only difference between the original UGC and the One-Sided UGC is
that the completeness in UGC is allowed to be any constant smaller than one but the completeness is
a fixed constant for the One-Sided UGC. The conjecture is formalized as Conjecture 3. We show that
the d-to-1 Games Conjecture also implies the One-Sided UGC, which means that our inapproximability
result for Max k-CSPR also holds when we change our assumption to d-to-1 Games.
Lastly, for our approximation algorithm, we simply extend the Kindler, Kolla and Trevisan’s algorithm
by first creating an instance of Max 2-CSPR from Max k-CSPR by projecting each constraint to all
possible subsets of two variables. We then use their algorithm to approximate the instance. Finally, we
set our assignment to be the same as that from KKT algorithm with some probability. Otherwise, we pick
the assignment uniformly at random from [R]. As we shall show in Section 4, with the right probability,
this technique can extend not only the KKT algorithm but any algorithm for Max k′ -CSPR to an
algorithm for Max k-CSPR where k > k′ with some loss in the advantage over the naive randomized
algorithm.
4
1.2
Organization of the Paper
In Section 2, we define notations and list background knowledge that will be used throughout the paper.
Next, we prove our hardness of approximation results, i.e., Theorem 1 and Theorem 2, in Section 3. In
Section 4, we show how to extend Kindler et al.’s algorithm to Max k-CSPR and prove Theorem 3. We
also explicitly present the dictator test that is implicit in our hardness proof, in Section 5. Finally, in
Section 6, we discuss interesting open questions and directions for future works.
2
Preliminaries
In this section, we list notations and previous results that will be used to prove our results.
2.1
Max k-CSPR
We start by giving a formal definition of Max k-CSPR , which is the main focus of our paper.
Definition 1 (Max k-CSPR ) An instance (X , C) of (weighted) Max k-CSPR consists of
• A set X = {x1 , . . . , xn } of variables.
• A set C = {C1 , . . . ,P
Cm } of constraints. Each constraint Ci is a triple (Wi , Si , Pi ) of a positive weight
m
Wi > 0 such that
Wi = 1, a subset of variables Si ⊆ X , and a predicate Pi : [R]Si → {0, 1}
i=1
that maps each assignment to variables in Si to {0, 1}. Here we use [R]Si to denote the set of all
functions from Si to [R], i.e., [R]Si = {ψ : Si → [R]}.
For each assignment of variables ϕ
P: mX → [R], we define its value to be the total weights of the predicates
Wi Pi (ϕ |Si ). The goal is to find an assignment ϕ : X → [R] that
satisfied by this assignment, i.e.,
i=1
with maximum value. We sometimes call the optimum the value of (X , C).
Note that, while the standard definition of Max k-CSPR refers to the unweighted version where W1 =
· · · = Wm = 1/m, Crescenzi, Silvestri and Trevisan showed that the approximability of these two cases
are essentially the same [CST01].2 Hence, it is enough for us to consider just the weight version.
2.2
Unique Games and d-to-1 Conjectures
In this subsection, we give formal definitions for unique games, d-to-1 games and Khot’s conjectures
about them. First, we give a formal definition of unique games.
Definition 2 (Unique Game) A unique game (V, W, E, N, {πe }e∈E ) consists of
• A bipartite graph G = (V, W, E).
• Alphabet size N .
• For each edge e ∈ E, a permutation πe : [N ] → [N ].
For an assignment ϕ : V ∪ W → [N ], an edge e = (v, w) is satisfied if πe (ϕ(v)) = ϕ(w). The goal is to
find an assignment that satisfies as many edges as possible. We define the value of an instance to be the
fraction of edges satisfied in the optimum solution.
The Unique Games Conjecture states that it is NP-hard to distinguish an instance of value close one
from that of value almost zero. More formally, it can be stated as follows.
2 More specifically, they proved that, if the weighted version is NP-hard to approximate to within ratio r, then the unweighted
version is also NP-hard to approximate to within r − on (1) where on (1) represents a function such that on (1) → 0 as n → ∞.
5
Conjecture 1 (Unique Games Conjecture) For any sufficiently small η, γ, it is NP-hard to distinguish a unique game of value at least 1 − η from that of value at most γ.
Next, we define d-to-1 games, which is similar to unique games except that each constraint is a d-to-1
function instead of a permutation.
Definition 3 (d-to-1 Game) A d-to-1 game (V, W, E, N, {πe }e∈E ) consists of
• A bipartite graph G = (V, W, E).
• Alphabet size N .
• For each edge e ∈ E, a function πe : [N ] → [N/d] such that |πe−1 (σ)| = d for every σ ∈ [N/d].
Satisfiability of an edge, the goal, and an instance’s value of is defined similar to that of unique games.
In contrast to the UGC, d-to-1 Conjecture requires perfect completeness, i.e., it states that we cannot
distinguish even a full satisfiable d-to-1 game from one with almost zero value.
Conjecture 2 (d-to-1 Conjecture) For any sufficiently small γ, it is NP-hard to distinguish a d-to-1
game of value 1 from that of value at most γ.
2.3
Fourier Expansions
For any function g : [q]n → R over a finite alphabet [q], we define the Fourier expansion of g as follows.
Consider the space of all functions [q] → R, with the inner-product hu, vi := Ex∈[q] [u(x)v(x)], where the
expectation is over a uniform x ∈ [q]. Pick an orthonormal basis l1 , . . . , lq for this space li : Σ → R, such
that l1 is the constant function 1. We can now write g in the tensor-product basis, as
g(x1 , x2 , . . . , xn ) =
X
s∈[q]n
ĝ(s) ·
n
Y
ls(i) (xi ).
(1)
i=1
Since we pick l1 (x) = 1 for all x ∈ [q], we also have Ex∈[q] [li (x)] = hli , l1 i = 0 for every i 6= 1.
Throughout, we use ĝ to refer to the Fourier coefficients of a function g.
For functions g : [q]n → R, the p-norm is defined as
p 1/p
E [|g(x)| ] .
||g||p =
(2)
x∈[q]n
In particular, the squared 2-norm is
||g||22 =
2.3.1
2
E n [g(x) ] =
x∈[q]
X
ĝ(s)2 .
(3)
s∈[q]n
Noise Operators
ρ
For x ∈ [q]n , let y ← x denote that y is a ρ-correlated copy of x. That is, each coordinate yi is
independently chosen to be equal to xi with probability ρ, or chosen uniformly at random otherwise.
Define the noise operator Tρ acting on any function g : [q]n → R as
(Tρ g)(x) = E [g(y)].
(4)
ρ
y ←x
Notice that the noise operator Tρ acts on the Fourier coefficients on this basis as follows.
f (x) = Tρ g(x) =
X
s∈[q]n
ĝ(s) · ρ|s| ·
where |s| is defined as |{i | s(i) 6= 1}|.
6
n
Y
i=1
ls(i) (xi )
(5)
2.3.2
Degree Truncation
For any function g : [q]n → R, let g ≤d denote the (≤ d)-degree part of g, i.e.,
g
≤d
X
(x) =
s∈[q]n ,|s|≤d
ĝ(s) ·
n
Y
ls(i) (xi ),
(6)
i=1
and similarly let g >d : [q]n → R denote the (> k)-degree part of g, i.e.,
X
g >d (x) =
s∈[q]n ,|s|>d
ĝ(s) ·
n
Y
ls(i) (xi ).
(7)
i=1
Notice that degree-truncation commutes with the noise-operator, so writing Tρ g ≤d is unambiguous.
Also, notice that truncating does not increase 2-norm:
||g ≤d ||22 =
X
s∈[q]n ,|s|≤d
ĝ(s)2 ≤
X
s∈[q]n
ĝ(s)2 = ||g||22 .
(8)
We frequently use the fact that noisy functions have small high-degree contributions. That is, for any
function g : [q]n → [0, 1], we have
||Tρ g >d ||22 =
2.3.3
X
s∈[q]n ,|s|>d
ρ2|s| ĝ(s)2 ≤ ρ2d
X
s∈[q]n
ĝ(s)2 = ρ2d ||g||22 ≤ ρ2d .
(9)
Influences
For any function g : [q]n → R, the influence of coordinate i ∈ [n] is defined as
Infi [g] =
E [V arxi ∈[q] [g(x) | {xj }j6=i ]].
x∈[q]n
(10)
This can be expressed in terms of the Fourier coefficients of g as follows:
X
Infi [g] =
ĝ(s)2 .
(11)
s∈[q]n : s(i)6=1
Further, the degree-d influences are defined as
Infi≤d [g] = Infi [g ≤d ] =
X
ĝ(s)2 .
(12)
s∈[q]n :
|s|≤d, s(i)6=1
2.3.4
Binary Functions
The previous discussion of Fourier analysis can be applied to boolean functions, by specializing to q =
2. However, in this case the Fourier expansion can be written in a more convenient form. Let G :
{+1, −1}n → R be a boolean function over n bits. We can choose orthonormal basis functions l1 (y) = 1
and l2 (y) = y, so G can be written as
G(y) =
X
S⊆[n]
for some coefficients Ĝ(S).
7
Ĝ(S)
Y
i∈S
yi
(13)
Degree-truncation then results in
X
G≤d (y) =
Ĝ(S)
Y
yi ,
(14)
i∈S
S⊆[n]:|S|≤d
and the noise-operator acts as follows:
X
Tρ G(y) =
Ĝ(S)ρ|S|
yi .
(15)
i∈S
S⊆[n]
2.3.5
Y
Boolean Analogs
To analyze k-CSPR , we will want to translate between functions over [R]n to functions over {±1}nR .
The following notion of boolean analogs will be useful.
For any function g : [R]n → R with Fourier coefficients ĝ(s), define the boolean analog of g to be a
function {g} : {±1}n×R → R such that
{g}(z) =
Note that
X
s∈[R]n
||g||22 =
and that
ĝ(s) ·
X
s∈[R]n
Y
zi,s(i) .
(16)
i∈[n],s(i)6=1
ĝ(s)2 = ||{g}||22 ,
{g ≤d } = {g}≤d .
(17)
(18)
Moreover, the noise operator acts nicely on {g} as follows:
Tρ {g} = {Tρ g}.
(19)
For simplicity, we use Tρ to refer to both boolean and non-boolean noise operators with correlation ρ.
2.4
Invariance Principle and Mollification Lemma
We start with the Invariance Principle in the form of Theorem 3.18 in [MOO10]:
Theorem 4 (General Invariance Principle [MOO10]) Let f : [R]n → R be any function such that
V ar[f ] ≤ 1, Infi [f ] ≤ δ, and deg(f ) ≤ d. Let F : {±1}nR → R be its boolean analog: F = {f }. Consider
any “test-function” ψ : R → R that is C 3 , with bounded 3rd-derivative |ψ ′′′ | ≤ C everywhere. Then,
E
y∈{±1}nR
[ψ(F (y))] −
√
d d/2
δ.
E n [ψ(f (x))] ≤ C10 R
(20)
x∈[R]
Note that the above version follows directly
from Theorem 3.18 and Hypothesis 3 of [MOO10], and the
√
fact that uniform ±1 bits are (2, 3, 1/ 2)-hypercontractive as described in [MOO10].
As we shall see later, we will want to apply the Invariance Principle for some functions ψ that are not in
C 3 . However, these functions will be Lipschitz-continuous with some constant c ∈ R (or “c-Lipschitz”),
meaning that
|ψ(x + ∆) − ψ(x)| ≤ c|∆| for all x, ∆ ∈ R.
(21)
e that is that is C 3 ,
Therefore, similar to Lemma 3.21 in [MOO10], we can “smooth” it to get a function ψ
and has arbitrarily small pointwise difference to ψ.
Lemma 1 (Mollification Lemma [MOO10]) Let ψ : R → R be any c-Lipschitz function. Then for
e : R → R such that
any ζ > 0, there exists a function ψ
8
e ∈ C3,
• ψ
e − ψ||∞ ≤ ζ, and,
• ||ψ
e′′′ ||∞ ≤ Cc
e 3 /ζ 2 .
• ||ψ
e not depending on ζ, c.
For some universal constant C,
For completeness, the full proof of the lemma can be found in Appendix A.1.
Now we state the following version of the Invariance Principle, which will be more convenient to invoke.
It can be proved simply by just combining the two previous lemmas. We list a full proof in Appendix A.2.
Lemma 2 (Invariance Principle) Let ψ : R → R be one of the following functions:
1. ψ1 (t) := |t|,
2. ψk (t) :=
k
t
0
1
if t ∈ [0, 1],
if t < 0,
if t ≥ 1.
Let f : [R]n → [0, 1] be any function with all Infi≤d [f ] ≤ δ. Let F : {±1}nR → R be its boolean analog:
F = {f }. Let f ≤d : [R]n → R denote f truncated to degree d, and similarly for F ≤d : {±1}nR → R.
Then, for parameters d = 10k log R and δ = 1/(R10+100k log(R) ), we have
E
y∈{±1}nR
2.5
[ψ(F ≤d (y))] −
k
≤d
E [ψ(f (x))] ≤ O(1/R ).
(22)
x∈[R]n
Hypercontractivity Theorem
Another crucial ingredient in our proof is the hypercontractivity lemma, which says that, on {±1}n
domain, the operator Tρ smooths any function so well that the higher norm can be bound by the lower
norm of the original (unsmoothed) function. Here we use the version of the theorem as stated in [O’D14].
Theorem 5 (Hypercontractivity Theorem [O’D14]) Let 1 ≤ p ≤ q ≤ ∞. For any ρ ≤
n
for any function h : {±1} → R, the following inequality holds:
||Tρ h||q ≤ ||h||p .
p
In particular, for choice of parameter ρ = 1/
q
p−1
q−1
and
(23)
(k − 1) log R, we have
||T2ρ h||k ≤ ||h||1+ε .
(24)
where ε = 4/ log(R).
3
Inapproximability of Max k-CSPR
In this section, we prove Theorem 1 and Theorem 2. Before we do so, we first introduce a conjecture,
which we name One-Sided Unique Games Conjecture. The conjecture is similar to UGC except that the
completeness parameter ζ is fixed in contrast to UGC where the completeness can be any close to one.
Conjecture 3 (One-Sided Unique Games Conjecture) There exists ζ < 1 such that, for any sufficiently small γ, it is NP-hard to distinguish a unique game of value at least ζ from that of value at most
γ.
9
It is obvious that the UGC implies One-Sided UGC with ζ = 1 − η for any sufficiently small η. It is
also not hard to see that, by repeating each alphabet on the right d times and spreading each d-to-1
constraint out to be a permutation, d-to-1 Games Conjecture implies One-Sided UGC with ζ = 1/d. A
full proof of this can be found in Appendix B.
Since both UGC and d-to-1 Games Conjecture imply One-Sided UGC, it is enough for us to show the
following theorem, which implies both Theorem 1 and Theorem 2.
Theorem 6 Unless the One-Sided Unique Games Conjecture is false, for any k ≥ 2 and any sufficiently
large R, it is NP-hard to approximate Max k-CSPR to within 2O(k log k) (log R)k/2 /Rk−1 factor.
The theorem will be proved in Subsection 3.3. Before that, we first prove an inequality that is the heart
of our soundness analysis in Subsection 3.2.
3.1
Parameters
We use the following parameters throughout, which we list for convenience here:
p
• Correlation: ρ = 1/ (k − 1) log R
• Degree: d = 10k log R
• Low-degree influences: δ = 1/(R10+100k log(R) )
3.2
Hypercontractivity for Noisy Low-Influence Functions
Here we show a version of hypercontractivity for noisy low-influence functions over large domains. Although hypercontractivity does not hold in general for noisy functions over large domains, it turns out
to hold in our setting of high-noise and low-influences. The main technical idea is to use the Invariance
Principle to reduce functions over larger domains to boolean functions, then apply boolean hypercontractivity.
Lemma 3 (Main Lemma) Let g : [R]n → [0, 1] be any function with Ex∈[R]n [g(x)] = 1/R. Then, for
our choice of parameters ρ, d, δ: If Infi≤d [g] ≤ δ for all i, then
k
O(k)
/Rk .
E [(Tρ g(x)) ] ≤ 2
x∈[R]n
Before we present the full proof, we outline the high-level steps below. Let f = Tρ g, and define boolean
analogs G = {g}, and F = {f }. Let ψk : R → R be defined as in Lemma 2. Then,
k
≤d
E [f (x) ] ≈ E[ψk (f (x))]
x∈[R]n
(Lemma 2: Invariance Principle)
(Definition of ψk )
(Definition of F )
≈
(Invariance, etc.)
(Since E[|g|] = 1/R)
Proof.
10
[ψk (F ≤d (y))]
(26)
≤ ||F ≤d ||kk
(27)
=
(28)
=
(Hypercontractivity, for small ε)
E
y∈{±1}nR
(25)
≤
||Tρ G≤d ||kk
||T2ρ T1/2 G≤d ||kk
||T1/2 G≤d ||k1+ε
O(k)
(29)
(30)
≈2
||g||k1
(31)
=2
/R .
(32)
O(k)
k
To establish line (25), first notice that
ψk (f (x)) = ψk (f ≤d (x) + f >d (x)) ≤ ψk (f ≤d (x)) + k|f >d (x)|
(33)
where the last inequality is because the function ψk is k-Lipschitz.
Moreover, since g(x) ∈ [0, 1], we have f (x) ∈ [0, 1], so
f (x)k = ψk (f (x)).
(34)
Thus,
k
E[f (x) ] = E[ψk (f (x))]
≤ E[ψk (f
≤d
= E[ψk (f
≤d
≤ E[ψk (f
≤d
(35)
(x))] + k E[|f
>d
(x))] + k||f
>d
(x))] + k||f
>d
(x)|]
(36)
||1
(37)
||2 .
(38)
(39)
And we can bound the 2-norm of f >d , since f is noisy, we have
||f >d ||22 = ||Tρ g >d ||22 ≤ ρ2d ≤ O(1/R2k ).
(40)
The last inequality comes from our choice of ρ and d.
So line (25) is established:
k
≤d
k
E[f (x) ] ≤ E[ψk (f (x))] + O(k/R ).
(41)
Line (26) follows directly from our version of the Invariance Principle (Lemma 2), for the function ψk :
≤d
E [ψk (f (x))] ≤
x∈[R]n
E
y∈{±1}nR
[ψk (F ≤d (y))] + O(1/Rk ).
(42)
We can now rewrite Ey∈{±1}nR [ψk (F ≤d (y))] as
E
y∈{±1}nR
[ψk (F ≤d (y))] ≤
E
[|F ≤d (y)|k ]
(43)
y∈{±1}nR
= ||F ≤d ||kk
(44)
=
(45)
=
||Tρ G≤d ||kk
||T2ρ T1/2 G≤d ||kk .
(46)
(47)
Now, from the Hypercontractivity Theorem, Equation (24), we have
||T2ρ T1/2 G≤d ||k ≤ ||T1/2 G≤d ||1+ε
(48)
for ε = 4/ log R. This establishes line (30):
||T2ρ T1/2 G≤d ||kk ≤ ||T1/2 G≤d ||k1+ε = E[|T1/2 G≤d (y)|1+ε ]k/(1+ε) .
(49)
To show the remaining steps, we will apply the Invariance Principle once more. Notice that for all
t ∈ R : |t|1+ε ≤ |t| + t2 . Hence, we can derive the following bound:
≤d
E[|T1/2 G
(y)|1+ε ] ≤ E[|T1/2 G≤d (y)|] + E[(T1/2 G≤d (y))2 ]
(Matching Fourier expansion)
(Lemma 2, Invariance Principle)
≤d
= E[|T1/2 G
≤ E[|T1/2 g
11
≤d
(y)|] + E[(T1/2 g
(x)|] + E[(T1/2 g
≤d
≤d
(50)
2
(y)) ]
2
(51)
k
(x)) ] + O(1/R ).
(52)
Here we applied our Invariance Principle (Lemma 2) for the function ψ1 as defined in Lemma 2. We will
bound each of the expectations on the RHS, using the fact that g is balanced, and T1/2 g is noisy.
First,
≤d
>d
E[|T1/2 g (x)|] = E[|T1/2 g(x) − T1/2 g (x)|]
(Triangle Inequality)
≤ E[|T1/2 g(x)|] + E[|T1/2 g
= ||g||1 + ||T1/2 g
≤ ||g||1 + ||T1/2 g
(By our choice of d)
≤ 1/R + (1/2)
>d
>d
d
>d
(x)|]
(53)
(54)
||1
(55)
||2
(56)
= O(1/R).
(57)
(58)
Second,
E[(T1/2 g
≤d
X
(x))2 ] =
(1/2)2|s| ĝ(s)2
(59)
s∈[R]n ,|s|≤d
≤
(Since g ∈ [0, 1])
X
(1/2)2|s| ĝ(s)2
(60)
s∈[R]n
= E[(T1/2 g(x))2 ]
(61)
≤ E[T1/2 g(x)]
(62)
= E[g(x)] = 1/R.
(63)
Finally, plugging these bounds into (52), we find:
||T1/2 G≤d ||k1+ε = E[|T1/2 G≤d (y)|1+ε ]k/(1+ε)
(64)
≤ (O(1/R))
(65)
O(k)
/R
k/(1+ε)
(66)
≤2
/R
k(1−ε)
(67)
=2
k
/R .
(68)
=2
O(k)
(Recall ε = 4/ log R)
k/(1+ε)
O(k)
This completes the proof of the main lemma.
3.3
Reducing Unique Label Cover to Max k-CSPR
Here we reduce unique games to Max k-CSPR . We will construct a PCP verifier that reads k symbols
of the proof (with an alphabet of size R) with the following properties:
• (Completeness) If the unique game has value at least ζ, then the verifier accepts an honest proof
with probability at least c = 1/((log R)k/2 2O(k log k) ).
• (Soundness) If the unique game has value at most γ = 2O(k) δ 2 /(4dRk ), then the verifier accepts
any (potentially cheating) proof with probability at most s = 2O(k) /Rk−1 .
Since each symbol in the proof can be viewed as a variable and each accepting predicate of the verifier can
be viewed as a constraint of Max k-CSPR , assuming the One-sided UGC, this PCP implies NP-hardness
of approximating Max k-CSPR of factor s/c = 2O(k log k) (log R)k/2 /Rk−1 and, hence, establishes our
Theorem 6.
12
3.3.1
The PCP
Given a unique game (V, W, E, n, {πe }e∈E ), the proof is the truth-table of a function hw : [R]n → [R] for
each vertex w ∈ W . By folding, we can assume hw is balanced, i.e. hw takes on all elements of its range
with equal probability: Prx∈[R]n [hw (x) = i] = 1/R for all i ∈ [R]. 3
Notationally, for x ∈ [R]n , let (x ◦ π) denote permuting the coordinates of x as: (x ◦ π)i = xπ(i) . Also,
−1
for an edge e = (v, w), we write πe = πv,w , and define πw,v = πv,w
.
The verifier picks a uniformly random vertex v ∈ V , and k independent uniformly random neighbors of v:
w1 , w2 , . . . , wk ∈ W . Then pick z ∈ [R]n uniformly at random, and let x(1) , x(2) , . . . , x(k) be independent
ρ-correlated noisy copies of z (each coordinate xi chosen as equal to zi w.p. ρ, or uniformly at random
otherwise). The verifier accepts if and only if
hw1 (x(1) ◦ πw1 ,v ) = hw2 (x(2) ◦ πw2 ,v ) = · · · = hwk (x(k) ◦ πwk ,v ).
p
To achieve the desired hardness result, we pick ρ = 1/
3.3.2
(69)
(k − 1) log R.
Completeness Analysis
First, note that that we can assume without loss of generality that the graph is regular on V side.4 Let
the degree of each vertex in V be d.
Suppose that the original unique game has an assignment of value at least ζ. Let us call this assignment
ϕ. The honest proof defines hw at each vertex w ∈ W as the long code encoding of this assignment, i.e.,
hw (x) = xϕ(w) . We can written the verifier acceptance condition as follows:
The verifier accepts ⇔ hw1 (x(1) ◦ πw1 ,v ) = · · · = hwk (x(k) ◦ πwk ,v )
⇔ (x
⇔ (x
(1)
(1)
◦ πw1 ,v )ϕ(w1 ) = · · · = (x
)πw1 ,v (ϕ(w1 )) = · · · = (x
(k)
(k)
◦ πwk ,v )ϕ(wk )
)πwk ,v (ϕ(wk )) .
(70)
(71)
(72)
Observe that, if the edges (v, w1 ), . . . , (v, wk ) are satisfied by ϕ, then πw1 ,v (ϕ(w1 )) = · · · =
πwk ,v (ϕ(wk )) = ϕ(v). Hence, if the aforementioned edges are satisfied and x(1) , . . . , x(k) are not
perturbed at coordinate ϕ(v), then (x(1) )πw1 ,v (ϕ(w1 )) = · · · = (x(k) )πwk ,v (ϕ(wk )) .
For each u ∈ V , let su be the number of satisfied edges touching u. Since w1 , . . . , wk are chosen from the
neighbors of v independently from each other, the probability that the edges (v, w1 ), (v, w2 ), . . . , (v, wk )
are satisfied can be bounded as follows:
Pr
v,w1 ,...,wk
=
X
u∈V
=
X
u∈V
= E
u∈V
[(v, w1 ), . . . , (v, wk ) are satisfied]
(73)
Pr
(74)
w1 ,...,wk
[(v, w1 ), . . . , (v, wk ) are satisfied | v = u] Pr[v = u]
(su /d)k Pr[v = u]
(su /d)k
≥ E [su /d]k .
(75)
(76)
(77)
u∈V
3 More precisely, if the truth-table provided is of some function e
hw : [R]n → [R], we define the “folded” function hw as
hw (x1 , x2 , x3 , . . . xn ) := e
hw (x − (x1 , x1 , . . . , x1 )) + x1 , where the ± is over mod R. Notice that the folded hw is balanced, and
also that folding does not affect dictator functions. Thus we define our PCP in terms of hw , but simulate queries to hw using
the actual proof e
hw .
4 See, for instance, Lemma 3.4 in [KR08].
13
Notice that Eu∈V [su /d] is exactly the value of ϕ, which is at least ζ. As a result,
Pr
v,w1 ,...,wk
[(v, w1 ), . . . , (v, wk ) are satisfied] ≥ ζ k .
Furthermore, it is obvious that the probability that x1 , . . . , xk are not perturbedp
at the coordinate ϕ(v)
k
k k
is ρ . As a result, the PCP accepts with probability at least ζ ρ . When ρ = 1/ (k − 1) log R and ζ is
a constant not depending on k and R, the completeness is 1/((log R)k/2 2O(k log k) ).
3.3.3
Soundness Analysis
Suppose that the unique game has value at most γ = 2O(k) δ 2 /(4dRk ). We will show that the soundness
is 2O(k) /Rk−1 .
Suppose for the sake of contradiction that the probability that the verifier accepts Pr[accept] > t =
2Ω(k) /Rk−1 where Ω(·) hides some large enough constant.
ρ
Let hiw (x) : [R]n → {0, 1} be the indicator function for hw (x) = i and let x ← z denote that x is a
ρ-correlated copy of z. We have
Pr[accept] = Pr[hw1 (x(1) ◦ πw1 ,v ) = · · · = hwk (x(k) ◦ πwk ,v )]
=
X
Pr[i = hw1 (x
(1)
i∈[R]
=
X
i
E[hw1 (x
i∈[R]
(Since wi ’s are independent given v) =
X
i∈[R]
Now define gvi : [R]n → [0, 1] as
E
(1)
◦ πw1 ,v ) = · · · = hwk (x
(k)
(78)
◦ πwk ,v )]
◦ πw1 ,v ) · · · hiwk (x(k) ◦ πwk ,v )]
i
(1)
E [hw1 (x
w1
◦ πw1 ,v )] · · · E
wk
[hiwk (x(k)
(80)
◦ πwk ,v )] .
gvi (x) = E [hiw (x ◦ πw,v )]
(79)
(81)
(82)
w∼v
where w ∼ v denotes neighbors w of v.
We can rewrite Pr[accept] as follows:
Pr[accept] =
X
i
E[gv (x
i∈[R]
(Since x
(j)
’s are independent given z) =
X
i∈[R]
=
X
i∈[R]
= E
v
14
E
"
(1)
E
ρ
)gvi (x(2) ) · · · gvi (x(k) )]
[gvi (x)]k
x←z
#
i
k
E [(Tρ gv (z)) ]
(83)
(84)
(85)
v,z
X
i∈[R]
i
k
E[(Tρ gv (z)) .
z
(86)
Next, notice that
X
i∈[R]
i
k
E[(Tρ gv (z)) ] = E
z
z
X
(Tρ gvi (z))k
i∈[R]
≤ E
z
X
i∈[R]
= E Tρ
z
k
(87)
Tρ gvi (z)
(88)
(89)
X
gvi (z)
i∈[R]
= E[(Tρ 1)k ] = 1.
k
(90)
z
Therefore, since Pr[accept] > t, by (86), at least t/2 fraction of vertices v ∈ V have
X
i∈[R]
i
k
E[(Tρ gv (z)) ] ≥ t/2.
(91)
z
For these “good” vertices, there must exist some i ∈ [R] for which
i
k
E[(Tρ gv (z)) ] ≥ t/(2R).
(92)
k
Ω(k)
i
/Rk .
E[(Tρ gv (z)) ] > 2
(93)
z
Then for “good” v and i as above,
z
By Lemma 3 (Main Lemma), this means gvi has some coordinate j for which
Infj≤d [gvi ] > δ
(94)
for our choice of d, δ as defined in Subsection 3.1. Pick this j as the label of vertex v ∈ V .
Now to pick the label of a vertex w ∈ W , define the candidate labels as
Cand[w] = {j ∈ [n] : ∃ i ∈ [R] s.t. Infj≤d [hiw ] ≥ δ/2}.
(95)
Notice that
X
j∈[n]
Infj≤d [hiw ] =
X
s∈[R]n : |s|≤d
|s|ĥiw (s)2 ≤ d
X
s:|s|>0
ĥiw (s)2 = d V ar[hiw ] ≤ d.
(96)
So for each i ∈ [R], the projection hiw can have at most 2d/δ coordinates with influence ≥ δ/2. Therefore
the number of candidate labels is bounded:
|Cand[w]| ≤ 2dR/δ.
(97)
Now we argue that picking a random label in Cand[w] for w ∈ W is in expectation a good decoding. We
will show that if we assigned label j to a “good” v ∈ V , then πv,w (j) ∈ Cand[w] for a constant fraction
−1
of neighbors w ∼ v. Note here that πv,w = πw,v
.
First, since gvi (x) = Ew∼v [hiw (x ◦ πw,v )], the Fourier transform of gvi is related to the Fourier transform
of the long code labels hiw as
ĝvi (s) = E [ĥiw (s ◦ πw,v )].
w∼v
15
(98)
Hence, the influence Infj≤d [gvi ] of being large implies the expected influence Inf ≤d
−1
πv,w (j)
[hiw ] of its neighbor
labels w ∼ v is also large as formalized below.
δ < Infj≤k [gvi ] =
X
ĝvi (s)2
(99)
n
s∈[R]
|s|≤k,sj 6=1
=
≤
X
X
i
2
E [ĥw (s ◦ πw,v ) ]
(101)
X
n
s∈[R]
|s|≤k,sj 6=1
= E [
w∼v
(100)
w∼v
= E [
w∼v
i
2
E [ĥw (s ◦ πw,v )]
w∼v
X
ĥiw (s ◦ πw,v )2 ]
ĥiw (s)2 ]
(103)
ĥiw (s)2 ]
(104)
n
s∈[R]
|s|≤k,s −1
πw,v (j)
−1
(Since πv,w = πw,v
)= E [
w∼v
(102)
X
6=1
s∈[R]n
|s|≤k,sπv,w (j) 6=1
= E [Infπ≤d
[hiw ]]
v,w (j)
(105)
w∼v
[hiw ] ≥ δ/2, and so πv,w (j) ∈
Therefore, at least δ/2 fraction of neighbors w ∼ v must have Infπ≤d
v,w (j)
Cand[w] for at least δ/2 fraction of neighbors of “good” vertices v.
Finally, recall that at least (t/2) fraction of vertices v ∈ V are “good”. These vertices have at least (δ/2)
fraction of neighbors w ∈ W with high-influence labels and the matching label w ∈ W is picked with
probability at least δ/(2dR). Moreover, as stated earlier, we can assume that the graph is regular on V
side. Hence, the expected fraction of edges satisfied by this decoding is at least
(t/2)(δ/2)(δ/2dR) = tδ 2 /(4dR) = 2Ω(k) δ 2 /(4dRk ) > γ,
(106)
which contradicts our assumption that the unique game has value at most γ. Hence, we can conclude
that the soundness is at most 2O(k) /Rk−1 as desired.
4
Ω(log R/Rk−1)-Approximation Algorithm for Max k-CSPR
Instead of just extending the KKT algorithm to work with Max k-CSPs, we will show a more generalized statement that any algorithm that approximates Max CSPs with small arity can be extended
′
to approximate Max CSPs with larger arities. In particular, we show how to extend any f (R)/Rk ′
O(min{k′ ,k−k′ })
k
approximation algorithm for Max k -CSPR to an (f (R)/2
)/R -approximation algorithm
for Max k-CSPR where k > k′ .
Since the naive algorithm that assigns every variable randomly has an approximation ratio of 1/Rk , we
think of f (R) as the advantage of algorithm A over the randomized algorithm. From this perspective,
′
′
our extension lemma preserves the advantage up to a factor of 1/2O(min{k ,k−k }) .
The extension lemma and its proof are stated formally below.
Lemma 4 Suppose that there exists a polynomial-time approximation algorithm A for Max k′ -CSPR
′
that outputs an assignment with expected value at least f (R)/Rk times the optimum. For any k > k′ , we
can construct a polynomial-time approximation algorithm B for Max k-CSPR that outputs an assignment
′
′
with expected value at least (f (R)/2O(min{k ,k−k }) )/Rk times the optimum.
16
Proof. The main idea of theproof is simple. We turn an instance of Max k-CSPR to an instance of Max
′
k′ -CSPR by constructing kk′ Rk−k new constraints for each original constraint; each new constraint is
a projection of the original constraint to a subset of variables of size k′ . We then use A to solve the newly
constructed instance. Finally, B simply assigns each variable with the assignment from A with a certain
probability and assign it randomly otherwise.
For convenience, let α be
k−k′
.
k
We define B on input (X , C) as follows:
′
1. Create an instance (X , C ) of Max k′ -CSPR with the same variables and, for each C = (W, S, P ) ∈ C
′
′
and for every subset S ′ of S with |S ′ | = k′ and every τ ∈ [R]S−S , create a constraint C S ,τ =
′
′
′
′
′
′
S′
W
(W , S , P ) in C where W = k k−k′ and P : [R] → {0, 1} is defined by
(k ′ )R
P ′ (ψ) = P (ψ ◦ τ ).
Here ψ ◦ τ is defined as follows:
ψ ◦ τ (x) =
if x ∈ S ′ ,
otherwise.
ψ(x)
τ (x)
2. Run A on input (X , C ′ ). Denote the output of A by ϕA .
3. For each x ∈ X , with probability α, pick ϕB (x) randomly from [R]. Otherwise, let ϕB (x) be ϕA (x).
4. Output ϕB .
We now show that ϕB has expected value at least (f (R)/2O(min{k
′
,k−k′ })
)/Rk times the optimum.
′
First, observe that the optimum of (X , C ′ ) is at least 1/Rk−k times that of (X , C). To see that this is
true, consider any assignment ϕ : X → [R] and any constraint C = (W, S, P ). Its weighted contribution
in (X , C) is W P (ϕ|S ). On the other hand, k Wk−k′ P (ϕ|S ) appears kk′ times in (X , C ′ ), once for each
(k ′ )R
′
subset S ′ ⊆ S of size k′ . Hence, the value of ϕ with respect to (X , C ′ ) is at least 1/Rk−k times its value
with respect to (X , C)
′
Recall that the algorithm A gives an assignment of expected value at least f (R)/Rk times the optimum
of (X , C ′ ). Hence, the expected value of ϕA is at least f (R)/Rk times the optimum of (X , C).
Next, we will compute the expected value of ϕB (with respect to (X , C)). We start by computing the
expected value of ϕB with respect to a fixed constraint C = (W, S, P ) ∈ C, i.e., EϕB [W P (ϕB |S )]. For
each S ′ ⊆ S of size k, we define DS ′ as the event where, in step 3, ϕB (x) is assigned to be ϕA (x) for all
x ∈ S ′ and ϕB (x) is assigned randomly for all x ∈ S − S ′ .
Since DS ′ is disjoint for all S ′ ⊆ S of size k, we have the following inequality.
X
E [W P (ϕB |S )] ≥
ϕB
′
S ′ ⊆S
|S ′ |=k
′
Pr[DS ′ ] E [W P (ϕB |S ) | DS ′ ]
(107)
ϕB
′
(Since Pr[DS ′ ] = αk−k (1 − α)k ) = αk−k (1 − α)k
′
X
S ′ ⊆S
|S ′ |=k
W E [P (ϕB |S ) | DS ′ ]
(108)
ϕB
Moreover, since every vertex in S − S ′ is randomly assigned when DS ′ occurs, E[P (ϕB |S ) | DS ′ ] can be
′
view as the average value of P ((ϕA |S ′ ) ◦ τ ) over all τ ∈ [R]S−S . Hence, we can derive the following:
E [P (ϕB |S ) | DS ′ ] =
ϕB
1
Rk−k′
As a result, we have
k−k′
E [W P (ϕB |S )] ≥
ϕB
α
(1 − α)
Rk−k′
k′
E
ϕA
X
τ ∈[R]
X
E
ϕA
17
S−S ′
P ((ϕA |S ′ ) ◦ τ ) .
X
S ′ ⊆S τ ∈[R]S−S ′
|S ′ |=k
(109)
W P ((ϕA |S ′ ) ◦ τ ) .
(110)
By summing (110) over all constraints C ∈ C, we arrive at the following inequality.
E
ϕB
X
C=(W,S,P )∈C
k−k′
≥
=
=
α
(1 − α)
Rk−k′
W P (ϕB |S )
k′
E
ϕA
(111)
X
C=(W,S,P )∈C
X
′
′
k
αk−k (1 − α)k E
k′
ϕA
S ′ ⊆S τ ∈[R]S−S ′
|S ′ |=k
C=(W,S,P )∈C
X
′
′
k
αk−k (1 − α)k E
k′
ϕA
X
X
X
X
S ′ ⊆S τ ∈[R]S−S ′
|S ′ |=k
C ′ =(W ′ ,S ′ ,P ′ )∈C
k
k′
′
W
P ((ϕA |S ′ ) ◦ τ )
Rk−k′
W P (ϕA |S ′ )
′
(112)
W P ((ϕA |S ′ ) ◦ τ )
(113)
(114)
′
′
The first expression is the expected value of ϕB whereas the last is kk′ αk−k (1 − α)k times the expected
value of ϕA . Since the expected value of ϕA is at least f (R)/Rk times the optimum of (X , C), the
′
′
expected value of ϕB is at least ( kk′ αk−k (1 − α)k )(f (R)/Rk ) times the optimum of (X , C).
Finally, we substitute α =
k−k′
k
in to get
k − k′
k
k−k′
k′
′
′
k
αk−k (1 − α)k =
k′
Let l = min{k′ , k − k′ }. We then have
k
k′
k − k′
k
k
k′
k′
k
k−k′
=
k′
k
k
l
k′
k−l
k
l
.
k−l l
k−l
k
l
k
k−l k
≥
k
≥
l
k
k−l l
= (1 − l/k)2k/l
2l
(From Bernoulli’s inequality and from l ≤ k/2) ≥ 1/2 .
(115)
l
k
2l
(116)
(117)
(118)
(119)
(120)
Hence, ϕB has expected value at least (f (R)/2O(l) )/Rk times the optimum of (X , C), which completes
the proof of this lemma.
Finally, Theorem 3 is an immediate consequence of applying Lemma 4 to the algorithm from [KKT15]
with k′ = 2 and f (R) = Ω(R log R).
5
k-Query Large Alphabet Dictator Test
We remark that the results of Section 3 also implicitly yield a k-query nonadaptive Dictator-vs.Quasirandom test for functions over large alphabet.
A Dictator-vs.-Quasirandom test aims to
distinguish dictator functions from functions with small low-degree influences (“quasirandom”). This
concept was essentially introduced in [Hås96], and we borrow the “quasirandom” terminology from
[OW09a] (adapted here for functions over non-binary alphabets). Specifically, we have the following
test:
18
i
Theorem 7 For any function f : [R]n → [R], and any i ∈ [R], let fp
: [R]n → {0, 1} denote the
indicator function for f (x) = i. For any k, R ≥ 2, set parameters ρ = 1/ (k − 1) log R, d = 10k log R,
and δ = 1/(R10+100k log(R) ). Then there exists a k-query nonadaptive Dictator-vs.Quasirandom test with
the following guarantees:
• (Completeness) If f is a dictator, i.e. f (x) = xj for some coordinate j ∈ [n], then the test passes
with probability at least
ρk = 1/((log R)k/2 2O(k log k) )
• (Soundness) If f has Infj≤d [f i ] ≤ δ for all coordinates j ∈ [n] and all projections i ∈ [R], then
the test passes with probability at most
2O(k) /Rk−1
Notice that if we assume f is balanced, then this theorem is immediately implied by the techniques of
Section 3. However, to extend this to general functions via “folding”, we must technically show that
the operation of folding keeps low-influence functions as low-influence. The full proof can be found in
Appendix C.
6
Conclusions and Open Questions
We conclude by posting interesting open questions regarding the approximability of Max k-CSPR and
providing our opinions on each question. First, as stated earlier, even with our results, current inapproximability results do not match the best known approximation ratio achievable in polynomial time when
3 ≤ k < R. Hence, it is intriguing to ask what the right ratio that Max k-CSPR becomes NP-hard
to approximate is. Since our hardness factor 2O(k log k) (log R)k/2 /Rk−1 does not match Chan’s hardness
factor O(k/Rk−2 ) when k = R, it is likely that there is a k between 3 and R − 1 such that a drastic
change in the hardness factor, and technique that yields that factor, occurs.
Moreover, since our PCP has completeness of 1/(2O(k) (log R)k/2 ), even if one cannot improve on the
inapproximability factor, it is still interesting if one can come up with a hardness result with almost
perfect completeness. √In fact, even for k = 2, there is no known hardness of approximation of factor
better than O(log R/ R) with near perfect completeness whereas the best UGC-hardness known is
O(log R/R).
It is also interesting to try to relax assumptions for other known inapproximability results from UGC
to the One-Sided UGC. Since the One-Sided UGC is implied by d-to-1 Games Conjecture, doing so will
imply inapproximability results based on the d-to-1 Games Conjecture. Moreover, without going into too
much detail, we remark that most attempts to refute the UGC and the d-to-1 Conjecture need the value
of the game to be high [ABS15, CMM06a, CMM06b, GT06, Kho02, Kol11, Tre08]. Hence, these algorithms are not candidates to refute the One-Sided UGC. In addition, Arora, Barak and Steurer’s [ABS15]
subexponential time algorithm for unique games suggest that unique games have intermediate complexity,
meaning that, even if the UGC is true, the UGC-hardness would not imply exponential time lower bounds.
On the other hand, to the best of the authors’ knowledge, the ABS algorithm does not run in subexponential time when the completeness is small. Hence, the One-Sided UGC may require exponential time
to solve, which could give similar running time lower bounds for the resulting hardness of approximation
results. Finally, there are evidences suggesting that relaxing completeness or soundness conditions of a
conjecture can make it easier; the most relevant such result is that from Feige and Reichman who proved
that, if one only cares about the approximation ratio and not completeness and soundness, then unique
game is hard to approximate to within factor ε for any ε > 0 [FR04].
References
[ABS15]
Sanjeev Arora, Boaz Barak, and David Steurer. Subexponential algorithms for unique games
and related problems. J. ACM, 62(5):42, 2015.
19
[AM08]
P. Austrin and E. Mossel. Approximation resistant predicates from pairwise independence.
In Computational Complexity, 2008. CCC ’08. 23rd Annual IEEE Conference on, pages
249–258, June 2008.
[Cha13]
Siu On Chan. Approximation resistance from pairwise independent subgroups. In Proceedings
of the Forty-fifth Annual ACM Symposium on Theory of Computing, STOC ’13, pages 447–
456, New York, NY, USA, 2013. ACM.
[CHK11]
Moses Charikar, MohammadTaghi Hajiaghayi, and Howard Karloff. Improved approximation
algorithms for label cover problems. Algorithmica, 61(1):190–206, 2011.
[CMM06a] Moses Charikar, Konstantin Makarychev, and Yury Makarychev. Near-optimal algorithms
for unique games. In Proceedings of the Thirty-eighth Annual ACM Symposium on Theory
of Computing, STOC ’06, pages 205–214, New York, NY, USA, 2006. ACM.
[CMM06b] Eden Chlamtac, Konstantin Makarychev, and Yury Makarychev. How to play unique games
using embeddings. In 47th Annual IEEE Symposium on Foundations of Computer Science
(FOCS 2006), 21-24 October 2006, Berkeley, California, USA, Proceedings, pages 687–696,
2006.
[CMM09]
Moses Charikar, Konstantin Makarychev, and Yury Makarychev. Near-optimal algorithms
for maximum constraint satisfaction problems. ACM Transactions on Algorithms, 5(3), 2009.
[CST01]
Pierluigi Crescenzi, Riccardo Silvestri, and Luca Trevisan. On weighted vs unweighted versions of combinatorial optimization problems. Information and Computation, 167(1):10–26,
2001.
[DMR09]
Irit Dinur, Elchanan Mossel, and Oded Regev. Conditional hardness for approximate coloring.
SIAM Journal on Computing, 39(3):843–873, 2009.
[DS10]
Irit Dinur and Igor Shinkar. On the conditional hardness of coloring a 4-colorable graph
with super-constant number of colors. In Proceedings of the 13th International Conference on
Approximation, and 14 the International Conference on Randomization, and Combinatorial
Optimization: Algorithms and Techniques, APPROX/RANDOM’10, pages 138–151, Berlin,
Heidelberg, 2010. Springer-Verlag.
[EH08]
Lars Engebretsen and Jonas Holmerin. More efficient queries in pcps for np and improved
approximation hardness of maximum csp. Random Struct. Algorithms, 33(4):497–514, December 2008.
[Eng05]
Lars Engebretsen. The nonapproximability of non-boolean predicates. SIAM J. Discret.
Math., 18(1):114–129, January 2005.
[FR04]
Uriel Feige and Daniel Reichman. On systems of linear equations with two variables per
equation. In Klaus Jansen, Sanjeev Khanna, JoséD.P. Rolim, and Dana Ron, editors, Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques,
volume 3122 of Lecture Notes in Computer Science, pages 117–127. Springer Berlin Heidelberg, 2004.
[GM15]
Gil Goldshlager and Dana Moshkovitz.
Approximating kCSP for large alphabets.
https://people.csail.mit.edu/dmoshkov/papers/Approximating%20MAX%20kCSP.pdf,
2015.
[GR08]
Venkatesan Guruswami and Prasad Raghavendra. Constraint satisfaction over a non-boolean
domain: Approximation algorithms and unique-games hardness. In Ashish Goel, Klaus
Jansen, JoséD.P. Rolim, and Ronitt Rubinfeld, editors, Approximation, Randomization and
Combinatorial Optimization. Algorithms and Techniques, volume 5171 of Lecture Notes in
Computer Science, pages 77–90. Springer Berlin Heidelberg, 2008.
[GS11]
Venkatesan Guruswami and Ali Kemal Sinop. The complexity of finding independent sets
in bounded degree (hyper)graphs of low chromatic number. In Proceedings of the TwentySecond Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2011, San Francisco,
California, USA, January 23-25, 2011, pages 1615–1626, 2011.
[GT06]
Anupam Gupta and Kunal Talwar. Approximating unique games. In Proceedings of the
Seventeenth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2006, Miami,
Florida, USA, January 22-26, 2006, pages 99–106, 2006.
20
[Hås96]
Johan Håstad. Clique is hard to approximate within n1−ε . In Foundations of Computer
Science, 1996. Proceedings., 37th Annual Symposium on, pages 627–636. IEEE, 1996.
[Has05]
Gustav Hast. Approximating Max kCSP - outperforming a random assignment with almost
a linear factor. In Proceedings of the 32Nd International Conference on Automata, Languages
and Programming, ICALP’05, pages 956–968, Berlin, Heidelberg, 2005. Springer-Verlag.
[IP01]
Russell Impagliazzo and Ramamohan Paturi. On the complexity of k-sat. J. Comput. Syst.
Sci., 62(2):367–375, 2001.
[Kho02]
Subhash Khot. On the power of unique 2-prover 1-round games. In Proceedings of the Thiryfourth Annual ACM Symposium on Theory of Computing, STOC ’02, pages 767–775, New
York, NY, USA, 2002. ACM.
[Kho10]
Subhash Khot. On the unique games conjecture (invited survey). In Proceedings of the
25th Annual IEEE Conference on Computational Complexity, CCC 2010, Cambridge, Massachusetts, June 9-12, 2010, pages 99–121, 2010.
[KKMO07] Subhash Khot, Guy Kindler, Elchanan Mossel, and Ryan O’Donnell. Optimal inapproximability results for MAX-CUT and other 2-variable csps? SIAM J. Comput., 37(1):319–357,
2007.
[KKT15]
Guy Kindler, Alexandra Kolla, and Luca Trevisan. Approximation of non-boolean 2csp.
CoRR, abs/1504.00681, 2015.
[Kol11]
Alexandra Kolla. Spectral algorithms for unique games.
20(2):177–206, 2011.
[KR08]
Subhash Khot and Oded Regev. Vertex cover might be hard to approximate to within 2-ε.
J. Comput. Syst. Sci., 74(3):335–349, May 2008.
[MM14]
Konstantin Makarychev and Yury Makarychev. Approximation algorithm for non-boolean
max-k-csp. Theory of Computing, 10:341–358, 2014.
[MOO10]
Elchanan Mossel, Ryan O’Donnell, and Krzysztof Oleszkiewicz. Noise stability of functions
with low influences: invariance and optimality. Ann. Math. (2), 171(1):295–341, 2010.
[O’D14]
Ryan O’Donnell. Analysis of Boolean Functions. Cambridge University Press, 2014.
[OW09a]
Ryan O’Donnell and Yi Wu. 3-bit dictator testing: 1 vs. 5/8. In Proceedings of the Twentieth
Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2009, New York, NY, USA,
January 4-6, 2009, pages 365–373, 2009.
[OW09b]
Ryan O’Donnell and Yi Wu. Conditional hardness for satisfiable 3-csps. In Proceedings of the
41st Annual ACM Symposium on Theory of Computing, STOC 2009, Bethesda, MD, USA,
May 31 - June 2, 2009, pages 493–502, 2009.
[Rag08]
Prasad Raghavendra. Optimal algorithms and inapproximability results for every csp? In
Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, STOC ’08,
pages 245–254, New York, NY, USA, 2008. ACM.
[ST00]
Alex Samorodnitsky and Luca Trevisan. A PCP characterization of NP with optimal amortized query complexity. In Proceedings of the Thirty-Second Annual ACM Symposium on
Theory of Computing, May 21-23, 2000, Portland, OR, USA, pages 191–199, 2000.
[ST06]
Alex Samorodnitsky and Luca Trevisan. Gowers uniformity, influence of variables, and pcps.
In Proceedings of the Thirty-eighth Annual ACM Symposium on Theory of Computing, STOC
’06, pages 11–20, New York, NY, USA, 2006. ACM.
[Tan09]
Linqing Tang. Conditional hardness of approximating satisfiable max 3csp-q. In Yingfei
Dong, Ding-Zhu Du, and Oscar Ibarra, editors, Algorithms and Computation, volume 5878
of Lecture Notes in Computer Science, pages 923–932. Springer Berlin Heidelberg, 2009.
[Tre98]
Luca Trevisan. Parallel approximation algorithms by positive linear programming. Algorithmica, 21(1):72–88, 1998.
[Tre08]
Luca Trevisan. Approximation algorithms for unique games. Theory of Computing, 4(1):111–
128, 2008.
21
Computational Complexity,
A
Proofs of Preliminary Results
For completeness, we prove some of the preliminary results, whose formal proofs were not found in the
literature by the authors.
A.1
Mollification Lemma
Below is the proof of the Mollification Lemma. We remark that, while its main idea is explained
in [O’D14], the full proof is not shown there. Hence, we provide the proof here for completeness.
Proof. (of Lemma 1) Let p : R → R be a C 4 function supported only on [−1, +1], such that p(y) forms
2
a probability distribution. (For example, an appropriately normalized version of e−1/(1+y ) for |y| ≤ 1).
Define pλ (y) to be re-scaled to have support [−λ, +λ] for some λ > 0:
pλ (y) := (1/λ)p(y/λ).
(121)
Let Yλ be a random variable with distribution pλ (y), supported on [−λ, +λ]. We will set λ = ζ/c.
Now, define
e := E [ψ(x + Yλ )].
ψ
(122)
Yλ
This is pointwise close to ψ, since ψ is c-Lipschitz:
e − ψ(x)| = | E [ψ(x + Yλ ) − ψ(x)]| ≤ E [|ψ(x + Yλ ) − ψ(x)|] ≤ E [c|Yλ |] ≤ cλ = ζ.
|ψ(x)
(123)
Yλ
Yλ
Yλ
e is C 3 , because ψ(x)
e can be written as a convolution:
Further, ψ
(124)
e′′′ is bounded, for a fixed x ∈ R, define the constant z := ψ(x). Then,
To see that ψ
(125)
e = (ψ ∗ pλ )(x) =⇒ ψe′′′ = (ψ ∗ pλ )′′′ = (ψ ∗ p′′′
ψ(x)
λ ).
e′′′ (x)| = |(ψ ∗ p′′′
|ψ
λ )(x)|
′
(z is constant, so z = 0)
= |(ψ ∗
= |(ψ ∗
p′′′
λ
p′′′
λ
−
−
= |((ψ − z) ∗
=
=
≤
(c-Lipschitz)
Z
Z
Z
′
z ∗ p′′λ )(x)|
z ∗ p′′′
λ )(x)|
′′′
pλ )(x)|
(126)
(127)
(128)
+∞
−∞
+∞
−∞
+λ
−λ
p′′′
λ (y)(ψ(x − y) − z)dy
(129)
p′′′
λ (y)(ψ(x − y) − ψ(x))dy
(130)
|p′′′
λ (y)||ψ(x − y) − ψ(x)|dy
≤ ||p′′′
λ ||∞
Z
+λ
−λ
2
|cy|dy
= ||p′′′
λ ||∞ cλ .
e := ||p′′′ ||∞ . We have
Define the universal constant C
4 e
4 ′′′
′′′
p′′′
λ (y) = (1/λ )p (y/λ) =⇒ ||pλ ||∞ ≤ (1/λ )C.
e′′′ (x)| ≤ Cc
e 3 /ζ 2 , which completes the proof of Lemma 1.
With our choice of λ = ζ/c, this yields |ψ
22
(131)
(132)
(133)
(134)
A.2
Proof of Lemma 2
Below we show the proof of Lemma 2.
e by applying Lemma 1 for
Proof. First, we “mollify” the function ψ to construct a C 3 function ψ,
k
ζ = 1/R . Notice that both choices of ψ are k-Lipschitz. Therefore the Mollification Lemma guarantees
e′′′ (x)| ≤ Ck
e 3 R2k for some universal constant C.
e
that |ψ
e is pointwise close to ψ, with deviation at most 1/Rk , we have
Since ψ
E
y∈{±1}nR
[ψ(F ≤d (y))] −
≤d
E [ψ(f (x))] ≤
x∈[R]n
E
y∈{±1}nR
e ≤d (y))] −
[ψ(F
e ≤d (x))] + O(1/Rk ).
E [ψ(f
x∈[R]n
e we have
Applying the General Invariance Principle (Theorem 4) with the function ψ,
E
y∈{±1}nR
e ≤d (y))] −
[ψ(F
√
e ≤d (x))] ≤ Ck
e 3 R2k 10d Rd/2 δ.
E n [ψ(f
(135)
(136)
x∈[R]
By our choice of parameters d, δ, this is O(1/Rk ).
B d-to-1 Games Conjecture implies One-Sided Unique
Games Conjecture
In this section, we prove that if d-to-1 Games Conjecture is true, then so is One-Sided Unique Games
Conjecture.
Lemma 5 For every d ∈ N, d-to-1 Games Conjecture implies One-Sided UGC.
Proof. Suppose that d-to-1 Games Conjecture is true for some d ∈ N. We will prove One-Sided UGC;
more specifically, ζ in the One-Sided UGC is 1/d. The reduction from a d-to-1 game (V, W, E, N, {πe }e∈E )
to a unique game (V ′ , W ′ , E ′ , N ′ , {πe′ }e∈E ) can be described as follows:
• Let V ′ = V, W ′ = W, E ′ = E, and N ′ = N
• We define πe′ as follows. For each θ ∈ [N/d], let the elements of πe−1 (θ) be σ1 , σ2 , . . . , σd ∈ [N ]. We
then define πe′ (σi ) = d(θ − 1) + i.
Now, we will prove the soundness and completeness of this reduction.
(Completeness) Suppose that the d-to-1 game is satisfiable. Let ϕ : V ∪ W → [N ] be the assignment
that satisfies every constraint in the d-to-1 game. We define ϕ′ : V ′ ∪ W ′ → [N ′ ] by first assign
ϕ′ (v) = ϕ(v) for every v ∈ V . Then, for each w ∈ W , pick ϕ′ (w) to be an assignment that satisfies as
many edges touching w in the unique game as possible, i.e., for a fixed w, ϕ′ (w) is select to maximize
′
|{v ∈ N (w) | π(v,w)
(ϕ(v)) = ϕ′ (w)}| where N (w) is the set of neighbors of w. From how ϕ′ (w) is picked,
we have
d
′
|{v ∈ N (w) | π(v,w)
(ϕ(v)) = ϕ′ (w)}| ≥
1X
′
|{v ∈ N (w) | π(v,w)
(ϕ(v)) = d(ϕ(w) − 1) + i}|.
d
(137)
i=1
′
′
Let 1[π(v,w)
(ϕ(v)) = d(ϕ(w) − 1) + i] be the indicating variable whether π(v,w)
(ϕ(v)) = d(ϕ(w) − 1) + i,
we can rewrite the right hand side as follows:
23
d
1X
′
|{v ∈ N (w) | π(v,w)
(ϕ(v)) = d(ϕ(w) − 1) + i}|
d
(138)
i=1
=
d
1X X
′
1[π(v,w)
(ϕ(v)) = d(ϕ(w) − 1) + i]
d
(139)
i=1 v∈N(w)
=
d
1 X X
′
1[π(v,w)
(ϕ(v)) = d(ϕ(w) − 1) + i].
d
(140)
v∈N(w) i=1
′
′
is defined and since π(v,w) (ϕ(v)) = ϕ(w), there exists i ∈ [d] such that π(v,w)
(ϕ(v)) =
From how π(v,w)
d(ϕ(w) − 1) + i. As a result, we have
d
|N (w)|
1 X X
1 X
′
1=
.
1[π(v,w)
(ϕ(v)) = d(ϕ(w) − 1) + i] ≥
d
d
d
v∈N(w) i=1
(141)
v∈N(w)
In other words, at least 1/d fraction of edges touching w is satisfied in the unique game for every w ∈ W .
Hence, ϕ′ has value at least 1/d, which means that the unique game also has value at least 1/d.
(Soundness) Suppose that the value of the d-to-1 game is at most γ. For any assignment ϕ′ : V ′ ∪ W ′ →
[N ′ ] to the unique game, we can define an assignment ϕ : V ∪ W → [N ] by
ϕ(u) =
ϕ′ (u)
⌊(ϕ′ (u) − 1)/d⌋ + 1
if u ∈ V,
if u ∈ W.
(142)
From how πe′ is defined, it is easy to see that, if πe′ (ϕ′ (v)) = ϕ′ (w), then πe (ϕ(v)) = ϕ(w). In other
words, the value of ϕ′ with respect to the unique game is no more than the value of ϕ with respect to
the d-to-1 game. As a result, the value of the unique game is at most ε.
As a result, if it is NP-hard to distinguish a satisfiable d-to-1 game from one with value at most γ, then
it is also NP-hard to distinguish a unique game of value at least ζ = 1/d from that with value at most
γ, which concludes the proof of this lemma.
C
Proof of Dictator Test
Here we prove our result for the Dictator-vs.-Quasirandom test (Theorem 7).
Proof. (of Theorem 7) For c ∈ [R], define the function
fc (x1 , x2 , . . . , xn ) := f (x1 + c, x2 + c, . . . , xn + c) − c.
(143)
Note that ±c is performed modulo R.
The test works as follows: Pick z ∈ [R]n uniformly at random, and let x(1) , x(2) , . . . , x(k) be independent
ρ-correlated noisy copies of z. Then, pick c1 , c2 , . . . , ck independently uniformly at random, where each
ci ∈ [R]. Accept iff
fc1 (x(1) ) = fc2 (x(2) ) = · · · = fck (x(k) ).
(144)
For completeness, notice that if f is a dictator, then fc = f for all c ∈ [R]. Say f is a dictator on the
j-th coordinate: f (x) = xj . Then the test clearly accepts with probability at least ρk (if none of the
ρ
coordinates j were perturbed in all the noisy copies x(i) ← z).
24
For soundness: For any i ∈ [R], let f i : [R]n → {0, 1} denote the indicator function for f (x) = i, and
similarly for fci : [R]n → {0, 1}. Notice that
fci (x) = f i+c (x + (c, c, . . . , c))
(145)
Then, write the acceptance probability as
Pr[accept] =
Pr
ρ
ci ,z,x(j) ←z
=
X
[fc1 (x(1) ) = fc2 (x(2) ) = · · · = fck (x(k) )]
Pr
ρ
(j) ←z
i∈[R] ci ,z,x
=
(Independence of ci )
=
X
E
ρ
(j) ←z
i∈[R] ci ,z,x
X
E
i∈[R] z,x
ρ
(146)
[i = fc1 (x(1) ) = fc2 (x(2) ) = · · · = fck (x(k) )]
(147)
[fci1 (x(1) )fci2 (x(2) ) . . . fcik (x(k) )]
(148)
[ E [fci1 (x(1) )] E [fci2 (x(2) )] . . . E [fcik (x(k) )]].
(j) ←z c1
c2
(149)
c2
(150)
If we define the function g i : [R]n → [0, 1] as
g i (x) := E[fci (x)].
(151)
c
Then this acceptance probability is
Pr[accept] =
X
[g i (x(1) )g i (x(2) ) . . . g i (x(k) )]
E
ρ
(152)
i∈[R] z,xi ←z
=
X
i∈[R]
i
k
E[(Tρ g (z)) ].
(153)
z
Notice that Ex [g i (x)] = 1/R, because
i
i
i+c
E[g (x)] = E [fc (x)] = E [f (x + (c, c, . . . , c))]
x
x,c
(c, x same joint distribution as i + c, x + c)
(154)
x,c
= E [f c (x)]
(155)
x,c
= E[E[f c (x)]] = E[1/R] = 1/R.
x c
(156)
x
Thus, if the function g i has small low-degree influences, then Lemma 3 (Main Lemma) applied to g i in
line (153) directly implies that this acceptance probability is 2O(k) /Rk−1 . We will now formally show
that the influences of the “expected folded function” g i are bounded by the influences of the original f i .
First, the Fourier coefficients of g i are
ĝ i (s) = E[fˆci (s)].
c
25
(157)
Thus the low-degree influences of g i are bounded as
X
Infj≤d [g i ] =
ĝ i (s)2
(158)
i
2
E[fˆc (s)]
(159)
i
2
E[fˆc (s) ]
(160)
fˆci (s)2 ]
(161)
s∈[R]n
s(j)6=1,|s|≤d
X
=
c
s∈[R]n
s(j)6=1,|s|≤d
≤
X
s∈[R]n
s(j)6=1,|s|≤d
X
= E[
c
c
s∈[R]n
s(j)6=1,|s|≤d
= E[Infj≤d [fci ]].
(162)
c
Finally, we must relate the influences of fci to the influences of f i . For a fixed c ∈ [R], we have
Infj≤d [fci ] = Infj [(fci )≤d ]
=
=
=
E [V
x∈[R]n
(163)
arxj ∈[R] [(fci )≤d ]]
(164)
i+c ≤d
E [V arxj ∈[R] [(f ) (x1 + c, x2 + c, . . . , xn + c)]]
(165)
i+c ≤d
E [V arxj ∈[R] [(f ) (x1 , x2 , . . . , xn )]]
(166)
x∈[R]n
x∈[R]n
= Infj [(f i+c )≤d ]
(167)
Infj≤d [f i+c ].
(168)
=
Therefore, if Infj≤d [f i ] ≤ δ for all coordinates j ∈ [n] and all projections i ∈ [R] (as we assume for
soundness), then from (162) and (168) we have
Infj≤d [g i ] ≤ E[Infj≤d [fci ]] = E[Infj≤d [f i+c ]] ≤ δ.
c
(169)
c
Thus the function g i has small low-degree influences as well.
So we can complete the proof, continuing from line (153) and applying our Main Lemma to g i :
Pr[accept] =
X
i∈[R]
(Lemma 3)
≤
X
i
k
E[(Tρ g (z)) ]
(170)
2O(k) /Rk
(171)
z
i∈[R]
= 2O(k) /Rk−1 .
26
(172)
| 8cs.DS
|
Enhanced q-Least Mean Square
Shujaat Khana , Alishba Sadiqb , Imran Naseemb,c,∗, Roberto Togneric ,
Mohammed Bennamound
a Department
arXiv:1801.00410v1 [math.OC] 1 Jan 2018
of Bio and Brain Engineering, Korea Advanced Institute of Science and
Technology (KAIST), Daejeon, Republic of Korea.
b College of Engineering, Karachi Institute of Economics and Technology, Korangi Creek,
Karachi 75190, Pakistan.
c School of Electrical, Electronic and Computer Engineering, The University of Western
Australia, 35 Stirling Highway, Crawley, Western Australia 6009, Australia.
d School of Computer Science and Software Engineering, The University of Western
Australia, 35 Stirling Highway, Crawley, Western Australia 6009, Australia.
Abstract
In this work, a new class of stochastic gradient algorithm is developed based on
q-calculus. Unlike the existing q-LMS algorithm, the proposed approach fully
utilizes the concept of q-calculus by incorporating time-varying q parameter.
The proposed enhanced q-LMS (Eq-LMS) algorithm utilizes a novel, parameterless concept of error-correlation energy and normalization of signal to ensure
high convergence, stability and low steady-state error. The proposed algorithm
automatically adapts the learning rate with respect to the error. For the evaluation purpose the system identification problem is considered. Extensive experiments show better performance of the proposed Eq-LMS algorithm compared
to the standard q-LMS approach.
Keywords: Adaptive algorithms, Least Mean Squares Algorithm, q-calculus,
Jackson derivative, system identification, q-LMS.
1. Introduction
5
Least square method is considered to be widely used optimization technique.
It has been applied in diversified applications such as plant identification [1],
detection of elastic inclusions [2], noise cancellation [3], echo cancellation [4],
ECG signal analysis [5], elasticity imaging [6], and time series prediction [7], etc.
The least mean square (LMS) is one of the most popular least square algorithms
for adaptive filtering due to its low computational complexity, however, it has
∗ Corresponding
author
Email addresses: [email protected] (Shujaat Khan),
[email protected] (Alishba Sadiq), [email protected] (Imran
Naseem), [email protected] (Roberto Togneri),
[email protected] (Mohammed Bennamoun)
Preprint submitted to Signal Processing - Journal - Elsevier
January 3, 2018
10
15
20
25
30
35
40
45
50
a slow convergence rate due to the dependency on the eigenvalue-spread of
the input correlation matrix [8]. Extensive research has been done towards the
optimization of the LMS algorithm [3, 9, 10, 11, 12]. One of the disadvantages of
the LMS is that it is sensitive to the scaling of its input. In [8, 11], the normalized
LMS (NLMS) and its variants were proposed to solve this problem through
normalization. To improve the convergence rate and steady state performance,
variable step size frameworks were devised in [13, 14]. In [15, 16, 17, 18], different
solutions for complex signal processing were proposed. Similarly, to deal with
non-linear signal processing problem, the concept of kernel function-based LMS
algorithms was proposed in [19, 20, 21].
Beside these variants, various definitions of gradient have also been used
to derive improved LMS algorithms; for instance in [22], a fractional order
calculus (FOC) based least mean square algorithm, named as robust variable
step size fractional least mean square (RVSS-FLMS), is proposed. The algorithm
is derived using Riemann-Liouville fractional derivative for high convergence
performance. In [23, 24], some adaptive schemes were proposed for maintaining
stability through adaptive variable fractional power. The FOC variants are,
however, not stable and diverge if the weights are negative or the input signal
is complex [25].
Recently, the q-LMS algorithm is proposed which utilizes q-gradient from the
Jackson’s derivative so that the secant of the cost function is computed instead of
the tangent [12]. The algorithm takes larger steps towards the optimum solution
and therefore, achieves a higher convergence rate. The q-LMS algorithm has
also been used for various applications, such as adaptive noise cancellation [26],
system identification, and designing of whitening filter [27]. In [28] q-normalized
LMS algorithm is proposed and its convergence performance is analyzed. In
[29], using the same definition of q-calculus, variants of steady state least mean
algorithms are derived.
All the aforementioned variants of the q-LMS algorithm enhance convergence
speed at the cost of increased computational complexity and steady-state error.
In order to improve convergence rate without compromising the steady-state
performance, a time-varying q-LMS is proposed in [30]. However, it requires
the tuning of two additional parameters (β and γ), and the performance of
the time-varying q-LMS [30] is very sensitive to the selection of the tuning
parameters. In this paper, we propose a new variant of the q-LMS by making the
q-parameter time-varying. The proposed enhanced q-LMS (Eq-LMS) utilizes a
novel, parameterless concept of error-correlation energy and normalization to
ensure rapid convergence without compromising stability and low steady-state
error. The proposed algorithm automatically adapts the learning rate with
respect to error. It takes larger steps in case of larger error and reduces the
learning rate with decreased error. Unlike the contemporary methods [12, 13,
14], the proposed method is a parameterless technique and does not require
manual tuning of any parameter. The proposed algorithm is evaluated for the
system identification problem and the results are demonstrated for both the
steady-state performance and the convergence rate. Extensive experiments are
performed to show the superiority of the proposed Eq-LMS algorithm over a
2
55
variety of contemporary methods.
The rest of the paper is structured as follows. An overview of the q-calculus
and q-least mean square algorithm is provided in Section 2. The details of
proposed algorithm are discussed in Section 3, followed by the experimental
results in Section 4. The paper is finally concluded in Section 5.
2. Overview of q -Least Mean Square Algorithm
60
The conventional LMS algorithm is derived using the concept of steepest
descent with the weight- update rule
w(i + 1) = w(i) −
µ
∇w J(w),
2
(1)
where J(w) is the cost function for the LMS algorithm and is defined as
J(w) = E[e2 (i)],
(2)
where E[·] is the expectation operator and e(i) is the estimation error between
the desired response d(i) and the output signal at the ith instant, i.e.,
e(i) = d(i) − x| (i)w(i),
(3)
Here, x(i) is the input signal vector defined as
x(i) = [x1 (i), x2 (i), . . . xM (i)]| ,
(4)
and w(i) is the weight vector defined as:
w(i) = [w1 (i), w2 (i), . . . wM (i)]
(5)
where M is the length of the filter.
65
70
2.1. Overview of q-Calculus
The Quantum calculus or q-calculus is sometimes referred to as the calculus
without a limit [31]. It has been successfully used in various areas such as
number theory, combinatorics, orthogonal polynomials, basic hyper-geometric
functions and other sciences quantum theory, operational theory, mechanics,
and the theory of relativity [32, 33, 34, 35].
In q-calculus, the differential of a function is defined as (See, [36])
dq (f (x)) = f (qx) − f (x).
(6)
The derivative therefore takes the form
Dq (f (x)) =
f (qx) − f (x)
dq (f (x))
=
.
dq (x)
(q − 1)x
3
(7)
When q → 1, the expression becomes the derivative in the classical sense. The
q-derivative of a function of the form xn is
n
q − 1 xn−1 , q 6= 1,
n
q−1
Dq,x x =
(8)
nxn−1 ,
q = 1.
For a function f (x) of n number of variables, x = [x1 , x2 , ....xn ]| , the q-gradient
is defined as
∇q,w f (x) , [Dq1,x1 f (x), Dq2,x2 f (x), ...Dqn,xn f (x)]| ,
(9)
where q = [q1 , q2 , . . . qN ]| .
2.2. q-Least Mean Square ( q-LMS) Algorithm
75
80
The performance of the LMS algorithm depends on the eigenvalue spread of
the input correlation matrix. The LMS is therefore regarded as an inherently
slowly converging approach [14]. In order to resolve this issue the q-LMS has
been proposed in [12]. Instead of the conventional gradient, the q-LMS is derived
using the q-calculus and utilizes the Jackson derivative method [12], it takes
larger steps (for q > 1) in the search direction as it evaluates the secant of
the cost function rather than the tangent [12]. By replacing the conventional
gradient in (1) with the q-gradient, we get
w(i + 1) = w(i) −
µ
∇q,w J(w).
2
(10)
The q-gradient of the cost function J(w) for the k th weight is defined as
∇q,wk J(w) =
∂qk
∂q
∂qk
J(w) k e(i)
y(i).
∂qk e
∂qk y
∂qk wk (i)
(11)
Solving partial derivatives in (11) using the Jackson derivative defined in Section
(2) gives
∂q
q2 − 1
∂q
J(w) =
(E[e2 (i)]) = E[ k
e(i)] = E[(qk + 1)e(i)],
∂q e
∂q e
qk − 1
85
(12)
where J(w) = E[e2 (i)], E[·] is the expectation operator and e(i) = d(i) − y(i).
Similarly
∂qk
y(i) = xk (i),
∂qk wk (i)
(13)
∂qk
e(i) = −1,
∂qk y
(14)
and
4
Substituting equations (12), (13), and (14) in (11) gives
∇q,wk (i)J(w) = −E[(qk + 1)e(i)xk (i)].
(15)
Similarly, for k = 1, 2, . . . , M ,
∇q,w J(w) = −E[(q1 +1)e(i)x1 (i), (q2 +1)e(i)x2 (i), . . . (qM +1)e(i)xM (i)]. (16)
Consequently, Eq. (16) can be written as
∇q,w J(w) = −2E[Gx(i)e(i)],
(17)
where µ is the learning rate (step-size) and G is a diagonal matrix
diag(G) = [(
90
qM + 1 |
q1 + 1 q2 + 1
), (
), .....(
)] .
2
2
2
(18)
Dropping the expectation from the q-gradient in (17) results in
∇q,w J(w) ≈ −2Gx(i)e(i).
(19)
Substituting (19) in (1) renders the weight update rule of the q-LMS algorithm
by
w(i + 1) = w(i) + µGx(i)e(i).
95
(20)
2.2.1. q-LMS as a whitening filter-q-Normalized LMS
The q-normalized least mean square (q-NLMS) algorithm is defined (See
[28])
w(i + 1) = w(i) + µ
Gx(i)e(i)
,
ζ + ||x(i)||2G
(21)
where ζ is a small value added in the denominator to avoid the indeterminate
form, and ||x(i)||2G is the weighted norm of the input vector. By selecting the q
parameter in (20) as q = 1/λ max, we can design a whitening filter and hence
it can remove the dependency on the input correlation [28].
100
2.2.2. Time-varying q-LMS
The time-varying q-LMS algorithm is based on the variable step size (VSS)
method [14] and is given (See [30])
Ψ (i + 1) = βΨ (i) + γe(i)2 ,
(0 < β < 1, γ > 0),
qupper , Ψ (i + 1) > qupper ,
q(i + 1) = 1,
Ψ (i + 1) < 1,
Ψ
otherwise.
5
(22)
(23)
where qupper is so chosen to satisfy the stability bound, (See [12])
qupper =
2
.
µλmax
(24)
The q(i + 1) is updated according to the estimation of the square of the
estimation error. When the estimation error is large, q(i) will approach its
upper bound denoted by qupper , while for smaller values q(i) goes to unity for a
lower steady-state error.
105
3. The Proposed Enhanced q -Least Mean Square (Eq-LMS) Algorithm
The q-LMS algorithm has an extra degree of freedom to control the performance via the diagonal matrix G, which comprises of the q-dependent entries.
The weight-update rule of the q-LMS algorithm can be written as
w(i + 1) = w(i) + µx̂(i)e(i),
110
115
120
125
(25)
where x̂(i) = Gx(i). For the special case of G=I (identity matrix), the q-LMS
algorithm will be transformed into the conventional LMS. Based on the above
discussion, we make the following important observations.
• We argue that the q-gradient with q > 1 enhances the speed of convergence
as it takes the secant of function rather than the tangent [12]. The larger
the value of the q parameter, the faster the convergence of the algorithm.
But this improvement in the rate of convergence comes at the cost of a
degradation in the steady-state performance.
• The time varying q-LMS technique [30] is based on variable step-size
method [14], which requires the tuning of additional parameters such as
β and γ.
• By selecting the q parameter in (20) as q = 1/λ max, we can design a
whitening filter and hence it can remove the dependency on the input
correlation [28]. However, with a large step-size the q-NLMS converges
rapidly with a compromised steady state performance. Similarly, a smaller
step-size results in better steady state performance but with slow convergence. As such, the two important performance parameters cannot be
optimized simultaneously.
3.1. Proposed Improvements
130
To overcome the aforementioned issues, we propose the Eq-LMS algorithm
with the following improvements.
6
135
• To achieve higher convergence rate with lower steady-state error, we propose to incorporate the instantaneous error energy to adapt the q-parameter.
The proposed algorithm automatically takes large steps when the error is
large and reduces the step-size with the decreasing error. Note that, unlike the time-varying q-LMS [30], no additional tuning parameters are
introduced and the proposed approach is completely automatic.
• The whitening factor (q = 1/λ max) is also utilized to set the limits of
adaptive q-vector, this allows the algorithm to operate at a higher convergence rate without worrying about the divergence issues.
140
• To update each q-parameter, the proposed Eq-LMS utilize, a responsible
error for each tap of the filter. With this improvement, the q-variable for
each tap will be updated accordingly, hence, both the steady-state error
and convergence performance can be improved significantly.
3.2. Formulation of the Eq-LMS Algorithm
By replacing the fixed G in (20) with its time-varying form G(i), the weight
update rule of the proposed Eq-LMS is given as
w(i + 1) = w(i) + µe(i)x(i)G(i),
(26)
th
where µ is the learning rate, and e(i) is the error at the i
instant defined by
e(i) = d(i) − y(i),
(27)
where d(i) and y(i) are the desired and estimated output at the ith instant, respectively. Here, G(i) is a diagonal matrix with time-varying diagonal elements,
and is defined as
q1 (i)
q2 (i)
(28)
G(i) =
.
..
.
qM (i)
It can also be written as
G(i) = diag(q1 (i), . . . , qM (i)) = diag(q(i)),
(29)
q(i) = {q1 (i), q2 (i), . . . qM (i)}.
(30)
where,
145
We propose an update rule for vector q defined in the following steps.
• Step1: Initialize vector q with any positive random values.
• Step2: Use instantaneous error to update first entry q1 of q vector, which
is associated with weight of the instant input tap, i.e.,
M
X
1
q1 (i + 1) =
{|e(i)| +
qj (i)},
M +1
j=1
where M is the length of the filter.
7
(31)
• Step3: To avoid divergence while maintaining the higher convergence rate,
the following conditions will be evaluated:
1
1
if |q1 (i + 1)| > λmax
,
λmax
(32)
q(i + 1) =
1
,
q1 (i + 1) if |q1 (i + 1)| < λmax
where λmax is the maximum eigenvalue of the input auto-correlation matrix.
• Step4: Update all entries of vector α except for the first entry, simply by
shifting:
qk+1 (i + 1) = qk (i),
(33)
where 1 < k < M − 1
150
• Step5: For next iterations, repeat steps 2 to 5.
Finally, the weight-update equation of the proposed Eq-LMS can be written
as:
w(i + 1) = x(i) + µe(i)x(i)
where
q(i),
(34)
indicates the element wise multiplication.
4. Experiments
For the evaluation of the proposed algorithm the problem of system identification is used. Adaptive learning methods have been successfully used to
identify the unknown system, with numerous applications, for example, in control engineering, communication systems [11, 37, 38, 39, 40, 41]. Channel estimation, for instance, is a widely used method in communication systems to
estimate the characteristics of an unknown channel. Consider a linear channel
shown in Fig. 1.
Figure 1: Channel estimation using adaptive learning algorithm.
8
y(t) = h1 x(t) + h2 x(t − 1) + h3 x(t − 2) + h4 x(t − 3) + h5 x(t − 4).
155
160
165
Equation (35) shows the mathematical model of the system, where x(t) and y(t)
are the input and output of the system, respectively and d(t) is the disturbance
which is taken to be white Gaussian noise in this case. For this experiment, x(t)
is chosen to be consisting of 1 × 106 randomly generated samples obtained from
Gaussian distribution of mean zero and variance of 1. In (35), the system is
defined by its impulse response h(t) while ŷ(t), ĥ(t), and e(t) are the estimated
output, estimated impulse response, and the error of estimation, respectively.
The simulation parameters selected are as follows: coefficient values of h1 = −2,
h2 = −1, h3 = 0, h4 = 1 and h5 = 2 are selected for the channel, the experiments
are performed on three noise levels with the SNR values of 10dB, 20dB and 30dB.
The weights are initialized to zero for all algorithms. Specifically, the objective
of these simulations is to compare the performance of the proposed enhanced
q−LMS (Eq-LMS) algorithm with the contemporary counterparts, i.e., Least
Mean Square (LMS)/ q-LMS [12] at q = 1, q-LMS [12] at q = 2, time-varying
q-LMS [30] and the normalized LMS (NLMS), for given convergence rate and
given steady state error in three different scenarios.
For the performance evaluation, the normalized weight deviation (NWD) in
the actual and the obtained weights is compared. Specifically, we define
NWD =
170
175
(35)
kh − wk
,
khk
(36)
where h is the actual impulse response of the channel and w is the estimated
weight-vector. The simulations are repeated for 1000 independent runs and
mean results are reported. The simulations are performed primarily to evaluate
the steady-state and convergence performances of the proposed algorithm for
various learning rates. Accordingly, three Evaluation protocols are designed:
1. Evaluation protocol 1: learning rate=1 × 10−1 , SNR={10,20,30} dB.
2. Evaluation protocol 2: learning rate=1 × 10−2 , SNR={10,20,30} dB.
3. Evaluation protocol 3: learning rate=1 × 10−3 , SNR={10,20,30} dB.
4.1. Experiments to Evaluate the Steady-State Performance
180
4.1.1. Evaluation Protocol 1: Fast Convergence
For the comparison of the steady-state performance, all algorithms were
setup for equal convergence and after 10000 iterations, the steady-state value
of the NWD is examined. The learning rate (step size) configurations for equal
convergence rate (Evaluation Protocol 1) is shown in Table 1.
9
Table 1: Evaluation protocol 1: Configuration of learning rates of different approaches for an
equal convergence rate of 1 × 10−1 .
Algorithm
LMS/q-LMS
Time-varying q-LMS
Normalized LMS
Proposed Eq-LMS
185
190
195
10 dB SNR
4.4 × 10−2
3.5 × 10−1
2.45 × 10−1
1 × 10−1
Learning Rate µ
20 dB SNR 30 dB SNR
2.45 × 10−2
2.7 × 10−5
−1
1.3 × 10
3.2 × 10−5
−1
1.2 × 10
8.7 × 10−5
1 × 10−1
1 × 10−1
The relevant normalized weight difference (NWD) curves with three different
SNR values are depicted in Fig. 2. From the Fig. 2 (a),(b), and (c), it can be
seen that the proposed Eq-LMS produced the best performance under all three
conditions: (1) for the SNR value of 10dB, it outperformed the LMS/q-LMS
at q = 1, the q-LMS at q = 2, the time-varying q-LMS, and the NLMS by the
NWD value of −1.03 dB, −2.95 dB, −8.06 dB, and −2.14 dB, respectively, (2)
for the SNR value of 20 dB, it surpassed the listed algorithms by the NWD
value of −2.36 dB, −4.05 dB, −6.96 dB, and −3.29 dB, respectively, and (3)
for the SNR value of 30 dB, the above mentioned algorithms were outperformed
by a margin of −2.29 dB, −3.86 dB, −7.18, and −3.47 dB, respectively. Note
that the proposed Eq-LMS algorithm showed the lowest steady state error in
all conditions while the LMS, NLMS and the q-LMS at q = 2 show faster
convergence than the time-varying q-LMS but with greater steady state error
than the proposed Eq-LMS. With the above discussed settings, results for the
channel estimation problem are summarized in Table 2.
Table 2: Evaluation protocol 1: Results of various approaches for an equal convergence rate.
Algorithm
LMS/q-LMS (q = 1)
q-LMS (q = 2)
Time-varying q-LMS
Normalized LMS
Proposed Eq-LMS
200
Steady-state NWD (dB)
10 dB SNR 20 dB SNR 30 dB SNR
-14.63
-21.06
-28.77
-12.71
-19.37
-27.02
-7.60
-16.46
-23.88
-13.52
-20.13
-27.59
-15.66
-23.42
-31.06
4.1.2. Evaluation protocol 2: Medium Convergence
The learning rate (step size) configurations for an equal convergence rate
(Evaluation protocol 2) is shown in Table 3.
10
Table 3: Evaluation protocol 2: Configuration of learning rates of different approaches for an
equal convergence rate of 1 × 10−2 .
Algorithm
LMS/q-LMS
Time-varying q-LMS
Normalized LMS
Proposed Eq-LMS
205
210
215
10 dB SNR
4 × 10−3
2 × 10−2
2 × 10−2
1 × 10−2
Learning Rate µ
20 dB SNR 30 dB SNR
1.5 × 10−3
5.2 × 10−4
−3
1 × 10
1.8 × 10−3
−3
9 × 10
2.5 × 10−3
1 × 10−2
1 × 10−2
The relevant normalized weight difference (NWD) curves with three different
SNR values are depicted in Fig. 2. From the Fig. 2 (d),(e), and (f), it can be
seen that the proposed Eq-LMS produced the best performance under all three
conditions: (1) for the SNR value of 10 dB, it outperformed the LMS/q-LMS
at q = 1, q-LMS at q = 2, time-varying q-LMS and the NLMS by the NWD
value of −0.68 dB, −2.23 dB, −4.08 dB, and −1.74 dB, respectively, (2) for the
SNR value of 20 dB, it surpassed the above-mentioned algorithms by the NWD
value of −1.22 dB, −2.74 dB, −5.34 dB, and −2.45 dB, respectively, and (3)
for the SNR value of 30 dB, the above mentioned algorithms were outperformed
by a margin of −1.44 dB, −2.94 dB, −4.07 and −2.47 dB, respectively. Note
that the proposed Eq-LMS algorithm showed the lowest steady state error in
all conditions while the LMS, NLMS and the q-LMS at q = 2 show faster
convergence than time-varying q-LMS but with a greater steady state error
than the proposed Eq-LMS. With the above discussed settings, results for the
channel estimation problem are summarized in Table 4.
Table 4: Evaluation protocol 2: Results of various approaches for an equal convergence rate.
Algorithm
LMS/qLMS (q=1)
qLMS (q=2)
Time-varying qLMS
Normalized LMS
Proposed Eq-LMS
Steady-state NWD (dB)
10 dB SNR 20 dB SNR 30 dB SNR
-25.42
-32.70
-40.00
-23.62
-30.86
-38.19
-22.40
-29.40
-37.45
-24.18
-31.45
-38.80
-25.85
-33.60
-41.13
4.1.3. Evaluation protocol 3: Slow Convergence
The learning rate (step size) configurations for equal convergence rate (Evaluation protocol 3) is shown in Table 5.
11
Table 5: Evaluation protocol 3: Configuration of learning rates of different approaches for the
fix convergence rate of 1 × 10−3 .
Algorithm
LMS/qLMS
Time-varying qLMS
Normalized LMS
Proposed Eq-LMS
220
225
230
10 dB SNR
3.6 × 10−4
1.6 × 10−3
1.9 × 10−3
1 × 10−3
Learning Rate µ
20 dB SNR 30 dB SNR
1.3 × 10−4
4.5 × 10−3
−4
6 × 10
1.5 × 10−4
−4
7 × 10
2.3 × 10−4
1 × 10−3
1 × 10−3
The relevant NWD curves with three different SNR values are delineated in
Fig. 2. From the Fig. 2 (g), (h), and (i), it can be seen that the proposed
Eq-LMS produced the best performance under all three conditions: (1) for the
SNR value of 10 dB, it outperformed the LMS/q-LMS at q = 1, q-LMS at
q = 2, Time-varying q-LMS, and the NLMS by the NWD value of −0.43 dB,
−1.92 dB, −3.45 dB, and −1.67 dB, respectively, (2) for the SNR value of 20
dB, it surpassed the above-mentioned algorithms by the NWD value of −0.9
dB, −2.43 dB, −4.2 dB, and −2.15 dB, respectively, and (3) for the SNR value
of 30 dB, the above mentioned algorithms were outperformed by a margin of
−1.13 dB, −2.66 dB, −3.68, and −2.33 dB, respectively. Note that the proposed
Eq-LMS algorithm showed the lowest steady state error in all conditions while
the q-LMS at q = 2 showed faster convergence with greater steady state error
than the proposed Eq-LMS. With the above discussed settings, results for the
channel estimation problem are summarized in Table 6.
Table 6: Evaluation protocol 3: Results of various approaches for an equal convergence rate.
Algorithm
LMS/q-LMS (q = 1)
q-LMS (q = 2)
Time-varying q-LMS
Normalized LMS
Proposed Eq-LMS
Steady-state NWD (dB)
10 dB SNR 20 dB SNR 30 dB SNR
-20.16
-27.34
-34.67
-18.92
-26.13
-33.45
-16.76
-23.22
-32.04
-19.10
-26.11
-33.64
-20.84
-28.56
-36.11
4.2. Experiments to Evaluate the Convergence Performance
235
4.2.1. Evaluation Protocol 1: Fast Convergence
For the comparison of convergence performances, all algorithms were setup
for equal steady-state error. The learning rate (step size) configurations for
equal steady-state (Evaluation Protocol 1) is shown in Table (7). Learning rate
for proposed Eq-LMS has been set according to three evaluation protocols.
12
Normalized weight difference (dB)
-1
0
200
400
600
800
10-2
10-3
1000
0
1000
Iterations
10 (dB) SNR and 1e -2 Learning rate
Normalized weight difference (dB)
Normalized weight difference (dB)
10-2
2000
4000
6000
8000
10-1
10-3
10000
0
1
Normalized weight difference (dB)
Normalized weight difference (dB)
-3
4
Iterations
g
3
4
6
8
10
104
10
10-3
0
2
-4
1
2
Iterations
h
4
6
8
10
104
Iterations
3
4
30 (dB) SNR and 1e -3 Learning rate
100
10-3
0
10000
f
10-2
10
8000
10-2
10-4
5
LMS / qLMS at q=1
qLMS at q=2
NLMS
Time varing qLMS
EqLMS (Proposed)
-1
6000
LMS / qLMS at q=1
qLMS at q=2
NLMS
Time varing qLMS
EqLMS (Proposed)
10-1
104
20 (dB) SNR and 1e -3 Learning rate
100
10-2
2
4000
30 (dB) SNR and 1e -2 Learning rate
100
e
LMS / qLMS at q=1
qLMS at q=2
NLMS
Time varing qLMS
EqLMS (Proposed)
10-1
2
Iterations
10 (dB) SNR and 1e -3 Learning rate
0
2000
c
10-2
d
10
0
Iterations
LMS / qLMS at q=1
qLMS at q=2
NLMS
Time varing qLMS
EqLMS (Proposed)
Iterations
100
10-3
10-4
5000
20 (dB) SNR and 1e -2 Learning rate
100
LMS / qLMS at q=1
qLMS at q=2
NLMS
Time varing qLMS
EqLMS (Proposed)
0
4000
10-2
b
10-1
10-3
3000
LMS / qLMS at q=1
qLMS at q=2
NLMS
Time varing qLMS
EqLMS (Proposed)
10-1
Iterations
a
100
2000
Normalized weight difference (dB)
10-2
10-1
30 (dB) SNR and 1e -1 Learning rate
100
LMS / qLMS at q=1
qLMS at q=2
NLMS
Time varing qLMS
EqLMS (Proposed)
Normalized weight difference (dB)
Normalized weight difference (dB)
10
20 (dB) SNR and 1e -1 Learning rate
100
LMS / qLMS at q=1
qLMS at q=2
NLMS
Time varing qLMS
EqLMS (Proposed)
Normalized weight difference (dB)
10 (dB) SNR and 1e -1 Learning rate
100
5
105
LMS / qLMS at q=1
qLMS at q=2
NLMS
Time varing qLMS
EqLMS (Proposed)
10-1
10-2
10-3
10-4
10-5
0
2
4
Iterations
6
8
10
105
i
Figure 2: NWD curves for the LMS/q-LMS at q = 1, q-LMS at q = 2, time-varying q-LMS,
NLMS, and the Eq-LMS. normalized weight deviation with learning rate and SNR of (a) 1e−1 ,
10 dB, (b) 1e−1 , 20 dB,(c) 1e−1 , 30 dB, (d) 1e−2 , 10 dB, (e) 1e−2 , 20 dB, (f) 1e−2 , 30 dB,
(g) 1e−3 , 10 dB, (h) 1e−3 , 20 dB, and (i) 1e−3 , 30 dB.
13
Table 7: Evaluation protocol 1: Configuration of learning rates of different approaches for an
equal steady-state error.
Algorithm
LMS/q-LMS
Time-varying q-LMS
Normalized LMS
Proposed Eq-LMS
240
245
250
255
10 dB SNR
3 × 10−2
3.3 × 10−2
1 × 10−1
1 × 10−1
Learning Rate µ
20 dB SNR 30 dB SNR
8.9 × 10−3
2.7 × 10−3
−3
8.8 × 10
3.1 × 10−3
−2
2.8 × 10
8.5 × 10−3
1 × 10−1
1 × 10−1
The relevant normalized weight difference (NWD) curves with three different
SNR values are depicted in Fig. 3. From the Fig. 3 (a), (b), and (c), it can be
seen that the proposed Eq-LMS algorithm produced the best results under all
three conditions: (1) for the SNR value of 10 dB, algorithms are run for 1000
iterations. The convergence point of the proposed Eq-LMS is reached at 120th
iteration, q-LMS at (q = 2) converged on the 80th iteration but its steady state
error is much larger compared to the proposed Eq-LMS, (2) for the SNR value
of 20 dB, algorithms are run for 5000 iterations. Note that the proposed EqLMS algorithm outperformed all competing approaches by converging in only
400 iterations. The q-LMS (q = 2) was unable to reach the given error-floor and
took 400 iterations to reach a much higher error, and (3) for the SNR value of
30 dB, algorithms are run for 10000 iterations, the proposed Eq-LMS algorithm
took the least number of iterations by converging at the 1600th iteration. The
proposed EqLMS shows best performance in terms of steady state error and
convergence rate. Thus, showing the best overall performance. With the above
discussed settings, results for the channel estimation problem are summarized
in Table 8.
Table 8: Evaluation protocol 1: Results of various approaches for an equal steady-state error.
Algorithm
LMS/q-LMS at (q = 1)
q-LMS at (q = 2)
Time-varying q-LMS
Normalized LMS
Proposed Eq-LMS
260
Convergence point (number of Iterations ×1000))
10 dB SNR 20 dB SNR
30 dB SNR
0.20
0.70
2.70
0.08
0.40
1.55
0.64
2.80
7.20
0.23
1.10
4.40
0.12
0.40
1.60
4.2.2. Evaluation protocol 2: Medium Convergence
The learning rate (step size) configuration for equal steady-state (Evaluation
Protocol 2) is shown in configuration Table (9). Learning rate for proposed EqLMS has been set according to three evaluation protocols.
14
Table 9: Evaluation protocol 2: Configuration of learning rates of different approaches for an
equal steady-state error.
Algorithm
LMS/q-LMS
Time-varying q-LMS
Normalized LMS
Proposed Eq-LMS
265
270
10 dB SNR
3 × 10−3
3.3 × 10−3
9 × 10−2
1 × 10−2
Learning Rate µ
20 dB SNR 30 dB SNR
8.8 × 10−4
2.7 × 10−4
−4
9.3 × 10
3.1 × 10−4
−3
2.72 × 10
8.5 × 10−4
1 × 10−2
1 × 10−2
The relevant NWD curves with three different SNR values are depicted in
Fig. 3. From the Fig. 3 (d), (e), and (f), it can be seen that the proposed
Eq-LMS algorithm produced the best results under all three conditions: (1) for
the SNR value of 10 dB, algorithms are run for 10000 iterations, the convergence
point of the proposed Eq-LMS is reached at 1500th iteration, the q-LMS at (q =
2) converged on the 1100th iteration but its steady state error is much larger than
the proposed Eq-LMS, (2) for the SNR value of 20 dB, algorithms are run for
50000 iterations, the proposed Eq-LMS algorithm outperformed all competing
approaches in terms of convergence point with least steady state error, and
(3) for the SNR value of 30 dB, algorithms are run for 100000 iterations, the
proposed Eq-LMS algorithm converged on 19000th iteration, it showed best
performance in terms of steady state error and convergence rate. Thus, showing
the best overall performance. With the above discussed settings, results for the
channel estimation problem are summarized in Table 10.
Table 10: Evaluation protocol 2: Results of various approaches for an equal steady-state error.
Algorithm
LMS/q-LMS at (q = 1)
q-LMS at (q = 2)
Time-varying q-LMS
Normalized LMS
Proposed Eq-LMS
275
Convergence point (number of Iterations ×1000))
10 dB SNR 20 dB SNR
30 dB SNR
2
9
32
1.1
5.9
19
6.2
28
80
3.1
14
52
1.5
6
19
4.2.3. Evaluation protocol 3: Slow Convergence
The learning rate (step size) configuration for equal steady-state (Evaluation
protocol 3) is shown in configuration Table (11). Learning rate for the proposed
Eq-LMS has been set according to three evaluation protocols.
15
Table 11: Evaluation protocol 3: Configuration of learning rates of different approaches for
an equal steady-state error.
Algorithm
LMS/q-LMS
Time-varying q-LMS
Normalized LMS
Proposed Eq-LMS
280
285
290
10 dB SNR
3 × 10−4
3.3 × 10−4
1 × 10−3
1 × 10−3
Learning Rate µ
20 dB SNR 30 dB SNR
8.9 × 10−4
2.7 × 10−5
−5
9 × 10
3.2 × 10−5
−4
2.8 × 10
8.5 × 10−5
1 × 10−3
1 × 10−3
The relevant NWD curves with three different SNR values are depicted in
Fig. 3. From the Fig. 3 (g), (h), and (i), it can be seen that the proposed EqLMS algorithm produced the best results under all three conditions: (1) for the
SNR value of 10 dB, algorithms are run for 100000 iterations, the convergence
point of the proposed Eq-LMS is reached at 21000th iteration, the q-LMS at
(q = 2), converged at the 12000th iteration but its steady state error is much
larger than the proposed Eq-LMS, (2) for the SNR value of 20 dB, the algorithms
are run for 500000 iterations, the proposed Eq-LMS algorithm outperformed all
competing approaches in terms of convergence point with least steady state
error, and (3) for the SNR value of 30 dB, the algorithms are run for 1000000
iterations, the proposed Eq-LMS algorithm converged on 200000th iteration.
The proposed Eq-LMS showed the best performance in terms of steady state
error and convergence rate. With the above discussed settings, results for the
channel estimation problem are summarized in Table 12.
Table 12: Evaluation protocol 3: Results of various approaches for an equal steady-state error.
Algorithm
LMS/qLMS at (q=1)
qLMS at (q=2)
Time-varying qLMS
Normalized LMS
Proposed Eq-LMS
Convergence point (number of Iterations ×1000))
10 dB SNR 20 dB SNR
30 dB SNR
23
100
370
12
60
200
72
28
840
36
320
600
21
70
240
5. Conclusion
295
300
In this work, we proposed a quantum calculus-based steepest descent algorithm called enhanced q-least mean square algorithm (Eq-LMS) using a novel
concept of error correlation energy. The proposed algorithm is a parameterless
method and unlike the contemporary time varyying q-LMS, it does not require
additional tuning. The proposed Eq-LMS was compared with the LMS, q-LMS,
time varying q-LMS, and the NLMS algorithms for a problem of linear channel
estimation. Extensive simulation tests were conducted to analyze the convergence and the steady-state performance at three different SNR levels. For all
16
Normalized weight difference (dB)
10-1
0
200
400
600
800
10-1
10-2
10-3
1000
0
1000
Iterations
10 (dB) SNR and 1e -2 Learning rate
Normalized weight difference (dB)
Normalized weight difference (dB)
10-2
2000
4000
6000
8000
10-1
10-3
10000
0
1
Normalized weight difference (dB)
Normalized weight difference (dB)
10-2
-3
2
4
Iterations
g
3
4
6
8
10
104
10
LMS / qLMS at q=1
qLMS at q=2
NLMS
Time varing qLMS
EqLMS (Proposed)
10-3
0
2
-4
1
2
Iterations
h
4
6
8
10
104
Iterations
3
4
30 (dB) SNR and 1e -3 Learning rate
100
10-3
0
10000
f
10-2
10
8000
10-2
10-4
5
LMS / qLMS at q=1
qLMS at q=2
NLMS
Time varing qLMS
EqLMS (Proposed)
-1
6000
10-1
104
20 (dB) SNR and 1e -3 Learning rate
100
4000
30 (dB) SNR and 1e -2 Learning rate
100
e
LMS / qLMS at q=1
qLMS at q=2
NLMS
Time varing qLMS
EqLMS (Proposed)
10-1
2
Iterations
10 (dB) SNR and 1e -3 Learning rate
0
2000
c
10-2
d
10
0
Iterations
LMS / qLMS at q=1
qLMS at q=2
NLMS
Time varing qLMS
EqLMS (Proposed)
Iterations
100
10-3
10-4
5000
20 (dB) SNR and 1e -2 Learning rate
100
LMS / qLMS at q=1
qLMS at q=2
NLMS
Time varing qLMS
EqLMS (Proposed)
0
4000
10-2
b
10-1
10-3
3000
LMS / qLMS at q=1
qLMS at q=2
NLMS
Time varing qLMS
EqLMS (Proposed)
10-1
Iterations
a
100
2000
Normalized weight difference (dB)
10-2
100
30 (dB) SNR and 1e -1 Learning rate
100
LMS / qLMS at q=1
qLMS at q=2
NLMS
Time varing qLMS
EqLMS (Proposed)
Normalized weight difference (dB)
Normalized weight difference (dB)
100
20 (dB) SNR and 1e -1 Learning rate
101
LMS / qLMS at q=1
qLMS at q=2
NLMS
Time varing qLMS
EqLMS (Proposed)
Normalized weight difference (dB)
10 (dB) SNR and 1e -1 Learning rate
101
5
105
LMS / qLMS at q=1
qLMS at q=2
NLMS
Time varing qLMS
EqLMS (Proposed)
10-1
10-2
10-3
10-4
10-5
0
2
4
Iterations
6
8
10
105
i
Figure 3: NWD curves for the LMS/q-LMS at q = 1, q-LMS at q = 2, time-varying q-LMS,
NLMS, and the Eq-LMS. normalized weight deviation with learning rate and SNR of (a) 1e−1 ,
10 dB, (b) 1e−1 , 20 dB,(c) 1e−1 , 30 dB, (d) 1e−2 , 10 dB, (e) 1e−2 , 20 dB, (f) 1e−2 , 30 dB,
(g) 1e−3 , 10 dB, (h) 1e−3 , 20 dB, and (i) 1e−3 , 30 dB.
17
scenarios, the proposed Eq-LMS algorithm comprehensively outperformed the
contemporary approaches achieving the best performance in terms of steadystate error and convergence.
305
References
[1] Y. Chen, Y. Gu, A. O. Hero, Sparse LMS for system identification, in: IEEE
International Conference on Acoustics, Speech and Signal Processing, 2009.
ICASSP 2009., IEEE, 2009, pp. 3125–3128.
310
315
[2] T. Abbas, S. Khan, M. Sajid, A. Wahab, J. C. Ye, Topological sensitivity based far-field detection of elastic inclusions, Results
in Physics, Volume 8, March 2018, Pages 442-460, ISSN 2211-3797,
https://doi.org/10.1016/j.rinp.2017.12.041.
[3] J. M. Górriz, J. Ramı́rez, S. Cruces-Alvarez, C. G. Puntonet, E. W. Lang,
D. Erdogmus, A novel LMS algorithm applied to adaptive noise cancellation, IEEE Signal Processing Letters 16 (1) (2009) 34–37.
[4] J. Benesty, S. L. Gay, An improved PNLMS algorithm, in: IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP),
2002, Vol. 2, IEEE, 2002, pp. II–1881.
320
[5] N. V. Thakor, Y.-S. Zhu, Applications of adaptive filtering to ECG analysis: noise cancellation and arrhythmia detection, IEEE Transactions on
Biomedical Engineering 38 (8) (1991) 785–794.
[6] H. Ammari, E. Bretin, J. Garnier, H. Kang, H. Lee, A. Wahab, Mathematical methods in elasticity imaging, Princeton University Press, 2015.
325
[7] Y. Zheng, S. Wang, J. Feng, C. K. Tse, A modified quantized kernel least
mean square algorithm for prediction of chaotic time series, Digital Signal
Processing 48 (Supplement C) (2016) 130 – 136. doi:https://doi.org/
10.1016/j.dsp.2015.09.015.
[8] S. C. Douglas, A family of normalized LMS algorithms, IEEE Signal Processing Letters 1 (3) (1994) 49–51.
330
335
[9] W. Wang, H. Zhao, Boxed-constraint least mean square algorithm and its
performance analysis, Signal Processing 144 (Supplement C) (2018) 201 –
213. doi:https://doi.org/10.1016/j.sigpro.2017.10.006.
[10] S. Cheng, Y. Wei, Y. Chen, Y. Li, Y. Wang, An innovative fractional order
LMS based on variable initial value and gradient order, Signal Processing
133 (2017) 260–269.
[11] S. Ciochin, C. Paleologu, J. Benesty, An optimized NLMS algorithm for
system identification, Signal Processing 118 (2016) 115 – 121.
18
340
[12] U. M. Al-Saggaf, M. Moinuddin, M. Arif, A. Zerguine, The q-Least Mean
Squares algorithm, Signal Processing 111 (Supplement C) (2015) 50 – 60.
doi:https://doi.org/10.1016/j.sigpro.2014.11.016.
[13] T. Aboulnasr, K. Mayyas, A robust variable step-size LMS-type algorithm:
analysis and simulations, IEEE Transactions on Signal Processing 45 (3)
(1997) 631–639.
345
[14] R. H. Kwong, E. W. Johnston, A variable step size LMS algorithm, IEEE
Transactions on Signal Processing 40 (7) (1992) 1633–1642. doi:10.1109/
78.143435.
[15] B. Widrow, J. McCool, M. Ball, The complex LMS algorithm, Proceedings
of the IEEE 63 (4) (1975) 719–720. doi:10.1109/PROC.1975.9807.
350
[16] A. Khalili, A. Rastegarnia, W. M. Bazzi, Z. Yang, Derivation and analysis
of incremental augmented complex least mean square algorithm, IET Signal
Processing 9 (4) (2015) 312–319.
[17] A. Khalili, A. Rastegarnia, S. Sanei, Quantized augmented complex leastmean square algorithm: Derivation and performance analysis, Signal Processing 121 (2016) 54–59.
355
360
[18] J. Ahmad, S. Khan, M. Usman, I. Naseem, M. Moinuddin, FCLMS: Fractional Complex LMS Algorithm for Complex System Identification, in: 13th
IEEE Colloquium on Signal Processing and its Applications (CSPA 2017),
IEEE, 2017.
[19] W. Liu, P. P. Pokharel, J. C. Principe, The kernel least-mean-square algorithm, IEEE Transactions on Signal Processing 56 (2) (2008) 543–554.
[20] P. P. Pokharel, W. Liu, J. C. Principe, Kernel least mean square algorithm
with constrained growth, Signal Processing 89 (3) (2009) 257 – 265. doi:
https://doi.org/10.1016/j.sigpro.2008.08.009.
365
370
[21] B. Chen, S. Zhao, P. Zhu, J. C. Principe, Quantized kernel least mean
square algorithm, IEEE Transactions on Neural Networks and Learning
Systems 23 (1) (2012) 22–32.
[22] S. Khan, M. Usman, I. Naseem, R. Togneri, M. Bennamoun, A Robust Variable Step Size Fractional Least Mean Square (RVSS-FLMS) Algorithm, in:
13th IEEE Colloquium on Signal Processing and its Applications (CSPA
2017), IEEE, 2017.
[23] S. Khan, M. Usman, I. Naseem, R. Togneri, M. Bennamoun, VP-FLMS: a
Novel Variable Power Fractional LMS Algorithm, in: 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN) (ICUFN
2017), Milan, Italy, 2017.
19
375
380
[24] J. Ahmad, M. Usman, S. Khan, I. Naseem, H. J. Syed, RVP-FLMS : A
Robust Variable Power Fractional LMS Algorithm, in: 2016 IEEE International Conference on Control System, Computing and Engineering (ICCSCE), IEEE, 2016.
[25] N. J. Bershad, F. Wen, H. C. So, Comments on “Fractional LMS algorithm”, Signal Processing 133 (2017) 219–226.
[26] M. Arif, I. Naseem, M. Moinuddin, S. S. Khan, M. M. Ammar, Adaptive noise cancellation using q-LMS, in: 2017 International Conference
on Innovations in Electrical Engineering and Computational Technologies
(ICIEECT), 2017, pp. 1–4. doi:10.1109/ICIEECT.2017.7916527.
385
390
395
[27] U. M. Al-Saggaf, M. Moinuddin, A. Zerguine, An efficient least mean
squares algorithm based on q-gradient, in: 2014 48th Asilomar Conference on Signals, Systems and Computers, 2014, pp. 891–894. doi:
10.1109/ACSSC.2014.7094580.
[28] A. U. Al-Saggaf, M. Arif, U. M. Al-Saggaf, M. Moinuddin, The qnormalized least mean square algorithm, in: 2016 6th International Conference on Intelligent and Advanced Systems (ICIAS), 2016, pp. 1–6.
doi:10.1109/ICIAS.2016.7824098.
[29] A. Ahmed, M. Moinuddin, U. M. Al-Saggaf, q-State Space Least Mean
Family of Algorithms, Circuits, Systems, and Signal Processing. doi:10.
1007/s00034-017-0569-7.
[30] M. Arif, I. Naseem, M. Moinuddin, U. M. Al-Saggaf, Design of an Intelligent
q-LMS Algorithm for Tracking a Non-stationary Channel, Arabian Journal
for Science and Engineering. doi:10.1007/s13369-017-2883-6.
400
[31] T. Ernst, A Comprehensive Treatment of q-Calculus, 1st Edition,
Springer Science & Business Media, Basel, 2012. doi:10.1007/
978-3-0348-0431-8.
[32] G. Bangerezako, Variational q-calculus, Journal of Mathematical Analysis
and Applications 289 (2) (2004) 650 – 665. doi:https://doi.org/10.
1016/j.jmaa.2003.09.004.
405
410
[33] J. Tariboon, S. K. Ntouyas, P. Agarwal, New concepts of fractional quantum calculus and applications to impulsive fractional q-difference equations, Advances in Difference Equations 2015 (1) (2015) 18. doi:10.1186/
s13662-014-0348-8.
[34] J. Tariboon, S. K. Ntouyas, Quantum calculus on finite intervals and applications to impulsive difference equations, Advances in Difference Equations
2013 (1) (2013) 282. doi:10.1186/1687-1847-2013-282.
[35] A. R. A. L. Ali, V. Gupta, R. P. Agarwal, A. Aral, V. Gupta, Applications
of q-Calculus in Operator Theory, Springer New York, 2013.
20
[36] V. Kac, P. Cheung, Quantum Calculus, Springer New York, 2012.
415
420
425
[37] S. Khan, N. Ahmed, M. A. Malik, I. Naseem, R. Togneri, M. Bennamoun,
FLMF: fractional least mean fourth algorithm for channel estimation in
non-gaussian environment, in: International Conference on Information
and Communications Technology Convergence 2017 (ICTC 2017), Jeju Island, Korea, 2017.
[38] P. A. C. Lopes, J. A. B. Gerald, A close to optimal adaptive filter for sudden
system changes, IEEE Signal Processing Letters 24 (11) (2017) 1734–1738.
doi:10.1109/LSP.2017.2757147.
[39] S. Khan, I. Naseem, R. Togneri, M. Bennamoun, A novel adaptive kernel
for the rbf neural networks, Circuits, Systems, and Signal Processing (2016)
1–15.
[40] S. Khan, J. Ahmad, I. Naseem, M. Moinuddin, A novel fractional gradientbased learning algorithm for recurrent neural networks, Circuits, Systems,
and Signal Processing (2017) 1–20.
430
[41] A. I. Sulyman, A. Zerguine, Convergence and steady-state analysis of a
variable step-size nlms algorithm, Signal Processing 83 (6) (2003) 1255–
1273.
21
| 3cs.SY
|
CO-RANK OF WEAKLY PARAFREE 3-MANIFOLD GROUPS
arXiv:1711.10659v1 [math.GT] 29 Nov 2017
SHELLY HARVEY† AND EAMONN TWEEDY
Abstract. Recall that a group is called large if it has a finite index subgroup which surjects onto a
non-abelian free group. By work of Agol and Cooper-Long-Reid, most 3-manifold groups are large;
in particular, the fundamental groups of hyperbolic 3-manifolds are large. In previous work, the
first author gave examples of closed, hyperbolic 3-manifolds with arbitrarily large first homology
rank but whose fundamental groups do not surject onto a non-abelian free group. We call a group
very large if it surjects onto a non-abelian free group. In this paper, we consider the question of
whether the groups of homology handlebodies - which are very close to being free - are very large.
We show that the fundamental group of W. Thurston’s tripus manifold, is not very large; it is known
to be weakly parafree by Stallings’ Theorem and large by the work of Cooper-Long-Reid since the
tripus is a hyperbolic manifold with totally geodesic boundary. It is still unknown if a 3-manifold
group that is weakly parafree of rank at least 3 must be very large. However, we more generally
consider the co-rank of the fundamental group, also known as the cut number of the manifold. For
each integer g ≥ 1 we construct a homology handlebody Yg of genus g whose group has co-rank
equal to r(g), where r(g) = g/2 for g even and r(g) = (g + 1)/2 for g odd. That is, these groups
are weakly parafree of rank g and surject onto a free group of rank roughly half of g but no larger.
1. Introduction
Let M be a compact, connected, orientable 3-dimensional manifold. If M is irreducible and has
non-empty incompressible boundary and M is not covered by a S 1 × S 1 × I, then it was shown by
D. Cooper, D. Long, and A. Reid [CLR97] that π1 (M ) is large. Recall that a group is said to be
large if it has a finite index subgroup that maps onto a non-abelian free group. In addition, using
work of F. Haglund and D. Wise, I. Agol1 [Ago13] showed that if M is closed and irreducible and
π1 (M ) is not finite or solvable then π1 (M ) is large (see also [AFW15, Diagram 4]). As a result,
we see that most 3-manifold groups are large. One could then ask what is the minimal size of the
index one needs or if even if π1 (M ) itself maps onto a non-abelian free group.
Definition 1.1. Let G be a group. We say that G is very large if it admits a surjective homomorphism onto a non-abelian free group.
In 2002, the first author gave examples of closed hyperbolic 3-manifold groups with arbitrarily
large first homology rank but that are not very large. By Agol’s theorem, these examples are all
large.
Theorem ([Har02]). For each n ≥ 1, there is a closed, orientable, hyperbolic 3-dimensional manifold Mn such β1 (Mn ) = n and π1 (Mn ) is not very large.
In fact, it was shown that the groups cannot even map onto F/F4 where F is the free group of
rank 2 and F4 is the 4th term of the lower central series of F [Har02, Proposition 3.3]. See also
work by C. Leinger and A. Reid [LR02], A. Sikora [Sik05]), and I. Gelbukh [Gel15, Gel17].
Key words and phrases. cut number, co-rank, 3-manifold, homology handlebody, fundamental group, large, weakly
parafree.
†
The author was partially supported by National Science Foundation grants DMS-1309070 and DMS-1613279
and by a grant from the Simons Foundation (#304538 to Shelly Harvey).
1Agol proved the case when M is hyperbolic; the other cases were known. See [AFW15] for more details.
1
2
SHELLY HARVEY† AND EAMONN TWEEDY
In this article, we are interested in the fundamental groups of 3-dimensional homology handlebodies. Their fundamental groups are very close to being free; they are weakly parafree, and hence
the question of whether they are very large becomes much more subtle and interesting question.
Recall that M is a homology handlebody of genus g if it has the same homology groups as a
3-dimensional handlebody of genus g; that is, H̃1 (M ) ∼
= Zg and H̃i (M ) = 0 for i 6= 1.
Remark 1.2. If M is a homology handlebody of genus g and G = π1 (M ) then by Stallings’
Theorem [Sta65], G is weakly parafree of rank g; that is,
F (g)/F (g)k ∼
= G/Gk
for all k ≥ 1 where F (g) is the free group of rank g and Gk is the k th term of the lower central
series of G.
Thus, groups of homology handlebodies of genus g look quite similar to free groups of large rank
as g increases. In particular, one cannot hope to use the lower central series quotients to obstruct
being very large.
It was shown in [Ker01, p. 44] (see also Proposition 2.2 in [Har02]) that if the fundamental
group of M is very large then there is an infinite cyclic cover whose first homology has positive
rank as a left Z[t±1 ]-module. The examples in [Har02] were shown to have torsion (as a Z[t±1 ]
module) in first homology for every infinite cyclic cover and hence their groups could not be very
large. However, this obstruction also fails for homology handlebodies. In fact, the rank of the first
homology of any poly-torsion-free-abelian covering space of M is maximal. Recall that a group Γ
is poly-torsion-free-abelian (PTFA) if it admits a normal series {1} = G0 C G1 C · · · C Gn = Γ
such that each of the factors Gi+1 /Gi is torsion-free abelian. If A is a finitely generated left module
over ZΓ with Γ PTFA then it has a well defined rank as a ZΓ-module. Note that any free abelian
group is PTFA.
Remark 1.3. Let Γ be a PTFA group. If M is a 3-dimensional homology handlebody of genus
g, then by [COT03, Lemma 2.12] for any non-trivial homomorphism φ : π1 (M ) → Γ, the covering
space Mφ associated to φ satisfies
rankZΓ H1 (Mφ ) = g − 1.
We show in Lemma 2.2, that if π1 (M ) is very large then there is a Z2 covering space of M ,
Mφ , such that H1 (Mφ ) has a Z[Z2 ] summand. Using this, we show that W. Thurston’s tripus is
a homology handlebody of genus 2 whose group is not very large. It is known to be hyperbolic
manifold manifold and hence is large by Agol’s theorem.
Proposition 2.5. Let T be W. Thurston’s Tripus manifold. Then π1 (T ) is a weakly parafree
group of rank 2 that is large but not very large.
It is unknown if there is a homology handlebody of genus g ≥ 3 whose group is not very large.
All of the examples that the authors have considered with g ≥ 3 have been shown to be very large.
Question 1.4. If Y is a homology handlebody of genus g with g ≥ 3, is π1 (Y ) very large? More
generally, if G is a finitely presented group with H1 (G) ∼
= Zg for g ≥ 3 and H2 (G) = 0, is G very
large?
Often a homology handlebody group is very large. In this case, we ask what is the maximal
rank free group that arises as the quotient of the group. The cut number of M , c (M ), is defined
to be the maximal number of components of a compact, orientable, 2–sided surface F properly
embeddedWin M such that M r F is connected. Hence, for any n ≤ c (M ), we can construct a map
f : M → ni=1 S 1 such that the induced map on π1 is surjective. That is, there exists a surjective
map f∗ : π1 (M ) F (n), where F (n) is the free group of rank n. Conversely,
if we have any
Wn
1
epimorphism φ : π1 (M ) F (n), then we can find a map f : M → i=1 S such that f∗ = φ.
CO-RANK OF WEAKLY PARAFREE 3-MANIFOLD GROUPS
3
After making the f transverse to a non-wedge point xi on each S 1 , Fi = f −1 (xi ) will give n disjoint
surfaces F = ∪Fi with M r F connected. Hence one has the following elementary group-theoretic
characterization of c (M ), as in the closed case.
Theorem ([Jac72, Theorem 2.1]). The cut number c (M ) of M is the maximal integer n such that
there is a surjective homomorphism φ : π1 (M ) F (n) onto the free group of rank n.
The maximal rank of any free quotient of group is called its co-rank. Hence the co-rank of
π1 (M ) is the same as the cut number of M . This is also referred to as the inner rank of π1 (M )
[Lyn59] as well as the non-commutative first Betti number of M [AL86]. For each g, we
construct an example of 3-dimensional handlebody of genus g whose groups maps onto a free group
of rank r(g) (roughly half of g) but no larger.
Theorem 2.1. For each g ≥ 1, there is a compact, connected, orientable 3-dimensional homology
handlebody Yg of genus g with c(Yg ) = r(g) where
(
g
if g is even
2
r(g) = g+1
if g is odd.
2
We expect that this may be optimal.
Question 1.5. If Y is a compact, connected, orientable 3-dimensional homology handlebody of
genus g, is c(Y ) ≥ r(g)?
Acknowledgements. The first author would like to thank Michael Freedman for asking her about
the cut number of homology handlebodies. We would like to thank John Hempel, Neil Fullarton,
and Alan Reid for helpful conversations.
2. Main Theorem
The proof of Theorem 2.1 is almost immediate once we construct examples of homology handlebodies Y2 and Y3 of genus 2 and 3 repectively with c(Y2 ) = 1 and c(Y3 ) = 2. We let Y2 will
be Thurston’s tripus manifold T ; we prove π1 (T ) is not very large in Subsection 2.2. We let
Y3 = Y , a particular genus-3 string link complement; we construct Y and prove that c(Y ) = 2 in
Subsection 2.3.
Theorem 2.1. For each g ≥ 1, there is a compact, connected, orientable 3-dimensional homology
handlebody Yg of genus g with c(Yg ) = r(g) where
(
g
if g is even
2
r(g) = g+1
if g is odd.
2
Proof. For each integer g ≥ 1 we shall construct a homology handlebody Yg of genus g with
c(Yg ) = r(g). Because r(1) = 1, we may choose Y1 to be a handlebody. Let Y2 = T and Y3 = Y ,
where T is Thurston’s Tripus manifold (see Figure 1) and Y is the string link complement from
Figure 2. Then by Propositions 2.5 and 2.6, c(Y2 ) = 1 = r(2) and c(Y3 ) = 2 = r(3). If g ≥ 4, we
define Yg inductively as the boundary connected sum Yg = Yg−2 \Y2 . By Theorem 3.2 of [Jac72],
the cut number is additive under boundary connected sum and so c(Yg ) = c(Yg−2 ) + 1. Since it is
also the case that r(g) = r(g − 2) + 1, it follows by induction that c(Yg ) = r(g) for all g ≥ 0.
2.1. Preliminary notions and lemmas. Before we prove that c(Y2 ) = 1 and c(Y3 ) = 2, we shall
determine some obstructions to a group having a non-abelian free quotient. To do this, we look at
the first homology (and relative first homology) of free abelian covering spaces of the manifolds.
We note that the co-rank is known to be algorithmically computable [Mak82, Raz95] for finitely
presented groups; however, the algorithm seems difficult to use in practice.
SHELLY HARVEY† AND EAMONN TWEEDY
4
Let X be a path connected topological space and φ : π1 (X) → Γ be a surjective group homoπ
morphism. We define Xφ −
→ X to be the covering space of X corresponding to φ. Recall that the
group of deck translations of Xφ → X is identified with Γ making H1 (Xφ ) into a left ZΓ-module.
Ker(φ)
Moreover, for any group G and surjective homomorphism φ : G → Γ, [Ker(φ),Ker(φ)]
has the structure of a left ZΓ-module
where the module action is given as follows. Let γ ∈ Γ and g ∈ Ker(φ).
Then γ [g] := hgh−1 for any h ∈ G such that φ(h) = γ (here [g] denotes the equivalence class
Ker(φ)
as left
of g). In the case that G = π1 (X), we have that H1 (Xφ ) is isomorphic to [Ker(φ),Ker(φ)]
ZΓ-modules.
Lemma 2.2. Let G be a group and Γ = Zm with m ∈ {1, 2}. If G is very large, then there exists
a surjective homomorphism φ : G → Γ such that
Ker(φ)
∼
= ZΓ ⊕ A
[Ker(φ), Ker(φ)]
for some left ZΓ-module A. In particular, if M is a compact, connected, orientable 3-manifold with
π1 (M ) very large, then there is a surjective homomorphism φ : π1 (M ) → Γ such that H1 (Mφ ) has
a ZΓ summand.
Proof. Since G is very large, there is a surjective homomorphism ψ 0 : G F where F is the free
group of rank 2. Let ψ : F Γ be a surjective homomorphism and φ = ψ ◦ ψ 0 . Then ψ induces a
surjective ZΓ-module homomorphism
ψ:
Since
Ker(ψ)
[Ker(ψ),Ker(ψ)]
Ker(φ)
Ker(ψ)
.
[Ker(φ), Ker(φ)]
[Ker(ψ), Ker(ψ)]
∼
= ZΓ is a free ZΓ module, the result follows.
Ker(ψ)
We note that in the previous proof that if m ≥ 3 then [Ker(ψ),Ker(ψ)]
is no longer a free module;
in fact, it is not even projective. Thus, to generalize the previous lemma, we work with relative
homology. Given p ∈ M , let pφ denote the preimage π −1 (p) ⊂ Mφ . The relative homology group
H1 (Mφ , pφ ) has the structure of a left ZΓ-module as before, coming from group of deck translations
acting on the pair (Mφ , pφ ). We have the following generalization of Lemma 2.2, which no longer
restricts us to using free abelian covering spaces.
Lemma 2.3. Let M be a compact, connected, orientable 3-manifold, let p ∈ M , and let Γ be a
quotient of F (n), the non-abelian free group of rank n for some n ≤ c(M ). Then there is a surjective
homomorphism φ : π1 (M ) → Γ such that
H1 (Mφ , pφ ) ∼
= ZΓn ⊕ A
for some left ZΓ-module A.
Proof. Since c(M ) ≥ n, there is an epimorphism ψ 0 : π1 (M, p) F (n), the free group of rank
n. Letting W denote the n-fold wedge of circles and w ∈ W the wedge point, there exists a map
f : M → W such that f (p) = w and such that the induced map on π1 is ψ 0 . Let ψ : π1 (W, w) → Γ
be a surjective map and φ = ψ ◦ ψ 0 . The map f can be lifted to a map g : Mφ → Wψ sending pφ
to wψ .
We examine the following commutative diagram of modules and module homomorphisms over
ZΓ, where the rows are portions of the long exact sequences of the pairs and all of the vertical
maps are the module homomorphisms on homology induced by g.
CO-RANK OF WEAKLY PARAFREE 3-MANIFOLD GROUPS
H1 (Mφ )
g1
H1 (Wψ )
H1 (Mφ , pφ )
g2
H1 (Wψ , wψ )
H0 (pφ )
g3
H0 (wψ )
5
H0 (Mφ )
g4
H0 (Wψ )
Note first that g4 is an isomorphism and g3 is an epimorphism. Also, since ψ 0 is an epimorphism
it follows that g1 is as well. Together these facts imply that g2 is an epimorphism as well. Since
H1 (Wψ , wψ ) is a free module of rank n, the result follows.
The following easy lemma is most likely well-known but we include it for completeness. This will
be used to prove that the modules arising in the proofs Propositions 2.5 and 2.6 are torsion free.
Lemma 2.4. Suppose R is a unique factorization domain and M is a left module over R with a
presentation of the form
hα1 , . . . , αn | p1 α1 + . . . pn αn i
where pk ∈ R for each k. Then:
(i) If pi and pj are relatively prime for some i 6= j, then M is torsion-free.
(ii) If there is a common factor different than 1 which is mutually shared by all of p1 , . . . , pn , then
M is not torsion-free.
In particular, for n = 2, M is torsion free if and only if p1 and p2 are relatively prime.
Proof. Statement (ii) is obvious. We proceed to prove statement (i). Suppose M has a torsion
element, f1 α1 + . . . + fn αn 6= 0 with fk ∈ R for each k. Then there exists r, s ∈ R (with s non-zero
and not a unit) such that s(f1 α1 + . . . + fn αn ) = r(p1 α1 + . . . pn αn ) in the free R module generated
by α and β. Hence sfk = rpk for each k. We can assume that s and r have no common factors,
otherwise, we could reduce them. So s much divide pk for each k. Hence no pair pi , pj can be
relatively prime.
2.2. Thurston’s tripus manifold has cut number equal to 1. Let T be W. Thurston’s tripus
manifold. That is, T is the complement of the three arcs in S 2 × I as shown in Figure 1. Smoothly
embed S 2 × I in S 3 . Then we see that T is the complement of an embedding of a θ graph in S 3
(where the exterior of S 2 × I can be identified with with the two vertices of the spatial graph).
Note that the tripus is a hyperbolic manifold with totally geodesic boundary and is also a genus 2
homology handlebody.
Proposition 2.5. Let T be W. Thurston’s Tripus manifold. Then π1 (T ) is a weakly parafree group
that is large but not very large.
Proof. Since T is a hyperbolic manifold with totally geodesic boundary [Thu97, Chapter 3], it is
irreducible and has incompressible boundary. Thus by [CLR97], π1 (T ) has a finite index subgroup
with a non-abelian free quotient. That is, π1 (T ) is large.
To show that π1 (T ) is not very large, we use Lemma 2.2. We begin by computing the first
homology of the universal abelian cover of T . We can use the Wirtinger presentation to write down
a presentation for π1 (T ):
π1 (T ) ∼
= a, b, c, d, e, f | ace, bdf, (f c)b(f c)−1 a−1 , (be)d(be)−1 c−1 , (da)f (da)−1 e−1 .
Using the relation that e = (ac)−1 and f = (bd)−1 , we get a simplified presentation:
π1 (T ) ∼
= a, b, c, d | (d−1 b−1 c)b(d−1 b−1 c)−1 a−1 , (bc−1 a−1 )d(bc−1 a−1 )−1 c−1 , (da)d−1 b−1 (da)−1 ac .
6
SHELLY HARVEY† AND EAMONN TWEEDY
Figure 1. Thurston’s Tripus, a hyperbolic manifold with totally geodesic boundary
In fact, the third relation above can be derived from the first two, and thus we can use the
presentation
π1 (T ) ∼
= a, b, c, d | (d−1 b−1 c)b(d−1 b−1 c)−1 a−1 , (bc−1 a−1 )d(bc−1 a−1 )−1 c−1 .
We now change the generating set to {a, B, c, D} where B = ba−1 and D = dc−1 . Let φ :
π1 (T ) → H1 (T ) be the abelianization map. We note that the image of two of the generators, a
and c, under φ give a basis for H1 (T ). To make the notation easier, we will call φ(a) (respectively
φ(c)), a (respectively c). Let Θ = aca−1 c−1 . Since B and D are trivial under φ, they lift to Tφ
and the set {B, D, Θ} generates H1 (Tφ ) as a Z[H1 (T )]-module. It is straightforward to write down
a presentation matrix of H1 (Tφ ) as a Z[a±1 , c±1 ]-module (here the rows are the relations and the
columns correspond to B, D, and Θ):
a + c − 1 a(a − 1) a − 1
.
c(1 − c)
1
c−1
Using row and column operations, we can find a simpler
a + c − 1 a(a − 1) a − 1
ac + a − 1
∼
c(1 − c)
1
c−1
0
ac + a − 1
∼
0
ac + a − 1
∼
0
∼ ac + a − 1
presentation:
a2 − a a − 1
1
c−1
a2 − a −a2 c − a2 − ac + a
1
c−1
0 −2a2 c
1 c−1
2a2 c
Since gcd(ac + a − 1, 2a2 c) = 1, Lemma 2.4 implies that H1 (Tφ ) is torsion-free as a H1 (T )-module.
We claim that H1 (Tφ ) is not a free module. To see this, consider the ring homomorphism ξ :
Z[H1 (T )] → Z2 [a±1 , c±1 ] where we reduce the coefficient mod 2. This map endows Z2 [a±1 , c±1 ]
with the structure of a right Z[H1 (T )]-module. If H1 (Tφ ) were free as Z[H1 (T )]-module then the
CO-RANK OF WEAKLY PARAFREE 3-MANIFOLD GROUPS
7
left Z2 [a±1 , c±1 ]-module
Z2 [a±1 , c±1 ] ⊗Z[H1 (T )] H1 (Tφ )
would be free as well. However, this tensor product module is presented by the matrix [ac+a+1, 0],
and is thus not free.
Suppose that π1 (T ) is very large. We note that there is a unique covering space of T with deck
transformation group isomorphic to Z2 , up to covering space isomorphism. Hence by Lemma 2.2,
H1 (Tφ ) ∼
= Z[H1 (T )] ⊕ A. Since the rank of H1 (Tφ ) (as a Z[H1 (T )]-module) in our case is 1, it
follows that A must have rank 0 and hence is a torsion module. However, we know that H1 (Tφ )
is torsion-free so A = 0. This contradicts the fact that H1 (Tφ ) is not a free module and the result
follows.
2.3. A genus-3 homology handlebody with cut number equal to 2.
Proposition 2.6. There is a genus 3 homology handlebody Y with c(Y ) = 2.
x
r
a
y
b
c
d
z
s
w
e
f
u
g
t
Figure 2. The homology handlebody Y is the complement of this pure 3-string
link. Generators of π1 (Y ) are labelled.
Proof. Let Y denote the homology handlebody that is the complement in D2 × I of the threecomponent pure string link show in Figure 2. Removing the middle string leaves of with the trivial
string link whose complement is a handlebody. Hence there is a surjective map π1 (Y ) → F (2),
hence c(Y ) ≥ 2.
A presentation of π1 (Y ) can be computed via the Wirtinger presentation:
π1 (Y ) ∼
=
a, b, c, d, e, f, g, zuz −1 w−1 , eze−1 w−1 , xzx−1 y −1 , bxb−1 y −1 , f sf −1 t−1 , crc−1 s−1 ,
r, s, t, x, y, z, u, w ege−1 f −1 , tet−1 f −1 , wdw−1 e−1 , bdb−1 c−1 , sbs−1 c−1 , yay −1 b−1
First notice that the generators a, g, r, u each appear in only one relation, and can thus be
eliminated along with those relations to produce the following smaller presentation:
b, c, d, e, f, bxb−1 y −1 , xzx−1 y −1 , eze−1 w−1 , tet−1 f −1 ,
∼
π1 (Y ) =
s, t, x, y, z, w sbs−1 c−1 , f sf −1 t−1 , bdb−1 c−1 , wdw−1 e−1
SHELLY HARVEY† AND EAMONN TWEEDY
8
We shall obtain an even simpler presentation by combining relations. The first four relations
imply that
x = b−1 yb = b−1 xzx−1 b = b−1 xe−1 wex−1 b = b−1 xt−1 f −1 twt−1 f tx−1 b
Similarly, the last five relations imply that b = f −1 t−1 f bw−1 t−1 f twb−1 f −1 tf . These observations
lead us to a presentation with seven generators and only two relations:
π1 (Y ) ∼
= b, f, t, x, w | b−1 xt−1 f −1 twt−1 f tx−1 bx−1 , f −1 t−1 f bw−1 t−1 f twb−1 f −1 tf b−1
Consider the abelianization map φ : π1 (Y ) → H1 (Y ). Note that φ(x) = φ(w) and φ(b) = φ(f ),
so that the images of b, t, and x give a basis for H1 (Y ). Considering the universal abelian cover
Yφ , we choose a basepoint p ∈ Y and let pφ = φ−1 (p) ∈ Yφ . Using the Fox differential calculus,
we can obtain a presentation for the structure of H1 (Yφ , pφ ) as a left module over Z[H1 (Y )] ∼
=
Z[b±1 , t±1 , x±1 ]. With respect to the generators b, f, t, x, w, a presentation matrix is
(2.7)
btx − bt
x2 − x
bx2 − bx − x2 + x bt − b2 t − btx
tx
btx − b2 tx − bt2 x bt2 x − t2 x − btx + tx + b2 btx − tx + b3 − b2
0
b3 t − b2 t
We first claim that this module is not free. We use ξ : H1 (Y ) → Z3 [b±1 , t±1 , x±1 ], given by
reducing coefficients modulo 3, to endow Z3 [b±1 , t±1 , x±1 ] with the structure of a right Z[H1 (Y )]module. If H1 (Yφ , pφ ) were a free Z[H1 (Y )]-module, then the left Z3 [b±1 , t±1 , x±1 ]-module
Z3 [b±1 , t±1 , x±1 ] ⊗Z[H1 (Y )] H1 (Yφ , pφ )
would also be free.
Recall that given a rank r module, N , over a multivariable Laurent polynomial ring R, is projective if and only if the rth elementary ideal Er (N ) of N is equal to all of R. We used the
Magma Computational Algebra System [BCP97] to verify that the ideal generated by the 2 × 2
minors of the above matrix, viewed modulo 3, is indeed proper in Z3 [b±1 , t±1 , x±1 ]. Therefore the
Z3 [b±1 , t±1 , x±1 ]-module
Z3 [b±1 , t±1 , x±1 ] ⊗Z[H1 (Y )] H1 (Yφ , pφ )
is not projective and hence not free. It follows that H1 (Yφ , pφ ) is not a free Z[H1 (Y )]-module.
Our Magma source code can be found below. Note that here B = b−1 , T = t−1 , and X = x−1 .
P<x , X, b , B, t , T> := PolynomialRing (GF( 3 ) , 6 ) ;
Q<x , X, b , B, t , T> := quo<P | x∗X−1, t ∗T−1, b∗B−1>;
M := Matrix (Q, 2 , 5 , [ b∗ t ∗ ( x −1) , x ∗ ( x −1) , x ∗ ( b −1)∗(x −1) ,
b∗ t ∗(1−x−b ) , t ∗x , b∗ t ∗x∗(1−b−t ) ,
−t ˆ2∗ x+t ∗x+bˆ2−b∗ t ∗x+b∗ t ˆ2∗x ,
−t ∗x−bˆ2+bˆ3+b∗ t ∗x , 0 , bˆ2∗ t ∗ ( b − 1 ) ] ) ;
Mi := Minors (M, 2 ) ;
I := i d e a l <Q | Mi>;
IsProper ( I )
We now claim that the module H1 (Yφ , pφ ) is torsion-free. After multiplying the second row of
the matrix (2.7) by x, adding b2 − b3 times the first row to the second row, eliminating a generator
and relation, and rescaling several entries by units we obtain a smaller presentation matrix:
CO-RANK OF WEAKLY PARAFREE 3-MANIFOLD GROUPS
9
T
−b3 x + b3 + b2 x − bx2 − tx2 − b2 + x2
−b3 x + bt2 x + b3 + b2 x − btx − t2 x + tx
4
−b x + b4 + 2b3 x − b3 − b2 x + btx − tx
b2 + bx − 2b − x + 1
(2.8)
Now consider the ring homomorphism η : Z[H1 (Y )] → Z[t±1 , x±1 ] generated by the homomorphism H1 (Y ) →< t, x > sending b and t to t and x to x. As before η induces a left Z[t±1 , x±1 ]module structure on
Z[t±1 , x±1 ] ⊗Z[H1 (Y )] H1 (Yφ , pφ )
which has torsion if H1 (Yφ , pφ ) has torsion. We obtain a presentation matrix for the above tensor
module by setting b = t in (2.8) and rescaling several entries by units:
3
T
−t x + t3 + t2 x − 2tx2 − t2 + x2
t2 − tx + x
3
3
2
2
−t x + t + 2t x − t − x
2
t + tx − 2t − x + 1
We verified in Magma that the first two entries of this matrix (in fact, any two entries) are relatively
prime. By Lemma 2.4, the module is torsion-free.
Thus, H1 (Yφ , pφ ) is a torsion-free module of rank 3. Suppose that π1 (Y ) maps onto a free group
of rank 3. Since β1 (Y ) = 3, there is a unique Z3 covering space (up to covering space isomorphism)
so by Lemma 2.3, H1 (Yφ , pφ ) ∼
= Z[H1 (Y )]3 ⊕ A for some A. Since H1 (Yφ , pφ ) is rank 3, it follows
that A must be a torsion module. However H1 (Yφ , pφ ) is torsion free so A = 0. This contradicts
the fact that H1 (Yφ , pφ ) is not free and it follows that c(Y ) = 2.
References
[AFW15] Matthias Aschenbrenner, Stefan Friedl, and Henry Wilton. 3-manifold groups. EMS Series of Lectures in
Mathematics. European Mathematical Society (EMS), Zürich, 2015.
[Ago13] Ian Agol. The virtual Haken conjecture. Doc. Math., 18:1045–1087, 2013. With an appendix by Agol, Daniel
Groves, and Jason Manning.
[AL86]
Pierre Arnoux and Gilbert Levitt. Sur l’unique ergodicité des 1-formes fermées singulières. Invent. Math.,
84(1):141–156, 1986.
[BCP97] Wieb Bosma, John Cannon, and Catherine Playoust. The Magma algebra system. I. The user language. J.
Symbolic Comput., 24(3-4):235–265, 1997. Computational algebra and number theory (London, 1993).
[CLR97] D. Cooper, D. D. Long, and A. W. Reid. Essential closed surfaces in bounded 3-manifolds. J. Amer. Math.
Soc., 10(3):553–563, 1997.
[COT03] Tim D. Cochran, Kent E. Orr, and Peter Teichner. Knot concordance, Whitney towers and L2 -signatures.
Ann. of Math. (2), 157(2):433–519, 2003.
[Gel15] Irina Gelbukh. Co-rank and Betti number of a group. Czechoslovak Math. J., 65(140)(2):565–567, 2015.
[Gel17] Irina Gelbukh. The co-rank of the fundamental group: the direct product, the first Betti number, and the
topology of foliations. Math. Slovaca, 67(3):645–656, 2017.
[Har02] Shelly L. Harvey. On the cut number of a 3-manifold. Geom. Topol., 6:409–424, 2002.
[Jac72]
William Jaco. Geometric realizations for free quotients. J. Austral. Math. Soc., 14:411–418, 1972.
[Ker01] Thomas Kerler. Homology TQFT’s and the Alexander-Reidemeister invariant of 3-manifolds
via Hopf algebras and skein theory. 2001. Version 3 of the arxiv verion of this paper,
https://arxiv.org/pdf/math/0008204v3.pdf.
[LR02]
Christopher J. Leininger and Alan W. Reid. The co-rank conjecture for 3-manifold groups. Algebr. Geom.
Topol., 2:37–50, 2002.
[Lyn59] R. C. Lyndon. The equation a2 b2 = c2 in free groups. Michigan Math. J, 6:89–95, 1959.
[Mak82] G. S. Makanin. Equations in a free group. Izv. Akad. Nauk SSSR Ser. Mat., 46(6):1199–1273, 1344, 1982.
[Raz95] Alexander A. Razborov. On systems of equations in free groups. In Combinatorial and geometric group
theory (Edinburgh, 1993), volume 204 of London Math. Soc. Lecture Note Ser., pages 269–283. Cambridge
Univ. Press, Cambridge, 1995.
[Sik05]
Adam S. Sikora. Cut numbers of 3-manifolds. Trans. Amer. Math. Soc., 357(5):2007–2020, 2005.
SHELLY HARVEY† AND EAMONN TWEEDY
10
[Sta65]
[Thu97]
John Stallings. Homology and central series of groups. J. Algebra, 2:170–181, 1965.
William P. Thurston. Three-dimensional geometry and topology. Vol. 1, volume 35 of Princeton Mathematical Series. Princeton University Press, Princeton, NJ, 1997. Edited by Silvio Levy.
Rice University, Houston, TX, USA
E-mail address: [email protected]
Widener University, Philadelphia, PA, USA
E-mail address: [email protected]
| 4math.GR
|
Safe Non-blocking Synchronization in Ada 202x
Johann Blieberger1 and Bernd Burgstaller2
arXiv:1803.10067v1 [cs.PL] 27 Mar 2018
1
Institute of Computer Engineering, Automation Systems Group, TU Wien, Austria
2
Department of Computer Science, Yonsei University, Korea
Abstract. The mutual-exclusion property of locks stands in the way to
scalability of parallel programs on many-core architectures. Locks do not
allow progress guarantees, because a task may fail inside a critical section
and keep holding a lock that blocks other tasks from accessing shared
data. With non-blocking synchronization, the drawbacks of locks are
avoided by synchronizing access to shared data by atomic read-modifywrite operations.
To incorporate non-blocking synchronization in Ada 202x, programmers
must be able to reason about the behavior and performance of tasks in
the absence of protected objects and rendezvous. We therefore extend
Ada’s memory model by synchronized types, which support the expression of memory ordering operations at a sufficient level of detail. To mitigate the complexity associated with non-blocking synchronization, we
propose concurrent objects as a novel high-level language construct. Entities of a concurrent object execute in parallel, due to a fine-grained, optimistic synchronization mechanism. Synchronization is framed by the semantics of concurrent entry execution. The programmer is only required
to label shared data accesses in the code of concurrent entries. Labels
constitute memory-ordering operations expressed through attributes. To
the best of our knowledge, this is the first approach to provide a nonblocking synchronization construct as a first-class citizen of a high-level
programming language. We illustrate the use of concurrent objects by
several examples.
1
Introduction
Mutual exclusion locks are the most common technique to synchronize multiple tasks to access shared data. Ada’s protected objects (POs) implement the
monitor-lock concept [12]. Method-level locking requires a task to acquire an
exclusive lock to execute a PO’s entry or procedure. (Protected functions allow
concurrent read-access in the style of a readers–writers lock [11].) Entries and
procedures of a PO thus effectively execute one after another, which makes it
straight-forward for programmers to reason about updates to the shared data
encapsulated by a PO. Informally, sequential consistency ensures that method
calls act as if they occurred in a sequential, total order that is consistent with
the program order of each participating task. I.e., for any concurrent execution,
the method calls to POs can be ordered sequentially such that they (1) are consistent with program order, and (2) meet each PO’s specification (pre-condition,
side-effect, post-condition) [11].
2
Although the sequential consistency semantics of mutual exclusion locks facilitate reasoning about programs, they nevertheless introduce potential concurrency bugs such as dead-lock, live-lock and priority inversion. The mutualexclusion property of (highly-contended) locks stands in the way to scalability of
parallel programs on many-core architectures [15]. Locks do not allow progress
guarantees, because a task may fail inside a critical section (e.g., by entering an
endless loop), preventing other tasks from accessing shared data.
Given the disadvantages of mutual exclusion locks, it is thus desirable to
give up on method-level locking and allow method calls to overlap in time. Synchronization is then performed on a finer granularity within a method’s code, via
atomic read-modify-write (RMW) operations. In the absence of mutual exclusion
locks, the possibility of task-failure inside a critical section is eliminated, because
critical sections are reduced to single atomic operations. These atomic operations
are provided either by the CPU’s instruction set architecture (ISA), or the language run-time (with the help of the CPU’s ISA). It thus becomes possible to
provide progress guarantees, which are unattainable with locks. In particular, a
method is non-blocking, if a task’s pending invocation is never required to wait
for another task’s pending invocation to complete [11].
Non-blocking synchronization techniques are notoriously difficult to implement and the design of non-blocking data structures is an area of active research.
To enable non-blocking synchronization, a programming language must provide
a strict memory model. The purpose of a memory model is to define the set of
values a read operation in a program is allowed to return [2].
To motivate the need for a strict memory model, consider the producerconsumer synchronization example in Fig. 1(a) (adopted from [17] and [5]). The
programmer’s intention is to communicate the value of variable Data from Task 1
to Task 2. Without explicitly requesting a sequentially consistent execution, a
compiler or CPU may break the programmer’s intended synchronization via the
Flag variable by re-ordering memory operations that will result in reading R2
= 0 in Line 6 of Task 2. (E.g., a store–store re-ordering of the assignments in
lines 2 and 3 of Task 1 will allow this result.) In Ada 2012, such re-orderings
1
2
3
-- Initial values :
Flag := False ;
Data := 0;
1
1
2
3
2
-- Task 1:
Data := 1;
Flag := True ;
3
4
5
6
(a)
-- Task 2:
loop
R1 := Flag ;
exit when R1 ;
end loop ;
R2 := Data ;
1
2
Data : Integer w i t h Volatile ;
Flag : Boolean w i t h Atomic ;
(b)
Fig. 1: (a) Producer-consumer synchronization in pseudo-code: Task 1 writes the
Data variable and then signals Task 2 by setting the Flag variable. Task 2 is
spinning on the Flag variable (lines 2 to 5) and then reads the Data variable.
(b) Labeling to enforce sequential consistency in Ada 2012.
3
can be ruled out by labeling variables Data and Flag by aspect volatile. The
corresponding variable declarations are depicted in Fig. 1(b). (Note that by [8,
C.6§8/3] aspect atomic implies aspect volatile, but not vice versa.)
The intention for volatile variables in Ada 2012 was to guarantee that all
tasks agree on the same order of updates [8, C.6§16/3]. Updates of volatile
variables are thus required to be sequentially consistent, in the sense of Lamport’s
definition [13]: “With sequential consistency (SC), any execution has a total order
over all memory writes and reads, with each read reading from the most recent
write to the same location”.
However, the Ada 2012 aspect volatile has the following shortcomings:
1. Ensuring SC for multiple tasks without atomic access is impossible. Nonatomic volatile variables therefore should not be provided by the language.
Otherwise, the responsibility shifts from the programming language implementation to the programmer to ensure SC by pairing an atomic (implied
volatile) variable with each non-atomic volatile variable (see, e.g., Fig. 1(b)
and [16] for examples). (Note that a programming language implementation
may ensure atomicity by a mutual exclusion lock if no hardware primitives
for atomic access to a particular type of shared data are available.)
2. Requiring SC on all shared variables is costly in terms of performance on
contemporary multi-core CPUs. In Fig. 1, performance can be improved by
allowing a less strict memory order for variable Data (to be addressed in
Section 2).
3. Although Ada provides the highly abstract PO monitor-construct for blocking synchronization, there is currently no programming primitive available
to match this abstraction level for non-blocking synchronization.
Contemporary CPU architectures relax SC for the sake of performance [3,9,17].
It is a challenge for programming language designers to provide safe, efficient and
user-friendly non-blocking synchronization features. The original memory model
for Java contained problems and had to be revised [14]. It was later found to be
unsound with standard compiler optimizations [18]. The C++11 standard (cf.
[1,19]) has already specified a strict memory model for concurrent and parallel
computing. We think that C++11 was not entirely successful both in terms of
safety and in terms of being user-friendly. In contrast, we are convinced that
these challenges can be met in the upcoming Ada 202x standard.
It has been felt since Ada 95 that it might be advantageous to have language
support for synchronization based on atomic variables. For example, we cite [10,
C.1]: “A need to access specific machine instructions arises sometimes from other
considerations as well. Examples include instructions that perform compound
operations atomically on shared memory, such as test-and-set and compare-andswap, and instructions that provide high-level operations, such as translate-andtest and vector arithmetic.”
Ada is already well-positioned to provide a strict memory model in conjunction with support for non-blocking synchronization, because it provides tasks as
first-class citizens. This rules out inconsistencies that may result from threadfunctionality provided through libraries [6].
4
To provide safe and efficient non-blocking synchronization for Ada 202x, this
paper makes the following contributions:
1. We extend Ada’s memory model by introducing synchronized types, which
allow the expression of memory ordering operations consistently and at a
sufficient level of detail. Memory ordering operations are expressed through
aspects and attributes. Language support for spin loop synchronization via
synchronized variables is proposed.
2. We propose concurrent objects (COs) as a high-level language construct to
express non-blocking synchronization. COs are meant to encapsulate the
intricacies of non-blocking synchronization as POs do for blocking synchronization. Contrary to POs, the entries and procedures of COs execute in
parallel, due to a fine-grained, optimistic synchronization mechanism.
3. We provide an alternative, low-level API on synchronized types, which provides programmers with full control over the implementation of non-blocking
synchronization semantics. Our main purpose with the low-level API is to
provoke a discussion on the trade-off between abstraction versus flexibility.
4. We illustrate the use of concurrent objects and the alternative, low-level API
by several examples.
The remainder of this paper is organized as follows. We summarize the stateof-the-art on memory models and introduce synchronized variables in Sec. 2. We
introduce attributes for specifying memory ordering operations in Sec. 3. We
specify concurrent objects in Sec. 4 and discuss task scheduling in the presence
of COs in Sec. 5. Sec. 6 contains two CO example implementations with varying
memory consistency semantics. We discuss our low-level API in Sec. 7. Sec. 8
contains our conclusions.
Due to space constraints, we have issued a technical report which contains additional programming examples and the rationale for the design of the proposed
non-blocking synchronization mechanisms. Although the paper is intended to
be comprehensive without the appendices, we felt the additional material might
nevertheless be useful. For the same reason of constrained space, the description
of our approach cannot be compared to the specification of Ada on RML-level.
2
The Memory Model
For reasons outlined in Sec. 1, we do not consider the Ada 2012 atomic and
volatile types here. Rather, we introduce synchronized types and variables. Synchronized types provide atomic access. We propose aspects and attributes for
specifying a particular memory model to be employed for reading/writing synchronized variables.
Modern multi-core computer architectures are equipped with a memory hierarchy that consist of main memory, caches and registers. It is important to
2
“Core” refers to the software’s view of a core, which may be an actual core or a
thread context of a multithreaded core [17].
5
distinguish between memory consistency and coherence. We cite from [17]: ‘For
a shared memory machine, the memory consistency model defines the architecturally visible behavior of its memory system. Consistency definitions provide
rules about loads and stores (or memory reads and writes) and how they act
upon memory. As part of supporting a memory consistency model, many machines also provide cache coherence protocols that ensure that multiple cached
copies of data are kept up-to-date.’
The purpose of a memory consistency model (or memory model, for short)
is to define the set of values a read operation is allowed to return [2]. To facilitate programmers’ intuition, it would be ideal if all read/write operations of
a program’s tasks are sequentially consistent. However, the hardware memory
models provided by contemporary CPU architectures relax SC for the sake of
performance [3,9,17]. Enforcing SC on such architectures may incur a noticeable
performance penalty. The workable middle-ground between intuition (SC) and
performance (relaxed hardware memory models) has been established with SC
for data race-free programs (SC-for-DRF) [4]. Informally, a program has a data
race if two tasks access the same memory location, at least one of them is a
write, and there are no intervening synchronization operations that would order
the accesses. “SC-for-DRF” requires programmers to ensure that programs are
free of data races under SC. In turn, the relaxed memory model of a SC-for-DRF
CPU guarantees SC for all executions of such a program.
It has been acknowledged in the literature [2] that Ada 83 was perhaps the
first widely-use high-level programming language to provide first-class support
for shared-memory programming. The approach taken with Ada 83 and later
language revisions was to require legal programs to be without synchronization
errors, which is the approach taken with SC-for-DRF. In contrast, for the Java
memory model it was perceived that even programs with synchronization errors shall have defined semantics for reasons of safety and security of Java’s
sand-boxed execution environment. (We do not consider this approach in the remainder of this paper, because it does not align with Ada’s current approach to
regard the semantics of programs with synchronization errors as undefined, i.e.,
as an erroneous execution, by [8, 9.10§11].) The SC-for-DRF programming model
and two relaxations were formalized for C++11 [7]. They were later adopted for
C11, OpenCL 2.0, and for X10 [21] (without the relaxations).
On the programming language level to guarantee DRF, means for synchronization (ordering operations) have to be provided. Ada’s POs are well-suited for
this purpose. For non-blocking synchronization, atomic operations can be used
to enforce an ordering between the memory accesses of two tasks. It is one goal
of this paper to add language features to Ada such that atomic operations can
be employed with DRF programs. To avoid ambiguity, we propose synchronized
variables and types, which support the expression of memory ordering operations
at a sufficient level of detail (see Sec. 3.1).
The purpose of synchronized variables is that they can be used to safely transfer information (i.e., the value of the variables) from one task to another. ISAs
provide atomic load/store instructions only for a limited set of primitive types.
6
Beyond those, atomicity can only be ensured by locks. Nevertheless, computer
architectures provide memory fences (see e.g., [11]) to provide means for ordering
memory operations. A memory fence requires that all memory operations before
the fence (in program order) must be committed to the memory hierarchy before
any operation after the fence. Then, for data to be transferred from one thread to
another it is not necessary to be atomic anymore. I.e., it is sufficient that (1) the
signaling variable is atomic, and that (2) all write operations are committed to
the memory hierarchy before setting the signaling variable. On the receiver’s
side, it must be ensured that (3) the signaling variable is read atomically, and
that (4) memory loads for the data occur after reading the signaling variable
(Listing 1.2 provides an example.)
In addition to synchronized variables, synchronized types and attribute
Synchronized Components are convenient means for enhancing the usefulness
of synchronized variables.
The general idea of our proposed approach is to define non-blocking concurrent objects similar to protected objects (cf. e.g., [11]). However, entries of
concurrent objects will not block on guards; they will spin loop until the guard
evaluates to true. In addition, functions, procedures, and entries of concurrent
objects are allowed to execute and to modify the encapsulated data in parallel.
Private entries for concurrent objects are also supported. It is their responsibility
that the data provides a consistent view to the users of the concurrent object.
Concurrent objects will use synchronized types for synchronizing data access.
Several memory models are provided for doing this efficiently. It is the responsibility of the programmer to ensure that the entries of a concurrent object are
free from data races (DRF). For such programs, the non-blocking semantics of
a concurrent object will provide SC in the same way as protected objects do for
blocking synchronization.
2.1
Synchronizing memory operations and enforcing ordering
For defining ordering relations on memory operations, it is useful to introduce
some other useful relations.
The synchronizes-with relation can be achieved only by use of atomic types.
Even if monitors or protected objects are used for synchronization, the runtime
implements them employing atomic types. The general idea is to equip read and
write operations on an atomic variable with information that will enforce an
ordering on the read and write operations. Our proposal is to use attributes for
specifying this ordering information. Details can be found below.
The happens-before relation is the basic relation for ordering operations in
programs. In a program consisting of only one single thread, happens-before
is straightforward. For inter-thread happens-before relations the synchronizeswith relation becomes important. If operation X in one thread synchronizes-with
operation Y in another thread, then X happens-before Y. Note that the happensbefore relation is transitive, i.e., if X happens-before Y and Y happens-before Z,
then X happens-before Z. This is true even if X, Y, and Z are part of different
threads.
7
We define different memory models. These memory models originated from
the DRF [4] and properly-labeled [9] hardware memory models. They were formalized for the memory model of C++ [7]. The “sequentially consistent” and
“acquire-release” memory models provide SC for DRF. The models can have
varying costs on different computer architectures. The “acquire-release” memory model is a relaxation of the “sequentially consistent” memory model. As
described in Table 1, it requires concessions from the programmer to weaken SC
in turn for more flexibility for the CPU to re-order memory operations.
Sequentially Consistent Ordering is the most stringent model and the easiest one for programmers to work with. In this case all threads see the same,
total order of operations. This means, a sequentially consistent write to a
synchronized variable synchronizes-with a sequentially-consistent read of the
same variable.
Relaxed Ordering does not obey synchronizes-with relationships, but operations on the same synchronized variable within a single thread still obey
happens-before relationships. This means that although one thread may
write a synchronized variable, at a later point in time another thread may
read an earlier value of this variable.
Acquire-Release Ordering when compared to relaxed ordering introduces
some synchronization. In fact, a read operation on synchronized variables
can then be labeled by acquire, a write operation can be labeled by release.
Synchronization between release and acquire is pairwise between the thread
that issues the release and that acquire operation of a thread that does the
first read-acquire after the release.3 A thread issuing a read-acquire later
may read a different value than that written by the first thread.
It is important to note, that the semantics of the models above have to
be enforced by the compiler (for programs which are DRF). I.e., the compiler
“knows” the relaxed memory model of the hardware and inserts memory fences
in the machine-code such that the memory model of the high-level programming
language is enforced. Compiler optimizations must ensure that reordering of
operations is performed in such a way that the semantics of the memory model
are not violated. The same applies to CPUs, i.e., reordering of instructions is
done with respect to the CPU’s relaxed hardware memory model, constrained
by the ordering semantics of fences inserted by the compiler. The constraints
enforced by the memory model are summarized in Table 1.
3
4
5
In global time!
Memory accesses other than accesses to synchronized variables
Before optimizations performed by the compiler and before reordering done by the
CPU.
8
memory order involved
threads
relaxed
1
release/acquire
2
sequentially
consistent
all
constraints for reordering memory accesses
(for compilers and CPUs)
no inter-thread constraints
(1) ordinary4 stores originally5 before release (in program order) will happen before the release fence (after
compiler optimizations and CPU reordering)
(2) ordinary loads originally after acquire (in program
order) will take place after the acquire fence (after compiler optimizations and CPU reordering)
(1) all memory accesses originally before the sequentially consistent one (in program order) will happen before the fence (after compiler optimizations and CPU reordering)
(2) all memory accesses originally after the sequentially consistent one (in program order) will happen after the fence (after compiler optimizations and CPU reordering)
Table 1: Memory Order and Constraints for Compilers and CPUs
3
3.1
Synchronization primitives
Synchronized Variables
Synchronized variables can be used as atomic variables in Ada 2012, the only
exception being that they are declared inside the lexical scope (data part) of a
concurrent object. In this case aspects and attributes used in the implementation
of the concurrent object’s operations (functions, procedures, and entries) are
employed for specifying behavior according to the memory model. Variables are
labeled by the boolean aspect Synchronized.
Read accesses to synchronized variables in the implementation of the concurrent object’s operations may be labeled with the attribute Concurrent Read,
write accesses with the attribute Concurrent Write. Both attributes have a
parameter Memory Order to specify the memory order of the access. (If the operations are not labeled, the default values given below apply.) In case of read accesses, values allowed for parameter Memory Order are Sequentially Consistent,
Acquire, and Relaxed. The default value is Sequentially Consistent. For
write accesses the values allowed are Sequentially Consistent, Release, and
Relaxed. The default value is again Sequentially Consistent.
For example, assigning the value of synchronized variable Y to synchronized
variable X is given like
X’Concurrent Write(Memory Order => Release) :=
Y’Concurrent Read(Memory Order => relaxed);
In addition we propose aspects for specifying variable specific default values
for the attributes described above. In more detail, when declaring synchronized
variables the default values for read and write accesses can be specified via
aspects Memory Order Read and Memory Order Write. The allowed values are
9
the same as those given above for read and write accesses. If these memory
model aspects are given when declaring a synchronized variable, the attributes
Concurrent Read and Concurrent Write need not be given for actual read and
write accesses of this variable. However, these attributes may be used to temporarily over-write the default values specified for the variable by the aspects.
For example
X: integer with Synchronized, Memory Order Write => Release;
Y: integer with Synchronized, Memory Order Read => Acquire;
...
X := Y;
does the same as the example above but without spoiling the assignment statement.
Aspect Synchronized Components relates to aspect Synchronized in the
same way as Atomic Components relates to Atomic in Ada 2012.
3.2
Read-Modify-Write Variables
If a variable inside the data part of a concurrent object is labeled by the aspect
Read Modify Write, this implies that the variable is synchronized. Write access
to a read-modify-write variable in the implementation of the protected object’s
operations is a read-modify-write access. The read-modify-write access is done
via the attribute Concurrent Exchange. The two parameters of this attribute
are Memory Order Success and Memory Order Failure. The first specifies the
memory order for a successful write, the second one the memory order if the
write access fails (and a new value is assigned to the variable).
Memory Order Success is one of Sequentially Consistent, Acquire,
Release, and Relaxed.
Memory Order Failure may be one of Sequentially Consistent, Acquire,
and Relaxed. The default value for both is Sequentially Consistent. For
the same read-modify-write access the memory order specified for failure must
not be stricter than that specified for success. So, if Memory Order Failure =>
Acquire or Memory Order Failure => Sequentially Consistent is specified,
these have also be given for success.
For read access to a read-modify-write variable, attribute Concurrent Read
has to be used. The parameter Memory Order has to be given. Its value is one of
Sequentially Consistent, Acquire, Relaxed. The default value is
Sequentially Consistent.
Again, aspects for variable specific default values for the attributes described
above may be specified when declaring a read-modify-write variable. The aspects
Memory Order Write Success,
and
are
Memory Order Read,
Memory Order Write Failure with allowed values as above.
3.3
Synchronization Loops
As presented below synchronization by synchronized variables is performed via
spin loops. We call these loops sync loops.
10
4
Concurrent Objects
4.1
Non-Blocking Synchronization
Besides the aspects and attributes proposed in Section 3 that have to be used
for implementing concurrent objects, concurrent objects are different from protected objects in the following way. All operations of concurrent objects can be
executed in parallel. Synchronized variables have to be used for synchronizing
the executing operations. Entries have Boolean-valued guards. The Boolean expressions for such guards may contain only synchronized variables declared in
the data part of the protected object and constants. Calling an entry results
either in immediate execution of the entry’s body if the guard evaluates to true,
or in spin-looping until eventually the guard evaluates to true. We call such a
spin loop sync loop.
4.2
Read-Modify-Write Synchronization
For concurrent objects with read-modify-write variables the attributes proposed
in Section 3 apply. All operations of concurrent objects can be executed in parallel. Read-modify-write variables have to be used for synchronizing the executing
operations. The guards of entries have to be of the form X = X’OLD where X denotes a read-modify-write variable of the concurrent object. The attribute OLD
is well-known from postconditions. An example in our context can be found in
Listing 1.1.
If during the execution of an entry a read-modify-write operation is reached,
that operation might succeed immediately, in which case execution proceeds after
the operation in the normal way. If the operation fails, the whole execution of the
entry is restarted (implicit sync loop). In particular, only the statements being
data-dependent on the read-modify-write variable are re-executed. Statements
not being data-dependent on the read-modify-write variables are executed only
on the first try.6 Precluding non-data-dependent statements from re-execution
is not only a matter of efficiency, it sometimes makes sense semantically, e.g.,
for adding heap management to an implementation.
5
Scheduling and Dispatching
We propose a new state for Ada tasks to facilitate correct scheduling and dispatching for threads synchronizing via synchronized or read-modify-write types.
If a thread is in a sync loop, the thread state changes to “in sync loop”. Note
that sync loops can only happen inside concurrent objects. Thus they can be
spotted easily by the compiler and cannot be confused with “normal” loops.
Note also that for the state change it makes sense not to take place during the
6
For the case that the compiler cannot figure out which statements are datadependent, we propose an additional Boolean aspect only execute on first try
to tag non-data-dependent statements.
11
first iteration of the sync loop, because the synchronization may succeed immediately. For read-modify-write loops, iteration from the third iteration on may
be a good choice; for spin loops, an iteration from the second iteration on may
be a good choice.
In this way the runtime can guarantee that not all available CPUs (cores)
are occupied by threads in state “in sync loop”. Thus we can be sure that at
least one thread makes progress and finally all synchronized or read-modify-write
variables are released (if the program’s synchronization structure is correct and
the program does not deadlock).
After leaving a sync loop, the thread state changes back to “runable”.
6
Examples
Non-blocking Stack. Listing 1.1 shows an implementation of a non-blocking
stack using our proposed new syntax for concurrent objects.
1
s u b t y p e Data i s Integer ;
2
3
4
5
6
7
8
9
t y p e List ;
t y p e List_P i s a c c e s s List ;
t y p e List i s
record
D : Data ;
Next : List_P ;
end r e c o r d ;
10
11
Empty : e x c e p t i o n ;
12
13
14
15
16
17
18
19
20
21
22
c o n c u r r e n t Lock_Free_Stack
is
e n t r y Push ( D : Data ) ;
e n t r y Pop ( D : o u t Data ) ;
private
Head : List_P w i t h R ea d M o d i f y W r i te ,
Memory Order Read = > R el a x ed ,
Memory Order Write Success => R elea s e ,
Memory Order Write Failure => Relaxed;
end L o c k _ F r e e _ S t a c k;
23
24
25
26
27
28
29
30
31
c o n c u r r e n t body L o c k _ F r e e _ S t a c k i s
e n t r y Push ( D : Data )
u n t i l Head = Head ’ OLD i s
New_Node : List_P := new List ;
begin
New_Node . a l l := ( D = > D , Next = > Head ) ;
Head := New_Node ;
end Push ;
32
33
34
35
36
37
38
39
40
41
42
43
44
e n t r y Pop ( D : o u t Data )
u n t i l Head = Head ’ OLD i s
Old_Head : List_P ;
begin
Old_Head := Head ;
i f Old_Head /= n u l l t h e n
Head := Old_Head . Next ;
D := Old_head . D ;
else
r a i s e Empty ;
end i f ;
end Pop ;
12
45
end L o c k _ F r e e _ S t a c k;
Listing 1.1: Non-blocking Stack Implementation Using Proposed New Syntax
Implementation of entry Push (lines 25–31) behaves as follows. In Line 29 a
new element is inserted at the head of the list. Pointer Next of this element is
set to the current head. The next statement (Line 30) assigns the new value to
the head of the list. Since variable Head has aspect Read Modify Write (line 18),
this is done with RMW semantics, i.e., if the value of Head has not been changed
(since the execution of Push has started) by a different thread executing Push
or Pop (i.e., Head = Head’OLD), then the RMW operation succeeds and execution proceeds at Line 31, i.e., Push returns. If the value of Head has been
changed (Head /= Head’OLD), then the RMW operation fails and entry Push is
re-executed starting from Line 29. Line 27 is not re-executed as it is not data
dependent on Head.
Several memory order attributes apply to the RMW operation (Line 30)
which are given in lines 19–21: In case of a successful execution of the RMW, the
value of Head is released such that other threads can read its value via memory
order acquire. In the failure case the new value of Head is assigned to the “local
copy” of Head (i.e., Head’OLD) via relaxed memory order. “Relaxed” is enough
because RMW semantics will detect if the value of Head has been changed by a
different thread anyway. The same applies to “Relaxed” in Line 27.
Implementation of entry Pop (lines 33–44) follows along the same lines.
Memory management needs special consideration: In our case it is enough to
use a synchronized counter that counts the number of threads inside Pop. If the
counter equals 1, memory can be freed. Ada’s storage pools are a perfect means
for doing this without spoiling the code.
This example also shows how easy it is to migrate from a (working) blocking
to a (working) non-blocking implementation of a program. Assume that a working implementation with a protected object exists, then one has to follow these
steps:
1. Replace keyword protected by keyword concurrent.
2. Replace protected operations by DRF concurrent operations, thereby adding
appropriate guards to the concurrent entries.
3. Test the non-blocking program which now has default memory order
sequentially consistent.
4. Carefully relax the memory ordering requirements: Add memory order aspects and/or attributes Acquire, Release, and/or Relaxed to improve performance but without violating memory consistency.
Generic Release-Acquire Object. Listing 1.2 shows how release-acquire semantics can be implemented for general data structures with help of one synchronized Boolean.
1
2
3
4
generic
t y p e Data i s p r i v a t e ;
package Generic_Release_Acquire i s
13
5
6
7
8
9
10
11
12
13
14
c o n c u r r e n t RA
is
p r o c e d u r e Write ( d : Data ) ;
e n t r y Get ( D : o u t Data ) ;
private
Ready : Boolean := false w i t h S y n c h r o n i z e d ,
Memory Order Read = > Acq u i r e ,
Memory Order Write = > R e l e a s e ;
Da : Data ;
end RA ;
15
16
end G e n e r i c _ R e l e a s e _ A c q u i r e;
17
18
p a c k a g e body G e n e r i c _ R e l e a s e _ A c q u i r e i s
19
20
c o n c u r r e n t body RA i s
21
22
23
24
25
26
p r o c e d u r e Write ( D : Data ) i s
begin
Da := D ;
Ready := true ;
end Write :
27
28
29
30
31
32
33
34
35
e n t r y Get ( D : o u t Data )
when Ready i s
-- spin - lock until released , i . e . , Ready = true ;
-- only sync . v a r i a b l e s and c o n s t a n t s allowed in guard e x p r e s s i o n
begin
D := Da ;
end Get ;
end RA ;
36
37
end G e n e r i c _ R e l e a s e _ A c q u i r e;
Listing 1.2: Generic Release-Acquire Object
7
API
As already pointed out, we feel that providing concurrent objects as first-class
citizens is the right way to enhance Ada with non-blocking synchronization on an
adequate memory model. On the other hand, if the programmer needs synchronization on a lower level than concurrent objects provide, an API-based approach
(generic function Read Modify Write in package Memory Model) would be a viable alternative. Listing 1.3 shows such a predefined package Memory Model. It
contains the specification of generic function Read Modify Write, which allows
to use the read-modify-write operation of the underlying computer hardware.
Exposing sync loops to the programmer makes it necessary to introduce a new
aspect sync loop to let the runtime perform the state change to “in sync loop”
(cf. Section 5). Because nobody can force the programmer to use this aspect
correctly, the information transferred to the runtime may be false or incomplete, giving rise to concurrency defects such as deadlocks, livelocks, and other
problems.
1
package Memory_Model i s
2
3
4
5
6
7
8
type Memory_Order_Type i s (
Sequentially Consistent ,
R el a x ed ,
Acq u i r e ,
R e l e a s e );
14
9
s u b t y p e M e m o r y _ O r d e r _ S u c c e s s _ T y p e i s M e m o r y _ O r d e r _ T y p e;
10
11
12
subtype Memory_Order_Failure_Type i s Memory_Order_Type
r a n g e S e q u e n t i a l l y C o n s i s t e n t .. A c q u i r e ;
13
14
15
16
17
18
19
20
21
22
23
generic
type Some_Synchronized_Type i s p r i v a t e ;
w i t h f u n c t i o n Update r e t u r n S o m e _ S y n c h r o n i z e d _ T y p e;
R e a d _ M o d i f y _ W r i t e _ V a r i a b l e: i n o u t S o m e _ S y n c h r o n i z e d _ T y p e
with Read Modify Write ;
M emo r y Or d er S u cces s : M e m o r y _ O r d e r _ S u c c e s s _ T y p e :=
Sequentially Consistent ;
M e m o r y O r d e r F a i l u r e : M e m o r y _ O r d e r _ F a i l u r e _ T y p e :=
Sequentially Consistent ;
f u n c t i o n R e a d M o d i f y W r i t e r e t u r n Boolean ;
24
25
end M e m o r y _ M o d e l;
Listing 1.3: Package Memory Model
8
Conclusion and Future Work
We have presented an approach for providing safe non-blocking synchronization
in Ada 202x. Our novel approach is based on introducing concurrent objects for
encapsulating non-blocking data structures on a high abstraction level. In addition, we have presented synchronized and read-modify-write types which support
the expression of memory ordering operations at a sufficient level of detail. Concurrent objects provide SC for programs without data races. This SC-for-DRF
memory model is well-aligned with Ada’s semantics for blocking synchronization
via protected objects, which requires legal programs to be without synchronization errors ([8, 9.10§11]).
Although Ada 2012 provides the highly abstract protected object monitorconstruct for blocking synchronization, there was previously no programming
primitive available to match this abstraction level for non-blocking synchronization. The proposed memory model in conjunction with our concurrent object
construct for non-blocking synchronization may bar users from having to invent ad-hoc synchronization solutions, which have been found error-prone with
blocking synchronization already [20].
Until now, all previous approaches are based on APIs. We have listed a
number of advantages that support our approach of making non-blocking data
structures first class language citizens. In contrast, our approach for Ada 202x
encapsulates non-blocking synchronization inside concurrent objects. This safe
approach makes the code easy to understand. Note that concurrent objects are
not orthogonal to objects in the sense of OOP (tagged types in Ada). However,
this can be achieved by employing the proposed API approach (cf. Section 7).
In addition, it is not difficult to migrate code from blocking to non-blocking
synchronization. Adding memory management via storage pools integrates well
with our modular approach and does not clutter the code.
A lot of work remains to be done. To name only a few issues: Non-blocking
barriers (in the sense of [8, D.10.1]) would be useful; details have to be elaborated.
Fully integrating concurrent objects into scheduling and dispatching models and
integrating with the features for parallel programming planned for Ada 202x
have to be done carefully.
15
9
Acknowledgments
This research was supported by the Austrian Science Fund (FWF) project
I 1035N23, and by the Next-Generation Information Computing Development
Program through the National Research Foundation of Korea (NRF), funded by
the Ministry of Science, ICT & Future Planning under grant NRF2015M3C4A7065522.
References
1. Working Draft, Standard for Programming Language C++. ISO/IEC N4296, 2014.
2. S. V. Adve and H.-J. Boehm. Memory models: A case for rethinking parallel
languages and hardware. Commun. ACM, 53(8):90–101, Aug. 2010.
3. S. V. Adve and K. Gharachorloo. Shared memory consistency models: A tutorial.
Computer, 29(12):66–76, Dec. 1996.
4. S. V. Adve and M. D. Hill. Weak ordering—a new definition. In Proceedings of the
17th Annual International Symposium on Computer Architecture, ISCA ’90, pages
2–14, New York, NY, USA, 1990. ACM.
5. J. Barnes. Ada 2012 Rationale: The Language – the Standard Libraries. Springer
LNCS, 2013.
6. H.-J. Boehm. Threads cannot be implemented as a library. SIGPLAN Not.,
40(6):261–268, June 2005.
7. H.-J. Boehm and S. V. Adve. Foundations of the C++ concurrency memory model.
In Proceedings of the 29th ACM SIGPLAN Conference on Programming Language
Design and Implementation, PLDI ’08, pages 68–78, New York, NY, USA, 2008.
ACM.
8. R. L. Brukardt, editor. Annotated Ada Reference Manual, ISO/IEC 8652:2012/Cor
1:2016. 2016.
9. K. Gharachorloo, D. Lenoski, J. Laudon, P. Gibbons, A. Gupta, and J. Hennessy.
Memory consistency and event ordering in scalable shared-memory multiprocessors. SIGARCH Comput. Archit. News, 18(2SI):15–26, May 1990.
10. L. Guerby. Ada 95 Rationale – The Language – The Standard Libraries. Springer,
1997.
11. M. Herlihy and N. Shavit. The Art of Multiprocessor Programming. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 2012.
12. C. A. R. Hoare. Monitors: An operating system structuring concept. Commun.
ACM, 17(10):549–557, Oct. 1974.
13. L. Lamport. How to make a multiprocessor computer that correctly executes
multiprocess programs. IEEE Trans. Comput., 28(9):690–691, Sept. 1979.
14. J. Manson, W. Pugh, and S. V. Adve. The Java memory model. In Proceedings
of the 32nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming
Languages, POPL ’05, pages 378–391, New York, NY, USA, 2005. ACM.
15. M. L. Scott. Shared-Memory Synchronization. Synthesis Lectures on Computer
Architecture. Morgan & Claypool Publishers, 2013.
16. H. Simpson. Four-slot fully asynchronous communication mechanism. Computers
and Digital Techniques, IEE Proceedings E, 137:17–30, 02 1990.
17. D. J. Sorin, M. D. Hill, and D. A. Wood. A Primer on Memory Consistency and
Cache Coherence. Number 16 in Synthesis Lectures on Computer Architecture.
Morgan & Claypool, 2011.
16
18. J. Ševčı́k and D. Aspinall. On validity of program transformations in the Java
memory model. In Proceedings of the 22nd European Conference on Object-Oriented
Programming, ECOOP ’08, pages 27–51, Berlin, Heidelberg, 2008. Springer-Verlag.
19. A. Williams. C++ Concurrency in Action. Manning Publ. Co., Shelter Island,
NY, 2012.
20. W. Xiong, S. Park, J. Zhang, Y. Zhou, and Z. Ma. Ad hoc synchronization considered harmful. In Proceedings of the 9th USENIX Conference on Operating Systems
Design and Implementation, OSDI’10, pages 163–176, Berkeley, CA, USA, 2010.
USENIX Association.
21. A. Zwinkau. A memory model for X10. In Proceedings of the 6th ACM SIGPLAN
Workshop on X10, X10 2016, pages 7–12, New York, NY, USA, 2016. ACM.
| 6cs.PL
|
arXiv:1802.02423v1 [stat.AP] 3 Feb 2018
On the Generalizability of Linear and Non-Linear
Region of Interest-Based Multivariate Regression
Models for fMRI Data
Ethan C. Jackson
James Alexander Hughes
Mark Daley
Computer Science Department
University of Western Ontario
London, Ontario, Canada N6A 3K7
[email protected]
Computer Science Department
University of Western Ontario
London, Ontario, Canada N6A 3K7
[email protected]
Computer Science Department
University of Western Ontario
London, Ontario, Canada N6A 3K7
[email protected]
Abstract—In contrast to conventional, univariate analysis,
various types of multivariate analysis have been applied to
functional magnetic resonance imaging (fMRI) data. In this paper, we compare two contemporary approaches for multivariate
regression on task-based fMRI data: linear regression with ridge
regularization and non-linear symbolic regression using genetic
programming. The data for this project is representative of
a contemporary fMRI experimental design for visual stimuli.
Linear and non-linear models were generated for 10 subjects,
with another 4 withheld for validation. Model quality is evaluated
by comparing R scores (Pearson product-moment correlation)
in various contexts, including single run self-fit, within-subject
generalization, and between-subject generalization. Propensity
for modelling strategies to overfit is estimated using a separate
resting state scan. Results suggest that neither method is objectively or inherently better than the other.
Index Terms—fMRI, Linear Regression, Non-Linear Regression, Symbolic Regression, Genetic Programming
I. I NTRODUCTION
fMRI is a non-invasive neuroimaging technique used in
research and clinical applications to record relative changes
in metabolic rate associated with neural activity via the blood
oxygenation level dependent (BOLD) signal [3]. This signal
measures the relative levels of oxygenated and deoxygenated
blood throughout the whole brain, and is a known metabolic
proxy for neural activity.
The neuroimaging field has been very successful in using
linear statistical methods for analysis. The general linear model
(GLM), in particular, has been fruitfully applied to identify
relationships between experimental conditions and localized
BOLD signal. To fit a GLM, neuroscientists create a predictive
time series model (predictor) for each experimental condition
of interest. Usually, these predictors are square-wave time
series corresponding to stimulus onset and duration convolved
with a model function for haemodynamic response (HR). For
each voxel (a volumetric pixel) or aggregate region of interest
(ROI), a multiple linear regression is performed to compute
a linear combination of predictors that optimally models the
recorded BOLD signal. A voxel or ROI’s relationship to
an experimental condition can be inferred by comparing the
relative weights (scaling factors) for each of the predictors.
A variety of statistical methods can be applied to perform
comparisons over all voxels or ROIs, though paired t-tests are
commonly used.
In contrast to conventional univariate analysis, multivariate
relational modelling has also been developed. For example, in
Hughes and Daley’s work on relational modelling between
ROI average time series ([6], [7]), average BOLD in one
ROI (dependent variable) is modelled as a non-linear function
of BOLD signal in other ROIs (independent variables). In
order to make a more direct comparison to conventional linear
regression and the GLM, the dependent regression variable can
be replaced with a hypothesized, stimulus-driven HR function.
In this configuration, regression models HR as a spatially
distributed combination of BOLD signal — an approach that
has applications in multivoxel pattern analysis [9].
Naturally one might ask whether conventional, linear regression or much more elaborate non-linear symbolic regression is
better suited for this type of modelling. This paper aims to answer that question by comparing the generalizability of models
generated using each method. We assess generalizability based
on within- and between-subject analytical experiments, and
we further estimate each method’s lower bound for propensity
to overfit using an additional resting state scan. The fMRI
data consists of scans from 15 subjects in total — a decidedly
small but generally acceptable sample size in the neuroimaging
community.
In the following sections, we first give details about the
data used in our experiments. Next, we give an overview of
the experiments themselves, followed by sections explaining
details about linear and non-linear models, respectively. Then
we present results, discussion, and finally avenues for future
work.
II. DATA AND P REPROCESSING
For all experimental runs, we used a 10-subject subset of
fMRI data collected for didactic purposes. Validation uses four
additional experimental scans and one additional resting state
scan.
All functional scans were collected using the same scanner and parameters: Siemens Magnetom Prisma 3T, 2.5-mm
isotropic resolution with matrix size of 84×84 over 52 slices,
TR = 1000ms, multi-band gradient-echo echoplanar pulse
sequence. Anatomical scans were collected using a matrix size
of 248×256 over 176 1mm slices. More information about the
scanner and facilities can be found at http://cfmm.robarts.ca/
tools/3t-mri/.
The experimental stimuli used were designed to localize
brain regions selective to three categories of visual stimuli:
faces, hands, and bodies. Scrambled versions of the images
formed a fourth stimulus category. Participants were instructed
to maintain their gaze on a central fixation point, which was
also presented on a blank screen during baseline periods.
Images were presented to subjects according to a conventional block design, with a block duration of 16s. Four
cycles of four blocks (faces, hands, bodies, scrambled images)
were presented in each run. Baseline blocks occurred at the
beginning and end of each run and between cycles. The total
run duration was 336 s (21 blocks x 16 s/block). Each stimulus
block consisted of 16 stimuli, each presented for 0.8 s with a
0.2 s intertrial interval. The order of blocks within cycles was
balanced such that for a run, each category was presented once
in each of the first, second, third and fourth part of the cycle.
Two runs with two different orders were collected. Participants
monitored the stream of visual stimuli for repetitions (a oneback task) to maintain attention.
Data were preprocessed in Brain Voyager 20.6 commercial
software ([5], [4]). Preprocessing consisted of functionalanatomical alignment, three-dimensional motion correction,
temporal high-pass filtering (X cycles/run), and transformation
into 2-mm isotropic resolution, warping into stereotaxic space
using the MNI-152 template. Data were loaded into Python
using a Brain Voyager-compatible fork of NiBabel [1].
For analysis, we considered two types partitioning. Though
various transformations could be applied to yield an aggregate
time series from each ROI, we chose to use the average
activation of the whole ROI. This is the same approach used
in [6] and [7]. Many methods for defining partition boundaries
exist. Conventional partitioning of cortex, for example, is
performed using static maps (atlases) on a reference brain.
In our experiments, we used two atlases: the Harvard-Oxford
Cortical Structural (H-O) atlas, and the Talairach Daemon
Labels (TalROI) atlas. Both atlases are provided with FSL [8],
and are visualized by Figures 4 and 1, respectively. The HO atlas defines 48 ROIs, while TalROI defines 986. To avoid
overfitting in linear regression and unreasonable computational
complexity for non-linear regression, an additional preprocessing step was applied to TalROI.
Since TalROI defines 986 ROIs and because we only used
this atlas in experiments on response to face stimuli, we used
a Neurosynth mask to eliminate ROIs not associated with
face selectivity in its body of literature. Neurosynth [10] is
a web tool that uses natural language processing to identify
associations between brain areas and cognitive function based
on a large corpus of neuroimaging research papers. A Neu-
rosynth search for ‘face’ or ‘FFA’ (fusiform face area) yields
a mask that can be overlaid onto a functional scan in MNI
space. The mask used in this work is visualized by Figure 2.
Application of this mask not only reduces the number of ROIs
in TalROI to 50, but focuses model generation on ROIs known
to demonstrate selectivity for faces.
Altogether, the fMRI data consists of 20 experimental
runs, 10 each for two orders of the block-designed stimulus
presentation scheme labelled ‘Loc1’ and ‘Loc2’ (for Localisers
1 and 2). Additionally, a resting state scan (stimulus- and
task-free, eyes closed, instructed not to fixate) was collected
from one independent subject. Each run consists of 340 time
points. Each of the two atlases was used to partition and
aggregate the each run into ROI averages. Thus, we have
two transformations (H-O and TalROI) for each of the 20
experimental runs and one resting state scan. All data are
stored as CSV files with the number of rows and columns
equal to the number of time points and ROIs, respectively.
These files, in addition to all Python code, masks, and atlases,
are available as part of the digital appendix [2].
III. M ODELS
Before describing the experiments themselves, we first
describe how linear and non-linear models were constructed
for analysis.
A. Linear Models
Linear models were all constructed using linear regression
with ridge or L2 regularization. This method computes the
linear combination of ROI time series that optimally models
a hypothesized HR using ordinary least squares estimation.
Thus for each run, linear models are composed of n scaling
factors plus one constant term, where n is equal to the number
of ROIs used for partitioning. Results based on linear methods
are labelled ‘L’.
B. Non-Linear Models
Non-linear models were constructed using Hughes and Daley’s GP-based system designed for symbolic regression. The
number of degrees of freedom is exponentially proportional
to the size of the GP language and to the number of ROIs.
We used two methods for assessing the quality of non-linear
models.
First, to obtain one model per run (fMRI scan, transformed)
in an unbiased manner, we computed 100 independent GP
runs for 10,000,000 generations each. Of the 100 candidate
models, we took the model of best fit as estimated by mean
squared error at the end of evolution. Thus for each run,
non-linear models are expressed as a non-linear function of
n variables, where n is again equal to the number of ROIs
used for partitioning. It is important to note that the resulting
non-linear models are temporally independent: the non-linear
functions must be applied independently at each time point in
order to reconstruct a time series. Results using this method
are labelled ‘N-L’. The GP language or set of basis functions,
settings, and parameters are summarized by Table I.
TABLE I: Parameter settings for GP. The last four parameters
are specific to the improvements made in Hughes and Daley’s
GP system. Improvements include the use of an acyclic graph
representation, fitness predictors, and island-model migration
strategies.
Elitism
Population
Subpopulations
Migrations
Generations
Crossover
Mutation
Fitness Metric
Language
Trainers
Predictors
Predictor Pop. Size
Max # Graph Nodes
1
101/subpopulation (707 total)
7
1,000
1,000 per migration (10,000,000 total)
80%
10% (x2 chances)
Mean Squared Error: n1 Pni=1 (Yˆi − Yi )2
+, − ,∗ , /, exp, abs, sin, cos, tan
8
20
20% of Dataset
140
The second method is the same as the first, except it
considers all 100 candidate models for a run produced by GP.
This allows us to plot and analyze a distribution of R scores
(rather than a single value) to better understand whether GP
can produce better models than linear regression. Using this
method, we can search a distribution of candidate models,
and select the single, best-scoring non-linear model. Though
heavily biased, this analysis is useful to evaluate potential
non-linear model quality. For example in between-subject
experiments, we could select the model for subject A that
generalizes best to subject B. Results using this method are
labelled ‘N-L (best)’.
IV. A NALYTICAL E XPERIMENTS
To compare the quality of models obtained from multivariate linear regression to symbolic non-linear regression, and to
estimate overfitting, we designed the following experiments.
Experiments are categorized as either all-stims or faces. For
the former, models fit data to a hypothesized HR to any
stimulus category, as visualized by Figure 5. For the latter,
models fit data to a hypothesized HR for the faces category
of stimuli only, as visualized by Figure 6. In practice, the set
of experiments for the latter is much more interesting since
it will gauge stimulus specific selectivity. The all-stims and
faces experiments exclusively use the H-O and TalROI atlases,
respectively.
For all experiments, we first estimate generalizability using
mean R scores and their standard deviations. There are three
analysis categories: L, N-L, and N-L (best). For validation,
we apply L and N-L models to data for four withheld
subjects. Validation is not possible for N-L (best) since those
models would depend on the withheld data, but an alternative
approach for non-linear model selection was tested. Rather
than selecting the top model during GP evolution, we selected
the model which best generalized within-subject. For withinsubject validation, these unbiased models are labelled NL(UnB).
A. Within-Subject Generalizability
Within-subject generalizability is estimated by first applying
models generated for one subject-run to data for the other,
independent run, and then computing the R score between the
model output and the relevant hypothesized HR.
B. Between-Subject Generalizability
Between-subject generalizability is estimated in two ways.
First, given one of the two runs, we apply the models generated
for one subject to all other subjects’ data. We then compute the
R score between model outputs and the hypothesized HR. We
call this approach pairwise between-subject generalizability.
In a second approach, we use model output averaging
to combine multiple models into one average model. This
approach simply applies multiple models to the same data and
computes the average output. With 10 subjects, we generate
10 different average models, each with one subject left out.
An average model is evaluated by applying it to the left-out
subject’s data and comparing the R score between its output
and the hypothesized HR.
Validation was possible for between-subject generalizability
due to there being four other subjects that were withheld
from modelling. This was because of the computational cost
for generating non-linear models. Pairwise between-subject
generalizability is evaluated by applying generated models to
withheld subjects’ data and computing the R score between the
output and the relevant hypothesized HR. A similar validation
strategy is taken for average models.
C. Resting State Validation
In an effort to compare how well linear and non-linear
regression are able to fit task-free data to an unrelated hypothesized HR, we fit four models to a separate resting state
scan. These consist of a linear and non-linear model for each
of the two hypothesized HRs used in other experiments. This
is especially important to do for non-linear regression since
the number of degrees of freedom is so large. The R score
between the fitted model’s output and the hypothesized HR
provides an estimate of a modelling strategy’s propensity to
overfit. It would be insightful to have many more resting state
scans available for analysis, but only one resting state scan
was collected as part of the funded project.
V. R ESULTS
A. Within-Subject Generalizability
An estimation of the relative within-subject generalizability
for linear and non-linear regression is summarized by Table
II. We did not observe any significant difference between
L and N-L models, however N-L (best) scores significantly
higher than both L and N-L. It is important to note that
all we can infer from this result is that GP produces, on
average, at least one model per run that generalizes better
than our linear models. A typical instance of this scenario
is visualized by Figure 7. Notice in this histogram that the
majority of non-linear models generalized worse than their
linear counterpart. However, in this case, and in fact in all
L
N-L
N-L (best)
all-stims
x̄ = 0.6035 s = 0.1516
x̄ = 0.5470 s = 0.2151
x̄ = 0.7132 s = 0.1302
faces
x̄ = 0.2265 s = 0.1229
x̄ = 0.1621 s = 0.1522
x̄ = 0.3240 s = 0.1152
TABLE II: Mean R scores (x̄) and standard deviation (s)
for within-subject generalizability. all-stims In independent ttests, L and N-L models are not significantly different, though
N-L (best) scores significantly higher than L and N-L with
p < 0.022 and p < 0.006, respectively. faces: In independent t-tests, scores between L and N-L are not significantly
different, though again N-L (best) scores significantly higher
than both L and N-L with p < 0.016 and p < 1 × 10−16 ,
respectively.
L
N-L
N-L (best)
all-stims
x̄ = 0.4703 s = 0.1959
x̄ = 0.3864 s = 0.2327
x̄ = 0.6399 s = 0.1739
faces
x̄ = 0.1013 s = 0.1182
x̄ = 0.0754 s = 0.1045
x̄ = 0.2814 s = 0.1302
TABLE III: Mean R scores (x̄) and standard deviation (s)
for pairwise between-subject generalizability. all-stims: In
independent t-tests, L scores significantly higher than N-L with
p = 0.2×10−3 , N-L (best) scores significantly higher than N-L
with p < 1 × 10−27 , and N-L (best) scores significantly higher
than L with p = 0.2 × 10−3 . faces: In independent t-tests,
L scores significantly higher than N-L with p < 0.029, N-L
(best) scores significantly higher than N-L with p < 1×10−47 ,
and N-L (best) scores significantly higher than L with p <
1 × 10−35 .
L
N-L
N-L (best)
all-stims
x̄ = 0.8183 s = 0.0774
x̄ = 0.7104 s = 0.1889
x̄ = 0.8737 s = 0.0620
faces
x̄ = 0.2389 s = 0.0992
x̄ = 0.1438 s = 0.1293
x̄ = 0.2659 s = 0.1410
TABLE IV: Mean R scores (x̄) and standard deviation (s)
for between-subject (average models) generalizability. allstims: In independent t-tests, L scores higher than N-L with
p < 0.027 and N-L (best) scores higher than both L and N-L
with p < 0.02 and < 0.001, respectively. faces: In independent
t-tests, none of the scores are significantly different from each
other.
L
N-L
N-L(UnB)
all-stims
x̄ = 0.5287 s = 0.1091
x̄ = 0.4736 s = 0.1637
x̄ = 0.5084 s = 0.1821
faces
x̄ = 0.0550 s = 0.1040
x̄ = 0.0431 s = 0.0832
x̄ = 0.0454 s = 0.0831
TABLE V: Mean R scores (x̄) and standard deviation (s)
for pairwise between-subject validation on data from four
withheld subjects. Within each stimulus category, there is no
significant difference between modelling strategies.
Average model validation results are summarized by Table
VI. We compared these results to those in Table IV and found
that, in validation, generalizability tended to be worse than
during model construction. Models for all-stims, however, tend
to be a good fit for the hypothesized HR, using any of the three
modelling strategies. This result is visualized by Figure 8.
C. Resting State Validation
other observed instances, there was at least one non-linear
model with a better R score than for the linear model.
Due to limitations on the number of models for which we
could generate non-linear models, a separate validation set was
not used for within-subject generalizability.
B. Between-Subject Generalizability
An estimation of the relative pairwise between-subject generalizability for linear and non-linear regression is summarized
by Table III. We observed in both categories that L models
scored significantly higher than N-L models. And once again,
we observed that N-L (best) generalizes better than both L and
N-L.
An estimation of average model generalizability is summarized by Table IV. We observed improvements over pairwise
between-subject generalizability in almost all cases. The only
exception was for N-L (best) for faces, which was not significantly different. Based on these results, we suggest that
model averaging could be a useful technique for improving
signal-to-noise ratios in between-subject modelling.
Pairwise between-subject generalizability validation results
are summarized by Table V. We compared these results to
those in Table III. According to independent t-tests, a significant difference between results for the modelled subjects and
validation subjects was only observed for N-L, all-stims, where
the mean R score was higher in validation with p = 0.034.
An estimation of each model’s propensity to overfit, as
estimated using independent resting state data, is summarized
by Table VII and is visualized by Figure 9. Though only
one resting state scan is used, we can conclude that for both
modelling strategies and for both stimulus categories, mean
R scores are significantly greater for stimulus-related models
than for at least one resting state scan. This provides at least
some confidence that models are not unreasonably overfit.
L
N-L
N-L(UnB)
all-stims
x̄ = 0.6026 s = 0.1288
x̄ = 0.6491 s = 0.1221
x̄ = 0.6591 s = 0.1101
faces
x̄ = 0.1199 s = 0.0477
x̄ = 0.0893 s = 0.0534
x̄ = 0.0670 s = 0.0555
TABLE VI: Mean R scores (x̄) and standard deviation (s) for
between-subject (average model) validation on data from
four withheld subjects. Within each stimulus category, there is
no significant difference between modelling strategies.
L
N-L
all-stims
x̄exp = 0.83 Rrest = 0.45
x̄exp = 0.86 Rrest = 0.35
faces
x̄exp = 0.59 Rrest = −0.08
x̄exp = 0.56 Rrest = 0.35
TABLE VII: Mean R scores for models fit using experimental data (x̄exp ) compared to R scores for models fit using
2
unrelated resting state data (Rrest
). In all cases, according
to independent one-sample t-tests, resting state R scores
are significantly lower than mean experimental scores with
p < 1 × 10−6 .
VI. D ISCUSSION
VIII. ACKNOWLEDGEMENTS
We found no evidence that non-linear regression is generally
more prone to overfitting than linear regression. In resting
state validation (see Table VII) linear regression produced a
better-fit model than non-linear regression between completely
independent time series. In practice, we can conclude only that
both methods can be similarly prone to overfitting.
For within-subject generalizability, we observed that in all
cases, at least one out of 100 GP runs produced a better model
than linear regression. This is reflected by the consistently
good results for N-L (best) models. The fact that such bestgeneralizing models exist does not help us select them in
an unbiased manner, though. We were, however, able to use
such results in an unbiased way by selecting the non-linear
model that best generalized within-subject for between-subject
analysis. Selecting such a model, however, did not yield
significant improvement over the other methods we tested.
Generalizability scores were poor for faces. Though all
models were significantly and positively correlated with the
hypothesized HR, further work must be done to evaluate their
specificity. The poor scores observed here could be due to
using ROIs that are too large to capture face-selectivity. Even
with the TalROI atlas, ROIs contained hundreds of voxels. A
finer partitioning of face-selective areas or other atlases may
yield better results.
This research was supported in part by the Natural Sciences
and Engineering Research Council of Canada (NSERC).
This research was enabled in part by support provided by
Compute Ontario (computeontario.ca), Westgrid (westgrid.ca),
and Compute Canada (computecanada.ca).
Data collection costs were funded by a grant from the
Canada First Research Excellence Fund (BrainsCAN: Brain
Health for Life) to the University of Western Ontario.
fMRI experimental design and stimuli were designed by
Jody Culham and Rainer Goebel; implemented by Kevin
Stubbs.
VII. C ONCLUSIONS AND F UTURE W ORK
The all-stims hypothesized HR was very successfully modelled using either linear or non-linear regression. In experiments for both within- and between-subject generalizability,
all models reproduced the hypothesized HR with mean R
scores reaching 0.65 in validation, and up to 0.81 in unbiased
experiments. Furthermore, we found no evidence to suggest
that non-linear regression over fit the data worse than linear
regression. These results suggest that our linear and non-linear
models generalized similarly well, and that neither was overfit
more than the other.
In validation, we observed that model averaging significantly improves model quality for all-stims, for all methods,
when compared to pairwise between-subject generalizability.
This suggests that all models feature a noise component that is
partially subdued by averaging across subjects. This result is
unsurprising, but provides further evidence that signal-to-noise
ratios can be significantly improved by considering ROI-based
averages across multiple subjects.
Overall, we found that while they are not any more likely
to over-fit, non-linear models did not generalize significantly
better than linear models when unbiased model selection methods are applied. Though non-linear regression consistently
produced some model that is better than its linear counterpart,
it is difficult to select and expensive to produce. As a result, we
conclude that for small sample sizes, it seems far more sensible
to use linear methods for multivariate regression modelling of
fMRI data, pending improved methods for non-linear model
selection.
R EFERENCES
[1] 2017. URL https://github.com/CNMaastricht/nibabel
BrainVoyager.
[2] February 2018. URL https://github.com/ethancjackson/
fMRI-CompRegression.
[3] Elizabeth A Disbrow, Daniel A Slutsky, Timothy PL
Roberts, and Leah A Krubitzer. Functional mri at 1.5
tesla: a comparison of the blood oxygenation leveldependent signal and electrophysiology. Proceedings of
the National Academy of Sciences, 97(17):9718–9723,
2000.
[4] Elia Formisano, Francesco Di Salle, and Rainer Goebel.
Fundamentals of data analysis methods in fmri. In Advanced Image processing in magnetic resonance imaging.
Marcel Dekker, 2006.
[5] Rainer Goebel, Fabrizio Esposito, and Elia Formisano.
Analysis of functional image analysis contest (fiac) data
with brainvoyager qx: From single-subject to cortically
aligned group general linear model analysis and selforganizing group independent component analysis. Human brain mapping, 27(5):392–401, 2006.
[6] James Alexander Hughes and Mark Daley. Finding
nonlinear relationships in fmri time series with symbolic
regression. In Proceedings of the 2016 on Genetic
and Evolutionary Computation Conference Companion,
pages 101–102. ACM, 2016.
[7] James Alexander Hughes and Mark Daley. Searching
for nonlinear relationships in fmri data with symbolic regression. In Proceedings of the Genetic and Evolutionary
Computation Conference, pages 1129–1136. ACM, 2017.
[8] Mark Jenkinson, Christian F Beckmann, Timothy EJ
Behrens, Mark W Woolrich, and Stephen M Smith. Fsl.
Neuroimage, 62(2):782–790, 2012.
[9] Kenneth A Norman, Sean M Polyn, Greg J Detre, and
James V Haxby. Beyond mind-reading: multi-voxel pattern analysis of fmri data. Trends in cognitive sciences,
10(9):424–430, 2006.
[10] Tal Yarkoni, Russell A Poldrack, Thomas E Nichols,
David C Van Essen, and Tor D Wager. Large-scale
automated synthesis of human functional neuroimaging
data. Nature methods, 8(8):665, 2011.
Fig. 1: Talairach standard atlas used to partition the whole
brain into 986 ROIs. Statistical transformations on smaller
ROIs are more likely to capture highly stimulus selective
metabolic responses.
Fig. 2: Two dimensional slice of Neurosynth mask for FFA
overlaid on TalROI atlas. Areas coloured in grey scale indicate voxels in MNI152 space that are associated with FFA
according to the Neurosynth corpus. Higher intensity (brightness) indicates stronger confidence. MNI152 coordinates =
(41.7, −51.6, −20.9)
Fig. 3: Hypothesized haemodynamic responses to stimuli
in arbitrary units over time in seconds for ‘Loc1’. Stimuli
(images) were presented to subjects for a constant duration
of 0.8 seconds followed by a 0.2 second gap. The order of
stimulus category presentation is reflected by the colours of
the response curves. The other experimental run, ’Loc2’ is a
variation of ’Loc1’ in which the order of stimulus category
presentation was changed.
Fig. 4: Harvard-Oxford atlas used to partition the cortical brain
into 48 ROIs. Large ROIs are less sensitive than smaller ones
to partitioning error due to anatomical differences between
subjects.
Fig. 5: Hypothesized haemodynamic response to all-stimuli in
arbitrary units over time in seconds for ‘Loc1’. This curve
is obtained by taking the sum of the four stimulus-specific
hypothesized HRs.
Fig. 6: Hypothesized haemodynamic response to face stimuli
in arbitrary units over time in seconds for ‘Loc1’.
Fig. 8: Average model validation for all-stims. Superimposition of all models applied to validation subjects (translucent,
many colours) against the hypothesized HR. Time series data
are shown in arbitrary units over time in seconds. In validation, there was no significant difference between modelling
strategies.
Fig. 7: Distribution of non-linear model R scores for withinsubject generalizability. x-axis: R scores. y-axis: Quantity of
non-linear models in score interval. Example of the distribution of R scores between non-linear models produced by GP
and the hypothesized HR for ’Loc2’ (all-stims). The vertical
black line denotes the score observed for the corresponding
linear model. In this and most other cases, the number of
non-linear models worse than linear models forms a majority,
but never a totality.
Fig. 9: Visualization of outputs from models fitted using experimental data (translucent, multiple colours), the output from
models fitted using unrelated resting state data (orange), and the stimulus-related hypothesized HR (blue). Associated R scores
are summarized by Table VII. Time series data are shown in arbitrary units over time in seconds.
| 1cs.CV
|
Provable learning of Noisy-or Networks
Sanjeev Arora∗
Rong Ge†
Tengyu Ma
‡
Andrej Risteski§
arXiv:1612.08795v1 [cs.LG] 28 Dec 2016
December 30, 2016
Abstract
Many machine learning applications use latent variable models to explain structure in
data, whereby visible variables (= coordinates of the given datapoint) are explained as a
probabilistic function of some hidden variables. Finding parameters with the maximum
likelihood is NP-hard even in very simple settings. In recent years, provably efficient
algorithms were nevertheless developed for models with linear structures: topic models,
mixture models, hidden markov models, etc. These algorithms use matrix or tensor
decomposition, and make some reasonable assumptions about the parameters of the
underlying model.
But matrix or tensor decomposition seems of little use when the latent variable model
has nonlinearities. The current paper shows how to make progress: tensor decomposition is applied for learning the single-layer noisy or network, which is a textbook example
of a Bayes net, and used for example in the classic QMR-DT software for diagnosing
which disease(s) a patient may have by observing the symptoms he/she exhibits.
The technical novelty here, which should be useful in other settings in future, is analysis of tensor decomposition in presence of systematic error (i.e., where the noise/error
is correlated with the signal, and doesn’t decrease as number of samples goes to infinity).
This requires rethinking all steps of tensor decomposition methods from the ground up.
For simplicity our analysis is stated assuming that the network parameters were
chosen from a probability distribution but the method seems more generally applicable.
∗
Princeton University, Computer Science Department. [email protected]
Duke University, Computer Science Department. [email protected]
‡
Princeton University, Computer Science Department. [email protected]
§
Princeton University, Computer Science Department. [email protected]
†
1
Introduction
Unsupervised learning is important and potentially very powerful because of the availability of
the huge amount of unlabeled data — often several orders of magnitudes more than the labeled
data in many domains. Latent variable models, a popular approach in unsupervised learning,
model the latent structures in data: the “structure”corresponds to some hidden variables, which
probabilistically determine the values of the visible coordinates in data. Bayes nets model the
dependency structure of latent and observable variables via a directed graph. Learning parameters
of a latent variable model given data samples is often seen as a canonical definition of unsupervised
learning. Unfortunately, finding parameters with the maximum likelihood is NP-hard even in very
simple settings. However, in practice many of these models can be learnt reasonably well using
algorithms without polynomial runtime guarantees, such as expectation-maximization algorithm,
Markov chain Monte Carlo, and variational inference. Bridging this gap between theory and practice
is an important research goal.
Recently it has become possible to use matrix and tensor decomposition methods to design polynomial-time algorithms to learn some simple latent variable models such as topic models [AGM12, AGH+ 13], sparse coding models [AGMM15, MSS16], mixtures of Gaussians [HK13,
GHK15], hidden Markov models [MR05], etc. These algorithms are guaranteed to work if the
model parameters satisfy some conditions, which are reasonably realistic. In fact, matrix and tensor decomposition are a natural tool to turn to since they appear to be a sweet spot for theory
whereby non-convex NP-hard problems can be solved provably under relatively clean and interpretable assumptions. But the above-mentioned recent results suggest that such methods apply
only to solving latent variable models that are linear: specifically, they need the marginal of the
observed variables conditioned on the hidden variables to depend linearly on the hidden variables.
But many settings seem to call for nonlinearity in the model. For example, Bayes nets in many
domains involve highly nonlinear operations on the latent variables, and could even have multiple
layers. The study of neural networks also runs into nonlinear models such as restricted Boltzmann
machines (RBM) [Smo86, HS06]. Can matrix factorization (or related tensor factorization) ideas
help for learning nonlinear models?
This paper takes a first step by developing methods to apply tensor factorization to learn possibly the simplest nonlinear model, a single-layer noisy-or network. This is a direct graphical model
with hidden variable d ∈ {0, 1}m , and observation node s ∈ {0, 1}n . The hidden variables d1 , . . . , dm
are independent and assumed to have Bernoulli distributions. The conditional distribution Pr[s|d]
is parameterized by a non-negative weight matrix W ∈ Rn×m . We use W i to denote the i-row of
W . Conditioned on d, the observations s1 , . . . , sn are assume to be independent with distribution
Pr [si = 0 | d] =
m
Y
exp(−Wij dj ) = exp(−hW i , di) .
(1.1)
j=1
We see that 1 − exp(−Wji dj ) can be thought of as the probability that dj activates symptom si ,
and si is activated if one of dj ’s activates it — which explains the name of the model, noisy-or. It
follows that the conditional distribution s | d is
Pr[s | d] =
n
Y
i=1
s
1−si
1 − exp(−hW i , di) i exp(−hW i , di)
.
One canonical use of this model is to model the relationship between diseases and symptoms,
as in the classical human-constructed tool for medical diagnosis called Quick Medical Reference
1
(QMR-DT) by (Miller et al.[MPJM82], Shwe et al. [SC91]) This textbook example ([JGJS99]) of
a Bayes net captures relationships between 570 binary disease variables (latent variables) and 4075
observed binary symptom variables, with 45, 470 directed edges, and the Wij ’s are small integers.1
The name “noisy-or ”derives from the fact that Q
the probability that the OR of m independent
binary variables y1 , y2 , . . . , ym is 1 is exactly 1 − j (Pr[yj = 0]). Noisy-or models are implicitly
using this expression; specifically, for the i-th symptom we are considering the OR of m events
where the jth event is “Disease j does not cause symptom i” and its probability is exp(−Wij dj ).
Treating these events as independent leads to expression (1.1).
The parameters of the QMR-DT network were hand-estimated by consulting human experts,
but it is an interesting research problem whether such networks can be created in an automated
way using only samples of patient data (i.e., the s vectors). Previously there were no approaches for
this that work even heuristically at the required problem size (n = 4000). (This learning problem
should not be confused with the simpler problem of infering the latent variables given the visible
ones, which is also hard but has seen more work, including reasonable heuristic methods [JGJS99]).
Halpern et al.[HS13, JHS13] have designed some algorithms for this problem. However, their first
paper [HS13] assumes the graph structure is given. The second paper [JHS13] requires the Bayes
network to be quartet-learnable, which is a strong assumption on the structure of the network.
Finally, the problem of finding a “best-fit” Bayesian network according to popular metrics2 has
been shown to be NP-complete by [Chi96] even when all of the hidden variables are also observed.
Our algorithm and analysis. Our algorithm uses Taylor expansion —on a certain correlation
measure called PMI, whose use in this context is new—to convert the problematic exponential into
an infinite sum, where we can ignore all but the first two terms. This brings the problem into the
realm of tensor decomposition but with several novel twists having to do with systematic error (see
the overview in Section 2). Our recovery algorithm makes several assumptions about W , the matrix
of connection weights, listed in Section 3. We verified some of these on the QMR-DT network, but
the other assumptions are asymptotic in nature. Thus the cleanest description of our algorithm
is in a clean average-case setting. First, we assume all latent variables are iid Bernoulli Ber(ρ)
for some ρ, which should be thought of as small (In the QMR-DT application, ρ is like O(1/m).)
Next we assume that the ground truth W ∈ Rn×m is created by nature by picking its entries in iid
fashion using the following random process:
(
0,
with probability 1 − p
Wij =
f
Wij , with probability p
fij ’s are upper bounded by νu for some constant νu and are identically distributed according
where W
to a distribution D which satisfies that for some constant νl > 0,
h
i
fij2 ) ≤ 1 − νl .
exp(−W
(1.2)
E
fij ∼D
W
fij is bounded away from 0. We will assume that
The condition (1.2) intuitively requires that W
p ≤ 1/3 and νu = O(1), νl = Ω(1). (Again, these are realistic for QMR-DT setting).
1
We thank Randolph Miller and Vanderbilt University for providing the current version of this network for our
research.
2
Researchers resort to these metrics as when the graph structure is unknown, multiple structures may have the
same likelihood, so maximum likelihood is not appropriate.
2
Theorem 1.1 (Informally stated). There exists a polynomial time algorithm (Algorithm 1) that,
given polynomially many samples from the noisy OR network described in the previous paragraph,
e √pm) relative error in ℓ2 -norm in each column.
recovers the weight matrix W with O(ρ
Recall that we mostly thought of the prior of the diseases ρ as being on the order O(1/m). This
√
means that even if p is on the order of 1, our relative error bound equals to O(1/ m) ≪ 1.
2
Preliminaries and overview
We denote by 0 the all-zeroes vector and 1 the all-ones vector. A+ will denote the Moore-Penrose
pseudo-inverse of a matrix A, and for symmetric matrices A, we use A−1/2 as a shorthand for
(A+ )1/2 . The least non-zero singular value of matrix A is denoted σmin (A).
For matrices A, B we define the Kronecker product ⊗ as (A ⊗ B)ijkl = Aij Bkl . A useful identity
is that (A⊗B)·(C ⊗D) = (AC)⊗(BD) whenever the matrix multiplications are defined. Moreover,
Ai will denote the i-th column of matrix A and Ai the i-th row of matrix A.
We write A . B if there exists a universal constant c such that A ≤ cB and we define &
similarly.
The pointwise mutual information of two binary-valued random variables x and y is
E[xy]
P M I2(x, y) , log E[x]
. Note that it is positive iff E[x, y] > E[x] E[y] and thus is used as a
E[y]
measure of correlation in many fields. This concept can be extended in more than one way to a
triple of boolean variables x, y, z and we use
P M I3(x, y, z) , log
E[xy] E[yz] E[zx]
.
[xyz]
E
E[x] E[y] E[z]
(2.1)
(We will sometimes shorten PMI3 and PMI2 to PMI when this causes no confusion.)
2.1
The Algorithm in a nutshell
Our algorithm is given polynomially many samples from the model (each sample describing which
symptoms are or are not present in a particular patient). It starts by computing the following
matrix n × n PMI and and n × n × n tensor PMIT, which tabulate the correlations among all pairs
and triples of symptoms (specifically, the indicator random variable for the symptom being absent):
PMIij , P M I2(1 − si , 1 − sj ).
PMITi,j,k , P M I3(1 − si , 1 − sj , 1 − sj )
(2.2)
(2.3)
The next proposition makes the key observation that the above matrix and tensor are close
to rank m, which we recall is much smaller than n. Here and elsewhere, for a matrix or vector
A we use exp(A) for the matrix or vector obtained by taking the entries-wise exponential. For
convenience, we define F, G ∈ Rn×m as
F , 1 − exp(−W )
G , 1 − exp(−2W ) .
3
(2.4)
(2.5)
Proposition 2.1 (Informally stated). Let Fk , Gk denote the kth columns of the above F, G. Then,
PMI ≈ ρ F F ⊤ + ρGG⊤
PMIT ≈ ρ
m
X
k=1
|
=
{z
m
X
Fk Fk⊤ + ρ2
|
}
m
X
k=1
m
X
Gk G⊤
k
(2.6)
k=1
k=1
Fk ⊗ Fk ⊗ Fk + ρ
:=S
ρ
Gk ⊗ Gk ⊗ Gk .
{z
:=E
(2.7)
(2.8)
}
The proposition is proved later (with precise statement) in Section A by computing the moments
by marginalization and using Taylor expansion to approximate the log of the moments, and ignoring
terms ρ3 and smaller. (Recall that ρ is the probability that a patient has a particular disease,
which should be small, of the order of O(1/n). The dependence of the final error upon ρ appears in
Section 3.) Since the tensor PMIT can be estimated to arbitrary accuracy given enough samples,
the natural idea to recover the model parameters W is to use Tensor Decomposition. This is what
our algorithm does as well, except the following difficulties have to be overcome.
Difficulty 1: Suppose in equation (2.8) we view the first summand S, which is rank m with components Fk ’s as the signal term. In all previous
P polynomial-time algorithms for tensor decomposition,
the tensor is required to have the form m
k=1 Fk ⊗ Fk ⊗ Fk + noise. To make our problem fit this
template we could consider the second summand E as the “noise”, especially since it is multiplied
by ρ ≪ 1 which tends to make E have smaller norm than S. But this is naive and incorrect, since
E is a very structured matrix: it is more appropriate viewed as systematic error. (In particular
this error doesn’t go down in norm as the number of samples goes to infinity.) In order to do tensor
decomposition in presence of such systematic error, we will need both a delicate error analysis and
a very robust tensor decomposition algorithm. These will be outlined in Section 2.3.
Difficulty 2: To get our problem into a form suitable for tensor decomposition requires a whitening
step, which uses the robust estimate of the whitening matrix from the second moment matrix. In
this case, the whitening matrix has to be extracted out of the PMI matrix, which itself suffers from
a systematic error. This also is not handled in previous works, and requires a delicate control of
the error. See Section 2.4 for more discussion.
Difficulty 3: There is another source of inexactness in equation (2.8), namely the approximation
is only true for those entries with distinct indices — for example, the diagonal entry PMIii has
completely different formula from that for PMIij when i 6= j. This will complicate the algorithm,
as described in Subsections 2.3 and 2.4.
The next few Subsections sketch how to overcome these difficulties, and the details appear in
the rest of the paper.
2.2
Recovering matrices in presence of systematic error
In this Section we recall the classical method of approximately recovering a matrix given noisy
estimates of its entries. We discuss how to adapt that method to our setting where the error in
the estimates is systematic and does not go down even with many more samples. The next section
sketches an extension of this method to tensor decomposition with systematic error.
In the classical setting, there is an unknown n × n matrix S of rank m and we are given
S + E where E is an error matrix. The method to recover S is to compute the best rank-m
approximation to S +E. The quality of this approximation was studied by Davis and Kahan [DK70]
and Wedin [Wed72], and many subsequent authors. The quality of the recovery depends upon the
4
ratio ||E||/σm (S), where σm (·) denotes m-th largest singular value and || · || denotes the spectral
norm. To make this familiar lemma fit our setting more exactly, we will phrase the problem as
trying to recover a matrix S given noisy estimate SS ⊤ + E. Now one can only recover S up to
rotation, and the following lemma describes the error in the Davis-Kahan recovery. It also plays a
key role in the error analysis of the usual algorithm for tensor decomposition.
b the subspace of the top m eigenvectors of SS ⊤ and
Lemma 2.2. In the above setting, let K, K
SS ⊤ + E. Let ε be such that kEk ≤ ε · σm (SS ⊤ ). Then IdK − IdKb . ε where Id is the identity
transformation on the subspace in question.
The Lemma thus treats ||E||/σm (SS ⊤ ) as the definition of noise/signal ratio. Before we generalize the definition and the algorithm to handle systematic error it is good to get some intuition,
from looking at (2.6): PMI ≈ ρ(F F T + ρGGT ). Thinking of the first term as signal and the
second as error, let’s check how bad is the noise/signal ratio defined in Davis-Kahan. The “signal”is σm (F F ⊤ ), which is smaller than n since the trace of F F ⊤ is of the order of mn in our
probabilistic model for the weight matrix. The “noise” is the norm of ρGG⊤ , which is large since
the Gk ’s are nonnegative vectors with P
entries of the order of 1, and therefore the quadratic form
h √1n 1, ρGG⊤ √1n 1i can be as large as ρ k hGk , √1n 1i2 ≈ ρmn. Thus the Davis-Kahan noise/signal
ratio is ρm, and so when ρm ≪ 1, it allows recovering the subspace of F with error O(ρm). Note
that this is a vacuous bound since ρ needs to be at least 1/m so that the hidden variable d contains
1 non-zero entry in average. We’ll argue that this error is too pessimistic and we can in fact drive
the estimation error down to close to ρ.
Definition 2.3 (spectral boundedness). Let n ≥ m. Let E ∈ Rn×n be a symmetric matrix and
S ∈ Rn×m . Then, we say E is τ -spectrally bounded by S if
E τ (SS ⊤ + σm (SS ⊤ ) · Idn )
(2.9)
The smallest such τ is the “error/signal ratio” for this recovery problem.
This definition differs from Davis-Kahan’s because of the τ SS ⊤ term on the right hand side
of (2.9). This allows, for any unit vector x, the quadratic form value xT Ex to be as large as
τ (xT SS ⊤ x + σm (SS ⊤ )). Thus for example the 1 vector no longer causes a large noise/signal ratio
since both quadtratic forms F F ⊤ and GG⊤ have large values on it.
This new error/signal ratio is no larger than the Davis-Kahan ratio, but can potentially be
much smaller. Now we show how to do a better analysis of the Davis-Kahan recovery in terms of
it. The proof of this theorem appears in Section 4.
Theorem 2.4 (matrix perturbation theorem for systematic error). Let n ≥ m. Let S ∈ Rn×m be
of full rank. Suppose positive semidefinite matrix E ∈ Rn×n is ε-spectrally bounded by S ∈ Rn×m
b the subspace of the top m eigenvectors of SS ⊤ and SS ⊤ + E. Then,
for ε ∈ (0, 1). Let K, K
IdK − IdKb . ε .
Finally, we should consider what this new definition of noise/signal ratio achieves. The next
proposition (whose proof appears in Section B) shows that that under the generative model for W
√
sketched earlier, τ = O(log n). Therefore, ρG is Õ(ρ)-bounded by F , and the recovery error of
the subspace of F from F F ⊤ + ρGG⊤ is Õ(ρ) (instead of O(ρm) using Davis-Kahan).
Proposition 2.5. Under the generative model for W , w.h.p, the matrix G = 1 − exp(−2W ) is
τ -spectrally bounded by F = 1 − exp(−W ), with τ = Õ(1).
5
Empirically, we can compute the τ value for the weight matrix W in the QMR-DT
dataset [SC91], which is a textbook application of noisy OR network. For the QMR-DT dataset, τ
is under 6. This implies that the recovery error of the subspace of F guaranteed by Theorem 2.4
is bounded by O(τ ρ) ≈ ρ, whereas the error bound by Davis-Kahan is O(ρm).
2.3
Tensor decomposition with systematic error
Now we extend the insight from the matrix case to tensor recovery under systematic error. In turns
out condition (2.9) is also a good measure of error/signal for the tensor recovery problem of (2.8).
Specifically, if G is τ -bounded by F , then we can recover the components Fk ’s from the PMIT with
√
column-wise error O(ρτ 3/2 m). This requires a non-trivial algorithm (instead of SVD), and the
additional gain is that we can recover Fk ’s individually, instead of only obtaining the subspace with
the PMI matrix.
First we recall the prior state of the art for the error analysis of tensor decomposition with
Davis-Kahan type bounds. The best error bounds involve measuring the magnitude of the noise
matrix Z in a new way. For any n1 × n2 × n3 tensor T , we define the k·k{1}{2,3} norm as
X
xi yjk Tijk .
(2.10)
kT k{1}{2,3} :=
sup
x∈Rn1 ,y∈Rn2 n3
kxk=1,kyk=1
i∈[n1 ]
(j,k)∈[n2 ]×[n3 ]
Note that this norm is in fact the spectral norm of the flattening of the tensor (into a n1 × n2 n3
dimensional matrix). This norm is larger than the injective norm3 , but recently [MSS16] shows that
ε-error in this norm implies O(ε)-error in the recovery guarantees of the components, whereas if one
uses injective norm, the guarantees often pick up an dimension-dependent factor [AGH+ 14]. We
define k·k{2}{1,3} norm similarly. As is customary in tensor decomposition, the theorem is stated
for tensors of a special form, where the components {ui }, {vi }, {wi } are orthonormal families of
vectors. This can be ensured without loss of generality using a procedure called whitening that
uses the 2nd moment matrix.
Theorem 2.6 (Extension of [MSS16, Theorem 10.2]). There is a polynomial-time algorithm (Algorithm 2 later) which has the following guarantee. Suppose tensor T is of the form
T =
r
X
i=1
ui ⊗ vi ⊗ wi + Z
where {ui }, {vi }, {wi } are three collections of orthonormal vectors in Rd , and kZk{1}{2,3} ≤ ε,
kZk{2}{1,3} ≤ ε. Then, it returns {(ũi , ṽi , w̃i )} in polynomial time that is O(ε)-close to {(ui , vi , wi )}
in ℓ2 norm up to permutation. 4
But in our setting the noise tensor has systematic error. An analog of Theorem 2.4 in this
setting is complicated because even the whitening step is nontrivial. Recall also the inexactness
in Proposition 2.1 due to the diagonal terms, which we earlier called Difficulty 3. We address this
difficulty in the algorithm by setting up the problem using a sub-tensor of the PMI tensor. Let
Sa , Sb , Sc be a uniformly random equipartition of the set of indices [n]. Let
ak = Fk,Sa ,
3
bk = Fk,Sb ,
ck = Fk,Sc ,
The injective norm of the tensor T is defined as kT k{1}{2,3} := supx∈Rn1 ,y∈Rn2 z∈Rn3
kxk=1,kyk=1,kzk=1
4
(2.11)
P
i∈[n1 ],j∈[n2 ],k∈[n3 ]
xi yj zk Tijk .
Precisely, here we meant that there exists a permutation π such that for every i, max{kũπ(i) − ui k, kṽπ(i) −
vi k, kw̃π(i) − wi k} ≤ O(ε)
6
where Fk,S denotes the restriction of vector Fk to subset S. Moreover, let
γk = Gk,Sa ,
δk = Gk,Sb ,
θk = Fk,Sc .
(2.12)
Then, since the sub-tensor PMITSa ,Sb ,Sc only contains entries with distinct indices, we can use
Taylor expansion (see Lemma A.1) to obtain that
X
X
γk ⊗ δk ⊗ θk + higher order terms .
PMITSa ,Sb ,Sc = ρ
ak ⊗ bk ⊗ ck + ρ2
k∈[m]
k∈[m]
Here the second summand on the RHS corresponds to the second order term in the Taylor expansion.
It turns out that the higher order terms are multiplied by ρ3 and thus have negligible Frobenius
norm, and therefore discussion below will focus on the first two summands.
For simplicity, let T = PMITSa ,Sb ,Sc . Our goal is to recover the components ak , bk , ck from the
approximate low-rank tensor T .
The first step is to whiten the components ak ’s, bk ’s and ck ’s. Recall that ak = Fk,Sa is a
non-negative vector. This implies the matrix A = [a1 , . . . , am ] must have a significant contribution
in the direction of the vector 1, and thus is far away from being well-conditioned. For the purpose
of this section, we assume for simplicity that we can access the covariance matrix defined by the
vector ak ’s,
X
(2.13)
Q̄a := AA⊤ =
ak a⊤
k .
k∈[m]
Similarly we assume the access of Q̄b and Q̄c which are defined analogously. In Section 2.4 we
discuss how to obtain approximately these three matrices.
Then,
we can compute the whitened tensor by applying transformation
1/2 , (Q̄+ )1/2 , (Q̄+ )1/2 along the three modes of the tensor T ,
)
(Q̄+
c
a
b
1/2
1/2
1/2
⊗ (Q̄+
·T =ρ
(Q̄+
⊗ (Q̄+
c )
a)
b )
k∈[m]
+ ρ2
|
X
1/2
1/2
1/2
bk ⊗ (Q̄+
ck
(Q̄+
ak ⊗ (Q̄+
c )
a)
b )
X
1/2
1/2
1/2
(Q̄+
γk ⊗ (Q̄+
δk ⊗ (Q̄+
θk +negligible terms
a)
c )
b )
k∈[m]
{z
}
:=Z
1/2 a ’s are orthonormal
Now the first summand is a low rank orthogonal tensor, since (Q̄+
k
a)
vectors. However, the term Z is a systematic error and we use the following Lemma to control its
k·k{1}{2,3} norm.
Lemma 2.7. Let n ≥ m and A, B, C ∈ Rn×m be full rank matrices and let Γ, ∆, Θ ∈ Rd×ℓ . Let
γi , δi , θi be the i-th column of Γ, ∆, Θ, respectively. Let Q̄a = AA⊤ , Q̄b = BB ⊤ , Q̄c = CC ⊤ . Suppose
ΓΓ⊤ (and ∆∆⊤ , ΘΘ⊤ ) is τ -spectrally bounded by A (and B, C respectively), then,
X
1/2
1/2
1/2
(Q̄+
γi ⊗ (Q̄+
δi ⊗ (Q̄+
θi
c )
a)
b )
i∈[ℓ]
≤ (2τ )3/2 .
{1}{2,3}
Lemma 2.7 shows that to give an upper bound on the k·k{1}{2,3} norm of the error tensor Z,
it suffices to show that the square of the components of the error, namely, ΓΓ⊤ , ∆∆⊤ , ΘΘ⊤ are
7
τ -spectrally bounded by the components of the signal A, B, C respectively. This will imply that
kZk{1}{2,3} ≤ (2τ )3/2 ρ2 .
Recall that A and Γ are two sub-matrices of F and G. We have shown that GG⊤ is τ -spectrally
bounded by F in Proposition 2.5. It follows straightforwardly that the random sub-matrices also
have the same property.
Proposition 2.8. In the setting of this section, under the generative model for W , w.h.p, we have
that ΓΓ⊤ is τ -spectrally bounded by A with τ = O(log n). The same is true for the other two
modes.
Using Proposition 2.8 and Lemma 2.7, we have that
kZk{1}{2,3} . ρ2 log3/2 (n) .
1/2 ⊗ (Q̄+ )1/2 ⊗ (Q̄+ )1/2 · T , we can recover the comThen using Theorem 2.6 on the tensor (Q̄+
c
a)
b
+ 1/2
+
1/2
+
1/2
ponents (Q̄a ) ak ’s, (Q̄b ) bk ’s, and (Q̄c ) ck ’s. This will lead us to recover ak ,bk and ck , and
finally to recover the weight matrix W .
2.4
Robust whitening
In the previous subsection, we assumed the access to Q̄a , Q̄b , Q̄c (defined in (2.13)) which turns out
to be highly non-trivial. A priori, using equation (2.6), noting that A = [F1,Sa , . . . , Fm,Sa ], we have
PMISa ,Sa /ρ ≈ Q̄a + error .
However, this approximation can be arbitrarily bad for the diagonal entries of PMI since equation (2.6) only works for entries with distinct indices. (Recall that this is why we divided the
indices set into Sa , Sb , Sc and studied the asymmetric tensor in the previous subsection). Moreover,
the diagonal of the matrix Q̄a contributes to its spectrum significantly and therefore we cannot get
meaningful bounds (in spectral norm) by ignoring the diagonal entries.
This issue turns out to arise in most of the previous tensor papers and the solution was to
compute AA⊤ by using the asymmetric moments AB ⊤ , BC ⊤ , CA⊤ ,
AA⊤ = (AB ⊤ )(CB ⊤ )+ (CA⊤ ) .
Typically AB ⊤ , BC ⊤ , CA⊤ can be estimated with arbitrarily small error (as number of samples
go to infinity) and therefore the equation above leads to accurate estimate to AA⊤ . However,
in our case the errors in the estimate PMISa ,Sb ≈ AB ⊤ , PMISb ,Sc ≈ BC ⊤ , PMISc ,Sa ≈ CA⊤ are
systematic. Therefore, we need to use a more delicate analysis to control how the error accumulates
in the estimate,
Q̄a ≈ PMISa ,Sb · PMI−1
Sb ,Sc · PMISc ,Sa .
Here again, to get an accurate bound, we need to understand how the error in PMISa ,Sb −
AB ⊤ behaves relatively compared with AB ⊤ in a direction-by-direction basis. We generalized
Definition 2.3 to capture the asymmetric spectral boundedness of the error by the signal.
Definition 2.9 (Asymmetric spectral boundedness). Let n ≥ m and B, C ∈ Rn×m . We say a
matrix E ∈ Rn×n is ε-spectrally bounded by (B, C) if E can be written as:
⊤
E = B∆1 C ⊤ + B∆⊤
2 + ∆3 C + ∆4 .
(2.14)
Here ∆1 ∈ Rm×m , ∆2 , ∆3 ∈ Rn×m and ∆4 ∈ Rn×n are matrices whose spectral norms are bounded
by: k∆1 k ≤ ε, k∆2 k ≤ εσmin (C), k∆3 k ≤ εσmin (B) and k∆4 k ≤ εσmin (B)σmin (C).
8
Let K be the column subspace of B and H be the column subspace of C. Then we have
∆1 = B + E(C ⊤ )+ , ∆2 = B + EIdH ⊥ , ∆3 = IdK ⊥ E(C ⊤ )+ , ∆4 = IdK ⊥ EIdH ⊥ . Intuitively, they
measure the relative relationship between E and B, C in different subspaces. For example, ∆1 is
the relative perturbation in the column subspace of K and row subspace of H. When B = C,
this is equivalent to the definition in the symmetric setting (this will be clearer in the proof of
Theorem 2.4).
Theorem 2.10 (Robust whitening theorem). Let n ≥ m and A, B, C ∈ Rn×m .
Σab , Σbc , Σca ∈ Rn×n are of the form,
Suppose
Σab = AB ⊤ + Eab , Σbc = BC ⊤ + Ebc , and Σca = CA⊤ + Eca .
where Eab , Ebc , Eca are ε-spectrally bounded by (A, B), (B, C), (C, A) respectively. Then, the matrix
matrix
+
Qa = Σab [Σ⊤
bc ]m Σca
+
⊤
is a good approximation of AA⊤ in the sense that Qa = Σab [Σ⊤
bc ]m Σca − AA is O(ε)-spectrally
bounded by A. Here [Σ]m denotes the best rank-m approximation of Σ.
The theorem is non-trivial even if the we have an absolute error assumption, that is, even
if kEbc k ≤ τ σmin (B)σmin (C), which is stronger condition than Ebc is τ -spectrally bounded by
⊤ +
⊤
(B, C). Suppose we establish bounds on kΣab − AB ⊤ k, kΣ+⊤
bc − (BC ) k and kΣab − AB k
+
⊤
individually, and then putting them together in the obvious way to control the error Σab [Σbc ]m Σca −
AB ⊤ (BC ⊤ )+ CA⊤ . Then the error will be too large for us. This is because standard matrix
⊤ −1
⊤ −1 2 .
perturbation theory gives that kΣ−⊤
bc − (BC ) k can be bounded by O kEbc kk(BC ) k
ε/[σmin (B)σmin (C)], which is tight. Then we multiply the error with the norm of the rest of the
(B)σmax (C)
. That is, we will loss a condition number of
two terms, the error will be roughly ε · σσmax
min (B)σmin (C)
B, C, which can be dimension dependent for our case.
+
The fix to this problem is to avoid bounding each term in Σab [Σ⊤
bc ]m Σca individually. To do
this, we will take the cancellation of these terms into account. Technically, we re-decompose the
+
+
+
⊤ +
product Σab [Σ⊤
bc ]m Σca into a new product of three matrices (Σab B )(B[Σbc ]m C)(C Σca ), and then
bound the error in each of these terms instead. See Section C for details.
1/2 a ’s are indeed approximately
As a corollary, we conclude that the whitened vectors (Q+
i
a)
orthonormal.
1/2 A contains approximately
Corollary 2.11. In the setting of Theorem 2.10, we have that (Q+
a)
orthonormal vectors as columns, in the sense that
1/2
1/2
k(Q+
AA⊤ (Q+
− Idk . ε .
a)
a)
Therefore we have found an approximate whitening matrix for A even though we do not have
access to the diagonal entries.
3
Main Algorithms and Results
As sketched in Section 2, our main algorithm (Algorithm 1) uses tensor decomposition on the PMI
tensor. In this section, we describe the different steps and how the fit together. Subsequently, all
steps will be analyzed in separate sections.
9
Algorithm 1 Learning Noisy-Or Networks via Decomposing PMI Tensor
Inputs: N samples generated from a noisy-or network, disease prior ρ
c.
Outputs: Estimate of weight matrix W
d PMIT
\ using equation (E.1).
1. Compute the empirical PMI matrix and tensor PMI,
2. Choose a random equipartition Sa , Sb , Sc of [n].
\ via Algorithm 4 for the partitioning
3. Obtain approximate whitening matrices for PMIT
Sa , Sb , Sc
4. Run robust tensor-decomposition Algorithm 3 to obtain vectors âi , b̂i , ĉi , i ∈ [m]
1/3 â , 1 − ( 1−ρ )1/3 b̂ , 1 − ( 1−ρ )1/3 ĉ .
5. Let Yi be the concatenation of the three vectors 1 − ( 1−ρ
i
i
i
ρ )
ρ
ρ
(Recall that âi , b̂i , ĉi are of dimension n/3 each.)
c , where
6. Return W
ci,j
W
(
− log((Yi )j ), if (Yi )j > exp(−νu ) :
=
exp(−νu ),
otherwise
Theorem 3.1 (Main theorem, random weight matrix). Suppose the true W is generated from
the random model in Section 1 with ρpm ≤ c for some sufficiently small constant c. Then given
c in polynomial
N = poly(n, 1/p/, 1/ρ) number of examples, Algorithm 1 returns a weight matrix W
time that satisfies
ci − Wi k2 ≤ O(η
e √pn) ,
∀i ∈ [m], kW
√
where η = Õ mpρ .
√
Note that the column ℓ2 norm of Wi is on the order of pn, and thus η can be thought of as the
relative error in ℓ2 norm. Note also that Pr[si = 0] = 1 − Pr[si = 1] ≈ 1 − pmρ, so ρpm = o(1) is
necessary purely for sample complexity reasons. Finally, we can also state a result with a slightly
weaker guarantee, but with only deterministic assumptions on the weight matrix W . Recall that
F = 1 − exp(−W ) and G = 1 − exp(−2W ). We will also define third and fourth-order terms
H = 1 − exp(−3W ), L = 1 − exp(−4W ).
We also define the incoherence of a matrix F . Roughly speaking, it says that the left singular
vectors of F don’t correlate with any of the natural basis vector much more than the average.
Definition 3.2 (Incoherence:). Let Fp∈ Rn×m have singular value decomposition F = U ΣV ⊤ . We
say F is µ-incoherent if maxi kUi k ≤ µm/n. where Ui is the i-th row of U .
We assume the weight matrix W satisfies the following deterministic assumptions,
1. GG⊤ , HH ⊤ , LL⊤ is τ -spectrally
p bounded by F for τ ≥ 1.
e n/m).
2. F is µ-incoherent with µ ≤ O(
3. If maxi kFi k0 ≤ pn, with high probability over the choice of a subset Sa , |Sa | = n/3, σmin (FSa ) &
√
np and ρpm ≤ c for some sufficiently small constant c.
Theorem 3.3 (Main theorem, deterministic weight matrix). Suppose the matrix W satisfies the
c in polynomial
conditions 1-3 above. Given polynomial number of samples, Algorithm 1 returns W
time, s.t.
ci − Wi k2 ≤ O(η
e √np) .
∀i ∈ [m], kW
10
for η =
√
mpρτ 3/2
√
√
Since the ℓ2 norm of Wi is on the order of np, the relative error in ℓ2 -norm is as most mρτ 3/2 ,
which mirrors the randomized case above.
The proofs of Theorems uses the overall strategy of Section 2, and is deferred to Section D. We
give a high level outline that demonstrates how the proofs depends on the machinery built in the
subsequent sections.
Both Theorem 3.1 and Theorem 3.3 are similarly proved – the only technical difference being
how the third and higher order terms are bounded. (Because of generative model assumption, for
Theorem 3.1 we can get a more precise control on them.) Hence, we will not distinguish between
them in the coming overview.
Overall, we will follow the approach outlined in Section 2. Let us step through Algorithm 1 line
by line:
1. The overall goal will be to recover the leading terms of the PMI tensor. Of course, we get
samples only, so can merely get an empirical version of it. In Section E, we show that the
simple plug-in estimator does the job – and does so with polynomially many samples.
2. Recall Difficulty 3 from Section 2 : the PMI tensor and matrix expression is only accurate
on the off-diagonal entries. In order to address this, in Section 2.3 we passed to a sub-tensor
of the original tensor by partitioning the symptoms into three disjoint sets, and considering
the induced tensor by this partition.
3. In order to apply the robust tensor decomposition algorithm from Section 5, we need to first
calculate whitening matrices. This is necessarily complicated by the fact that the diagonals
of the PMI matrix are not accurate, as discussed in Section 2.4. Section C gives guarantees
on the procedure for calculating the whitening matrices.
4. This is main component of the algorithm: the robust tensor decomposition machinery. In
Section 5, the conditions and guarantees for the success of the algorithm are formalized.
There, we deal with the difficulties layed out in Section 2.2 : namely that we have a substantial
systematic error that we need to handle. (Both due to higher-order terms, and due to the
missing diagonal entries)
5. This step, along with Step 6, is a post-processing step – which allows us to recover the weight
matrix W after we have recovered the leading terms of the PMI tensor.
We also give a short quantitative sense of the guarantee of the algorithm. (The reader can find
the full proof in Section D.)
To get quantitative bounds, we will first need a handle on spectral properties of the random
model: these are located in Section B. As we mentioned above, the main driver of the algorithm is
step 4, which uses our robust tensor decomposition machinery in Section 5. To apply the machinery,
we first need to show that the second (and higher) order terms of the PMI tensor are spectrally
bounded. This is done by applying Proposition B.4, which roughly shows the higher-order terms are
O(ρ log n)-spectrally bounded by ρF F ⊤ . The whitening matrices are calculated using machinery
in Section C. We can apply these tools since the random model gives rise to a O(1)-incoherent F
matrix as shown in Lemma B.1.
To get a final sense of what the guarantee is, the l2 error which step 4 gives, via Theorem 5.4
√
roughly behaves like σmax τ 3/2 , where σmax is the spectral norm of the whitening matrices and
τ is the spectral boundedness parameter. But, by Lemma D.1 σmax is approximately the spectral
11
norm of ρF F ⊤ – which on the other hand by Lemma B.1 is on the order of mnp2 ρ. Plugging in
these values, we get the theorem statement.
4
Finding the Subspace under Heavy Perturbations
In this section, we show even if we perturb a matrix SS ⊤ with an error whose spectral norm might
be much larger than σmin (SS ⊤ ), as long as E is spectrally bounded the top singular subspace of
S is still preserved. We defer the proof of the asymmetric case (Theorem 2.10) to Section C. We
note that such type of perturbation bounds, often called relatively perturbation bounds, have been
studied in [Ips98, Li98a, Li98b, Li97]. The results in these papers either require the that signal
matrix is full rank, or the perturbation matrix has strong structure. We believe our results are new
and the way that we phrase the bound makes the application to our problem convenient. We recall
Theorem 2.4, which was originally stated in Section 2.
Theorem 2.4 (matrix perturbation theorem for systematic error). Let n ≥ m. Let S ∈ Rn×m be
of full rank. Suppose positive semidefinite matrix E ∈ Rn×n is ε-spectrally bounded by S ∈ Rn×m
b the subspace of the top m eigenvectors of SS ⊤ and SS ⊤ + E. Then,
for ε ∈ (0, 1). Let K, K
IdK − IdKb . ε .
Proof. We can assume ε ≤ 1/10 since otherwise the statement is true (with a hidden constant 10).
Since E is a positive semidefinite matrix, we write E = RR⊤ where R = E 1/2 . Since A has full
column rank, we can write R = AS + B where S ∈ Rm×n and the columns of B are in the subspace
K ⊥ . (Specifically, we can choose S = A+ R and B = R − AA+ R = IdK ⊥ B.) By the definition of
spectral boundedness, we have
⊤
⊤
⊤
⊤
BB = IdK ⊥ RR IdK ⊥ IdK ⊥ ε AA + σm (AA )Idn IdK ⊥ .
= εσm (AA⊤ )IdK ⊥ .
Therefore, we have that kBk2 ≤ εσmin (AA⊤ ). Moreover, we also have
IdK RR⊤ IdK εAA⊤ + εσmin IdK ,
It follows that
ASS ⊤ A⊤ ≤ 2εAA⊤ .
which implies
Let P = Idm + SS ⊤
1/2
kSS ⊤ k ≤ ε.
. Then we write AA⊤ + E as,
AA⊤ + E = AA⊤ + RR⊤ = AA⊤ + (AS + B)(AS + B)⊤
= A(Id + SS ⊤ )A⊤ + ASB ⊤ + BS ⊤ A⊤ + BB ⊤
= (AP + BS ⊤ P −1 )(AP + BS ⊤ P −1 )⊤ + BB ⊤ − BS ⊤ P −2 SB ⊤
(4.1)
b = (AP + BS ⊤ P −1 ). Let K ′ be the column span of A.
b We first prove that K
b is close to K ′ .
Let A
Note that
BB ⊤ − BS ⊤ P −2 SB ⊤ . kBk2 + kBk2 S ⊤ P −2 S . kBk2
. εσmin (AA⊤ ) .
12
(since P = Id + SS ⊤ SS ⊤ )
bA
b⊤ ) = σmin (A)
b 2 = σmin (AP ) − kBS ⊤ P −1 k 2 ≥ (1 − O(ε))σmin (A)2 .
Moreover, we have σmin (A
Therefore, using Wedin’s Theorem (Lemma F.2) on equation (4.1), we have that
kIdKb − IdK ′ k . ε .
Next we show K ′ and K are also close. We have
p
b − AP k ≤ kBS ⊤ P −1 k ≤ ε σmin (A)2
kA
(4.2)
(since kSk .
√
ε, kBk .
√
ε)
b is close to the
Therefore, by Wedin’s Theorem, K ′ , as the span of top m left singular vectors of A,
span of the top left singular vector of AP , namely, K
kIdK − IdK ′ k . ε .
(4.3)
Therefore using equation (4.2) and (4.3) and triangle inequality, we complete the proof.
5
Robust Tensor Decomposition with Systematic Error
In this section we discuss how to robustly find the tensor decomposition even in presence of systematic error. We first illustrate the main techniques in an easier setting of orthogonal tensor
decomposition (Section 5.1), then we describe how it can be generalized to the general setting that
we require for our algorithm (Section 5.2).
5.1
Warm-up: Approximate Orthogonal Tensor Decomposition
We start with decomposing an orthogonal tensor with systematic error. The algorithm we use here
is a slightly more general version of an algorithm in [MSS16].
Algorithm 2 Robust orthogonal tensor decomposition
Inputs: Tensor T ∈ Rd×d×d , number δ, ε ∈ (0, 1).
Outputs: Set S = {(ãi , b̃i , c̃i )}
1. S = ∅
2. For s = 1 to O(d1+δ log d)
3.
4.
5.
Draw g ∼ N (0, Idn ), and compute M = Idn ⊗ Idn ⊗ g⊤ · T .5
Compute the top left and right singular vectors u, v ∈ Rd of M . Let z = (u⊤ ⊗v ⊤ ⊗Idn )·T .
If (u⊤ ⊗ v ⊤ ⊗ z ⊤ ) · T ≥ 1 − ζ, where ζ = O(ε), and u is 1/2-far away from any of ui ’s
with (ui , vi , wi ) ∈ S, then add (u, v, w) to S.
6. Return S
Theorem 5.1 (Stronger version of Theorem 2.6). Suppose {ui }, {vi }, {wi } are three collection
ε-approximate orthonormal vectors. Suppose tensor T is of the form
T =
r
X
i=1
5
ui ⊗ vi ⊗ wi + Z
Recall that product of two tensor (A ⊗ B ⊗ C) · (E ⊗ D ⊗ F ) = AE ⊗ BD ⊗ CF
13
with kZk{2}{1,3} ≤ τ and kZk{1}{2,3} ≤ τ . Then, with probability at least 0.9, Algorithm 2 returns
S = {(ũi , ṽi , w̃i )} which is guaranteed to be O((τ + ε)/δ)-close to {(ui , vi , wi )} in ℓ2 -norm up to
permutation.
Proof Sketch of Theorem 5.1. The Theorem is a direct extension of [MSS16, Theorem 10.2] to
asymmetric and approximate orthogonal case. We only provide a proof sketch here. We start by
writing
m
X
⊤
hg, wi iui vi⊤ + (Idn ⊗ Idn ⊗ g⊤ ) · Z
·T =
M = Id ⊗ Id ⊗ g
|
{z
}
i=1
:=Mg
{z
}
|
(5.1)
:=Ms
Since kZk{2}{1,3} ≤ τ and kZk{1}{2,3} ≤ τ , [MSS16, Theorem 6.5] implies that with probability at
least 1 − d2 over the choice of g,
p
(Idn ⊗ Idn ⊗ g⊤ ) · Z ≤ 2 log d · τ
√
Let t = 2 log d. We have that with probability 1/(d1+δ logO(1) d), hg, w1 i ≥ (1 + δ/3)t and
hg, wj i ≤ t for every j 6= 1. We condition on these events. Let ūi be a set of orthonormal vectors
such that Eu = [u1 , . . . , um ] − [ū1 , . . . , ūm ] satisfies kEu k ≤ ε (we can take ūi ’s to be the whitening
of uP
i ’s). Similarly define v̄i ’s. Then we have that the
Pterm (defined in equation (5.1)) can be written
′
′
as i hg, w1 iūi v̄i + E where kEk . ε. Let M̄S = i hg, w1 iūi v̄i . Then M̄S has top singular value
hg, w1 i ≥ (1 + δ/3)t, and second singular value at most t. Moreover, the term Mg + E ′ has spectral
norm bounded by O(τ + ε). Thus by Wedin’s Theorem (Lemma F.2), the top left and right singular
vectors u, v of MS + Mg = M̄S + Mg + E ′ are O((τ + ε)/δ)-close to ū1 and v̄1 respectively. They
are also O((τ + ε)/δ)-close to u1 , v1 since u1 is close to ū1 . Moreover, we have (u⊤ ⊗ v ⊤ ⊗ Id) · T is
O(τ /δ)-close to w1 .
Therefore, with probability 1/(d1+δ logO(1) d), each round of the for loop in Algorithm 2 will find
u1 , v1 , w1 . Line 5 is used to verify if the resulting vectors are indeed good using the injective norm
as a test. It can be shown that if the test is passed then (u, v, z) is close to one of the component.
Therefore, after d1+δ logO(1) d iterations, with high probability, we can find all of the components.
5.2
General tensor decomposition
In many previous works, general tensor decomposition is reduced to orthogonal tensor decomposition via a whitening procedure. However, here in our setting we cannot estimate the exact whitening
matrix because of the systematic error. Therefore we need a more robust version of approximate
whitening matrix, which we define below:
Definition 5.2. Let r ≤ d. A collection of r vectors {a1 , . . . , ar } is ε-approximately orthonormal if
the matrix A with ai as columns satisfies
A⊤ A − Id ≤ ε
(5.2)
Definition 5.3. Let d ≥ r and A = [a1 , . . . , ar ] ∈ Rd×r . A PSD matrix Q ∈ Rd×d is an εapproximate whitening matrix for A if (Q+ )1/2 A is ε-approximately orthonormal .
With this in mind, we can state the guarantee on the tensor decomposition algorithm (Algorithm 3).
14
Algorithm 3 Tensor decomposition with systematic error
Inputs: Tensor T ∈ Rn1 ×n2 ×n3 and ε-approximate whitening matrices Qa , Qb , Qc ∈ Rd×d .
Outputs: {âi , bˆi , ĉi }i∈[r]
1/2 ⊗ (Q+ )1/2 ⊗ (Q+ )1/2 · T
1. Compute T̃ = (Q+
c
a)
b
2. Run orthogonal tensor decomposition (Algorithm 2) with input T̃ , and obtain {ăi , b̆i , c̆i }
1/2
1/2
1/2
3. Return: {Qa ăi , Qb b̆i , Qc c̆i }
Theorem 5.4. Let d ≥ r, and A, B, C ∈ Rd×r be full rank matrices. Let Γ, ∆, Θ ∈ Rd×ℓ . Let
ai , bi , ci , γi , δi , θi be the columns of A, B, C, Γ, ∆, Θ respectively. Suppose tensor T is of the form
T =
r
X
i=1
ai ⊗ bi ⊗ ci +
ℓ
X
i=1
γi ⊗ δi ⊗ θi + E
(5.3)
Suppose matrices Qa ∈ Rd×d , Qb ∈ Rd×d , Qc ∈ Rd×d are ε-approximate whitening matrices for
1/2
1/2
1/2
A, B, C, and suppose Γ, ∆, Θ are τ -spectrally bounded by Qa , Qb , Qc , respectively. Then,
Algorithm 3 returns âi , b̂i , ĉi that are O(η)-close to ai , bi , ci in Õ(d4+δ ) time with
η . max(kQa k , kQb k , kQc k)1/2 · τ 3/2 + σ −3/2 kEk{1,2}{3} + ε · 1/δ
where σ = min(σmin (Qa ), σmin (Qb ), σmin (Qc )).
Note that in our model, the matrix E has very small spectral norm as it is the third order term
in ρ (and ρ = O(1/n)). The spectral boundedness of Γ, ∆, Θ are discussed in Section B. Therefore
we can expect the RHS to be small.
In order to prove this theorem, we show after we apply whitening operation using the approximate whitening matrices, the tensor is still close to an orthogonal tensor. To do that, we need the
following lemma which is a useful technical consequence of the condition (2.9).
Lemma 5.5. Suppose F is τ -spectrally bounded by g. Then,
kG⊤ (F F ⊤ )+ Gk ≤ 2τ .
(5.4)
Proof. Let K be the column span of F . Let Q = F F ⊤ . Multiplying (Q+ )1/2 on both sides of
equation (2.9), we obtain that
(Q+ )1/2 GG⊤ (Q+ )1/2 τ (IdK + σm (Q)Q+ )
τ (IdK + σm (Q)kQ+ kIdK )
It follows that k(Q+ )1/2 Gk
kG⊤ (Q+ )1/2 (Q+ )1/2 Gk ≤ 2τ .
≤
√
2τ IdK
2τ , which in turns implies that kG⊤ (F F ⊤ )+ Gk
=
We also need to bound the {1, 2}{3} norm of the following systematic error tensor. This is
important because we want to bound the spectral norm of the perturbation after the whitening
operation.
15
Lemma 5.6 (Variant of [MSS16, Theorem 6.1]). Let Γ, ∆, Θ ∈ Rd×ℓ . Let γi , δi , θi be the i-th
column of Γ, ∆, Θ, respectively. Then,
X
i∈[ℓ]
γi ⊗ δi ⊗ θi
≤ kΓk · kΘk · k∆k1→2 ≤ kΓk · kΘk · k∆k
(5.5)
{1,2}{3}
Proof of Lemma 5.6. Using the definition of k·k{1,2}{3} we have that
X
i∈[]
γi ⊗ δi ⊗ θi
=
X
(γi ⊗ δi )θi⊤
(5.6)
i∈[ℓ]
{1,2}{3}
≤
=
X
1/2
(γi ⊗ δi )(γi ⊗ δi )
X
1/2
θi θi⊤
i∈[ℓ]
i∈[ℓ]
(by Cauchy-Schwarz inequality)
1/2
X
(γi γi⊤ )
i∈[ℓ]
⊗
(δi δi⊤ )
kΘk
Next observe that we have that for any i, δi δi⊤ (max kδi k2 )Id and therefore,
(γi γi⊤ ) ⊗ (δi δi⊤ ) γi γi⊤ ⊗ (max kδi k2 )Id .
(5.7)
It follows that
X
i∈[r]
γi ⊗ δi ⊗ θi
≤
{1,2}{3}
X
i∈[r]
1/2
2
γi γi⊤ ⊗ (max kδi k )Id
kΘk
= kΓk · kΘk · k∆k1→2 .
With this in mind, we prove the main theorem:
1/2 A, B̃ = (Q+ )1/2 B, C̃ = (Q+ )1/2 C. Moreover, let Γ̃ =
Proof of Theorem 5.4. Let à = (Q+
a)
c
b
1/2 Γ and define ∆,
˜
(Q+
)
Θ̃
similarly.
Let
ã
,
b̃
,
c̃
,
γ̃
,
δ̃
,
θ̃
be
their
columns.
Then we have that T̃
1
i
i
i
i
i
a
as defined in Algorithm 3 satisfies
T̃ =
r
X
i=1
ãi ⊗ b̃i ⊗ c̃i +
ℓ
X
i=1
γ̃i ⊗ δ̃i ⊗ θ̃i + Ẽ
(5.8)
1/2 ⊗ (Q+ )1/2 ⊗ (Q+ )1/2 · E. We will show that T̃ meets the condition of Thewhere Ẽ = (Q+
c
a)
b
1/2 A is
orem 2.6. Since Qa is an ε-approximate whitening matrix of A, by Definition, Ã = (Q+
a)
ε-approximately orthonormal . Similarly, B̃, C̃ are ε-approximately orthonormal . √
Γ is τ -spectrally
bounded by Qa , hence by Lemma 5.5, we have that kΓ̃k ≤ 2τ . Similarly,
√
kΘk, k∆k ≤ 2τ . Applying Lemma 5.6, we have,
ℓ
X
i=1
γ̃i ⊗ δ̃i ⊗ θ̃i
{1,2}{3}
16
≤ (2τ )3/2
(5.9)
−3/2 kEk
1/2 k · k(Q+ )1/2 k · k(Q+ )1/2 kkEk
Moreover, we have kẼk{1,2}{3} ≤ k(Q+
{1,2}{3} ≤ σ
{1,2}{3} ,
c
c
a)
where σ = min{σmin (Qa ), σmin (Qb ), σmin (Qc )}.PTherefore, using Theorem 2.6 (with ai , bi , ci there
replaced by ãi , b̃i , c̃i , and Z there replaced by ℓi=1 γ̃i ⊗ δ̃i ⊗ θ̃i + Ẽ), we have that a set of vectors
{ăi , b̆i , c̆i } that are ε-close to {ãi , b̃i , c̃i } with ε = (2τ )3/2 + σ −3/2 kẼk{1,2}{3} . Therefore, we obtain
that kai − Q1/2 ăi k ≤ kQa k1/2 ε. Similarly we can control the error for bi and ci and complete the
proof.
6
Conclusions
We have presented theoretical progress on the longstanding open problem of presenting a
polynomial-time algorithm for learning noisy-or networks given sample outputs from the network.
In particular it is enouraging that linear algebraic methods like tensor decomposition can play a
role. Earlier there were no good approaches for this problem; even heuristics fail for realistic sizes
like n = 1000.
Can sample complexity be reduced, say to subcubic? (Cubic implies more than one billion
examples for networks with 1000 outputs.) Possibly this requires exploiting some hierarchichal
structure –e.g. groupings of diseases and symptoms— in practical noisy-OR networks but exploring
such possibilities using the current version of QMR-DT is difficult because it has been scrubbed of
labels for diseases and symptoms.)
Various more practical versions of our algorithm are also easy to conceive and will be tested
in the near future. This could be somewhat analogous to topic modeling, for which discovery of
provable polynomial-time algorithms soon led to very efficient algorithms.
Acknowledgments:
We thank Randolph Miller and Vanderbilt University for providing the current version of this
network for our research.
References
[AGH+ 13] Sanjeev Arora, Rong Ge, Yonatan Halpern, David M Mimno, Ankur Moitra, David
Sontag, Yichen Wu, and Michael Zhu. A practical algorithm for topic modeling with
provable guarantees. In ICML (2), pages 280–288, 2013.
[AGH+ 14] Animashree Anandkumar, Rong Ge, Daniel Hsu, Sham M Kakade, and Matus Telgarsky. Tensor decompositions for learning latent variable models. Journal of Machine
Learning Research, 15(1):2773–2832, 2014.
[AGM12]
Sanjeev Arora, Rong Ge, and Ankur Moitra. Learning topic models–going beyond svd.
In Foundations of Computer Science (FOCS), 2012 IEEE 53rd Annual Symposium on,
pages 1–10. IEEE, 2012.
[AGMM15] Sanjeev Arora, Rong Ge, Tengyu Ma, and Ankur Moitra. Simple, efficient, and neural
algorithms for sparse coding. In Proceedings of The 28th Conference on Learning
Theory, pages 113–149, 2015.
[Chi96]
David Maxwell Chickering. Learning bayesian networks is np-complete. In Learning
from data, pages 121–130. Springer, 1996.
17
[DK70]
Chandler Davis and William Morton Kahan. The rotation of eigenvectors by a perturbation. iii. SIAM Journal on Numerical Analysis, 7(1):1–46, 1970.
[GHK15]
Rong Ge, Qingqing Huang, and Sham M Kakade. Learning mixtures of gaussians in
high dimensions. In Proceedings of the Forty-Seventh Annual ACM on Symposium on
Theory of Computing, pages 761–770. ACM, 2015.
[HK13]
Daniel Hsu and Sham M Kakade. Learning mixtures of spherical gaussians: moment
methods and spectral decompositions. In Proceedings of the 4th conference on Innovations in Theoretical Computer Science, pages 11–20. ACM, 2013.
[HS06]
Geoffrey E Hinton and Ruslan R Salakhutdinov. Reducing the dimensionality of data
with neural networks. Science, 313(5786):504–507, 2006.
[HS13]
Yoni Halpern and David Sontag. Unsupervised learning of noisy-or bayesian networks.
In Uncertainty in Artificial Intelligence, page 272. Citeseer, 2013.
[Ips98]
Ilse CF Ipsen. Relative perturbation results for matrix eigenvalues and singular values.
Acta numerica, 7:151–201, 1998.
[JGJS99]
Michael I Jordan, Zoubin Ghahramani, Tommi S Jaakkola, and Lawrence K Saul. An
introduction to variational methods for graphical models. Machine learning, 37(2):183–
233, 1999.
[JHS13]
Yacine Jernite, Yonatan Halpern, and David Sontag. Discovering hidden variables in
noisy-or networks using quartet tests. In Advances in Neural Information Processing
Systems, pages 2355–2363, 2013.
[Li97]
Ren-Cang Li. Relative perturbation theory. iii. more bounds on eigenvalue variation.
Linear algebra and its applications, 266:337–345, 1997.
[Li98a]
Ren-Cang Li. Relative perturbation theory: I. eigenvalue and singular value variations.
SIAM Journal on Matrix Analysis and Applications, 19(4):956–982, 1998.
[Li98b]
Ren-Cang Li. Relative perturbation theory: Ii. eigenspace and singular subspace variations. SIAM Journal on Matrix Analysis and Applications, 20(2):471–492, 1998.
[MPJM82] Randolph A Miller, Harry E Pople Jr, and Jack D Myers. Internist-i, an experimental computer-based diagnostic consultant for general internal medicine. New England
Journal of Medicine, 307(8):468–476, 1982.
[MR05]
Elchanan Mossel and Sébastien Roch. Learning nonsingular phylogenies and hidden
markov models. In Proceedings of the thirty-seventh annual ACM symposium on Theory
of computing, pages 366–375. ACM, 2005.
[MSS16]
T. Ma, J. Shi, and D. Steurer. Polynomial-time Tensor Decompositions with Sum-ofSquares. ArXiv e-prints, October 2016.
[SC91]
Michael Shwe and Gregory Cooper. An empirical analysis of likelihood-weighting simulation on a large, multiply connected medical belief network. Computers and Biomedical
Research, 24(5):453–475, 1991.
[Smo86]
Paul Smolensky. Information processing in dynamical systems: Foundations of harmony theory. Technical report, DTIC Document, 1986.
18
[Ste77]
GW Stewart. On the perturbation of pseudo-inverses, projections and linear least
squares problems. SIAM review, 19(4):634–662, 1977.
[Ste90]
Gilbert W Stewart. Matrix perturbation theory. 1990.
[Wed72]
Per-Åke Wedin. Perturbation bounds in connection with singular value decomposition.
BIT Numerical Mathematics, 12(1):99–111, 1972.
A
Formal expression for the PMI tensor
In this section we formally derive the expressions for the PMI tensors and matrices, which we only
informally did in Section 2.
As a notational convenience for l ∈ N, we will denote by P̃l the matrix which has as columns the
vectors 1 − exp(−lWk ), k ∈ [m]. Furthermore, for a subset Sa ⊆ [n], we will introduce the notation
⊤
X
X
=
(1 − exp(−lWk )Sa ) (1 − exp(−lWk )Sa )⊤
(P̃l )k,Sa (P̃l )k,Sa
Pl,Sa =
k∈[m]
k∈[m]
These matrices will appear naturally in the expressions for the higher-order terms in the Taylor
expansion for the PMI matrix and tensor.
We first compute the formally the moments of the noisy-or model.
Lemma A.1. We have
log Pr[si = 0] =
X
k∈[m]
∀i 6= j log Pr [si = 0 ∧ sj = 0] =
∀ distinct i, j, k ∈ [n], log Pr [si = 0 ∧ sj = 0 ∧ sℓ = 0] =
X
k∈[m]
X
k∈[m]
log (1 − ρ(1 − exp(Wik )))
log (1 − ρ(1 − exp(Wik + Wjk )))
log (1 − ρ(1 − exp(Wik + Wjk + Wℓk )))
Proof of Lemma A.1. We only give the proof for the second equation. The rest can be shown
analogously.
h
i
log Pr [si = 0 ∧ sj = 0] = E [Pr[si = 0|d] · Pr[sj = 0|d]] = E exp(−(Wi + Wj )⊤ d)
Y
=
E [exp(−(Wik + Wjk )dk ))]
k∈[m]
=
Y
k∈[m]
(1 − ρ(1 − exp(−(Wik + Wjk )))) .
With this in mind, we give the expression for the PMI tensor along with all the higher-order
terms.
Proposition A.2. For any equipartition Sa , Sb , Sc of [n], the restriction of the PMI tensor
PMITSa ,Sb ,Sc satisfies, for any L ≥ 2,
PMITSa ,Sb ,Sc
L
X
X
ρ
Fk,Sa ⊗Fk,Sb ⊗Fk,Sc + (−1)l+1
=
1−ρ
k∈[m]
l=2
19
1
l
ρ
1−ρ
l ! X
k∈[m]
(P̃l )k,Sa ⊗(P̃l )k,Sb ⊗(P̃l )Sc +EL
(A.1)
where
kEL k{1,2},{3} ≤
(mn)3
L
1−
ρ
1−ρ
L
ρ
1−ρ
L
Proof. The proof will proceed by Taylor expanding the log terms. Towards that, using Lemma A.1,
we have :
PMITijl =
X
(1 − ρ(1 − exp(−Wik − Wjk ))) (1 − ρ(1 − exp(−Wik − Wlk ))) (1 − ρ(1 − exp(−Wjk − Wlk )))
log
(1 − ρ(1 − exp(−Wik − Wjk − Wlk ))) (1 − ρ(1 − exp(−Wik ))) (1 − ρ(1 − exp(−Wjk ))) (1 − ρ(1 − exp(−Wlk )))
k∈[m]
By the Taylor expansion of log(1 − x), we get that
PMIijl =
∞
X
1 X t
−
ρ (((1 − exp(−Wik − Wjk )))t + ((1 − exp(−Wik − Wlk )))t + ((1 − exp(−Wjk − Wlk )))t −
t
t=1
k∈[m]
(1 − exp(−Wik ))t − (1 − exp(−Wjk ))t − (1 − exp(−Wlk ))t − (1 − exp(−Wik − Wjk − Wlk ))t )
Furthermore, note that
((1 − exp(−Wik − Wjk )))t + ((1 − exp(−Wik − Wlk )))t + ((1 − exp(−Wjk − Wlk )))t −
(1 − exp(−Wik ))t − (1 − exp(−Wjk ))t − (1 − exp(−Wlk ))t − (1 − exp(−Wik − Wjk − Wlk ))t =
t
X
t
(−1)l (1 − exp(−lWik )) (1 − exp(−lWjk )) (1 − exp(−lWlk ))
l
l=1
by simple regrouping of the terms. By exchanging l and t, we get
PMITSa ,Sb ,Sc
X
t1 t
(1 − exp(−lWk ))Sa ⊗ (1 − exp(−lWk ))Sb ⊗ (1 − exp(−lWk ))Sc
ρ
=
(−1)
t l
l=1 t≥l
k∈[m]
l ! X
∞
X
1
ρ
(1 − exp(−lWk ))Sa ⊗ (1 − exp(−lWk ))Sb ⊗ (1 − exp(−lWk ))Sc
=
(−1)l+1
l 1−ρ
∞ X
X
l+1
l=1
k∈[m]
(A.2)
where the last equality holds by noting that
X 1 t 1 ρ l
ρt
=
t l
l 1−ρ
t≥l
The term corresponding to t = 1 is easily seen to be
ρ X
Fk,Sa ⊗ Fk,Sb ⊗ Fk,Sc
1−ρ
k∈[m]
therefore we to show the statement of the lemma, we only need bound the contribution of the terms
with l ≥ L.
20
Toward that, note that ∀l, kk1 − exp(−lWk )k ≤ n. Hence, we have by Lemma 5.6,
m
X
k=1
(1 − exp(−lWk ))Sa ⊗ (1 − exp(−lWk ))Sb ⊗ (1 − exp(−lWk ))Sc
{1,2},{3}
≤ (mn)3
Therefore, subadditivity of the {12}, {3} norm gives
l
ρ
∞
X
1−ρ X
(1 − exp(−lWk ))Sa ⊗ (1 − exp(−lWk ))Sb ⊗ (1 − exp(−lWk ))Sc
(−1)l+1
l
l=L
k∈[m]
∞
X
≤ (mn)
3
l=L
ρ
1−ρ
l
l
l
∞
(mn)3
ρ
(mn)3 X
=
≤
L
1−ρ
L
1−
l=L
ρ
1−ρ
L
ρ
1−ρ
{1,2},{3}
L
which gives us what we need.
A completely analogous proof gives a similar expression for the PMI matrix:
Proposition A.3. For any subsets Sa , Sb of [n], s.t. Sa ∩ Sb = ∅, the restriction of the PMI matrix
PMISa ,Sb satisfies, for any L ≥ 2,
PMISa ,Sb
L
X
X
ρ
⊤
+
(−1)l+1
Fk,Sa Fk,S
=
b
1−ρ
k∈[m]
l=2
1
l
ρ
1−ρ
where
kEL k{1,2},{3} ≤
B
(mn)2
L
1−
l ! X
(P̃l )k,Sa ((P̃l )k,Sb )⊤ + EL
(A.3)
k∈[m]
ρ
1−ρ
L
ρ
1−ρ
L
Spectral properties of the random model
The goal of this section is to prove that the random model specified in Section 1 satisfies the
incoherence property 3.2 on the weight matrix and the spectral boundedness property of the PMI
tensor. (Recall, the former is required for the whitening algorithm, and the later for the tensor
decomposition algorithm.)
Before delving into the proofs, we will need a few simple bounds on the singular values of Pl .
Lemma B.1. Let Sa ⊆ [n], s.t. |Sa | = Ω(n). With probability 1 − exp(− log2 n) over the choice of
W , and for all l = O(poly(n)),
σmin (Pl,Sa ) & np
and
σmax (Pl,Sa ) . mnp2
21
Proof. Let us proceed to the lower bound first.
If we denote by L the matrix which has as columns (P̃l )k,Sa , k ∈ [m], it’s clear that Pl,Sa = LL⊤ .
Since
σmin (LL⊤ ) = σmin (L⊤ L)
we will proceed to bound the smallest eigenvalue of L⊤ L.
Note that
X
L⊤ L =
(1 − exp(−lW k ))(1 − exp(−lW k ))⊤
k∈Sa
Since the matrices (1 − exp(−lW k ))(1 − exp(−lW k ))⊤ are independent, the bound will follow
from a matrix Bernstein bound. Denoting
i
h
Q = E (1 − exp(−lW k ))(1 − exp(−lW k ))⊤
by a simple calculation we have
h
i2
i
h
Q = p2 E 1 − exp(−lW̃ ) 11⊤ + pE (1 − exp(−lW̃ ))2 − p2 E [1 − exp(−lw̃)]2 Idm
(B.1)
where 1 is the all-ones vector of size m, and Idm is the identity of the same size. Furthermore, W̃
is a random variable following the distribution D of all the W̃i,j .
Note that (1.2) together with the assumption ν = Ω(1) gives
= Ω(p)
Pσmin (Q)
i
i ⊤ = |S | · Id , and
i
−1/2
Let Z = Q
(1 − exp(−lWi )). Then we have that E
a
m
i∈Sa Z (Z )
with high probability, kZ i k2 ≤ 1/σmin (Q) · kF i k2 . m and it’s a sub-exponential random variable.
Moreover,
#
"
2
X
X X
Z i (Z i )⊤ ≤ mn .
.m E
Z i (Z i )⊤
r2 =
E
i
i
Therefore, by Bernstein inequality we have that w.h.p,
X
i∈Sa
Z i (Z i )⊤ − nIdm .
It follows that
X
i∈Sa
p
r 2 log n + max kZ i k2 log n =
p
mn log n + m log n .
p
mn log n Idm nIdm .
Z i (Z i )⊤ n − O
which in turn implies that Pl,Sa nQ. But this immediately implies σmin (Pl,Sa ) & np with high
probability. Union bounding over all l, we get the first part of the lemma.
The upper bound will be proven by a Chernoff bound. Note that the matrices
(1 − exp(−lWk ))Sa (1 − exp(−lWk ))⊤
Sa , k ∈ [m]
2
are independent. Furthermore, k(1−exp(−lWk ))Sa (1−exp(−lWk ))⊤
Sa k ≤ pn with high probability,
2
⊤
and the variable k(1 − exp(−lWk ))Sa (1 − exp(−lWk ))Sa k is sub-exponential. Finally,
#
"m
X
2
((1 − exp(−lWk ))Sa (1 − exp(−lWk ))⊤
r2 = E
Sa )
k=1
≤
m
X
k=1
i
h
2
E ((1 − exp(−lWk )Sa )(1 − exp(−lWk ))⊤
)
Sa
h
i
2 2
≤ m k1 − exp(−lWk )Sa k2 E ((1 − exp(−lWk ))Sa (1 − exp(−lWk ))⊤
Sa ) ≤ mn p
22
Similarly as in the lower bound,
h
i2
i
h
E[Pl,Sa ] = p2 E 1 − exp(−lW̃ ) 11⊤ + pE (1 − exp(−lW̃ ))2 − p2 E [1 − exp(−lw̃)]2 Id|Sa |
where 1 is the all-ones vector of size |Sa |, and Id|Sa | is the identity of the same size. Again, W̃ is a
random variable following the distribution D of all the W̃i,j . This immediately gives
p
Pl E[Pl ] + r log nId|Sa | mnp2 + mn2 p2 log nId|Sa | O(mnp2 )Id|Sa |
A union bound over all values of l gives the statement of the Lemma.
B.1
Incoherence of matrix F
First, we proceed to show the incoherence property 3.2 on the weight matrix.
Lemma B.2. Suppose n is a multiple of 3. Let F = U ΣV be the singular value decomposition of
F . Let Sa , Sb , Sc be a uniformly random equipartition of the rows of [n]. Suppose F is µ-incoherent
with µ ≤ n/(m log n). Then, with high probability over the choice of and Sa , Sb , Sc , we have for
every i ∈ {a, b, c},
r
1
µm
Si ⊤ Si
U − Id .
log n .
U
3
n
Proof. Let S = Sa . Then, since U ⊤ U = Idm , we have
#
"
X
1
(U i )(U i )⊤ = · Idm .
E
3
i∈S
By the assumption on the row norms of U , kU i (U i )⊤ k2 = kU i k2 ≤ µ m
n . By the incoherence
assumption, we have that maxi kU i k2 ≤ µm/n.
We also note that U i ’s are negatively associated random variables. Therefore by the matrix
Chernoff inequality for negatively associated random variables, we have with high probability,
r
i
h
µm log n
S ⊤ S
S ⊤ S
.
(U ) U − E (U ) U
.
n
But, an analogous argument holds for Sb , Sc as well – so by a union bound over k, we complete
the proof.
Lemma B.3. Suppose n & m log n. Under the generative assumption in Section 1 for W , we have
that we have that F = 1 − exp(−W ) is O(1)-incoherent.
Proof. We have that F F ⊤ = U Σ2 U T and therefore, kF i k2 = Σ2i,i kU i k2 . This in turn implies that
kU i k2 ≤
1
1
Fi = 2
kF i k2 .
min Σ2ii
σmin (F )
√
2
Since F i ≤ pm+ pm ≤ 2pm with high probability, we only need to bound σmin (F ) from below.
2 (F ) = σ
⊤
⊤
Note that σmin
min (F F ). Therefore it suffices to control σmin (F F ). But by Lemma B.1
2
we have σmin (F ) & np.
Therefore, we have that
m
1
kF i k2 = O( )
kU i k2 ≤ 2
n
σmin (F )
23
B.2
Spectral boundedness
The main goal of the section is to show that the bias terms in the PMI tensor are spectrally
bounded by the PMI matrix (which we can estimate from samples). Furthermore, we show that
we can calculate an approximate whitening matrix for the leading terms of the PMI tensor using
the machinery in Section .
The main proposition we will show is the following:
Proposition
B.4.
Let W be sampled according to the random model in Section 1 with ρ =
log n
1
. Let Sa ⊆ [n], |Sa | = Ω(n). If RSa is the matrix that has as columns
o log n , p = ω √
mn
l 1/3
ρ
the vectors 1l 1−ρ
(P̃l )j,Sa , l ∈ [2, L], j ∈ [m] for L = O(poly(n)), and A is the matrix that
1/3
ρ
(P̃1 )j,Sa for j ∈ [m], with high probability it holds that RSa RS⊤a
has as columns the vectors 1−ρ
is O(ρ2/3 log n)-spectrally bounded by A.
The main element for the proposition is the following Lemma:
Lemma B.5. For any set Sa ⊆ [n], |Sa | = Ω(n), with high probability over the choice of W , for
⊤ is O(log n)-spectrally bounded by P ′
every ℓ, ℓ′ = O(poly(n)) Pl,Sa Pl,S
l ,Sa .
a
Before proving the Lemma, let us see how the proposition follows from it:
Proof of B.4. We have
RSa RS⊤a
=
L
X
l=2
1
l
ρ
1−ρ
l !2/3
Pl,Sa
By Lemma B.5, we have that ∀l > 1, P̃l,Sa is τ -spectrally bounded by P̃1,Sa , for some τ =
O(log n). Hence,
RSa RS⊤a
∞
X
l=2
1
l
ρ
1−ρ
l !2/3
τ (P1,Sa + σmin (P1,Sa ))
- ρ4/3 τ (P1,Sa + σmin (P1,Sa ))
ρ 2/3
) P1,Sa , the claim of the Proposition follows.
Since AA⊤ = ( 1−ρ
It is clear analogous statements hold for Sb and Sc .
Finally, we proceed to show Lemma B.5.
For notational convenience, we will denote by Jm×n the all ones matrix with dimension m × n.
(We will omit the dimensions when clear from the context.)
This statement will immediately follow from the following two lemmas:
Lemma B.6. For any set Sa ⊆ [n], |Sa | = Ω(n), with probability 1 − exp(− log2 n) over the choice
of W , for all ℓ ≤ O(poly(n)),
5
Pl,Sa 10np log nId + mp2 J
2
24
Lemma B.7. For any set Sa ⊆ [n], |Sa | = Ω(n), with probability 1 − exp(− log2 n) over the choice
of W , ∀ℓ = poly(n),
Pl,Sa + 6np log nId - mp2 J
Before showing these lemmas, let us see how Lemma B.5 is implied by them:
Proof of Lemma B.5. Let κ be the constant in B.7, s.t. Pl,Sa + 6np log nId - mp2 J. Putting the
bounds from Lemmas B.6 and B.7 together along with a union bound, we have that with high
probability, ∀l, l′ = O(poly(n))
15
5
Pl,Sa − κPl′ ,Sa 10np log n + κnp log n Id O(mp log n)Id
2
2
But, note that σmin (Pl′ ) = Ω(np), by Lemma B.1. Hence, Pl − 52 κPl′ ,Sa r log nσmin (Pl′ ), for
some sufficiently large constant r. This implies
5
Pl − r log nPl′ ,Sa Pl − κPl′ r log nσmin (Pl′ ,Sa )
2
from which the statement of the lemma follows.
We proceed to the first lemma:
Proof of Lemma B.6. To make the notation less cluttered, we will drop l and Sa and use P = Pl,Sa .
Furthermore, we will drop Sa when referring to columns of P̃ so we will denote P̃k = P̃k,Sa .
Let’s denote by e = √ 1 1 . Let’s furthermore denote Id1 = ee⊤ , and Id−1 = Id − ee⊤ . Note
|Sa |
first that trivially, since Id1 + Id−1 = Id,
P = (Id1 + Id−1 )P (Id1 + Id−1 )
(B.2)
Furthermore, it also holds that
1
1
0 (2Id−1 − Id1 )P (2Id−1 − Id1 )
2
2
1
= Id1 P Id1 + 4Id−1 P Id−1 − Id−1 P Id1 − Id1 P Id−1
4
where the first inequality holds since
1
1
(2Id−1 − Id1 )P (2Id−1 − Id1 ) =
2
2
1
(2Id−1 − Id1 )P̃
2
1
(2Id−1 − Id1 )P̃
2
⊤
From this we get that
Id−1 P Id1 + Id1 P Id−1
1
Id1 P Id1 + 4Id−1 P Id−1
4
(B.3)
We proceed to upper bound both the terms on the RHS above. More precisely, we will show
that
Id1 P Id1 ≤ 2mp2 nJ
(B.4)
Id−1 P Id−1 2np log nId
25
(B.5)
Let us proceed to showing (B.4). The LHS can be rewritten as
Id1 P Id1 = ee⊤ e⊤ P̃ P̃ ⊤ e
Note that
m
X
1
e⊤ P̃ P̃ ⊤ e =
n
k=1
h1, P̃k i2
!
All the terms h1, P̃k i2 are independent and satisfy and E[h1, P̃k i2 ] ≤ (E[h1, P̃k i])2 ≤ p2 n2 . By
Chernoff, we have that
m
X
p
h1, P̃k i2 ≤ mp2 n2 + mp2 n2 log n ≤ 2mp2 n2
k=1
log n
).
with probability at least 1 − exp(− log2 n), where the second inequality holds because p = ω( √
mn
Hence, e⊤ P̃ P̃ ⊤ e ≤ 2mp2 n with high probability.
We proceed to (B.5), which will be shown by a Bernstein bound. Towards that, note that
E[(Id−1 P̃k (Id−1 P̃k )⊤ ] = Id−1 E[P̃k (P̃k )⊤ ]Id−1
= Id−1 p2 E[1 − exp(W̃ )]2 11⊤ + (p − p2 )E[(1 − exp(W̃ ))2 ]Id Id−1
pId
where W̃ is a random variable following the distribution D of all the W̃i,j . The second line can be
seen to follow from the independence of the coordinates of P̃k according to our model.
Furthermore, with high probability kId−1 P̃k k22 ≤ kP̃k k22 ≤ np and the random variable
kId−1 P̃k k2 is sub-exponential Finally,
#
"m
#
"m
2
X
X
2
(Id−1 P̃k )(Id−1 Γk )P̃
≤ P̃k
r2 = E
(I−1 P̃k )(Id−1 P̃k )⊤
E
2
k=1
k=1
≤ npmkE[(Id−1 P̃k )(Id−1 P̃k )⊤ ]k ≤ np2 m
Therefore, applying a matrix Bernstein bound, we get
Id−1 P Id−1 mpId + np log nId + r log nId 2np log nId
with high probability.
Combining this with (B.2) and (B.3), we get
5
P Id1 P Id1 + 5Id−1 P Id−1
4
5
mp2 J + 10np log nId
2
Let us proceed to the second inequality, which essentially follows the same strategy:
26
Proof of Lemma B.7. Similarly as in the proof of Lemma B.6, for notational convenience, let’s
denote by P̃ the matrix which has column k the vector (1 − exp(lWk )).
Reusing the notation from Lemma B.7, we have that
P = (Id1 + Id−1 )P (Id1 + Id−1 )
(B.6)
and
1
1
0 ( Id1 + 2Id−1 )P ( Id1 + 2Id−1 )
2
2
1
′
= Id−1 P Id1 + Id1 P Id−1 + Id1 P Id1 + 4Id−1 P Id−1
4
for similar reasons as before. From this we get that
1
Id−1 P Id1 + Id1 P Id−1 − Id1 P Id1 − 4Id−1 P Id−1
4
(B.7)
Putting (B.6) and (B.7) together, we get that
3
P + 3Id−1 P Id−1 Id1 P Id1
4
(B.8)
We will proceed to show an upper bound Id−1 P Id−1 2np log nId on second term of the LHS.
We will do this by a Bernstein bound as before. Namely, analogously as in Lemma B.7,
Id−1 P Id−1 =
m
X
k=1
(Id−1 P̃k )(Id−1 P̃k )⊤
and E[(Id−1 P̃k )(Id−1 P̃k )⊤ ] pId and and kId−1 P̃k k22 ≤ kP̃k k22 ≤ np are satisfied so
"m
#
2
X
(Id−1 P̃k )(Id−1 P̃k )⊤
≤ np2 m
r2 = E
k=1
Therefore, applying a matrix Bernstein bound, we get
Id−1 P Id−1 mpId + np log nId + r 2np log nId
with high probability.
Plugging this in in (B.8), we get
3
3
3
Id1 P Id1 = ee⊤ P̃ P̃ ⊤ ee⊤ = ee⊤ e⊤ P̃ P̃ ⊤ e
4
4
4
P
m
2
with the goal of applying Chernoff, we will lower
Since we have e⊤ P̃ P̃ ⊤ e = n1
k=1 hP̃k , 1i
P + 6np log nId
bound E[h1, Ak i2 ]. More precisely, we will show E[h1, P̃k i]2 = Ω(n2 p2 ). In order to do this, we have
X
X
E[(P̃k )2j ] +
E[h1, P̃k i2 ] =
E[(P̃k )j ]E[(P̃k )j ′ ]
j6=j ′ ;j,j ′∈Sa
j∈Sa
=
X
j∈Sa
≥
X
j∈Sa
˜ )2 ] +
pE[(1 − exp(−lW
pE[(1 − exp(−W̃ )2 ] +
2 2
= Ω(n p )
27
X
j6=j ′ ;j,j ′∈Sa
X
j6=j ′ ;j,j ′∈Sa
˜ )]2
p2 E[1 − exp(−lW
p2 E[1 − exp(−W̃ )]2
where W̃ is a random variable following the distribution D of all the W̃i,j . and the last inequality
holds because of (1.2).
p
So by Chernoff, we get that e⊤ P̃ P̃ ⊤ e = n1 (Ω(mn2 p2 ) − n2 p2 m) = Ω(mnp2 ) with high probability. Altogether, this means
P + 6np log nId % mp2 J
C
Robust whitening
Algorithm 4 Obtaining whitening matrices
d
Inputs: Random partitioning Sa , Sb , Sc of [n]. Empirical PMI matrix PMI.
d×d
Outputs: Whitening matrices Qa , Qb , Qc ∈ R
1. Output
+
d Sc ,Sa ,
d Sa ,S (PMI
d S ,S )⊤ PMI
Qa = ρ−1/3 PMI
b
b c
d S ,Sc (PMI
d + )⊤ PMI
d Sa ,S ,
Qb = ρ−1/3 PMI
Sc ,Sa
b
b
⊤ d
d Sc ,Sa (PMI
d+
Qc = ρ−1/3 PMI
Sa ,Sb ) PMISb ,Sc
⊤ d
d Sa ,S (PMI
d+
In this section, we show the formula Qa = ρ−1/3 PMI
Sb ,Sc ) PMISc ,Sa computes an
b
⊤
approximation of the true whitening matrix AA , so that the error is ε-spectrally bounded by A.
We recall Theorem 2.10.
Theorem 2.10. Let n ≥ m and A, B, C ∈ Rn×m . Suppose Σab , Σbc , Σca ∈ Rn×n are of the form,
Σab = AB ⊤ + Eab , Σbc = BC ⊤ + Ebc , and Σca = CA⊤ + Eca .
where Eab , Ebc , Eca are ε-spectrally bounded by (A, B), (B, C), (C, A) respectively. Then, the matrix
matrix
+
Qa = Σab [Σ⊤
bc ]m Σca
⊤
+
is a good approximation of AA⊤ in the sense that Qa = Σab [Σ⊤
bc ]m Σca − AA is O(ε)-spectrally
bounded by A. Here [Σ]m denotes the best rank-m approximation of Σ.
Towards proving Theorem 2.10, an intermediate step is to understand the how the space of
singular vectors of BC ⊤ are aligned with the noisy version Σbc . The following explicitly represent
BC ⊤ + E as the form B ′ R(C ′ )⊤ + ∆′ . Here the crucial benefit to do so is that the resulting ∆′ is
small in every direction. In other words, we started with a relative error guarantees on E and the
Lemma below converts to it an absolute error guarantees on ∆′ (though the signal term changes
slightly).
Lemma C.1. Suppose B, C are n × m matrices with n ≥ m. Suppose a matrix E is ε-spectrally
bounded by (B, C), then BC ⊤ + E can be written as
BC ⊤ + E = (B + ∆B )RBC (C + ∆C )⊤ + ∆′BC ,
28
where ∆B , ∆C , ∆′BC are small and RBC is close to identity in the sense that,
k∆B k ≤ O(εσmin (B))
k∆C k ≤ O(εσmin (C))
k∆′BC k ≤ O(εσmin (B)σmin (C))
kRBC − Idk ≤ O(ε)
Proof. The key intuition is if the perturbation is happening in the span of columns of B and C,
they cannot change the subspace. By Definition 2.9, we can write E as
⊤
E = B∆1 C ⊤ + B∆⊤
2 + ∆3 C + ∆4 .
Now since k∆1 k ≤ ε < 1, we know (Id − ∆1 ) is invertible, so we can write
(BC ⊤ + E) = (B + ∆3 (Id + ∆1 )−1 )(Id + ∆1 )(C + ∆2 (Id − ∆1 )−⊤ )⊤ − ∆3 (Id − ∆1 )−1 ∆⊤
2 + ∆4 .
This is already in the desired form as we can let ∆B = ∆3 (Id + ∆1 )−1 , RBC = (Id + ∆1 ),
∆C = ∆2 (Id − ∆1 )−⊤ , and ∆′BC = −∆3 (Id − ∆1 )−1 ∆⊤
2 + ∆4 . By Weyl’s Theorem we know
−1
ε
σmin (B). Other terms can be
σmin (Id + ∆1 ) ≥ 1 − ε, therefore k∆B k ≤ k∆3 kσmin
(Id + ∆) ≤ 1−ε
bounded similarly.
Now we prove that the top m approximation of BC ⊤ + E has similar column/row spaces as
BC ⊤ . Let UB be the column span of B, UB′ be the column span of (B + ∆B ), and UB′′ be the top m
left singular subspace of (BC ⊤ + E). Similarly we can define UC , UC′ , UC′′ to be the column spans
of C, C + ∆C and the top m right singular subspace of (BC ⊤ + E).
For B + ∆B , we can apply Weyl’s Theorem and Wedin’s Theorem. By Weyl’s Theorem we
know σmin (B + ∆B ) ≥ σmin (B) − k∆B k ≥ (1 − O(ε))σmin (B). By Wedin’s Theorem we know UB′
is O(ε)-close to UB . Similar results apply to C + ∆C .
Now we know σmin ((B + ∆B )RBC (C + ∆C )⊤ )) ≥ σmin (B + ∆B )σmin (RBC )σmin (C + ∆C ) ≥
Ω(σmin (B)σmin (C). Therefore we can again apply Wedin’s Theorem, considering (B+∆B )RBC (C+
∆C )⊤ ) as the original matrix and ∆′BC as the perturbation. As a result, we know UB′′ is O(ε) close
to UB′ , UC′′ is O(ε) close to UB′ . The distance between UB , UB′′ (and UC , UC′′ ) then follows from
triangle inequality.
As a direct corollary of Lemma C.1, we obtain that the BC ⊤ and BC ⊤ + E have similar
subspaces of singular vectors.
Corollary C.2. In the setting of Lemma C.1, let [BC ⊤ + E]m be the best rank-m approximation
of BC ⊤ + E. Then, the span of columns of [BC ⊤ + E]m is O(ε)-close to the span of columns of
B, span of rows of [BC ⊤ + E]m is O(ε)-close to the span of columns of C.
Furthermore, we can write [BC ⊤ + E]m = (B + ∆B )RBC (C + ∆C )⊤ + ∆BC . Here ∆B , ∆C and
RBC as defined in Lemma C.1 and ∆BC satisfies k∆BC k ≤ O(εσmin (B)σmin (C)).
Proof. Since [BC ⊤ + E]m is the best rank-m approximation, because (B + ∆B )RBC (C + ∆C )⊤ ) is
a rank m matrix, in particular we have
kBC ⊤ + E − [BC ⊤ + E]m k ≤ kBC ⊤ − (B + ∆B )RBC (C + ∆C )⊤ )kk∆′BC k.
29
Therefore
k∆BC k = k[BC ⊤ + E]m − (B + ∆B )RBC (C + ∆C )⊤ )k
≤ kBC ⊤ + E − [BC ⊤ + E]m k + kBC ⊤ + E − (B + ∆B )RBC (C + ∆C )⊤ )k
≤ 2k∆′BC k.
+
In order to fix this problem, we notice that the matrix [Σ⊤
bc ]m is multiplied by Σab on the left
⊤
⊤
+
and Σca on the right. Assuming Σab = AB , Σca = CA , we should expect [Σ⊤
bc ]m to “cancel” with
the B ⊤ factor on the left and the C factor on the right, giving us AA⊤ . Therefore, we should really
⊤
+
measure the error of the middle term [Σ⊤
bc ]m after left multiplying with B and right multiplying
with C. We formalize this in the following lemma:
+
⊤ +
Lemma C.3. Suppose Σbc is as defined in Theorem 2.10, let ∆ = [Σ⊤
bc ]m − [CB ] , then we have
kB ⊤ ∆Ck = O(ε),
k∆Ck ≤ O(
ε
),
σmin (B)
ε
),
σmin (C)
ε
k∆k ≤ O(
).
σmin (B)σmin (C)
kB ⊤ ∆k ≤ O(
We will first prove Theorem 2.10 assuming Lemma C.3.
Proof of Theorem 2.10. By Lemma C.1, we know Σab can be written as
(A + ∆1A )RAB (B + ∆1B )⊤ + ∆AB .
Similarly Σca can be written as
(C + ∆3C )RCA (A + ∆3A )⊤ + ∆CA .
Here the ∆ terms and R terms are bounded as in Lemma C.1.
+
Now let us write the matrix Σab [Σ⊤
bc ]m Σca as
(A + ∆1A )RAB (B + ∆1B )⊤ + ∆AB ([CB ⊤ ]+ + ∆BC ) (C + ∆3C )RCA (A + ∆3A )⊤ + ∆CA
+
We can now view Σab [Σ⊤
bc ]m Σca as the product of three terms, each term is the sum of two
matrices. Therefore we can expand the product into 8 terms. In each of the three pairs, we will
call the first matrix the main matrix, and the second matrix the perturbation.
In the remaining proof, we will do calculations to show the product of the main terms is close
to AA⊤ , and all the other 7 terms are small.
Before doing that, we first prove several Claims about PSD matrices
Claim C.4. If k∆k ≤ ε, then A∆A⊤ εAA⊤ . If kΓk ≤ εσmin (A), then
2 (A)Id .
εAA⊤ + εσmin
1
⊤
2 (AΓ
+ ΓA⊤ )
Proof. Both inequalities can be proved by consider the quadratic form. We know for any x,
x⊤ A∆A⊤ x ≤ k∆kkA⊤ xk2 ≤ εx⊤ AA⊤ x, so the first part is true.
For the second part, for any x we can apply Cauchy-Schwartz inequality
√
1
2
x⊤ (AΓ⊤ + ΓA⊤ )x = h εA⊤ x, ε−1/2 Γ⊤ xi ≤ εkA⊤ xk2 + ε−1 kΓ⊤ xk2 = x⊤ (εAA⊤ + εσmin
(A)Id)x.
2
30
Now, we will first prove the product of three main matrices is close to AA⊤ :
Claim C.5. We have (A + ∆1A )RAB (B + ∆1B )⊤ (CB ⊤ )+ (C + ∆3C )RCA (A + ∆3A )⊤ = AA⊤ +
EA , where EA is O(ε)-spectrally bounded by AA⊤ .
Proof. We will first prove the middle part of the matrix (B +∆1B )⊤ (CB ⊤ )+ (C +∆3C ) is O(ε) close to
identity matrix Id. Here we observe that both B, C have full column rank so (CB ⊤ )+ = (B ⊤ )+ C + .
Therefore we can rewrite the product as (Id + B + ∆1B )⊤ (Id + C + ∆3C ). Since k∆1B k ≤ O(εσmin (B))
by Lemma C.1 (and similarly for C), we know kB + ∆1B k ≤ O(ε). Therefore the middle part is O(ε)
bAB = RAB (B + ∆1 )⊤ (CB ⊤ )+ (C + ∆3 )RCA is O(ε)-close
close to Id. Now since ε ≪ 1 we know R
B
C
to Id.
bAB (A + ∆3 )⊤ , for this matrix we know
Now we are left with (A + ∆1A )R
A
bAB (A + ∆3A )⊤ − AA⊤ = A(R
bAB − Id)A⊤ + ∆1A R
bAB A⊤ + AR
bAB (∆3A )⊤ + ∆1A R
bAB (∆3A )⊤ .
(A + ∆1A )R
3 ⊤
bAB − Id)A⊤ O(ε)AA⊤ (Claim C.4); the fourth term ∆1 R
b
The first term A(R
A AB (∆A )
2 (A))Id (by the norm bounds of ∆1 and ∆3 . For the cross terms, we can bound them
O(εσmin
A
A
using the second part of Claim C.4.
Next we will try to prove the remaining 7 terms are small. We partition them into three types
depending on how many ∆ factors they have. We proceed to bound them in each of these cases.
For the terms with only one ∆, we claim:
Claim C.6. The three terms ∆AB (CB ⊤ )+ (C + ∆3C )RCA (A + ∆3A )⊤ , (A + ∆1A )RAB (B +
∆1B )⊤ ∆AB (C + ∆3C )RCA (A + ∆3A )⊤ , (A + ∆1A )RAB (B + ∆1B )⊤ (CB ⊤ )+ ∆CA are all O(ε) spectrally bounded by AA⊤ .
Proof. For the first term, note that both B, C have full column rank, and hence (CB ⊤ )+ =
(B ⊤ )+ C + . Therefore the first term can be rewritten as
[∆AB (B ⊤ )+ ][(Id + C + ∆3C )RCA ](A + ∆3A )⊤ .
By Lemma C.1, we have spectral norm bounds for ∆AB , ∆3C , ∆3A , RCA . Therefore we know
k∆AB (B ⊤ )+ k ≤ O(εσmin (A)) and [(Id + C + ∆3C )RCA ] is O(ε) close to Id.
Therefore
2 (A)) is trivially O(ε) spectrally bounded, and
k[∆AB (B ⊤ )+ ][(Id + C + ∆3C )RCA ](∆3A )⊤ k ≤ O(εσmin
[∆AB (B ⊤ )+ ][(Id + C + ∆3C )RCA ]A⊤ is O(ε) spectrally bounded by Claim C.4. The third term is
exactly symmetric.
b BC = (B+∆1 )⊤ ∆BC (C +
For the second part, we will first prove the middle part of the matrix ∆
B
∆3C ) has spectral norm O(ε). This can be done y expanding it to the sum of 4 terms, and use
appropriate spectral norm bounds on ∆BC and its products with B ⊤ and C from Lemma C.3.
b BC RCA (A + ∆3 )⊤ is O(ε) spectrally bounded by the first part
Now we can show (A + ∆1A )RAB ∆
A
of Claim C.4.
Next we try to bound the terms with two ∆ factors.
Claim C.7. The three terms
∆AB ∆BC (C + ∆3C )RCA (A + ∆3A )⊤ , ∆AB (CB ⊤ )+ ∆CA ,
(A + ∆1A )RAB (B + ∆1B )⊤ ∆BC ∆CA are all O(ε2 ) spectrally bounded by AA⊤ .
Proof. For the first term, notice that k∆BC (C + ∆3C )k is bounded by O(ε/σmin (B)) by
Lemma C.3, and k∆AB k = O(εσmin (A)σmin (B)). Therefore we know k∆AB ∆BC (C + ∆3C )RCA k ≤
O(ε2 σmin (A)), so by Claim C.4 we know this term is O(ε2 ) spectrally bounded by AA⊤ . Third
term is symmetric.
31
2 (A)),
For the second term, by Lemma C.1 we can directly bound its spectral norm by O(ε2 σmin
so it is trivially O(ε2 ) spectrally bounded by AA⊤ .
Finally, for the product ∆AB ∆BC ∆CA , we can get the spectral norm for the three factors by
2 (A)) which is trivially O(ε3 )
Lemma C.1 and Lemma C.3. As a result k∆AB ∆BC ∆CA k ≤ O(ε3 σmin
⊤
spectrally bounded by AA .
Combining the bound for all of the terms we get the theorem.
With that, we now try to prove Lemma C.3
We first prove a simpler version where the perturbation is simply bounded in spectral norm
Lemma C.8. Suppose B, C are n × m matrices and n ≥ m. Let R be an n × n matrix such that
kR − Idk ≤ ε, and E is a perturbation matrix with kEk ≤ εσmin (B)σmin (C) and (CRB ⊤ + E) is
also of rank m.
Now let ∆ = (CRB ⊤ + E)+ − (CRB ⊤ )+ , then when ε ≪ 1 we have
kB ⊤ ∆Ck = O(ε),
k∆Ck ≤ O(
ε
),
σmin (B)
ε
),
σmin (C)
ε
k∆k ≤ O(
).
σmin (B)σmin (C)
kB ⊤ ∆k ≤ O(
Proof. We first give the proof for kB ⊤ ∆Ck. Other terms are similar.
Let UB be the column span of B, and UB′ be the row span of (CRB ⊤ + E). Similarly let UC
be the column span of C and UC′ be the column span of (CRB ⊤ + E). By Wedin’s theorem, we
know UB′ is O(ε) close to UB and UC′ is O(ε) close to UC . As a result, suppose the SVD of B is
UB DB VB⊤ , we know
σmin (B ⊤ UB′ ) = σmin (VB DB UB⊤ UB′ ) ≥ (1 − O(ε))σmin (B).
The same is true for C: σmin (C ⊤ UC′ ) ≥ (1 − O(ε))σmin (C).
By the property of pseudoinverse, the column span of (CRB ⊤ + E)+ is UB′ , and the row span
of (CRB ⊤ + E)+ is UC′ , further, (CRB ⊤ + E)+ = UB′ [(UC′ )⊤ (CRB ⊤ + E)UB′ ]−1 UC′ , therefore we
can write
B ⊤ (CRB ⊤ + E)+ C = B ⊤ UB′ [(UC′ )⊤ (CRB ⊤ + E)UB′ ]−1 (UC′ )⊤ C.
Note that now the three matrices are all n×n and invertible! We can write B ⊤ UB′ = ((B ⊤ UB′ )−1 )−1
(and do the same thing for (UC′ )⊤ C. Using the fact that P −1 Q−1 = (QP )−1 , we have
B ⊤ (CRB ⊤ + E)+ C = (((UC′ )⊤ C)−1 (UC′ )⊤ (CRB ⊤ + E)UB′ (B ⊤ UB′ )−1 )−1
= (R + ((UC′ )⊤ C)−1 (UC′ )⊤ EUB′ (B ⊤ UB′ )−1 )−1 =: (R + X)−1 .
Here we defined X = ((UC′ )⊤ C)−1 (UC′ )⊤ EUB′ (B ⊤ UB′ )−1 . The spectral norm of X can be
bounded by
kXk ≤ k((UC′ )⊤ C)−1 kkEkk(B ⊤ UB′ )−1 k
−1
−1
′
= kEkσmin
(B ⊤ UB′ )σmin
(C ⊤ CB
)
≤ O(ε).
We can write B ⊤ ∆C = B ⊤ (CRB ⊤ + E)+ C − Id = (Id + (R − Id + X))−1 − Id, and we now know
k(R − Id + X)k ≤ O(ε), as a result kB ⊤ ∆Ck ≤ O(ε) as desired.
32
For the term kB ⊤ ∆k, by the same argument we have
B ⊤ (CRB ⊤ + E)+ = ((UC′ )⊤ (CRB ⊤ + E)UB′ (B ⊤ UB′ )−1 )−1 (UC′ )⊤
= ((UC′ )⊤ CR + (UC′ )⊤ EUB′ (B ⊤ UB′ )−1 )−1 (UC′ )⊤
= ((UC′ )⊤ C(R + X))−1 (UC′ )⊤
= (R + X)−1 ((UC′ )⊤ C)−1 (UC′ )⊤ .
On the other hand, we know B ⊤ (CRB ⊤ )+ = R−1 C + = R−1 ((UC )⊤ C)−1 UC⊤ . We can match
the three factors:
kR−1 − (R + X)−1 k ≤ O(ε),
k((UC )⊤ C)−1 − ((UC′ )⊤ C)−1 k ≤ O(ε/σmin (C)),
kUC − UC′ k ≤ O(ε),
kR−1 k ≤ 1 + O(ε)
k((UC )⊤ C)−1 k = O(1/σmin (C))
kUC k = 1.
Here, first and third bound are proven before. The second bound comes if we consider the SVD of
C = UC DC VC⊤ and notice that k(UC′ )⊤ UC − Idk ≤ O(ε). We can write ∆1 = R−1 − (R + X)−1 ,
∆2 = ((UC )⊤ C)−1 − ((UC′ )⊤ C)−1 , ∆3 = UC − UC′ , then we have
B ⊤ ∆ = B ⊤ (CRB ⊤ + E)+ − B ⊤ (CRB ⊤ )+
= (R−1 − ∆1 )(((UC )⊤ C)−1 − ∆2 )(UC − ∆3 )⊤ − R−1 ((UC )⊤ C)−1 UC⊤ .
Expanding the last equation, we get 7 terms and all of them can be bounded by O(ε/σmin (C)).
The bounds on k∆Ck and k∆k can be proved using similar techniques.
Finally we are ready to prove the main Lemma C.3:
⊤ , we can write the matrix before pseudoinverse
Proof of Lemma C.3. Using Lemma C.1, let E = Ebc
as
[CB ⊤ + E]m = (C + ∆C )RBC (B + ∆B )⊤ + ∆BC .
We can then apply Lemma C.8 on (C + ∆C )RBC (B + ∆B )⊤ + ∆BC . As a result, we know if we
⊤ +
let ∆′ = [CB ⊤ + E]+
m − ((C + ∆C )RBC (B + ∆B ) ) , we have the desired bound if we left multiply
⊤
with (B + ∆B ) or right multiply with (C + ∆C ).
We will now show how to prove the first bound, all the other bounds can be proved using the
same strategy:
First, we can write
′
⊤ ′
B ⊤ ∆′ C = −(B + ∆B )⊤ ∆′ (C + ∆C ) + (B + ∆B )⊤ ∆′ C + ∆⊤
B ∆ (C + ∆C ) − ∆B ∆ ∆C .
All the four terms on the RHS can be bounded by Lemma C.8 so we know kB ⊤ ∆′ Ck ≤ O(ε).
On the other hand, let ∆′′ = ((C + ∆C )RBC (B + ∆B )⊤ )+ − (C ⊤ B)+ = ∆ − ∆′ . We will prove
kB ⊤ ∆′′ Ck ≤ O(ε) and then the bound on kB ⊤ ∆Ck follows from triangle inequality.
For B ⊤ ∆′′ C, we know it is equal to
−1
(C + ∆C )+ C − Id
B ⊤ [(B + ∆B )⊤ ]+ RAB
−1
(C + ∆C )+ C − Idk ≤ O(ε)
Claim C.9. kB ⊤ [(B + ∆B )⊤ ]+ RAB
33
−1
this follows
Proof. We will show all three factors in the first term are O(ε) close to Id. For RAB
+
immediately from Lemma C.1. For (C + ∆C ) C, we know
(C + ∆C )+ C − Id = −(C + ∆C )+ ∆C .
−1
Therefore its spectral norm bound is bounded by k∆C kσmin
(C + ∆C ) = O(ε) (where the bound
on k∆C k comes from Lemma C.1).
With the claim we have now proven kB ⊤ ∆′′ Ck ≤ O(ε), therefore
kB ⊤ ∆Ck ≤ kB ⊤ (∆′ + ∆′′ )Ck ≤ kB ⊤ ∆′ Ck + kB ⊤ ∆′′ Ck ≤ O(ε).
C.1
Spectrally Boundedness and Incoherence
Here we will show under mild incoherence conditions (defined below), if an error matrix E is
ε-spectrally bounded by F F ⊤ , then the partial matrices satisfy the requirement of Theorem 2.10.
q
Theorem C.10. If F is µ-incoherent for µ ≤ n/m log2 n, then when n ≥ Ω(m log2 m), with high
probability over the random partition of F into A, B, C, we know σmin (A) ≥ σmin (F )/3 (same is
true for B, C).
As a corollary, if E is ε-spectrally bounded by F . Let a, b, c be the subsets corresponding to
A, B, C, and let Ea,b be the submatrix of E whose rows are in set a and columns are in set b. Then
Ea,b (also Eb,c , Ec,a ) is O(ε)-spectrally bounded by the corresponding asymmetric matrices AB ⊤
(BC ⊤ , CA⊤ ).
Proof. Consider the singular value decomposition of F : F = U DV ⊤ . Here U is a n × m matrix
whose columns are orthonormal, V is an m × m orthonormal matrix and D is a diagonal matrix
whose smallest diagonal entry is σmin (F ).
Consider the following way of partitioning the matrix: for each row of F , we put it into A, B
or C with probability 1/3 independently.
Now, let Xi = 1 if row i is in the matrix A, and 0 otherwise. Then Xi ’s are Bernoulli random
variables with probability 1/2. Suppose S is the set of rows in A, let UA be U restricted to rows in
A, then we have A = UA DV ⊤ . We will show with high probability
σmin (A) ≥ 1/3.
P
The key observation here is the expectation of UA⊤ UA = ni=1 Xi Ui Ui⊤ , where Ui is the i-th row
of U (represented as a column vector). Since Xi ’s are Bernoulli random variables, we know
n
n
X
1
1X
Ui Ui⊤ = Id.
Xi Ui Ui⊤ ] =
E[UA⊤ UA ] = E[
3
3
i=1
i=1
Therefore we can hope to use matrix concentration to prove that UA⊤ UA is close to its expectation.
Let Mi = Xi Ui Ui⊤ − 1/3Ui Ui⊤ . Clearly E[Mi ] = 0. By the Incoherence assumption, we know
kUi k ≤ 1/ log n. Therefore we know kMi k ≤ O(1/ log n). Also, we can bound the variance
n
n
n
X
X
X
⊤
⊤
2
⊤
Ui Ui⊤ k ≤ O(1/ log 2 n).
Xi Ui Ui Ui Ui ]k ≤ max kUi k k
Mi Mi ]k ≤ kE[
kE[
i=1
i=1
i=1
Here the last inequality is because
Pn
⊤
⊤
i=1 Xi Ui Ui Ui Ui
34
kUi k2 Ui Ui⊤ .
Therefore by Matrix Bernstein’s inequality we know with high probability k
When this happens we know
kUA⊤ UA k
≥
σmin (E[UA⊤ UA ])
−k
n
X
i=1
Pn
i=1 Mi k
≤ 1/6.
Mi k ≥ 1/6.
p
Hence we have σmin (UA ) ≥ 1/6 > 1/3, and σmin (A) ≥ σmin (UA )σmin (D) ≥ σmin (F )/3. Note
that matrices B, C have exactly the same distribution as A so the bounds for B,C follows from
union bound.
For the corollary, if a matrix E is ε spectrally bounded, we can write it as F ∆1 F ⊤ + F ∆⊤
2 +
2 (F ). This can be done by
∆2 F ⊤ + ∆4 , where k∆1 k ≤ ε, k∆2 k ≤ εσmin (F ) and k∆4 k ≤ εσmin
considering different projections of E: let U be the span of columns of F , then F ∆1 F ⊤ term
⊤
corresponds to ProjU E ProjU ; F ∆⊤
2 term corresponds to ProjU E ProjU ⊥ ; ∆2 F term corresponds
to ProjU ⊥ E ProjU ; ∆4 term corresponds to ProjU ⊥ E ProjU ⊥ . The spectral bounds are necessary
for E to be spectrally bounded.
⊤
Now for Ea,b , we can write it as A∆1 B ⊤ + A(∆2 )⊤
b + (∆2 )a B + (∆4 )a,b , where we also take
the corresponding submatrices of ∆’s. Since the spectral norm of a submatrix can only be smaller,
we know k∆1 k ≤ ε, k(∆2 )b k ≤ εσmin (F ) ≤ 3εσmin (B), k(∆2 )a k ≤ εσmin (F ) ≤ 3εσmin (A) and
2 (F ) ≤ 9εσ
k(∆2 )a,b k ≤ εσmin
min (A)σmin (B). Therefore by Definition 2.9 we know Ea,b is 9ε
⊤
spectrally bounded by AB .
D
Proof of Theorem 3.1 and Theorem 3.3
In this section, we provide the full proof of Theorem 3.1. We start with a simple technical Lemma.
Lemma D.1. If Q is an ε-approximate whitening matrix for A, then kQk ≤
1
⊤
1−ε kAA k
1
⊤
1−ε kAA k,
σmin (Q) ≥
Proof. By the definition of approximate-whitening, we have
1 − ε ≤ σmin ((Q+ )1/2 A⊤ A(Q+ )1/2 ), σmax ((Q+ )1/2 A⊤ A(Q+ )1/2 ) ≤ 1 + ε
which implies that
1 − ε ≤ σmin ((Q+ )1/2 AA⊤ (Q+ )1/2 ), σmax ((Q+ )1/2 AA⊤ (Q+ )1/2 ) ≤ 1 + ε
by virtue of the fact that (Q+ )1/2 AA⊤ (Q+ )1/2 =
semidefinite-order notation, we get that
(Q+ )1/2 A⊤ A(Q+ )1/2
⊤
.
Rewriting in
(1 − ε)Id (Q+ )1/2 AA⊤ (Q+ )1/2 (1 + ε)Id
Multiplying on the left and right by Q1/2 , we get
(1 − ε)Q AA⊤ (1 + ε)Q
This directly implies
1
⊤
1+ε AA
Q
1
⊤
1−ε AA
which is equivalent to the statement of the lemma.
Towards proving Theorem 3.1, we will first prove the following proposition, which shows that
we recover the exp(−W ) matrix correctly:
35
Proposition D.2 (Recovery of exp(−W )). Under the random generative model defined in Section 1, if the number of samples satisfies
N = poly(n, 1/p/, 1/ρ)
√
the vectors W̃i , i ∈ [m] in Algorithm 1 are O(η np)-close to exp(−Wi ) where
√
η = Õ ( mpρ)
Proof. The proof will consist of checking the conditions for Algorithms 4 and 3 to work, so that we
can apply Theorems 5.4 and 2.10.
To get a handle on the PMI tensor, by Proposition A.2, for any equipartition Sa , Sb , Sc of [n],
we can it as
PMITSa ,Sb ,Sc =
L
X
ρ X
(−1)l+1
Fk,Sa ⊗ Fk,Sb ⊗ Fk,Sc +
1−ρ
k∈[m]
l=2
1
l
ρ
1−ρ
l ! X
(P̃l )k,Sa ⊗ (P̃l )k,Sb ⊗ (P̃l )k,Sc + EL
k∈[m]
1 1
We can choose L = poly(log(n, , )) to ensure
ρ p
√
kEL k = o p5/2 ρ7/3 mn2
(D.1)
Having an explicit form for the tensor, we proceed to check the spectral boundedness condition
for Algorithm 4.
Let Sa , Sb , Sc be a random equipartition. Let RSa be the matrix that has as columns the vectors
l !1/3
ρ
1
(P̃l )j,Sa , for all l ∈ [2, L], j ∈ [m] and let A be the matrix that has as columns the
l 1−ρ
1/3
ρ
Fj,Sa , for all j ∈ [m]. Since L is polynomially bounded in n, by Proposition B.4
vectors 1−ρ
we have that with high probability RSa is τ -spectrally bounded by A, for a τ = O(ρ2/3 log n).
Analogous statements hold for Sb , Sc .
Next, we verify the conditions for calculating approximate whitening matrices (Algorithm 4).
Towards applying Theorem C.10, note that if R[n] is the matrix that has as columns the vectors
l !1/3
ρ
1
(P̃l )j , for all l ∈ [2, L], j ∈ [m], and D is the matrix that has as columns the
l 1−ρ
1/3
ρ
Fj , for all j ∈ [m], R[n] then is τ -spectrally bounded by D for τ = O(ρ2/3 log n).
vectors 1−ρ
Furthermore, the matrix F is O(1)-incoherent with high probability by Lemma B.1. Hence, we can
apply Theorem C.10, the output of Algorithm 4 are matrices Qa , Qb , Qc which are τ -approximate
whitening matrices for A, B, C respectively.
Next, we will need bounds on
min(σmin (Qa ), σmin (Qb ), σmin (Qc )), max(σmax (Qa ), σmax (Qb ), σmax (Qc ))
to plug in the guarantee of Algorithm 4.
36
By Lemma D.1, we have
σmax (Qa ) ≤
1
1
kAA⊤ k . (1 + τ )kAA⊤ k, σmin (Qa ) ≥
σmin (AA⊤ ) & (1 − τ )σmin (AA⊤ )
1−τ
1+τ
However, for the random model, applying Lemma B.1,
⊤
σmin (AA ) ≥
ρ
1−ρ
2/3
np & ρ
2/3
⊤
np, σmax (AA ) ≤
ρ
1−ρ
2/3
mnp2 . ρ2/3 mnp2
(D.2)
Analogous statements hold for B and C.
Finally, we bound the error due to empirical estimates. Since ρpm = o(1),
Pr[si = 0 ∧ sj = 0 ∧ sk = 0] ≥ 1 − Pr[si = 1] − Pr[sj = 1] − Pr[sk = 1] ≥ 1 − 3pmρ = Ω(1)
Hence, by Corollary E.3, with a number of samples as stated in the theorem,
√
ˆ Sa ,S ,Sc − PMITSa ,S ,Sc k{1,2},{3} . p5/2 ρ5/2 mn2
kPMIT
b
b
(D.3)
as well.
With that, invoking Theorem 5.4 (with kEk{1,2},{3} taking into account both the EL term above,
and the above error due to sampling), the output of Algorithm 3 will produce vectors vi , i ∈ [m],
1/3
ρ
(1 − exp(−Wi )), for
s.t. vi is O(η ′ )-close to 1−ρ
ˆ Sa ,S ,Sc − PMITSa ,S ,Sc k{1,2},{3} )
η ′ . max(kQa k , kQb k , kQc k)1/2 · τ 3/2 + σ −3/2 (kEL k{1,2},{3} + kPMIT
b
b
where σ = min(σmin (Qa ), σmin (Qb ), σmin (Qc )).
Plugging in the estimates from (D.1), (D.2), (D.3) as well as τ = O(ρ2/3 log n), we get:
q
√
1/2 3/2
max(kQa k , kQb k , kQc k) τ
. mnp2 ρ2/3 (ρ2/3 log n)3/2 = ρ4/3 mnp log3/2 n
√
1 3/2
) kEL k{1,2},{3} . ρ4/3 mnp log3/2 n
σ −3/2 kEL k{1,2},{3} . (
ρnp
√
−3/2
ˆ Sa ,S ,Sc − PMITSa ,S ,Sc k{1,2},{3} . ρ4/3 mnp log3/2 n
σ
kPMIT
b
b
1/3
ρ
(1 − exp(Wi )), for all i ∈ [m].
which implies the vectors (âi , b̂i , ĉi ) are O(η ′ )-close to 1−ρ
1/3
However, this directly implies that 1−ρ
(âi , b̂i , ĉi ) are O(η ′ /ρ1/3 )-close to 1 − exp(Wi ),
ρ
i ∈ [m], which in turn implies (ãi , b̃i , c̃i ) are O(η ′ /ρ1/3 ) close to exp(Wi ).
This implies the statement of the Lemma.
Given that, we prove the main theorem. The main issue will be to ensure that taking log of the
values
√
Proof of Theorem 3.1. By Proposition D.2, the vectors Yi , i ∈ [m] in Algorithm 1 are O(η np)
√
close to exp(−Wi ) with η = Õ mpρ . Let (Yi′ )j = (Yi )j if (Yi )j > exp(−νu ) and otherwise
(Yi )′j = exp(−νu ).
Then we have that kYi′ − Wi k ≤ kYi − Wi k. By the Lipschitzness of log(·) in the region [νi , ∞]
37
we have that
It follows that
ci )j − (Wi )j | = | log(Y ′ )j − log(Wi )j | . |(Yi )′ − (Wi )j |
|(W
i
j
ci − Wi k = klog Yi′ − log Wi k . kYi′ − Wi k
kW
√
Therefore recalling kYi′ − Wi k ≤ kYi − Wi k ≤ O(η np) we complete the proof.
Proof of Theorem 3.3. The proof will follow the same outline as the proof of Theorem 3.1. The
difference is that since we only have a guarantee on the spectral boundedness of the second and
third-order term, we will need to bound the higher-order terms in a different manner. Given that
we have no information on them in this scenario, we will simply bound them in the obvious manner.
We proceed to formalize this.
The sample complexity is polynomial for the same reasons as in the proof of Theorem 3.1, so
we will not worry about it here.
We only need to check the conditions for Algorithms 4 and 3 to work, so that we can apply
Theorems 5.4 and 2.10.
Towards that, first we claim that we can write the PMI tensor for any equipartition Sa , Sb , Sc
of [n] as
PMITSa ,Sb ,Sc =
2 ! X
1
ρ
ρ X
Fk,Sa ⊗ Fk,Sb ⊗ Fk,Sc −
Gk,Sa ⊗ Gk,Sb ⊗ Gk,Sc
1−ρ
2 1−ρ
k∈[m]
k∈[m]
3 ! X
ρ
1
Hk,Sa ⊗ Hk,Sb ⊗ Hk,Sc + E
+
3 1−ρ
(D.4)
k∈[m]
where kEk{1,2},{3} ≤ ρ4 m(np)3/2 . Towards achieving this, first we claim that Proposition 5.6
implies that for any subsets Sa , Sb , Sc ,
m
X
k=1
(1 − exp(−lWk ))Sa ⊗ (1 − exp(−lWk ))Sb ⊗ (1 − exp(−lWk ))Sc
{1,2},{3}
≤ m(np)3/2
Indeed, if we put γk = (1 − exp(−lWk ))Sa , δk = (1 − exp(−lWk ))Sb , θk = (1 − exp(−lWk ))Sc ,
P
√
then we have k k γk γk⊤ k ≤ mnp, and similarly for δk . Since maxk kθk k ≤ (np)1/2 , the claim
immediately follows. Hence, (D.4) follows.
l 1/3
ρ
1
Next, let RSa be the matrix that has as columns the vectors l 1−ρ
(P̃l )j,Sa , l ∈
1/3
ρ
(P̃1 )j,Sa for j ∈ [m] for
[2, L], j ∈ [m] and A is the matrix that has as columns the vectors 1−ρ
some L = O(poly(n)), similarly as in the proof of Theorem 3.1.
We claim that RSa RS⊤a is τ spectrally bounded by ρF F ⊤ .
l 1/3
√
ρ
1
Indeed, for any l > 2, we have k l 1−ρ
P̃l k . ρl/3 kP̃l k . ρl/3 mnp Hence,
RSa RS⊤a ρ2/3 GG⊤ + ρ4/3 HH ⊤ + ρ2 LL⊤ +
3ρ
2/3
τ (F F
⊤
⊤
+ σmin (F F )) + ρ
X
8/3
38
ρ2l/3 mnp2
l≥4
mnp2 - ρ2/3 τ (F F ⊤ + σmin (F F ⊤ ))
(D.5)
where the first inequality holds since HH ⊤ , GG⊤ , LL⊤ are τ -spectrally bounded bounded by F and
the second since σmin (F F ⊤ ) & np and τ ≥ 1. Let τ ′ = ρ2/3 τ . Since we are assuming the matrix F
is O(1)-incoherent, we can apply Theorem C.10, and claim the output of Algorithm 4 are matrices
Qa , Qb , Qc which are τ -approximate whitening matrices for A, B, C respectively.
By Lemma D.1, we have again
1
1
. (1 + τ ′ )kAA⊤ k, σmin (Qa ) ≥
& (1 − τ ′ )σmin (AA⊤ )
σmax (Qa ) ≤
1 − τ′
1 + τ′
Then, applying Theorem 5.4, we get that we recover vectors (âi , b̂i , ĉi ) are O(η ′ )-close to
1/3
ρ
(1 − exp(Wi )), for all i ∈ [m]. for
1−ρ
3/2
η ′ . max(kQa k , kQb k , kQc k)1/2 · τ ′ + σ −3/2 kEk{1,2},{3}
√
Recall that τ ′ = ρ2/3 τ , and kQa k ≤ ρ2/3 σmax (F ) . ρ2/3 mnp and kEk{1,2},{3} ≤ ρ4 m(np)3/2 and
σ & ρ2/3 np, we obtain that
!
4 m(np)3/2
√
√
ρ
. ρ4/3 mnpτ 3/2
η ′ . ρ1/3 mnp (τ ρ2/3 )3/2 + 2/3
3/2
(ρ np)
where the last inequality holds since ρ3 m = o(1) = o(τ ).
1/3 (â , b̂ , ĉ ) are O(η ′ /ρ1/3 ) = O(η)-close to 1 −
However, this directly implies that ( 1−ρ
i i i
ρ )
exp(−Wi ), i ∈ [m], which in turn implies (ãi , b̃i , c̃i ) are O(η) close to exp(−Wi ).
Argument for recovering Wi from exp(−Wi ) is then exactly the same as the one in Theorem
3.1.
E
Sample complexity and bias of the PMI estimator
Finally, we consider the issue of sample complexity. The estimator we will use for the PMI matrix
will simply be the plug-in estimator, namely:
ˆ i,j = log P̂r[si = 0 ∧ sj = 0]
PMI
ˆ j = 0]
P̂r[si = 0]Pr[s
(E.1)
Notice that this estimator is biased, but as the number of samples grows, the bias tends to zero.
Formally, we can show:
Lemma E.1. If the number of samples N satisfies
1
1
log m
N≥
mini6=j {Pr[si = 0 ∧ sj = 0} δ2
ˆ i,j − PMIi,j | ≤ δ, ∀i 6= j.
with high probability |PMI
Proof. Denoting ∆i,j = P̂r[si = 0 ∧ sj = 0] − Pr[si = 0 ∧ sj = 0] and ∆i = P̂r[si = 0] − Pr[si = 0],
we get that
Pr[si = 0 ∧ sj = 0] + ∆i,j
ˆ i,j = log P̂r[si = 0 ∧ sj = 0] = log
PMI
ˆ
(Pr[s
P̂r[si = 0]Pr[sj = 0]
i = 0] + ∆i )(Pr[sj = 0] + ∆j )
∆i,j
∆i
∆j
= PMIi,j + log 1 +
− log 1 +
− log 1 +
Pr[si = 0 ∧ sj = 0]
Pr[si = 0]
Pr[sj = 0]
39
Furthermore, we have that
2
3x
2x
2+x
≤ log(1 + x) ≤
√x ,
x+1
for x ≥ 0, which implies that when x ≤ 1,
≤ log(1 + x) ≤ x. From this it follows that if
∆i
∆i,j
, max
≤δ
max max
i Pr[si = 0]
i,j Pr[si = 0 ∧ sj = 0]
we have
δ
ˆ i,j ≤ PMIi,j + δ
≤ PMI
3
Note that it suffices to show that if N > 1−4pmax1 mρmax δ12 log m, we have
∆i
∆i
> (1 + δ) ∨
< (1 − δ) ≤ exp(− log2 m)
Pr
Pr[si = 0]
Pr[si = 0]
PMIi,j −
and
Pr
∆i,j
∆i,j
> (1 + δ) ∨
< (1 − δ) ≤ exp(− log2 m)
Pr[si = 0 ∧ sj = 0]
Pr[si = 0 ∧ sj = 0]
since this implies
(E.2)
(E.3)
∆i,j
∆i
max max
, max
≤δ
i,j Pr[si = 0 ∧ sj = 0]
i Pr[si = 0]
with high probability by a simple union bound.
Both (E.2) and (E.3) will follow by a Chernoff bound.
Indeed, consider (E.2) first. We have by Chernoff
s
!
#
"
log N
Pr[si = 0] ≤ exp(− log2 N )
Pr ∆i > 1 +
N Pr[si = 0]
Hence, if N >
2
1
1
Pr[si =0] δ2
log m, we get that 1 − δ ≤
∆i
Pr[si =0]
≤ 1 + δ with probability at least
1 − exp(log m).
The proof of (E.3) is analogous – the only difference being that the requirement is that N >
1
1
Pr[si =0] δ2 log m which gives the statement of the lemma.
Virtually the same proof as above shows that:
Lemma E.2. If the number of samples N satisfies
N≥
1
1
log m
mini6=j6=k {Pr[si = 0 ∧ sj = 0 ∧ sk = 0} δ2
ˆ i,j,k − PMITi,j,k | ≤ δ, ∀i 6= j 6= k.
with high probability |PMIT
As an immediate corollary, we get:
Corollary E.3. If the number of samples N satisfies
N≥
1
1
log m
mini6=j6=k {Pr[si = 0 ∧ sj = 0 ∧ sk = 0} δ2
1
1
log m
mini6=j6=k {Pr[si = 0 ∧ sj = 0 ∧ sk = 0} δ2
with high probability for any equipartition Sa , Sb , Sc
N≥
ˆ Sa ,S ,Sc − PMITSa ,S ,Sc k{1,2},{3} . n3 δ
kPMIT
b
b
40
F
Matrix Perturbation Toolbox
In this section we discuss standard matrix perturbation inequalities. Many results in this section
b = A + E, the perturbation in individual singular
can be found in Stewart and Sun [Ste77]. Given A
values can be bounded by Weyl’s theorem:
b = A+E, we know σk (A)−kEk ≤ σk (A)
b ≤ σk (A)+kEk.
Theorem F.1 (Weyl’s theorem). Given A
For singular vectors, the perturbation is bounded by Wedin’s Theorem:
Lemma F.2 (Wedin’s theorem; Theorem 4.1, p.260 in [Ste90]). Given matrices A, E ∈ Rm×n with
m ≥ n. Let A have the singular value decomposition
Σ1 0
A = [U1 , U2 , U3 ] 0 Σ2 [V1 , V2 ]⊤ .
0
0
b = A + E, with analogous singular value decomposition. Let Φ be the matrix of canonical
Let A
b1 , and Θ be the matrix of canonical angles
angles between the column span of U1 and that of U
between the column span of V1 and that of Vb1 . Suppose that there exists a δ such that
min |[Σ1 ]i,i − [Σ2 ]j,j | > δ,
i,j
and
min |[Σ1 ]i,i | > δ,
i,i
then
k sin(Φ)k2 + k sin(Θ)k2 ≤ 2
kEk2
.
δ2
Perturbation bound for pseudo-inverse When we have a lowerbound on σmin (A), it is easy
to get bounds for the perturbation of pseudoinverse.
Theorem F.3 (Theorem 3.4 in [Ste77]). Consider the perturbation of a matrix A ∈ Rm×n : B =
A + E. Assume that rank(A) = rank(B) = n, then
√
kB † − A† k ≤ 2kA† kkB † kkEk.
Note that this theorem is not strong enough when the perturbation is only known to be τ spectrally bounded in our definition.
41
| 8cs.DS
|
HILBERT SERIES OF RESIDUAL INTERSECTIONS
arXiv:1304.0044v1 [math.AC] 29 Mar 2013
Marc Chardin, David Eisenbud♦ , and Bernd Ulrich♦
♥
Abstract We find explicit formulas for the Hilbert series of residual intersections of a scheme in
terms of the Hilbert series of its conormal modules. In a previous paper we proved that such
formulas should exist. We give applications to the dimension of secant varieties of surfaces and
three-folds.
Introduction
Let M = ⊕i∈Z Mi be a finitely generated graded module over the homogeneous coordinate ring
R of a projective variety over a field k. The Hilbert series (sometimes called the Hilbert-Poincaré
series) of M , which we will denote [[M ]], is the Laurent series
[[M ]] =
X
(dim Mi )ti .
If Z ⊂ Pn := Pnk is a scheme, then the Hilbert series of Z is by definition the Hilbert series of the
homogeneous coordinate ring of Z. Of course this Hilbert series contains the data of the Hilbert
polynomial of Z as well.
Sometimes interesting geometric data (such as the dimension of a secant variety) can be described in terms of residual intersections in the sense of Artin and Nagata [2], and the purpose of
this paper is to compute the Hilbert series of such schemes. Here is the definition: let X ⊂ Y ⊂ Pn
be closed subschemes of Pn , let R be the homogeneous coordinate ring of Y , and let IX ⊂ R be
the ideal of X in Y . A scheme Z ⊂ Y is called an s-residual intersection of X in Y if Z is defined
by an ideal of the form IZ = (f1 , . . . , fs ) :R IX , with f1 , . . . , fs homogeneous elements in IX , and
Z is of codimension at least s in Y .
We wish to derive formulas for the Hilbert series of Z in terms of information about X and
the degrees of the polynomials fi . In our previous paper [6] we showed that this is sometimes
possible in principle: under certain hypotheses the Hilbert series of Z does not vary if we change
the polynomials fi , keeping their degrees fixed. In this paper we make this more precise by giving
formulas—under somewhat stronger hypotheses—for the Hilbert series of Z in terms of the degrees
m
of the fi and the Hilbert series of finitely many modules of the form ωR /IX
ωR , where ωR denotes
the canonical module of R.
♦
partially supported by the National Science Foundation.
We are all grateful to MSRI for supporting the commutative algebra years in 2002-03 and
2012-13, where we worked on this paper.
AMS 2010 Subject Classification: Primary, 13D40, 13C40; Secondary, 13H15, 13M06, 14C17,
14N15
♥
1
For example, suppose that Y = Pn and X is locally a complete intersection (for instance,
smooth). If f1 . . . , fs are homogeneous elements of degree d of I = IX such that R := (f1 , . . . , fs ) : I
has codimension > s then the Hilbert series of the homogeneous coordinate ring of the scheme Z
defined by R differs from that of a complete intersection defined by s forms of degree d by
s
X
n+j s
(−1)
tjd [[ωR /I j−g+1 ωR ]](t−1 ) + a polynomial.
j
j=g
The polynomial remainder term is present because we have made assumptions only on the scheme,
and not on the homogeneous coordinate ring. Here the expression [[R/I j−g+1 ]](t−1 ) denotes the
Laurent series obtained by writing [[R/I j−g+1 ]] as a rational function in t, substituting t−1 for t,
and rewriting the result as a Laurent series. Up to a small shift in notation, this is the formula
given in Remark 1.5b (where the case of forms fi of different degrees is also treated.)
In applications, one sometimes needs to know only whether the s-residual intersection Z actually has codimension exactly s in Y ; for example, we will use such information in Section 3 to say
when the secant varieties of certain (possibly singular) surfaces and smooth 3-folds have dimension
less than the expected dimension. For this purpose it is enough to know just one coefficient of
the Hilbert polynomial of Z, that corresponding to the degree of the codimension s component of
Z. More generally, we show how to use partial information about X to compute just the first k
coefficients of the Hilbert polynomial of Z.
Consider the case where Y is Gorenstein and X is Cohen-Macaulay. Suppose, further, that
locally in codimension i < s, the subscheme X ⊂ Y can be defined by i equations, and that, for
j 6 s − g,
j
j+1
depth IX
/IX
> dim X − j.
If Z is any s-residual subscheme of X in Y , then the Hilbert polynomial of Z may be written in
j
terms of the Hilbert polynomials of IX
for j 6 s − g + 1 (the explicit formula is given in Theorem
1.9). Moreover, if X and Y satisfy some of our hypotheses only up to some codimension r, then
the formula gives the first r coefficients of the Hilbert polynomial of Z.
Our formulas are derived in Section 1, which is the technical heart of the paper. To prove them
we need to adapt the arguments of Ulrich [19]. The delicate point is the use in that paper of the
isomorphism R ≃ ωR that holds for a Gorenstein ring. Since our rings are Gorenstein only up to
a certain codimension r, we know only that ωR is a line bundle locally in codimension r, and this
does not suffice to determine its Hilbert series. Thus the module ωR must be brought into play.
For other work along these lines, see Cumming [7].
j
j+1
In case where Y is Gorenstein, the sheaves IX
/IX
themselves play the crucial role in our
2
formulas. If X were locally a complete intersection scheme, then IX /IX
would be a vector bundle
j
j+1
and IX /IX would be its j-th symmetric power, so it is reasonable to hope that for “nice” ideals
I the Hilbert series of the first few conormal modules should determine the rest. We prove a
general theorem of this kind in Section 2, and carry out the reduction in some particular cases. For
instance, if s = codim(X) then the degree of an s-residual intersection scheme Z in Y = Pn may be
Q
calculated immediately from Bézout’s Theorem: deg Z = ( i deg fi ) − deg X. This was extended
to a formula in the case s = codimY X + 1 by Stückrad [18] and to the case s = codimY X + 2 by
2
Huneke and Martin [16]. Our formula gives an answer in general, and we work this out explicitly
for the case s = codimY X + 3.
In Section 3 we apply our results to the study of secant loci. Our general theorems imply
conditions in terms of Chern classes of a smooth embedded three-fold for the degeneracy of the
secant locus in terms of Chern classes and in terms of certain Hilbert coefficients. We also recover
the analogous criteria for surfaces with mild singularities, a case already by Dale [7a] and others.
1. Formulas for the Hilbert series of residual intersections
To deal with rings R that are not equidimensional, we define the true codimension of a prime
ideal p ⊂ R to be dim R − dim R/p. We say that an ideal I satisfies the condition ∗Gs if, for every
prime p in V (I) of true codimension < s, the minimal number of generators of Ip is at most dim Rp
(the usual condition Gs is the same but for codimension instead of true codimension ).
Definition 1.1. Let R be a graded ring and M, N graded R-modules. We say that M and
N are equivalent up to true codimension r, and write M ∼
= N , if there exist graded R-modules
r
W1 , . . . , Wn with W1 = M , Wn = N and homogeneous maps Wi → Wi+1 or Wi+1 → Wi , for
1 6 i 6 n − 1, which are isomorphisms locally in true codimension r. A homogeneous map which
∼
is an isomorphism up to true codimension r will be denoted by −→.
r
Saying that M ∼
= N is of course much stronger than saying that M and N are isomorphic locally
r
at each prime of true codimension 6 r. For example, any two modules M and N that represent
line bundles on a projective variety of dimension r satisfy the latter condition, but M ∼
= N implies
r
that they represent isomorphic line bundles! The need to provide explicit maps that are locally
isomorphisms in some true codimension between modules that are not in fact isomorphic is what
makes the work in this section delicate.
If R is a Noetherian standard graded algebra over a field and M a finitely generated graded
R-module, we will denote the Hilbert series of M by [[M ]]. If M ∼
= N then [[M ]] − [[N ]], written as
r
a rational function, has a pole of order less than dim R − r at 1; we will write this as [[M ]] ≡ [[N ]]
r
and say that these series are r-equivalent. Thus if r = dim R − 1 =: d then [[M ]] ≡ [[N ]] means that
r
the Hilbert polynomials of M and N agree, and in general if r < dim R then [[M ]] ≡ [[N ]] means
r
that the Hilbert polynomials of M and N , written in the form
d+t
d−1+t
ad
+ ad−1
+ ···,
d
t
have the same coefficients of as for s > dim R − 1 − r.
We will also extend the notation ≡ to arbitrary series that are rational functions with no pole
r
outside 1, by the same requirement, as soon as dim R is clear from the context.
The substitution t 7→ t−1 is a well-defined automorphism of the ring Z[t, t−1 , (1 − t)−1 ], since
(1 − t)−1 = −t(1 − t)−1 ∈ Z[t, t−1 , (1 − t)−1 ].
Lemma 1.2. Let R be a positively graded Noetherian algebra over a field k. If for each prime
p of dimension > dim R − r, the ring Rp is Cohen-Macaulay of dimension dim R − dim R/p, then
[[ωR ]](t) ≡ (−1)dim R [[R]](t−1 ).
r
3
Proof. Dualize a free resolution of R over a polynomial ring S, and note that all the homology
codimS (R)
modules other than ExtS
(R, ωS ) are supported in codimension > r.
We next adapt some results of [6] and [20] to our context.
Suppose that R is a local Cohen-Macaulay ring and I is an ideal of height g. In the rest of this
section we will often use the condition that depth R/I j > dim R/I − j + 1 for 1 6 j 6 s − g. These
conditions are satisfied if I satisfies Gs and if moreover, I has the sliding depth property or, more
restrictively, is strongly Cohen-Macaulay (which means that for every i, the i-th Koszul homology
Hi of a generating set h1 , . . . , hn of I satisfies depth Hi > dim R − n + i or is Cohen-Macaulay,
respectively) ([13, 3.3] and [15, 3.1]). The latter condition always holds if I is a Cohen-Macaulay
almost complete intersection or a Cohen-Macaulay deviation 2 ideal of a Gorenstein ring [3]. It
is also satisfied for any ideal in the linkage class of a complete intersection [14, 1.11]. Standard
examples include perfect ideals of grade 2 ([1] and [9]) and perfect Gorenstein ideals of grade 3 [21].
Lemma 1.3. Let R be a finitely generated positively graded algebra over a factor ring of a local
Gorenstein ring and write ω = ωR . Let I be a homogeneous ideal of height g, let f1 , . . . , fs be forms
contained in I of degrees d1 , . . . , ds , write Ai := (f1 , . . . , fi ), A := As , and Ri = Ai : I. Assume
that ht Ri > i for 1 6 i 6 s and ht I + Ri > i + 1 for 1 6 i 6 s − 1. Further suppose that, locally
off V (A), the elements f1 , . . . , fs form a weak regular sequence on R and on ω, and that locally in
true codimension r in R along V (A), the ring R is Gorenstein and depth R/I j > dim R/I − j + 1
for 1 6 j 6 s − g. Then :
∼
(a) (R/Ri−1 )(−di ) −→ Ai /Ai−1 via multiplication by fi for 1 6 i 6 s.
r
·fi
j
(b) 0 → (ωI /ωAi−1 I j−1 )(−di ) −→ ωI j+1 /ωAi−1 I j −→ ωI j+1 /ωAi I j → 0 is a complex that
is exact locally in true codimension r for 1 6 i 6 s and min{1, i − g} 6 j 6 s − g.
(c) ExtiR (R/Ri , ω) ∼
= (ωI i−g+1 /ωAi I i−g )(d1 + · · · + di ) for 0 6 i 6 s, if locally in true
r
codimension r in R along V (A), depth R/I j > dim R/I − j + 1 for 1 6 j 6 s − g + 1.
Proof. Adjoining a variable to R and to I and localizing, we may suppose that grade I > 0.
Furthermore, our assumptions imply that I is Gs and satisflies the Artin-Nagata condition ANs−1
locally in true codimension r; see [20, 2.9(a)]. Likewise, in the setting of (c), ANs holds locally in
true codimension r.
Part (a) holds along V (A) by [20, 1.7(g)], and off V (A) because f1 , . . . , fi form a weak regular
sequence. Moreover, the sequence of (b) is obviously a complex and it is exact in true codimension
r by [20, 2.7(a)].
For the proof of (c), we induct on i. For i = 0, our assertion is clear since grade I > 0 and
therefore R/R0 = R. Assuming that the assertion holds for Ri = R/Ri for some i, 0 6 i 6 s − 1,
we are going to prove our claim for Ri+1 = R/Ri+1 . To this end we may suppose r > i + 1.
We first wish to prove that
(1)
i
i
∼
Exti+1
R (Ri /(fi+1 Ri : IRi ), ω) = [I ExtR (Ri , ω)/fi+1 ExtR (Ri , ω)](di+1 ).
r
Using the exact sequence
.fi+1
0 → Ri /(0 :Ri fi+1 Ri )(−di+1 ) −→ Ri −→ Ri /fi+1 Ri → 0
4
we obtain a long exact sequence
.fi+1
i+1
· · · ExtiR (Ri , ω) −→ ExtiR (Ri /(0 :Ri fi+1 Ri ), ω)(di+1 ) → Exti+1
R (Ri /fi+1 Ri , ω) → ExtR (Ri , ω) · · ·
Since the support in R of (0 :Ri fi+1 ) has true codimension > r + 1 > i by part (a), we have
∼
∼
ExtiR (Ri /(0 :Ri fi+1 Ri ), ω) −→ ExtiR (Ri , ω) via the natural map. Furthermore Exti+1
R (Ri , ω) = 0;
r
r
as locally up to true codimension r on V (A), Ri is Cohen-Macaulay of true codimension i by
[20, 1.7(a)], whereas locally up to true codimension r off V (A), Ri is defined by the weak regular
sequence f1 , . . . , fi and hence has projective dimension at most i. Therefore
ExtiR (Ri , ω)/fi+1 ExtiR (Ri , ω) (di+1 ) ∼
= E := Exti+1
R (Ri /fi+1 Ri , ω).
r
Hence, to prove (1), it suffices to show that
i+1
∼
I Exti+1
R (Ri /fi+1 Ri , ω) = ExtR (Ri /(fi+1 Ri : IRi ), ω).
r
The map Ri /fi+1 Ri → Ri /(fi+1 Ri :Ri IRi ) induces a map
i+1
φ : Exti+1
R (Ri /(fi+1 Ri : IRi ), ω) → ExtR (Ri /fi+1 Ri , ω).
We prove that locally in true codimension r in R, the map φ is injective, and its image coincides
with I E, which gives
∼
∼
im φ −→ im φ + I E ←− I E.
r
r
This is trivial locally off V (A) because on this locus I = R and fi+1 Ri : IRi = fi+1 Ri . Therefore,
we may localize to assume that R is a local ring of dimension at most r and A 6= R. Of course we
may suppose Ri 6= 0. In this case R is Gorenstein, Ri is Cohen-Macaulay of codimension i, and
fi+1 is a non zerodivisor on Ri by [20, 1.7(f)]. Let S = Ri /fi+1 Ri .
The natural equivalence of functors Exti+1
R (—, ω) ≃ HomS (—, ωS ) together with the exact
sequence
0 → 0 :S IS −→ S −→ S/0 :S IS −→ 0
yield a commutative diagram with an exact row
Exti+1
R (Ri /(fi+1 Ri : IRi ), ω)
φ
≃
0
/ HomS (S/0 :S IS, ωS )
/E
≃
/ ω S
ψ
/ HomS (0 :S IS, ωS )
/0
The last map is surjective because S/(0 :S IS) = Ri+1 by [20,1.7(f)] and Ri+1 is a maximal CohenMacaulay S-module. Now φ is injective and the desired equality im φ = I E follows once we have
shown that im ψ = IωS . For this it suffices to prove
(2)
coker ψ ≃ ωS /IωS ;
5
for then IωS ⊂ im ψ and we have the natural epimorphism of isomorphic modules ωS /IωS →
coker ψ, which is necessarily an isomorphism. We first argue that ωS /IωS is a maximal CohenMacaulay S-module. Indeed, [20, 2.7(c)] gives Ri ∩ I i−g+2 = Ai I i−g+1 , which implies
Ai I i−g ∩ I i−g+2 = Ai I i−g+1 .
(3)
Hence by our induction hypothesis,
IωS ≃ I i−g+2 /(Ai I i−g ∩ I i−g+2 + fi+1 I i−g+1 ) = I i−g+2 /Ji+1 I i−g+1 .
But the latter is indeed a maximal Cohen-Macaulay S-module according [20, 2.7(b)]. Thus
ωS /IωS ≃ HomS (HomS (ωS /IωS , ωS ), ωS ) ≃ HomS (HomS (S/IS, S), ωS ) ≃ HomS (0 :S IS, ωS ).
This completes the proof of (2), and hence of (1).
Now
IExtiR (Ri , ω)/fi+1 ExtiR (Ri , ω) ∼
= (ωI i−g+2 /(ωAi I i−g ∩ ωI i−g+2 + ωfi+1 I i−g+1 ))(d1 + · · · + di )
r
by our induction hypothesis, and using (3) one sees that
IExtiR (Ri , ω)/fi+1 ExtiR (Ri , ω) ∼
= (ωI i−g+2 /ωAi+1 I i−g+1 )(d1 + · · · + di ).
(4)
r
∼
On the other hand, Ri+1 −→ Ri /(fi+1 Ri : IRi ) according to [20, 1.7(f)], and hence
r
i+1
∼
Exti+1
R (Ri+1 , ω) = ExtR (Ri /(fi+1 Ri : IRi ), ω).
(5)
r
Now combining (5), (1), (4) concludes the proof of part (c).
We write σm (t1 , . . . , ts ) for the m-th elementary symmetric function.
Theorem 1.4. Let R be a standard graded Noetherian algebra over a field. Write n = dim R
and ω = ωR , and let I be a homogeneous ideal of height g satisfying ∗Gs . Let f1 , . . . , fs be forms
Qs
contained in I of degrees d1 , . . . , ds , write ∆s := i=1 (1 − tdi ), A = (f1 , . . . , fs ), R = A : I, and
assume that ht R > s. For each prime of true codimension 6 r suppose:
• If p ∈
/ V (A), then the elements f1 , . . . , fs form a weak regular sequence on Rp and on ωp .
• If p ∈ V (A), then the ring Rp is Gorenstein of dimension equal to the true codimension of p
and depth Rp /Ipj > dim Rp /Ip − j + 1 for 1 6 j 6 s − g.
(a)
n−g
[[R/A]](t) ≡ ∆s [[R]](t) − (−1)
r
s−g
X
(−1)j σg+j (td1 , . . . , tds )[[ω/I j ω]](t−1 ).
j=1
6
(b) If furthermore, locally in true codimension r in R along V (A), depth R/I s−g+1 > dim R/I −
s + g, then
n−g
[[R/R]](t) ≡ ∆s [[R]](t) − (−1)
r
s−g+1
X
(−1)j−1 σg+j−1 (td1 , . . . , tds )[[ω/I j ω]](t−1 ).
j=1
Proof. For 0 6 i 6 s, write Ai = (f1 , . . . , fi ), Ri = Ai : I. Applying repeatedly a general
position argument (see [6, 2.5]), we may assume that ht Ri > i and ht I +Ri > i+1 for 0 6 i 6 s−1.
We first notice that for 0 6 i 6 s and i − g 6 j 6 s − g,
[[ωAi I j ]] ≡
r
i
X
(−1)ℓ+1 σℓ (td1 , . . . , tdi )[[ωI j−ℓ+1 ]],
ℓ=1
which can be easily deduced from Lemma 1.3(b) using induction on i.
Now let 0 6 i 6 s − 1 for (a), or 0 6 i 6 s for (b), respectively. Then by Lemma 1.3(c),
[[ExtiR (R/Ri , ω)]](t) ≡ t−(d1 +···+di ) ([[ωI i−g+1 ]] − [[ωAi I i−g ]])(t)
r
(1)
≡t
−(d1 +···+di )
r
i
X
(−1)ℓ σℓ (td1 , . . . , tdi )[[ωI i−g−ℓ+1 ]](t).
ℓ=0
Locally in true codimension r in R, R/Ri is either zero or Cohen-Macaulay of codimension i
by [20, 2.9 and 1.7(a)]. Therefore
[[ExtiR (R/Ri , ω)]](t) ≡ (−1)n−i [[R/Ri ]](t−1 ),
r
as can be easily seen by dualizing a homogeneous finite free resolution of R/Ri over a polynomial
ring and using Lemma 1.2. Now by Lemma 1.3(c) and (1),
[[R/Ri ]](t) ≡ (−1)n−i [[ExtiR (R/Ri , ω)]](t−1 )
r
≡ (−1)n−i td1 +···+di
r
i
X
(−1)ℓ σℓ (t−d1 , . . . , t−di )[[ωI i−g−ℓ+1 ]](t−1 )
ℓ=0
= (−1)n−i
i
X
(−1)ℓ σi−ℓ (td1 , . . . , tdi )[[ωI i−g−ℓ+1 ]](t−1 ).
ℓ=0
Therefore
(2)
n−g
[[R/Ri ]](t) ≡ (−1)
r
i−g+1
X
(−1)j+1 σg+j−1 (td1 , . . . , tdi )[[ωI j ]](t−1 ).
j=−g+1
Now part (b) follows since
∆i [[R]](t) ≡ ∆i (−1)n [[ω]](t−1 ) = (−1)n−i
r
i
X
(−1)ℓ σi−ℓ (td1 , . . . , tdi )[[ω]](t−1 )
ℓ=0
n−g
= (−1)
i−g
X
j=−g
7
(−1)j σg+j (td1 , . . . , tdi )[[ω]](t−1 ).
To see (a) notice that by Lemma 1.3(a),
[[R/Ai ]](t) = [[R/Ai−1 ]](t) − tdi [[R/Ri−1 ]](t)
for 1 6 i 6 s. Now by induction on i using (2), one shows that
i−g
X
n−g
[[R/Ai ]](t) ≡ (−1)
r
(−1)j σg+j (td1 , . . . , tdi )[[ωI j ]](t−1 ),
j=−g
from which (a) can be easily deduced.
Remark 1.5. If in Theorem 1.4, R is a polynomial ring in n variables, then the formulas of
that theorem take the following form:
(a)
−n
[[R/A]](t) ≡ ∆s [[R]](t) − (−t)
r
s−g
X
(−1)g+j σg+j (t)[[R/I j ]](t−1 );
j=1
s−g+1
(b)
X
−n
[[R/R]](t) ≡ ∆s [[R]](t) − (−t)
r
(−1)g+j−1 σg+j−1 (t)[[R/I j ]](t−1 ).
j=1
Lemma 1.6. Write ∆s (t) = (1 − t)s
P
k>0 ck (d1 , . . . , ds )(1
X
k
ck (d1 , . . . , ds ) = (−1)
i1 >1,...,is >1
i1 +···+is =k+s
− t)k . Then
s
Y
dj
j=1
ij
.
Q
Pdj −1 ℓ
t and notice that ∆s (t) = (1 − t)s sj=1 Pj (t).
Proof. Write Pj (t) = ℓ=0
Pdj −1
(m)
ℓ
dj
m! m
= m! m+1
. Hence
Now Pj (1) = ℓ=0
s
Y
j=1
Pj
(k)
X
(1) =
m1 >0,...,ms >0
m1 +···+ms =k
= k!
X
s
Y
k!
(m )
P j (1)
m1 ! · · · ms ! j=1 j
m1 >0,...,ms >0
m1 +···+ms =k
This yields our formula since ck (d1 , . . . , ds ) =
(−1)k
k!
s
Y
j=1
Q
s
dj
.
mj + 1
j=1 Pj
(k)
(1).
Pm
.
Lemma 1.7. Let P be a numerical polynomial written in the form P (t) = i=0 (−1)i ei t+m−i
m−i
Pm
t+m−i
i
For an integer d define the polynomial Q(t) = P (−t + d), and write Q(t) = i=0 (−1) hi m−i .
Then
i
X
k d+m+1−k
m
(−1)
hi = (−1)
ek .
i−k
k=0
8
Proof. We first notice that for integers r and n > 0, one has the following identities of
numerical polynomials :
(3)
−t + n
n
(4)
t+r+n
n
n
= (−1)
=
t−1
,
n
n
X
r−1+ℓ t+n−ℓ
ℓ
ℓ=0
n−ℓ
,
where the first is obvious and the second can be easily proved by induction on n.
Now
m
X
−t + d + m − k
m−k
k=0
m
X
t−d−1
m
ek
by (3)
= (−1)
m−k
k=0
m
X
t + (−d − 1 − m + k) + (m − k)
m
ek
= (−1)
m−k
k=0
m
m−k
X
X −d − 1 − m + k − 1 + ℓt + m − k − ℓ
ek
= (−1)m
ℓ
m−k−ℓ
k=0
ℓ=0
!
i
m
X
X
−d − m − 2 + i
t+m−i
m
= (−1)
ek
,
i−k
m−i
i=0
Q(t) =
(−1)k ek
by (4)
k=0
where
−d−m−2+i
i−k
= (−1)i+k
d+m+1−k
i−k
by (3).
Recall that the Hilbert series [[M ]] of a finitely generated graded module M over a homogeneous
ring over a field is element of the ring Z[t, t−1 , (1−t)−1 ] ⊂ Z[[t]][t−1 ]. In general, any S ∈ Z[t, t−1 , (1−
t)−1 ] can be written uniquely in the form
S(t) =
D−1
X
(−1)i ei
i=0
1
+F
(1 − t)D−i
where ei ∈ Z and F ∈ Z[t, t−1 ]. The coefficients ei can be computed as ei (M ) =
P (t) = S(t)(1 − t)D . We call
Q(t) =
D−1
X
i=0
i
(−1) ei
∂iP
i!
(1), where
t+D−1−i
∈ Q[t]
D−1−i
the polynomial associated to S. Its significance is that if we write S =
for i ≫ 0.
9
P
i∈Z ci t
i
, then ci = Q(i)
Remark 1.8. In the case where S(t) = [[M ]](t), we can take D to be any integer > dim M ,
D
and we define eD
i (M ) := ei . If D = dim M , we simply set ei (M ) := ei (M ). Notice that e0 (M ) is
the multiplicity (or degree) of M . The polynomial associated to [[M ]](t) is the Hilbert polynomial
of M , which we denote by [M ](t).
Theorem 1.9. Write eℓ (d1 , . . . , ds ) =
P
i1 >1,...,is >1
i1 +···+is =ℓ+s
(a) With the assumptions of Theorem 1.4(a),
en−s
(I/A) =
i
i
X
Qs
j=1
dj
ij
.
ei−k (d1 , . . . , ds )ek (R) − (−1)s−g es−g+i (R/I)
k=0
s−g
− (−1)
s−g s−g+i
X
X
(−1)
j=1 k=0
X
j+k
16i1 <···<ig+j 6s
di1 + · · · + dig+j + n − g − k
i+s−g−k
ek (ω/I j ω)
ek (ω/I j ω)
for 0 6 i 6 r − s.
(b) With the assumptions of Theorem 1.4(b),
en−s
(R/R) =
i
i
X
ei−k (d1 , . . . , ds )ek (R)
k=0
s−g+1 s−g+i
X
s−g
+ (−1)
j=1
X
X
j+k
(−1)
16i1 <···<ig+j−1 6s
k=0
di1 + · · · + dig+j−1 + n − g − k
i+s−g−k
for 0 6 i 6 r − s.
Proof. We only prove part (a). First write
n−g
(−1)
s−g
X
j=1
n−g−1
j
(−1)
X
j
[ω/I ω](−t + di1 + · · · + dig+j ) =
X
(−1) hℓ
(−1)ℓ h∗ℓ
ℓ
ℓ=0
16i1 <···<ig+j 6s
=
n−s−1
X
ℓ=0
t+n−g−1−ℓ
n−g−1−ℓ
t+n−s−1−ℓ
n−s−1−ℓ
and notice that h∗i = (−1)s−g hi+s−g . Lemma 1.7 gives
hi+s−g
s−g
X
(−1)j
=−
j=1
X
i+s−g
X
16i1 <···<ig+j 6s k=0
di1 + · · · + dig+j + n − g − k
(−1)k ek (ω/I j ω).
i+s−g−k
Now our assertion follows from Theorem 1.4(a) together with Lemma 1.6.
The proof of part (b) is similar, using Theorem 1.4(b) in place of Theorem 1.4(a).
Remark 1.10. If in Theorem 1.9, R is a polynomial ring in n variables, then the formula in
that theorem takes the following form:
10
en−s
(I/A) = ei (d1 , . . . , ds ) − (−1)s−g es−g+i (R/I)
i
s−g
− (−1)
s−g s−g+i
X
X
j+k
(−1)
j=1 k=0
X
16i1 <···<ig+j 6s
di1 + · · · + dig+j − g − k
i+s−g−k
ek (R/I j )
for 0 6 i 6 r − s;
en−s
(R/R) = ei (d1 , . . . , ds )
i
s−g+1 s−g+i
s−g
+ (−1)
X
j=1
X
j+k
(−1)
X
16i1 <···<ig+j−1 6s
k=0
di1 + · · · + dig+j−1 − g − k
i+s−g−k
ek (R/I j )
for 0 6 i 6 r − s.
Proof. Notice that ω/I j ω ≃ R/I j (−n) and proceed as in the proof of Theorem 1.9.
Corollary 1.11. Let R be a homogeneous ring over a field, write n = dim R, ω = ωR , and
assume that R is Gorenstein locally in true codimension r > s. Let I be a homogeneous ideal
of height g satisfying Gs , let f1 , . . . , fs be forms contained in I of degrees d1 , . . . , ds , write A =
(f1 , . . . , fs ), R = A : I, and assume that locally in true codimension r, depth R/I j > dim R/I −j +1
for 1 6 j 6 s − g.
Then ht R > r + 1 if and only if ht R > s and
(−1)s−g e0 (R)
s
Y
dj = es−g (R/I)
j=1
+
s−g s−g
X
X
j+k
(−1)
j=1 k=0
X
16i1 <···<ig+j 6s
di1 + · · · + dig+j + n − g − k
ek (ω/I j ω).
s−g−k
Proof. One uses Theorem 1.9(a) and [20, 1.7(a)].
2. Hilbert series of powers of ideals and degrees of residual intersections.
2.1 Computing Hilbert series of powers.
Motivated by Remark 1.5, showing the usefulness of the Hilbert series of the powers of an
ideal, we will focus here on the following question: to what extent does the Hilbert series of the
first powers of an ideal determine the Hilbert series of the next powers?
The following Lemma tells us a useful property of a general set of elements of an ideal.
Lemma 2.1. Let R be a standard graded Cohen-Macaulay ring over an infinite field k, let
I a homogeneous ideal, generated by forms of degrees at most d, and let r be an integer with
0 6 r 6 dim R . Further assume that I satisfies Gr+1 and has sliding depth locally in codimension
r.
Given di > d for 1 6 i 6 r + 1], there exists a Zariski dense open subset Ω of the affine k-space
Pr+1
Id1 × · · · × Idr+1 ≃ AN
k (where N =
i=1 dimk Idi ) such that if (f1 , . . . , fr+1 ) ∈ Ω :
11
(a) The ideal (f1 , . . . , fr+1 ) coincides with I locally up to codimension r.
(b) f1 , . . . , fr+1 is a d-sequence locally up to codimension r.
Proof. For part (a) we refer to [2, 1.6 (a)] and [10, 3.9], while (b) follows from [6, 3.6(b)].
We now choose some degrees (e.g. di = d for all i) and polynomials fi as above. Part two of
the lemma implies that the approximation complexes corresponding to f1 , . . . , fr+1 , and therefore
their different graded components,
Mp :
0 → Hr+1 ⊗ Sp−r−1 → Hr ⊗ Sp−r → · · · → H0 ⊗ Sp → 0
have homology in positive degrees supported in codimension at least r + 1. Moreover, H0 (Mp )
coincides with I p /I p+1 locally up to codimension r. See [12] for all of these facts.
Recall that in this sequence, Hq stands for the q-th homology module of the Koszul complex
K(f1 , . . . , fr+1 ; R) and Sq is the free R-module generated by monomials of degree q in r+1 variables.
The maps are homogeneous of degree 0 in the graded case, with the usual weights on the Koszul
complex and similarely the weight of si1 · · · siq ∈ Sq is deg(fi1 ) + · · · + deg(fiq ).
Therfore we have the following equalities :
(1)p
p
[[I /I
p+1
]](t) ≡
r
p
X
(−1)i sp−i (td1 , . . . , tdr+1 )[[Hi ]](t)
i=0
for every p > 0, where sj stands for the sum of all the monomials of degree j in r + 1 variables
(complete symmetric functions). These express the Hilbert series of the modules H0 , . . . , Hp in
terms of the ones of R/I, . . . , I p /I p+1 , and vice versa.
If I has height g, then Hq = 0 for q > r + 1 − g. We therefore immediately see that the
Hilbert series of all the modules I p /I p+1 are determined, up to r-equivalence, by the knowledge of
the Hilbert series of I p /I p+1 for 0 6 p 6 r + 1 − g, up to r-equivalence.
We now assume that, in addition, R is Gorenstein with a-invariant a := a(R) and is strongly
Cohen-Macaulay locally in codimension r. In this case we can use the self-duality of the homology
of the Koszul complex to see that only half of the information about the Koszul homology is needed.
Indeed, the structure of graded alternating algebra on the homology of the Koszul complex gives a
graded map of degree 0,
Hp −→ HomR/I (Hr+1−g−p , Hr+1−g ),
which is an isomorphism up to codimension r by a theorem of Herzog (see [11, 2.4.1]).
Now we have a collection of graded maps of degree 0 that connect the following modules,
g
HomR/I (Hr+1−g−p , Hr+1−g ) ∼
= HomR/I (Hr+1−g−p , ExtR (R/I, R)[−(d1 + · · · + dr+1 )])
r
∼
= HomR/I (Hr+1−g−p , ωR/I [−a − (d1 + · · · + dr+1 )])
r
∼
= ωHr+1−g−p [a + (d1 + · · · + dr+1 )].
r
From the Cohen-Macaulayness of the modules Hp , locally in codimension at most r, we therefore
have:
(2)p
[[Hp ]](t) ≡ ta+(d1 +···+dr+1 ) (−1)dim R/I [[Hr+1−g−p ]](t−1 ).
r
12
Moreover, the Euler characteristic of the homology of the Koszul complex depends only upon
the degrees d1 , . . . , dr+1 , namely
r+1−g
X
(3)
(−1)p [[Hp ]] = ∆r+1 [[R]] ≡ 0.
r
p=0
We now have put together all the formulas needed to effectively compute what we state in the
next theorem.
Remark that the result of the computation does not depend on the choice of the di ’s. Thus
we may choose di = 0 for all i, the intermediate steps have no meaning (e.g. [[Hp ]] may not have
positive coefficients), but the information that we extract from the computation is the same. Out
of this remark, one may use the following :
(1)p
(2)p
(3)
p
[[I /I
p+1
]](t) ≡
r
p
X
i
(−1)
i=0
r+p−i
[[Hi ]](t),
r
[[Hp ]](t) ≡ ta (−1)dim R/I [[Hr+1−g−p ]](t−1 ),
r
r+1−g
X
(−1)p [[Hp ]] ≡ 0.
r
p=0
Theorem 2.2.
Let R be a homogeneous algebra, I an homogeneous R-ideal, and let us
suppose that, locally in true codimension r, I is licci purely of true codimension g and satisfies
, up to r-equivalence, the Hilbert series
Gr+1 . Given the Hilbert series of I p /I p+1 for 0 6 p 6 r−g
2
of I p /I p+1 can be computed for all p, up to r-equivalence, by the formulas above.
Proof. Let us choose some sufficiently big integers d1 , . . . , dr+1 (one can treat them as unknowns, or take all of them equal to some fixed number or unknown d). Let us put q = r + 1 − g.
First, using (1)p for 0 6 p 6 q−1
, we get the Hilbert series of Hp , for p in the same range,
2
up to true codimension > r terms.
Then, from (2)p for the same p’s, we get the series of Hq , . . . , Hq−[ q−1 ] . Therefore, we get the
2
series of all the Hp ’s (up to r-equivalence) if q is odd ; and all of them but one, namely Hq/2 , if q
is even. In case q is even, we get the series of Hq/2 using (3).
Therefore we know the series of all the modules Hp in every case, and can use (1)p to get the
ones of I p /I p+1 for any p.
Notice that the di ’s appear in every formula, but should disappear at the end !
Example 2.3. If X ⊆ Pn is an equidimensionnal locally complete intersection scheme, and IX
p
p+1
the corresponding ideal sheaf, the Hilbert polynomials of the sheaves IX
/IX
are all determined
dim X
by the ones for 0 6 p 6
.
2
Proof. It is the case where r = n and g = n − dim X.
13
Example 2.4. If X ⊆ Pn is an equidimensionnal locally complete intersection threefold,
p
p+1
and IX the corresponding ideal sheaf, the Hilbert polynomial of the sheaves IX
/IX
are all
2
determined by the Hilbert polynomials of X and the one of the conormal bundle IX /IX . Moreover
the coefficients of terms in degrees 3 and 2 in the Hilbert polynomial of the conormal bundle are
determined by those of the Hilbert polynomial for X.
Informally, we have the following picture for the determination of the highest r−g+1 coefficients
of the Hilbert polynomial of the powers of an ideal I of codimension g that is locally complete
intersection up to codimension r :
HP coef.
R/I
I/I 2
I 2 /I 3
I 3 /I 4
I 4 /I 5
..
.
···
···
···
···
···
·
·
g
·
·
·
·
r
·
·
0
0
0
0
0
..
.
0
0
0
0
0
..
.
..
.
..
.
..
.
..
.
..
.
..
.
?
?
?
?
?
..
.
?
?
?
?
?
..
.
···
···
···
···
···
: needed as input.
: may be computed from the others.
? : not concerned.
2.2 Hilbert polynomials of powers of an ideal
We will treat the example of an equidimensional locally complete intersection threefold in
projective n-space.
Let us abreviate ei (p) = ei (I p /I p+1 ). Theorem 2.2 asserts that all the coefficients ei (p) are
determined by six of them.
With the help of a computer algebra system, one gets the following formulas.
Formulas 2.5
g+p−1
e0 (p) =
e0 (0),
p
g+p−1
(g + 2p) g + p
e1 (p) = g
e0 (0) +
e1 (0),
p−1
(g + p)
p
g+p−2
g(g + 1) g + p − 1
e0 (0) + (g + 1)
e1 (0)
e2 (p) =
2
p−2
p−2
g+p
(p − 1)g g + p + 1
e2 (0) +
−
e2 (1),
(g + p)
p
p−1
g(g + 1)(g + 2) g + p − 1
(g + 1)(g + 2) g + p − 1
e3 (p) =
e0 (0) −
e1 (0)
6
2
p−3
p−2
g+p
p(p − 1)(g + 2) g + p + 1
−
e2 (0) + (g + 2)
e2 (1)
(g + p)
p−2
p−2
(g + 2p) g + p
(p − 1)(g + 2p) g + p + 1
e3 (0) +
e3 (1).
+
(g + p)
(g + 2) p − 1
p
14
Notice that these formulas remains valid for the case of any scheme X ⊆ Pn that is locally a
complete intersection in dimension > dim X − 3.
As a first guess, one may hope that, at least with some strong hypotheses on X, the Hilbert
polynomial of the powers are determined by the Hilbert polynomial of X. This is even not true for
complete intersections, due to the following computation.
Suppose that X is a global complete intersection of codimension g and denote by σ1 , . . . , σg
the symmetric functions on the degrees of the defining equations of X. Setting
α1 = σ1 − g,
α2 = σ12 − 2σ2 − g,
α3 = σ13 − 3σ1 σ2 + 3σ3 − g,
one gets,
e0 (0) = σg ,
σg
e1 (0) =
α1 ,
2
σg
(3α21 − 6α1 + α2 ),
e2 (0) =
24
σg 3
(α − 6α21 + 8α1 + α1 α2 − 2α2 ).
e3 (0) =
48 1
Notice that these formulas imply that e3 (0), the fourth coefficient of the Hilbert polynomial, is a
rational function of the first three :
Remark 2.6 If ei denotes the i-th coefficient of the Hilbert polynomial of a global complete
intersection of dimension at least 3 in a projective space, then
e3 = e2 −
e1 e2
e1
e2
e3
+
− 1 + 12 .
e0
6
2e0
3e0
Now, using the expansion
td1 + · · · + tdg = g + (g + α1 )(t − 1) + (α2 − α1 )
(t − 1)2
(t − 1)3
+ (α3 − 3α2 + 2α1 )
+ ···,
2
6
one can compute the coefficients ei (1) for 1 6 i 6 3. The only place where α3 appears is in
σ
e3 (1) = 6g α3 + · · ·.
If one chooses two collections of degrees such that the first, second and 4-th symmetric functions are equal but the third one differs, one gets an example of two complete intersections of
dimesion three in P7 having the same Hilbert polynomials (but distinct Hilbert functions !) such
that the constant term of the Hilbert polynomials of their conormal bundle are distinct. Such examples were given to us by Benjamin de Weger, the two “smallest” ones are (1,6,7,22)-(2,2,11,21)
and (2,6,7,15)-(3,3,10,14). He also gave an infinite collection of them, and Noam Elkies gave a
rational parametrization of all the solutions (after a linear change of coordinates the solutions are
parametrized by a quadric in P5 ).
15
2.3 The degree of the residual
Let us suppose that the projective scheme X of dimension D is locally a complete intersection
in codimension at most s, and use our formulas and the above computations to derive the degree
of the codimension s part of an s-residual intersection.
We will treat the cases where δ = s − g is less or equal to three. As before σi stands for the i-th
Pp
symmetric function on d1 , . . . , ds . We will also set, to simplify some formulas, e′i (p) = j=0 ei (j),
p
which is the i-th coefficient of the Hilbert polynomial R/IX
.
• If δ = 0, eD
0 (R/R) = σs − e0 (0) (Bézout).
• If δ = 1, e0D−1 (R/R) = σs − (σ1 − g)e0 (0) + 2e1 (0), as proved by Stückrad in [18].
• If δ = 2, using the Taylor expansion of σ1 (td1 , . . . , tds ),
(t − 1)2
2
(t − 1)3
+ ···,
+ (σ13 − 3σ12 + 2σ1 − 3σ2 (σ1 − 2) + 3σ3 )
6
σ1 (td1 , . . . , tds ) = s + σ1 (t − 1) + (σ12 − σ1 − 2σ2 )
one recovers the formula given by Huneke and Martin in [16],
e0D−2 (R/R)
g+1
= σs − σ3 − gσ2 +
e0 (0) + (2σ1 − (g + 1))e1 (0) + (g + 1)e2 (0) − e′2 (1).
1
• If δ = 3, using the following Taylor expansion,
s(s − 1)
(t − 1)2
+ (s − 1)σ1 (t − 1) + ((s − 1)(σ12 − σ1 − 2σ2 ) + 2σ2 )
2
2
(t − 1)3
+ ···
+ ((s − 1)(σ13 − 3σ12 + 2σ1 ) − 3(s − 2)σ2 (σ1 − 2) + 3(s − 4)σ3 )
6
σ2 (td1 , . . . , tds ) =
one gets from Theorem 1.4,
e0D−3 (R/R)
g+1
g+2
= σs − σ3 − gσ2 +
σ1 −
e0 (0) − (2σ2 − (g + 1)σ1 )e1 (0)
2
3
+ ((g + 1)σ1 − (g + 2)(g + 3))e2 (0) − (σ1 − (g + 2))e′2 (1) + 2(g + 1)e3 (0) + 2e′3 (1).
3. Applications to secant varieties
Theorem 3.1. Let k be a perfect field, X ⊂ PN
k an eqidimensional subscheme of dimension
two with at most isolated licci Gorenstein singularities, A its homogeneous coordinate ring, ω := ωA
the canonical module, and Ω := ΩA/k the module of differentials.
(a) One has
e0 (A)2 + 14e0 (A) − 16e1 (A) + 4e2 (A) > e2 (ω ⊗A ω) + e2 (Ω).
16
(b) In case the singularities of X have embedding codimension at most two, then equality holds
in (a) if and only if the secant variety of X is deficient, i.e.
dim Sec(X) < 5.
Proof. We may assume that k is infinite. We define the ring R and the R-ideal I via the exact
sequence
mult
0 −→ I −→ R := A ⊗k A −→ A −→ 0.
Recall that Ω ≃ I/I 2 . The ring R is a standard graded k-algebra of dimension 6 with ωR = ω ⊗k ω
and codim N G(R) > 2. The ideal I has height 3, and is generated by linear forms. Moreover, I
satisfies G5 and, in the setting of (b), even G6 . Indeed, for any p ∈ V (I), one has µ(Ip ) = µ(Ωp ) 6
ecodim(Ap ) + dim A 6 dim Rp if dim Rp 6 4 or, in the setting of (b), dim Rp 6 5. In addition, for
every p ∈ V (I) with dim Rp 6 5, we have depth (I/I 2 )p = depth Ωp > dim Ap − 1. To see this, we
write Ap ≃ S/B with S a regular local ring and B a licci Gorenstein ideal. This is possible because
Ap is licci and Gorenstein. By [4, 6.2.11 and 6.2.12] the module B/B2 is Cohen-Macaulay. Thus
the natural complex
0 → B/B2 → ΩS/k ⊗S Ap ≃ ⊕Ap → ΩAp /k ≃ Ωp → 0
is exact and shows that depth Ωp > dim Ap − 1.
Now let A be an R-ideal generated by 5 general linear forms in I. Notice that the five general
linear forms in I that generate A are a weak R-regular sequence off V (I), hence off V (A). Since
codim N G(R) > 0 and codim N G(R) ∩ V (I) > 5 it follows that codim N G(R) ∩ V (A) > 5. By [2,
1.4] one has ht (A : I) > 5 as I satisfies G5 , and ht (I + (A : I)) > 6 in (b) as I is G6 . Thus in the
setting of (b), [19] shows that ht (A : I) > 6 if and only if the analytic spread ℓ(I) is at most 5.
On the other hand dim Sec(X) = ℓ(I) − 1 according to [17]. Hence dim Sec(X) < 5 if and only if
e10 (I/A) = 0.
We now apply Theorem 1.9(a) with r = s = 5 and g = 3. The theorem yields
(1)
e10 (I/A) = e0 (R) − e2 (A) −
P2
j=1
P2
j+k 5
k=0 (−1)
j+3
6+j−k
2−k
ek (ωR /I j ωR ).
Thus the present theorem follows once we have shown that the right hand side of (1) equals
(2)
e0 (A)2 + 14e0 (A) − 16e1 (A) + 4e2 (A) − e2 (ω ⊗A ω) − e2 (Ω).
From [5, IX 2.1] one obtains the isomorphisms of R-modules
ωR /IωR ∼
= ωR ⊗R R/I ∼
= (ω ⊗k ω) ⊗A⊗k A A ∼
= ω ⊗A (ω ⊗A A) ∼
= ω ⊗A ω
and, since codim N G(R) ∩ V (I) > 5,
IωR /I 2 ωR ∼
= (ω ⊗k ω) ⊗A⊗k A Ω ∼
= ωR ⊗R I/I 2 ∼
= ω ⊗A (ω ⊗A Ω) ∼
= (ω ⊗A ω) ⊗A Ω.
5
Therefore the right hand side of (1) becomes
(3)
e0 (A)2 − 7e0 (A) − e2 (A) − 23e1 (ω ⊗2 ) + 4e2 (ω ⊗2 ) + 7e1 (ω ⊗2 ⊗ Ω) − e2 (ω ⊗2 ⊗ Ω).
17
Here and in what follows tensor products are taken over the ring A.
We are now going to express the Hilbert coefficients e1 (ω ⊗2 ), e1 (ω ⊗2 ⊗ Ω) and e2 (ω ⊗2 ⊗ Ω) in
terms of the Hilbert coefficients of A, e2 (ω ⊗2 ) and e2 (Ω). First notice that for any finitely generated
graded A-module M ,
(4)
ei (M (−1)) = ei (M ) + ei−1 (M ).
Hence, by Lemma 1.7 and Remark 1.8,
(5)
e1 (ω) = 3e0 (A) − e1 (A) and
e2 (ω) = 3e0 (A) − 2e1 (A) + e2 (A).
Since ω is free of rank 1 locally in codimension 1, there is a complex of graded A-modules
(6)
0 −→ Z −→ A(−a)2 −→ ω −→ 0
for some a ≫ 0, that is exact in codimension 1. It induces complexes
(7)
0 −→ Z ⊗ A(−ja + a)j −→ A(−ja)j+1 −→ Symj (ω) ∼
= ω ⊗j −→ 0
1
that are likewise exact locally in codimension 1. Now (6) yields e1 (Z) = 2e1 (A(−a)) − e1 (ω) and
then (4), (5) and (7) show that for every j > 0,
(8)
e1 (ω ⊗j ) = 3je0 (A) − (2j − 1)e1 (A).
Now, we treat the first Hilbert coefficient of ω ⊗2 ⊗ Ω. Since ω is free of rank 1 locally in
∼
codimension 2, we also have ω ∗ −→ HomA (ω ⊗2 , ω), which by Lemma 1.7 and Remark 1.8 gives
2
(9)
e1 (ω ∗ ) = 3e0 (ω ⊗2 ) − e1 (ω ⊗2 ) and e2 (ω ∗ ) = 3e0 (ω ⊗2 ) − 2e1 (ω ⊗2 ) + e2 (ω ⊗2 ).
Furthermore,
(10)
∼
∼
2
2
ω ⊗2 ⊗ ω ∗ −→ HomA (ω, ω ⊗2 ) ←− ω.
As Ω is free of rank 3 locally in codimension 1, there is an exact sequence of graded A-modules
0 −→ A(−1)2 −→ Ω −→ C −→ 0
where C is free of rank 1 locally in codimension 1. Thus
C⊗
which gives a complex
2
^
∼
2
(A(−1) ) −→
1
3
^
∼
Ω −→ ω,
1
0 −→ A(−1)2 −→ Ω −→ ω(2) −→ 0
that is exact in codimension 1. Tensoring with ω ⊗2 we obtain
0 −→ ω ⊗2 (−1)2 −→ ω ⊗2 ⊗ Ω −→ ω ⊗3 (2) −→ 0.
18
Since this complex is exact in codimension 1, (4) and (8) imply that
(13)
e1 (ω ⊗2 ⊗ Ω) = 21e0 (A) − 11e1 (A).
Next, we turn to the second Hilbert coefficient of ω ⊗2 ⊗ Ω. Write —∗ := HomA (—, A) and
e := N − 2. Increasing N if needed, we may assume e > 2. We define a graded A-module E via
the exact sequence
(14)
0 −→ E −→ A(−1)e+3 −→ Ω −→ 0.
Notice that E has rank e, and is free locally in codimension 1 and Cohen-Macaulay locally in
codimension 2. Futhermore (14) gives
(15)
V3
Ve
∼
∼
( E)∗∗ −→ ( Ω)∗ (−e − 3) ←− ω ∗ (−e − 3).
2
2
As E ∗ is free locally in codimension 1 and rk E ∗ − 1 > 1, there exists a homogeneous element
f ∈ E ∗ of degree c ≫ 0 whose order ideal (E ∗ )∗ (f ) has height at least 2 (see [8]). However,
the ideals E ∗∗ (f ) and J := f (E) coincide locally in codimension 1 since E is reflexive locally in
codimension 1. Hence ht J = ht E ∗∗ (f ) > 2. The map f induces an exact sequence of graded
A-modules
0 −→ Ee−1 −→ Ee := E −→ Je (ce ) := J(c) −→ 0.
Repeating this procedure, if needed, we obtain a filtration
(16)
E1 ⊂ E2 ⊂ · · · ⊂ Ee
with
Ei /Ei−1 ∼
= Ji (ci ),
where Ji are homogeneous A-ideals of height at least 2. Thus Ei has rank i, is free in codimension
1 and Cohen-Macaulay in codimension 2, and
i−1
^
(
∼
i−1
^
Ei−1 )∗∗ (ci ) ←− (
2
i
^
∼
Ei−1 )∗∗ ⊗ (Ji (ci ))∗∗ −→ ( Ei )∗∗ .
2
Since E1 is reflexive locally in codimension 2, it follows that
e
e
X
^
∼
E1 −→ E1∗∗ ∼
ci ),
= ( E)∗∗ (−
2
2
i=2
which together with (15) implies
(17)
Pe
E1 ∼
= ω ∗ (−e − 3 − i=2 ci ).
2
The exact sequence
0 −→ Ji (ci ) −→ A(ci ) −→ (A/Ji )(ci ) −→ 0
yields a complex
0 −→ ω ⊗2 ⊗ Ji (ci ) −→ ω ⊗2 (ci ) −→ (ω ⊗2 /ω ⊗2 Ji )(ci ) −→ 0
19
that is exact in codimension 2. Since ht Ji > 2 and ω ⊗2 is free of rank 1 locally in codimension 2,
it follows that e10 ((A/Ji )(ci )) = e10 ((ω ⊗2 /ω ⊗2 Ji )(ci )). We conclude
(18)
e2 (Ji (ci )) − e2 (ω ⊗2 ⊗ Ji (ci )) = e2 (A(ci )) − e2 (ω ⊗2 (ci )).
Tensoring (14) and (16) with ω ⊗2 and using (18) and (17) we obtain
e2 (ω ⊗2 ⊗ Ω) − e2 (Ω) = e2 (ω ⊗2 (−1)e+3 ) − e2 (A(−1)e+3 ) +
e
X
(e2 (A(ci )) − e2 (ω ⊗2 (ci )))
i=2
(19)
+ e2 (ω ∗ (−e − 3 −
e
X
ci )) − e2 (ω 2 ⊗ ω ∗ (−e − 3 −
i=2
e
X
ci )).
i=2
Combining (19) with (4), (8), (9), (10), (5), we deduce
(20)
e2 (ω ⊗2 ⊗ Ω) = −12e0 (A) + 8e1 (A) − 5e2 (A) + 5e2 (ω ⊗2 ) + e2 (Ω).
Substituting (8), (13), (20) into (3), we conclude that (3) and (2) coincide.
Corollary 3.2. Let k be a perfect field, X ⊂ P4k an equidimensional subscheme of dimension
two with at most isolated Gorenstein singularities and A its homogeneous coordinate ring. One
has
e0 (A)2 + 14e0 (A) − 16e1 (A) + 4e2 (A) = e2 (ωA ⊗A ωA ) + e2 (ΩA/k ).
Remark. The inequality in Theorem 3.1 can be replaced by
∗
e0 (A)2 + 5e0 (A) − 10e1 (A) + 4e2 (A) > e2 (ωA
) + e2 (ΩA/k ).
Proof. Use equalities (9) and (8) in the proof of Theorem 3.1.
Corollary 3.3. Let k be a field, X ⊂ PN
k an equidimensional smooth subscheme of dimension
two, H the class of the hyperplane section, K the canonical divisor, and c2 the second Chern class
of the cotangent bundle of X. One has
(H 2 )2 > 10H 2 + 5HK + K 2 − c2 ,
and equality holds if and only if dim Sec(X) < 5.
Proof. The Riemannn-Roch theorem in dimension two gives
χ(X, E) =
1
[c1 (E)2 − 2c2 (E) − c1 (E)KX ] + rk Eχ(X, OX ).
2
If D is a divisor this equality specializes to
1 2 2
1
1
H n + (DH − KH)n + (D 2 − KD) + χ(X, OX )
2
2
2
n+1
n
+
2
1
2
2
=H
− (3H + KH − 2DH)
1
2
2
1 2
+ (H + KH − 2DH − KD + D 2 ) + χ(X, OX ).
2
χ(D + nH) =
20
For a rank two vector bundle E the formula reads
1
χ(E + nH) = H 2 n2 + (c1 (E)H − KH)n + (c1 (E)2 − Kc1 (E)) − c2 (E) + 2χ(X, OX )
2
n
+
2
n+1
2
2
= 2H
− (3H + KH − c1 (E)H)
2
1
1
1
+ H 2 + KH − c1 (E)H − Kc1 (E) + c1 (E)2 − c2 (E) + 2χ(X, OX ).
2
2
Taking D = 0 we obtain
e0 (OX ) = H 2
3
e1 (OX ) = H 2 +
2
1
e2 (OX ) = H 2 +
2
and for D = 2K
⊗2
e0 (ωX
) = H2
3
⊗2
e1 (ωX
) = H2 −
2
1
⊗2
e2 (ωX
) = H2 −
2
1
KH
2
1
KH + χ(X, OX ),
2
3
KH
2
3
KH + K 2 + χ(X, OX ).
2
Finally, taking E = ΩX , the cotangent sheaf of X, and using the fact that c1 (ΩX ) = K we deduce
e0 (ΩX ) = 2H 2
e1 (ΩX ) = 3H 2
e2 (ΩX ) = H 2 − c2 (ΩX ) + 2χ(X, OX ).
Now the assertion of the remark follows from the Theorem since ei (A) = ei (OX ), ei (ω) =
ei (ωX ) and ei (Ω) = ei (ΩX ) + ei (OX ).
Theorem 3.4. Let k be a field, X ⊂ PN
k an equidimensional smooth subscheme of dimension
three, H the class of the hyperplane section, K the canonical divisor, and c2 and c3 the second and
third Chern class of the cotangent bundle of X. One has
(H 3 )2 6 35H 3 − 11H 2 K − 9K 2 H + c2 H − K 3 −
1
1
Kc2 + c3 ,
12
2
and equality holds if and only if dim Sec(X) < 7.
Proof. We use the notation of Theorem 3.1, taking A to be generated by 7 general linear forms
in the ideal I of the diagonal. Recall that dim Sec(X) < 7 if and only if ht(A : I) > 8.
We will apply Theorem 1.9 (a) with r = s = 7 and g = 4. Because X is smooth we have
IωR /I 2 ωR ∼
= ω2 ⊗ Ω
7
I ωR /I ωR ∼
= ω 2 ⊗ S2 Ω.
2
3
7
21
As X is smooth, we can apply the Riemann-Roch formula as in the proof of Corollary 3.3,
to derive the following formulas, which express the Hilbert coefficients used in Theorem 1.9(a) in
terms of the numbers that appear in our desired formula:
e0 (A) = H 3
e1 (A) = 2H 3 − 23 KH 2
1
e2 (A) = 12
(14H 3 + 9KH 2 + K 2 H + c2 H)
1
(4H 3 + 6KH 2 + 2K 2 H + 2c2 H + Kc2 )
e3 (A) = 24
e0 (Ω) = 4H 3
e1 (Ω) = 8H 3 + KH 2
e2 (Ω) = 61 (28H 3 + 9KH 2 + 2K 2 H − 4c2 H)
1
(8H 3 + 6KH 2 + 4K 2 H − 8c2 H + Kc2 − 6c3 )
e3 (Ω) = 12
e0 (ω ⊗2 ) = H 3
e1 (ω ⊗2 ) = 2H 3 − 32 KH 2
1
(14H 3 − 27KH 2 + 13K 2 H + c2 H)
e2 (ω ⊗2 ) = 12
1
e3 (ω ⊗2 ) = 24
(4H 3 − 18KH 2 + 26K 2 H + 2c2 H − 12K 3 − 3Kc2 )
e0 (ω ⊗2 ⊗ Ω) = 4H 3
e1 (ω ⊗2 ⊗ Ω) = 8H 3 − 7KH 2
e2 (ω ⊗2 ⊗ Ω) = 61 (28H 3 − 63KH 2 + 38K 2 H − 4c2 H)
1
e3 (ω ⊗2 ⊗ Ω) = 12
(8H 3 − 42KH 2 + 76K 2 H − 8c2 H − 48K 3 + 17Kc2 − 6c3 )
e0 (ω ⊗2 ⊗ S2 Ω) = 10H 3
e1 (ω ⊗2 ⊗ S2 Ω) = 20H 3 − 19KH 2
e2 (ω ⊗2 ⊗ S2 Ω) = 61 (70H 3 − 171KH 2 + 119K 2 H − 25c2 H)
1
(20H 3 − 114KH 2 + 238K 2 H − 50c2 H − 186K 3 + 125Kc2 − 42c3 )
e3 (ω ⊗2 ⊗ S2 Ω) = 12
Corollary 3.5. Let k be a perfect field, X ⊂ PN
k an equidimensional smooth subscheme of
dimension three, A its homogeneous coordinate ring, ω := ωA the canonical module, and Ω := ΩA/k
the module of differentials. One has
e0 (A)2 + 391e0 (A) − 246e1 (A) + 66e2 (A) + 50e3 (A) > 18e2 (ω ⊗A ω) − 2e3 (Ω) − 2e3 (ω ⊗A ω)
and equality holds if and only if dim Sec(X) < 7.
Proof. Use the formulas given in Theorem 3.4 to express all the necessary Hilbert coefficients
in terms of e0 , . . . , e3 .
Remark 3.6. If H is the class of the hyperplane section, K the canonical divisor, D = H 3
the degree of X, the above inequality is equivalent to:
D 2 > 7(5D + 3KH 2 + K 2 H − c2 (ΩX )H) − 2c2 (ΩX )K + K 3 + c3 (ΩX ).
22
In other words, if C and S are respectively a curve and a surface obtained by taking general linear
sections of X, the formula reads
3
D 2 > 7(5D + 3χC + 12χ(OS ) − 2χS ) − 48χ(OX ) + KX
+ χX .
References
[1] R. Apéry, Sur les courbes de première espèce de l’espace à trois dimensions, C. R. Acad.
Sci. Paris, t. 220, Sér. I, p. 271–272, 1945.
[2] M. Artin and M. Nagata, Residual intersections in Cohen-Macaulay rings, J. Math. Kyoto
Univ. 12 (1972), 307–323.
[3] L. Avramov and J. Herzog, The Koszul algebra of a codimension 2 embedding, Math. Z.
175 (1980), 249–280.
4] R. Buchweitz, Contributions à la théorie des singularités, These d’Etat, Université Paris 7,
1981. Available at https://tspace.library.utoronto.ca/handle/1807/16684.
[5] H. Cartan and S. Eilenberg, Homological Algebra, Princeton University Press, Princeton,
NJ.
[6] M. Chardin, D. Eisenbud, and B. Ulrich Hilbert functions and residually S2 ideals, Compositio 125 (2001), 193–219.
[7] C. Cumming, Residual intersections in Cohen-Macaulay rings. J. Algebra 308 (2007), no.
1, 91–106.
[7a] M. Dale, Severi’s theorem on the Veronese-surface. J. London Math. Soc. 32 (1985)
419–425.
[8] D. Eisenbud and E. G. Evans, Generating modules efficiently: theorems from algebraic
K-theory. J. Algebra (1973), 278–305.
[9] F. Gaeta, Quelques progrès récents dans la classification des variétés algébriques d’un espace
projectif, Deuxième Colloque de Géometrie Algébrique, Liège, 1952.
[10] S. H. Hassanzadeh, Cohen-Macaulay residual intersections and their Castelnuovo-Mumford
regularity. Trans. Amer. Math. Soc. 364 (2012) 6371–6394.
[11] J. Herzog, Komplexe, Auflösungen und Dualität in der lokalen Algebra. Habilitationsschrift (1974).
[12] J. Herzog, A. Simis, and W.V. Vasconcelos, Koszul homology and blowing-up rings, in
Commutative Algebra, eds. S. Greco and G. Valla, Lecture Notes in Pure and Appl. Math. 84,
Marcel Dekker, New York, 1983, 79–169.
[13] J. Herzog, W.V. Vasconcelos, and R. Villarreal, Ideals with sliding depth, Nagoya Math.
J. 99 (1985), 159–172.
23
[14] C. Huneke, Linkage and Koszul homology of ideals, Amer. J. Math. 104 (1982), 1043–
1062.
[15] C. Huneke, Strongly Cohen-Macaulay schemes and residual intersections, Trans. Amer.
Math. Soc. 277 (1983), 739–763.
[16] C. Huneke and H. Martin, Residual Intersection and the Number of Equations Defining
Projective Varieties, Comm. Algebra 23 (1995), no. 6, 2345–2376.
[17] A. Simis and B. Ulrich, On the ideal of an embedded join. J. Algebra 226 (2000), no. 1,
114.
[18] J. Stückrad, On quasi-complete intersections, Arch. Math. 58 (1992), 529–538.
[19] B. Ulrich, Remarks on residual intersections, in Free Resolutions in Commutative Algebra
and Algebraic Geometry, Sundance 1990, eds. D. Eisenbud and C. Huneke, Res. Notes in Math.
2, Jones and Bartlett Publishers, Boston-London, 1992, 133–138.
[20] B. Ulrich, Artin-Nagata properties and reductions of ideals, Contemp. Math. 159 (1994),
373–400.
[21] J. Watanabe, A note on Gorenstein rings of embedding codimension three, Nagoya Math.
J. 50 (1973), 227–232.
Marc Chardin, Institut de Mathématiques, CNRS & Université Pierre et Marie Curie
[email protected]
David Eisenbud, Department of Mathematics, University of California, Berkeley
[email protected]
Bernd Ulrich, Department of Mathematics, Purdue University,
[email protected]
24
| 0math.AC
|
Under review as a conference paper at ICLR 2018
A C LASSIFICATION –BASED P ERSPECTIVE ON
GAN D ISTRIBUTIONS
arXiv:1711.00970v3 [cs.LG] 19 Nov 2017
Shibani Santurkar, Ludwig Schmidt, Aleksander Madry
˛
Massachusetts Institute of Technology
{shibani,ludwigs,madry}@mit.edu
A BSTRACT
A fundamental, and still largely unanswered, question in the context of Generative Adversarial Networks (GANs) is whether GANs are actually able to capture
the key characteristics of the datasets they are trained on. The current approaches
to examining this issue require significant human supervision, such as visual inspection of sampled images, and often offer only fairly limited scalability. In this
paper, we propose new techniques that employ a classification–based perspective
to evaluate synthetic GAN distributions and their capability to accurately reflect
the essential properties of the training data. These techniques require only minimal human supervision and can easily be scaled and adapted to evaluate a variety
of state-of-the-art GANs on large, popular datasets. Our analysis indicates that
GANs have significant problems in reproducing the more distributional properties
of the training dataset. In particular, when seen through the lens of classification,
the diversity of GAN data is orders of magnitude less than that of the original data.
1
I NTRODUCTION
Generative Adversarial Networks (GANs) (Goodfellow et al., 2014) have garnered a significant
amount of attention due to their ability to learn generative models of multiple natural image datasets
(Radford et al., 2015; Denton et al., 2015; Zhang et al., 2016). Since their conception, a fundamental
question regarding GANs is to what extent they truly learn the underlying data distribution. This
is a key issue for multiple reasons. From a scientific perspective, understanding the capabilities of
common GANs can shed light on what precisely the adversarial training setup allows the GAN to
learn. From an engineering standpoint, it is important to grasp the power and limitations of the
GAN framework when applying it in concrete applications. Due to the broad potential applicability
of GANs, researchers have investigated this question in a variety of ways.
When we evaluate the quality of a GAN, an obvious first check is to establish that the generated
samples lie in the support of the true distribution. In the case of images, this corresponds to checking
if the generated samples look realistic. Indeed, visual inspection of generated images is currently
the most common way of assessing the quality of a given GAN. Individual humans can performs
this task quickly and reliably, and various GANs have achieved impressive results for generating
realistic-looking images of faces and indoor scenes (Salimans et al., 2016; Denton et al., 2015).
Once we have established that GANs produce realistic-looking images, the next concern is that the
GAN might simply be memorizing the training dataset. While this hypothesis cannot be ruled out
entirely, there is evidence that GANs perform at least some non-trivial modeling of the unknown
distribution. Previous studies show that interpolations in the latent space of the generator produce
novel and meaningful image variations (Radford et al., 2015), and that there is a clear disparity
between generated samples and their nearest neighbors in the true dataset (Arora & Zhang, 2017).
Taken together, these results provide evidence that GANs could constitute successful distribution
learning algorithms, which motivates studying their distributions in more detail. The direct approach
is to compare the probability density assigned by the generator with estimates of the true distribution
(Wu et al., 2016). However, in the context of GANs for high-dimensional image distributions, this
is complicated by two factors. First, GANs do not naturally provide probability estimates for their
samples. Second, estimating the probability density of the true distribution is a challenging problem
1
Under review as a conference paper at ICLR 2018
itself (the adversarial training framework specifically avoids this issue). Hence prior work has only
investigated the probability density of GANs on simple datasets such as MNIST (Wu et al., 2016).
Since reliably computing probability densities in high dimensions is challenging, we can instead
study the behavior of GANs in low-dimensional problems such as two-dimensional Gaussian mixtures. Here, a common failure of GANs is mode collapse, wherein the generator assigns a disproportionately large mass to a subset of modes from the true distribution (Goodfellow, 2016). This raises
concerns about a lack of diversity in the synthetic GAN distributions, and recent work shows that
the learned distributions of two common GANs indeed have (moderately) low support size for the
CelebA dataset (Arora & Zhang, 2017). However, the approach of Arora & Zhang (2017) heavily
relies on a human annotator in order to identify duplicates. Hence it does not easily scale to comparing many variants of GANs or asking more fine-grained questions than collision statistics. Overall,
our understanding of synthetic GAN distributions remains blurry, largely due to the lack of versatile
tools for a quantitative evaluation of GANs in realistic settings. The focus of this work is precisly to
address this question:
Can we develop principled and quantitative approaches to study synthetic GAN distributions?
To this end, we propose two new evaluation techniques for GAN distributions. Our methods are
inspired by the idea of comparing moments of distributions, which is at the heart of many methods in classical statistics. Although simple moments of high-dimensional distributions are often not
semantically meaningful, we can extend this idea to distributions of realistic images by leveraging
image statistics identified using convolutional neural networks. In particular, we train image classifiers in order to construct test functions corresponding to semantically meaningful properties of the
distributions. An important feature of our approach is that it requires only light human supervision
and can easily be scaled to evaluating many GANs and large synthetic datasets.
Using our new evaluation techniques, we study five state-of-the-art GANs on the CelebA and LSUN
datasets, arguably the two most common testbeds for advanced GANs. We find that most of the
GANs significantly distort the relative frequency of even basic image attributes, such as the hair
style of a person or the type of room in an indoor scene. This clearly indicates a mismatch between
the true and synthetic distributions. Moreover, we conduct experiments to explore the diversity of
GAN distributions. We use synthetic GAN data to train image classifiers and find that these have
significantly lower accuracy than classifiers trained on the true data set. This points towards a lack
of diversity in the GAN data, and again towards a discrepancy between the true and synthetic distributions. In fact, our additional examinations show that the diversity in GANs is only comparable to
a subset of the true data that is 100× smaller.
2
U NDERSTANDING GAN S THROUGH THE L ENS OF C LASSIFICATION
When comparing two distributions, a common first test is to compute low-order moments such as
the mean and the variance. If the distributions are simple enough, these quantities provide a good
understanding for how similar they are. Moreover, low-order moments have a precise definition and
are usually quick to compute. On the other hand, low-order moments can also be misleading for
more complicated, high-dimensional distributions. As a concrete example, consider a generative
model of digits (such as MNIST). If a generator produces digits that are shifted by a significant
amount yet otherwise perfect, we will probably still consider this as a good approximation of the
true distribution. However, the expectation (mean moment) of the generator distribution can be very
different from the expectation of the true data distribution. This raises the question of what other
properties of high-dimensional image distributions are easy to test yet semantically meaningful.
In the next two subsections, we describe two concrete approaches to evaluate synthetic GAN data
that are easy to compute yet capture relevant information about the distribution. The common theme
is that we employ convolutional neural networks in order to capture properties of the distributions
that are hard to describe in a mathematically precise way, but usually well-defined for a human (e.g.,
what fraction of the images shows a smiling person?). Automating the process of annotating images
with such high-level information will allow us to study various aspects of synthetic GAN data.
2.1
Q UANTIFYING M ODE C OLLAPSE
Mode collapse refers to the tendency of the generator to concentrate a large probability mass on a
few modes of the true distribution. While there is ample evidence for the presence of mode-collapse
2
Under review as a conference paper at ICLR 2018
in GANs (Goodfellow, 2016; Arora & Zhang, 2017; Metz et al., 2016), elegant visualizations of this
phenomena are somewhat restricted to toy problems on low-dimensional distributions (Goodfellow,
2016; Metz et al., 2016). For image datasets, it is common to rely on human annotators and therein
derived heuristics (see Section 2.3). While these methods have their merits, they are restrictive both
in the scale and granularity of testing. Here we propose a classification-based tool to assess how
good GANs are at assigning the right mass across broad concepts/modes. To do so, we use a trained
classifier as an expert “annotator” that labels important features in synthetic data, and then analyze
the resulting distribution. Specifically, our goal is to investigate if a GAN trained on a well-balanced
dataset (i.e., contains equal number of samples from each class) can learn to reproduce this balanced
N
structure. Let D = (X, Y ) = {(xi , yi )}i=1 represent a dataset of size N with C classes, where
(xi , yi ) denote an image-label pair drawn from true data. If the dataset D is balanced, it contains
N/C images per class. The procedure for computing class distribution in synthetic data is:
1. Train an annotator (a multi-class classifier) using the dataset D.
2. Train an unconditional GAN on the images X from dataset D, without using class labels.
3. Create a synthetic dataset by sampling N images from a GAN and labeling them using the
annotator from Step 1.
The annotated data generated via the above procedure can provide insight into the GAN’s class
distribution at the scale of the entire dataset. Moreover, we can vary the granularity of mode analysis
by choosing richer classification tasks, i.e., more challenging classes or a larger number of them. In
Section 3.3, we use this technique to visualize mode collapse in several state-of-the-art GANs on the
CelebA and LSUN datasets. All the studied GANs show significant mode collapse and the effect
becomes more pronounced when the granularity of the annotator is increased (larger number of
classes). We also investigate the temporal aspect of the GAN setup and find that the dominant mode
varies widely over the course of training. Our approach also enables us to benchmark and compare
GANs on different datasets based on the extent of mode collapse in the learned distributions.
2.2
M EASURING DIVERSITY
Our above method for inspecting distribution of modes in synthetic data provides a coarse look at the
statistics of the underlying distribution. While the resulting quantities are semantically meaningful,
they capture only simple notions of diversity. To get a more holistic view on the sample diversity
in the synthetic distribution, we now describe a second classification-based approach for evaluating
GAN distributions. The main question that motivates it is: Can GANs recover the key aspects of
real data to enable training a good classifier? We believe that this is an interesting measure of sample diversity for two reasons. First, classification of high-dimensional image data is a challenging
problem, so a good training dataset will require a sufficiently diverse sample from the distribution.
Second, augmenting data for classification problems is one of the proposed use cases of GANs (e.g.,
see the recent work of Shrivastava et al. (2017)).
If GANs are truly able to capture the quality and diversity of the underlying data distribution, we
expect almost no gap between classifiers trained on true data and synthetic data from a GAN. A
generic method to produce data from GANs for classification is to train separate GANs for each
class in the dataset D.1 Samples from these class-wise GANs can then be pooled together to get a
labeled synthetic dataset. Note that the labels are trivially determined based on the class modeled
by the particular GAN from which a sample is drawn. We perform the following steps to assess the
classification performance of synthetic data vs. true data:
1. Train a classifier on the true data D (from Section 2.1) as a benchmark for comparison.
2. Train C separate unconditional GANs, one per class in dataset D.
3. Generate a balanced synthetic labeled dataset of size N by consolidating an equal number of
samples drawn from each of these C GANs. The labels obtained by aggregating samples from
per-class GANs are designated as “default" labels for the synthetic dataset. Note that by design,
both true and synthetic datasets have N samples, with N/C examples per class.
4. Use synthetic labeled data from Step 3 to train classifier with the same architecture as Step 1.
Comparing the classifiers from Steps 1 and 4 can then shed light on the disparity between the two
distributions. Radford et al. (2015) conducted an experiment similar to Step 2 on the MNIST dataset
1
We tried the alternate approach of using class-conditional GANs to get labeled datasets. This method did
not yield good samples since most common GANs have not been designed with a conditional structure in place.
3
Under review as a conference paper at ICLR 2018
using a conditional GAN. They found that samples from their DCGAN performed comparably to
true data on nearest neighbor classification. We obtained similar good results on MNIST, which
could be due to the efficacy of GANs in learning the MNIST distribution or due to the ease of
getting good accuracy on MNIST even with a small training set (Rolnick et al., 2017). To clarify
this question, we restrict our analysis to more complex datasets, specifically CelebA and LSUN.
We evaluate the two following properties in our classification task:
(i) How well can the GANs recover nuances of the decision boundary, which is reflected by how
easily the classifier can fit the training data?
(ii) How does the diversity of synthetic data compare to that of true data when measured by classification accuracy on a hold-out set of true data?
We observe that all the studied GANs have very low diversity in this metric. In particular, the
accuracy achieved by a classifier trained on GAN data is comparable only to the accuracy of a
classifier trained on a 100× (or more) subsampled version of the true dataset. Even if we draw more
samples from the GANs to produce a training set several times larger than the true dataset, there is
no improvement in performance. Looking at the classification accuracy gives us a way to compare
different models on a potential downstream application of GANs. Interestingly, we find that visual
quality of samples does not necessarily correlate with good classification performance.
2.3
R ELATED W ORK
In GAN literature, it is common to investigate performance using metrics that involve human supervision. Arora & Zhang (2017) proposed a measure based on manually counting duplicates in GAN
samples as a heuristic for the support or diversity of the learned distribution. In Wu et al. (2016),
manual classification of a small sample (100 images) of GAN generated MNIST images is used as
a test for the GAN is missing certain modes. Such annotator-based metrics have clear advantages
in identifying relevant failure-modes of synthetic samples, which explains why visual inspection
(eyeballing) is still the most popular approach to assess GAN samples.
There have also been various attempts to build good metrics for GANs that are not based on manual
heuristics. Parzen window estimation can be used to approximate the log-likelihood of the distribution, though it is known to work poorly for high-dimensional data (Theis et al., 2016). Wu et al.
(2016) develop a method to get a better estimate for log-likelihood using annealed importance sampling. Salimans et al. (2016) propose a metric known as Inception Score, where the entropy in the
labels predicted by a pre-trained Inception network is used to assess the diversity in GAN samples.
3
E XPERIMENTS
In the following sub-sections we describe the setup and results for our classification-based GAN
benchmarks. Additional details can be found in Section 5 in the Appendix.
3.1
DATASETS
GANs have shown promise in generating realistic samples, resulting in efforts to apply them to a
broad spectrum of datasets. However, the Large-scale CelebFaces Attributes (CelebA) (Liu et al.,
2015) and Large-Scale Scene Understanding (LSUN) (Yu et al., 2015) datasets remain the most
popular and canonical ones in developing and evaluating GAN variants. Conveniently, these datasets
also have rich annotations, making them particularly suited for our classification–based evaluations.
Details on the setup for classification tasks for these datasets are given in the Appendix.
3.2
M ODELS
Using our framework, we perform a comparative study of several popular variants of GANs:
1. Deep Convolutional GAN (DCGAN): Convolutional GAN trained using a Jensen–Shannon
divergence–based objective (Goodfellow et al., 2014; Radford et al., 2015).
2. Wasserstein GAN (WGAN): GAN that uses a Wasserstein distance–based objective (Arjovsky
et al., 2017).
3. Adversarially Learned Inference (ALI): GAN that uses joint adversarial training of generative
and inference networks (Dumoulin et al., 2017).
4
Under review as a conference paper at ICLR 2018
Female
+
Mouth Closed
True Data
DCGAN
WGAN
ALI
BEGAN
Improved GAN
Female
+
Mouth Open
Male
+
Mouth Closed
Male
+
Mouth Open
4-class dataset from CelebA for attributes Male, Mouth open.
Figure 1: Illustration of a dataset used in the proposed classification benchmarks. Shown alongside
are images sampled from various unconditional GANs trained on this dataset. Labels for the GAN
samples are obtained using a pre-trained classifier as an annotator.
4. Boundary Equilibrium GAN (BEGAN): Auto-encoder style GAN trained using Wasserstein distance objective (Berthelot et al., 2017).
5. Improved GAN (ImGAN): GAN that uses semi-supervised learning (labels are part of GAN
training), with various other architectural and procedural improvements (Salimans et al., 2016).
All the aforementioned GANs are unconditional, however, ImGAN has access to class labels as a
part of the semi-supervised training process. We use standard implementations for each of these
models, details of which are provided in the Appendix (Section 5). We also used the prescribed
hyper-parameter settings for each GAN, including number of iterations we train them for. Our
analysis is based on 64 × 64 samples, which is a size at which GAN generated samples tend to be of
high quality. We also use visual inspection to ascertain that the perceptual quality of GAN samples
in our experiments is comparable to those reported in previous studies. We demonstrate sample
images in Figures 1, 4 and 5. BEGAN did not converge in our experiments on the LSUN dataset
and hence is excluded from the corresponding analysis.
In our study, we use two types of classification models:
1. ResNet: 32-Layer Residual network He et al. (2016). This model is chosen as it is a standard
classifier in vision and yields high accuracy on various datasets, making it a reliable baseline.
2. Linear Model: This is a network with one-fully connected layer between the input and output (no
hidden layers) with a softmax non-linearity. If the dimensions of input x and output ŷ, are D and
C (number of classes) respectively, then linear models implement the function ŷ = σ(W T x+b),
where W is a D × C matrix, b is a C × 1 vector and σ(·) is the softmax function. Due to it’s
simplicity, this model will serve as a useful baseline in some of our experiments.
We always train the classifiers to convergence, with decaying learning rate and no data augmentation.
3.3
E XAMINATION OF M ODE C OLLAPSE
Experimental results for quantifying mode collapse through classification tasks, described in Section 2.1, are presented below. Table 1 gives details on datasets (subsets of CelebA and LSUN)
used in our analysis, such as size (N ), number of classes (C), and accuracy of the annotator, i.e.,
a classifier pre-trained on true data, which is then used to label the synthetic, GAN-generated data.
Figure 2 presents class distribution in the synthetic data, as determined by using these annotators.
The left panel compares the relative distribution of modes in true data (uniform) with that in various
GAN-generated datasets. Each of these datasets is created by drawing N samples from the GAN
after it was trained on the corresponding true dataset. The right panel illustrates the evolution of
class distributions in various GANs over the course of training2 .
Results: These visualization lead to the following findings:
2
Temporal evaluation of ALI class distribution is absent in the analysis due to absence of periodic checkpointing provisions in the code.
5
Under review as a conference paper at ICLR 2018
Dataset
CelebA: Makeup, Smiling
CelebA: Male, Mouth Open
CelebA: Bangs, Smiling
LSUN: Bedroom, Kitchen, Classroom
LSUN: Bedroom, Conference Room, Dining Room,
Kitchen, Living Room
N
102,436
115,660
45,196
150,000
250,000
C
4
4
4
3
5
Annotator’s Accuracy (%)
90.9, 92.4
97.9, 93.5
93.9, 92.4
98.7
93.7
Table 1: Details of CelebA and LSUN subsets used for the studies on mode collapse in Section 3.3.
Here, we use a classifier trained on true data as an annotator that let’s us infer label distribution for
the synthetic, GAN-generated data. N is the training set size and C is the number of classes for both
the true and synthetic datasets. Annotator’s accuracy refers to the accuracy of the classifier on a test
set of true data. For CelebA, we use a combination of attribute-wise binary classifiers as annotators
due their higher accuracy compared to a single classifier trained jointly on all the four classes.
CelebA: Makeup, Smiling
CelebA: Male, Mouth Open
CelebA: Bangs, Smiling
LSUN: Bedroom, Kitchen, Classroom
LSUN: Bedroom, Conference Room, Dining Room, Kitchen, Living Room
Figure 2: Visualizations of mode collapse in the synthetic, GAN-generated data produced after training on our chosen subsets of CelebA and LSUN datasets. Left panel shows the relative distribution
of classes in samples drawn from synthetic datasets extracted at the end of the training process, and
compares is to the true data distribution (leftmost plots). On the right, shown is the evolution of analogous class distribution for different GANs over the course of training. BEGAN did not converge
on the LSUN tasks and hence is excluded from the corresponding analysis.
6
Under review as a conference paper at ICLR 2018
• All GANs seem to suffer from significant mode-collapse. This becomes more apparent when the
annotator granularity is increased, by considering a larger set of classes. For instance, one should
compare the relatively balanced class distributions in the 3-class LSUN task to the near-absence
of some modes in the 5-class task.
• Mode collapse is prevalent in GANs throughout the training process, and does not seem to recede
over time. Instead the dominant mode(s) often fluctuate wildly over the course of the training.
• For each task, often there is a common set of modes onto which distinct GANs exhibit collapse.
In addition to viewing our method as an approach to analyze the mode collapse, we can also use it
as a benchmark for GAN comparison. From this perspective, we can observe that ALI consistently
shows lowest mode collapse amongst all the studied GANs. The behavior of the other GANs appears
to vary based on the dataset – on CelebA, DCGAN learns a somewhat balanced distributions, while
WGAN, BEGAN and ImGAN show prominent mode collapse. This is in contrast to the results
obtained LSUN, where, for example, WGAN exhibit relatively small mode collapse, while DCGAN
and ImGAN show significant mode collapse. This points to a general challenge in real world applications of GANs: they often perform well on the datasets they were designed for (e.g. WGAN on
LSUN), but extension to new datasets is not straightforward. Temporal analysis of mode-collapse
shows that there is wide variation in the dominant mode for WGAN and Improved GAN, whereas
for BEGAN, the same mode(s) often dominates the entire training process.
3.4
D IVERSITY E XPERIMENTS
Using the procedure outlined in Section 2.2, we perform a quantitative assessment of sample diversity in GANs on the CelebA and LSUN datasets. We restrict our experiments to binary classification
as we find they have sufficient complexity to highlight the disparity between true and synthetic data.
Results for classification-based evaluation of GANs are presented in Table 2 and Figure 3.
As a preliminary check, we inspect the quality of our labeled GAN datasets. For this, we use
high-accuracy annotators from Section 2.1 to predict labels for GAN generated data and measure
consistency between the predicted and default labels (label correctness). We also inspect confidence
scores, defined as the softmax probabilities for predicted class, of the annotator. The motivation
behind these metrics is that if the classifier can correctly and with high-confidence predict labels
for labeled GAN samples, then it is likely that they are convincing examples of that class, and
hence of good “quality". Empirical results for label agreement and annotator confidence of GAN
generated datasets are shown in Table 2, and Figure 6 in the Appendix. In Table 2, we also report
an equivalent Inception Score (Salimans et al., 2016), similar to that described in Section 2.3. Using
the Inception network to get the label distribution may not be meaningful for face or scene images.
Instead, we compute the Inception Score using the label distribution predicted from the annotator
networks. Score is computed as exp(Ex [KL(p(y|x))||p(y)]), where y refers to label predictions
from the annotators 3 .
Next, we train classifiers using the true and labeled GAN-generated datasets and study their performance in terms of accuracy on a hold-out set of true data. ResNets (and other deep variants) yield
good classification performance on true data, but suffer from severe overfitting on the synthetic data,
leading to poor test accuracy (see Table 2). This already indicates a possible problem with GANs
and the diversity of the data they generate. But to highlight this problem better and avoid the issues
that stem from overfitting, we also look for a classifier which does not always overfit on the synthetic
data. We, however, observed that even training simple networks, such as one fully connected layer
with few hidden units, led to overfitting on synthetic data. Hence, we resorted to a very basic linear
model described in Section 3.2. Table 2 shows results from binary classification experiments using
linear models, with the training and test accuracies of the classifier on various datasets.
Finally, to get a better understanding of the underlying "diversity" of synthetic datasets, we train
linear models using down-sampled versions of true data (no augmentation), and compare this to
the performance of synthetic data, as shown in Table 2. Down-sampling the data by a factor of
M , denoted as ↓M implies selecting a random N/M subset of the data D. Visualizations of how
GAN classification performance compares with (down-sampled) true data are in Figure 3. Here,
the bold curve shows test accuracy of a classifier trained on true data as a function of true dataset
3
Code from https://github.com/openai/improved-gan
7
Under review as a conference paper at ICLR 2018
Task
CelebA
Male (Y/N)
# Images: 136522
CelebA
Smiling (Y/N)
# Images: 156160
CelebA
Black Hair (Y/N)
# Images: 77812
LSUN
Bedroom/Kitchen
# Images: 200000
Data Source
True
True ↓64
True ↓256
True ↓512
True ↓1024
DCGAN
WGAN
ALI
BEGAN
Improved GAN
True
True ↓64
True ↓256
True ↓512
True ↓1024
DCGAN
WGAN
ALI
BEGAN
Improved GAN
True
True ↓64
True ↓256
True ↓512
True ↓1024
DCGAN
WGAN
ALI
BEGAN
Improved GAN
True
True↓512
True ↓1024
True ↓2048
True ↓4096
DCGAN
WGAN
ALI
Improved GAN
Classification Performance
Label
Accuracy (%)
Inception Score
Correctness
Linear model
(%)
(µ ± σ)
↑1
↑10
Train Test Train Test
88.1 88.8
89.6 88.7
97.9
1.98 ± 0.0033 91.6 86.9
96.3 83.8
100.0 83.1
98.2
1.97 ± 0.0013 100.0 79.2 100.0 79.6
98.3
1.97 ± 0.0013 96.7 84.0 96.7 83.9
99.2
1.99 ± 0.0008 95.8 86.7 95.8 86.7
99.3
1.99 ± 0.0006 97.9 78.0 98.0 78.2
99.8
1.99 ± 0.0004 100.0 75.6 100.0 71.0
85.7 85.6
87.6 85.0
92.4
1.69 ± 0.0074 91.5 82.4
93.7 80.0
95.0 76.2
96.1
1.67 ± 0.0028 100.0 77.1 100.0 77.1
98.2
1.68 ± 0.0031 96.8 83.4 96.8 83.5
93.3
1.71 ± 0.0027 94.5 80.1 95.0 82.4
93.5
1.74 ± 0.0028 98.5 69.5 98.5 69.6
98.4
1.88 ± 0.0021 100.0 70.2 100.0 70.1
76.4 76.5
79.7 75.4
84.5
1.68 ± 0.0112 86.3 72.6
89 68.7
100.0 65.4
86.7
1.68 ± 0.0040 100.0 70.9 100.0 70.5
76.0
1.60 ± 0.0055 94.4 73.7 94.3 73.4
79.4
1.63 ± 0.0028 94.9 71.0 94.9 70.2
87.6
1.74 ± 0.0028 94.1 67.6 94.1 67.7
86.7
1.64 ± 0.0045 100.0 70.3 100.0 69.1
64.7 64.1
64.7 64.0
98.2
1.94 ± 0.0217 65.2 64.0
98.7 56.2
100.0 55.1
92.7
1.85 ± 0.0036 90.8 56.5 91.2 56.3
87.8
1.70 ± 0.0023 86.2 58.2 96.3 54.1
94.1
1.86 ± 0.0021 82.5 60.0 82.0 59.7
84.2
1.68 ± 0.0030 91.6 55.9 90.8 56.5
ResNet
↑1
Test
97.9
92.9
89.8
82.6
81.4
56.4
50.0
58.9
55.4
71.7
92.4
87.8
82.1
77.8
71.2
63.3
65.3
55.8
64.1
61.6
84.5
80.0
75.8
73.9
72.7
53.4
58.5
55.7
67.2
70.2
99.1
76.4
66.9
56.5
55.1
51.2
55.7
56.2
51.2
Table 2: Results from a comparative study on classification performance of true data vs. GAN generated synthetic data for the CelebA and LSUN datasets. Label correctness measures the agreement
between default labels for the synthetic datasets, and those predicted by the annotator, a classifier
trained on the true data. Shown alongside are the equivalent inception scores computed using labels
predicted by the annotator (instead of the Inception Network). Training and test accuracies for a
linear model classifier on the various true and synthetic datasets are reported. Also presented are the
corresponding accuracies for a linear model trained on down-sampled true data (↓M ) and oversampled synthetic data (↑L ). Test accuracy for ResNets trained on these datasets is also shown (training
accuracy was always 100%), though it is noticeable that deep networks suffer from issues when
trained on synthetic datasets.
8
Under review as a conference paper at ICLR 2018
CelebA: Male/Female
CelebA: Smiling/Not Smiling
LSUN: Bedroom/Kitchen
CelebA: Black Hair/Not Black Hair
Figure 3: Illustration of the classification performance of true data vs. GAN-generated synthetic
data. Classification is performed using a basic linear model, and performance is reported in terms of
accuracy on the test set of true data. The bold curve shows variation of the classification performance
of models trained on true data with the size of the training set (maximum size is N ). Here, training
sets of various sizes are obtained by down-sampling the true dataset at random. Dashed lines show
the performance of classifiers trained on various GAN-generated datasets of size N .
size (maximum size being N ). The dashed curves show test accuracy of classifiers trained on GAN
datasets, obtained by drawing N samples from GANs at the culmination of the training process.
A natural argument in the defense of GANs is that we can oversample them, i.e. generate datasets
much larger than the size of training data. Results for linear models trained using a 10-fold oversampling of GANs (drawing 10N samples), denoted by ↑10 , are show in Table 2.
Results: The major findings from these experiments are:
• Based on Table 2, and Figure 6, we see strong agreement between annotator labels and true
labels for synthetic data, on par with the scores for the test set of true data. It is thus apparent that
the GAN images are of high-quality, as expected based on the visual inspection. These scores
are lower for LSUN than CelebA, potentially due to lower quality of generated LSUN images.
From these results, we can get a broad understanding of how good GANs are at producing
convincing/representative samples from different classes across datasets. This also shows that
simple classification-based benchmarks can highlight relevant properties of synthetic datasets.
• The equivalent inception score is not very informative and is similar for the true (test set) and
synthetic datasets. This is not surprising given the simple nature of our binary classification task
and the fact that the true and synthetic datasets have almost a uniform distribution over labels.
• It is evident from Table 2 that there is a large performance gap between true and synthetic data
on classification tasks. Inspection of training accuracies shows that linear models are able to
nearly fit the synthetic datasets, but are grossly underfitting on true data. Given the high scores
of synthetic data on the previous experiments to assess dataset ‘quality’ (Table 2 and Figure 6),
it is likely that the poor classification performance is more indicative of lack of ‘diversity’.
• Comparing GAN performance to that of down-sampled true data reveals that the learned distribution, which was trained on datasets that have around hundred thousand data points exhibits
diversity that is on par with what only mere couple of hundreds of true data samples constitute! This shows that, at least from the point of view of classification, the diversity of the GAN
generated data is severely lacking.
9
Under review as a conference paper at ICLR 2018
• Oversampling GANs by 10-fold to produce larger datasets does not improve classification performance. The disparity between true and synthetic data remains nearly unchanged even after
this significant oversampling, further highlighting the lack of diversity in GANs.
In terms of the conclusions of relative performance of various GANs, we observe that WGAN and
ALI perform consistently better than the other GANs on both the CelebA and LSUN datasets. While
BEGAN samples have good perceptual quality (see Figures 1 and 4), it performs badly on our
classification tasks. On the other hand, WGAN samples have relatively poor visual quality but seem
to outperform most other GANs in classification tasks. This is a strong indicator of the need to
consider other metrics, such as the ones proposed in this paper, in addition to visual inspection to
study GANs. For LSUN, the gap between true and synthetic data is much larger, with the classifiers
getting near random performance on all the synthetic datasets. Note that these classifiers get poor
test accuracy on LSUN but are not overfitting on the training data. In this case, we speculate the
lower performance could be due to both lower quality and diversity of LSUN samples.
In summary, our key experimental finding is that even simple classification–based tests can hold
tremendous potential to shed insight on the learned distribution in GANs. This not only helps us
to get a deeper understanding of many of the underlying issues, but also provides with a more
quantitative and rigorous platform on which to compare different GANs. Our techniques could,
in principle, be also applied to assess other generative models such as Variational Auto-Encoders
(VAEs) Kingma & Welling (2014). However, VAEs have significant problems in generating realistic
samples on the datasets used in our analysis in the first place – see Arora & Zhang (2017).
4
C ONCLUSIONS
In this paper, we put forth techniques for examining the ability of GANs to capture key characteristics of the training data, through the lens of classification. Our tools are scalable, quantitative and
automatic (no need for visual inspection of images). They thus are capable of studying state-ofthe-art GANs on realistic, large-scale image datasets. Further, they serve as a mean to perform a
nuanced comparison of GANs and to identify their relative merits, including properties that cannot
be discerned from mere visual inspection.
We used the developed techniques to perform empirical studies on popular GANs on the CelebA and
LSUN datasets. Our examination showed that mode collapse is indeed a prevalent issue for GANs.
Also, we observed that synthetic GAN-generated datasets have significantly reduced diversity, at
least when examined from a classification perspective. In fact, the diversity of such synthetic data is
often few orders of magnitude smaller than that of the true data. Furthermore, this gap in diversity
does not seem to be bridged by simply producing much larger datasets by oversampling GANs.
Also, our methods can be viewed as benchmarks for GANs. From this perspective, we observed
that ALI consistently outperforms all the other studied GANs, both in terms of the extent of modecollapse, as well as, the diversity of the learned distribution when assessed from the classification
point-of-view. Finally, we noticed that good perceptual quality of samples does not necessarily correlate – and might sometimes even anti-correlate – with distribution diversity. These findings suggest
that we need to go beyond the visual inspection–based evaluations and look for more quantitative
tools for assessing quality of GANs, such as the ones presented in this paper.
10
Under review as a conference paper at ICLR 2018
R EFERENCES
Martin Arjovsky, Soumith Chintala, and Léon Bottou. Wasserstein generative adversarial networks.
In International Conference on Machine Learning (ICML), pp. 214–223, 2017.
Sanjeev Arora and Yi Zhang. Do GANs actually learn the distribution? An empirical study. arXiv
preprint arXiv:1706.08224, 2017.
David Berthelot, Tom Schumm, and Luke Metz. BEGAN: Boundary equilibrium generative adversarial networks. arXiv preprint arXiv:1703.10717, 2017.
Emily L Denton, Soumith Chintala, Rob Fergus, et al. Deep generative image models using a Laplacian pyramid of adversarial networks. In Advances in Neural Information Processing Systems
(NIPS), pp. 1486–1494, 2015.
Vincent Dumoulin, Ishmael Belghazi, Ben Poole, Alex Lamb, Martin Arjovsky, Olivier Mastropietro, and Aaron Courville. Adversarially learned inference. In International Conference on Learning Representations (ICLR), 2017.
Ian Goodfellow.
Nips 2016 tutorial:
arXiv:1701.00160, 2016.
Generative adversarial networks.
arXiv preprint
Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair,
Aaron Courville, and Yoshua Bengio. Generative adversarial nets. In Advances in Neural Information Processing Systems (NIPS), pp. 2672–2680, 2014.
Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Deep residual learning for image recognition. In Computer Vision and Pattern Recognition (CVPR), pp. 770–778, 2016.
Diederik P Kingma and Max Welling. Auto-encoding variational bayes. In International Conference
on Learning Representations (ICLR), 2014.
Ziwei Liu, Ping Luo, Xiaogang Wang, and Xiaoou Tang. Deep learning face attributes in the wild.
In International Conference on Computer Vision (ICCV), 2015.
Luke Metz, Ben Poole, David Pfau, and Jascha Sohl-Dickstein. Unrolled generative adversarial
networks. arXiv preprint arXiv:1611.02163, 2016.
Alec Radford, Luke Metz, and Soumith Chintala. Unsupervised representation learning with deep
convolutional generative adversarial networks. arXiv preprint arXiv:1511.06434, 2015.
David Rolnick, Andreas Veit, Serge Belongie, and Nir Shavit. Deep learning is robust to massive
label noise. arXiv preprint arXiv:1705.10694, 2017.
Tim Salimans, Ian Goodfellow, Wojciech Zaremba, Vicki Cheung, Alec Radford, and Xi Chen.
Improved techniques for training GANs. In Advances in Neural Information Processing Systems
(NIPS), pp. 2234–2242, 2016.
Ashish Shrivastava, Tomas Pfister, Oncel Tuzel, Joshua Susskind, Wenda Wang, and Russell Webb.
Learning from simulated and unsupervised images through adversarial training. In Computer
Vision and Pattern Recognition (CVPR), July 2017.
L. Theis, A. van den Oord, and M. Bethge. A note on the evaluation of generative models. In
International Conference on Learning Representations (ICLR), 2016.
Yuhuai Wu, Yuri Burda, Ruslan Salakhutdinov, and Roger Grosse. On the quantitative analysis of
decoder-based generative models. arXiv preprint arXiv:1611.04273, 2016.
Fisher Yu, Yinda Zhang, Shuran Song, Ari Seff, and Jianxiong Xiao. LSUN: Construction
of a large-scale image dataset using deep learning with humans in the loop. arXiv preprint
arXiv:1506.03365, 2015.
Han Zhang, Tao Xu, Hongsheng Li, Shaoting Zhang, Xiaolei Huang, Xiaogang Wang, and Dimitris
Metaxas. Stackgan: Text to photo-realistic image synthesis with stacked generative adversarial
networks. arXiv preprint arXiv:1612.03242, 2016.
11
Under review as a conference paper at ICLR 2018
5
A PPENDIX
5.1
E XPERIMENTAL S ETUP
5.1.1
DATASETS FOR C LASSIFICATION TASKS
To assess GAN performance from the perspective of classification, we construct a set of classification tasks on the CelebA and LSUN datasets. In the case of the LSUN dataset, images are annotated
with scene category labels, which makes it straightforward to use this data for binary and multiclass classification. On the other hand, each image in the CelebA dataset is labeled with 40 binary
attributes. As a result, a single image has multiple associated attribute labels. Here, we can construct classification tasks by considering binary combinations of an attribute(s) (examples are shown
in Figures 1 and 4). Attributes used in our experiments were chosen such that the resulting dataset
was large, and classifiers trained on true data got high-accuracy so as to be good annotators for the
synthetic data.
True Data
DCGAN
WGAN
ALI
BEGAN
Improved GAN
No Makeup
+
Not Smiling
No Makeup
+
Smiling
Makeup
+
Not Smiling
Makeup
+
Smiling
(a) 4-class dataset from CelebA for attributes Makeup, Smiling.
True Data
DCGAN
WGAN
ALI
BEGAN
Improved GAN
No Bangs
+
Not Smiling
No Bangs
+
Smiling
Bangs
+
Not Smiling
Bangs
+
Smiling
(b) 4-class dataset from CelebA for attributes Bangs, Smiling.
Figure 4: Illustration of datasets from CelebA used in proposed classification-based benchmarks to
evaluate GANs. Shown alongside are images sampled from various unconditional GANs trained on
this dataset. Labels for the GAN samples are obtained using a pre-trained classifier as an annotator.
5.1.2
M ODELS
Benchmarks were performed on standard implementations •
•
•
•
•
DCGAN: https://github.com/carpedm20/DCGAN-tensorflow
WGAN: https://github.com/martinarjovsky/WassersteinGAN
ALI: https://github.com/IshmaelBelghazi/ALI
BEGAN :https://github.com/carpedm20/BEGAN-tensorflow
Improved GAN: https://github.com/openai/improved-gan
12
Under review as a conference paper at ICLR 2018
True Data
DCGAN
WGAN
ALI
Improved GAN
Bedroom
Classroom
Kitchen
(a) 3-class dataset from LSUN for Bedroom, Classroom, Kitchen.
True Data
DCGAN
WGAN
ALI
Improved GAN
Bedroom
Conference
Room
Dining
Room
Kitchen
Living
Room
(b) 5-class dataset from LSUN for Bedroom, Conference Room, Dining Room, Kitchen, Living Room.
Figure 5: Illustration of datasets from LSUN used in proposed classification-based benchmarks to
evaluate GANs. Shown alongside are images sampled from various unconditional GANs trained on
this dataset. Labels for the GAN samples are obtained using a pre-trained classifier as an annotator.
• ResNet Classifier: Variation of the standard TensorFlow ResNet https://github.com/
tensorflow/models/blob/master/research/resnet/resnet_model.py
5.2
5.2.1
A DDITIONAL E XPERIMENTAL R ESULTS
S AMPLE Q UALITY
For each of our benchmark experiments, we ascertain that the visual quality of samples produced
by the GANs is comparable to that reported in prior work. Examples of random samples drawn for
multi-class datasets from both true and synthetic data are shown in Figures 1 and 4 for the CelebA
dataset, and in Figure!5 for the LSUN dataset.
5.2.2
D IVERSITY E XPERIMENTS
Sections 2.2 and 3.4 describe techniques to study classification performance of labeled GANgenerated datasets against that of true data. In order to assess the quality of our GAN-generated
synthetic datasets, we evaluate label agreement between the default labels of the synthetic datasets,
13
Under review as a conference paper at ICLR 2018
Figure 6: Histograms of annotator confidence (softmax probability) during label prediction on true
data (test set) and synthetic data for tasks on the CelebA and LSUN datasets (see Section 3.4).
and that obtained using the annotators described in Section 2.1 as shown in Table 2. In Figure 6,
we inspect the confidence scores, defined as the softmax probabilities for predicted class, of the annotator while making these predictions. As can be seen from these results, the annotator confidence
for the synthetic data is comparable to that on the test set of true data. Thus, it seems likely that the
GAN generated samples are of good quality and are truly representative examples of their respective
classes, as expected based on visual inspection.
14
| 1cs.CV
|
Application of Deep Learning in Neuroradiology: Automated
Detection of Basal Ganglia Hemorrhage using 2D-Convolutional
Neural Networks.
Vishal Desai,1 Adam E. Flanders,1 Paras Lakhani1*
1.
Department of Radiology, Thomas Jefferson University Hospital, Sidney Kimmel Jefferson Medical College, Philadelphia, PA, U.S.A.
*Corresponding Author, email: [email protected]
Abstract— Purpose: Deep learning techniques have achieved
high accuracy in image classification tasks, and there is interest
in applicability to neuroimaging critical findings. This study
evaluates the efficacy of 2D deep convolutional neural networks
(DCNNs) for detecting basal ganglia (BG) hemorrhage on
noncontrast head CT. Methods: 170 unique de-identified
HIPAA-compliant noncontrast head CTs were obtained, those
with and without BG hemorrhage. 110 cases were held-out for
test, and 60 were split into training (45) and validation (15),
consisting of 20 right, 20 left, and 20 no BG hemorrhage. Data
augmentation was performed to increase size and variation of
the training dataset by 48-fold. Two DCNNs were used to
classify the images—AlexNet and GoogLeNet—using untrained
networks and those pre-trained on ImageNet. Area under the
curves (AUCs) for the receiver-operator characteristic (ROC)
curves were calculated, using the DeLong method for statistical
comparison of ROCs. Results: The best performing model was
the pre-trained augmented GoogLeNet, which had an AUC of
1.00 in classification of hemorrhage. Preprocessing
augmentation increased accuracy for all networks (p<0.001),
and pretrained networks outperformed untrained ones
(p<0.001) for the unaugmented models. The best performing
GoogLeNet model (AUC 1.00) outperformed the best
performing AlexNet model (AUC 0.95)(p=0.01). Conclusion:
For this dataset, the best performing DCNN identified BG
hemorrhage on noncontrast head CT with an AUC of 1.00.
Pretrained networks and data augmentation increased
classifier accuracy. Future prospective research would be
important to determine if the accuracy can be maintained on a
larger cohort of patients and for very small hemorrhages.
Index Terms—deep learning, intracranial hemorrhage, basal
ganglia, convolutional neural networks
I. INTRODUCTION
Basal ganglia hemorrhage is a type of intracerebral
hemorrhage (ICH), and is associated with long-standing
hypertension.1–3
Along with other forms of ICH, it is
considered a neurologic emergency. The imaging modality
of choice to detect such hemorrhages is non-contrast head
CT given its wide availability, speed at which it can be
performed, and the very high sensitivity and specificity for
detecting acute hemorrhage.4
The American Heart Association and American Stroke
Association note that timely diagnosis and aggressive early
management is very important in ICH, as affected patients
commonly deteriorate within the first few hours after onset. 5
As such, an automated solution to identify such hemorrhages
may be helpful to decrease time to diagnosis, and more
readily triage appropriate care. Prior work with computer
aided detection (CAD) has shown success in automated
segmentation of ICH.6 In addition, one study using CAD
achieved 95% sensitivity and 89% specificity for detection
of ICH using pre-processing techniques and a knowledgebased classification system.7 Another study using machine
learning techniques was able to achieve 96% accuracy for
detecting ICH using pre-processing techniques, feature
selection, and a fuzzy classifier .8
Based on the recent success in the ImageNet Large Scale
Visual Recognition Competition, deep convolutional neural
networks (DCNNs) are considered state-of-the-art for image
classification.9 While convolutional neural networks have
been around for many years, only recently have we seen
their increase used due to availability of high-performing
graphics processing units (GPU) and availability of many
open-source frameworks. Since 2012, deep convolutional
neural networks (DCNN) have been utilized by all winning
entries in ILSVRC, resulting in a drop in top-5 classification
error rate from 25% in 2011 to 3% more recently with some
of the latest architectures.10
Application of deep learning in radiology has found
promising results in multiple modalities. Some recent
examples include brain segmentation on MRI,11 pancreatic
segmentation,12 knee cartilage evaluation,13 detection of
pleural effusion and cardiomegaly on chest radiographs,14
detection of tuberculosis on chest radiographs,15 and
intracranial critical findings.16
In this study, we focus on identifying a common site of
hemorrhagic stroke, the basal ganglia. We evaluate the
efficacy of automated detection of basal ganglia hemorrhage
on noncontrast head CTs using two DCNNs – AlexNet17 and
GooLeNet,18 the winners of the 2012 and 2014 ImageNet
Page 1 of 7
Datasets:
This was a retrospective study using de-identified and
Health Insurance Portability and Accountability Act
(HIPAA) compliant datasets from Thomas Jefferson
University Hospital, PA, U.S.A. To create the datasets, the
institutional Radiology Information System (RIS) database
was searched over a 12-month period between May 2016 May 2017 for patients with basal ganglia hemorrhage and
for patients without any acute intracranial pathology on noncontrast head CT. All CT studies were verified by two
board-certified radiologists, the author of the final report,
and by an independent board-certified radiologist (P.L.). The
terms “basal ganglia, hemorrhage, hematoma, and bleed”
were entered into the database using multiple permutations.
Patients with brain tumors and prior cranial surgery were
excluded.
170 unique patients were identified. 110 of these patients
were held out and placed in the test dataset, consisting of 55
with BG hemorrhage, and 55 without hemorrhage. The
remaining 60 patients were used for training and validation,
divided in a 75/25 ratio, with 45 cases for training and 15
cases for validation. Of these 60 training/validation cases,
20 consisted of right basal ganglia hemorrhage (15 training +
5 validation), 20 left basal ganglia hemorrhage (15 training +
5 validation), and 20 no intracranial hemorrhage (15 training
+ 5 validation). Seven cases with basal ganglia calcifications
(mimic of BG hemorrhage) were included in the datasets,
four for training and 3 in the test-dataset. The training set
was used to train the algorithm, validation set for model
selection, and test set for assessment of the final chosen
model. 110 test cases were chose to provide a 95%
confidence interval of ±7.5% based on estimated accuracy of
the best-performing models on the accuracy on the
validation datasets.19
Study Design:
For each head CT in the training dataset, several axial key
images were obtained near or at the level of the basal
ganglia, which were determined by two radiologists (V.D.,
P.L.). This sometimes included images one slice above
and/or below the basal ganglia, and approximately 3-5
images at the level of the basal ganglia. Approximately 4-6
images were saved per study depending on the scan angle,
slice thickness (range 2.5-5 mm), and, if present, size of the
hemorrhage. A total of 308 unique DICOM (Digital Imaging
and Communications in Medicine) images at the levels of
interest were obtained from 60 non-contrast head CTs (20
with right basal ganglia hemorrhage, 20 with left basal
GoogLeNet
II. METHODS
ganglia hemorrhage, and 20 without hemorrhage). The
images were resized to 256 x 256 pixels (from 512 x 512
originally) and converted into Portable Network Graphics
(PNG) format. The images were loaded onto a workstation
running the DIGITS deep learning GPU training system
(DIGITS 4.0, Nvidia Corporation, Santa Clara, CA) running
Ubuntu 14.04, Caffe deep learning framework (Nvidia fork),
CUDA 8.0, and cuDNN dependencies (Nvidia Corporation,
Santa Clara, CA) for graphics processing unit (GPU)
acceleration. The computer contained an Intel i5 3570k
3.4gHz processor, 4TB hard disk space, 32gb RAM, and a
CUDA-enabled NVIDIA Maxwell Titan X 12Gb GPU
(Nvidia Corporation, Santa Clara, CA).
AlexNet
Large Scale Visual Recognition Competition respectively.
Untrained
Pre-trained
Untrained
Pre-trained
Unaugmented
Dataset
Classifer 1
Augmented
Dataset
Classifier 2
Unaugmented
Dataset
Classifier 3
Augmented
Dataset
Classifier 4
Unaugmented
Dataset
Classifier 5
Augmented
Dataset
Classifier 6
Unaugmented
Dataset
Classifier 7
Augmented
Dataset
Classifier 8
Figure 1: Eight different models were evaluated, using two
different architectures (AlexNet and GoogLeNet), including
pretrained and untrained networks, and with and without extra
augmentation.
Multiple sequential pre-processing augmentation techniques
were performed, including three different CT window-width
(WW) and window-levels (WL) ( “brain” 80/35 WW/WL,
“acute blood” 220/95 WW/WL, and “stroke” 27/33
WW/WL), 10% magnification, rotation of 15 & 30 degrees,
blur and edge enhancement. This pre-processing was
performed using ImageJ v1.50i (National Institutes of
Health, U.S.A.) and XnConvert v1.73 (XnSoft, France).
Images were also augmented in real-time during the training
process using prebuilt options within the Caffe framework, 16
including random cropping of 227 x 227 pixels for AlexNet
and 224 x 224 pixels for GoogLeNet, and mean wholeimage subtraction. After image augmentation using preprocessing detailed above, the new training dataset totaled
11,088 images, which was a 48-fold increase in number of
images from the originals.
Page 2 of 7
Two deep convolutional neural networks architectures were
used—AlexNet and GoogLeNet, using unaugmented and
augmented datasets, and those untrained and pre-trained on
ImageNet. Taking the permutation of the two datasets
(unaugmented and augmented datasets), two neural networks
(AlexNet and GoogLeNet), and two neural network types
(pre-trained and untrained), a total of 8 trained models were
created (Figure 1). Pre-trained networks were obtained from
the Caffe Model Zoo (http://caffe.berkeleyvision.org), Berkeley,
CA), an open-access repository of pre-trained models for use
with Caffe,20 and were previously trained on over 1 million
every-day color images from ImageNet.9
The following solver parameters were used for training
AlexNet: 90 epochs, base learning rate of 0.01 for untrained
models and 0.001 for pre-trained models, stochastic gradient
descent, step-down 33%, and gamma of 0.5. For
GoogLeNet, the parameters were: 40 epochs, base learning
rate of 0.01 for untrained models and 0.001 for pre-trained
models, stochastic gradient descent, step-down 33%, and
gamma of 0.5. Categorical cross-entropy was used for the
loss function. The solver parameters including number of
epochs were determined after reviewing the training and
validation loss curves after multiple runs of the data, with
the goal of achieving the lowest validation loss, and stopping
training after plateau in the loss. For pretrained networks, we
randomized the weights of the final fully-connected layer of
the networks to learn from the CT images, and employed a
fine-tuning strategy where all layers were open to learn at a
reduced base learning rate.
dataset had significantly better AUC than those trained with
the smaller, unaugmented dataset in all scenarios–pre-trained
GoogLeNet and AlexNet and untrained GoogLeNet and
AlexNet (Figure 2 & 3, Table 2). The pre-trained classifier
was significantly better than the untrained classifier for
GoogLeNet when using the unaugmented dataset (Table 3).
There was no significant difference in AUC between the
untrained and pretrained GoogLeNet and AlexNet classifiers
when using the augmented dataset (Table 4).
The best performing classifiers were the augmented
untrained and pre-trained GoogLeNet DCNN, which had an
AUC of 0.99 and 1.0 respectively in identifying BG
hemorrhage (Table 1). The augmented GoogLeNet
classifiers correctly identified 55/55 cases of BG
hemorrhage in the test dataset, including the laterality of the
bleed (sensitivity 100%). The pre-trained classifier correctly
labeled 55/55 cases without hemorrhage (specificity 100%)
while the untrained classifier had one false positive in a case
with asymmetric basal ganglia calcifications (specificity
96.4%).
The augmented untrained AlexNet classifier retained a high
AUC (0.96), with sensitivity for hemorrhage at 100% but
with a lower specificity at 80%, particularly mislabeling
basal ganglia calcifications as hemorrhages (Figure 4).
Overall, the augmented pre-trained GoogLeNet classifier
had greater accuracy compared to the AlexNet classifiers
(Table 5, Figure 3). The best performing GoogLeNet model
(AUC 1.00) outperformed the best performing AlexNet
model (AUC 0.95)(p=0.01).
Statistical Analysis:
Receiver operating characteristic (ROC) curves and area
under the curves (AUC) were determined using the pROC
package (ver. 1.7.3) for R (ver. 3.3.1), utilizing the DeLong
method for statistical comparison of ROCs.21,22 P-values <
0.05 were considered statistically significant.
IRB approval:
This study was approved by the Institutional Review Board
at Thomas Jefferson University Hospital, Philadelphia, PA,
U.S.A.
III. RESULTS
The average size of the hemorrhages for the test dataset was
2.8±1.9cm in the transverse dimension, and 3.6±2.7 cm in
the anteroposterior dimension.
The smallest two
hemorrhages were 0.5 x 1.1cm and 0.7 x 0.7cm, and the
largest was 7.1 x 11.2cm.
Table 1 contains area under the curve (AUC) calculations
for all classifiers. The classifiers trained with the augmented
Table 1: AUC for All Classifiers
Classifier
Area Under the Curve
Unaugmented AlexNet-Untrained
0.57 (0.46-0.68)
Unaugmented AlexNet-Pretrained
Unaugmented GoogLeNetUntrained
Unaugmented GoogLeNetPretrained
Augmented AlexNet-Untrained
0.81 (0.74-0.89)
Augmented AlexNet-Pretrained
0.92 (0.87-0.97)
0.60 (0.49-0.70)
0.89 (0.83-0.95)
0.95 (0.92-0.99)
Augmented GoogLeNet-Untrained
0.99 (0.96-1.00)
Augmented GoogLeNet-Pretrained
1.00 (1.00-1.00)
Parentheses reflects 95% confidence interval
IV. DISCUSSION:
Recent advances in technology have enabled the use of
machine learning, specifically deep learning, to be applied to
radiologic images. Machine learning allows computers to
analyze data and perform tasks without being explicitly
Page 3 of 7
programmed to do so.23 Deep artificial neural networks, on
the other hand, is a relatively newer branch of machine
learning, which consists of multiple hidden layers, and
excels with high dimension datasets such as images. For this
study, we used supervised (pre-labeled) images to train our
added laterality to our classifier, which is a simple method to
verify appropriate training. So, if the classifier is erroneously
labeling right basal ganglia hemorrhages as left, we can
assume that the network is inappropriately trained.
Table 2: AUC Comparison of Classifiers with Unaugmented and
Augmented Datasets
Classifier
Unaugmented
AUC
Augmented
AUC
p-value
AlexNetUntrained
AlexNetPretrained
GoogLeNetUntrained
GoogLeNetPretrained
0.57
0.95
p<0.001
0.82
0.92
p=0.001
0.60
0.99
p<0.001
0.89
1.00
p<0.001
basal ganglia hemorrhage classifiers. DCNNs consist of a
varying number of interconnected layers, and each layer
contains numerous independent “nodes” or “neurons” which
analyze a certain feature. Since all layers are interconnected,
this creates a network where each data point is constantly
referenced against all other layers to provide the best
possible prediction.
Deep neural networks have been described as “black boxes,”
where the reasoning behind a network’s prediction may not
be readily apparent.24 For medical imaging, ensuring the
network has been properly trained and performs accurately
in unknown cases is crucial. The black box scenario is
compounded by the fact that DCNNs are extremely large
and complex.
Table 3: AUC Comparison of Untrained and Pre-trained
Classifiers with Unaugmented Dataset
Classifier
AlexNet,
Unaugmented
GoogLeNet,
Unaugmented
Untrained
AUC
0.57
Pre-trained
AUC
0.81
p<0.001
0.60
0.89
p<0.001
Figure 2. Receiver operating characteristic (ROC) curve
comparing the Untrained AlexNet with and without extra
augmentation, with an AUC of 0.95 and 0.57 respectively,
p<0.0001.
Activations within a layer can also offer confidence that the
network is being activated by the area of interest.26 Figure 6
demonstrates a strong activation in 2nd convolutional layer of
the pretrained GoogLeNet classifier followed by a correct
prediction of left basal ganglia hemorrhage with 100%
confidence.26
p-value
However, several strategies do exist to get insight into what
is contributing to the network’s prediction.24-26 One
technique is to obscure the area of interest and then assess
how this affects the network’s prediction.25 For instance,
obscuring a basal ganglia hematoma by overlaying a gray
box should result in a prediction of “no basal ganglia
hemorrhage” (if the network has learned what was intended)
(Figure 5). Rather than manually processing images, we
One helpful step in building an accurate image classifier is
augmentation.27 The results of our study demonstrate the
statistically significant difference in AUCs among the
unaugmented and augmented datasets (Table 2). It has been
demonstrated that the more cases and variations supplied to
the neural network during training, the better the
performance and generalization of the DCNN.27
For the basal ganglia classifier, we ensured variety in the
initial, unaugmented dataset by including cases with basal
ganglia calcifications, different sized hemorrhages, multicompartmental hemorrhage, and hydrocephalus. Then, with
image augmentation we take that variety of cases and expose
it to the neural network in different ways by introducing
varying degrees of blur, edge enhancement, rotation, zoom,
Page 4 of 7
windowing and other image processing techniques. This
simulates variations in the CT scan that might be
encountered on a day-to-day basis, improving generalization
of our classifier without needing to acquire extra cases. A
degree of manual input is certainly required in the case
layers for AlexNet) and employs an “inception” module with
a “bottleneck” design.18,28 The inception module uses
smaller 1x1 convolutions to reduce the number of variables
that flow into the layer, before larger convolutions, which
improves computational efficiency and may improve
predictions.28
Table 5: AUC Comparison of GoogLeNet and AlexNet with
Augmented Dataset
Figure 3: ROC curves of the pretrained AlexNet and GoogLeNet
models with extra augmentation. The best-performing pretrained
GoogLeNet model (AUC 1.00) performed better than the
corresponding AlexNet model (AUC 0.92), p=0.006.
Classifier
AlexNet
GoogLeNet
p-value
Untrained,
Augmented
AUC
Pretrained,
Augmented
AUC
0.95
0.99
p=0.12
0.92
1.00
p=0.006
We also found that with small (unaugmented) datasets, the
networks pre-trained with everyday images on ImageNet
were superior to untrained networks. However, with larger
(augmented) datasets, there was no significant difference
between pre-trained and untrained networks (Table 4).
Since all images, including medical images, share basic lowlevel features such as edges, lines and blobs, a network pretrained on non-medical images can help prime the initial
layers of the network through transfer learning.29 Then, the
interconnected layers could re-learn from the CT images
provided. This appeared less significant with large datasets,
perhaps because there was enough input data to robustly
train the initial layers without pretraining.
selection process. For instance, we chose to specifically
include cases with basal ganglia calcifications to decrease
our false positive rate. The augmented GoogLeNet
classifiers successfully labeled basal ganglia calcifications as
“no hemorrhage” while AlexNet had difficulty with dense
asymmetric calcifications, possibly related to the extra depth
of the classifier.
Table 4: AUC Comparison of Untrained and Pre-trained
Classifiers with Augmented Dataset
Classifier
AlexNet,
Augmented
GoogLeNet,
Augmented
Untrained
AUC
0.95
Pre-trained
AUC
0.92
p-value
0.99
1.00
p=0.22
p=0.27
GoogLeNet was superior to AlexNet using the augmented
dataset (Table 5), although only statistically significant for
the pre-trained models. This is likely due to the fact that
GoogLeNet is a much deeper network (22 layers versus 8
Figure 4: Axial noncontrast CT through the basal ganglia region
(ww/wl: 80/35) demonstrating bilateral basal ganglia calcification
(white arrows). This image was incorrectly predicted as
hemorrhage by all classifiers except for the best-performing
pretrained, augmented GoogLeNet model.
Page 5 of 7
One of the common problems with deep learning is
overfitting, or more simply, lack of generalizability. 30 In this
scenario, the classifier maintains high prediction accuracy on
the training dataset but does poorer with unknown cases,
which can happen when the training dataset is small. The
models employed several strategies to help overcome this,
including increase in the size and variety of the dataset by
pre-processing augmentation, and use of dropout—model
regularization technique—which has been shown to help
with overfitting.27,30
Figure 5: Axial non-contrast CT through the basal ganglia region
(ww/wl: 220/95). The right image shows an acute hemorrhage in
the right basal ganglia (white arrow), which is correctly predicted
by the classifier (100% confidence). In the left image, the
hemorrhage is obscured by a gray box, which changes the
prediction to “no hemorrhage.” This technique can help
demonstrate that the model is assessing the appropriate region.
generalizable to new unforeseen cases.
There are limitations to this study. While the image classifier
we generated serves as a great proof-of-concept that deep
learning can accurately detect basal ganglia hemorrhage,
more research is needed to demonstrate its accuracy with
larger cohorts. It is unknown how well the model would do
in scenarios where there is significant artifact, prior
cerebrovascular conditions such as brain tumors, or altered
anatomy from prior surgery. In addition, it is unclear how
sensitive the algorithm would be on more subtle
subcentimeter hemorrhages. Most of the hemorrhages were
greater than 1.5cm, although the classifier did detect some
smaller hemorrhages measuring approximately 1cm (10 of
the 55 positive test cases), including one that was 0.5 x
1.1cm and another that was 0.7 x .7cm. Also, this study was
performed retrospectively and the performance of this
classifier prospectively would need to be determined.
Finally, this was a model that used 2D convolutions, and
makes an assessment on a slice-by-slice basis. More research
is needed to determine efficacy compared to 3D CNNs,
which would have the benefit of analyzing the whole head
but at greater computational costs and GPU memory needs.
Before utilization in a clinical scenario, the classifier will
need be trained to learn the normal anatomy of all parts of
the cranium including the vertex and skull bases, rather than
just the basal-ganglia region, so as not to flag normal
structures as hemorrhage.
Despite the limitations, this study establishes a starting point
for building an accurate CT-based image classifier for
hemorrhage. The next steps will be to build a moreencompassing intracranial hemorrhage algorithm, and
address the questions or limitations noted above.
Future work may also include a system where a deep
learning algorithm automatically flags studies as positive or
negative on a reading worklist, where one could then
evaluate its effect on work prioritization and result turnaround-time.
V. CONCLUSIONS:
Figure 6: On the left is an axial CT image at the level of the basal
ganglia (WW/WL: 80/35) containing a left-sided BG hemorrhage.
On the right is an accompanying activation from the 2 nd layer of the
best-performing GoogLeNet model. The small orange-white focus
(white arrow) represents an area activated by the network, and
corresponds to the location of the hemorrhage.
For this dataset, the best performing DCNN identified BG
hemorrhage on noncontrast head CT with an AUC of 1.00.
Pretrained networks and data augmentation increased
classifier accuracy. Future prospective research would be
important to determine if high accuracy can be maintained
on a larger cohort of patients and for very small
hemorrhages.
VI. REFERNCES:
Finally, we assess the trained models with test cases,
previously unseen by the classifiers, and analyze the
predictions (Table 1). This shows that the models can be
1.
Hanley DF, Awad IA, Vespa PM, Martin NA,
Zuccarello M. Hemorrhagic Stroke: Introduction.
Stroke. 2013;44(6 suppl 1).
Page 6 of 7
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
Sutherland GR, Auer RN. Primary intracerebral
hemorrhage. J Clin Neurosci. 2006;13(5):511-517.
doi:10.1016/j.jocn.2004.12.012.
Sahni R, Weinberger J. Management of intracerebral
hemorrhage. Vasc Health Risk Manag.
2007;3(5):701-709.
Rincon F, Mayer SA. Clinical review: Critical care
management of spontaneous intracerebral
hemorrhage. Crit Care. 2008;12(6):237.
doi:10.1186/cc7092.
Hemphill JC, Greenberg SM, Anderson CS, Becker
K, Bendok BR, Cushman M, Fung GL, Goldstein
JN, Macdonald RL, Mitchell PH, Scott PA.
Guidelines for the management of spontaneous
intracerebral hemorrhage. Stroke. 2015 Jul
1;46(7):2032-60.
Scherer M, Cordes J, Younsi A, Sahin YA, Götz M,
Möhlenbruch M, Stock C, Bösel J, Unterberg A,
Maier-Hein K, Orakcioglu B. Development and
Validation of an Automatic Segmentation Algorithm
for Quantification of Intracerebral Hemorrhage.
Stroke. 2016 Nov 1;47(11):2776-82.
Chan T. Computer aided detection of small acute
intracranial hemorrhage on computer
tomography of brain. Computerized Medical
Imaging and Graphics. 2007 Jul 31;31(4):285-98.
Maduskara P, Acharyyaa M. Automatic
identification of intracranial hemorrhage in noncontrast CT with large slice thickness for trauma
cases. InProc. of SPIE Vol 2009 Feb 26 (Vol. 7260,
pp. 726011-1
Russakovsky O, Deng J, Su H, et al. ImageNet
Large Scale Visual Recognition Challenge.
September 2014.
Szegedy, C., Ioffe, S., Vanhoucke, V. and Alemi, A.,
2016. Inception-v4, inception-resnet and the impact
of residual connections on learning. arXiv preprint
arXiv:1602.07261.
Li R, Zhang W, Suk H-I, et al. Deep learning based
imaging data completion for improved brain disease
diagnosis. Med Image Comput Comput Assist Interv.
2014;17(Pt 3):305-312.
Roth HR, Farag A, Lu L, Turkbey EB, Summers
RM. Deep convolutional networks for pancreas
segmentation in CT imaging. April 2015.
doi:10.1117/12.2081420.
Prasoon A, Petersen K, Igel C, Lauze F, Dam E,
Nielsen M. Deep Feature Learning for Knee
Cartilage Segmentation Using a Triplanar
Convolutional Neural Network.
Bar Y, Diamant I, Wolf L, Greenspan H. Deep
learning with non-medical training used for chest
pathology identification. In: Hadjiiski LM, Tourassi
GD, eds. ; 2015:94140V. doi:10.1117/12.2083124.
Lakhani P, Sundaram B. Deep Learning at Chest
Radiography: Automated Classification of
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
Pulmonary Tuberculosis by Using Convolutional
Neural Networks. Radiology. April 2017:162326.
doi:10.1148/radiol.2017162326.
Prevedello LM, Erdal BS, Ryu JL, Little KJ,
Demirer M, Qian S, White RD. Automated Critical
Test Findings Identification and Online Notification
System Using Artificial Intelligence in Imaging.
Radiology. 2017 Jul 3:162664.
Krizhevsky A, Sutskever I, Hinton GE. ImageNet
Classification with Deep Convolutional Neural
Networks. 2012:1097-1105.
Szegedy C, Liu W, Jia Y, et al. Going Deeper with
Convolutions.
Hastie T, Tibshirani R, Friedman JH, Jerome H. The
Elements of Statistical Learning : Data Mining,
Inference, and Prediction.
Jia Y, Shelhamer E, Donahue J, et al. Caffe:
Convolutional Architecture for Fast Feature
Embedding. June 2014.
Obuchowski NA. Receiver Operating Characteristic
Curves and Their Use in Radiology. Radiology.
2003;229(1):3-8. doi:10.1148/radiol.2291010898.
DeLong ER, DeLong DM, Clarke-Pearson DL.
Comparing the areas under two or more correlated
receiver operating characteristic curves: a
nonparametric approach. Biometrics.
1988;44(3):837-845.
Wang S, Summers RM. Machine learning and
radiology. Med Image Anal. 2012;16(5):933-951.
doi:10.1016/j.media.2012.02.005.
Yosinski J, Clune J, Nguyen A, Fuchs T, Lipson H.
Understanding Neural Networks Through Deep
Visualization. June 2015.
Zeiler MD, Fergus R. Visualizing and understanding
convolutional networks. arXiv preprint
arXiv:1311.2901. 2013 Nov 12.
Yeager L, Heinrich G, Mancewicz J, Houston M.
Effective Visualizations for Training and
Evaluating Deep Models. Proceedings of the 33rd
International Conference on Machine Learning, New
York, NY, USA, 2016. JMLR
https://icmlviz.github.io/assets/papers/16.pdf
Wu R, Yan S, Shan Y, Dang Q, Sun G, Research B.
Deep Image: Scaling up Image Recognition.
Yu D, Seltzer ML. Improved Bottleneck Features
Using Pretrained Deep Neural Networks.
Yosinski J, Clune J, Bengio Y, Lipson H. How
transferable are features in deep neural networks?
InAdvances in neural information processing
systems 2014 (pp. 3320-3328).
Srivastava N, Hinton G, Krizhevsky A, Sutskever I,
Salakhutdinov R. Dropout: A Simple Way to
Prevent Neural Networks from Overfitting. J Mach
Learn Res. 2014;15:1929-1958.
Page 7 of 7
| 1cs.CV
|
arXiv:1708.09313v1 [cs.IT] 30 Aug 2017
Rotation Symmetric Bent Boolean Functions for
n = 2p
T. W. Cusick
University at Buffalo, 244 Math. Bldg. Buffalo, NY 14260
Corresponding author- e-mail: [email protected]
E. M. Sanger
University at Buffalo, 244 Math. Bldg., Buffalo, NY 14260
e-mail: [email protected]
Abstract
It has been conjectured that there are no homogeneous rotation
symmetric bent Boolean functions of degree greater than two. In this
paper we begin by proving that sums of short-cycle rotation symmetric
bent Boolean functions must contain a specific degree two monomial
rotation symmetric Boolean function. We then prove most cases of the
conjecture in n = 2p, p > 2 prime, variables and extend this work to
the nonhomogeneous case.
1
Introduction
A Boolean function in n variables can be defined as a map from Vn , the
n-dimensional vector space over the two element field F2 , to F2 . If f is a
Boolean function in n variables, the truth table of f is defined to be the 2n tuple given by (f (v0 ), f (v1 ), . . . , f (v2n −1 )) where v0 = (0, . . . , 0, 0), v1 =
(0, . . . , 0, 1), . . . , v2n −1 = (1, . . . , 1, 1) are the 2n elements of Vn listed in
lexicographical order. The weight or Hamming weight of f (notation wt(f ))
is the number of 1’s that appear in the truth table of f .
As described in [1, pp. 5-6], every Boolean function on Vn can be expressed as a polynomial over F2 in n binary variables by:
X
an−1
f (x0 , . . . , xn−1 ) =
ca xa00 · · · xn−1
a∈Vn
where ca ∈ F2 and a = (a0 , . . . , an−1 ) with each ai equal to 0 or 1. The
above representation is the algebraic normal form (ANF) of f . Let di be the
1
number of variables in the i-th monomial of f , so di is the algebraic degree
(or just the degree) of the monomial. If we let D be the set of the distinct
degrees of the monomials in f which have non-zero coefficients, then the
degree (notation deg(f )) of f is given by max(D). If D contains only one element, then each monomial in f has the same degree and f is homogeneous.
If deg(f ) = 1, then f is affine, and if f is affine and homogeneous (i.e. the
constant term is 0), then f is linear.
A Boolean function f is rotation symmetric (RotS) if its ANF is invariant
under any power of the cyclic permutation ρ(x0 , . . . , xn−1 ) = (x1 , . . . , xn−1 , x0 ).
We will use the notation u ∼ v to indicate that there exists some 1 ≤ k ≤ n
such that ρk (u) = v. Clearly ∼ defines an equivalence relation on Vn .
Let On (x) denote the orbit of x under the action of ρk , 1 ≤ k ≤ n, and
let Gn be the set of representatives of all the orbits in Vn . Then a rotation
symmetric Boolean function f can be written as
a0 ⊕ a1 x 0 ⊕
n−1
X
a1j x0 xj ⊕ . . . ⊕ a12...n x0 x1 · · · xn−1 ,
j=1
where the coefficients a0 , a1 , a1j , . . . , a12...n ∈ F2 , and the existence of a
representative term x0 xi2 · · · xil implies the existence of all the terms from
On (x0 , xi2 , . . . , xil ) in the algebraic normal form. We call this representation
the short algebraic normal form (SANF) of f .
Unless otherwise specified, all subscripts in any monomial will be taken
mod (n) with entries in {0, 1, . . . , n − 1}. We may omit the modulus if it is
clear from the context.
Suppose f has SANF x0 xi1 . . . xil , then we say f is a monomial rotation
symmetric (MRS) function and call it full-cycle if |On (x0 , xi1 , . . . , xil )| =
n. Thus if f is full-cycle then it contains n monomials in its ANF. If
|On (x0 , xi1 , . . . , xil )| < n we say f is short-cycle. In this case f will contain n/w monomials in its ANF for some divisor w > 1 of n.
The Hamming distance between two Boolean functions f and g, denoted
d(f, g), is defined as d(f, g) = wt(f ⊕ g). Each Boolean function f has an
associated sign function, fˆ : R∗ → C∗ , defined by fˆ(x) = (−1)f (x) .
Definition 1.1. The Walsh transform of a function f : Vn → F2 is the map
W (f ) : Vn → R given by,
X
f (x)(−1)w·x
W (f )(w) =
x∈Vn
The Walsh spectrum of f is the list of the 2n Walsh coefficients given by
W (f )(w) as w varies.
2
Definition 1.2. A matrix H is called a Hadamard matrix of order n if it is
an n × n matrix of ±1s such that
HH t = nIn ,
where H t is the transpose of H and In is the n × n identity matrix.
Definition 1.3. A Boolean function f in n variables is called bent if and
only if the Walsh transform coefficients of fˆ are all ±2n/2 .
Definition 1.4. The nonlinearity of a function f, denoted by Nf , is defined
by
Nf = min d(f, g),
g∈An
where An is the set of all affine functions on Vn .
From [1, pp. 76-77] we have the following equivalent definition of the
bent property:
Theorem 1.1. Let f : Vn → F2 be a Boolean function. Then the following
are equivalent:
(i) f is bent.
(ii) Mfˆ = (fˆ(u ⊕ v)) is a Hadamard matrix.
(iii) The nonlinearity of f is Nf = 2n−1 − 2n/2−1 .
It is easy to observe that bent functions exist only for even dimensions.
Let n be even and v = (a0 , a1 , . . . , an−1 ); then we will use the notation
v′ = (a0 , . . . , a n2 −1 ) and v′′ = (a n2 , . . . , an−1 ).
Lemma 1.2. For n = 2, the degree of a bent function on V2 is 2. For
n > 2, the degree of a bent function is at most n/2.
Proof. The proof of this can be found in [1, pp. 80].
2
Rotation symmetric bent functions when n=2m
In this section we will consider rotation symmetric functions of any even
degree n. We will first prove that any degree 2 rotation symmetric bent
n/2−1
L
function must contain f0 =
xi x n2 +i and then extend this to the case
i=0
where f is composed of short-cycle MRS functions. We begin by proving
the well known fact that f0 is bent.
3
Lemma 2.1. Let n = 2m and f0 =
m−1
L
xi xm+i . Then wt(f0 ) = 22m−1 −
i=0
2m−1 and f0 is bent.
Proof. The fact that f is bent follows from [1, Cor. 5.23, p. 82], after a
permutation of the variables. Then a computation gives the weight.
To prove that any degree 2 rotation symmetric bent function, f , must
contain f0 , we will look at the matrix M = (fˆ(vi ⊕ vj ))(fˆ(vi ⊕ vj ))T to
determine when (fˆ(vi ⊕ vj )) is a Hadamard matrix. We will first simplify
the matrix M to a useful form.
Lemma 2.2. Let M = (fˆ(vi ⊕ vj ))(fˆ(vi ⊕ vj ))T where f is a Boolean
function in n variables, then
Mi,j =
n −1
2X
fˆ(vi ⊕ vk )fˆ(vk ⊕ vj ).
(1)
k=0
Proof. Let A = (fˆ(vi ⊕ vj )). Notice AT = A, so M = AA. Then
Mi,j = (AA)i,j =
n −1
2X
Aik Akj =
n −1
2X
fˆ(vi ⊕ vk )fˆ(vk ⊕ vj ).
k=0
k=0
Lemma 2.3. We have vi ∼ vj if and only if there exists k, 1 ≤ k ≤ n such
that 2k i ≡ j mod (2n − 1).
Proof. Let vi = (a0 , a1 , ..., an−2 , an−1 ), so i =
n
X
an−u 2u−1 . ⇒: Assume
u=1
vi ∼ vj , then there exists ρl , 1 ≤ l ≤ n, such that
ρl (vi ) = (ρl (a0 ), . . . , ρl (an−2 ), ρl (an−1 )) = (al , . . . , al+n−2 , al+n−1 ) = vj .
4
Thus, j =
n
X
al+n−u 2u−1 where 1 ≤ l ≤ n and
u=1
2l i =
n
X
an−u 2l+u−1
u=1
= an−1 2l + . . . + an−(n−l) 2l+(n−l)−1 + an−(n−l+1) 2l+(n−l+1)−1 +
an−(n−l+2) 2l+(n−l+2)−1 + . . . + a0 2l+n−1
= an−1 2l + . . . + al 2n−1 + al−1 2n + al−2 2n+1 . . . + a0 2n−1+l
≡ al−1 + al−2 2 + . . . + al 2n−1 mod (2n − 1)
≡ al+n−1 + al+n−2 2 + . . . + al+1 2n−2 + al 2n−1 mod (2n − 1)
≡ j mod (2n − 1),
since indices are taken mod n.
Thus there exists k, 1 ≤ k ≤ n such that 2k i ≡j mod (2n − 1).
⇐: Assume there exists k, 1 ≤ k ≤ n such that 2k i ≡ j mod (2n − 1).
Then
2k i =
n
X
an−u 2k+u−1
u=1
= an−1 2k + . . . + an−(n−k) 2k+(n−k)−1 + an−(n−k+1) 2k+(n−k+1)−1
+an−(n−k+2) 2k+(n−k+2)−1 + . . . + a0 2n−1+k
= an−1 2k + . . . + ak 2n−1 + ak−1 2n + ak−2 2n+1 + . . . + a0 2n−1+k
≡ ak−1 + ak−2 2 + . . . + ak 2n−1
mod (2n − 1)
= j.
Thus vj = (ak−1 , ak−2 , . . . , ak ) so ρk−1 (vi ) = vj and vi ∼ vj .
Lemma 2.4. We have va ∼ vb if and only if v2n −1−a ∼ v2n −1−b .
Proof. By Lemma 2.3,
va ∼ vb
⇐⇒
there exists k, 1 ≤ k ≤ n such that 2k a ≡ b mod (2n − 1)
⇐⇒
2n − 1 − 2k a ≡ 2n − 1 − b
⇐⇒
2k (2n − 1 − a) ≡ 2n − 1 − b
⇐⇒
v2n −1−a ∼ v2n −1−b .
5
Lemma 2.5.
M0,2n −1 =
2n−1
X−1
2fˆ(vk )fˆ(v2n −1−k ).
(2)
k=0
Proof. From (1) we have,
M0,2n −1 =
n −1
2X
fˆ(v0 ⊕ vk )fˆ(vk ⊕ v2n −1 ) =
n −1
2X
fˆ(vk )fˆ(v2n −1−k )
k=0
k=0
= fˆ(v0 )fˆ(v2n −1 ) + fˆ(v1 )fˆ(v2n −2 ) + . . . + fˆ(v2n−1 −1 )fˆ(v2n−1 )
+fˆ(v2n−1 )fˆ(v2n−1 −1 ) + . . . + fˆ(v2n −2 )fˆ(v1 ) + fˆ(v2n −1 )fˆ(v0 )
=
2n−1
X−1
2fˆ(vk )fˆ(v2n −1−k ).
k=0
Lemma 2.6. The function f0 =
m−1
L
xi xm+i is the only MRS short-cycle
i=0
function of degree 2 in n = 2m variables.
Proof. Let f be an MRS function with SANF x0 xk . Suppose f is short-cycle,
then f has 1 ≤ M < 2m monomials and
f = x0 xk ⊕ x1 xk+1 ⊕ . . . ⊕ xM −1 xk+M −1 .
Thus {0, k} = {M, k + M }. Since 1 ≤ M < 2m = n then we have the
following cases:
(i) 0 = M and k ≡ M + k mod (n). This is a contradiction since 1 ≤ M .
(ii) k = M and 0 ≡ M + k mod (n). Thus 0 ≡ M + k mod (n) ≡
2M mod (2m). So 2M = 2am for some a ∈ Z. Since 1 ≤ M < 2m,
then 2 ≤ 2am < 4m and so a = 1. Thus M = m.
Thus f is a short-cycle if and only if k = m which gives f = f0 .
We now have enough to prove that f0 is the only homogeneous MRS
bent function of degree 2:
Theorem 2.7. Let f be a rotation symmetric boolean function in n = 2m
variables which has the SANF x0 xk . Then f is bent if and only if k = m.
6
Proof. Assume k 6= m = n2 . Then by Lemma 2.6, f is full cycle and we write
n−1
L
f=
xi xk+i . Then each variable xi , 0 ≤ i ≤ n − 1, appears in two distinct
i=0
monomials in f and there are n (even) monomials in f . We will first show
f (vi ) = f (v2n −1−i ), 0 ≤ i ≤ n − 1, and hence fˆ(vi ) = fˆ(v2n −1−i ). Notice
f (vi ) = 0 when there are an even number of monomials in f which have a
value of 1 and f (vi ) = 1 when there are an odd number of monomials which
have a value of 1.
Fix i = I and let wt(vI ) = l. Suppose f (vI ) has r, s, and t monomials
of the form xj xh with {xj , xh } = {1, 1}, {1, 0}, and {0, 0} respectively, so
f (vI ) ≡ r mod 2. Since each variable xi appears in two distinct monomials
of f , then by counting the number of times xi = 1 in f we see 2r+s = 2l and
s must be even. Also, we know there are n monomials in f so r + s + t = n.
Clearly f (vI ) = 0 ⇐⇒ r is even ⇐⇒ t is even, since s, n are both even
and r + s + t = n. It is easy to see that f (v2n −1−I ) = f (v¯I ) ≡ t mod 2.
Thus f (v2n −1−I ) = 0 ⇐⇒ t is even.
Hence for any i, 0 ≤ i ≤ 2n − 1, we have f (vi ) = f (v2n −1−i ) and
therefore fˆ(vi ) = fˆ(v2n −1−i ). So (2) becomes:
M0,2n −1 =
2n−1
X−1
2(fˆ(vi ))2 = 2n .
i=0
Thus if k 6= m then M0,2n −1 6= 0 and we have that (fˆ(vi ⊕ vj )) is not
Hadamard. Thus by Theorem 1.1 f is not bent. The remainder of the
theorem follows from Lemma 2.1.
Corollary 2.8. If n = 2m, then any degree 2 rotation symmetric bent
m−1
L
function must contain f0 =
xi xm+i .
i=0
Proof. Assume f is a rotation symmetric function of degree 2. By [1, Th.
5.29, p. 83] we can assume f has only quadratic monomials, so f has SANF
n−1
L
ai x0 xi where the coefficients ai ∈ F2 . Let gk be the function with SANF
i=1
ak x0 xk where 1 ≤ k ≤ n − 1. Suppose f does not contain f0 , then a n2 = 0.
n−1
L
We have gk = ak
xi xk+i when 1 ≤ k ≤ n − 1 and from the proof of
i=0
Theorem 2.7, since an/2 = 0 we know gˆk (vi ) = gˆk (v2n −1−i ) for 1 ≤ i ≤ n−1.
\
n−1
n−1
n−1
n−1
Q
Q
Q
L
gˆk (v2n −1−i ) =
gˆk (vi ) =
gˆk . Thus fˆ(vi ) =
gk =
Also, fˆ =
k=1
k=1
k=1
7
k=1
fˆ(v2n −1−i ). So (2) gives:
M0,2n −1 =
2n−1
X−1
2(fˆ(vk ))2 = 2n .
k=0
Thus M0,2n −1 6= 0, so (fˆ(vi ⊕ vj )) is not Hadamard and therefore by Theorem 1.1 f is not bent.
Necessary and sufficient conditions for a bent quadratic function are
given in [6, Lemma 1, p. 4909]. The Lemma gives an alternate proof of
Corollary 2.8 as discussed in [6, Rmk. 1, p. 4910]. A characterization of
any bent RS function of degree 2 follows from [4, Th. 3.7, p. 6]. Examples
show that [4, Th. 3.1, p. 3] is false.
L
We will now look at rotation symmetric functions f =
fi of any degree
i
where each of the fi is a short-cycle MRS Boolean function. We will prove
that f is bent only if fi = f0 for some i. To do this we need the following
result from [5, pp. 218].
Theorem 2.9. Let f be a function on Vn and J ⊂ {0, 1, 2, . . . , n − 1} such
that f does not contain any term xj1 · · · xjt where t > 1 and j1 , . . . , jt ∈ J.
Then the nonlinearity of f satisfies Nf ≤ 2n−1 − 2s−1 , where s = |J|.
Theorem 2.10. Let n = 2m, then f0 =
m−1
L
xi xm+i is the only bent short-
i=0
cycle MRS Boolean function in n variables.
Proof. Let f have SANF x0 xa1 · · · xad−1 and suppose f is a short-cycle function. Then the number of monomials in f is k where 1 ≤ k < 2m. Thus,
f = x0 xa1 · · · xad−1 ⊕ x1 xa1 +1 · · · xad−1 +1 ⊕ · · · ⊕ xk−1 xa1 +k−1 · · · xad−1 +k−1
It is easy to see then that {0, a1 , . . . , ad−1 } = {k, a1 + k, . . . , ad−1 + k} =
. . . = {lk, a1 + lk, . . . , ad−1 + lk} where lk < 2m. By Lemma 3.1 we know
k must divide n = 2m, thus 1 ≤ k ≤ m. Thus by rotation symmetry
the tuple {ai , ai + k, . . . , ai + lk} appears in each monomial of f , for every
i, 0 ≤ i ≤ d − 1. If k = m then l = 1 and f has SANF
f = x0 xa1 xa2 . . . xag−1 xm xm+a1 . . . xm+ag−1 ,
(3)
where 0 < a1 < a2 < . . . < ag−1 < m. First consider g > 1. Suppose
ak < m and ak + 1 = m; then m + ak < 2m and m + ak + 1 = 2m. So
8
if xak +1 = xm then xm+ak +1 = x0 . Thus for each monomial in f, g of the
variables xi have i < m and g have i ≥ m. Let J = {m − 1, m, . . . , n − 1}.
Thus by Theorem 2.9 we have Nf ≤ 2n−1 − 2m < 2n−1 − 2m−1 , so f is not
bent by Theorem 1.1. If g = 1 then f = f0 which we know is bent. Thus if
k = m then f is bent only if f = f0 . If k < m then by regrouping the terms
we have that,
f=
k−1
M
xi xb1 +i · · · xbg +i xk+i xb1 +k+i · · · xbg +k+i · · · xlk+i xb1 +lk+i · · · xbg +lk+i
i=0
From the first term in the monomial, xi , we see that each monomial contains
at least one element of the set {x0 , x1 , . . . , xk−1 }. Since k < m then k − 1 <
m − 1. So if we let J = {m − 1, m, m + 1, . . . , n − 1}, then by Theorem 2.9
we have Nf ≤ 2n−1 − 2m < 2n−1 − 2m−1 . Thus f is not bent by Theorem
1.1.
Theorem 2.11. Let n =
L2m and let f in n variables be a sum of MRS shortcycle functions, so f =
fi , where each fi has fewer than n monomials. If
i
f is bent then one of the fi is f0 =
m−1
L
xi xm+i .
i=0
Proof. Assume f is bent and no fi is f0 . Then any short-cycle of the form
in equation (3) has g > 1 and from the proof of Theorem 2.10 we see that
each monomial in f contains at least one variable xi where i < m − 1.
Thus if we let J = {m − 1, m, . . . , n − 1} then f does not contain any
term xj1 · · · xjt where t > 1 and ji ∈ J; hence from Theorem 2.9 we have
Nf ≤ 2n−1 − 2m < 2n−1 − 2m−1 . Thus f cannot be bent, contradiction.
Therefore one of the fi is f0 .
3
Homogeneous rotation symmetric bent functions
when n=2p
Using ideas similar to those in section 2, we can prove that the only homogeneous MRS bent function in n = 2p variables, where p > 2 is prime, is
p−1
L
f0 =
xi xp+i . By a different method, this result was proven for any n by
i=0
Meng et al. [3, Th. 11, pp. 1114]
Notice we have already proven this for some cases in section 2. For the
remainder of the cases we must first further simplify (2). To do this we will
need a few facts about the rotation symmetric equivalence classes of Vn .
9
Lemma 3.1. |On (vi )| divides n.
Proof. On (vi ) is the orbit generated by vi ∈ Vn under the action of G
where G is the group of left cyclic shifts. Thus |On (vi )| = |G : Gvi |, where
Gvi = {ρ ∈ G|ρ(vi ) = vi }. Since |G| = n then |On (vi )| divides n.
Lemma 3.2. |On (vi )| = 2 ⇐⇒ vi ∼ v 2n −1 .
3
Proof. ⇒: |On (vi )| = 2 ⇐⇒ On (vi ) = {(1, 0, 1, 0, . . . , 1, 0), (0, 1, 0, 1, . . . , 0, 1)}.
Let vi = (0, 1, 0, 1, . . . , 0, 1) ⇒ i = 1 + 22 + 24 + . . . + 2n−2 ⇒
3i = (1 + 2)i = (1 + 2)(1 + 22 + 24 + . . . + 2n−2 )
= (1 + 22 + 24 + . . . + 2n−2 ) + (2 + 23 + 25 + . . . + 2n−1 )
= 1 + 2 + 22 + 23 + 24 + . . . + 2n−1
n
⇒ v3i = v2n −1 since v2n −1 = (1, 1, 1, . . . , 1). So we have i = 2 3−1 . Since
(0, 1, 0, 1, . . . , 0, 1) ∼ (1, 0, 1, 0, . . . , 1, 0) we have (1, 0, 1, 0, . . . , 1, 0) ∼ v 2n −1 .
3
⇐: Reverse the argument used above.
M0,2n −1
n
2
is an odd prime, then
X
fˆ(vk )fˆ(v2n −1−k )
= 2 + 2fˆ(v0 )fˆ(v2n −1 ) + 2n
Theorem 3.3. If n is even and
vk ∈Gn
|On (vk )|=n
vk ≁v2n −1−k
+n
X
fˆ(vk )fˆ(v2n −1−k ) + n
vk ∈Gn
|On (vk )|= n
2
X
(fˆ(vk ))2 . (4)
vk ∈Gn
|On (vk )|=n
vk ∼v2n −1−k
Proof. Let n = 2p where p is an odd prime. Then by Lemma 3.1, |On (vi )| =
1, 2, p, or n.
Let vi ∈ Vn such that |On (vi )| = 1, then vi = v0 or v2n −1 which appears
as the first term of (2) with k = 0.
n
n
If |On (vi )| = 2 then vi = v 2n −1 and 2n − 1 − 2 3−1 = 2 2 3−1 , so vi ∼
3
v2n −1−i and we have one 2(fˆ(v 2n −1 )2 term. Since fˆ(vi ) = ±1 for any
3
n
vi ∈ Vn then (fˆ(vi ))2 = 1 for any vi . So when k = 2 3−1 in (2), then
2fˆ(vk )fˆ(v2n −1−k ) = 2.
Now suppose vi = (a0 , a1 , . . . , an−1 ) ∈ Gn and |On (vi )| = p, then
vi′ = vi′′ . So to consider the cyclic shifts of vi we need only consider the cyclic
shifts of (a0 , a1 , . . . , ap−1 ). Notice v2n −1−i = (1 + a0 , 1 + a1 , . . . , 1 + an−1 )
and we have (1 + a0 , 1 + a1 , . . . , 1 + ap−1 ) = (1 + ap , 1 + ap+1 , . . . , 1 + an−1 )
10
so |On (v2n −1−i )| = p as well. Since p is odd (1 + a0 , 1 + a1 , . . . , 1 + ap−1 ) will
have a different number of 1’s than (a0 , a1 , . . . , ap−1 ). Hence vi ≁ v2n −1−i
since (a0 , a1 , . . . , ap−1 ) ≁ (1+a0 , 1+a1 , . . . , 1+ap−1 ). Thus from Lemma 2.4,
if |On (vi )| = p, then grouping the corresponding terms in (2) by the equivalence class representatives gives 2pfˆ(vi )fˆ(v2n −1−i ) = nfˆ(vi )fˆ(v2n −1−i ).
If |On (vi )| = n and vi ≁ v2n −1−i then grouping the corresponding terms
in (2) by the equivalence class representative gives the new coefficient 2n. If
vi ∼ v2n −1−i then this coefficient becomes 2 n2 = n.
Thus (2) reduces to the above equation.
Lemma 3.4. Let n = 2p, where p > 2 is prime. If f is a rotation symmetric
bent Boolean function in n variables, then fˆ(v0 ) = −fˆ(v2n −1 ).
Proof. From Theorem 1.1 f is bent if and only if M = 2n I2n . Thus if f is
bent then M0,2n −1 = 0. From (4) we see that in order for M0,2n −1 to be 0
we need the 2 which appears from the case vk = v 2n −1 to cancel. Let
3
X
a = fˆ(v0 )fˆ(v2n −1 ), b =
fˆ(vk )fˆ(v2n −1−k ),
vk ∈Gn
|On (vk )|=n
vk ≁v2n −1−k
c=
X
fˆ(vk )fˆ(v2n −1−k ), and d =
vk ∈Gn
|On (vk )|= n
2
X
(fˆ(vk ))2 .
vk ∈Gn
|On (vk )|=n
vk ∼v2n −1−k
Assume f is bent, then (4) becomes:
2 + 2a + 4pb + 2pc + 2pd = 0 ⇒ p(2b + c + d) = −1 − a.
If a = 1, then p(2b + c + d) = −2. Since p > 2 and 2b + c + d ∈ Z
this is a contradiction. Thus a = −1 and fˆ(v0 )fˆ(v2n −1 ) = −1. Therefore
fˆ(v0 ) = −fˆ(v2n −1 ) since fˆ(vi ) = ±1 for all i.
The following corollary now proves that full-cycle homogeneous MRS
Boolean functions in 2p variables cannot be bent.
Corollary 3.5. Let n = 2p where p is an odd prime. Let f be an MRS
boolean function with SANF x0 xa1 xa2 . . . xad−1 . If the number of monomials
in f is n, then f is not bent.
Proof. Using Theorem 1.1 we need only show M0,2n −1 6= 0. If the number
of monomials in f is n, then we have fˆ(v0 ) = fˆ(v2n −1 ) since n = 2p is even.
Thus M0,2n −1 6= 0 so f is not bent.
11
We can now prove that f0 is the only homogeneous MRS bent function.
Theorem 3.6. Let n = 2p, where p > 2 is prime. The only bent homogep−1
L
neous MRS Boolean function in n variables is f0 =
xi xp+i .
i=0
Proof. Any monomial homogeneous rotation symmetric function, f , has
SANF x0 xa1 . . . xad−1 and is either short-cycle or full-cycle. If f is fullcycle then from Corollary 3.5 f is not bent. If f is short-cycle then from
Theorem 2.10, f is bent if and only if f = f0 .
Theorem 3.7. Let n = 2p, where p > 2 is prime, and let f be a rotation
symmetric Boolean function in n variables with SANF x0 xa1 · · · xad−1 . If f
has p monomials, then d is even and f has SANF given by equation (3).
Proof. If the number of monomials in f is p then
f = x0 xa1 · · · xad−1 ⊕ x1 xa1 +1 · · · xad−1 +1 ⊕ · · · ⊕ xp−1 xa1 +p−1 · · · xad−1 +p−1
Thus {0, a1 , . . . , aad−1 } = {p, a1 + p, . . . , ad−1 + p} so each pair {xai , xai +p }
appears in every monomial and f is of the form in (3). The result that d is
even follows immediately since each monomial contains the pairs {xai , xai +p }.
Theorem 3.8. Let n = 2p, where p > 2 is prime. Let f =
s
L
fi where
i=1
each fi has SANF x0 xai1 · · · xaid−1 and deg(f ) = d. Let r be the number of
fi that are short-cycle and l be the number of fi that are long-cycle. If f is
bent then d is even. Furthermore, if d = 2 then f contains f0 and if d 6= 2
then r ≥ 1 is odd and l ≥ 1.
Proof. Let f = f1 ⊕ f2 ⊕ · · · ⊕ fs where each fi has SANF x0 xai1 . . . xaid−1 .
Thus deg(fi ) = d ∀i and so deg(f ) = d. Since n = 2p then GCD(n, d) =
1, 2, p, or n and from Lemma 3.1 we know that the number of monomials in
each fi is either 1, 2, p, or n.
(i) Suppose the number of monomials in fi for some i is 1, then since fi
is rotation symmetric then fi = x0 x1 . . . xn−1 and d = n.
(ii) Suppose the number of monomials in fi for some i is 2, then f =
x0 xai1 . . . xaid−1 ⊕ x1 xai1 +1 . . . xaid−1 +1 . It is easy to see by induction
that the first monomial contains all of the even indices and the second
monomial contains all of the odd indices. Thus d = p.
12
(iii) Suppose the number of monomials in fi for some i is p, then from
Theorem 3.7 fi is of the form in equation (3) and d is even.
Thus fi is a short-cycle function only if d = p, n, or is even. Let GCD(n, d) =
1, then the number of monomials in fi is n for all i. Thus, fˆi (v0 ) =
fˆi (v2n −1 ) ∀i and so fˆ(v0 ) = fˆ(v2n −1 ) and by Lemma 3.4 f is not bent.
If GCD(n, d) = p then fi either has 2 monomials or n monomials for each
i. Thus fˆ(v0 ) = fˆ(v2n −1 ) and so f is not bent. If GCD(n, d) = n then
d = n and f is not bent by Lemma 1.2. Now suppose GCD(n, d) = 2, thus
d is even. If d = 2 then by Corollary 2.8 f must contain f0 which is the
only degree 2 short-cycle. If d 6= 2 then by (iii), the short-cycle functions of
degree d are of the form in equation (3). By Theorem 2.11 we know that
any combination of these short-cycle functions is not bent, thus f must also
contain a long-cycle and so l ≥ 1. If r is even then,
fˆ(v0 ) =
s
Y
fˆi (v0 ) = (−1)r
s
Y
fˆi (v2n −1 ) = fˆ(v2n −1 )
i=1
i=1
since fˆi (v0 ) = −fˆi (v2n −1 ) when fi is short-cycle and fˆi (v0 ) = fˆi (v2n −1 )
when fi is long-cycle. Thus by Lemma 3.4 f is not bent.
Remark. The previous Theorem says that any homogeneous RotS bent
function must have even degree and contain an odd number of short-cycle
MRS functions. If the degree is greater than 2 then it must also contain at
least one long-cycle MRS function.
Lemma 3.9. Let n = 2p, p an odd prime, and f be a homogeneous RotS
Boolean function in n variables with deg(f ) = d = 2k where k > 1. Let
s
l
L
L
f =
fi ⊕
fi where for all 1 ≤ i ≤ s, fi is an MRS short-cycle
i=1
i=s+1
function and for all s + 1 ≤ i ≤ l, fi is an MRS full-cycle function. Suppose
fi has SANF x0 xai1 . . . xaid−1 . If 2 ≤ r ≤ d − 2 for all s + 1 ≤ i ≤ l, where
r is the number of odd indices in {ai1 , . . . , aid−1 }, then f is not bent.
Proof. Since the degree of f is even, we know from the proof of Theorem 3.8
that any short-cycle is of the form in (3). Thus no short-cycle contains a term
xj1 . . . xjt where t > 1 and j1 , . . . , jt are in the set J = {0, 2, 4, . . . , n−2, n−1}
since deg(f ) ≥ 4. If the number of odd indices, r, in the first monomial of
any full-cycle in f is 2 ≤ r ≤ d − 2, then each monomial in the full-cycles
has either r odd indices and d − r even indices or d − r odd indices and
r even indices. Since 2 ≤ r ≤ d − 2 then 2 ≤ d − r ≤ d − 2, thus each
13
monomial contains at least 2 odd indices. Thus, because J contains only
one odd number, n − 1, then no monomial, xj1 . . . xjt , in a long-cycle has
xj1 , . . . , xjt ∈ J where t > 1. Thus by Theorem 2.9, Nf ≤ 2n−1 − 2p <
2n−1 − 2p−1 and so f is not bent by Theorem 1.1.
L
Remark. Lemma 3.9 says that if f =
fi is a homogeneous RotS Boolean
i
function of even degree d, d > 2, in n = 2p variables then one of the fi must
have a monomial with exactly one odd index.
L
Let f be a homogeneous RotS function of degree d with SANF
βi ,
1≤i≤s
where βi = xk(i) xk(i) · · · xk(i) and
0
(i)
2
d−1
(i)
sj , j = 1, 2, . . . , d, by sj
(i)
(i)
k0
(i)
= 0 for all i. Define a sequence
(i)
(i)
= kj − kj−1 for 1 ≤ j ≤ d − 1, and sd =
(i)
k0 + n − kd−1 . Let sf be the largest distance between two consecutive
(i)
indices in all of the monomials in f , thus sf = max sj . Then from [3, Th.
i,j
13, pp. 1116] we have the following:
Theorem 3.10. Let f be a homogeneous RotS function with degree d ≥ 3
in n variables. If sf ≤ n2 , then f is not bent.
We can use Theorem 3.10 to get a useful bound on the degree of any
possible homogeneous RotS bent function in 2p variables:
Theorem 3.11. Let f be a homogeneous RotS bent function of degree d ≥ 3
in n = 2p variables, p an odd prime. Then d ≤ (p + 3)/2.
Proof. Suppose d > (p + 3)/2. We choose J = {0, 1, 2, 4, . . . , 2p − 2} (so
|J| = p + 1 and J has p even elements) in Theorem 2.9. The theorem
applies since now no monomial x0 xa1 . . . xad−1 can have all of its variables
xj in J and also have a gap of length ≥ (n/2) + 1 in its index set (necessary
for f to be bent by Theorem 3.10). Suppose the monomial x0 xa1 . . . xad−1
has all of its variables xj in J and d > p+3
2 . If there is a gap in the indices
greater than or equal to p + 1, then at least p−1
2 of the indices in J do not
p+3
appear in the monomial. Thus there are at most p + 1 − p−1
2 = 2 possible
indices in J which appear in the monomial. Thus d ≤ p+3
2 , contradiction.
Note, for example, that if the indices are 0, 1, 2, p + 3 p + 5, . . . , 2p − 2 then
| {z }
gap
we have a gap of length p + 1 but only (p + 3)/2 indices, contradicting our
assumption about d. Now Theorem 2.9 gives
14
Nf ≤ 2n−1 − 2p ≤ 2n−1 − 2n/2 < 2n−1 − 2n/2−1 ,
so f is not bent by Theorem 1.1, contradicting our hypothesis.
4
Nonhomogeneous rotation symmetric bent functions when n=2p
We have already shown in Theorem 2.11 that any bent function composed
only of short-cycle MRS functions must contain f0 .
We can now extend the ideas used in section 3 to show that in most
cases any bent rotation symmetric Boolean function in n = 2p, p > 2 prime,
variables must contain f0 .
Theorem 4.1. Let n = 2p where p is an odd prime. Let f = f1 ⊕ f2 ⊕
. . . ⊕ fs be a rotation symmetric Boolean function where each fi has SANF
x0 aa1 . . . xadi −1 . If di = 2 or the number of monomials in each fi is either
p−1
L
2 or n, then f is bent only if f contains f0 =
xj xp+j . If f contains an
j=0
even number of fi , where the number of monomials in fi is p and all other
fi contain 2 or n monomials, then f is not bent.
Proof. Let f = f1 ⊕ f2 ⊕ . . . ⊕ fs where for each fi , di = 2 or the number
of monomials in fi is 2 or n. Suppose f is bent and does not contain f0 .
Then since f0 is the only short-cycle RotS function with degree 2 then each
fi contains either 2 or n monomials. Thus from the proof of Corollary 3.5,
fˆi (v0 ) = fˆi (v2n −1 ) for all i. Thus
Y
Y
fˆ(v0 ) =
fˆi (v0 ) =
fˆi (v2n −1 ) = fˆ(v2n −1 )
and from Lemma 3.4 we see that f cannot be bent which is a contradiction.
Thus f must contain f0 .
Now suppose the number of monomials in f1 , f2 , . . . , f2r is p and
f2r+1 , f2r+2 , . . . , fs contain either 2 or n monomials. Then fˆi (v0 ) = −fˆi (v2n −1 )
for 1 ≤ i ≤ 2r and fˆi (v0 ) = fˆ(v2n −1 ) for 2r + 1 ≤ i ≤ s. Thus,
fˆ(v0 ) =
s
Y
fˆi (v0 ) =
i=1
2r
Y
−fˆi (v2n −1 )
s
Y
i=2r+1
i=1
= fˆ(v2n −1 ).
Thus from Lemma 3.4, f cannot be bent.
15
fˆi (v2n −1 ) = (−1)2r fˆ(v2n −1 )
Remark. If fi has 1 monomial, for some i, then deg(fi ) = n. Thus deg(f ) =
n and so f is not bent from Lemma 1.2.
Remark. The previous Theorem says that any nonhomogeneous RotS bent
function must contain an odd number of short-cycle MRS functions of even
degree and at least one function which is a long-cycle MRS function.
References
[1] T. W. Cusick and P. Stănică, Cryptographic Boolean Functions and
Applications (San Diego: Academic Press, 2009).
[2] H. Kim, S-M. Park and S. G. Hahn, On the weight and nonlinearity of homogeneous rotation symmetric Boolean functions of degree 2,
Discrete Applied Mathematics 157, 428-432 (2009)
[3] Q. Meng, L. Chen, F.-W. Fu, On homogeneous rotation symmetric bent
functions, Discrete Appl. Math. 158 (2010), 1111–1117.
[4] X. Zhang, G. Gao, On the conjecture about the nonexistence of rotation
symmetric bent functions, arXiv.org, arXiv:1303.2282v1, 7 pp. (2013).
[5] Y. Zheng, X-M. Zhang, H. Imai, Restriction, terms and nonlinearity of
Boolean functions, Theoretical Computer Science 226, 207-223 (1999)
[6] Guangpu Gao, Xiyong Zhang, Wenfen Liu, and Claude Carlet, Constructions of Quadratic and Cubic Rotation Symmetric Bent Functions,
IEEE Transactions on Information Theory 58, 4908-4913 (2012)
16
| 7cs.IT
|
Maximizing the information learned from finite
data selects a simple model
Henry H. Mattinglya , Mark K. Transtrumb , Michael C. Abbottc,1 , and Benjamin B. Machtad,1
a
Lewis-Sigler Institute and Department of Chemical and Biological Engineering, Princeton University, Princeton, NJ 08544, USA; b Department of Physics and Astronomy,
Brigham Young University, Provo, Utah 84602, USA; c Marian Smoluchowski Institute of Physics, Jagiellonian University, Ulica Łojasiewicza 11, 30-348 Kraków, Poland;
d
Lewis-Sigler Institute and Department of Physics, Princeton University, Princeton, NJ 08544, USA
arXiv:1705.01166v3 [physics.data-an] 14 Feb 2018
PNAS (7 February 2018) + SI ≈ arXiv:1705.01166v3
Earlier versions had the title “Rational Ignorance: Simpler Models Learn More Information from Finite Data”
We use the language of uninformative Bayesian prior choice to study
the selection of appropriately simple effective models. We advocate
for the prior which maximizes the mutual information between parameters and predictions, learning as much as possible from limited data.
When many parameters are poorly constrained by the available data,
we find that this prior puts weight only on boundaries of the parameter manifold. Thus it selects a lower-dimensional effective theory in a
principled way, ignoring irrelevant parameter directions. In the limit
where there is sufficient data to tightly constrain any number of parameters, this reduces to Jeffreys prior. But we argue that this limit is
pathological when applied to the hyper-ribbon parameter manifolds
generic in science, because it leads to dramatic dependence on effects invisible to experiment.
The theory and the experiment are together described by a
probability distribution p(x|θ), for each value of the theory’s
parameters θ ∈ Θ. This function encodes both the quality and
quantity of data to be collected.
The mutual information between the parameters and their
expected data is defined as MI = I(X; Θ) = S(Θ) − S(Θ|X),
where S is the Shannon entropy (23). The MI thus quantifies
the information which can be learned about the parameters
by measuring the data, or equivalently, the information about
the data which can be encoded in the parameters (24, 25).
Defining p? (θ) by maximizing this, we see:
i. The prior p? (θ) is almost always discrete (26–30), with
weight only on a finite number
PK K of points, or atoms
(Figures 1 and 2): p? (θ) = a=1 λa δ(θ − θa ).
Effective Theory | Model Selection | Renormalization Group | Bayesian
Prior Choice | Information Theory
ii. When data is abundant, p? (θ) approaches Jeffreys prior
pJ (θ) (31–33). As this continuum limit is approached,
the proper spacing of the atoms shrinks as a power law
(Figure 3).
P
hysicists prefer simple models not because nature is simple, but because most of its complication is usually irrelevant. Our most rigorous understanding of this idea comes from
the Wilsonian renormalization group (1–3), which describes
mathematically the process of zooming out and losing sight
of microscopic details. These details only influence the effective theory which describes macroscopic observables through
a few relevant parameter combinations, such as the critical
temperature, or the proton mass. The remaining irrelevant
parameters can be ignored, as they are neither constrained
by past data nor useful for predictions. Such models can now
be understood as part of a large class called sloppy models
(4–14), whose usefulness relies on a similar compression of a
large microscopic parameter space down to just a few relevant
directions.
This justification for model simplicity is different from the
one more often discussed in statistics, motivated by the desire
to avoid overfitting (15–21). Since irrelevant parameters have
an almost invisible effect on predicted data, they cannot be
excluded on these grounds. Here we motivate their exclusion
differently: we show that simplifying a model can often allow it
to extract more information from a limited data set, and that
this offers a guide for choosing appropriate effective theories.
We phrase the question of model selection as part of the
choice of a Bayesian prior on some high-dimensional parameter space. In a set of nested models, we can always move
to a simpler model by using a prior which is nonzero only on
some subspace. Recent work has suggested that interpretable
effective models are typically obtained by taking some parameters to their limiting values, often 0 or ∞, thus restricting to
lower-dimensional boundaries of the parameter manifold (22).
Our setup is that we wish to learn about a theory by
performing some experiment which produces data x ∈ X.
iii. When data is scarce, most atoms lie on boundaries of
parameter space, corresponding to effective models with
fewer parameters (Figure 4). The resulting distribution of
weight along relevant directions is much more even than
that given by Jeffreys prior (Figure 5).
Significance Statement
Most physical theories are effective theories, descriptions at
the scale visible to our experiments which ignore microscopic
details. Seeking general ways to motivate such theories, we
find an information theory perspective: if we select the model
which can learn as much information as possible from the
data, then we are naturally led to a simpler model, by a path
independent of concerns about overfitting. This is encoded as
a Bayesian prior which is nonzero only on a subspace of the
original parameter space. We differ from earlier prior selection
work by not considering infinitely much data. Having finite data
is always a limit on the resolution of an experiment, and in our
framework this selects how complicated a theory is appropriate.
H.H.M. and M.C.A. performed the numerical experiments. H.H.M., M.K.T., M.C.A. and B.B.M. designed the research, interpreted results, and contributed to writing. M.C.A. and B.B.M. led the
writing of the paper.
Present affiliation for H.H.M.: Department of Molecular Cellular and Developmental Biology, Yale
University, New Haven, CT, 06520
Present affiliations for B.B.M: Department of Physics, Yale University, New Haven, CT, 06520
Systems Biology Institute, Yale University, West Haven, CT, 06516
1
To whom correspondence should be addressed. E-mail: [email protected] and
[email protected]
A
B
C
Fig. 1. Optimal priors for the Bernoulli model (1). Red lines indicate the positions
of delta functions in p? (θ), which are at the maxima of fKL (θ), Eq. (3). As
m → ∞ these coalesce into Jeffreys prior pJ (θ).
After some preliminaries, we demonstrate these properties in
three simple examples, each a stylized version of a realistic
experiment. To see the origin of discreteness, we study the bias
of an unfair coin and the value of a single variable corrupted
with Gaussian noise. To see how models of lower dimension
arise, we then study the problem of inferring decay rates in a
sum of exponentials.
In the Appendix we discuss the alorithms used for finding
p? (θ) (Figures 2 and S3), and we apply some more traditional
model selection tools to the sum of exponentials example
(Figure S1).
Priors and Geometry
Bayes’ theorem tells us how to update our knowledge of θ
upon observing data x, from prior
p(θ) to posterior p(θ|x) =
R
p(x|θ)p(θ)/p(x), where p(x) = dθ p(θ) p(x|θ). In the absence
of better knowledge we must pick an uninformative prior
which codifies our ignorance. The naive choice of a flat prior
p(θ) = const. has undesirable features, in particular making
p(x) depend on the choice of parameterization, through the
measure dθ.
Jeffreys prior pJ (θ) is invariant under changes of parameterizaion, because it is constructedpfrom some properties of
the experiment (34). This pJ (θ) ∝ det gµν is, up to normalization, the volume form arising from the Fisher information
metric (FIM, often -matrix):
Bernardo defined a prior p? (θ) by maximizing the mutual
information between parameters Θ and the expected data X m
from m repetitions, and then a reference prior by taking the
limit m → ∞ (29, 31). Under certain benign assumptions,
this reference prior is exactly Jeffreys prior (31–33), providing
an alternative justification for pJ (θ).
We differ in taking seriously that the amount of data collected is always finite.∗ Besides being physically unrealistic,
the limit m → ∞ is pathological both for model selection
and prior choice. In this limit any number of parameters
can be perfectly inferred, justifying an arbitrarily complicated
model. In addition, in this limit the posterior p(θ|x) becomes
independent of any smooth prior.†
Geometrically, the defining feature of sloppy models is that
they have a parameter manifold with hyper-ribbon structure
(6–9): there are some long directions (corresponding to d relevant, or stiff, parameters) and many shorter directions (D − d
irrelevant, or sloppy, parameter combinations). These lengths
are often estimated using the eigenvalues of gµν , and have
logarithms that are roughly evenly-spaced over many orders
of magnitude (4, 5). The effect of coarse-graining is to shrink
irrelevant directions (here using the technical meaning of irrelevant: a parameter which shrinks under renormalization group
flow) while leaving relevant directions extended, producing a
sloppy manifold (8, 14). By contrast the limit m → ∞ has the
effect of expanding all directions, thus erasing the distinction
between directions longer and shorter than the critical length
scale of (approximately) one standard deviation.
On such a hyper-ribbon, Jeffreys prior has an undesirable
feature: since it is constructed from the D-dimensional notion
of volume, its weight along the relevant directions always
depends on the volume of the D − d irrelevant directions. This
gives it extreme dependence on which irrelevant parameters
are included in the model.‡ The optimal prior p? (θ) avoids
this dependence because it is almost always discrete, at finite
m.§ It puts weight on a set of nearly distinguishable points,
closely spaced along the relevant directions, but ignoring the
irrelevant ones. Yet being the solution to a reparameterizationinvariant optimization problem, the prior p? (θ) retains this
good feature of pJ (θ).
Maximizing the mutual information was originally done to
calculate the capacity of a communication channel, and we
can borrow techniques from rate-distortion theory here: the
algorithms we use were developed there (37, 38), and the discreteness we exploit was discovered several times in engineering
(26–28, 39). In statistics, this problem is more often discussed
as an equivalent minimax problem (40). Discreteness was
∗
~ =
gµν (θ)
Z
~
~
~ ∂ log p(x|θ) ∂ log p(x|θ) .
dx p(x|θ)
µ
ν
∂θ
∂θ
This Riemannian metric defines a P
reparameterization-invariant
D
distance between points, ds2 =
g dθµ dθν . It meaµ,ν=1 µν
sures the distinguishability of the data which θ and θ + dθ are
expected to produce, in units of standard deviations. Repeating an (identical and independently distributed)
experiment
Qm
m times means considering pm (~
x|θ) = j=1 p(xj |θ), which
m
leads to metric gµν
(θ) = m gµν (θ). However the factor mD/2
in the volume is lost by normalizing pJ (θ). Thus Jeffreys prior
depends on the type of experiment, but not the quantity of
data.
PNAS
|
7 February, 2018
|
vol. XXX
|
no. XX
|
2
Interned for five years, John Kerrich only flipped his coin 104 times (35). With
computers we can do better, but even the LHC only generated about 1018 bits of
data (36).
†
For simplicity we consider only regular models, i.e. we assume all parameters are
structurally identifiable.
‡
See Figure 5 for a demonstration of this point. For another example, consider a
parameter manifold Θ which is a cone, with Fisher metric ds2 = (50 dϑ)2 +
ϑ2 dΩ2n /4: there is one relevant direction ϑ ∈ [0, 1] of length L = 50, and n
irrelevant directions forming a sphere of diameter ϑ. Then the prior on ϑ alone
~ is p(ϑ) = (n + 1)ϑn , putting most of the weight near to ϑ = 1,
implied by pJ (θ)
dramatically so if n = D − d is large. But since only the relevant direction is visible
to our experiment, the region ϑ ≈ 0 ought to be treated similarly to ϑ ≈ 1. The prior
~ has this property.
p? (θ)
§
We offer both numerical and analytic arguments for discreteness below. The exception
to discreteness is that if there is an exact continuous symmetry, p? (θ) will be constant
along it. For example if our Gaussian model Eq. (2) is placed on a circle (identifying
both θ ∼ θ + 1 and x ∼ x + 1) then the optimum prior is a constant.
Mattingly, Transtrum, Abbott, Machta
|
Rational Ignorance
also observed in other minimax problems (41–43), and later
in directly maximising mutual information (29, 30, 33, 44).
However it does not seem to have been seen as useful, and
none of these papers explicitly find discrete priors in dimension
D > 1, which is where we see attractive properties. Discreteness has been useful, although for different reasons, in the idea
of rational inattention in economics (45, 46). There, market
actors have a finite bandwidth for news, and this drives them
to make discrete choices despite all the dynamics being continuous. Rate-distortion theory has also been useful in several
areas of biology (47–49), and discreteness emerges in a recent
theoretical model of the immune system (50).
We view this procedure of constructing the optimal prior
as a form of model selection, picking out the subspace of Θ
on which p? (θ) has support. This depends on the likelihood
function p(x|θ) and the data space X, but not on the observed
data x. In this regard it is closer to Jeffreys’ perspective
on prior selection than to tools like the information criteria
and Bayes factors, which are employed at the stage of fitting
to data. We discuss this difference at more length in the
Appendix.
log p𝜏(𝜃)
𝜎 = 1/10
2
2
1
e−(x−θ) /2σ .
p(x|θ) = √
2πσ
Mattingly, Transtrum, Abbott, Machta
|
Rational Ignorance
𝜃, with steps Δ𝜃 = 1/300
�
�
log p⭑(𝜃)
dθ p(θ) fKL (θ),
[3]
Z
fKL (θ) = DKL p(x|θ) p(x) =
dx p(x|θ) log
p(x|θ)
p(x)
¶
where DKL is the Kullback–Leibler divergence.
MaximizR
ing MI over all functions p(θ) with dθ p(θ) = 1 gives
fKL (θ) = const. But the maximizing function will not, in
general, obey p(θ) ≥ 0. Subject to this inequality p? (θ) must
satisfy
[1]
{p? (θ) > 0, fKL (θ) = MI} or {p? (θ) = 0, fKL (θ) < MI}
at every θ. With finite data fKL (θ) − MI must be an analytic
function of θ, and therefore must be smooth with a finite
numbers of zeros, corresponding to the atoms of p? (θ) (Figure
1A). See (28, 29, 46) for related arguments for discreteness,
and (41–43) for other approaches.
The number of atoms occurring in p? (θ) increases as the
data improves. For K atoms there is an absolute bound
MI ≤ log K, saturated if they are perfectly distinguishable. In
Figure 2C we observe that the optimal priors instead approach
a line MI → ζ log K, with slope ζ ≈ 0.75. At large L the
length of parameter space is proportional to the number of
distinguishable points, hence MI → log L. Together these
imply K ∼ L1/ζ , and so the average number density of atoms
grows as
ρ0 = K/L ∼ L1/ζ−1 ≈ L1/3 ,
[2]
Repeated
measurements are equivalent to smaller σ (by σ →
√
σ/ m), so we fix m = 1 here. The Fisher metric is gθθ = 1/σ 2 ,
thus L = 1/σ. An optimal prior is shown in Figure 2, and
in Figure 5A along with its implied distribution of expected
data. This p(x) is similar to that implied by Jeffreys prior,
here pJ (θ) = 1.
We calculated p? (θ) numerically in two ways. After discretizing both θ and x, we can use the Blahut–Arimoto (BA)
�
Z
MI = I(X; Θ) =
p
m
,
θ(1−θ)
𝜃, with steps Δ𝜃 = 1/30
◼
◼
algorithm (37, 38). This converges to the global maximum,
which is a discrete distribution: see Figure 2. Alternatively,
using our knowledge that p? (θ) is discrete, we can instead
adjust the positions θa and weights λa of a finite number of
atoms. See the Supplement for more details.
To see analytically why discreteness arises, we write the
mutual information as
thus pJ (θ) = [π θ(1 − θ)]−1 , and
R√
√
proper parameter space length L =
ds2 = π m.
In the extreme case m = 1, the optimal prior is two delta
functions, p? (θ) = 12 δ(θ) + 12 δ(θ − 1), and MI = log 2, exactly
one bit (29, 30, 33). Before an experiment that will only
ever be run once, this places equal weight on both outcomes;
afterwards it records the outcome. As m increases, weight is
moved from the boundary onto interior points, which increase
in number, and ultimately approach the smooth pJ (θ): see
Figures 1 and 2A.
Similar behavior is seen in a second example, in which we
measure one real number x, normally distributed with known
σ about the parameter θ ∈ [0, 1]:
This gives gθθ =
◼
Fig. 2. Convergence of the Blahut–Arimoto algorithm. This is for the oneparameter Gaussian model Eq. (2) with L = 10 (comparable to m = 10 in
Figure 1). On the right θ is discretized into ten times as many points, but pτ (θ)
clearly converges to the same five delta functions.
We begin with some problems with a single bounded parameter, of length L in the Fisher metric. These tractable cases
illustrate the generic behaviour along either short (irrelevant)
or long (relevant, L 1) parameter directions in higherdimensional examples.
Our first example is the Bernoulli problem, in which we
wish to determine the probability θ ∈ [0, 1] that an unfair
coin gives heads, using the data from m trials. It is sufficient
to record the total number of heads x, which occurs with
probability
m!
θx (1 − θ)m−x .
x!(m − x)!
◼
◼
�
One-Parameter Examples
p(x|θ) =
𝜏 = 10 iterations
𝜏 = 100
𝜏 = 104
Exact p⭑(𝜃)
¶
L 1.
[4]
The function fKL (θ) is sometimes called the Bayes risk, as it quantifies how poorly
the prior will perform if θ turns out to be correct. One of the problems equivalent
to maximising the mutual information (40) is the minimax problem for this (see also
Figure 1):
max I(X; Θ) = min max fKL (θ) = min max
p(θ)
p(θ)
θ
R
dθp(θ)DKL [p(x|θ)kq(x)] .
q(x) p(θ)
The distributions we call expected data p(x) are also known as Bayes strategies, i.e.
distributions on X which are the convolution of the likelihood p(x|θ) with some prior
p(θ). The optimal q(x) from this third formulation (with minq(x) . . .) can be shown
to be such a distribution (40).
PNAS
|
7 February, 2018
|
vol. XXX
|
no. XX
|
3
B
𝜃
r=
A
0
B
A
p
Bernoulli: L = ⇡ m
r=
=
k2
Gaussian: L = 1/𝜎
k1
C
1
y2
s = 1ê3
s = 1ê7
y1
‡
0.5
ʇ‡
ʇ‡
ʇÊÊÊ
‡‡
‡‡‡‡‡‡‡‡‡ ‡ ‡ ‡‡‡‡‡‡‡‡‡‡‡‡‡‡‡
‡‡ÊÊÊ
‡‡
‡‡
‡‡
‡‡
‡‡‡‡
‡
‡‡
‡
‡‡
‡‡
‡‡
‡‡
‡‡
‡‡‡
Ê
Ê
‡‡
‡‡
ʇÊ
‡Ê‡
ÊÊ
Ê
Ê
d eff
𝜁=1
𝜁 = 3/4
1
0
‡
‡
‡‡‡‡ ‡ ‡
‡‡‡‡
‡‡‡‡
2
Number of atoms K
Ê
ÊÊÊ
‡Ê‡
ʇÊ
ʇ‡
ʇ‡
‡‡‡‡
‡‡‡‡
‡‡‡
‡‡‡
5
Ê
Ê
rá2
Ê
Ê
rá1
rá0
0
2
Ê
Ê
Ê
Bernoulli
Gaussian
Ê
10 20
1ês
Ê
Ê
Ê
Ê
ÊÊ
Ê
s = 1ê19
2
Wr
I(X; ⇥)/ log 2
1
Ê
Ê
Ê Ê
Ê ÊÊ
Ê
ÊÊ
Ê Ê
r=
C
Ê Ê ÊÊ
Ê ÊÊÊÊ
Ê
ÊÊ
Ê Ê
Ê
Ê ÊÊ
s = 1ê50
50 100
1/𝜎
Fig. 3. Behavior of p? (θ) with increasing Fisher length. Panels A and B show
the atoms of p? (θ) for the two one-dimensional models as L is increased (i.e. we
perform more repetitions m or have smaller noise σ ). Panel C shows the scaling of
the mutual A
information (in bits) with the number of atoms K .The dashed line is the
bound MI ≤ log K , and the solid line is the scaling law MI ∼ 3/4 log K .
Thus the proper spacing between atoms shrinks to zero in
the limit of infinite data, i.e. neighboring atoms cease to be
distinguishable.
To derive this scaling law analytically, in a related paper
(51) we consider a field theory for the number density of atoms,
in which the entropy density (omitting numerical factors) is
B
2
S = const. − e−ρ [ρ4 (ρ0 )2 + 1].
From this we find ζ = 3/4, which is consistent with both
examples presented above.
Multi-parameter Example
In the examples above, p? (θ) concentrates weight on the edges
of its allowed domain when data is scarce (i.e. when m is
small or σ is large, hence L is small). We next turn to a multiparameter model in which some parameter combinations are
ill-constrained, and where edges correspond to reduced models.
The physical picture is that we wish to determine the
composition of an unknown radioactive source, from data of xt
Geiger counter clicks at some times t. As parameters we have
the quantities Aµ and decay constants kµ of isotopes µ. The
probability of observing xt should be a Poisson distribution (of
mean yt ) at each time, but we approximate these by Gaussians
to write:‖
p(~x|~
y) ∝
Y
2
e−(xt −yt )
/2σ 2
,
X
yt =
t
‖
Aµ e−kµ t .
[5]
µ
Using a normal distribution of fixed σ here is what allows the metric in Eq. (6) to
be so simple. However the qualitative behavior from the Poisson distribution is very
similar.
PNAS
|
7 February, 2018
|
vol. XXX
|
no. XX
|
4
Fig. 4. Parameters and priors for the exponential model (5). Panel A shows the
area of the ~
y plane covered by all decay constants k1 , k2 ≥ 0. Panel B shows the
positions of the delta functions of the optimal prior p? (~
y ) for several values of σ , with
colors indicating the dimensionality r at each point. Panel C shows the proportion of
weight on these dimensionalities.
Fixing σt = σ = const. then brings us to a nonlinear leastsquares model of the type studied by (6, 7). This same model
also arises in other contexts, such as the asymptotic approach
to equilibrium of many dynamical systems (52).
We can see the essential behavior with just two isotopes
in fixed quantities: Aµ = 12 , thus yt = 12 (e−k1 t + e−k2 t ).
Measuring at only two times t1 and t2 , we almost have a
two-dimensional version of Eq. (2), in which the center of the
distribution ~
y = (y1 , y2 ) plays the role of θ above. The mapping between ~k and ~
y is shown in Figure 4A, fixing t2 /t1 = e.
The Fisher information metric is proportional to the ordinary
Euclidean metric for ~
y , but not for ~k:
gµν (~k) =
1 X ∂yt ∂yt
σ2
∂kµ ∂kν
⇐⇒
gst (~
y) =
t
1
δst .
σ2
[6]
Thus Jeffreys prior is a constant on the allowed region of the
~
y plane.
Then we proceed to find the optimum p? (~
y ) for this model,
shown in Figure 4B for various values of σ. When σ is large,
this has delta functions only in two of the corners, allowing
only k1 , k2 = 0 and k1 , k2 = ∞. As σ is decreased, new atoms
appear first along the lower boundary (corresponding to the
one-dimensional model where k1 = k2 ) and then along the
other boundaries. At sufficiently small σ, atoms start filling
in the (two-dimensional) interior.
To show this progression in Figure 4C, we define Ωr as
the total weight on all edges
PD of dimension r, and an effective
dimensionality deff =
r Ωr . This increases smoothly
r=1
from 0 towards D = 2 as the data improves.
Mattingly, Transtrum, Abbott, Machta
|
Rational Ignorance
A
Gaussian model: D = 1
σ = �/��
p(x) from p⭑(𝜃)
�★ (θ)
p(x) from Jeffreys
■
■
■
■
■
Discussion
𝜃
θ
�
B
Exponential
model: D = 2
�
Prior p? (~y)
�★ (�+ )
y+ =
y1 + y2+
p
2
s = 1ê7
σ = �/�
r=0
r=1
■
■
■
■
■
�
to equal decay constants will still have significant weight.
The fact that such edges give human-readable simpler models
(unlike arbitrary submanifolds) was the original motivation
for preferring them in (22), and it is very interesting that our
optimization procedure has the same preference.††
■
0
■
y1 + y2
y+ = p
�+ = (�� +�2� )/ �
�
Fig. 5. Distributions of expected data p(x) from different priors. Panel A is the
one-parameter Gaussian model, with L = 10. Panel B projects the two-parameter
exponential model onto the y1 + y2 direction, for σ = 1/7 where the perpendicular
direction should be irrelevant. The length
is about the same
√ of the relevant direction
p? (~y) of expected
as the one-parameter case: L+ = 7 2. Notice that the distribution
data p(x+ ) from Jeffreys
√prior here is quite different, with almost no weight at the
ends of the range (0 and 2), because this prior still weights the area not the length.
At medium values of σ, the prior p? (~
y ) almost ignores the
width of the parameter
manifold,
and
cares
mostly about its
√
length (L+ = 2/σ along the diagonal). This behavior is very
different to that of Jeffreys prior: in Figure 5B we demonstrate
this by plotting the distributions of data implied by these two
priors. Jeffreys puts almost no weight near the ends of the long
(i.e. stiff, or relevant) parameter’s range, because the (sloppy,
or irrelevant) width happens to be even narrower there than
in the middle. By contrast our effective model puts significant
weight on each end, much like the one-parameter model in
Figure 5A.
The difference between one and two parameters being relevant (in Figure 4B) is very roughly σ = 1/7 to σ = 1/50, a
factor 7 in Fisher length, thus a factor 50 in the number of repetitions m — perhaps the difference between a week’s data and
a year’s. These numbers are artificially small to demonstrate
the appearance of models away from the boundary: more
realistic models often have manifold lengths spread over many
orders of magnitude (5, 8), and thus have some parameters
inaccessible even with centuries of data. To measure these we
need a qualitatively different experiment, justifying a different
effective theory.
The one-dimensional model along the lower edge of Figure
4A is the effective theory with equal decay constants. This
remains true if we allow more parameters k3 , k4 , . . . in Eq. (5),
and p? (~
y ) will still place a similar weight there.∗∗ Measuring xt
also at later times t3 , t4 , . . . will add more thin directions to the
manifold (7), but the one-dimensional boundary corresponding
While the three examples we have studied here are very simple,
they demonstrate a principled way of selecting optimal effective
theories, especially in high-dimensional settings. Following
(45), we may call this rational ignorance.
The prior p? (θ) which encodes this selection is the maximally uninformative prior, in the sense of leaving maximum
headroom for learning from data. But its construction depends on the likelihood function p(x|θ), and thus it contains
knowledge about the experiment through which we are probing
nature. Jeffreys prior pJ (θ) also depends on the experiment,
but more weakly: it is independent of the number of repetitions m, precisely because it is the limit m → ∞ of the
optimal prior (32, 33).
Under either of these prescriptions, performing a second
experiment may necessitate a change in the prior, leading to
a change in the posterior not described by Bayes’ theorem. If
the second experiment is different from the first, then changing to Jeffreys prior for the combined experiment (and then
applying Bayes’ rule just once) will have this effect (56, 57).‡‡
Our prescription differs from Jeffreys in also regarding more
repetitions of an identical experiment as being different. Many
experiments would have much higher resolution if they could
be repeated for all eternity. The fact that they cannot is an
important limit on the accuracy of our knowledge, and our
proposal treats this limitation on the same footing as the rest
of the specification of the experiment.
Keeping m finite is where we differ from earlier work on
prior selection. Bernardo’s reference prior (31) maximizes the
same mutual information, but always in the m → ∞ limit
where it gives a smooth analytically tractable function. Using
I(X; Θ) to quantify what can be learned from an experiment
goes back to Lindley (24). That finite information implies a
discrete distribution was known at least since (26, 27). What
has been overlooked is that this discreteness is useful for
avoiding a problem with Jeffreys prior on the hyper-ribbon
parameter spaces generic in science (5): because it weights the
irrelevant parameter volume, Jeffreys prior has strong dependence on microscopic effects invisible to experiment. The limit
m → ∞ has erased the divide between relevant and irrelevant
parameters, by throwing away the natural length scale on the
parameter manifold. By contrast p? (θ) retains discreteness at
roughly this scale, allowing it to ignore irrelevant directions.
Along a relevant parameter direction this discreteness is no
worse than rounding θ to as many digits as we can hope to
measure, and we showed that in fact the spacing of atoms
decreases faster than our accuracy improves.
††
Edges of the parameter manifold give simpler models not only in the sense of
having fewer parameters, but also in an algorithmic sense. For example, the
Michaelis–Menten model is analytically solvable (53) in a limit which corresponds
to a manifold boundary (54). Stable linear dynamical systems of order n are model
∗∗
boundaries order n + 1 systems (55). Taking some parameter combinations to the
If we have more parameters than measurements then the model must be singular.
extreme can lock spins into Kadanoff blocks (54).
In fact the exponential model of Figure 4 is already slightly singular, since k1 ↔ k2
does not change the data; we could cure this by restricting to k2 ≥ k1 , or by working ‡‡ This view is natural in the objective Bayesian tradition, but see (58) and (59–61) for
with ~
y , to obtain a regular model.
alternative viewpoints.
Mattingly, Transtrum, Abbott, Machta
|
Rational Ignorance
PNAS
|
7 February, 2018
|
vol. XXX
|
no. XX
|
5
Model selection is more often studied not as part of prior
selection, but at the stage of fitting the parameters to data.
From noisy data, one is tempted to fit a model which is more
complicated than reality; avoiding such overfitting improves
predictions. The AIC, BIC (15, 62) and related criteria (19,
20, 63–65) are subleading terms of various measures in the
m → ∞ limit, in which all (nonsingular) parameters of the
true model can be accurately measured. Techniques like MDL,
NML, and cross-validation (63, 66, 67) need not take this limit,
but all are applied after seeing the data. They favor minimally
flexible models close to the data seen, while our procedure
favors one answer which can distinguish as many different
outcomes as possible. It is curious that both approaches can
point towards simplicity. We explore this contrast in more
detail in the Appendix.§§
Being discrete, the prior p? (θ) is very likely to exclude
the true value of the parameter, if such a θtrue ∈ Θ exists.
This is not a flaw: the spirit of effective theory is to focus on
what is relevant for describing the data, deliberately ignoring
microscopic effects which we know to exist (68). Thus the
same effective theory can emerge from different microscopic
physics [as in the universality of critical points describing phase
transitions (69)]. The relevant degrees of freedom are often
quasiparticles [such as the Cooper pairs of superconductivity
(70)] which do not exist in the microscopic theory, but give
a natural and simple description at the scale being observed.
We argued here for such simplicity not on the grounds of the
difficulty of simulating 1023 electrons, nor of human limitations,
but based on the natural measure of information learned.
There is similar simplicity to be found outside of physics.
For example the Michaelis–Menten law for enzyme kinetics
(71) is derived as a limit in which only the ratios of some reaction rates matter, and is useful regardless of the underlying
system. In more complicated systems which we cannot solve
by hand, and for which the symmetries and scaling arguments
used in physics cannot be applied, we hope that our information approach may be useful for identifying the appropriately
detailed theory.
6. M. K. Transtrum, B. B. Machta and J. P. Sethna, Why are Nonlinear Fits
to Data so Challenging?, Phys. Rev. Lett. 104 (2010) 060201
[arXiv:0909.3884].
7. M. K. Transtrum, B. B. Machta and J. P. Sethna, Geometry of nonlinear
least squares with applications to sloppy models and optimization,
Phys. Rev. E83 (2011) 036701 [arXiv:1010.1449].
8. B. B. Machta, R. Chachra, M. K. Transtrum and J. P. Sethna, Parameter
Space Compression Underlies Emergent Theories and Predictive
Models, Science 342 (2013) 604–607 [arXiv:1303.6738].
9. M. K. Transtrum, B. B. Machta, K. S. Brown, B. C. Daniels, C. R. Myers and J. P.
Sethna, Perspective: Sloppiness and emergent theories in physics,
biology, and beyond, J. Chem. Phys. 143 (2015) 010901
[arXiv:1501.07668].
10. T. O’Leary, A. C. Sutton and E. Marder, Computational models in the age
of large datasets, Cur. Op. Neurobio. 32 (2015) 87–94.
11. T. Niksic and D. Vretenar, Sloppy nuclear energy density functionals:
effective model reduction, Phys. Rev. C94 (2016) 024333
[arXiv:1606.08617].
12. D. V. Raman, J. Anderson and A. Papachristodoulou, Delineating
Parameter Unidentifiabilities in Complex Models, arXiv:1607.07705.
13. G. Bohner and G. Venkataraman, Identifiability, reducibility, and
adaptability in allosteric macromolecules, J. Gen. Physiol. 149 (2017)
547–560.
14. A. Raju, B. B. Machta and J. P. Sethna, Information geometry and the
renormalization group, arXiv:1710.05787.
15. H. Akaike, A new look at the statistical model identification, IEEE
Trans. Automat. Contr. 19 (1974) 716–723.
16. N. Sugiura, Further analysts of the data by Akaike’s information
criterion and the finite corrections, Comm. Stat. Th. Meth. 7 (1978)
13–26.
17. V. Balasubramanian, Statistical inference, Occam’s razor, and
statistical mechanics on the space of probability distributions,
Neural Comp. 9 (1997) 349–368.
18. I. J. Myung, V. Balasubramanian and M. A. Pitt, Counting probability
distributions: differential geometry and model selection., PNAS 97
(2000) 11170–11175.
19. D. J. Spiegelhalter, N. G. Best, B. P. Carlin and A. Van Der Linde, Bayesian
measures of model complexity and fit, J. Roy. Stat. Soc. B 64 (2002)
583–639.
20. S. Watanabe, Asymptotic equivalence of Bayes cross validation and
21.
22.
23.
ACKNOWLEDGMENTS.
We thank Vijay Balasubramanian,
William Bialek, Robert de Mello Koch, Peter Grünwald, Jon Machta,
James Sethna, Paul Wiggins, and Ned Wingreen for discussion and
comments. We thank ICTS Bangalore for hospitality.
H.H.M. was supported by NIH grant R01GM107103. M.K.T.
was support by NSF-EPCN 1710727. B.B.M. was supported by a
Lewis-Sigler Fellowship and by NSF PHY 0957573. M.C.A. was
supported by NCN grant 2012/06/A/ST2/00396.
1. L. P. Kadanoff, Scaling laws for Ising models near Tc , Physics 2 (1966)
263–272.
2. K. G. Wilson, Renormalization group and critical phenomena. 1.
Renormalization group and the Kadanoff scaling picture, Phys. Rev.
B4 (1971) 3174–3183.
3. J. L. Cardy, Scaling and renormalization in statistical physics. Cambridge Univ.
Press, 1996.
4. J. J. Waterfall, F. P. Casey, R. N. Gutenkunst, K. S. Brown, C. R. Myers, P. W.
Brouwer and J. P. Sethna, Sloppy-model universality class and the
Vandermonde matrix., Phys. Rev. Lett. 97 (2006) 150601–4.
5. R. N. Gutenkunst, J. J. Waterfall, F. P. Casey, K. S. Brown, C. R. Myers and J. P.
Sethna, Universally Sloppy Parameter Sensitivities in Systems
Biology Models, PLoS Comp. Biol. 3 (2007) e189–8.
§§
Model selection usually starts from a list of models to be compared, in our language
a list of submanifolds of Θ. We can also consider maximising mutual information in
this setting, rather than with an unconstrained function p(θ), and unsurprisingly we
observe a similar preference for highly flexible simpler models. This is also discussed
in the Appendix, at Eq. (S3).
PNAS
|
7 February, 2018
|
vol. XXX
|
no. XX
|
6
24.
25.
widely applicable information criterion in singular learning
theory, JMLR 11 (2010) 3571–3594 [arXiv:1004.2316].
P. A. Wiggins and C. H. LaMont, Information-based inference for
singular models and finite sample sizes, arXiv:1506.05855.
M. K. Transtrum and P. Qiu, Model reduction by manifold boundaries,
Phys. Rev. Lett. 113 (2014) 098701–6.
C. E. Shannon, A mathematical theory of communication, Bell Sys.
Tech. J. 27 (1948) 623–656.
D. V. Lindley, On a Measure of the Information Provided by an
Experiment, Ann. Math. Statist. 27 (1956) 986–1005.
A. Rényi, On some basic problems of statistics from the point of
view of information theory, Proc. 5th Berkeley Symp. on Math. Statist.
and Prob. (1967) 531–543. [projecteuclid.org].
26. G. Färber, Die Kanalkapazität allgemeiner Übertragunskanäle bei
begrenztem Signalwertbereich beliebigen Signalübertragungszeiten
sowie beliebiger Störung, Arch. Elektr. Übertr. 21 (1967) 565–574.
27. J. G. Smith, The information capacity of amplitude-and
variance-constrained scalar gaussian channels, Information and
Control 18 (1971) 203–219.
28. S. L. Fix, Rate distortion functions for squared error distortion
measures, Proc. 16th Annu. Allerton Conf. Commun. Control Comput. (1978)
704–711.
29. J. O. Berger, J. M. Bernardo and M. Mendoza, On Priors that Maximize
Expected Information, Recent Developments in Statistics and Their
Applications (1988) 1–20. [www.uv.es/~bernardo/].
30. Z. Zhang, Discrete Noninformative Priors. PhD thesis, Yale University, 1994.
[UMI 9523257].
31. J. M. Bernardo, Reference Posterior Distributions for Bayesian
Inference, J. Roy. Stat. Soc. B 41 (1979) 113–147. [www.uv.es/~bernardo/].
32. B. S. Clarke and A. R. Barron, Jeffreys’ prior is asymptotically least
favorable under entropy risk, J. Stat. Plan. Infer. 41 (1994) 37–60.
33. H. R. Scholl, Shannon optimal priors on independent identically
distributed statistical experiments converge weakly to Jeffreys’
prior, Test 7 (1998) 75–94.
34. H. Jeffreys, An Invariant Form for the Prior Probability in
Mattingly, Transtrum, Abbott, Machta
|
Rational Ignorance
Estimation Problems, Proc. Roy. Soc. A 186 (1946) 453–461.
35. J. E. Kerrich, An Experimental Introduction to the Theory of Probability.
Copenhagen: E Munksgaard, 1946.
36. C. O’Luanaigh, CERN data centre passes 100 petabytes, home.cern
(2013).
37. S. Arimoto, An algorithm for computing the capacity of arbitrary
discrete memoryless channels, IEEE Trans. Inform. Theory 18 (1972)
14–20.
38. R. Blahut, Computation of channel capacity and rate-distortion
functions, IEEE Trans. Inform. Theory 18 (1972) 460–473.
39. K. Rose, A mapping approach to rate-distortion computation and
analysis, IEEE Trans. Inform. Theory 40 (1994) 1939–1952.
40. D. Haussler, A general minimax result for relative entropy, IEEE
Trans. Inform. Theory 43 (1997) 1276–1280.
41. M. N. Ghosh, Uniform Approximation of Minimax Point Estimates,
Ann. Math. Statist. 35 (1964) 1031–1047.
42. G. Casella and W. E. Strawderman, Estimating a Bounded Normal
Mean, Ann. Statist. 9 (1981) 870–878.
43. I. Feldman, Constrained Minimax Estimation of the Mean of the
Normal Distribution with Known Variance, Ann. Statist. 19 (1991)
2259–2265.
44. M. Chen, D. Dey, P. Müller, D. Sun and K. Ye, Frontiers of statistical decision
making and Bayesian analysis. Springer, New York, NY, 2010.
45. C. A. Sims, Rational Inattention: Beyond the Linear-Quadratic
Case, American Economic Review 96 (2006) 158–163.
46. J. Jung, J. Kim, F. Matĕjka and C. A. Sims, Discrete Actions in
Information-Constrained Decision Problems, .
[princeton.edu/~sims/#RIDiscrete].
47. S. Laughlin, A simple coding procedure enhances a neuron’s
information capacity, Z. Naturforsch. 36 c (1981) 910–912.
48. G. Tkačik, C. G. Callan and W. Bialek, Information flow and
optimization in transcriptional regulation, PNAS 105 (2008)
12265–12270 [arXiv:0705.0313].
49. M. D. Petkova, G. Tkačik, W. Bialek, E. F. Wieschaus and T. Gregor, Optimal
decoding of information from a genetic network, arXiv:1612.08084.
50. A. Mayer, V. Balasubramanian, T. Mora and A. M. Walczak, How a
well-adapted immune system is organized, PNAS 112 (2015)
5950–5955 [arXiv:1407.6888].
51. M. C. Abbott and B. B. Machta, An information scaling law: ζ = 3/4,
arXiv:1710.09351.
52. S. H. Strogatz, Nonlinear Dynamics And Chaos. Sarat Book House, 2007.
53. S. Schnell and C. Mendoza, Closed Form Solution for
Time-dependent Enzyme Kinetics, J. Theor. Biol. 187 (1997) 207–212.
54. M. Transtrum, G. Hart and P. Qiu, Information topology identifies
emergent model classes, arXiv:1409.6203.
55. P. E. Paré, A. T. Wilson, M. K. Transtrum and S. C. Warnick, A unified view
model selection, Statistics Surveys 4 (2010) 40–79.
68. P. W. Anderson, More Is Different, Science 177 (1972) 393–396.
69. R. W. Batterman, Philosophical Implications of Kadanoff’s Work on
the Renormalization Group, J. Stat. Phys. 167 (2017) 559–574.
[pitt.edu/~rbatterm/].
70. J. Bardeen, L. N. Cooper and J. R. Schrieffer, Theory of
superconductivity, Phys. Rev. 108 (1957) 1175–1204.
71. L. Michaelis and M. L. Menten, The kinetics of invertin action, FEBS
Letters 587 (2013) 2712–2720. [Translation by T. R. C. Boyde].
72. R. E. Kass and A. E. Raftery, Bayes Factors, J. Amer. Stat. Assoc. 90 (1995)
773.
73. A. Bhadra, J. Datta, N. G. Polson and B. Willard, Default Bayesian
analysis with global-local shrinkage priors, Biometrika 103 (Dec.,
2016) 955–969.
74. D. Simpson, H. Rue, A. Riebler and T. G. Martins, Penalising Model
Component Complexity: A Principled, Practical Approach to
Constructing Priors, Statist. Sci. 32 (2017) 1–28 [arXiv:1403.4630].
75. J. I. Myung, D. J. Navarro and M. A. Pitt, Model selection by normalized
maximum likelihood, Journal of Mathematical Psychology 50 (2006)
167–179.
76. P. D. Grünwald, The Minimum Description Length Principle. MIT Press, 2007.
77. C.-I. Chang and L. D. Davisson, On calculating the capacity of an
infinite-input finite (infinite)-output channel, IEEE Trans. Inform.
Theory 34 (1988) 1004–1010.
78. J. Lafferty and L. Wasserman, Iterative Markov chain Monte Carlo
computation of reference priors and minimax risk, Proc. 17th conf.
Uncert. AI (2001) 293–300 [arXiv:1301.2286].
79. J. Dauwels, Numerical computation of the capacity of continuous
memoryless channels, Proc. 26th Symp. Inf. Th. Benelux (2005).
[www.dauwels.com].
Appendix: Model Selection from Data
The usual discussion of model selection takes place after observing
data x. If we wish to compare some models∗ labeled by d, each
with some prior pd (θ), then one prescription is to choose the model
with the largest p(x). Labelling this explicitly, we write
p(x|d) =
Mattingly, Transtrum, Abbott, Machta
|
Rational Ignorance
pd (θ) > 0 on Θd ⊂ Θ.
[S1]
If the Bayes factor p(x|d)/p(x|d0 ) is larger than one then (absent
any other information) d is preferred over d0 (72).† In the usual
asymptotic limit m → ∞, this idea leads to minimising the Bayesian
information criterion (BIC) (62):
− log p(x|d) ≈ − log p(x|θ̂d ) +
pp. 1989–1994, IEEE, 2015.
56. N. Lewis, Combining independent Bayesian posteriors into a
(2000) 1244–1255.
59. T. Seidenfeld, Why I am not an objective Bayesian; some
reflections prompted by Rosenkrantz, Theor Decis 11 (1979) 413–440.
60. R. E. Kass and L. Wasserman, The selection of prior distributions by
formal rules, J. Amer. Stat. Assoc. 91 (1996) 1343–1370.
61. J. Williamson, Objective Bayesianism, Bayesian conditionalisation
and voluntarism, Synthese 178 (2009) 67–85.
62. G. Schwarz, Estimating the dimension of a model, Ann. Statist. 6
(1978) 461–464.
63. J. Rissanen, Modeling by Shortest Data Description, Automatica 14
(1978) 465–471.
64. C. S. Wallace and D. M. Boulton, An Information Measure for
Classification, The Computer Journal 11 (1968) 185–194.
65. S. Watanabe, A widely applicable Bayesian information criterion,
JMLR 14 (2013) 867–897 [arXiv:1208.6338].
66. P. D. Grünwald, I. J. Myung and M. A. Pitt, Advances in Minimum Description
Length: Theory and Applications. 2009.
67. S. Arlot and A. Celisse, A survey of cross-validation procedures for
dθ p(x|θ) pd (θ),
Θd
of Balanced Truncation and Singular Perturbation
Approximations, in Proceedings of the American Control Conference,
confidence distribution, with application to estimating climate
sensitivity, J. Stat. Plan. Infer. (2017) to appear.
57. N. Lewis, Modification of Bayesian Updating where Continuous
Parameters have Differing Relationships with New and Existing
Data, arXiv:1308.2791.
58. D. Poole and A. E. Raftery, Inference for Deterministic Simulation
Models: The Bayesian Melding Approach, J. Amer. Stat. Assoc. 95
Z
where − log p(x|θ̂d ) =
1 2
χ
2
=
1
2
Pm
i=1
d
log m + O(m0 )
2
[xi − yi (θ̂d )]2 /σ 2 ∼ O(m),
and θ̂d is a maximum likelihood estimator for x, constrained to the
appropriate subspace:
θ̂d (x) = argmax p(x|θ).
θ∈Θd
The term d log m penalises models with more parameters, even
though they can usually fit the data more closely. Despite the name
this procedure is not very Bayesian: one chooses the effective model
(and hence the prior) after seeing the data, rather than simply
updating according to Bayes theorem.‡
∗
†
The word model unfortunately means several things in the literature. We mean
parameter space Θd always equipped with a likelihood function p(x|θ), and usually
with a prior pd (θ). When this is a subspace of some larger model ΘD (whose
likelihood function agrees, but whose prior may be unrelated) then we term the
smaller one an effective model, or a reduced model, although we do not always write
the adjective. The optimal prior p? (θ) defines an effective model in this sense. Its
support will typically be on several boundaries of ΘD . If the boundaries of ΘD (of
all dimensions) are regarded as a canonical list of reduced models, then p? (θ) is
seldom a sub-model of any one of them.
R
If one of the priors is improper, say
dθ pd (θ) = ∞, then p(x|d) will also be
infinite. In this sense the Bayes factor behaves worse than the posterior p(θ|x),
which can still be finite.
‡
Terms penalising more complex models can be translated into shrinkage priors, which
concentrate weight near to simpler models (73). Perhaps the shrinkage priors closest
PNAS
|
7 February, 2018
|
vol. XXX
|
no. XX
|
7
Related prescriptions can be derived from minimum description length (MDL) ideas. To allow reconstruction of the data we
transmit both the fitted parameters and the residual errors, and
minimising the (compressed) length of this transmission drives a
tradeoff between error and complexity (63, 64, 66). A convenient
version of this goes by the name of normalized maximum likeihood
(NML) (75, 76), and chooses the model d which maximizes
pNML
(x) =
d
Bayes Factor Comparison
A
1
0
0
0
1
x1
Full model,
pJ(𝜃)
0
x1
Optimal
p⭑(𝜃)
1
NML
1
x2
1
0
0
0
1
x1
Full model,
pJ(𝜃)
0
x1
Three edges,
separately
Zd =
,
Zd
Z
dx0 p x0 |θ̂d (x0 ) .
[S2]
Θd
• Figure S1A compares three models: the complete model (with
Jeffreys prior), the optimal model described by discrete prior
p? (~
y ), and an even simpler model with weight only on the
three vertices ~
y = (0, 0), ( 21 , 12 ), (1, 1).
• Figure S1B instead compares the complete model to three
different one-parameter models (along the three boundaries
of the allowed region of the ~
y plane) and a zero-parameter
model (one point ~
y , in no particularly special place). In terms
of decay rates the three lines are limits k1 = k2 , k1 = 0 and
k2 = ∞.
Corners
only
Bayes
B
This is not Bayesian in origin, and does not depend on the prior on
each effective model d, only its support Θd . The function pNML
(x)
d
is not expected data in the sense of p(x) — it is not the convolution
of the likelihood with any prior.§ In the asymptotic limit pNML
(x)
d
approaches p(x) from Jeffreys prior, and this criterion agrees with
BIC (63), but away from this limit they differ.
In Figure S1 we apply these two prescriptions to the exponential
example treated in the text. At each ~
x ∈ X we indicate which
of a list of models is preferred.¶ Figure S2 instead draws the
distributions being used.
NML Comparison
x2
1
p x|θ̂d (x)
1
One point
Fig. S1. Model selection from data point x. Each large panel here shows which
of a list of effective models is preferred after observing data x ∈ X . On the left the
criterion is maximizing Eq. (S1), on the right the criterion is Eq. (S2). We study the
same exponential model considered above, with σ = 1/10. Panel A compares our
optimal effective model with prior p? (θ) to the full model (with Jeffeys prior) and to an
even simpler model whose prior is just three delta functions. (These are drawn in the
legend below). Panel B compares the full model to three different one-dimensional
models, each allowing only one edge of Θ (with a uniform prior along this, i.e. the
one-dimensional Jeffreys prior) and also to a trivial model (just one point), again with
colors as indicated just below.
Different effective models are preferred for different values of data x.
At a given point x, if several models contain the same θ̂(x) then the
simplest among them is preferred, which in the NML case means
precisely the one with the smallest denominator Zd . In fact a trivial
model consisting of just one point Θ0 = θ̂(x) would always be
preferred if it were among those considered — there is no automatic
preference for models which can produce a wide range of possible
data.
By contrast our prior selection approach aims to be able to
distinguish as many possible outcomes in X as possible. Applied
to the same list of models as in Figure S1, this gives the following
fixed scores (base e):
Ifull = 1.296,
and
I? = 1.630,
Icorners = 1.098
Iupper = 0.852,
Ilower-left = 0.845,
Ilower-right = 1.418,
Ione-point = 0.
[S3]
to this paper’s are the penalised complexity priors of (74). Those are also reparameterization invariant, and also concentrate weight on a subspace of Θ, often a boundary.
However both the subspace (or base model) and the degree of concentration (scaling
parameter) are chosen by hand, rather than being deduced from p(x|θ).
§
This relevant optimization problem here can be described as minimizing worst-case
expected regret, written (75)
NML
pd
p(x|θ̂d (x))
,
q(x)
= argmin max log
x
q
θ̂d (x) ∈ Θd .
Perhaps the closest formulation of our maximum mutual information problem is that
our p? (x), the distribution on X not the prior, can be found as follows (40):
p? = argmin max
q∈B
θ
R
X
dx p(x|θ) log
p(x|θ)
q(x)
where q(x) is constrained to be a Bayes strategy i.e. to arise from some prior p? (θ).
Note the absence of θ̂d (x) and the presence of an integral over X , corresponding
to the fact thats that this maximization takes place without being given a subspace
Θd nor seeing data x. The resulting distributions on X are also different, as drawn in
Figure S2. If plotted on Figure 5B, pNML
(x) from the full model would be somewhere
2
between the two expected data p(x) lines there. But it is not a comparable object; its
purpose is model comparison as in Figure S1.
¶
Recall that ~
x is ~
y corrupted by Gaussian noise, and ~
y is constrained to the area show
in Figure 4A because it arises from decay rates kµ via Eq. (5). We may regard
either yt or kµ as being the parameters, generically θ .
PNAS
|
7 February, 2018
|
vol. XXX
|
no. XX
|
8
Mattingly, Transtrum, Abbott, Machta
|
Rational Ignorance
B
A
pNML
(x)
d
x2
p(x|d)
■
■
■
■
�
■
x1
�
x
x2
pNML
(x)
d
■
�
d=
x
Full model, pJ(𝜃)
Optimal p⭑(𝜃)
Corners only
x1
Fig. S2. Distributions over X . Panel A shows p(x|d) Eq. (S1) and pNML
(x)
d
Eq. (S2) for the one-parameter Gaussian example Eq. (2) with σ = 1/10. The
three models being compared are the full model (with a flat prior), the simpler model
defined by p? (θ), and a model with just the endpoints of the line. Under the Bayes
factor comparison, the p? (θ) model would never be preferred here. Panel B draws
pNML
(x) for the two-parameter exponential model, Eq. (5), for the complete model,
d
the effective model defined by the support of p? (θ), and an even simpler model
allowing only three points — the same three models as compared in Figure S1A.
Notice that pNML
(x) is always a constant on the allowed region x ∈ y(Θd ).
d
By definition p? (θ) has the highest score. In second place comes the
line along the lower edge (corresponding to k1 = k2 ). The shorter
lines are strongly disfavored, because they cover a much smaller
range of possible data.
Algorithms
The standard algorithm for maximizing channel capacity (of discrete
memoryless channels) was written down independently by Blahut
(38) and Arimoto (37). This aspect of rate-distortion theory is
mathematically the same as the problem we consider, of maximizing
mutual information by choosing the prior. The algorithm starts
with p0 (θ) = const., and then at each time step updates this by
pτ +1 (θ) =
1 fKL (θ)
e
pτ (θ)
Zτ
0
[S4]
where Zτ =
dθ0 efKL (θ ) pτ (θ0 ) maintains normalization, and
fKL (θ) = DKL [p(x|θ)kp(x)] is computed with pτ (θ). Since this
R
𝜏 = 106 iterations
�
x2
■
■
𝜏 = 1000
Fig. S3. Convergence of the BA algorithm (S4) for the exponential model. This
shows p? (~
y ) for the case σ = 1/50, with ~
y discretized on a grid of spacing 1/100
in the bulk and 1/200 along the boundaries of the allowed region.
x1
■
■
𝜏 = 100
Mattingly, Transtrum, Abbott, Machta
|
Rational Ignorance
is a convex optimization problem, the algorithm is guaranteed to
converge to the global maximum. This makes it a good tool to see
discreteness emerging.
Figures 2 and S3 show the progress of this algorithm for the
one- and two-dimensional models in the text. We stress that the
number and positions of the peaks which form are unchanged when
the discretization of θ is made much finer. Notice also that the
convergence to delta functions happens much sooner near to the
boundaries than in the interior. The convergence to the correct
mutual information I(X; Θ), and towards the optimum distribution
on data space p(x), happens much faster than the convergence to
the correct number of delta functions.
Because θ must be discretized for this procedure, it is poorly
suited to high-dimensional parameter spaces. However once we
know that p? (θ) is discrete it is natural to consider algorithms
exploiting this. With K atoms, we can adjust their positions θ~a
and weights λa using gradients
∂MI
= λa
∂θaµ
Z
dx
~
~
p(x|θ)
∂p(x|θ)
log
µ
∂θ
p(x)
~ θ
~a
θ=
∂MI
= fKL (θ~a ) − 1.
∂λa
[S5]
Figures 1, 2A, 5 and the square plot points in Figure 4 were generated this way. This optimization is not a convex problem (there is
some tendency to place two atoms on top of each other, and thus
use too few points of support) but it can often find the optimum
solution. We can confirm this by calculating fKL (θ) everywhere
— any points for which this is larger than its value at the atoms
indicates that we do not have the optimal solution, and should add
an atom.
Monte Carlo algorithms for this problem have been investigated
in the literature, see (77, 78) and especially (79). (Incidentally, we
observe that (77)’s table 1 contains a version of scaling law Eq. (4),
with ζ ≈ 1/2. No attempt was made there to use the optimal
number of atoms, only to calculate the channel capacity to sufficient
accuracy.)
PNAS
|
7 February, 2018
|
vol. XXX
|
no. XX
|
9
| 7cs.IT
|
IEEE TRANSACTIONS ON POWER SYSTEMS (ACCEPTED)
1
Convergence of the Z-Bus Method for Three-Phase
Distribution Load-Flow with ZIP Loads
arXiv:1605.08511v3 [math.OC] 9 May 2017
Mohammadhafez Bazrafshan, Student Member, IEEE, and Nikolaos Gatsis, Member, IEEE
Abstract—This paper derives a set of sufficient conditions
guaranteeing that the load-flow problem in unbalanced threephase distribution networks with wye and delta ZIP loads has
a unique solution over a region that can be explicitly calculated
from the network parameters. It is also proved that the wellknown Z-Bus iterative method is a contraction over the defined
region, and hence converges to the unique solution.
Index Terms—Three-phase distribution load-flow, Z-Bus
method, ZIP load, contraction mapping, power flow
I. I NTRODUCTION
E
XISTENCE of three-, two-, and one-phase transmission
lines with high R/X ratios in distribution networks is
predominant. Therefore, the Z-Bus iterative method is preferred over classical Newton-Raphson methods for distribution
load-flow [1]. This paper deals with the Z-Bus method when
applied to practical distribution networks including three-phase
wye and delta loads with constant-power, constant-current, and
constant-impedance portions (ZIP loads), as well as potentially
untransposed lines. Conditions on the network components and
loads guaranteeing the existence of a unique load-flow solution
and the convergence of the Z-Bus method are derived.
The availability of conditions guaranteeing power flow
solution existence has several applications in power system
planning and operations. In planning studies, such as conventional and distributed generation planning, conditions for
solution existence serve as assurance that desirable operating conditions are feasible under future load demands. For
example, such conditions provide network-specific guides on
whether a certain lateral will have valid load-flow solutions
over the course of years, as the loads increase [2], [3].
In operations, conditions for solution existence allow power
engineers to determine whether the set of power injections and
flows respect security constraints of power system equipment
[4]. Furthermore, the availability of solvability regions in
terms of nodal voltages renders improved initial estimates
for numerical algorithms and accelerates the online analysis
required for real-time monitoring and control applications [5].
Specifically in regards to distribution networks, their
weakly-meshed structure limits the number of feasible voltage
profiles. This characteristic implies that it is harder to meet
different demand patterns in distribution networks [6]. In this
case, explicit sufficient conditions for solution existence that
Manuscript received May 26, 2016; revised November 22, 2016 and March
1, 2017; accepted April 26, 2017. The authors are with the Department of
Electrical and Computer Engineering, The University of Texas at San Antonio. E-mails: {mohammadhafez.bazrafshan, nikolaos.gatsis}@utsa.edu. This
material is based upon work supported by the National Science Foundation
under Grant No. CCF-1421583.
take into account various load types—that is, wye and delta
ZIP loads—prove to be very useful.
The literature on existence of solutions to the power flow
equations is extensive; see e.g., [3] for a review on general
power networks, and recent works in [5], [7], [8] geared toward
distribution networks. Here, the prior art most closely related
to the present work is reviewed.
The single-phase equivalent of a power distribution network
is considered in [5]. Power flow equations are formulated so
that injection currents can be expressed as a fixed point of a
quadratic map parametrized by constant-power loads and the
network admittance matrix. Sufficient conditions on the loads
and the network admittance matrix are derived to guarantee
existence of a power flow solution.
The work in [7] highlights that the injection currents can be
expressed by a family of fixed-point quadratic maps similarly
to [5] but parametrized by a diagonal matrix. An algorithm
is proposed for finding the diagonal matrix that expands the
regions given in [5] where a power flow solution exists.
Convergence of the Z-Bus method interpreted as a fixedpoint iteration is considered in [8] and [9] for singlephase distribution networks. Specifically, explicit conditions
on constant-power loads and the network admittance matrix
are presented in [8] ensuring convergence of the Z-Bus method
and existence of a unique solution for distribution load-flow
under balanced assumptions. Interestingly, it is numerically
verified in [9] that when distributed generation units are modeled as constant-power nodes, the voltage iterates produced by
the Z-Bus method are indeed contracting.
Single-phase power system modeling is valid under balanced three-phase operation, which is a reasonably accurate assumption for transmission networks. In distribution networks,
there is a prevalence of untransposed three-, two- and onephase transmission lines with unbalanced loading. There is
a gap in the literature, since theoretical results on solution
existence and convergence of load-flow methods overlook the
underlying unbalanced nature of distribution systems.
This paper considers general unbalanced distribution networks that include transmission lines with one, two, or three
available phases as well as wye and delta ZIP loads, in contrast
to [5], [7], [8], which only consider single-phase networks
with constant-power loads. Sufficient conditions for the Z-Bus
method to be a contraction over a region explicitly defined in
terms of the loads and the bus admittance matrix are derived.
A consequence of the contraction is that power-flow equations
are guaranteed to have a unique solution in the defined region.
In order to prove that the Z-Bus method is a contraction
mapping, a candidate region of contraction is defined and
the self-mapping and contraction properties are proved. These
IEEE TRANSACTIONS ON POWER SYSTEMS (ACCEPTED)
steps were followed in [8] for single-phase networks with
constant-power loads. However, the extension to general unbalanced three-phase networks with wye and delta ZIP loads
and missing phases adds a level of complexity that necessitates
the development of novel methods to prove the convergence
of the Z-Bus method.
The major contribution of this paper is to derive sufficient
convergence conditions that handle the complexities arising
from various combinations of load types and phasings in
practical three-phase distribution networks. The conditions
are expressed directly in terms of the network loads and
admittance matrix, and guarantee the existence of a unique
solution to the power flow equations. It becomes immediately
apparent from these conditions that different load types contribute differently to the network solvability. Moreover, the
generality of the network model renders results that are readily
applicable to practical distribution networks without simplifying assumptions. To this end, the conditions are validated on
several IEEE distribution test feeders.
In order to prove the aforementioned conditions, this paper
develops a set of tools that advance the power flow analysis
via contraction methods. These tools are particularly tailored
to handle wye and delta connections, ZIP loads, and missing
phases, and are expected to be useful to other researchers
working in this area. In addition, this paper constructs interesting and non-trivial examples of networks where the Z-Bus
method exhibits oscillatory behavior, and the conditions are
not satisfied. One example amounts to a two-node network
where the non-slack bus has constant-current and impedance
loads, but a constant-power injection (e.g., from a renewable
energy source). The second example features a nontrivial
unbalanced network with phase couplings in its lines.
Paper Organization: The network and the ZIP load models
with wye and delta configurations are introduced in Section
II. The Z-Bus method is briefly reviewed in Section III.
Section IV presents the main theorem, which contains the
sufficient conditions for the Z-bus method to be a contraction.
The theorem is verified numerically in Section V. Section VII
provides pointers to future work, and Appendices A and B
include a detailed proof of the main result.
Notation: For a vector u, uj denotes the j-th element, and
diag(u) is a square matrix with elements of u on the main
diagonal. The notation v = {vn }n∈N is used to denote a
vector constructed from vertically stacking vectors vn for n ∈
N . For a matrix Z, Z•k denotes the k-th column, Zj• denotes
the j-th row, Zjk denotes the element in the j-th row and k-th
column; and [Z•k ]k∈NY denotes a matrix constructed from the
columns of Z in the set NY . The infinity norm for a vector u
and a P
matrix Z is defined as kuk∞ = maxj |uj | and kZk∞ =
maxj k |Zjk |, respectively.
II. N ETWORK
AND LOAD MODEL
Motivated by the various three-phase connections in IEEE
distribution test feeders, a detailed network model is presented
in this section.
2
A. Three-phase network modeling preliminaries
A power distribution network is represented by a graph
(N , E), where N := {1, 2, . . . , N } ∪ {S} is the set of nodes
and E ⊂ N × N := {(n, m)|n, m ∈ N } is the set of
edges. Node S is considered the slack bus, i.e., the point of
interconnection to the transmission network. Furthermore, let
N be partitioned as N = NY ∪ N∆ ∪ {S} where NY and N∆
collect nodes with wye and delta connections, respectively.
The set of available phases at node n is denoted by Ωn ⊆
{a, b, c}. For wye nodes, i.e., n ∈ NY , Ωn may have one,
two, or three phases. For delta nodes, i.e., n ∈ N∆ , Ωn has at
least two phases. For future use, define r(φ) as the right shift
of phase φ as follows:
r(a) = b, r(b) = c, r(c) = a.
(1)
If |Ωn | = 3, then we have that r(φ) ∈ Ωn for all phases
φ ∈ Ωn . If |Ωn | = 2, then there exists only one phase φ ∈ Ωn
such that r(φ) ∈ Ωn . For example, if Ωn = {a, c}, only phase
c has the property that r(c) = a ∈ Ωn .
For every node n ∈ N , the complex line to neutral voltage
vector is denoted by vn := {vnφ }φ∈Ωn ∈ C|Ωn | . The slack
2π
2π
bus voltage is fixed at vS = {1, e−j 3 , ej 3 }. The line to
neutral voltages are collected in a vector v = {vn }n∈N \{S} .
′
Moreover, we use a vector eφφ
∈ C|Ωn | with entries of 1, -1,
n
′
φφ′ T
and possibly 0, such that (en ) vn = vnφ − vnφ gives the line
′
to line voltages between phases φ and φ . It is easy to see that
′
T
φ′ φ T
(eφφ
n ) vn = −(en ) vn .
further an index set J := {1, . . . , J} where J =
PDefine
N
|Ω
n | is the length of vector v, and each j ∈ J is
n=1
a linear index corresponding to a particular pair (n, φ) with
n ∈ N \ {S} and φ ∈ Ωn . In this case, we write the
operation j = Lin(n, φ). The operation Node[Lin(n, φ)] =
Node[j] = n relates the index j ∈ J to the corresponding
node n. Define the set Jn := {j | Node[j] = n} as the set of
all linear indices j that correspond to node n.SFinally, set J
is partitioned
as J = JY ∪ J∆ , where JY = n∈NY Jn and
S
J∆ = n∈N∆ Jn .
B. Three-phase load models
For a load at node n, the complex vector of net current
injections is denoted by in = {iφn }φ∈Ωn and we define i =
{in }n∈N \{S} . Due to existence of loads, the nodal net current
injection i is a function of nodal voltages v. This dependence is
denoted by in (vn ). According to the ZIP load model, in (vn )
is
iPQn =
φcomposed of currents from constant-power loads
iPQn φ∈Ωn , constant-current loads iIn = iφIn φ∈Ωn , and
constant-impedance loads iZn = iφZn φ∈Ωn . For n ∈ N \{S}
and φ ∈ Ωn we have that
iφn (vn ) = iφPQn (vn ) + iφIn (vn ) + iφZn (vn )
(2)
where functions iφPQn (vn ), iφIn (vn ), and iφZn (vn ) are defined
in (3) for wye connections and in (4) for delta connections.
Specifically, for wye connections (n ∈ NY and φ ∈ Ωn ),
the ZIP load components are
iφPQn (vn ) = −(sφLn /vnφ )∗
(3a)
IEEE TRANSACTIONS ON POWER SYSTEMS (ACCEPTED)
iφZn (vn ) =
vnφ
iφ ,
φ Ln
|vn |
φ
−yL
vφ ,
n n
iφIn (vn ) = −
3
(3b)
(3c)
where sφLn is the nominal power in the constant-power portion
of the ZIP model, iφLn is the nominal current for the constantφ
current portion of the ZIP model, and yL
is the nominal
n
admittance in the constant-impedance portion of the ZIP model
at node n ∈ NY and phase φ ∈ Ωn .
For delta connections (n ∈ N∆ and φ ∈ Ωn ), the ZIP load
components are
!∗
φφ′
X
sL
φ
n
(4a)
iPQn (vn ) = −
φφ′ T
(e
)
v
n
n
′
φ ∈Ωn \{φ}
′
iφIn (vn )
iφZn (vn )
′
′
=−
=−
X
φ′ ∈Ωn \{φ}
X
′
iφφ
Ln
′
T
(eφφ
n ) vn
′
T
|(eφφ
n ) vn |
′
φφ
T
yL
(eφφ
n ) vn ,
n
(4b)
(4c)
φ′ ∈Ωn \{φ}
where the dependence of injected currents on nodal voltages
is shown explicitly.
Using (2), i(v) can be decomposed into three parts:
i(v) = iPQ (v) + iI (v) + iZ (v),
(7)
where iPQ (v) = {iPQn }n∈N \{S} , iI (v) = {iIn }n∈N \{S} ,
iZ (v) = {iZn }n∈N \{S} . Moreover, (3c) and (4c) reveal that
iZ (v) can be written as a linear function of v as follows:
iZ (v) = −YL v,
where YL ∈ C
J×J
(8)
has entries given by
φ
YL (j, j) = yL
, if j = Lin(n, φ), n ∈ NY ,
n
X
φφ′
, if , j = Lin(n, φ), n ∈ N∆ ,
yL
YL (j, j) =
n
φ′ ∈Ωn \{φ}
′
φφ
YL (j, k) = −yL
, j = Lin(n, φ), k = Lin(n, φ′ ), n ∈ N∆ ,
n
and the remaining entries of YL are all zero.
Substituting (7) and (8) in (6) and after some manipulation
the following fixed-point equation for v is obtained:
′
φφ
φφ
where sφφ
Ln , iLn , and yLn are respectively the nominal power,
current, and admittance in the ZIP model for nodes n ∈ N∆
and over phases
φ, φ′ ′ ∈ Ωn′ . For′ n ∈ N∆ and
φ, φ′′ ∈ Ωn , we
φφ′
φ φ φφ
φφ
φφ′
φφ
have that sLn = sLn , iLn = iLn , and yLn = yL
.
n
Notice that the constant-current loads in (3b) and (4b)
rightfully adhere to the proper definition given in [10], where
it is emphasized that the power varies directly with voltage
magnitude. To see this, one can calculate the apparent power
consumption for the load model in (3b) which gives sφn =
vnφ [(vnφ /|vnφ |)iφLn ]∗ = |vnφ |(iφLn )∗ , i.e., the apparent power is
only a function of the magnitude of the voltage |vnφ |. It is
easy to see that in this case, the load current magnitude is
|iLn | and the load power factor is
Re[iφ
Ln ]
|iφ
Ln |
, both of which are
constant values, concluding that these models are in line with
the definition in [11, pp. 315] as well. It should be noted that
(3b) and (4b) are different than the constant-current-phasor
model employed in [12].
For future use, if k = Lin(n, φ) where n ∈ NY and φ ∈
Ωn , we define skL = sφLn and ikL = iφLn . For k = Lin(n, φ)
where n ∈ N∆ and φ ∈ Ωn , if r(φ) ∈ Ωn , define skL =
φr(φ)
φr(φ)
φr(φ)
. If r(φ) ∈
/ Ωn , then
sLn , ikL = iLn , and ek = en
′
′
k
Ωn = {φ, φ }, and define sL = 0, ikL = 0, and ek = eφφ
n .
v = Z [iPQ (v) + iI (v)] + w,
−1
where Z = (Y + YL )
(6)
(11)
Equation (10) lends itself to the well-known Z-Bus method
for three-phase networks, outlined in e.g., [1]:
v[t + 1] = Z [iPQ (v[t]) + iI (v[t])] + w,
(12)
where v[t] is the value of v at iteration t. Notice that (12) is an
application of Picard’s iteration for solving nonlinear systems
of equations [14, pp. 182].
IV. S UFFICIENT CONDITIONS FOR CONVERGENCE OF THE
Z-B US METHOD TO A UNIQUE SOLUTION
In this section, sufficient conditions are presented such that
the iteration of the Z-Bus method (12) is contracting, i.e., the
iteration converges geometrically to a unique solution of (10).
To present these conditions, it is beneficial to make a change
of variables in (12). Specifically, let u = Λ−1 v[t] where Λ ∈
CJ×J is an invertible diagonal matrix with entries λj . Matrix
Λ will serve as a design parameter which can be leveraged
to potentially expand the convergence region of the Z-Bus
method. Parameterizing v by u and multiplying both sides of
(12) by Λ−1 yield the following iteration for u:
u[t + 1] = T(u[t]),
where iS is the complex current injection of the slack bus.
Matrices Y, YNS , YSN , and YSS are formed by concatenating
the admittance matrices of transmission lines, transformers and
voltage regulators, given e.g., in [13]. It follows from (5) that
i(v) = Yv + YNS vS ,
, and
w = −ZYNS vS .
III. T HE Z-B US M ETHOD
For a three-phase network, the multidimensional Ohm’s law
is given by
v
Y
YNS
i
,
(5)
=
YSN YSS vS
iS
(10)
J
(13)
J
where T(u) : C → C is the following mapping
T(u) = Λ−1 Z [iPQ (Λu) + iI (Λu)] + Λ−1 w,
(14)
and the Z-Bus method of (12) can be equivalently written as
v[t + 1] = ΛT(Λ−1 v[t]).
(15)
Since the iterations in (13) and (15) have a one-to-one correspondence, convergence of (13) to a fixed point ufp = T(ufp )
is equivalent to the convergence of (15) to a respective solution
vfp = Λufp of (10).
IEEE TRANSACTIONS ON POWER SYSTEMS (ACCEPTED)
4
In what follows, conditions such that the mapping T(u)
in (14) is a contraction over a region D ⊆ CJ are derived.
As a consequence, T(u) has a unique fixed point over D, and
iterations (13) converge geometrically to the unique fixed point
[15, Prop. 3.1.1]. The definition of contraction is as follows:
Definition. For a closed set D ⊆ CJ , a mapping T(u) is a
contraction on D if the following two properties hold:
1) Self-mapping property: u ∈ D ⇒ T(u) ∈ D.
2) Contraction property: u, ũ ∈ D ⇒ kT(u) − T(ũ)k ≤
αku − ũk,
where k.k is some norm and α ∈ [0, 1) is a constant.
kΛ−1 ZY diag(sY )diag(wY )−1 k∞
1 − Rλ̄/w
−1 ∆
kΛ Z diag(s∆ )diag(w∆ )−1 k∞
+
1 − 2Rλ̄/ρ
+ kΛ−1 ZY diag(iY )k∞ + kΛ−1 Z∆ diag(i∆ )k∞ ≤ R (C3)
kΛ−1 ZY diag(sY )ΛY [diag(wY )−1 ]2 k∞
(1 − Rλ̄/w)2
−1 ∆
2kΛ Z diag(s∆ )Λ∆ [diag(w∆ )−1 ]2 k∞
+
(1 − 2Rλ̄/ρ)2
2kΛ−1 ZY diag(iY )ΛY diag(wY )−1 k∞
1 − Rλ̄/w
4kΛ−1 Z∆ diag(i∆ )Λ∆ diag(w∆ )−1 k∞
+
≤ α < 1.
1 − 2Rλ̄/ρ
+
In regards to the previous definition, any number α ∈ [0, 1)
˜
u)k
uniformly for all
that upperbounds the ratio kT(u)−T(
ku−ũk
u, ũ ∈ D (u 6= ũ), is called contraction modulus.
In order to state the conditions for (14) to be a contraction
map, the following quantities are defined:
(C4)
sY = {skL }k∈JY ∈ C|JY | , iY = {ikL }k∈JY ∈ C|JY | , (16b)
wY = {wk }k∈JY ∈ C|JY | , ZY = [Z•k ]k∈JY CJ×|JY | , (16c)
If conditions (C1)–(C4) hold for some R > 0, then T(u) is
a contraction mapping and has as a consequence a unique fixed
point ufp in the ball defined by DR . In other words, the power
flow equations have a unique solution in DR . The value of R
can be interpreted as the infinity norm of the voltage difference
from the no-load power flow solution scaled by Λ. The latter
is obtained as u = Λ−1 w upon setting iPQ = iI = 0 in (14).
w∆ = {eTk wNode[k] }k∈J∆ ∈ C|J∆ | ,
Moreover, the contraction property of T(u) implies the
following relationships for successive iterates of the Z-Bus
method upon initialization with u[0] ∈ DR :
w = min |wk |, λ̄ = max |λk |, ρ = min {|eTk wNode[k] |}, (16a)
k∈J
k∈J
k∈J∆
ΛY = diag({λk }k∈JY ) ∈ C|JY |×|JY | ,
s∆ = {skL }k∈J∆ ∈ C|J∆ | , i∆ = {ikL }k∈J∆ ∈ C|J∆ | ,
(16d)
(16e)
J×|J∆ |
(16g)
∆
Z =
[Z∆
•lk ]k∈J∆
∈C
,
(16f)
where lk ∈ {1, . . . , |J∆ |} is the order of k in J∆ , and
Z•k − Z•k′ , if φ, r(φ) ∈ Ωn ,
Z∆
=
•lk
0J ,
if φ ∈ Ωn , r(φ) ∈
/ Ωn ,
′
with k = Lin(n, φ), k = Lin(n, r(φ)),
∆
Λ = diag({maxl∈JNode[k] |λl |}k∈J∆ ) ∈ C|J∆ |×|J∆ | . (16h)
In (16), the notation wn = {wk }k∈Jn relates the indices in
w to corresponding ones in v. Respectively for wye and delta
connections, quantities sY and s∆ collect all constant-power
loads, iY and i∆ collect all constant-current loads, ZY and
Z∆ collect corresponding columns of the impedance matrix
Z, and wY , w∆ collect the voltages induced by the slack bus.
Matrix ΛY contains the elements of the design matrix Λ that
correspond to wye nodes and matrix Λ∆ selects the maximum
of the per node entries of the design matrix Λ for delta nodes.
Theorem 1 establishes the convergence of the Z-Bus method
in three-phase distribution networks with ZIP loads, and is
proved in Appendix B using intermediate results in Appendix A.
Theorem 1. Define the closed ball DR := {u ∈ CJ | ku −
Λ−1 wk∞ ≤ R} where R > 0. Then T(u) in (14) is a
contraction mapping on DR with contraction modulus α if
the following four conditions hold:
1 − Rλ̄/w > 0,
(C1)
1 − 2Rλ̄/ρ > 0,
(C2)
ku[t + 1] − ufp k∞ ≤ αku[t] − ufp k∞ ,
ku[t + 1] − u[t]k∞ ≤ αku[t] − u[t − 1]k∞ .
(17a)
(17b)
Equation (17a) implies that the iterates in (13) converge to ufp
with a convergence rate that is upperbounded by α. Equation
(17b) can be used to numerically evaluate the convergence
ku[t+1]−u[t]k∞
. We will see in
rate by computing the ratio ku[t]−u[t−1]k
∞
Section V for the IEEE test feeders that the aforementioned
ratio turns out to be much smaller than the estimate provided
by the left-hand side of (C4).
Theorem 1 on T(u) implies certain convergence properties
for iteration (12), as stated next.
Theorem 2. If conditions (C1)–(C4) hold, then by initializing
v[0] ∈ D′R := {v|kΛ−1 (v−w)k∞ ≤ R}, the Z-Bus iterations
in (12) remain within D′R and converge to a unique solution.
Moreover, the convergence is R-linear with rate α [i.e., the
sequence generated by (12) is dominated by the geometric
sequence Bαt where B is a non-negative scalar].
Proof. The self-mapping property of T(u) and the one-toone correspondence between v and u guarantee that the
iterates v[t] remain within D′R . Regarding the convergence
rate of (12), note that the contraction property of T(u) implies
(cf. [15, Prop. 3.1.1])
ku[t] − ufp k∞ ≤ αt ku[0] − ufp k∞ .
Since we have u = Λ
−1
(18)
v, it follows from (18) that
kΛ−1 (v[t] − vfp )k∞ ≤ αt kΛ−1 (v[0] − vfp )k∞ . (19)
IEEE TRANSACTIONS ON POWER SYSTEMS (ACCEPTED)
5
From the definition of the infinity norm it follows that
1
(vj [t] − vjfp )
λj
1
= max
|vj [t] − vjfp |
j∈J
λj
1
≥ max |vj [t] − vjfp |
λ̄ j∈J
1
(20)
⇒kΛ−1 (v[t] − vfp )k∞ ≥ kv[t] − vfp k∞ .
λ̄
Moreover, we have that
kΛ−1 (v[t] − vfp )k∞ = max
j∈J
1
(vj [0] − vjfp )
λj
1
(vj [0] − vjfp )
≤ max
j∈J mink∈J |λk |
1
≤
max |vj [0] − vjfp |
mink∈J |λk | j∈J
1
kv[0] − vfp k∞ . (21)
⇒kΛ−1 (v[0] − vfp )k∞ ≤
mink∈J |λk |
kΛ−1 (v[0] − vfp )k∞ = max
j∈J
Combining (20), (21), and (19) yields
kv[t] − vfp k∞ ≤ Bαt ,
(22)
λ̄
where B = minj∈J |λj | kv[0] − vfp k∞ ≥ 0. Since the quantity
kv[t] − vfp k∞ is upperbounded by a geometric sequence,
the rate of convergence is (informally) said to be geometric;
formally, the convergence is R-linear with rate α [16, pp.
619].
Conditions (C1)–(C4) can be expressed via inequalities
involving polynomials of degree at most four in the radius
of the contraction region. The coefficients of the polynomials
can be readily written in terms of the network parameters
and loads. Quartic polynomials and their roots have been
completely characterized, and can be routinely computed in
terms of the polynomial coefficients—see for example [17].
The convergence region can thus be easily computed. Significant analytical advantages can also be afforded by the
presented conditions, as the convergence region can potentially
be expressed explicitly in terms of the network loads and
parameters. An alternative set of nonlinear non-polynomial
conditions for convergence of the Z-Bus method is presented
in [18].
Conditions (C1)–(C4) can also be graphically solved, as
explained next. First, the quantities in (16) must be computed
which depend only on the feeder data. The set of R values
satisfying each condition can simply be plotted on the real
line. The intersection of the feasible regions in these plots
gives a range for R. In the next section, the valid range
of R satisfying conditions (C1)–(C4) is computed for IEEE
distribution test feeders, and the convergence of the Z-Bus
method is numerically illustrated.
V. N UMERICAL
VERIFICATION ON
IEEE FEEDERS
In this section, the range of R where conditions (C1)–(C4)
are satisfied is given for IEEE-13, IEEE-37, and IEEE-123
distribution test feeders [19]. Furthermore, the self-mapping
property as well as the convergence of the Z-Bus method are
numerically confirmed for iterations on voltages in (12). This
is because the Z-Bus method is routinely implemented on the
variable v as opposed to u.
The feeder data are available online [20]. We model
transformer nodal admittances according to [1]. However, to
avoid singularities in the bus admittance matrix, delta-delta
transformers are modeled using a modification suggested in
[21] which entails connecting a small shunt admittance to the
ground. For voltage regulators, the models are derived from
[11, Ch. 7].1
To numerically verify conditions (C1)–(C4), the design
parameter Λ is selected to be Λ = diag(w). This choice
allows for the center of DR to be the vector of all one’s. This
practically means that the no-load solution for scaled voltages
is u = Λ−1 w = 1.
For the IEEE-13 test feeder, conditions (C1)–(C4) yield the
following inequalities for R:
1 − 1.043R > 0; 1 − 1.203R > 0
0.041
0.127
+
+ 0.032 + +0.01 ≤ R
1 − 1.043R 1 − 1.203R
0.127
0.048
+
(1 − 1.043R)2 (1 − 1.203R)2
0.024
0.064
+
< 1.
+
1 − 1.043R 1 − 1.203R
For the IEEE-37 test feeder, the conditions are
1 − 1.037R > 0; 1 − 1.198R > 0
0.037
+ 0.018 ≤ R
1 − 1.198R
0.042
0.043
+
< 1.
(1 − 1.198R)2 1 − 1.198R
(23a)
(23b)
(23c)
(24a)
(24b)
(24c)
Finally, for the IEEE-123 feeder, the conditions are
1 − 1.078R > 0; 1 − 1.238R > 0
(25a)
0.001
0.129
+
+ 0.030 + 0.012 ≤ R
(25b)
1 − 1.078R 1 − 1.238R
0.001
0.129
+
2
(1 − 1.0777R)
(1 − 1.238R)2
0.060
0.027
+
+
< 1. (25c)
1 − 1.078R 1 − 1.238R
For each feeder, the subsets of the real line where conditions
(C1)–(C4) are satisfied are depicted in Fig. 1, by solving
(23), (24), and (25). The intersection of these regions for the
IEEE-13, IEEE-37 and IEEE-123 feeders is [Rmin , Rmax ] =
[0.29, 0.48], [Rmin , Rmax ] = [0.06, 0.64], and [Rmin , Rmax ] =
[0.22, 0.54], respectively. Both Rmin and Rmax reveal important information about the Z-Bus convergence. Specifically,
larger Rmax guarantees convergence when the initialization is
far from the unique solution. Smaller Rmin guarantees that the
unique solution is close to the center of the ball. The latter
implies that the deviation of the load-flow voltage solution
from the no-load solution is tightly bounded. Notice that these
regions are dependent on the design matrix Λ = diag(w).
1 The MATLAB scripts that compute the convergence regions for the IEEE
test feeders and run the Z-Bus method are provided online at the following
page: https://github.com/hafezbazrafshan/contraction-mapping.
IEEE TRANSACTIONS ON POWER SYSTEMS (ACCEPTED)
(C1)
(C2)
(C3)
6
vn [0] = vS
vn [0] = wn
vn [0] = wn − Rmin wn
vn [0] = wn − Rmax wn
Rmin
Rmax
(C4)
0.5
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
kΛ−1 (v[t] − w)k∞
0
R
(a)
(C1)
(C2)
(C3)
(C4)
0.4
0.3
0.2
0.1
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
0
R
(b)
0
(C1)
(C2)
(C3)
1
2
3
4
Iteration t
(C4)
Demonstration of the self-mapping property of the Z-Bus
iterations in (12) for IEEE-123 test feeder. As long as the Z-Bus
method is initialized with v[0] ∈ D′R , where R satisfies conditions
(C1)–(C4), successive iterations v[t] remain within D′R .
Fig. 3.
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
R
(c)
Fig. 1. Regions on the real line where conditions (C1)–(C4) hold
for (a) IEEE-13, (b) IEEE-37, and (c) IEEE-123 test feeders. The
presence of a mark indicates that the condition is satisfied.
vn [0] = vS
vn [0] = wn
vn [0] = wn − Rmin wn
vn [0] = wn − Rmax wn
103
101
kv[t + 1] − v[t]k∞
Lower bound of contraction modulus α
1
IEEE-13
IEEE-37
IEEE-123
0.9
0.8
10−1
10−3
0.7
0.6
10−5
0.5
0.4
10−7
0.3
0
1
2
3
4
Iteration t
0.2
0.1
Fig. 4. Convergence of the Z-Bus iterations in (12) for IEEE-123 test
0
0
0.1
0.2
0.3
0.4
0.5
0.6
R
Fig. 2. Lower bound of contraction modulus α versus R in the range for
which conditions (C1)–(C4) are satisfied.
For example, setting Λ = IJ for the IEEE-13 feeder yields
Rmax = 0.60 and also shifts the center of the ball from 1
to w. A study on the impact of Λ on the contracting region
remains for future work.
Figure 2 depicts the lower bound of the contraction modulus
α evaluated from (C4) as a function of the feasible R for
the three IEEE feeders. It is revealed in Fig. 2 that a more
localized initialization (i.e., smaller R) yields smaller α, with
the smallest α occurring at Rmin . For the IEEE-13, IEEE37, and IEEE-123 feeders, the smallest α is respectively
0.50, 0.09, and 0.34. Upon initializing within DRmin , the
convergence rate is guaranteed to be at most as much as the
aforementioned values.
The self-mapping property of the Z-Bus iterations (12) is
demonstrated in Fig. 3 for the IEEE-123 test feeder. It is
shown that when the initialization v[0] is within D′R , where
R ∈ [Rmin , Rmax ], the sequence v[t] produced by the ZBus method in (15) remains within D′R . In Fig. 3, a case of
special interest is the graph corresponding to the initialization
with the flat voltage profile, that is, when vn [0] = vS , where
feeder. It is observed that the Z-Bus method converges to the unique
solution very fast—within 4 iterations.
π
π
vS = {1, e−j2 3 , ej2 3 } is the voltage at the slack bus. The
graph shows that the typical initialization with the flat voltage
profile is within the contracting region; and upon initializing
with vn [0] = vS ∈ D′R for all nodes, the iterates remain
within D′R .
The distance between two successive iterates of the Z-Bus
method for the IEEE-123 test feeder is plotted in Fig. 4.
It is shown that the distance kv[t + 1] − v[t]k∞ practically
converges to zero within 4 iterations, implying that the fixedpoint solution is obtained. For the sequences of Fig. 4, the
empirical convergence rate is also numerically calculated using
(17b) and is depicted in Fig. 5. All the numerical convergence
rates are smaller than 0.34, which is the smallest theoretically
obtained contraction modulus for the IEEE-123 network.
The merits of this work is that it characterizes certain
regions with unique power flow solution in three-phase distribution networks and that it guarantees convergence of the
Z-Bus method. Working with networks that satisfy solvability
conditions can provide a degree of assurance that the numerical
algorithm—the Z-Bus method in this case—will converge to
a solution.
Further research is required to obtain conditions that ac-
IEEE TRANSACTIONS ON POWER SYSTEMS (ACCEPTED)
7
0.12
vn [0] = vS
vn [0] = wn
vn [0] = wn − Rmin wn
vn [0] = wn − Rmax wn
kΛ−1 (v[t+1]−v[t])k∞
kΛ−1 (v[t]−v[t−1])k∞
0.1
0.08
0.06
0.04
1
2
3
4
Iteration t
Fig. 5. Numerical convergence rate of the Z-Bus iterations in (12) for
the iterations in Fig. 4. The numerical convergence rate at iteration t
is calculated using (17b). Notice that these convergence rates are all
smaller than 0.34, which is the tightest upper bound given in Fig. 2
for IEEE-123.
curately characterize the largest region with a unique power
flow solution. As was previously alluded to, it is possible to
leverage the design parameter Λ for this purpose. By setting
Λ = diag(w), the conditions are satisfied for the practical
IEEE test networks; developing comprehensive methods for
the selection of parameter Λ are left for future work.
It should be noted at this point that this work derives
sufficient conditions for convergence. Generally speaking, sufficient conditions are conservative by nature. That is, the existence of loads and network parameters that do not satisfy the
conditions yet yield convergence is not precluded. It is clear
from conditions (C3) and (C4) that by increasing the constantpower and constant-current loads, there will eventually be no
R > 0 that ensures contraction.
As an example, in the IEEE-123 test feeder, after 50% of
load increase, no R > 0 satisfies condition (C3), however the
Z-Bus converges to a solution within 5 iterations. Therefore,
the ultimate goal would be to provide a set of conditions that
divide the voltage space to two regions, namely, one where
there is convergence and another one of non-convergence.
However, this is still an open research question. The next
section provides two network examples where the Z-Bus
method fails to converge in cases where conditions (C1)–(C4)
are not satisfied yet a solution may exist.
VI. N UMERICAL
EXAMPLES OF NON - CONVERGENCE
In this section, we provide two example networks where the
Z-Bus method does not converge. The first example (Section
VI-A) depicts a simple two-node network for which an analytical solution is found; however, convergence conditions are not
satisfied and the Z-Bus method oscillates. The second example
(Section VI-B) features a non-trivial unbalanced network with
constant-power loads where the convergence occurs only when
the loads are reduced by a certain percentage. The convergence
conditions also are satisfied for a close percentage, which
reveals that they are relatively tight in this example.
A. Balanced two-node network with power injection
Consider a two-node network where the slack bus S is connected to a secondary bus through an ideal phase-decoupled
three-phase line with real-valued series impedance yt . The
secondary bus contains real-valued ZIP components sL , iL ,
and yL on each phase, where iL , yL > 0 but sL < 0, that is,
the constant-power portion of the ZIP component is considered
to be a power injection. In this case, we have that sL = sL 1,
iL = iL 1, YL = yL I where 1 ∈ R3 is a vector of all one’s and
I ∈ R3×3 is the 3 × 3 identity matrix. Moreover, the network
admittance matrix is Y = −YNS = yt I. Denote the voltage
vector at the non-slack bus with v = {v a , v b , v c } and let the
2π
2π
slack bus voltage be fixed at vS = {1, e−j 3 , ej 3 }.
Due to the fact that the network is balanced and the values
of loads are real, it turns out that a solution of the form
2π
2π
v a = v b ej 3 = v c e−j 3 = v exists where v is a real number.
To demonstrate this, we write the Ohm’s law for phase a as
follows:
v
sL
− iL
= (yt + yL )v − yt .
(26)
−
v
|v|
Assuming that we are only interested in non-negative voltages v, that is, when |v| = v, the following quadratic equation
can be obtained for v:
(yt + yL )v 2 + (iL − yt )v + sL = 0.
The solution to (27) is explicitly given as
√
yt − i L
∆
v=
±
,
2(yt + yL ) 2(yt + yL )
(27)
(28)
with ∆ = (yt − iL )2 − 4(yt + yL )sL . Keep in mind that (28)
is not necessarily the only admissible voltage solution for this
network since we have only limited the search to v ∈ R≥0 .
In order to simplify the ensuing computations, let us select
yt = yL = 21 pu, and set the current injection iL = 21 pu.
Substituting these values into (28), the real non-negative
voltage solution v parameterized by sL is thus computed
√
v = −sL .
(29)
It is clear that for values sL √
< 0, the network admits at least
one voltage solution vsol = −sL vS .
At this point, it is our intention to show that even though
voltage solutions exist in this example network, the Z-Bus
method may not converge and the convergence conditions
(C1)–(C4) are not satisfied.
1
We first compute Z = (Y +YL )−1 = yt +y
I = I and w =
L
1
2 vS . By selecting Λ = I, convergence conditions (C1)–(C4)
for this network yield the following inequalities parameterized
by sL :
1 − 2R > 0,
1
2|sL |
+ ≤ R,
1 − 2R 2
4|sL |
2
+
< 1,
(1 − 2R)2
1 − 2R
(30a)
(30b)
(30c)
where in (30), due to the absence of delta-connected nodes,
(C2) is not present.
IEEE TRANSACTIONS ON POWER SYSTEMS (ACCEPTED)
2
8
v[0] = vs
v[0] = 2vsol
v[0] = 0.5vsol
v[0] = vsol + 0.1vS
1.8
101
kv[t + 1] − v[t]k∞
1.6
102
kv[t]k∞
1.4
1.2
1
0.8
0.6
100
10−1
10−2
10−3
10−4
0.4
10−5
0.2
10−6
0
0
2
4
6
8
0
10
Iterations of the Z-Bus method performed on the two-node
test network while setting sL = −0.5 pu. Since Z-Bus convergence
conditions in (30) are not feasible for any sL , the convergence of the
Z-Bus method is not guaranteed, even when there is knowledge that
solution (29) exists.
Inequality (30b) can be transformed to the quadratic inequality 2R2 − 2R + 12 + 2|sL | ≤ 0, which does not have
a feasible solution in R for any sL < 0. However, existence
of power solutions for sL < 0 is easily perceived by (29).
Figure 6 plots the infinity norm of the iterates of the Z-Bus
method, that is, kv[t]k∞ , when sL = −0.5 pu. Figure 6 is
representative of the fact that the Z-Bus method does not
converge to the solution (29).
B. Unbalanced three-node network
2
4
6
8
10
12
14
16
18
20
Iteration t
Iteration t
Fig. 6.
θ=1
θ = 0.5
θ = 0.3
θ = 0.2
θ = 0.12
θ = 0.11
Iterations of the Z-Bus method performed on the threenode test network for several values of parameter θ. When the
value of θ is such that Z-Bus convergence conditions (33) are not
feasible, the convergence of the Z-Bus is not guaranteed. The black
line corresponding to θ = 0.12 depicts a very long oscillation.
As θ approaches θsol = 0.1060, the Z-Bus method converges.
sol
When
, a√ unique solution exists within DR where R ∈
√ θ ≤ θ
1− 1−9.4360θ 1+ 1−9.4360θ
[
,
].
2
2
Fig. 7.
the following inequalities in R parameterized by θ:
1−R>0⇒R<1
(33a)
2.359θ
≤ R ⇒ R2 − R + 2.359θ ≤ 0
(33b)
1−R
2.359θ
< 1 ⇒ R2 − 2R + 1 − 2.359θ > 0. (33c)
(1 − R)2
It is not hard to see that (33) has a valid solution for R only
sol
√ Z-Bus is
Consider a three-node network with the set of nodes if θ ≤ θ = 0.1060. The range of √R for convergent
1− 1−9.4360θ 1+ 1−9.4360θ
,
].
N = {1, 2, S} and the set of edges {(1, S), (1, 2)}. The series then given as [Rmin , Rmax ] = [
2
2
The Z-Bus method is run on this example network for several
admittances for edges (1, S) and (1, 2) are as follows:
representative values of θ using the initialization v[0] = w.
0.077 − j5.33 0.01 − j0.09 0.02 − j0.08
The corresponding Z-Bus iterations are shown in Fig. 7. It is
0.087 − j8 0.03 − j0.07 , (31a) revealed in Fig. 7, that for almost all percentages θ higher than
Y1S = 0.01 − j0.09
0.02 − j0.08 0.03 − j0.07 0.07 − j1.5
θsol the Z-Bus method fails to converge. However, for θ ≤ θsol ,
0.056 − j8.66
0
0.02 − j0.07
the Z-Bus iterations are guaranteed
to converge
√
√ to the unique
1+ 1−9.4360θ
0
0.02 − j4.8 0.03 − j0.05 , (31b) solution in DR where R ∈ [ 1− 1−9.4360θ
Y12 =
,
].
2
2
0.02 − j0.07 0.03 − j0.05 0.03 − j3.8
where all values are per unit. The load buses {1, 2}
only contain
values of
constant-power loads with per unit
T
and sL2 =
sL1 = θ 0.7 + j1.5 0.8 + j1.5 0.8 + j2.5
T
θ 0.6 + j2.5 0.6 + j0.5 0.3 + j0.5 where θ ∈ (0, 1] is
a parameter that is going to be varied to obtain convergence
threshold for the Z-Bus method.
Our intention is to find θ such that the convergence of the
Z-Bus method is guaranteed and numerically investigate how
conservative the theoretical bound is. First, network parameters
are computed:
Y1S + Y12 −Y12
Y=
(32a)
−Y12
Y12
−Y1S
v
YNS =
(32b)
, w= S .
O
vS
Next, to find θ such that Z-Bus convergence is guaranteed,
by setting Λ = I, the convergence conditions (C1)–(C4) yield
VII. C ONCLUDING R EMARKS
A set of sufficient conditions was derived that guarantee
the convergence of the Z-Bus method to a unique solution of
the power flow problem in three-phase distribution networks
with ZIP loads. It was numerically demonstrated that the IEEE
test feeders with wye and delta ZIP loads satisfy the derived
conditions. Characterizing the largest regions with unique
power flow solution is an open research question. Investigating
the effect of the design parameter Λ to this end is the subject
of future work.
A PPENDIX A
U SEFUL I NTERMEDIATE R ESULTS
This Appendix proves intermediate results on the product
Z[iPQ +iI ] that shows up in (12), and an inequality on complex
numbers, which will be later used.
IEEE TRANSACTIONS ON POWER SYSTEMS (ACCEPTED)
A. Rearranging
P
k∈J∆
9
Zjk iPQ (v)k
B. Rearranging
∆
Lemma 1. Consider the matrix Z defined in (16g). For n ∈
N∆ , φ ∈ Ωn , k = Lin(n, φ) ∈ J∆ , j ∈ J , and indices
lk ∈ {1, . . . , |J∆ |}, the following equality holds:
k ∗
X
X
sL
Z∆
Zjk iPQ (v)k = −
.
(34)
jlk
Tv
e
k n
k∈J
k∈J
∆
∆
Proof. Using (4a) for constant-PQ loads with delta connections, we can write
X
Zjk iPQ (v)k =
k∈J∆
−
X
n∈N∆
′∗
X
ZjLin(n,φ)
φ∈Ωn
sφφ
Ln
X
′
T ∗
(eφφ
n ) vn
φ′ ∈Ωn /{φ}
.
(35)
Consider the term in parenthesis in (35). Since n ∈ N∆ , then
|Ωn | ≥ 2, i.e., node n has at least two available phases. If
|Ωn | = 2, then without loss of generality we can assume
Ωn = {φ, φ′ } where φ′ = r(φ) and r(φ′ ) ∈
/ Ωn . The term
in parenthesis in (35) can be written as follows:
′∗
ZjLin(n,φ)
=
=
sφφ
Ln
′
T ∗
(eφφ
n ) vn
′
+ ZjLin(n,φ′ )
sφLnφ
∗
(36)
where k ′ = Lin(n, r(φ)), and equality (a) results from the
fact that Z∆
/ Ωn [cf. (16g)].
jlk is zero when φ ∈ Ωn and r(φ) ∈
If node n has three phases then Ωn = {a, b, c} and r(a) = b,
r(b) = c, and r(c) = a. The term in parenthesis in (35) equals:
∗
∗
sac
sab
ZjLin(n,a) abLnT ∗ + ZjLin(n,a) acLnT ∗
(en ) vn
(en ) vn
∗
∗
sbc
sba
+ ZjLin(n,b) baLnT ∗ + ZjLin(n,b) bcLTn ∗
(en ) vn
(en ) vn
∗
∗
sca
scb
+ ZjLin(n,c) caLnT ∗ + ZjLin(n,c) cbLTn ∗
(en ) vn
(en ) vn
∗
ab∗
sL n
sab
Ln
= ZjLin(n,a) ab T ∗ − ZjLin(n,b) ba T ∗
(en ) vn
(en ) vn
∗
bc∗
sbc
sL n
Ln
+ ZjLin(n,b) bc T ∗ − ZjLin(n,c) bc T ∗
(en ) vn
(en ) vn
∗
∗
sca
sca
Ln
Ln
+ ZjLin(n,c) ca T ∗ − ZjLin(n,a) ca T ∗
(en ) vn
(en ) vn
∗
X
sφr(φ)
Ln
=
ZjLin(n,φ) − ZjLin(n,r(φ))
φr(φ) T ∗
(en
) vn
φ∈Ωn
∗
∗
k
k
X
X
s
sL
[Zjk − Zjk′ ] TL ∗ =
=
Z∆
jlk T ∗ .
ek vn
ek vn
k∈J
k∈J
n
k∈J∆
Zjk iI (v)k
Lemma 2. Consider the matrix Z∆ defined in (16g). For n ∈
N∆ , φ ∈ Ωn , k = Lin(n, φ) ∈ J∆ , j ∈ J , and indices
lk ∈ {1, . . . , |J∆ |}, the following equality holds:
X
X
ikL eTk vn
Z∆
.
(38)
Zjk iI (v)k =
jlk
|eTk vn |
k∈J
k∈J
∆
n
′∗
Proof. Follow Appendix A-A with the terms
∗
sk
L
∗
eT
v
k n
replaced by
′
φφ′ T
iφφ
Ln (en ) vn
′
T
|(eφφ
n ) vn |
and
T
ik
L ek vn
|eT
k vn |
sφφ
Ln
′
T ∗
(eφφ
n ) vn
and
, respectively.
C. A useful inequality for complex numbers
Lemma 3. For two complex numbers x, y 6= 0 we have that
y
|x − y|
x
−
.
≤2
|x| |y|
|x|
(39)
Proof. The following hold:
x
y
y
y
y
x
≤
+
−
−
−
|x| |y|
|x| |x|
|x| |y|
|y| − |x|
|x − y|
|x − y|
=
+ |y|
≤2
. (40)
|x|
|x||y|
|x|
Notice that (40) holds since ||y| − |x|| ≤ |x − y|.
′
(eφn φ )T vn∗
φr(φ)∗
φr(φ)∗
sL n
sL n
ZjLin(n,φ) φr(φ)
− ZjLin(n,r(φ)) φr(φ)
(en
)T vn∗
(en
)T vn∗
∗
∗
∗
sk
skL (a) X ∆ skL
Z
[Zjk − Zjk′ ] TL ∗ = Z∆
=
jlk T ∗ ,
jlk T ∗
ek vn
ek vn
ek vn
k∈Jn
P
A PPENDIX B
P ROOF OF T HEOREM 1
In this section, the proof of Theorem 1 is given. First,
to guarantee that for all u ∈ DR the corresponding lineto-neutral and line-to-line voltage magnitudes are positive,
conditions (C1) and (C2) are derived in Appendices B-A and
B-B respectively. Condition (C3) ensures the self-mapping
property of T(u) and is derived in Appendix B-C. Appendix
B-D derives condition (C4), which guarantees the contraction
property of T(u).
A. Bounds on line to neutral voltages
This section proves two results. First, a lower bound on all
line to neutral voltages is derived in (42) which will be later
used in proving the self-mapping and contraction properties.
Second, condition (C1) is proved.
Due to condition u ∈ DR , the following holds for k ∈ J :
wk
wk
| ≤ R ⇒ |uk −
| ≤ R,
max |uk −
k∈J
λk
λk
⇒ |λk uk − wk | ≤ |λk |R ⇒ |vk − wk | ≤ R|λk |,
⇒ |wk | − |vk | ≤ R|λk | ⇒ |wk | − R|λk | ≤ |vk |
⇒ |wk |(1 − R|λk |/|wk |) ≤ |vk |.
(37)
n
For |Ωn | = 2 or |Ωn | = 3, substituting the appropriate term
from (36) or (37) for the parenthesis in (35) yields (34).
(41)
(42)
Equation (42) provides a lower bound for the magnitude of
line to neutral voltages in terms of R and w.
The proof of (C1) is based on (42). In (42), in the term in
parenthesis, we replace |wk | by its minimum w [defined in
(16a)], and replace |λk | by its maximum λ̄ [also defined in
(16a)] to obtain a lower bound for the left-hand side of (42)
which is common for all k ∈ J :
|wk |(1 − R|λk |/|wk |) ≥ |wk |(1 − Rλ̄/w).
(43)
IEEE TRANSACTIONS ON POWER SYSTEMS (ACCEPTED)
10
To ensure that for all u ∈ DR , the magnitude of the line to
neutral voltages is positive, the right-hand side of (43) must
be greater than zero, yielding condition (C1).
The right-hand side of (49) is the sum of four terms. An
upper bound for each term is provided next.
For the first term in (49), the following holds:
skL ∗
)
vk
k∈JY
k∈JY
" ∗ ∗ ∗ #
X
skL
skL
skL
=
Zjk
−
+
vk
wk
wk
B. Bounds on line to line voltages
Similar to Appendix B-A, this section proves two results.
First, we find a lower bound for line to line voltages in delta
connections. Next we derive condition (C2).
For n ∈ N∆ , any line to line voltage can be written as
eTk vn , where k = Lin(n, φ) and φ ∈ Ωn . Using the triangle
inequality, we find the following:
|eTk vn | = |eTk (vn − wn ) + eTk wn |
≥
|eTk wn |
−
|eTk (vn
X
≤
≤
(44)
Due to Hölder’s inequality, for n = Node[k] we have that
=
|eTk (vn − wn )| ≤ kek k1 kvn − wn k∞ ,
(a)
l∈Jn
⇒ |eTk (vn − wn )| ≤ 2 max{|λl ||ul −
l∈Jn
wl
|}
λl
(b)
⇒ |eTk (vn − wn )| ≤ 2R max{|λl |},
l∈Jn
(45)
where (a) holds because kek k1 = 2 for k ∈ J , and (b) holds
due to the assumption u ∈ DR . Using (45) in (44) we find:
|eTk vn |
≥
|eTk wn |
− 2R max{|λl |}
(46)
l∈Jn
≥ |eTk wn |(1 − 2R max{|λl |}/|eTk wn |).
l∈Jn
l∈Jn
(48)
To guarantee that for all u ∈ DR , the magnitude of line-to-line
voltages is positive, (48) must be greater than zero, yielding
condition (C2).
C. Self-mapping property
To obtain a sufficient condition for the self-mapping property, it is assumed that u ∈ DR , and an upper bound for
the term kT(u) − Λ−1 wk∞ is sought. The j-th entry of
kT(u) − Λ−1 wk∞ can be upper-bounded as follows:
≤
1
|λj |
+
X
k∈JY
wj
1
wj
wj
|=
Zj• [iPQ (v) + iI (v)] +
−
λj
λj
λj
λj
X
X
Zjk iPQ (v)k
Zjk iPQ (v)k +
|Zjk |
k∈JY
X
X
k∈J∆
Zjk iI (v)
!
.
k∈JY
|skL |R|λk |
(|wk | − R|λk |) |wk |
|Zjk ||skL |
(b)
|wk | − R|λk |
≤
≤
X
|Z∆
jlk |
X
|Z∆
jlk |
k∈J∆
k∈J∆
≤
X
k∈JY
X
k∈JY
|Zjk |
|skL |
|wk |
|Zjk ||skL |
,
|wk |(1 − Rλ̄/w)
(50)
X
|skL ||eTk (wn − vn )|
skL
|Z∆
+
jlk |
T
T
T
|ek vn ||ek wn |
e k wn
k∈J
∆
|skL |2R max{|λl |}
l∈Jn
(|eTk wn | − 2R max{|λl |})|eTk wn |
l∈Jn
skL
|Z∆
|
+
jlk
eTk wn
k∈J∆
k
X |Z∆
2R maxl∈Jn {|λl |}
jlk ||sL |
≤
+
1
|eTk wn | |eTk wn | − 2R maxl∈Jn {|λl |}
k∈J
∆
≤
(b)
≤
k
|Z∆
jlk ||sL |
X
|eTk wn |(1 − 2R maxl∈Jn {|λl |}/|eTk wn |)
X
|eTk wn |(1 − 2Rλ̄/ρ)
k∈J∆
k
|Z∆
jlk ||sL |
k∈J∆
,
(51)
where n = Node[k], index lk is defined in (16g), inequality
(a) is due to (45) and (46), and inequality (b) is due to (48).
The upper bound for the third term in (49), is given by
X
iI (v) =
k∈JY
X
k∈JY
Zjk
X
vk k
iL ≤
|Zjk ||ikL |.
|vk |
(52)
k∈JY
Lemma 2 is invoked to provide an upper bound for the
fourth term in (49):
X
Zjk iI (v)k =
X
Zjk iI (v)k ≤
k∈J∆
(49)
+
X
k∈J∆
k∈JY
Zjk iI (v) +
X
k∈JY
X
|sk |
|skL ||wk − vk |
|Zjk | L
+
|vk ||wk |
|wk |
∆
(a)
|eTk wn |(1 − 2R max{|λl |}/|eTk wn |)
|T(u)j −
|Zjk |
where (a) is due to (41), and (b) is due to (42) and (43).
For the second term in (49), we use Lemma 1, and we write
k ∗
X
X
sL
∆
Zjk iPQ (v)k =
Zjlk
Tv
e
k n
k∈J∆
k∈J∆
"
k ∗ #
∗
∗
X
skL
sL
skL
∆
−
+
Zjlk
=
T
T
T
ek vn
e k wn
ek vn
k∈J
(47)
Equation (47) provides a lower bound for the magnitude of
line to line voltages in terms of R and w.
The proof of (C2) is based on (47). In (47), in the term
in parenthesis, we replace the term |eTk wn | by its minimum
ρ [given in (16a)], and replace |λk | by its maximum λ̄ [also
given in (16a)] to obtain a lower bound for the line to line
voltages which is common for all k ∈ J∆ and n = Node[k]:
≥ |eTk wn |(1 − 2Rλ̄/ρ).
X
k∈JY
⇒ |eTk (vn − wn )| ≤ 2 max{|vl − wl |}
Zjk (
k∈JY
(a)
− wn )|
X
Zjk iPQ (v)k =
⇒
k∈J∆
X
Z∆
jlk
k∈J∆
X
k∈J∆
eTk vn k
i
|eTk vn | L
k
|Z∆
jlk ||iL |.
(53)
IEEE TRANSACTIONS ON POWER SYSTEMS (ACCEPTED)
11
Using equations (50), (51), (52), and (53) in (49) yields
"
X
|Zjk ||skL |
1
wj
|≤
|T(u)j −
λj
|λj |
|wk |(1 − Rλ̄/w)
k∈J
≤
≤
X
+
k∈J∆
X
+
k∈JY
k
|Z∆
jlk ||sL |
|eTk wNode[k] |(1 − 2Rλ̄/ρ)
|Zjk ||ikL | +
X
k∈J∆
#
k
|Z∆
jlk ||iL | .
≤
(54)
The self-mapping property holds if the right-hand side of (54)
is upper-bounded by R for all j ∈ J , which is ensured by
(C3).
D. Contraction property
To obtain a sufficient condition for the contraction property,
we seek to find an upper-bound for the term kT(u)−T(ũ)k∞
proportional to ku − ũk∞ . Setting v = Λu and ṽ = Λũ, the
j-th entry of T(u) − T(ũ) is upper-bounded as follows:
|T(u)j − T(ũ)j |
1
1
=
Zj• [iPQ (v) + iI (v)] −
Zj• [iPQ (ṽ) + iI (ṽ)]
λj
λj
X
1
Zjk [iPQ (v)k − iPQ (ṽ)k ]
≤
|λj |
X
Zjk [iPQ (v)k − iPQ (ṽ)k ]
X
Zjk [iI (v)k − iI (ṽ)k ]
X
Zjk [iI (v)k − iI (ṽ)k ]
k∈J∆
+
k∈JY
+
k∈J∆
!
k∈JY
(c)
≤
(b)
≤
X
k∈JY
k∈JY
|λk uk − λk ũk |
(|wk | − R|λk |)2
|wk
− ũk∞ ,
(56)
where inequality (a) is due to (41) and (b) is due to (43).
Using Lemma 1 for the second term in (55) yields:
X
Zjk [iPQ (v)k − iPQ (ṽ)k ]
X
Z∆
jlk
k∈J∆
=
k∈J∆
X
|eTk wn |2 (1 − 2Rλ̄/ρ)2
k
2|Z∆
jlk ||sL |
k∈J∆
X
Zjk [iI (v)k − iI (ṽ)k ]
X
Zjk
max{|λl |}kun − ũn k∞
l∈Jn
max{|λl |}ku − ũk∞ , (57)
l∈Jn
vk k
ṽk k
i −
i
|vk | L |ṽk | L
X 2|Zjk ||ik |
(b) X
2|Zjk ||ikL |
L
|vk − ṽk | ≤
|vk − ṽk |
|vk |
|wk | − R|λk |
k∈JY
k∈JY
X
k∈JY
(55)
|Zjk ||skL |
|Zjk ||skL |
|λk |ku
|2 (1 − Rλ̄/w)2
|eTk wn |2 (1 − 2Rλ̄/ρ)2
− 2R maxl∈Jn {|λl |}/|eTk wn |)2
k
2|Z∆
jlk ||sL |
k∈J∆
k∈JY
≤
k
X
X |Zjk ||sk |
sL ∗
skL ∗
L
Zjk ( ) − ( )
=
≤
|vk − ṽk |
vk
ṽk
|vk ||ṽk |
≤
X
k
2|Z∆
jlk ||sL |kvn − ṽn k∞
k∈JY
k∈JY
(a)
|eTk wn |2 (1
where n = Node[k], (a) is due to Hölder’s inequality and
(46), and (b) is due to (48).
For the third term in (55) we have that:
(a)
The expression in (55) is a sum of four terms. In what
follows, we find an upper bound for each term.
For the first term we have that
X
Zjk [iPQ (v)k − iPQ (ṽ)k ]
X
X
2|Zjk ||ikL |
|wk |(1 − Rλ̄/w)
|λk |ku − ũk∞ ,
X
Zjk [iI (v)k − iI (ṽ)k ]
X
Z∆
jlk
k∈J∆
=
k∈J∆
(a)
≤
(b)
≤
(c)
≤
≤
eTk vn k
eT ṽn k
iL − Tk
i
T
|ek vn |
|ek ṽn | L
k
X 2|Z∆
jlk ||iL |
k∈J∆
|eTk vn |
skL
eTk vn
∗
−
skL
eTk ṽn
∗ #
|eTk vn − eTk ṽn |
k
X 2|Z∆
jlk ||iL |kek k1 kvn − ṽn k∞
k∈J∆
|eTk wn | − 2R maxl∈Jn {|λl |}
X
k
4|Z∆
jlk ||iL |
max{|λl |}kun
T
|ek wn |(1 − 2Rλ̄/ρ) l∈Jn
X
|eTk wn |(1 − 2Rλ̄/ρ)
k∈J∆
k∈J∆
k
4|Z∆
jlk ||iL |
− ũn k∞
max{|λl |}ku − ũk∞ , (59)
l∈Jn
where n = Node[k], (a) is due to Lemma 3, (b) is due to (46)
and Hölder’s inequality, and (c) is due to (48).
Using (56), (57), (58), and (59) in (55) yields:
"
X
|Zjk ||skL ||λk |
1
|T(u)j − T(ũ)j | ≤
|λj |
|wk |2 (1 − Rλ̄/w)2
k∈J
Y
"
(58)
where inequality (a) is due to Lemma 3, (b) is due to (41), and
(c) is due to (43) and the fact that kuk − ũk k ≤ ku − ũk∞ .
For the fourth term, Lemma 2 is used to obtain:
.
k∈JY
(|eTk wn | − 2R maxl∈Jn {|λl |})2
|eTk (vn − ṽn )|
k
|Z∆
jlk ||sL |kek k1 kvn − ṽn k∞
k∈J∆
=
k∈JY
+
≤
X
k∈J∆
(b)
≤
|(eTk vn )||(eTk ṽn )|
k∈J∆
(a)
Y
k
|Z∆
jlk ||sL |
X
+
k
X 2|Z∆
jlk ||sL | maxl∈JNode[k] {|λl |}
k∈J∆
|eTk wNode[k] |2 (1 − 2Rλ̄/ρ)2
IEEE TRANSACTIONS ON POWER SYSTEMS (ACCEPTED)
+
X
k∈JY
+
2|Zjk ||ikL ||λk |
|wk |(1 − Rλ̄/w)
k
X 4|Z∆
jlk ||iL | maxl∈JNode[k] {|λl |}
k∈J∆
12
|eTk wNode[k] |(1 − 2Rλ̄/ρ)
#
Mohammadhafez Bazrafshan received the B.S. degree from Iran University
of Science and Technology in 2012, and the M.S. degree in 2014 from the
University of Texas at San Antonio both in electrical engineering, where he
is currently a PhD student with research interests in smart power grids.
ku − ũk∞
(60)
For T(u) to be a contraction, the coefficient multiplying ku −
ũk∞ must be less than 1 for all j ∈ J , which is ensured by
(C4).
R EFERENCES
[1] T. H. Chen, M. S. Chen, K. J. Hwang, P. Kotas, and E. A. Chebli,
“Distribution system power flow analysis-a rigid approach,” IEEE Trans.
Power Del., vol. 6, no. 3, pp. 1146–1152, July 1991.
[2] B. C. Lesieutre, P. W. Sauer, and M. A. Pai, “Existence of solutions
for the network/load equations in power systems,” IEEE Trans. Circuits
Syst. I: Fundam. Theory Appl., vol. 46, no. 8, pp. 1003–1011, Aug 1999.
[3] D. K. Molzahn, B. C. Lesieutre, and C. L. DeMarco, “A sufficient
condition for power flow insolvability with applications to voltage
stability margins,” IEEE Trans. Power Syst., vol. 28, no. 3, pp. 2592–
2601, Aug. 2013.
[4] F. Wu and S. Kumagai, “Steady-state security regions of power systems,”
IEEE Trans. Circuits Syst., vol. 29, no. 11, pp. 703–711, Nov 1982.
[5] S. Bolognani and S. Zampieri, “On the existence and linear approximation of the power flow solution in power distribution networks,” IEEE
Trans. Power Syst., vol. 31, no. 1, pp. 163–172, Jan. 2016.
[6] H. D. Chiang and M. E. Baran, “On the existence and uniqueness of
load flow solution for radial distribution power networks,” IEEE Trans.
Circuits Syst., vol. 37, no. 3, pp. 410–416, Mar 1990.
[7] S. Yu, H. D. Nguyen, and K. S. Turitsyn, “Simple certificate of
solvability of power flow equations for distribution systems,” in Proc.
IEEE PES General Meeting, July 2015, pp. 1–5.
[8] C. Wang, A. Bernstein, J. Y. L. Boudec, and M. Paolone, “Explicit conditions on existence and uniqueness of load-flow solutions in distribution
networks,” IEEE Trans. Smart Grid, 2016.
[9] T. Q. Zhao, H. D. Chiang, and K. Koyanagi, “Convergence analysis of
implicit Z-bus power flow method for general distribution networks with
distributed generators,” IET Generation, Transmission & Distribution,
vol. 10, no. 2, pp. 412–420, Feb. 2016.
[10] “Load representation for dynamic performance analysis [of power systems],” IEEE Trans. Power Syst., vol. 8, no. 2, pp. 472–482, May 1993.
[11] W. H. Kersting, Distribution System Modeling and Analysis, 3rd ed.
CRC Press, 2002.
[12] A. Garces, “A linear three-phase load flow for power distribution
systems,” IEEE Trans. Power Syst., vol. 31, no. 1, pp. 827–828, Jan.
2016.
[13] T. H. Chen, M. S. Chen, T. Inoue, P. Kotas, and E. A. Chebli, “Threephase cogenerator and transformer models for distribution system analysis,” IEEE Trans. Power Del., vol. 6, no. 4, pp. 1671–1681, Oct. 1991.
[14] J. M. Ortega and W. C. Rheinboldt, Iterative Solution of Nonlinear
Equations in Several Variables. Academic Press, Inc., 1970.
[15] D. Bertsekas and J. N. Tsitsiklis, Parallel and Distributed Computation:
Numerical Methods. Massachussetts, USA: Athena Scientific, 1989.
[16] J. Nocedal and S. J. Wright, Numerical Optimization. New York, USA:
Springer, 2006.
[17] R. W. D. Nickalls, “The quartic equation: Invariants and euler’s solution
revealed,” The Mathematical Gazette, vol. 93, no. 526, pp. 66–75,
2009. [Online]. Available: http://www.jstor.org/stable/40378672
[18] M. Bazrafshan and N. Gatsis, “On the solution of the three-phase loadflow in distribution networks,” in 50th Asilomar Conference on Signals,
Systems, and Computers, Nov. 2016.
[19] W. H. Kersting, “Radial distribution test feeders,” in Proc. IEEE PES
Winter Meeting, vol. 2, 2001, pp. 908–912 vol.2.
[20] “Distribution Test Feeders,” https : //ewh.ieee.org/soc/pes/dsacom/
testfeeders/, accessed: 2016-10-12.
[21] M. J. Gorman and J. J. Grainger, “Transformer modelling for distribution
system studies part II: Addition of models to YBUS and ZBUS,” IEEE
Trans. Power Del., vol. 7, no. 2, pp. 575–580, April 1992.
Nikolaos Gatsis received the Diploma degree in Electrical and Computer
Engineering from the University of Patras, Greece, in 2005 with honors.
He completed his graduate studies at the University of Minnesota, where
he received the M.Sc. degree in Electrical Engineering in 2010, and the
Ph.D. degree in Electrical Engineering with minor in Mathematics in 2012.
He is currently an Assistant Professor with the Department of Electrical and
Computer Engineering at the University of Texas at San Antonio. His research
interests lie in the areas of smart power grids, renewable energy management,
communication networks, and cyberphysical systems, with an emphasis on
optimal resource management. Prof. Gatsis co-organized symposia in the
area of Smart Grids in IEEE GlobalSIP 2015 and IEEE GlobalSIP 2016.
He also served as a Technical Program Committee member for symposia
in IEEE SmartGridComm 2013, IEEE SmartGridComm 2014, and IEEE
SmartGridComm 2015.
| 3cs.SY
|
A Study of Quasi-Gorenstein Rings
arXiv:1508.04597v2 [math.AC] 4 Sep 2016
EHSAN TAVANFAR and MASSOUD TOUSI
A BSTRACT. In this paper several quasi-Gorenstein counterparts to some known properties of Gorenstein rings are given. We, furthermore, give an explicit description of the
attached prime ideals of certain local cohomology modules.
1 Introduction
Throughout this article (R, m) is a commutative Noetherian local ring of dimension d with
identity where m denotes the unique maximal ideal of R. Furthermore, M always stands for
a finitely generated d ′ -dimensional R-module.
Following [2], we say that R is a quasi-Gorenstein ring precisely when Hdm (R) ∼
= E(R/m)
or, equivalently, R has a canonical module which is a rank one free module. In the geometric vein, a normal projective variety X is quasi-Gorenstein if the canonical divisor KX of X is
Cartier. Indeed, a Cohen-Macaulay quasi-Gorenstein ring is Gorenstein. According to [21]
(c.f. [38]), roughly speaking, quasi-Gorenstein rings arise from the theory of linkage. That is,
loosely speaking, they are residue rings of a Gorenstein ring modulo an ideal which is linked
to an unmixed almost complete intersection. Hence there are so many of them. From anb satisfies the S 2 condition then the trivial
other perspective, if R has a canonical module and R
extension of R by its canonical module is quasi-Gorenstein (see [2]). This, again, shows the
ubiquity of quasi-Gorenstein rings. When R is a complete normal domain with a canonical ideal ωR , the first author of the present paper, in [43, Remark 3.2.] and [43, Theorem
L
3.5.(i)], endowed R ωR with another R-algebra structure, by which it is a quasi-Gorenstein
domain (Note that the trivial extension is never domain). It is also worthwhile to mention
that by, [13, Lemma (2.4)], the class of quasi-Gorenstein rings contains the class of unique
factorization domains with canonical module. Such non-Cohen-Macaulay unique factorization domains have their origin in the invariant theory, see [5]. Rees Algebras provides us
with another important source of quasi-Gorenstein rings (see, e.g., [28] and [22]). In the light
of [41, Theorem 6.1.], there are (even) isolated rational singularity Q-Gorenstein rings with
non-Cohen-Macaulay quasi-Gorenstein cyclic cover. In [27, Theorem, page 336] the author
2010 Mathematics Subject Classification. 13H10, 13D45.
Key words and phrases. Canonical module, G-dimension, Gorenstein rings, limit closure, local cohomology, quasi-Gorenstein rings.
This research was in part supported by a grant from IPM (No. 93130211).
1
2
A S TUDY OF QUASI -G ORENSTEIN R INGS
gives a nice description of non-Cohen-Macaulay quasi-Gorenstein Fano 3-folds1 (over C)
with isolated non-rational loci, as the projective cone defined by an ample invertible sheaf
L on an Abelian surface. In [23] the authors give examples of quasi-Gorenstein Buchsbaum
affine semigroup rings of any admissible depth. It is noteworthy to point out that affine semigroup rings of [23] are not the only place where the non-Cohen-Macaulay quasi-Gorenstein
Buchsbaum rings come from. Another source of such rings is the Segre product of two hypersurfaces of a-invariant zero. For example, over an algebraically closed field k, the Segre
product ring,
¡
¢ ¡
¢
R := k[a, b, c]/(a 3 + b 3 + c 3 ) # k[x, y, z, w]/(x 4 + y 4 + z 4 + w 4 ) ,
is a quasi-Gorenstein Buchsbaum normal domain of dimension 4 and depth 2 (see, [19, Theorem (4.1.5)], [19, Proposition (4.2.2)], [19, Theorem (4.3.1)] and [32, Theorem A]). We end
this part of the introduction by stating that, in the light of Kunz’s [29, Proposition 1.1], the
class of almost complete intersections and the class of quasi-Gorenstein rings are disjoint.
A vast amount of research has been devoted to studying the class of Gorenstein rings.
Compared with Gorenstein rings, our understanding of the behaviour and properties of
quasi-Gorenstein rings is limited. In this paper we aim to increase our knowledge about
quasi-Gorenstein rings. For example, in Section 3 we deal with some natural questions concerning the interaction between quasi-Gorensteinness and regular elements. Namely, we
prove the following fact:
Theorem 1.1. (See Proposition 3.1 and Corollary 3.4(i)) If R is quasi-Gorenstein and x is a regular element of R, then R/xR is quasi-Gorenstein if and only if R/xR satisfies the S 2 condition
S
and this is equivalent to the assertion that x ∉
¡
¢ p.
p∈AttR Hdm−1 (R)
Accordingly, the main obstruction here is the failure of S 2-condition. Hence, the next natural question is that whether the S 2 -ification of R/xR is, always, quasi-Gorenstein provided R
is quasi-Gorenstein and R/xR has a canonical module? We settle this question affirmatively.
Theorem 1.2. (See Corollary 3.4(ii)) If R is quasi-Gorenstein and x is a regular element of R
such that R/xR has a canonical module, then the S 2 -ification of R/xR is quasi-Gorenstein.
Perhaps it is worth to stress the following application of Theorem 1.1 to the homological conjectures. In [43, Remark 3.6.(i)], applying both of two characterizations of quasiGorensteinness of R/xR, given in Theorem 1.1, as well as the first author’s reduction of some
homological conjectures to normal complete quasi-Gorenstein domains in [43], together
with Ochiai and Shimomoto’s [34], it is deduced that the validity of the Hochster’s Canonical
Element Conjecture in a dense open subset (in some sense) settles the Canonical Element
Conjecture in general.
Another immediate question is the deformation property of quasi-Gorenstein rings. In
[43, Proposition 3.4.], the first author of the present paper, shows that the Ulrich’s deformation of certain Gorenstein rings to unique factorization domains, developed in [44], has a
1
This means a 3-dimensional normal projective variety X such that its anti-canonical divisor, −KX , is an
ample Cartier divisor.
E HSAN TAVANFAR
AND
3
M ASSOUD T OUSI
quasi-Gorenstein counterpart. Although, at the time of writing the paper, we do not know
whether the quasi-Gorensteinness deforms in general, but we show that the following variant of deformation of quasi-Gorensteinness, which we call it as analytic deformation2, holds
true.
Theorem 1.3. (See Theorem 3.7) Suppose that x is a regular element of R such that R/x n R is
quasi-Gorenstein for each n ∈ N. Then R is quasi-Gorenstein.
In order to deduce Theorem 1.1 and Theorem 1.2, we used a special case of the following
fact which is the main result of Section 2.
Theorem 1.4. (See Theorem 2.9(ii)) Let M be a formally equidimensional module satisfying
the Serre-condition S 2 . Assume, additionally, that M has a canonical module ωM 3 . Set,
n := inf{i : i ≥ 1 and Hd−i
m (M) 6= 0}.
If the formal fibers of R satisfy the S n+2 -condition4 , then
¡
¢
¡
¢
(ω
)
AttR Hd−n
= n + 1 and htωM p ≥ n + 2}.
(M)
=
{
p
∈
Spec(R)
:
Depth
M
p
m
Rp
The section 2. of the paper is, also, devoted to reminding some definitions and wellknown facts as well as giving some remarks and lemmas which are required throughout the
paper.
By, e.g. [15], a Cohen-Macaulay local ring is Gorenstein if and only if Hdm (R) has finite
injective dimension. In [12], the authors introduce the notion of Gorenstein injective modules as a generalization of the concept of injective modules. Gorenstein injective modules
and, its related invariant, the Gorenstein injective dimension are studied by many authors.
For example, in [45, Theorem 2.6] the author shows that if R is a Cohen-Macaulay complete
local ring and Hdm (R) is Gorenstein injective then R is Gorenstein. Subsequently, in [46], the
authors relax the complete assumption and prove that even if Hdm (R) has finite Gorenstein
injective dimension, then the Cohen-Macaulay ring R is Gorenstein. On the other hand, for
the injective dimension case, there exists
counterpart. That is, R is a
¡ da quasi-Gorenstein
¢
quasi-Gorenstein ring if and only if IdR Hm (R) < ∞ ([1, Theorem 3]). This encouraged us
to investigate the Gorenstein injective version of the Aoyama’s theorem which is, indeed, a
theorem whenever R is Cohen-Macaulay. We proved the following fact which also recovers
the Cohen-Macaulay case of [46].
Theorem 1.5. (See Theorem 5.7) Assume that Hdm (R) has finite Gorenstein injective dimension.
If, furthermore,
DepthRb (ωRb )
Ext1Rb (ωRb , ωRb ) = . . . = Ext b
R
then R is quasi-Gorenstein.
2
(ωRb , ωRb ) = 0,
As far as we know, our paper is the first place where such a variant of deformation is studied. This is remarkable, because the ordinary deformation problem of quasi-Gorensteinness is mysterious.
3
See, Definition and Remark 2.2 for the definition of the canonical module of an R-module.
4
e.g., if R is a homomorphic image of a Gorenstein ring.
4
A S TUDY OF QUASI -G ORENSTEIN R INGS
The proof of Theorem 1.5 shows that the vanishing of Ext1R (ω, ωR ) and Ext2R (ωR , ωR ), in
the following sense, is sufficient for our purpose .
Question 1.6. (See Question 4.7) Assume that R has a canonical module ωR and that,
GdimR (ωR ) < ∞.
Then do we have, Ext1R (ωR , ωR ) = Ext2R (ωR , ωR ) = 0?
In fact an affirmative answer to the above question, which is proposed in Section 4, shows
that R is quasi-Gorenstein if and only if Hdm (R) has finite Gorenstein injective dimension.
In [4], the famous theorem of Bass gives a criterion for Gorensteinness in terms of the
irreducibility of all of the parameter ideals. Indeed, there exists a non-Gorenstein ring with
an irreducible parameter ideal. But, by virtue of [30], there is an invariant ℓd (R) of R such
that R is Gorenstein if and only if some parameter ideal contained in mℓd (R) is irreducible.
In Section 5, we prove the following quasi-Gorenstein version of [30] (see Section 5 for the
definition of the limit closure).
b is unmixed and the limit
Theorem 1.7. (See Theorem 5.7) R is quasi-Gorenstein if and only if R
closure of each parameter ideal (of some parameter ideal contained in mℓd (R) ) is irreducible.
It is worth pointing out that [30, Proposition 2.3.], [14], and [35, 3.2 Theorem] also show
that the limit closure of parameter ideals of non-Cohen-Macaulay rings can be considered as
a counterpart to the parameter ideals of Cohen-Macaulay rings. We would like to stress that
Theorem 1.7 may have the following computational application. According to Theorem 1.7
for verifying the quasi-Gorensteinness of a ring R, using
system, we can find a sys¡ Macaulay2
¢
lim
lim
tem of parameters x of R and then check whether, µ {x}lim
:
m
=
µ({x}
R
R ) + 1, wherein {x}R
denotes the limit closure of x. 5 . This can be, considerably, faster than computing the free
resolutions, especially when the defining ideal of R has too many generators or generators
with too many summands. It is noteworthy to mention, here, that, e.g., the limit closure of
any system of parameters x of a Buchsbaum local ring R is just the ideal, (x12 , . . . , xd2 ) : x1 · · · xd
(see, [17, Lemma (4.6).]).
2 Attached Prime ideals of Local Cohomology modules
Reminder 2.1. Here we aim to review some, probably known, definitions and facts.
(i) Throughout the paper, we use the notation Assht to denote the set,
AsshtR (M) := {p ∈ AssR (M) : dim(R/p) = d ′ }.
5
M is said to be equidimensional (respectively, unmixed) if Assht(M) = minAssR (M) (respectively, Assht(M) = AssR (M)). M is called formally equidimensional (respectively, forb 6 is an equidimensional (respectively, unmixed) R-module.
b
mally unmixed) if M
Here, the notation µ stands for the minimal number of generators. Recall that a primary ideal a of (R, m) is
irreducible if and only if µ(a : m) = µ(a) + 1.
6
b stands for the completion of M with respect to the m-adic topology.
Here the notation M
E HSAN TAVANFAR
AND
5
M ASSOUD T OUSI
(ii) For each ideal a of R we set,
¡
¢
htM a := htR/0:R M (a + 0 :R M)/0 :R M .
Note that, dimRp Mp = htM p, for each p ∈ SuppR (M). Thus,
htM a = inf{htM p : p ∈ Var(a)
\
SuppR M} = inf{dimRp Mp : p ∈ Var(a)
\
SuppR M}.
(iii) We say that M satisfies the Serre-condition S n precisely when,
DepthRp (Mp ) ≥ min{n, dimRp (Mp )},
for each p ∈ Spec(R). In fact, the following statements are equivalent.
(a) M satisfies S n .
(b) grade(a, M) ≥ min{n, htM a} for each ideal a of R.
(c) if a is an ideal generated by an M-regular sequence of length j ≤ n −1 then for each
p ∈ AssR (M/aM) we have htM (p) = j .
¡
¢
(iv) We use the notation, M∨ , to denote the Matlis dual HomR M, E(R/m) of an R-module
M. The canonical module for R, denoted by ωR , is a finitely generated R-module such
∼ d
that, ω∨
R = Hm (R). The module ωR , if exists, is an d -dimensional R-module satisfying
the Serre-condition S 2 and is unique up to isomorphism ([6, 12.1.6 Theorem], [6, 12.1.9
Proposition(i)] [6, 12.1.18 Theorem(i)]). So R is a quasi-Gorenstein ring if and only if
R has a canonical module which is a rank one free R-module. In particular a quasiGorenstein ring is S 2 and unmixed ([3, Lemma 1.1]). A fortiori, by [2, (1.8)] we have,
0 :R ωR =
\
q,
(1)
q
where the intersection runs over the primary components q of the zero ideal satisfying
dim(R/q) = d . This, again, implies the unmixedness of quasi-Gorenstein rings. If R is
a homomorphic image of a Gorenstein local ring S of dimension n then by virtue of
[6, 11.2.6 Local Duality Theorem ] we have, ωR := ExtSn−d (R, S).
(v) (See [39, Lemma 1.9.]) Assume that R is a homomorphic image of a Gorenstein local
ring S of dimension n. For each l ∈ Z set, ωlM := ExtSn−l (M, S). By [6, 11.2.6 Local Duality
Theorem] there are functorial isomorphisms
Hlm (N) ∼
= ExtSn−l (N, S)∨ ,
(2)
6
A S TUDY OF QUASI -G ORENSTEIN R INGS
M
for all finitely generated R-modules N. The R-module ωdim
is said to be the canoniM
cal module of M and is denoted by ωM . The R-module ωM satisfies S 2 and AssR (ωM ) =
AsshtR (M). In particular, dim(ωM ) = dim(M) (see [39, Lemma 1.9.(c)]).
dim(M)−dim(R/p)
Let p ∈ SuppR (ωM ). Then, by [39, Lemma 1.9(a)], (ωM )p ∼
= ωMp
. It follows,
dim(M)−dim(R/p)
from (2), that HpRp
(Mp ) 6= 0. Consequently, dim(R/p) + dim(Mp ) = dim(M).
In particular, we get (ωM )p = ωMp .
The argument of the preceding paragraph in conjunction with [39, Lemma 1.9(b)]
yields,
SuppR (ωM ) = {p ∈ SuppR (M) : dim(Mp ) + dim(R/p) = dim(M)}.
Similarly, as in part (iv) of the preceding reminder, the definition of the canonical module
of a finitely generated R-module can be extended to all local rings.
Definition and Remark 2.2. Let M be a finitely generated d ′ -dimensional R-module. Then
∼ d′
we say that a finitely generated R-module ωM is the canonical module for M if ω∨
M = Hm (M).
A similar argument as in the proof of [6, 12.1.6 Theorem] shows that the canonical module
N
∼
b
ωM of M, if exists, is unique up to isomorphism. Note that, ωM
b = ωM
R R. By Reminder 2.1(v),
b
M always has a canonical module. In Lemma 2.4 we prove some counterparts to the properties
of ωM stated in the part (v) of the preceding reminder. Note that, if R has a canonical module
ωR then, by [6, 6.1.10 # Exercise], for each d -dimensional R-module N we have HomR (N, ωR ) ∼
=
ωN .
Remark 2.3. Let M be a (finitely generated) d ′ -dimensional R-module. By virtue of the Cob = dim(S)
hen’s structure theorem there exists a Gorenstein ring S such that dim(R) = dim(R)
b
and R is a homomorphic image of S.
(a) Let x ∈ R\ZR (M). Then from the exact sequence,
x
0 → M → M → M/xM → 0,
x
′
′
∆
′
′
x
′
we get the exact sequence, Hdm −1 (M) → Hdm −1 (M) → Hdm −1 (M/xM) → Hdm (M) → Hdm (M), which
yields the exact sequence,
′
′
′
0 → Hdm −1 (M)/xHdm −1 (M) → Hdm −1 (M/xM) → 0 :Hd ′ (M) x → 0.
m
(3)
Applying the Matlis dual functor to the exact sequence (3) we obtain the exact sequence,
ι
0 → ωM
b M
b → C → 0,
b → ωM/x
b /xωM
¡ ′
¢∨
′
where, C = Hdm −1 (M)/xHdm −1 (M) . By [6, 11.2.6 Local Duality Theorem],
O
¢
¢
¡ ′
¡ d ′ −1
d−1 b ∨
b
b R,
b E(R/
b mR)
b
b
= HomRb HdmRb−1 (M)
R/x
C∼
= HmRb (M)/xH
b (M)
mR
b
R
¢ ´
∼
b ∨
b R,
b Hd −1 (M)
= HomRb R/x
b
mR
³
¡
∼
x.
= 0 :Extd −d ′ +1 (M,S)
b
S
′
(4)
E HSAN TAVANFAR
AND
7
M ASSOUD T OUSI
(b) Now assume, furthermore, that R is formally equidimensional. Set, M = R. Then
b p) = dim(R),
b for each p ∈ Spec(R).
b Set,
[31, page 250, Lemma 2] implies that, ht(p) + dim(R/
b
b
R = S/a. Let, p = P/a ∈ Spec(R) where P ∈ Spec(S). We have,
b − dim(R/
b p) = htb (p) = dim(R
b p ).
dim(S P ) = htS P = dim(S) − dim(S/P) = dim(R)
R
¡ dim(Rb p )−1
¢
b S)p ∼
b S)P ∼
b p, S P) ∼
b p ), E(R
b p /pR
b p ) . ConTherefore, Ext1S (R,
(R
= Ext1S (R,
= Ext1S P (R
= HomRb p H b
pRp
sequently,
³
¢´
¡
¢
¡ dim(Rb p )−1
∼
b
b
b
b
b
R
/x
R
,
Hom
(
R
),
E(
R
/
p
R
)
Cp ∼
0
:
x
Hom
H
1
=
p
p
bp
p
p
p
b
bp
R
Ext (R,S)
R
p=
b
pRp
S
¢
b
b p )−1
dim(R
∼
b p ), E(R
b p /pR
b p) .
b p )/xHdim(Rp )−1 (R
(R
= HomRb p H b
b
pRp
pRp
¡
We summarize the above observation as follows.
(c) If in addition R is presumed to be formally equidimensional then, setting M = R, the
b p )−1
b
dim(R
b p )/xHdim(Rp )−1 (R
b p ), for each
module C in the exact sequence (4) is locally dual to, H
(R
bp
pR
b
p ∈ Spec(R).
bp
pR
In the following lemma we show that some of the properties of the canonical module,
which are well-known in the case where R is a homomorphic image of a Gorenstein ring,
hold in general.
Lemma 2.4. Let M has a canonical module. The following statements hold.
(i) AssR (ωM ) = AsshtR (M). In particular, dim(ωM ) = dim(M) and SuppR (ωM ) ⊆ SuppR (M).
(ii) SuppR (ωM ) = {p ∈ SuppR (M) : htM p + dim(R/p) = d ′ }.
(iii) For each ideal a of R we have htωM a ≥ htM a. But, htωM p = htM p for each p ∈ Supp(ωM ).
(iv) ωM satisfies the Serre condition S 2 .
N
T
b for
Proof. (i) By, [31, Theorem 23.2], we can deduce that AssR N = {q R; q ∈ AssRb (N R R)}
each finitely generated R-module N. Thus, [39, Lemma 1.9.(c)] implies that,
AssR (ωM ) = {q
= {q
= {q
\
\
\
R : q ∈ AssRb (ωM
O
R
R : q ∈ AssRb (ωM
b )}
b
R : q ∈ Asshtb (M}.
b
R)}
R
T
b = AsshtR (M). Let, p ∈ AsshtR (M).
Thus it is enough to prove that, {q R : q ∈ AsshtRb (M)}
b
b
b
b pR).
b So we have dim(M)
b =
There exists q ∈ Spec(R) such that pR ⊆ q and dim(R/q) = dim(R/
b pR)
b = dim(R/
b q). Since, q ∈ min(pR),
b so [31, Theorem 9.5.] imdim(M) = dim(R/p) = dim(R/
T
b as required.
b
plies that q R = p. Thus, q ∈ SuppRb (M). Consequently q ∈ AsshtRb (M),
T
b
b and p = q R. We have p ∈ AssR (M) because q ∈ Ass b (M).
Conversely, let q ∈ AsshtRb (M)
R
b = dimR (M).
b pR)
b ≥ dim(R/
b q) = dimb (M)
Also, dimR (M) ≥ dim(R/p) = dim(R/
R
8
A S TUDY OF QUASI -G ORENSTEIN R INGS
(ii) Let N be a finitely generated R-module and p ∈ SuppR (N). Then we can choose q ∈
T
b such that dim(R/
b q) = dim(R/
b pR)
b = dim(R/p). Therefore, q R = p and so R
b q is a
min(pR)
N
N
N
∼
b
b
b
faithfully flat extension of Rp . Since, (N R R) = Np Rp Rq so we have q ∈ SuppRb (N R R).
Due to the formula [7, Theorem A.11] we have,
O
¢
¡ O
b q = dim(Np
b q ) = dim(Np ) + dim(R
b q /pR
b q ) = dim(Np ).
R)
R
dim (N
R
Rp
Now, our claim follows from the above observation in conjunction with the fact that ωM
b =
N
b
ωM R R.
(iii) Assume that R is complete. Then using Reminder
2.1(v)
we have (ωM )p ∼
= ωMp for
¡
¢
each p ∈ SuppR (ωM ). It turns out that, htωM p = dimRp (ωM )p = dimRp (Mp ) = htM p, for each
p ∈ SuppR (ωM ). It follows that,
\
htωM a = inf{htωM p : p ∈ Var(a) SuppR (ωM )}
\
= inf{htM p : p ∈ Var(a) SuppR (ωM )}
\
≥ inf{htM p : p ∈ Var(a) SuppR (M)}
= htM a.
But,
¡
¡
¢
¢
b + 0 :b ω b )/0 :b ω b = htω aR.
b
htωM a = htR/0:R ωM (a + 0 :R ωM )/0 :R ωM = htR/0:
b b ω b (aR
b
R M
R M
M
R
M
b Hence the statement follows from the preceding inequalBy the same token, htM a = htM
b aR.
ity. Clearly, since SuppR (ωM ) ⊆ SuppR (M), so in fact the inequality, htωM p ≥ htM p, is an equality for each p ∈ SuppR (ωM ).
N
∼
b
(iv) The statement follows from the fact that ωM
b = ωM
R R satisfies S 2 .
The second part of the following lemma, which is a special case of the first part, will be
used several times throughout the remainder of the paper. It is worth pointing out that one
implication of the second part of the following lemma can be deduced by [3, Lemma 2.1], in
the case where d ′ = d .
Lemma 2.5. The following statements hold.
(i) Let p ∈ SuppR (M) such that htM p ≥ 3. Suppose, furthermore, that p * ZR (M). If p ∈
¡ ′
¢
¡
¢
b ω b = 2.
Att Hdm −1 (M) , then grade pR,
M
¡ ′
¢
(ii) (c.f. Remark 2.7) Suppose that DepthR (M) ≥ 1 and dim(M) ≥ 3. Then, m ∈ Att Hdm −1 (M)
if and only if DepthRb (ωM
b ) = 2.
Proof. We first deal with the case where R¡is complete.
¢ Let x ∈ p\ZR (M). Then, by Reminder
d ′ −1
2.1(v), x ∈ p\ZR (ωM ). The fact that p ∈ AttR Hm (M) in conjunction with [6, 7.2.5. Exercise]
¡ ′
¢
′
implies that, p = 0 :R Hdm −1 (M)/A for some submodule A of Hdm −1 (M). Hence we get an exact
sequence,
′
′
′
Hdm −1 (M)/xHdm −1 (M) → Hdm −1 (M)/A → 0,
E HSAN TAVANFAR
AND
9
M ASSOUD T OUSI
¡ ′
¢
′
because x belongs to p. Thus, p/xR ∈ AttR/xR Hdm −1 (M)/xHdm −1 (M)
by virtue
³¡ . ′Consequently,
¢∨ ´
d −1
d ′ −1
of [6, 10.2.20 Corollary], we can conclude that, p/xR ∈ AssR/xR Hm (M)/xHm (M) . It
turns out that,
³
¡ ′
¢∨ ´
′
HomR/xR R/p, Hdm −1 (M)/xHdm −1 (M)
6= 0.
(5)
We have, dimRp /xRp (Mp /xMp ) = dimRp (Mp ) − 1 ≥ 2. Therefore Lemma 2.4(iii) yields,
htωM/xM (p/xR) ≥ htM/xM (p/xR) ≥ 2.
In particular, since ωM/xM is S 2 as R/xR-module so using Reminder 2.1(iii) we get,
It turns out that,
¢
¡
gradeR/xR p/xR, ωM/xM ≥ min{2, htωM/xM (p/xR)} ≥ 2.
HomR/xR (R/p, ωM/xM ) = Ext1R/xR (R/p, ωM/xM ) = 0
(6)
Now, using (5) and (6), in light of the exact sequence (4) of Remark 2.3, we can deduce that,
Ext1R/xR (R/p, ωM /xωM ) 6= 0.
Consequently, gradeR/xR (p/xR, ωM /xωM ) ≤ 1, i.e. gradeR (p, ωM ) ≤ 2. On the other hand,
htωM p ≥ htM p ≥ 3 which implies that, gradeR (p, ωM ) ≥ min{2, htωM p} ≥ 2. So the statement
holds in this case.
¢
¡ ′
b with
In the general case, in light of [6, 11.2.10 Exercise], there exists q ∈ AttRb Hd b−1 (M)
mR
N
N
T
b and 3 ≤ htM p ≤ ht b q. Then the above
b q * Z b (M R R)
p = q R. We have, q ∈ SuppRb (M R R),
M
R
b ω b ) ≤ 2. This completes the
argument shows that gradeRb (q, ωM
b ) = 2 and thence gradeR
b (pR,
M
b ≥ ht b (pR)
b = htM (p) ≥ 3 and ω b
proof because by Lemma 2.4(iii) and (iv) we have, htω (pR)
b
M
M
M
is S 2 .
(ii) We may and we do assume that R is complete. One implication follows from the
preceding part. Note that,
³¡ ′
¢∨ ´
d −1
d ′ −1
m/xR ∈ AssR/xR Hm (M)/xHm (M) ,
³
¡ ′
¢∨ ´
′
6= 0. Hence we can conclude the reif and only if, HomR/xR R/m, Hdm −1 (M)/xHdm −1 (M)
verse implication, also, by tracing back the proof of part (i).
Remark 2.6. It is, perhaps, worth pointing out that the reverse of the first part of the preceding lemma does not hold in general. For example, assume that R is a quasi-Gorenstein
Buchsbaum non-Cohen-Macaulay ring of dimension 4 and depth 2 (see [23, Lemma 2.2.]
or the Segre product ring given in the introduction). Let p ∈ Spec(R) with ht(p) = 3. R is
S 2 and htR (p) ≥ 3, hence by Reminder 2.1(iii)¡we have¢2 ≤ gradeR (p, R) ≤ Depth(R) = 2. So,
d−1
b R)
b = grade (p, R) = 2. But p ∉ AttR Hd−1
gradeRb (pR,
m (R) , because Hm (R) has finite length.
R
Also, it seems that we can not deduce Lemma 2.5(i) from Lemma 2.5(ii) by localization, because we shall need the further assumption, htM p + dim(R/p) = dim(M), which is not assumed.
10
A S TUDY OF QUASI -G ORENSTEIN R INGS
Remark 2.7. This remark is due to Raheleh Jafari. In fact, what follows inspired us to prove
L
Mp . Define the map
the preceding lemma, as a slight generalization. Set, M0 :=
p∈SuppR (M),
htM p=0
0
∂−1
M : M → M such that its projection onto Mp is the natural localization map for each p ∈
Supp(M) with htM p = 0. Assume,
inductively,
that Mi and ∂iM−1 : Mi −1 → Mi are constructed.
¡
¢
L
Coker(∂iM−1 ) p , and ∂iM : Mi → Mi +1 to be the following map. For
Then set, Mi +1 :=
p∈SuppR (M),
htM p=i +1
¡
¢
m ∈ Mi and p ∈ SuppR (M) with htM (p) = i + 1, the component of ∂iM (m) in Coker(∂iM−1 ) p is
m/1, where, − : Mi → Coker(∂iM−1 ) is the natural map. Then, we get the complex,
∂−1
M
∂0M
∂iM−2
∂iM−1
∂iM+1
C (M) := 0 → M → M0 → M1 . . . → Mi −1 → Mi → . . . ,
which is called the Cousin complex of M with respect to the hight filtration. The Cousin
complex is introduced and investigated firstly in [40] as the Commutative Algebraic analogue
of the Cousin complex introduced by A. Grothendieck and R. Hartshorne [20, Chapter IV].
i
Denote by H M
the i -th cohomology of the Cousin complex C (M).
Now assume, additionally, that M is S 2 and formally equidimensional and the formal
d ′ −2
fibers of R are Cohen-Macaulay. Then by virtue of [10, Theorem 2.4] we have H M
6= 0 if and
2
only if H b (ωM
b ) 6= 0. Moreover in spite of [11, Lemma 2.2.(iii)] and [10, Theorem 2.1.] we have
m
¡ R d ′ −1
¢
d ′ −2
m ∈ AttR HR (M) if and only if H M
6= 0. This, again, proves Lemma 2.5(ii) in the case
where M is S 2 and formally equidimensional and formal fibers of R are Cohen-Macaulay.
The following lemma is used in the proof of the second part of Theorem 2.9.
Lemma 2.8. Assume that M is not Cohen-Macaulay and that M has a canonical module ωM .
Put,
s := max{i : i < d ′ and Him (M) 6= 0}.
¡ s
¢
If DepthRb Hm
(M)∨ = 0, then,
(
d ′,
s =0
.
Depth(ωM ) =
′
d − s + 1, s > 0
Proof. It suffices to prove the claim in the complete case, so we assume that R is complete.
Set, R′ := R/0 :R M. Recall that since, 0 :R M ⊆ 0 :R ωM , so both of M and ωM are R′ -modules.
Furthermore, ωM is also
module of M over R′ . In addition, the numbers s,
¡ sthe canonical
¢
∨
Depth(ωM ) and Depth Hm (M) are independent of taking the base ring to be either R or R′ .
Thus, without loss of generality, we can presume additionally that dim(R) = dim(M) and that
R also has a canonical module (since R is assumed to be complete). So the statement follows
from [3, Lemma 2.1].
In the following theorem we give an explicit description of the attached prime ideals of
some of local cohomology modules, namely the first non-zero local cohomology supported
at m starting from the point dim(M) − 1. We also, as an application, reprove [39, Theorem
1.15] (In the case where R is not necessarily homomorphic image of a Gorenstein ring and
E HSAN TAVANFAR
AND
11
M ASSOUD T OUSI
our proof is quite different). Clearly we may replace ωR with R in the following theorem
provided R is quasi-Gorenstein. Furthermore, the first part of the next theorem shall be used
in the proof of the Corollary 3.4(i).
Theorem 2.9. Assume that M is formally equidimensional and S 2 and that M has a canonical
module ωM . Then the following statements hold.
(i) Suppose that the formal fibers of R are S 3 7 . Then we have,
¡
¡ ′
¢
¢
AttR Hdm −1 (M) = {p ∈ Spec(R) : DepthRp (ωM )p = 2, and, htωM p ≥ 3}.
(ii) Assume that, n ≥ 2 and that formal fibers of R satisfy the S n+1 condition. Then, ωM
satisfies the S n -condition, if and only if, Him (M) = 0, for each d ′ − n + 2 ≤ i ≤ d ′ − 1. In
this case,
¡
¢
¡ ′
¢
Att Hdm −n+1 (M) = {p ∈ Spec(R) : DepthRp (ωM )p = n and , htωM p ≥ n + 1}.
b is S 2 too.
Proof. Note that, Since M and formal fibers of R satisfies the S 2 -condition, so M
b is also S 1 so, minb (M)
b = Ass b (M).
b Consequently, in view of the our hypothesis, M
b
Since M
R
R
b Then there exists p ∈ Asshtb (M)
b such that p ⊆ q. By Lemma
is unmixed. Let q ∈ SuppRb (M).
R
2.4(i), we have p ∈ AssRb (ωM
b ). Hence, q ∈ SuppR
b (ωM
b ). So the identity,
b q) = d ′ ,
htM
b q + dim(R/
(7)
holds due to Lemma 2.4(ii).
(i) If d ′ ≤ 2 then M is a Cohen-Macaulay R-module and the statement
follows
from Lemma
¡
¢
2.4(iv). So we suppose that d ′ ≥ 3. Let p ∈ Spec(R) such that Depth (ωM )p = 2 and htωM p ≥
3. Then p ∈ SuppR (ωM ) and in view of Lemma 2.4(iii), we have htM p = htωM p ≥ 3. Let,
T
b Then, q R = p. Using [7, Proposition 1.2.16.(a)] and the fact that R
b q is a
q ∈ minRb (pR).
b q ), DepthR (Mp ) =
faithfully flat extension of Rp we can deduce that dimRp (Mp ) = dimRb q (M
p
¡
¢
¡
¢
b
DepthRb q (Mq ) and DepthRb q (ωM
b )q = DepthRp (ωM )p . On the other hand, in light of Reminder 2.1(v) we get, (ω b )q ∼
= ω b and thence by Lemma 2.5(ii),
M
Mq
¡
¢
b q )−1
dim(M
b q) .
(
M
bq
qR
b q ∈ Attb H
qR
Rq
¡ ht p−1
¢
Thus [6, 11.2.10 Exercise (iii)] yields pRp ∈ AttRp HpRMp (Mp ) . So the statement follows from
Lemma 2.4(ii) and [6, 11.2.11 Exercise]. ¡
¢
′
Now, conversely, assume that p ∈ AttR Hdm −1 (M) . By [6, 11.2.10 Exercise (iii)] there ex¢
¡ d ′ −1
b such that q lies over p and q ∈ Attb H
b . Hence, the identity (7) in conjuncists q ∈ R
(
M)
R
b
mR
¡
¢
b
b q ∈ Attb Hdim(Mq )−1 (M
b q ) . This, and equality
tion with [6, 11.2.8 Exercise(i)] implies that qR
R
b
qR q
7
Note that all formal fibers of a homomorphic image of a Cohen-Macaulay ring are Cohen-Macaulay
12
A S TUDY OF QUASI -G ORENSTEIN R INGS
b q ∉ Ass b (M
b q ), because M
b is unmixed. Next, since M
b is S 2 and M
b q is not Cohen7, yields qR
Rq
b q ) ≥ 3. Therefore we can invoke Lemma 2.5(ii) to deMacaulay, so we deduce that dimRb q (M
¢
¡
b
b
duce that Depth (ωM
b )q = 2. Hence, Depth(Rq /pRq ) ≤ 2, by [7, Proposition 1.2.16] (Note that,
N
∼
∼
b
b q /pR
b q is S 3 we can deduce that,
(ωM )p Rp Rq = (ωM
b )q = ωM
b q ). But then using the fact that R
b q /pR
b q is Cohen-Macaulay. So, it follows that htM p ≥ 3, otherwise Mp and thence
the fiber R
b
Mq is Cohen-Macaulay which is a contradiction. But then we get,
¡
¢
¡
¢
2 ≤ min{2, htωM p} ≤ DepthRp (ωM )p ≤ DepthRb q (ωM
b )q = 2.
(ii) We, firstly, argue by induction on d ′ . ωM is S 2 (see Lemma 2.4(iv)). If d ′ ≤ 2, then both
of M and ωM are Cohen-Macaulay and there is nothing to prove. So we assume that d ′ ≥ 3.
If n = 2, then the statement follows from the preceding part. Suppose that n > 2 and the
statement has been proved for smaller values of n.
Presume that ωM is S n . Since ωM satisfies the Serre-condition S n−1 also, so our inductive
hypothesis implies that Him (M) = 0 for each d ′ − n + 3 ≤ i ≤ d ′ − 1 and that,
¢
¡
¡ ′
¢
Att Hdm −n+2 (M) = {p ∈ Spec(R) : DepthRp (ωM )p = n − 1 and , htωM p ≥ n}.
But ωM satisfies S n -condition, so the set on the right hand side of the above identity is
d ′ −n+2
the¡ empty set. ¢Consequently, we get Hm
(M) = 0, as claimed. It remains to describe,
′
Att Hdm −n+1 (M) . In the case where d ′ ≤ n we have ωM is Cohen-Macaulay and d ′ − n + 1 ≤
1. Since, M is S 2 and d ′ ≥ 3, DepthR (M) ≥ 2 and consequently¡ H0m (M) = H¢1m (M) = 0. So
′
we may assume that d ′
n, in particular d ′
3. Let, p ∈ Att Hdm −n+1 (M) . We, firstly,
¢
¡ d ′ −n+1
b such that q lies over p
deal with the case that p 6= m. There exists q ∈ AttRb H b
(M)
mR
(see [6, 11.2.10 Exercise(iii)]). Then [6, 11.2.8. Exercise(i)] together with the identity (7)
b q )−n+1
¡ dimb (M
¢
b q ∈ Att b H Rq
b q ) . So, our inductive assumption on dimenimplies that qR
(M
qR q
b
¡ qR q ¢
¡
¢
b q ) ≥ n + 1. Therefore,
sion implies that DepthRb q (ωM
b )q = n and dimR
b q (ωM
b )q = dimR
b q (M
¡
¢
b q /pR
b q ) ≤ n and whence the fiber R
b q /pR
b q is Cohen-Macaulay. If dimRp (ωM )p ≤ n,
Depth(R
then (ωM )p is Cohen-Macaulay (Recall that ωM is assumed
to¢ be S n ) and hence (ωM
b )q is
¡
Cohen-Macaulay which is a contradiction. Hence dimRp (ωM )p ≥ n + 1. So,
¡
¡
¢
¢
¡
¢
n ≤ min{n, dimRp (ωM )p } ≤ DepthRp (ωM )p ≤ DepthRb q (ωM
b )q = n.
Thus our statement holds in this case where p 6= m. Suppose that p = m. Since dim(ωM ) =
dim(M) ≥ n + 1 so it is enough to show that DepthR (ωM ) = n. Let x be an M-regular el′
∼
ement. Since, Hdm −1 (M) = 0, so the exact sequence (4) in Remark 2.3 yields, ωM
b =
b /xωM
¡
¢
¢
¡
′
i
b .
b = 0 for each d ′ − n + 2 ≤ i ≤ d ′ − 1 and mR
b ∈ Attb Hd −n+1 (M)
ωM/x
b M
b . We have, H b M
R
b
mR
mR
b →M
b → M/x
b M
b → 0 a standard argument shows that,
So using
the
exact
sequence,
0
→
M
¢
¡
¢
¡
b M)
b . Conb M
b = 0 for each d ′ − n + 2 ≤ i ≤ d ′ − 2 and that mR
b ∈ Attb Hd ′ −n+1 (M/x
Hi M/x
R
b
mR
b
mR
sequently, by Lemma 2.8 we get DepthRb (ωM/x
b ) = n − 1, i.e.
b /xωM
b (ωM
b M
b ) = n − 1, i.e. DepthR
)
=
n.
DepthR (ωM ) = DepthRb (ωM
b
¡
¢
For the reverse inclusion, let p ∈ Spec(R) with DepthRp (ωM )p = n and htωM p ≥ n + 1. Let
¡
¢
b So by [7, Proposition 1.2.16] and [7, Theorem A.11] we have, Depthb (ω b )q =
q ∈ minb (pR).
R
Rq
M
E HSAN TAVANFAR
AND
13
M ASSOUD T OUSI
element in p. By, Lemma 2.4(i), x is an ωM -regular
n and htωMb q ≥ n +1. Let ¡x be an M-regular
¢
∼ b /xω b ).
element. Thus, DepthRb q (ωM/x
)
q ≥ n (Recall that ωM/x
=
n
−
1
and htωM/x
b M
b q
b M
b = ωM
b M
b
M
Now, since ωM/x
b M
b satisfies the S n−1 -condition, so in view of our inductive hypothesis we get
¢
¡ ′
b = 0, so we may deduce that q ∈
b M)
b . Consequently, since Hd ′ −n+2 (M)
q ∈ AttRb Hd b−n+1 (M/x
m
R
¢
¡ d ′ −n+1
¡ d ′ −n+1 m¢Rb
b which yields p ∈ AttR Hm
Attb H
(M)
(M) due to [31, Theorem 9.5.] and [6, 11.2.10
R
b
mR
Exercise(iii)].
Now, conversely, assume that, Him (M) = 0, for each d ′ −n +2 ≤ i ≤ d ′ −1. Then, the inductive assumption shows that,
¡ ′
¢
¡
¢
Att Hdm −(n−1)+1 (M) = {p ∈ Spec(R) : DepthRp (ωM )p = n − 1 and , htωM p ≥ n} = ;,
and that ωM satisfies
p ∈ Spec(R) such
¡
¢S n−1 . Suppose by way of contradiction that¡there exists
¢
that DepthRp (ωM )p
min{n, htωM p}. Also, we have, DepthRp (ωM )p ≥ min{n − 1, htωM p}.
¡
¢
¡ ′
¢
These facts yield htωM p ≥ n and DepthRp (ωM )p = n − 1. But then p ∈ Att Hdm −(n−1)+1 (M)
which is a contradiction.
3 Quasi-Gorenstein rings and regular elements
S
¡
If x ∈ R\Z(R) then [24, Lemma 5.1] states that ωR/xωR ∼
= ωR/xR if and only if x ∉
¢ p.
p∈AttR Hdm−1 (R)
But, as the proof8 of the Lemma shows us, we strongly believe that the author means the following observation:
The map, ι, of the exact sequence (4) in Remark 2.3 is an isomorphism if and only if x ∉
S
¡
¢ p. In fact the proof does not deal with the following question:
p∈AttR Hdm−1 (R)
Whether the map, ι, of the exact sequence (4) in Remark 2.3 is an isomorphism whenever
ωR /xωR ∼
= ωR/xR ?
At least in the case where ωR = R, as the following lemma shows us, the above question
has a positive answer.
Proposition 3.1. Suppose that R is a quasi-Gorenstein ring. Assume that x ∈ m is a regular
S
element of R. Then R/xR is a quasi-Gorenstein ring if and only if x ∉
¡
¢ p.
p∈AttR Hdm−1 (R)
Proof. Set M = R in the exact sequence (4) in Remark 2.3. Suppose that, x ∉
¡
S
¢ p.
p∈At t Hdm−1 (R)
Then C = 0 in the exact sequence (4). Thus, ι, is an isomorphism and whence ωR/xR ∼
=
ωR /xωR ∼
= R/xR.
Now, conversely, assume that R/xR is quasi-Gorenstein. It is harmless to assume that
S
R is complete. Namely the assertion, x ∉
¡
¢ q, is equivalent to the assertion that
b
q∈AttRb Hd −1
(R)
b
mR
d−1 b
b
(R) = 0. But according to [6, Flat Base Change Theorem 4.3.2] and faithfully
(R)/xH
Hd−1
b
b
mR
8
mR
The proof is given in the paragraph before the statement of the lemma.
14
A S TUDY OF QUASI -G ORENSTEIN R INGS
d−1
b the latter statement holds if and only if Hd−1
flatness of R
m (R)/xHm (R) = 0, that is to say,
S
x∉
¡
¢ q. On the other hand it is a well-known fact that a commutative local ring is
q∈Att Hdm−1 (R)
quasi-Gorenstein if and only if its completion is so.
¡
¢
d−1
∼
Suppose by way of contradiction that x ∈ p for some p ∈ Att Hd−1
m (R) . Since Hm (R/xR) =
ER/xR (R/m) ∼
= 0 :Hdm (R) x, the exact sequence (3) in Remark 2.3 gives us an exact sequence,
f
d−1
0 → Hd−1
m (R)/xHm (R) → ER/xR (R/m) → ER/xR (R/m) → 0.
b Dualizing
Using [6, 10.2.11 Theorem] we can deduce that f = sidR/xR E(R/m) for some s ∈ R.
we obtain the exact sequence,
¡
¢∨
sidR/xR
d−1
0 → R/xR −→ R/xR → Hd−1
(R)/xH
(R)
→ 0.
m
m
(8)
¡ d−1 ¢
Since p ∈ Att
so a similar
argument as in the proof of Lemma 2.5(i) shows that
R
¡ Hm (R) , d−1
¢
p/xR ∈ AttR/xR Hd−1
(R)/xH
(R)
.
Consequently,
the exact
m
m
¡
¢ sequence (8) together with [6,
10.2.20 Corollary] implies that p/xR ∈ AssR/xR R/(sR + xR) . Since R/xR is quasi-Gorenstein
so by Reminder 2.1(iv), R/xR satisfies the Serre
condition
¡
¢ S 2 . Consequently,
¡
¢ in view of Reminder 2.1(iii), the fact that, p/xR ∈ AssR/xR R/(sR+xR) yields htR/xR p/xR = 1, i.e. htR (p) =
2. Thus, dim(R/p) = d − 2, by virtue of Reminder 2.1(iv) and [31, page 250, Lemma 2]. Hence
¡ dim(R/p)+1 ¢
¡
¢
we have, p ∈ Att Hm
(R) . Consequently [6, 11.2.8 Exercise] yields pRp ∈ Att H1pRp (Rp ) .
On the other hand, R is S 2 and htR (p) = 2, thence Rp is Cohen-Macaulay and H1pRp (Rp ) = 0.
¡
¢
This contradicts with pRp ∈ Att H1pRp (Rp ) .
The following lemma shall be used in the proof of the corollary 3.4(ii).
Lemma 3.2. Assume that S is an R-algebra which is finitely generated as R-module (S is, indeed, semi-local but not necessarily local). Then,
¡
¢
HomR S, E(R/m) ∼
=
M
E(S/n).
n∈Max(S)
Proof. Recall that S is a semi-local ring (see e.g., [31, page 69, 9.3.] and [31, page ¡66, Lemma
¢
2]). Taking into account an epimorphism, Rn → S we get a monomorphism HomR S, E(R/m) →
n
¡
¢
L
E(R/m). It follows that HomR S, E(R/m) is an Artinian R-module and so it is an Artinian
i =1
¡
¢
¡
¢
S-module. But HomR S, E(R/m) is also an injective S-module. Therefore HomR S, E(R/m) ∼
=
L
µ(n)
E(S/n)
(see [7, Theorem 3.2.8]). We aim to prove that µ(n) = 1 for each n ∈ Max(S).
n∈Max(S)
Let, n ∈ Max(S). Since S/n is a finite extension of R/m so there exists u ∈ N such that S/n ∼
=
E HSAN TAVANFAR
u
L
i =1
AND
15
M ASSOUD T OUSI
R/m. We have,
µ(
n)u
M
i =1
R/m ∼
=
µ(
n)
M
i =1
¡
¢
S/n ∼
= HomS S/n, HomR (S, E(R/m)
¡
¢
∼
= HomR S/n, E(R/m)
u
¡M
¢
∼
R/m, E(R/m)
= HomR
i =1
∼
=
u
M
R/m.
i =1
It turns out that µ(n) = 1 as required.
The subsequent lemma is required for the next corollary.
Lemma 3.3. Let S be an R-algebra which is finitely generated as R-module. The following
statements hold.
N
N
(i) Assume that, the natural map ϕ : Hdm (R) → Hdm (R) R S, given by α 7→ α 1 is an Risomorphism. Then given an S-module N and a map f : HdmS (S) → HdmS (N) we have f is
an R-homomorphism if and only if it is an S-homomorphism.
(ii) Suppose that R has a canonical module ωR . For each d -dimensional finitely generated
S-module N the well-known R-isomorphism,
¡
¢
d
HomR HomR (N, ωR ), E(R/m) ∼
= HmS (N),
is an S-isomorphism too.
Proof. (i) For each finite S-module N by representing Hdm (R), (respectively HdmS (N)) as the
last cohomology of the Čech complex C• (x, R) (respectively, C• (xS, N)) for some system of
parameters x for R, it is easily seen that the natural R-isomorphism,
O
N → HdmS (N),
ψN : Hdm (R)
R
N
N
which takes an element, [r /xα ] R n ∈ Hdm (R) R N, to, [r n/xα ], is an S-isomorphism too. According to our hypothesis, we have the R-isomorphism, ψS ◦ ϕ : Hdm (R) → HdmS (S). Therefore,
³
O
¡
¢ Hom(ψS ,id)
¢
¡
¡
¢´
∼
HomS HdmS (S), HdmS (N)
HomS Hdm (R)
S, HdmS (N) ∼
=
= HomR Hdm (R), HomS S, HdmS (N)
R
−1
−1
¡
¢ Hom(ϕ ◦ψS
∼
∼
= HomR Hdm (R), HdmS (N)
=
,id)
¡
¢
HomR HdmS (S), HdmS (N) .
Let us to denote the composition
above
¢ isomorphisms with λ. It is easily seen that
¡ d of the
d
λ( f ) = f for each f ∈ HomS HmS (S), HmS (N) . This fact together with the surjectivity of λ
proves the claim.
16
A S TUDY OF QUASI -G ORENSTEIN R INGS
(ii) Let N be a finitely generated S-module. As we have seen just in the previous part there
N
exists a natural S-isomorphism, ψN : Hdm (R) R N → HdmS (N). Hence we have the following
chain of S-isomorphisms,
O
¡
¢
¡
¢O
HomR HomR (N, ωR ), E(R/m) ∼
N∼
N∼
= HdmS (N).
= HomR ωR , E(R/m)
= Hdm (R)
R
R
(The reader could easily verify that the first isomorphism is an S-isomorphisms too)
Corollary 3.4. Assume that R is a quasi-Gorenstein ring and x ∈ m is a regular element. Then
the following statements hold.
(i) A necessary and sufficient condition for R/xR to be quasi-Gorenstein is that R/xR satisfies the S 2 condition.
(ii) If R/xR has a canonical module then the S 2 -ification of R/xR is quasi-Gorenstein (up to
localization).
b is quasi-Gorenstein and hence S 2 . Hence the
Proof. (i) Since, R is quasi-Gorenstein so R
formal fibers of R are S 2 . Therefore the formal fibers of R/xR are S 2 too. It turns out that
b R
b is S 2 . Therefore, the statement follows from Theorem
R/xR satisfies S 2 precisely when R/x
3.5.
(ii) Let us denote the S 2 -ification HomR/xR (ωR/xR , ωR/xR ) of R/xR by S. Recall that, S is
∼ L E(S/n).
semi-local. Let mS be the Jacobson radical of S. We aim to prove that, Hd−1
mS (S) =
n∈Max(S)
Then the statement follows after localization. In order to accomplish this, we show that
∼ d−1
Hd−1
mS (S) = HmS (ωR/xR ) as S-modules. On the other hand using Lemma 3.2 we get R/xRisomorphisms,
¡
¢
¡
¢
L
E(S/n) ∼
= HomR/xR S, ER/xR (R/m) = HomR/xR HomR/xR (ωR/xR , ωR/xR ), ER/xR (R/m) ∼
=
n∈Max(S)
Hd−1
mS (ωR/xR ),
∼L
which is an S-isomorphism too by Lemma 3.3(ii). So, Hd−1
mS (S) = n∈Max(S) E(S/n), as was
to be proved.
Let us to denote the natural ring homomorphism R/xR → S, defined by the rule y 7→
yidωR/xR , with g . Let x be a system of parameters for R/xR whose image in S, also denoted
by x, is a system of parameters for S. In the following we will prove that not only Hd−1
m (g ) is
d−1
d−1
∼
an isomorphism (see (10)) but also Hm (R/xR) = Hm (ωR /xωR ) (see (11)). It turns out that
N
∼ d−1
Hd−1
(R/xR) R S →
the isomorphism, ΨS : Hd−1
m (S) = Hm (ωR/xR ) as R/xR-module. Consider N
m
N
n
d−1
n
Hd−1
m (S), which maps an element, [a/(x 1 . . . x d−1 ) ] R s ∈ Hm (R/xR) R S to [as/(x 1 . . . x d−1 ) ].
If we take into account the map ϕ of preceding lemma, then an easy verification shows that
d−1
∼ d−1
Hd−1
m (g ) = ψS ◦ ϕ. This implies that ϕ is bijective. Hence Hm (S) = Hm (ωR/xR ) as S-module
by virtue of Lemma 3.3(i). This gives us our desired isomorphism,
∼ d−1
Hd−1
mS (S) = HmS (ωR/xR )
of the preceding paragraph and completes our proof.
E HSAN TAVANFAR
AND
17
M ASSOUD T OUSI
Since R is quasi-Gorenstein so Lemma 2.4(ii) implies that ht(p) + dim(R/p) = dim(R) for
each p ∈ Spec(R). Furthermore R satisfies S 2 . Thus Reminder 2.1(iii) yields ht(p) = 1 for each
p ∈ Ass(R/xR). It follows that dim(R/p) = d − 1 for each p ∈ Ass(R/xR), i.e. R/xR is unmixed.
Therefore the identity (1) of Reminder 2.1(iv) shows that, 0 :R/xR ωR/xR = 0. Thus S is a finitely
generated integral extension of R/xR by the natural map g . Since R is quasi-Gorenstein, so
by virtue of Remark 2.3(c) and Reminder 2.1(iv), the exact sequence (4) of Reminder 2.3 gives
f
b R
b → ω b b → C → 0, where,
us an exact sequence, F := 0 → R/x
R/x R
¡ ht(p)−1
¢
b p )/xHht(p)−1 (R
b p ), E b (R
b
b
Cp ∼
(R
= HomRb p H b
Rp p /pRp )
b
pRp
(9)
pRp
g
b On the other hand we have the exact sequence, G := 0 → R/xR → S →
for each p ∈ Spec(R).
′
b yields the exact sequence,
C → 0. Tensoring G with R
gb
b R
b → Hom b (ω b b , ω b b ) → C′
Gb : 0 → R/x
R
R/x R
R/x R
O
R
b → 0.
R
b R
b is unmixed and thence (ω b b )q ∼
A similar argument as above shows that R/x
b R)
b q for
R/x R = ω(R/x
b
b
each q ∈ Spec(R/x R) (see Reminder 2.1(v)). In light of Proposition 3.1 and (9)in conjuncb ∉ Suppb b (C) if and only if
tion with the first part of the corollary we can deduce that p/x R
R/x R
b p /x R
b p satisfies the S 2 condition. On the other hand by [3, Proposition 1.2] we have gb b is
R
p/x R
b p /x R
b p satisfies S 2 . It turns out that,
an isomorphism if and only if R
′
dimR/x
b (C
b (C) = dimR/x
b R
b R
O
R
b = dimR/xR (C′ ).
R)
Since R/xR is S 1 , so R/xR is locally Cohen-Macaulay at each prime ideal of height less
than or equal one, whence by [3, Proposition 1.2] htR/xR (0 :R/xR C′ ) ≥ 2 and thereby,
¡
¢
dimR/xR (C′ ) = dim (R/xR)/(0 :R/xR C′ ) ≤ dim(R/xR) − ht(0 :R/xR C′ ) ≤ d − 3.
Thus using the exact sequence G we conclude that
∼ d−1
Hd−1
m (S) = Hm (R/xR).
(10)
b b ∼ d−1 b b ) similarly. This
Since dim(C) = dim(C′ ), using F , we deduce that Hd−1
m (R/x R) = Hm (ωR/x
R
implies that,
d−1
∼ d−1 b b ∼ d−1 b b ) ∼
Hd−1
(11)
m (R/xR) = Hm (R/x R) = Hm (ωR/x
R = Hm (ωR/xR ).
The first part of the preceding corollary is a special case of the following theorem.
b satisfies the S 2 -condition and that x is a regular element of R.
Theorem 3.5. Suppose that R
∼
Then, ωRb /xωRb = ωR/x
b R
b if and only if ωR
b /xωR
b satisfies the Serre-condition S 2 .
18
A S TUDY OF QUASI -G ORENSTEIN R INGS
Proof. We prove that ωR/x
b R
b is isomorphic to ωR
b /xωR
b provided the latter is S 2 . The converse is
obvious by By Remark 2.1(v). Suppose, to the contrary, that the map, ¡ι, in the exact sequence
¢∨
(4) of Remark 2.3, for M := R, is not isomorphism, i.e., coker( ι) = C = Hd−1
(R)/xHd−1
(R) 6=
m
m
S
S
0. It follows that, x ∈
¡
¢ p, and thence, x ∈
¡
¢ p. So, by Theorem 2.9(i),
p∈Att Hdm−1 (R)
b
p∈Att Hdm−1 (R)
¡
¢
b containing x, such that Depth b (ω b )q = 2 but htω q ≥
there exists a prime ideal q ∈ Spec(R),
b
Rq
R
R
¡
¢
3. Consequently, DepthRb q (ωRb /xωRb )q = 1 and htωRb /xωRb q ≥ 2, which violates the S 2 -property
of ωRb /xωRb .
The first author of the paper, in [43, Proposition 3.4.], shows that the Ulrich’s deformation
of certain Gorenstein rings to unique factorization domains, developed in [44], has a quasiGorenstein counterpart. We will mention the statement of this deformation theorem, for the
sake of completeness of the paper.
Theorem 3.6. (see, [43, Proposition 3.4.] and [44, Proposition 1]) Suppose that P is a regular
ring and R := P/a is a quasi-Gorenstein ring. Assume, furthermore, that R is locally complete
intersection at codimension ≤ 1. Then there exists a unique factorization domain S (which is
of finite type over P) and a regular sequence y of S such that R ∼
= S/(y).
In spite of the above deformation theorem, at the of writing this paper, it is not clear for us
whether the quasi-Gorenstein property deforms. However, in view of the following theorem,
the quasi-Gorenstein property adheres a variant of deformation which we call it as analytic
deformation. The following theorem will be used in the proof of Theorem 4.5.
Theorem 3.7. Suppose that x ∈ R\Z(R) and R/x n R is quasi-Gorenstein for each n ∈ N. Then R
is quasi-Gorenstein.
Proof. Our proof reduces to the complete case, so there exists a Gorenstein local ring (S, n)
such that dim(S) = d and R is a homomorphic image of S. The commutative diagrams,
xn
0 −−−−→ R −−−−→
°
°
°
x n+1
R −−−−→ R/x n R −−−−→ 0
x
, n+1 R)
y
y f n :=(r +x n R7→r x+x
(12)
0 −−−−→ R −−−−→ R −−−−→ R/x n+1 R −−−−→ 0
leads to the commutative diagrams,
0 −−−−→ HomS (R, S)/x n HomS (R, S) −−−−→ Ext1S (R/x n R, S) −−−−→ 0 :Ext1 (R,S) x n
S
x
x
x
Ext1 ( f ,id )
x
S n S
−−−−→ 0
,
0 −−−−→ HomS (R, S)/x n+1 HomS (R, S) −−−−→ Ext1S (R/x n+1 R, S) −−−−→ 0 :Ext1 (R,S) x n+1 −−−−→ 0
S
(13)
for each n ∈ N. Taking the inverse limit we get the exact sequence,
0 → lim ωR /x n ωR → lim Ext1S (R/x n R, S) → lim 0 :Ext1 (R,S) x n .
←−
n∈N
←−
n∈N
←−
n∈N
S
(14)
E HSAN TAVANFAR
AND
19
M ASSOUD T OUSI
But, ωR ∼
= lim ωR /x n ωR , by [31, Theorem 8.7] and [31, page 63, 8.2.]. By our hypothesis we
←−
have,
n∈N
O
¡
¢
¡ d−1
¢
n
n
∼
Ext1S (R/x n R, S) ∼
R/x n R, ES (S/n)
= HomS Hd−1
n (R/x R), ES (S/n) = HomS Hm (R/x R)
³
´
¡
n
n
∼
(R/x
R),
Hom
R/x
R,
E
(S/
n
)
= HomR/x n R Hd−1
S
S
m
¡ d−1
¢
∼
= HomR/x n R Hm (R/x n R), ER/x n R (R/m)
∼
= R/x n R,
R/x n R
for each n ∈ N. Hence the inverse system,
¡
¢
lim Ext1S (R/x n R, S), Ext1S ( f n , idS ) n∈N ,
←−
n∈N
is isomorphic to an inverse system (R/x n R, γn : R/x n+1 R → R/x n R)n∈N . For each n ∈ N there
exists αn ∈ R such that γn (r + x n+1 R) = αn r + x n R. We claim that all but finitely many of
α′i s are invertible. In fact, one can easily verified that if our claim is wrong then for an arbiT
(m/x n R)l = 0 for each n ∈ N.
trary element (r n + x n R)n∈N ∈ lim R/x n R, we get r n + x n R ∈
←−
n
n∈N
l ∈N
Consequently lim R/x R = 0 and thereby ωR = 0 by the exact sequence (14) which is a con←−
n∈N
tradiction. Hence, without loss of generality we can assume that all of α′i s are invertible.
n+1
Modify the diagram (12) so that x n+1 is replaced by α−1
in the lower row and the vertical
n x
−1
−1
maps f n and xi d R are replaced by αn f n and αn x, respectively. This yields a modification of
1
the diagram (13) in which Ext1S ( f n , idS ) is replaced by α−1
n ExtS ( f n , idS ) and, by a slight abuse
of notation, xidExt1 (R,S) is replaced by α−1
n xidExt1S (R,S) . The result is an exact sequence analS
ogous to the exact sequence (14) in which the second non-zero module is isomorphic to
lim R/x n R ∼
= R.
←−
n∈N
Moreover, lim 0 :Ext1 (R,S) x n = 0, by the following fact. The ascending chain of modules,
←−
n∈Nn
S
{0 :Ext1 (R,S) x n }n∈N , stabilizes eventually, so that the multiplication by a fixed sufficiently large
S
power of x is zero. This concludes our proof.
4 Quasi-Gorenstein rings and the G-dimension of the canonical module
Definition 4.1. [9] A finitely generated R-module N is said to be a totally reflexive R-module if
it satisfies the following conditions.
¡
¢
(i) N is reflexive, i.e. the natural evaluation map, ηN : N → HomR HomR (N, R), R , is an
isomorphism.
¡
¢
(ii) ExtiR (N, R) = ExtiR HomR (N, R), R = 0 for each i ≥ 1.
20
A S TUDY OF QUASI -G ORENSTEIN R INGS
Definition 4.2. [9] An (augmented) G-resolution of a finitely generated R-module N is an exact
sequence, · · · → Gi → Gi −1 → · · · → G0 → N → 0, where Gi is totally reflexive. Moreover, the
G-dimension of N, denoted by G-dimR N, is the least integer n ≥ 0 such that there exists a Gresolution of N with Gi = 0 for each i > n (If there does not exist such a resolution then we say
that G-dimR N = ∞).
Lemma 4.3. Suppose that (R, m) is a zero depth local ring and M is a totally reflexive Rmodule. If M is indecomposable and 0 :R M = 0, then M ∼
= R. In particular, if HomR (M, M) ∼
= R,
∼
then M = R.
Proof. We assume that M is not free and we look for a contradiction. In particular, M has no
non-zero free direct summand. Let P• be a free resolution of M and F• be a free resolution of
M∗ . Then according to the totally reflexiveness of M we get a complete resolution,
A
. . . → P2 → P1 → P0 → F∗0 → F∗1 → F∗2 → . . . ,
of M where im(A) = im(M → F∗0 ). If the matrix A has some entries in R\m, then there exists
an element x := (r 1 , . . . , r i −1 , 1, r i +1 , . . . , r l ) ∈ im(A) = im(M →¡ F∗0 ). Let¢π : F∗0 → R be the projection map onto the i -th component.
Then,
π⌉im(A) ∈ HomR im(A), R , so O im(A) (x) = R, where
¡
¢
O im(A) (x) = { f (x) : f ∈ HomR im(A), R }. Therefore by [7, Lemma 9.5.1.], M ∼
= im(M → F∗0 ) =
im(A), has a non-zero free direct summand which is a contradiction. It turns out that entries
of A are elements of m9 . This immediately yields, 0 :R m ⊆ 0 :R im(A) = 0 :R im(M → F∗0 ) = 0 :R
M = 0, which contradicts with the fact that depth(R) = 0. It follows that M is free, as claimed.
If, HomR (M, M) ∼
= R, then 0 :R M ⊆ 0 :R HomR (M, M) = 0 :R R = 0. Furthermore, M is indecomposable, otherwise, R ∼
= HomR (M, M) would be decomposable which is a contradiction.
Remark 4.4. Let M be an R-module such that HomR (M, M) ∼
= R and Ext1R (M, M) = 0. Let
x1 ∈ R\Z(M). Then HomR/x1 R (M/x1 M, M/x1 M) ∼
= R/x1 R. If in addition, Ext2R (M, M) = 0, and
x1 , x2 is an M-regular sequence such that x1 ∉ Z(R) then by [31, page 140, Lemma 2.(i)]],
Ext1R/x1 R (M/x1 M, M/x1 M) ∼
= Ext2R (M/x1 M, M). On the other hand from the vanishing of the
modules Ext1R (M, M) and Ext2R (M, M) we can deduce that Ext2R (M/x1 M, M) = 0 and whence
Ext1R/x1 R (M/x1 M, M/x1 M) = 0. Thus, again, by the same argument as above we obtain,
HomR/¡(x
1 ,x2
³
´
¡
¢
¢ M/¡(x , x )M¢, M/¡(x , x )M¢ ∼
R/
(x
,
x
)R
.
=
1
2
1
2
1
2
)R
Theorem 4.5. Assume that R has a canonical module ωR and that Gdim(ωR ) < ∞. Then R is
quasi-Gorenstien provided ExtiR (ωR , ωR ) = 0 for each 1 ≤ i ≤ Depth(ωR ).
Proof. We induct on dim(R). In the case where dim(R) = 0 the statement follows from Lemma
4.3 and the Auslander-Bridger formula [9, Theorem 1.25.]. So we assume that dim(R) > 0 and
9
In general, the minimal free resolutions of M and M∗ for some totally reflexive R-module M, similarly as
above, give us a matrix A such that its entries may lie in R\m. For example, set M := R. Then it is easily seen that
the given matrix A will be the matrix [1].
E HSAN TAVANFAR
AND
21
M ASSOUD T OUSI
the statement has been proved for smaller values of dim(R). Applying the Auslander-Bridger
formula [9, Theorem 1.25.] we get,
Depth(Rp ) = Depth(ωRp ) + Gdim(ωRp ) ≥ DepthR (ωRp ) ≥ min{2, dim(Rp )},
for each p ∈ SuppR (ωR ). In particular, by virtue of [3, Proposition 1.2] we can conclude that R
is S 2 and thence HomR (ωR , ωR ) ∼
= R.
Let, Depth(ωR ) = 2 (respectively, Depth(ωR ) = 1). Since Depth(R) ≥ Depth(ωR ) so there
exists a regular sequence x := x1 , x2 (resp. x := x1 ) on R. By [2, 1.10], x is also a regular sequence on ωR . The above remark in conjunction with our hypothesis implies that
¡
¢
HomR/(x) ωR /xωR , ωR /xωR ∼
= R/(x).
So,
\
SuppR/x (ωR /xωR )
¡
¢
= AssR/xR (HomR/(x)R (ωR /xωR , ωR /xωR )
¡
¢
= AssR/xR R/xR .
m/(x) ∈ AssR/xR (ωR /xωR ) = AssR/xR (ωR /xωR )
¡
¢
Consequently, Depth R/xR = 0. Thus, Lemma 4.3 together with [8, Corollary 1.4.6], implies
that ωR /xωR ∼
= R/(x). Thus, µ(ωR ) = µ(ωR /xωR ) = 1. Also by [3, Lemma 1.1] together with (1)
in Reminder 2.1, we have 0 :R ωR = 0. Hence ωR ∼
= R.
Now we deal with the case where Depth(ω¡R ) ≥ 3. We
that R is complete.
¢ may assume
¡
¢
S
S
In this case, Lemma 2.5(ii) implies that m ∉ Att Hd−1
(R)
.
Let,
x
∈
R\
Z(R)
(
m
¡
¢ p) .
p∈Att Hdm−1 (R)
Then the exact sequence (4) in Remark 2.3 shows that ωR /xωR is the canonical module of
R/xR. Thus using [8, Corollary 1.4.6] we can conclude that GdimR/xR (ωR/xR ) < ∞. Our hypothesis in conjunction with [31, page 140, Lemma 2.(i)] implies that ExtiR/xR (ωR/xR , ωR/xR ) =
0 for each 1 ≤ i ≤ DepthR/xR (ωR/xR ). Therefore using the inductive assumption we can deduce that R/xR is quasi-Gorenstein. By the same token, R/x n R is quasi-Gorenstein for each
n ∈ N. Thus, by virtue of Theorem 3.7 we conclude that R is quasi-Gorenstein.
Remark 4.6. At this time we do not know whether the finiteness of the G-dimension of ωR
implies that Ext1R (ωR , ωR ) = Ext2R (ωR , ωR ) = 0. Note that in light of [1, Theorem 3], this is, indeed, the case when ProjdimR (ωR ) < ∞. We stress that, by arguing as in the proof of Theorem
4.5, an affirmative answer to this question shows that R is quasi-Gorenstein precisely when
Gdime(ωR ) < ∞ (c.f. the hypothesis of Theorem 4.5). Hence, it is perhaps worthwhile to
propose the following questions.
Question 4.7. Suppose that (the local ring) R has a canonical module with finite G-dimension.
Then, do we have Ext1R (ωR , ωR ) = Ext2R (ωR , ωR ) = 0?
Question 4.8. Assume that (the local ring) R has a canonical module with finite G-dimension.
Is R a quasi-Gorenstein ring?
We stress again that an affirmative answer to the former question would answer the latter
question positively.
The following remark sheds some light on the question of vanishing of Ext1R (ωR , ωR ) and
Ext2R (ωR , ωR ) which is related to the question 4.8.
22
A S TUDY OF QUASI -G ORENSTEIN R INGS
Remark 4.9. The following statement holds.
(i) Suppose that R is a homomorphic image of a Gorenstein local ring S with dim(R) =
dim(S). Then we can invoke the Grothendieck spectral sequence,
¢ i ,j
¡
i +j
j
ExtiR ωR , ExtS (R, S) ⇒ ExtS (ωR , S),
and [36, Theorem 10.33 (Cohomology Five-Term Exact Sequence)] to obtain the exact
sequence,
2
∨
d−1
Hd−2
m (ωR ) → ExtR (ωR , ωR ) → Hm (R)
O
R
1
∨
ωR → Hd−1
m (ωR ) → ExtR (ωR , ωR ) → 0. (15)
(ii) It is, perhaps, worthwhile to give an example of a ring satisfying S 2 but Ext1R (ωR , ωR ) 6= 0.
By virtue of [16,
( Theorem (1.1)] there exists a 5-dimensional Quasi-Buchsbaum ring
Him (R) = 0,
i 6= 2, 3
R such that,
, and it is a homomorphic image of a Gorenstein
i
H (R) ∼
= R/m, i = 2, 3
m
ring S. In particular since R is Cohen-Macaulay at punctured spectrum and Depth(R) =
2 so R satisfies the S 2-condition. Hence by [3, Remark 1.4] Hdm (ωR ) ∼
= E(R/m) and thence
R = ωωR . But it is not S 3 . Thus in view of Theorem 2.9(ii) in conjunction with the fact
that R = ωωR we can deduce that H4m (ωR ) 6= 0. Therefore the exact sequence (15) yields
Ext1R (ωR , ωR ) 6= 0.
(iii) In spite of the argument of the previous part, Ext1R (ωR , ωR ) = 0 whenever R and the formal fibers of R satisfy the S 3 -condition. Namely, under this condition we can pass to
b of R to use the exact sequence (15). Since, R = ωω so our hypoththe completion R
R
esis in conjunction with Theorem 2.9(ii) implies that Hd−1
(ω
)
=
0.
Hence
our claim
R
m
follows from the exact sequence (15).
(iv) Assume that R and formal fibers of R satisfies S 4 , DepthR (ωR ) ≥ 3 and Ext2R (ωR , ωR ) has
finite length. We have Ext1R (ωR , ωR ) = 0 by the previous part. We claim, furthermore,
that Ext2R (ωR , ωR ) = 0. We assume, again, that R is complete. Since R = ωωR we can
d−1
use Theorem 2.9(ii) to conclude that Hd−2
m (ωR ) = Hm (ωR ) = 0. Therefore the exact
sequence (15) yields
O
d−1
Ext2R (ωR , ωR )∨ ∼
ωR .
= Hm (R)
R
In addition by Reminder 2.1(iv) and [3, Lemma 1.1] we have, Supp(ωR ) = Spec(R). So,
³
³¡
O ¢∨ ´
O ¢
¡ d−1
¢´
¡
d−1
d−1
∨
ωR
ωR = AssR Hm (R)
AttR Hm (R)
= AssR HomR ωR , Hm (R)
R
R
¢\
¡
¡
¢
∨
= AssR Hd−1
Supp(ωR ) = AttR Hd−1
m (R)
m (R) .
¡ d−1
¢
N
Hence in view of the above
identity
and
Lemma
2.5(ii)
we
have,
m
∉
Att
ω
H
(R)
.
R
R
R
m
¢
¡
Now the fact that AssR Ext2R (ωR , ωR ) ⊆ {m} implies that Ext2R (ωR , ωR ) = 0.
In fact, for the vanishing of the second cohomology module Ext2R (ωR , ωR ) we imposed
several additional assumptions. Perhaps, this shows that the vanishing of Ext2R (ωR , ωR )
is considerably more complicated than the vanishing of Ext1R (ωR , ωR ).
E HSAN TAVANFAR
AND
23
M ASSOUD T OUSI
5 Several Characterizations of Quasi-Gorenstein Rings
Definition 5.1. Let M be an R-module and x := x1 , .¡. . , x v be a sequence of elements
¢ of R. FolS
t+1
t+1
t
t
lowing [25], by limit closure of x on M we mean,
(x1 , . . . , x v )M :M x1 . . . x v and we will
t≥0
denote it by {x}lim
M .
Remark 5.2. Let M be an R-module and x := x1 , . . . , x v be a sequence of elements of R. The
following statements hold.
¢
S ¡ i t+i
(i) It is easily verified that the submodule, {xi }lim
(x1 , . . . , x vi t+i )M :M x1i t . . . x vi t , of M
M =
t≥0
¢
S ¡ i +t
coincides with
(x1 , . . . , x vi +t )M :M x1t . . . x vt for each i ∈ N.
t≥0
(ii) For each i , j ∈ N with i ≤ j , we denote the the multiplication map,
j −i
j −i
. . . x v : M/(xi )M → M/(x j )M,
¡
¢
¡
¢
by ϕi ,j . So we have the direct system M/(xi )M, ϕi ,j i ,j ∈N whose direct limit lim M/(xi )M is
x1
−→
v
the top local cohomology H(x
(M) (c.f.
1 ,...,x v )
i ∈N
[6, 5.2.9. Theorem]).
(iii) By part (i), the kernel of the natural R-homomorphism λi : M/(xi )M → lim M/(xl )M,
−→
i.e. the module,
³S¡
t≥0
(x1i +t , . . . , x vi +t )M :M
l ∈N
¢´ i
t
t
i lim
x1 . . . x v /(x )M, is the submodule {x }M /(xi )M of
M/(xi )M. In particular, we have the induced R-monomorphism,
¡
¢
l
∼ v
λ˜i : M/{xi }lim
M → lim M/(x )M = H(x1 ,...,x v ) (M).
−→
l ∈N
¡
¢
(iv) It is easily verified that, similar to part (ii), we have a direct system M/{xi }lim
,
ψ
i
,j
M
i ,j ∈N
j lim
for which the R-homomorphism ψi ,j : M/{xi }lim
M → M/{x }M is, again, the multiplication
j −i
map by x1
j −i
. . . x v . Furthermore, for each i , j ∈ N the following diagram is commutative,
M/{xi }lim
M
λ˜i
¡
// lim M/(xl )M
−→
▼▼▼
▼▼▼ l ∈N
▼▼
ψi , j ▼▼▼
▼&&
OO ˜
λj
¢
M/{x j }lim
M
The injectivity of λ˜i together with above commutative diagram implies that ψi ,j is an Rmonomorphism for each i , j ∈ N. In addition, we have the natural isomorphism,
v
l
∼
lim M/{xi }lim
M → H(x1 ,...,x v ) (M) = lim M/(x )M.
−→
i ∈N
−→
l ∈N
10
(v) By [35, 3.2 Theorem] {x}lim
M = xM provided x is a regular sequence on M .
10
It is worth pointing out that Remark 5.2(v) remains true if we drop both of the assumptions for the ring R to
be Noetherian and local.
24
A S TUDY OF QUASI -G ORENSTEIN R INGS
(vi) ([30, Proposition 2.3.]) Suppose that M is finitely generated and {x}lim
M = xM. Then x 1 , . . . , x v
is a regular sequence on M.
Remark 5.3. Let M be an R-module. Then,
(i) [7, Definition 1.2.18] We use the notation Soc(M) to denote the socle of M, i.e. the Rmodule HomR (R/m, M) ∼
= 0 :M m which is isomorphic to the sum of the simple submodules
of M. Furthermore the length of M as R-module is denoted by λR (M).
(ii) Assume that R has a canonical module ωR . Then,
³
¡ d
¢´∨
N
N
N
∼
∼
b
Soc Hm (R)
= (ωR R R)
= Hdm (R)∨ R (R/m) ∼
R (R/m) = (ωR /mωR ).
(iii) In view of (ii) we have,
¶
¶
µ³
µ³
¡
¢´∨
¡
¢ ´∨
= λR Soc Hdm (R)
µ(ωR ) = VdimR/m (ωR /mωR ) = VdimR/m Soc Hdm (R)
³
³
¡
¢´
¡
¢´
= λR Soc Hdm (R) = VdimR/m Soc Hdm (R) .
Consequently,
³
³
¢´
¡
¡
¢´
d b
d
b
b
(
R)
=
Vdim
Hom
Hom
R/
m
R,
H
µ(ωRb ) = VdimR/
R/
m
,
H
(R)
.
R/m
b
R
b mR
b
m
R
b
mR
Lemma 5.4. Let A be an Artinian R-module. It is well-know that since A is an m-torsion Rb
module so A has a natural R-module
structure (see [6, 10.2.9 Remark.]). We have injdimR (A) =
injdimRb (A).
Proof. Let E • be a minimal injective resolution of A. Recall that, as A is an Artinian module,
E i is a finite copy of ER (R/m) for each i ≥ 0 and that we can endow both of A and E(R/m)
b
b mR)
b and E • is a minimal R-injective
b
with an R-module
structure such that ER (R/m) ∼
= ERb (R/
resolution of A too. Thus injdimR (A) = injdimRb (A).
Definition 5.5. [9] An R-module N is called Gorenstein injective (Gorenstein flat) if there exists an exact complex I of injective R-modules (exact complex F of flat R-modules) such that
N
Ker(I0 → I1 )] ∼
= N (Coker(F1 → F0 ) ∼
= N) and such that HomR (E, I) (E R F) is exact for every
injective R-module E.
Definition 5.6. [9] An (augmented) Gorenstein injective (respectively, Gorenstein flat) resolution of M is an exact sequence, 0 → M → B0 → B1 → · · · → Bi → · · · (respectively, · · · → Fi →
· · · → F1 → F0 → M → 0), where each Bi (respectively, each Fi ) is Gorenstein injective (respectively, Gorenstein flat). The Gorenstein injective (respectively, Gorenstein flat) dimension of N,
denoted by GinjdimR N (respectively, GfdimR N), is the least integer n ≥ 0 such that there exists
a Gorenstein injective resolution of N (respectively, Gorenstein flat resolution of N) such that
Bi = 0 (respectively, Fi = 0) for each i > n (If there does not exist such a resolution then we say
that GinjdimR N = ∞ (respectively, GfdimR N = ∞) ).
E HSAN TAVANFAR
AND
25
M ASSOUD T OUSI
According to the parts (v) and (vi) of Remark 5.2 we can deduce that R is Cohen-Macaulay
if and only if the assertion {x}lim
R = xR holds for some (equivalently for every) system of parameters x of R. Also recall that a Cohen-Macaulay ring is unmixed. Therefore the next theorem is a generalization of the fact that a Cohen-Macaulay ring is Gorenstein if and only if
each (some) parameter ideal is irreducible.
Theorem 5.7. The following statements are equivalent.
¡
¢
(i) injdim Hdm (R) < ∞.
¡
¢
(ii) GinjdimR Hdm (R) < ∞ and Extib (ωRb , ωRb ) = 0, for each 1 ≤ i ≤ DepthRb (ωRb ).
R
(iii) R is quasi-Gorenstein.
b is unmixed and the top local cohomology module of R with respect to m has one di(iv) R
mensional socle.
b is unmixed and {x}lim is irreducible for every system of parameters x := x1 , . . . , xd of R.
(v) R
R
b is unmixed and there exists a system of parameter x := x1 , . . . , xd of R such that {xn }lim
(vi) R
R
is irreducible for each n ∈ N.
b is unmixed and {x}lim is an irreducible ideal for some system of parameters x contained
(vii) R
R
in a high enough power of m.
Proof. (i)⇔(iii): One implication is clear. For the reverse, recall that Hdm (R) is an Artinian Rb with its induced R-module
b
structure. So by Lemma 5.4 we
module and that Hdm (R) ∼
= Hd b (R)
mR
can assume
that
R
is
complete
and
whence
R
has
a
canonical
module ωR . But the finiteness
¡ d
¢
of injdim Hm (R) implies that fdR (ωR ) < ∞. Therefore by [31, Theorem 7.10.] PdR (ωR ) =
fdR (ωR ) < ∞. Hence ωR is¡ free by¢ virtue of [1, Theorem 3].
¢
¡
b <
(ii)⇔(iii): If GinjdimR Hdm (R) < ∞ then [37, Lemma 3.5.] implies that GinjdimRb Hd b (R)
mR
∞. Hence using [9, Theorem 4.16.] and [9, Proposition 4.24] we conclude that GdimRb (ωRb ) <
∞. Thus the statement follows from Theorem 4.5. The reverse is straightforward.
b is quasi-Gorenstein. So by Reminder 2.1(iv) R
b is an unmixed ring. Since
(iii)⇒(iv): R
³
¡
¢
¡
¢
¡
¢´
d
∼
∼
HomR R/m, H (R) = HomR R/m, E(R/m) = R/m, we have VdimR/m Soc Hd (R) = 1.
m
(iv)⇒(v): By
m
Remark 5.2(iii) there is an R-monomorphism R/{xi }lim
R
³
→ lim R/(xn ) ∼
= Hdm (R)
−→
n∈N
¡
¢´
for each i ∈ N. So the fact that VdimR/m Soc Hdm (R) = 1 implies that either R/{xi }lim
R is zero
i lim
i lim
or it has one dimensional socle. Let, {x }R 6= R. Then since R/{x }R is an Artinian ring with
¡
¢
i lim
VdimR/m HomR (R/m, R/{xi }lim
R ) = 1, by [31, Theorem 18.1.] R/{x }R is a Gorenstein Artinian
i lim
ring and consequently the zero ideal of R/{xi }lim
R is irreducible, i.e. {x }R is an irreducible
11
i lim
ideal of R. Also if, {xi }lim
R = R , then {x }R is an irreducible ideal of R.
(v)⇒(vi): It is obvious.
11
Here, it is worth to mention the following. The Hochster’s Monomial Conjecture states that for each local
ring R and each system of parameters y of R we have {y}lim
R ( R. Hence in the case where either both of R and
R/m have the same characteristic or dim(R) ≤ 3, we already know that {x}lim
R ( R.
26
A S TUDY OF QUASI -G ORENSTEIN R INGS
(vi)⇒(iii): By our hypothesis, for sufficiently large n, R/{xn }lim
R is a Gorenstein Artinian
¡
¢
n lim
ring and consequently R/{x }R has one-dimensional socle. On the other hand Soc Hdm (R)
is a non-zero finitely generated R-module and,
¡
¢
n lim
∼
Soc Hdm (R) = Soc(lim R/{xn }lim
R ) = lim Soc(R/{x }R ).
−→
−→
n∈N
n∈N
It turns out that, Soc(R/{xn }lim
) → Soc(Hdm (R)) is onto for some m ∈ N and each n ≥ m and
¢ R
¡ d
thereby VdimR/m Hm (R) = 1. Hence ωRb is cyclic by Remark 5.3(iii). On the other hand our
unmixedness hypothesis together with the identity (1) of Reminder 2.1 yields, 0 :Rb ωRb = 0, i.e.
b
ωb ∼
= R.
R
(vii)⇒(iv): Let ℓd (R) ∈ N be as in [30, Definition 2.4.]. Suppose that x is a system of parameters in mℓd (R) such that {x}lim
Precisely
2.5.],
R is an irreducible ideal.
¢
¡
¢
¡ as in [30, Proposition
[18, Lemma 3.12] implies that the natural map Soc R/(x) → Soc lim R/(xn ) is onto. By Re−→
n∈N
n
mark 5.2(iv), there exists a natural isomorphism lim R/{xn }lim
R → lim R/(x ) which yields the
−→
−→
following commutative diagram,
¡
¢
Soc R/(x)
n∈N
n∈N
−−−−→
y
¢
¡
Soc lim R/(xn )
−→
n∈N
x
∼
=
n lim
Soc(R/{x}lim
R ) −−−−→ Soc(lim R/{x }R ).
−→
n∈N
¡
¢
¡ d
¢
n lim ∼
R/{x
}
)
→
Soc
lim
This implies that Soc(R/{x}lim
Soc
H
(R)
is an epimorphism too
=
m
R
R
−→
n∈N
¡
¢
and whence Socdim Hdm (R) = 1.
(v)⇒(vii): It is obvious.
It is worth pointing out that the equivalence (iv)⇔(iii) in the preceding theorem may be
considered as a counterpart to the well-known fact that R is a Gorenstein ring if and only if R
is a Cohen-Macaulay ring of type 1. Also the equivalence (vii)⇔(iii) is a generalization of the
main result of [30, Theorem 2.7.], i.e. the following: 12 .
Theorem: ([30] ) There exists an integer ℓ such that R is Gorenstein if and only if some
parameter ideal contained in mℓ is irreducible.
Remark 5.8. Assume that R has a canonical module ωR . By the identity (1) of Reminder 2.1, R
N
b = 0 if and only if R
b is unmixed.
is unmixed if and only if 0 :R ωR = 0 if and only if 0 :Rb (ωR R R)
b
Hence we can replace R with R in all parts of the Theorem 5.7 provided that R has a canonical
module. However, [33, EXAMPLE 2.3] gives us an example of a Noetherian local domain such
that its completion is not unmixed.
12
This is mentioned in the introduction of [30]
E HSAN TAVANFAR
AND
M ASSOUD T OUSI
27
In the following example we construct a ring R such that Hdm (R) has a one dimensional
socle but it is not quasi-Gorenstein. This implies that in Theorem 5.7 the unmixedness conb is necessary.
dition of R
Example 5.9. Let K be a field and consider the power series ring K[[X, Y]]. Then,
R = K[[X, Y]]/(X 5 Y 5 ),
is a Gorenstein ring. Let a = (X 4 Y 3 , X 3 Y 4 )/(X 5 Y 5 ) be an ideal of R. An easy verification shows
that 0 :R a is a principal ideal generated by the image of X 2 Y 2 in R and that a ( 0 :R (0 :R a) =
(X 3 Y 3 )/(X 5 Y 5 ). Note that htR (a) = 0. This implies that 0 :R a ∼
= HomR (R/a, R) is the canonical
module of R/a which is cyclic but 0 :R/a (0 :R a) = 0 :R (0 :R a)/a 6= 0. Therefore the canonical
module of R/a is not free and R/a is not quasi-Gorenstein. However by dualizing
an epimor³
¡ d
¢´
d
Soc
H
(R)
phism R → ωR we get an embedding Hm (R) → E(R/m). Therefore, VdimR/
= 1,
b mR
b
m
although R is not quasi-Gorenstein.
It is well-known that a Cohen-Macaulay ring R is Gorenstein if and only if there exists an
irreducible system of parameters for R. So, in accordance with Theorem 5.7, perhaps it is
b is unmixed and there exist a system
natural to ask whether R is quasi-Gorenstein provided R
of parameters for R whose limit closure is irreducible? The answer is negative.
Example 5.10. Let R = C[[X, Y, Z, T]]/(XY, XT, ZY, ZT). We denote the images of X, Y, Z, T in R
by x, y, z, t , respectively. Then R is a non-Cohen-Macaulay unmixed complete local ring of
dimension 2. One can verify that x + y, z + t is a system of parameters for R and that,
¡
¢
(x + y)2 , (z + t )2 : (x + y)(z + t ) = (x, y, z, t ).
So (x + y, z + t )lim is the unique maximal ideal of R and in particular it is irreducible. But R is
not quasi-Gorenstein as R is a non-Cohen-Macaulay ring of dimension 2.
In the Theorem 5.7 the quasi-Gorensteinness is characterized with the aid of the limit
closure of parameter ideals. We would like to digress momentarily to give another such application of the limit closure. The following proposition will be use in the proof of Theorem
5.12.
n
lim
Proposition 5.11.³ Suppose that there exists n ∈ N such
´ that m ({x}M /xM) = 0, for each s.o.p.
¡
¢
x for M. Then, mn (x1 , . . . , xi )M :M xi +1 /(x1 , . . . , xi )M = 0, for each s.o.p. x for M and for every
0 ≤ i ≤ d ′ − 1.
¡
¢
Proof. Let, m ∈ (x1 , . . . , xi )M :M xi +1 , where 0 ≤ i ≤ d ′ − 1. Then,
u
u
xi +1 m ∈ (x1 , . . . , xi , xiu+1
+1 , x i +2 , . . . , x d ′ )M,
for each u ∈ N. Therefore, x1 . . . xi xiu+1 . . . xdu′ m ∈ (x12 , . . . , xi2 , xi2u
, . . . , xd2u′ )M which yields m ∈
+1
n
u
u
{x1 , . . . , xi , xiu+1 , . . . , xdu′ }lim
M . Thus our hypothesis yields m m ∈ (x 1 , . . . , x i , x i +1 , . . . , x d ′ )M for
each u ∈ N. Now the assertion follows from the Krull’s intersection theorem.
28
A S TUDY OF QUASI -G ORENSTEIN R INGS
Theorem 5.12. The following statements hold.
(i) If R is a generalized Cohen-Macaulay ring, then there exists n ∈ N0 such that, mn ({x}lim
R /xR) =
13
0, for each s.o.p. x for R . The reverse also holds whenever R is a homomorphic image
of a Cohen-Macaulay ring.
(ii) R is a Buchsbaum14 ring if and only if m({x}lim
R /xR) = 0 for each s.o.p. x for R.
¡ lim
¢
n
Proof. If there ¡exists n ∈ N such that
m
{x}
/xR
= 0 for each s.o.p. x for R then by PropoR
¢
sition 5.11, mn (x1 , . . . , xi )R :R xi +1 ⊆ (x1 , . . . , xi )R, for each s.o.p x of R and 0 ≤ i ≤ d − 1. Thus
R is generalized Cohen-Macaulay by [42, Page 260, Proposition 16]. By the same token each
s.o.p. for R is a weak m-sequence of R, i.e. R is a Buchsbaum ring, provided n ≤ 1.
Conversely assume that R is generalized Cohen-Macaulay. Let, mαi Him (R) = 0, for each
d−1
P
d
αi . We show that, m(2 −1)n {x}lim
0 ≤ i ≤ d − 1. Choose an integer n ∈ N0 satisfying, n ≥
R ⊆
i =0
xR, for each s.o.p. x for R. To this aim we induct on d ≥ 1 (for the case where d = 0 the
assertion is obvious). If, d = 1, then for every s.o.p. x of R there exists t ∈ N such that {x}lim
R =
t+1
t
t
x R :R x = (0 :R x ) + xR. So by [7, Corollary 8.1.3.(b)] we are done in this case. Suppose
that the statement is true for smaller values of d . Let x be a s.o.p. for R and r ∈ {x}lim
R , i.e.
j
j
j +1
x1 . . . xd r ∈ (x1
j +1
, . . . , xd ) for some j ∈ N. Then there exists r ′ ∈ R such that,
j
j
j +1
x1 . . . xd−1 r − xd r ′ ∈ (x1
j +1
j
, . . . , xd−1 )R :R xd .
Thus, [7, Corollary 8.1.3.(b)] shows that,
j
j
j +1
j +1
mn (x1 . . . xd−1 r ) ⊆ (x1 , . . . , xd−1 , xd )R.
Therefore, mn r ⊆ {x1 , . . . , xd−1 }lim , where the notation means modulo xd R. We claim that,
R
d−2
¡
¢
P
βi , where βi is the least integer satisfying mβi ⊆ 0 :R Him (R) . But we defer the proof
2n ≥
i =0
of the claim for a while to see what it implies. Using our claim in conjunction with the
d −1
d
inductive hypothesis we can deduce that m(2 −1)2n mn r ⊆ (x 1 , . . . , x d−1 )R. So, m(2 −1)n r ⊆
(x1 , . . . , xd )R, as desired.
Now, we prove our claim. By [7, Corollary 8.1.3.] we have, 0 :R xd ⊆ Γm (R). Hence the
exact sequence, 0 → 0 :R xd → R → R/(0 :R xd ) → 0, shows that Him (R) ∼
= Him (R/0 :R xd ) for
xd
each i ≥ 1. Therefore using the exact sequence, 0 → R/(0 :R xd ) → R → R → 0, we can deduce
that, mαi +αi +1 Him (R) = 0 for each 0 ≤ i ≤ d − 2, provided mαi Him (R) = 0 for each 0 ≤ i ≤ d − 1.
d−2
d−1
P
P
(αi + αi +1 ) ≤ 2n. This proves our claim.
αi ≤ n. so,
Since,
i =0
i =0
Furthermore if R is a Buchsbaum ring then by [42, Proposition 1.17] every s.o.p. for R is
both of an unconditioned strong d -sequence15 and also a weak m-sequence. Hence by virtue
13
See [6, 9.5.7 Exercise] for the definition of Generalized Cohen-Macaulay rings.
See [42, Page 14, Theorem 2 and definition] for the definition of Buchsbaum rings.
15
See [26, Definition 1.2.] for the definition of an unconditional strongly d-sequence.
14
E HSAN TAVANFAR
AND
29
M ASSOUD T OUSI
d ¡
¢
P
of [26, Theorem 3.6.(ii)] we have, {x}lim
(x1 , . . . , c
x j , . . . , xd ) : x j . Since x is a weak mR =
j =1
¡
¢
sequence, so we have, m (x1 , . . . , xbi , . . . , xd ) : xi ⊆ (x1 , . . . , xbi , . . . , xd ). This, immediately gives
us, m{x}lim
R ⊆ xR.
Acknowledgement
We would like to express our deepest gratitude to Raheleh Jafari for many fruitful discussions and helpful suggestions, most notably for Remark 2.7. We are also grateful to Kamran
Divaani-Aazar for valuable comments.
References
[1] Y. Aoyama, On the depth and the projective dimension of the canonical module, Japan. J. Math. (N.S.), 6,
(1980), no. 1, 61-66.
[2]
, Some basic results on canonical modules, J. Math. Kyoto Univ., 23, (1983), no. 1, 85-94.
[3] Y. Aoyama and S. Goto, On the endomorphism ring of the canonical module, J. Math. Kyoto Univ., 25-1,
(1985), 21-30.
[4] H. Bass, On the ubiquity of Gorenstein rings, Math. Z., 82, (1963), 8–28.
[5] M. -J. Bertin, Anneaux d’invariants d’anneaux de polynomes, en caractéristique p, C. R. Acad. Sci. Paris Sér.
A-B 264 (1967), A653–A656.
[6] M. P. Brodmann and R. Y. Sharp, Local Cohomology: An Algebraic Introduction with Geometric Applications, second edition, Cambridge University Press, 2013.
[7] W. Bruns and J. Herzog, Cohen-Macaulay rings, Cambridge University Press, 1993.
[8] L. W. Christensen, Gorenstein dimensions., Berlin: Springer, 2000.
[9] L. W. Christensen and H-Børn Foxby and H. Holm, Beyond totally reflexive modules and back. A survey on
Gorenstein dimensions., New York, NY: Springer, 2011.
[10] M. T. Dibaei, A study of Cousin complexes through the dualizing complexes, Commun. Algebra, 33, (2005),
no. 1, 119–132.
[11] M. T. Dibaei and R. Jafari, Cohen-Macaulay loci of modules, Commun. Algebra, 39, (2011), no. 10, 3681–
3697.
[12] E. E. Enochs and O. M.G. Jenda, Gorenstein injective and projective modules, Math. Z. 220, (1995), no. 4,
611–633.
[13] R. Fossum, H-B Foxby, P. Griffith and I. Reiten, Minimal injective resolutions with applications to dualizing
modules and Gorenstein modules, Publ. Math., Inst. Hautes Étud. Sci., 45, (1975), 193–215.
[14] L. Fouli and C. Huneke, What is a system of parameter?, Proc. Am. Math. Soc., 139, (2011), 2681-2696.
[15] H-B Foxby, Isomorphisms between complexes with applications to the homological theory of modules,
Math. Scand., 40, (1977), 5–19.
[16] S. Goto, A note on quasi-Buchsbaum rings, Proc. Am. Math. Soc., 90, (1984), 511–516.
[17] S. Goto, On the associated graded rings of parameter ideals in Buchsbaum rings, J. Algebra 85 (1983), no. 2,
490–534.
30
A S TUDY OF QUASI -G ORENSTEIN R INGS
[18] S. Goto and H. Sakurai, The equality I2 = QI in Buchsbaum rings, Rend. Sem. Mat. Univ. Padova, 110, (2003),
25-56.
[19] S. Goto and K. Watanabe, On graded rings. I, J. Math. Soc. Japan, 30, (1978), no. 2, 179–213.
[20] R. Hartshorne, Residues and duality. Appendix: Cohomologie à support propre et construction du foncteur
f ! . par P. Deligne., 1966.
[21] H. Hassanzadeh Hafshejani, N. Shirmohammadi and H. Zakeri, A note on quasi-Gorenstein rings, Arch.
Math., 91, (2008), no. 4, 318–322.
[22] W. Heinzer and M. Kim and B. Ulrich, The Cohen-Macaulay and Gorenstein properties of rings associated
to filtrations, Commun. Algebra, 39, (2011), no. 10, 3547–3580.
[23] M. Herrmann and N. Trung, Examples of Buchsbaum quasi-Gorenstein rings, Proc. Am. Math. Soc., 117,
(1993), 619-625.
[24] M. Hochster, Canonical elements in local cohomology modules and the direct summand conjecture, J. Algebra, 84, (1983), 503–553.
[25] C. Huneke, Tight closure, parameter ideals, and geometry, in Six Lectures on Commutative Algebra (J. Elias,
J.M. Giral, R.M. MirÂt’o-Roig, and S. Zarzuela, eds), Progress in Mathematics, vol. 166, Birkhauser Verlag,
Basel, 1998, 187-239.
[26] C. Huneke, M. Katzman, R. Y. Sharp and Y. Yao, Frobenius test exponents for parameter ideals in generalized
Cohen-Macaulay local rings, J. Algebra, 305, (2006), no. 1, 516–539.
[27] S. Ishii, Quasi-Gorenstein Fano 3-folds with isolated non-rational loci., Compos. Math. 77 (1991), no. 3,
335–341.
[28] M. Johnson and B. Ulrich, Serre’s condition Rk for associated graded rings, Proc. Am. Math. Soc., 127, (1999),
no. 9, 2619–2624.
[29] E. Kunz, Almost complete intersections are not Gorenstein rings., J. Algebra 28 (1974), 111–115.
[30] T. Marley, M. W. Rogers, H. Sakurai, Gorenstein rings and irreducible parameter ideals, Proc. Am. Math.
Soc., 136, (2008), no. 1, 49–53.
[31] H. Matsumura, Commutative ring theory. Transl. from the Japanese by M. Reid., 1986 (English).
[32] C. Miyazaki, Graded Buchsbaum algebras and Segre products, Tokyo J. Math., 12, (1989), no. 1, 1–20.
[33] J. Nishimura, A few examples of local rings, I, Kyoto Journal of Mathematics, 52, (2012), 51âĂŞ87.
[34] T. Ochiai and K. Shimomoto, Bertini theorem for normality on local rings in mixed characteristic (applications to characteristic ideals)., Nagoya Math. J. 218 (2015), 125–173.
[35] L. O’Carroll, On the generalized fractions of Sharp and Zakeri, J. London Math. Soc., 28 (2), (1983), 417-427.
[36] J. J. Rotman, An introduction to homological algebra. 2nd ed., 2nd ed., Berlin: Springer, 2009.
[37] R. Sazeedeh, Gorenstein injectivity of the section functor, Forum Math., 22, (2010), no. 6, 1117–1127.
[38] P. Schenzel, A note on almost complete intersections, Seminar D. Eisenbud, B. Singh and W. Vogel, Vol. 2,
Teubner-Texte Math. 48, 49-54 (1982).
[39] Peter Schenzel, On the use of local cohomology in algebra and geometry, Basel: Birkhäuser, 1998.
[40] R.Y. Sharp, The Cousin complex for a module over a commutative Noetherian ring, Math. Z., 112, (1969),
340–356.
[41] Anurag K. Singh, Cyclic covers of rings with rational singularities., Trans. Am. Math. Soc. 355 (2003), no. 3,
1009–1024.
[42] J. Stückrad and W. Vogel, Buchsbaum rings and applications. An interaction between algebra, geometry and
topology, 1986 (English).
E HSAN TAVANFAR
AND
M ASSOUD T OUSI
31
[43] Ehsan Tavanfar, Reduction of certain homological conjectures to excellent unique factorization domains,
arXiv:1607.00025v1 [math.AC].
[44] B. Ulrich, Gorenstein rings as specializations of unique factorization domains, J. Algebra 86 (1984), no. 1,
129–140.
[45] T. Yoshizawa, On Gorenstein injectivity of top local cohomology modules, Proc. Am. Math. Soc., 140, (2012),
no. 6, 1897–1907.
[46] M. Rahro Zargar and H. Zakeri, On injective and Gorenstein injective dimensions of local cohomology modules, arXiv:1204.2394v1 [math.AC] 11 (2012).
E HSAN TAVNAFAR , D EPARTMENT OF M ATHEMATICS , S HAHID B EHESHTI U NIVERSITY, G.C., T EHRAN ,
I RAN .
E-mail address: [email protected]
M. T OUSI , D EPARTMENT OF M ATHEMATICS , S HAHID B EHESHTI U NIVERSITY, G.C., T EHRAN , I RAN .
E-mail address: [email protected]
| 0math.AC
|
arXiv:1712.08665v1 [math.ST] 22 Dec 2017
Quasi-maximum likelihood estimation for
cointegrated solutions of continuous-time
state space models observed at
discrete-time points
Vicky Fasen-Hartmann †‡
Markus Scholz §
In this paper we investigate quasi-maximum likelihood (QML) estimation for the parameters of a cointegrated solution of a continuous-time linear state space model observed at discrete time points. The class of cointegrated solutions of continuous-time linear state space models is equivalent to the class of cointegrated continuous-time ARMA
(MCARMA) processes. The model is not in innovation form. Therefore we have to
construct some pseudo-innovations to be able to define a QML-function. We divide the
parameter vector appropriate in long-run and short-run parameters using a representation for cointegrated solutions of continuous-time linear state space models as a sum of a
Lévy process plus a stationary solution of a linear state space model. Then we establish
the consistency of our estimator in three steps. First, we show the consistency for the
QML estimator of the long-run parameters. In the next step, we calculate its consistency
rate. Finally, we use these results to prove the consistency for the QML estimator of the
short-run parameters. After all we derive the limiting distributions of the estimators. The
long-run parameters are asymptotically mixed normally distributed whereas the short-run
parameters are asymptotically normally distributed.
AMS Subject Classification 2010: Primary: 91G70, 62H12
Secondary: 62M10, 60F05
Keywords: Asymptotically normal, cointegration, (super-)consistency, identifiability, Kalman filter,
MCARMA process, mixed normal distribution, pseudo-innovation, quasi-maximum likelihood estimation, state space model.
1 Introduction
This paper deals with the statistical inference of cointegrated solutions of continuous-time linear state
space models. The source of randomness in our model is a Lévy process, i.e. an Rm -valued stochastic
† Institute
of Stochastics, Englerstraße 2, D-76131 Karlsruhe, Germany, email: [email protected]
by the Deutsche Forschungsgemeinschaft through the research grant FA 809/2-2 is gratefully acknowl-
‡ Financial support
edged.
§ Allianz
Lebensversichung-AG, Reinsburgstraße 19, D-70197 Stuttgart, Germany.
1
process L = (L(t))t≥0 with L(0) = 0m P-a.s., stationary and independent increments and càdlàg sample
paths. A typical example of a Lévy process is a Brownian motion. More details on Lévy processes can
be found, e.g., in the monograph of Sato [31]. For A ∈ MN,N (R), B ∈ MN,m (R) and C ∈ Md,N (R) an
Rd -valued continuous-time linear state space model (A, B,C, L) is defined by the state and observation
equation
dX (t) = AX (t)dt + BdL(t)
Y (t) = CX (t)
for t ≥ 0.
(1.1)
The state vector process X = (X (t))t≥0 is an RN -valued process and the output process Y = (Y (t))t≥0
is Rd -valued. The topic of this paper are cointegrated solutions Y of linear state space models. Cointegrated means that Y is non stationary but has stationary increments and there exist linear combinations
of Y which are stationary. The cointegration space is the space spanned by all vectors β so that β TY
is stationary. Since the driving noise in this model is a Lévy process we allow flexible marginals, in
particular, they can be Gaussian if we use a Brownian motion as Lévy process. The class of cointegrated solutions of linear state space models is huge; they are equal to the class of cointegrated multivariate continuous-time ARMA (MCARMA) processes (see Fasen and Scholz [13]). As the name
suggests, MCARMA processes are the continuous-time versions of the popular and well-established
ARMA processes in discrete-time. Continuous-time models provide the basis for option pricing, asset allocation and term structure theory. The underlying observations of asset prices, exchange rates,
and interest rates are often irregularly spaced, in particular, in the context of high frequently data.
Consequently, one often works with continuous-time models which infer the implied dynamics and
properties of the estimated model at different frequencies from the one used in the estimation.
There is not much known about the statistical inference of cointegrated solutions of continuoustime state space and MCARMA models, respectively which allow a moving average part respectively,
go away from the Gaussian assumption. Most attention is paid to cointegrated Gaussian MCAR(p)
processes, in particular Gaussian MCAR(1) processes which are multivariate Ornstein-Uhlenbeck
processes. An algorithms to estimate the structural parameters in a cointegrated Gaussian MCAR(p)
model by maximum-likelihood started already by Harvey and Stock [15, 16], and were further explored in the well-known paper of Bergstrom [4] without analyzing the properties of the estimators.
Frequency domain estimators for a cointegrated Gaussian MCAR(p) model are presented in Chambers and McCrorie [9]. Besides, statistical inference and identification of ergodic continuously observed Gaussian MCAR(1) processes are considered in Kessler and Rahbek [20] and observations at
discrete time points in Kessler and Rahbek [21]. Stockmarr and Jacobsen [36] do analogous things
by observing the process on a discrete time-grid, which is getting finer and finer. There are only few
papers investigating non-Gaussian cointegrated MCARMA processes. For example, Fasen [10] treats
a multiple regression model in continuous-time where the stationary part is a multivariate OrnsteinUhlenbeck process and the process is observed on an equidistant time-grid. The model in Fasen [11]
is similarly, however there the stationary part is an MCARMA process and the process is observed on
a high-frequency time grid.
Sampling Y with distant h > 0 results in Y (h) = (Y (kh))k∈N , a cointegrated solution of a state-space
model in discrete time. QML estimation for cointegrated solutions of state space models in discrete
time were investigated in Aoki [1] and in the unpublished work of Bauer and Wagner [2]. However,
our discrete-time state space model has a different representation and does not fit into their framework
since our noise is only going into the state equation whereas in [1, 2] it is going into both the state and
the observation equation. On this way their model is already in innovation form making calculations
easier. However, their model excludes not only our model but also aggregated linear processes.
2
Although linear state-space models sampled equidistantly belong to the class of ARMA processes
problems arise by identifying the ARMA parameters. Unfortunately there do not exist explicit representations for the ARMA parameters; even stationary solutions of state space models have semiexplicit ARMA representations (see Schlemm and Stelzer [33, Theorem 4.2]). Moreover, in this
representation the innovations are only uncorrelated and not iid. However, most of the well-known
results for cointegrated ARMA models assume an iid noise elsewise even a Gaussian white noise, see
e.g., the monographs of Johansen [18], Lütkepohl [23] and Reinsel [27]. Hence, it is at the state of
the art more or less impossible to use the ARMA structure of Y (h) for estimation of identifiable model
parameters. Therefore we need a different attempt which incorporates as well the identifiability of the
model parameters; our ansatz is QML estimation.
Without any transformation of the state space model given in (1.1) we do not see directly if there
exists a cointegrated solution not to mention the cointegration space. In the case of a minimal statespace model the eigenvalues of A determine if there exists a stationary or a cointegrated solution. If
A has eigenvalue 0 and it has the same geometric and algebraic multiplicity, and all other eigenvalues
have negative real parts then there exists a cointegrated solution Y . It is well-known in econometrics
that in a cointegrated model the asymptotic behavior of the QML estimator for the long-run parameters
and the QML estimator for the short-run parameters differ. Therefore we need a representation for a
cointegrated solution of a linear state space model where we can see clearly the cointegration space
to get a separation in long-run and short-run parameters. If there exists a cointegrated solution of a
continuous-time linear state space model then due to Fasen and Scholz [13, Theorem 3.2] it has the
form
Y (t) = C1 Z +C1 B1 L(t) +Yst (t),
t ≥ 0,
(1.2)
where B1 ∈ Mc,m (R) and C1 ∈ Md,c (R) have rank c ≤ d. The process Yst is a stationary solution of a
state space model driven by the Lévy process L and Z is a c-dimensional random vector. The process
Y is obviously cointegrated with cointegration space C1⊥ , the space orthogonal to C1 , if Var(L(1)) is
non-singular. Because then Y is non-stationary with stationary increments and C1⊥ TY = C1⊥ TYst is
stationary but C1TY is in any component non-stationary. The probabilistic properties of Y are analyzed
in detail in Fasen and Scholz [13] and lay the groundwork for the present paper.
The aim of this paper is to investigate QML estimators for C1 , B1 and the parameters of the stationary process Yst from the discrete-time observations Y (h), . . . ,Y (nh) for some fixed h > 0. The
parameters of C1 are the long-run parameters whereas the other parameters are the short-run parameters. Since our process Y (h) is not in innovation form we use the Kalman-filter to calculate the linear
innovations and to construct an error correction form (see Fasen and Scholz [13, Proposition 5.4 and
Theorem 5.7]). However, the linear innovations and the error correction form are of infinite order in
contrast to the usual finite order as, e.g., in [24, 28, 37] for VARMA models and in [1, 2] for discretetime state space models making calculations more involved. Infinite means that we use infinitely
many past values. However, in practice we do not have infinitely many past values of Y (h) for our
QML method so that we have to approximate the innovations without using the past values but as well
not loosing much information. Not only from the practical point of view problems arise by the infinite
order representation but also from the theoretical point of view since Y (t) is only defined for t ≥ 0
excluding the infinite past as well. Since Y (h) is non-stationary it is not obvious to define Y (−kh) for
negative values. Therefore we have to develop a method to construct Y (−kh) for k ∈ N making it
possible to interpret this infinite error correction form appropriate. Indeed the linear innovations are
stationary but in general it is not possible to say anything about the mixing properties; for more details
we refer to [33] in the case of stationary models. Hence, standard limit results for stationary mixing
3
processes can not be applied.
The representation of the innovations motivates the definition of the pseudo-innovations and hence,
the pseudo-Gaussian likelihood function. The term pseudo reflects in the first case that we do not use
the real innovations and in the second case that we do not have a Gaussian model. This approach is
standard for stationary models (cf. [34]) but not so well investigated for non-stationary models. In
our model the pseudo-innovations are non-stationary as well and hence, classical methods for QML
estimation for stationary models do not work, e.g., the convergence of the quasi-maximum-likelihood
function by a law of large numbers and an ergodic theorem, respectively. To avoid the problem of
the non-stationarity in our model we use a stepwise approach to derive asymptotic results. In the
first step, we prove the consistency of the long-run parameter estimator and in the second step its
consistency rate; the long-run parameter estimator is super-consistent. In the third step we are able
prove the consistency of the short-run parameter estimator. However, for the proof we have to divide
the likelihood-function appropriate so that one part depends only on the short-run parameters and is
based on stationary processes. This decomposition is not obvious and presumes as well a splitting
of the pseudo-innovations in a non-stationary and a stationary part depending only on the short-run
parameters. This concept of a stepwise proof goes back to Saikkonen [29, 30] for MLE in Gaussian
cointegrated models. As in Saikkonen [29, 30] we require for the investigation of the asymptotic
behavior of our estimators some kind of stochastic equicontinuity conditions. However, our conditions
are somewhat different to [29, 30] fitting into the context of our model.
The paper is structured on the following way. An introduction into QML estimation for cointegrated continuous-time linear state space models is given in Section 2. First, we state in Section 2.1
the assumptions on our parametric family of cointegrated output processes Y . Then we define the
pseudo-innovations for the QML estimation by the Kalman filter in Section 2.2. Based on the pseudoinnovations we calculate the pseudo-Gaussian log-likelihood function in Section 2.3. In Section 2.4
we introduce some identifiability conditions to get a unique minimum of the likelihood function. The
main results of this paper are given in Section 3 and Section 4. First, we show the consistency of the
QML estimator in Section 3. Finally, we calculate the asymptotic distribution of the QML estimator
in Section 4. The short-run QML estimator is asymptotically normally distributed and mimics the
properties for QML estimators for stationary models whereas the long-run QML estimator is asymp√
totically mixed normally distributed with a convergence rate of n instead of n occurring in stationary
models. We conclude the paper with some comments on the practical applicability of our estimator in
Section 5. Eventually, in Appendix A we present some asymptotic results and stochastic equicontinuity conditions which we use throughout the paper. Because of their technicality and to keep the paper
readable they are moved to the appendix.
Notation
We use as norms the Euclidean norm k·k in Rd and the Frobenius norm k·k for matrices, which is
submultiplicative. 0d×s denotes the zero matrix in Rd×s and Id is the identity matrix in Rd×d . For a
matrix A ∈ Rd×d we denote by AT its transpose, tr(A) its trace, det(A) its determinant, rank A its rank,
λmin (A) its smallest eigenvalue and σmin (A) its smallest singular value. If A is symmetric and positive
1
1
semi-definite we write A 2 for the principal square root, i.e. A 2 is a symmetric, positive semi-definite
1
1
matrix satisfying A 2 A 2 = A. For a matrix A ∈ Rd×s with rank A = s, A⊥ is a d × (d − s)-dimensional
matrix with rank (d − s) satisfying AT A⊥ = 0s×(d−s) and A⊥T A = 0(d−s)×s . The space of all m × ndimensional real-valued matrices is Mm,n (R). For two matrices A ∈ Rd×s and B ∈ Rr×n , we denote
by A ⊗ B the Kronecker product which is an element of Rdr×sn and by vec(A) the operator which
converts the matrix A into a column vector. We write ∂i for the partial derivative operator with respect
4
to the ith coordinate and ∂i, j for the second partial derivative operator with respect to the ith and jth
coordinate. Further, for a matrix function f (ϑ ) in Md,m (R) with ϑ ∈ Rs the gradient with respect to
f (ϑ ))
the parameter vector ϑ is denoted by ∇ϑ f (ϑ ) = ∂ vec(
∈ Rdm×s . Let ξ = (ξk )k∈N and η = (ηk )k∈N
∂ϑT
be d-dimensional stochastic processes then Γξ ,η (l) = Cov(ξ1 , η1+l ) and Γξ (l) = Cov(ξ1 , ξ1+l ), l ∈
p
w
N0 , are the covariance functions. Finally, we denote with −−→ weak convergence and with −−→
convergence in probability. In general C denotes a constant.
2 Step-wise quasi-maximum likelihood estimation
2.1 Parametric model
Let Θ ⊂ Rs , s ∈ N, be a parameter space. We assume that we have a parametric family (Yϑ )ϑ ∈Θ of
solutions of continuous-time cointegrated linear state space models of the form
Yϑ (t) = C1,ϑ Z +C1,ϑ B1,ϑ Lϑ (t) +Yst,ϑ (t),
t ≥ 0,
(2.1)
where (Yst,ϑ (t))t≥0 is a stationary solution of the state-space model
dXst,ϑ (t) = A2,ϑ Xst,ϑ (t)dt + B2,ϑ dLϑ (t),
Yst,ϑ (t) = C2,ϑ Xst,ϑ (t)
(2.2)
with A2,ϑ ∈ MN−c,N−c (R), B1,ϑ ∈ Mc,m (R), B2,ϑ ∈ MN−c,m (R), C1,ϑ ∈ Md,c (R) and C2,ϑ ∈ Md,N−c (R).
Only the covariance matrix ΣϑL of the Lévy process Lϑ is parameterized. The parameter vector of the
underlying process Y is denoted by ϑ 0 , i.e. (A2 , B1 , B2 ,C1 ,C2 , L) = (A2,ϑ 0 , B1,ϑ 0 , B2,ϑ 0 ,C1,ϑ 0 ,C2,ϑ 0 , Lϑ 0 )
where Yst is a stationary solution of the state space model (A2 , B2 ,C2 , L). Throughout the paper we
shortly write (A2,ϑ , B1,ϑ , B2,ϑ ,C1,ϑ ,C2,ϑ , Lϑ ) for the cointegrated state space model with solution Yϑ
as defined in (2.1). To be more precise we have the following assumptions on our model.
Assumption A. For any ϑ ∈ Θ the cointegrated state space model (A2,ϑ , B1,ϑ , B2,ϑ ,C1,ϑ ,C2,ϑ , Lϑ )
satisfies the following conditions:
(A1) The parameter space Θ is a compact subset of Rs .
(A2) The true parameter vector ϑ 0 lies in the interior of the parameter space Θ.
(A3) The Lévy process Lϑ has mean zero and non-singular covariance matrix ΣϑL = E[Lϑ (1)Lϑ (1)T ].
Moreover, there exists a δ > 0 such that EkLϑ (1)k4+δ < ∞ for any ϑ ∈ Θ.
(A4) The eigenvalues of A2,ϑ have strictly negative real parts.
(A5) The triplet (A2,ϑ , B2,ϑ ,C2,ϑ ) is minimal with McMillan degree N − c (see [14, Chapter 4.2] for
the definition of McMillian degree).
(A6) The matrices B1,ϑ and C1,ϑ have full rank c.
(A7) The c-dimensional random vector Z does not depend on ϑ , EkZk2 < ∞ and Z is independent of
Lϑ .
⊥ are three
(A8) The functions ϑ 7→ A2,ϑ , ϑ 7→ Bi,ϑ , ϑ 7→ Ci,ϑ for i ∈ {1, 2}, ϑ 7→ ΣLϑ and ϑ1 7→ C1,
ϑ1
times continuously differentiable.
5
T T
(A9) Aϑ := diag(0, A2,ϑ ), Bϑ := (BT
1,ϑ , B2,ϑ ) , Cϑ := (C1,ϑ ,C2,ϑ ). Moreover, Cϑ has full rank.
(A10) For any λ , λ ′ ∈ σ (Aϑ ) = σ (A2,ϑ ) ∪ {0} and any k ∈ Z\{0}: λ − λ ′ 6= 2π k/h (Kalman-Bertram
criterion).
Remark 2.1.
(i) (A1) and (A2) are standard assumptions for QML estimation.
(ii) Assumption (A3)-(A4) are sufficient assumptions to guarantee that there exists a stationary
solution Yst,ϑ of the state space model (2.2).
(iii) Due to assumption (A5) the state space representation of Yst,ϑ in (2.2) with A2,ϑ ∈ MN−c,N−c (R),
B2,ϑ ∈ Md−c,m (R) and C2,ϑ ∈ Md,N−c (R) is unique up to a change of basis.
(iv) We require that c respectively the cointegration rank r = d − c is known in advance to be able to
estimate the model adequately. In reality, it is necessary to estimate first the cointegration rank
r and obtain from this c = d − r.
(v) Using the notation in (A9) it is possible to show that Yϑ is the solution of the state space model
(Aϑ , Bϑ ,Cϑ , Lϑ ). Furthermore, on account of (A5) and (A6) the state space model (Aϑ , Bϑ ,Cϑ )
is minimal with McMillian degree N (see [13, Lemma 2.4]) and hence, as well unique up to a
(h)
(h)
change of basis. That in combination with (A10) is sufficient that Yϑ := (Yϑ (k))k∈N0 :=
(Yϑ (kh))k∈N0 is a solution of a discrete-time state space model with McMillian degree N as
well.
⊥ is not uniquely defined. However, we assume that we have an unique map ϑ 7→
(vi) Usually C1,
1
ϑ1
⊥
C1,ϑ1 which is as well three times differentiable..
Furthermore, we assume that the parameter space Θ is a product space of the form Θ = Θ1 ×Θ2 with
Θ1 ⊂ Rs1 and Θ2 ⊂ Rs2 , and ϑ = (ϑ1T , ϑ2T )T is a s-dimensional parameter vector where ϑ1 ∈ Θ1 and
ϑ2 ∈ Θ2 . The idea is that ϑ1 is the s1 -dimensional vector of long-run parameters modelling the cointegration space and hence, responsible for the cointegration of Yϑ whereas ϑ2 is the s2 -dimensional
vector of short-run parameters which has no influence on the cointegration of the model. Since the
matrix C1,ϑ is responsible for the cointegration property (cf. [13, Theorem 3.2]) we parameterize C1,ϑ
with the sub-vector ϑ1 and use for all the other matrices ϑ2 . In summary we parameterize the matrices
with the following sub-vectors (A2,ϑ2 , B1,ϑ2 , B2,ϑ2 ,C1,ϑ1 ,C2,ϑ2 , Lϑ2 ) for (ϑ1 , ϑ2 ) ∈ Θ1 × Θ2 = Θ.
2.2 Linear and pseudo-innovations
In this section, we define the pseudo-innovations which are essential to define the QML function.
Sampling at distance h > 0 maps the class of continuous-time state space models to discrete-time state
space models. These class of state space models are not in innovation form and hence, we use a result
from Fasen and Scholz [13] to calculate the linear innovations by the Kalman filter. The Kalman
filter constructs the linear innovations as εϑ∗ (k) = Yϑ (kh) − Pk−1Yϑ (kk) where Pk is the orthogonal
projection onto span{Yϑ (lh) : −∞ < l ≤ k}. Thus, εϑ∗ (k) is orthogonal to the Hilbert space generated
by span{Yϑ (lh), −∞ < l < k} where the closure is taken in the Hilbert space of square-integrable
random variables with inner product (Z1 , Z2 ) 7→ E(Z1T Z2 ). In our setting the linear innovations are as
follows.
6
(h)
Definition 2.2. Let Ωϑ be the unique solution of the discrete-time algebraic Riccati equation
(h)
(h)
(h)
T
(h)
Ωϑ =eAϑ h Ωϑ eAϑ h − eAϑ h Ωϑ CϑT Cϑ Ωϑ CϑT
where
(h)
Σϑ
(h)
=
Z h
0
B1,ϑ ΣϑL BT1,ϑ
T
and Kϑ = eAϑ h Ωϑ CϑT Cϑ Ωϑ CϑT
novations
of
εϑ∗
= (εϑ∗ (k))k∈N
eA2,ϑ u B2,ϑ ΣϑL BT1,ϑ
T
B1,ϑ ΣLϑ BT2,ϑ eA2,ϑ u eA2,ϑ u B2,ϑ ΣϑL BT2,ϑ eA2,ϑ u
(h)
(h)
−1
(h)
(h) T
Cϑ Ωϑ eAϑ h + Σϑ ,
(h)
of Yϑ
−1
!
du,
be the steady-state Kalman gain matrix. Then the linear in(h)
:= (Yϑ (k))k∈N := (Yϑ (kh))k∈N are the unique stationary solution
(h)
(h) (h)
Xϑ∗ (k) = (eAϑ h − Kϑ Cϑ )Xϑ∗ (k − 1) + Kϑ Yϑ (k − 1),
(h)
εϑ∗ (k) = Yϑ (k) −Cϑ Xϑ∗ (k).
(h)
(h)
Moreover, Vϑ = E(εϑ∗ (1)εϑ∗ (1)T ) = Cϑ Ωϑ CϑT is the prediction covariance matrix of the Kalman
filter.
More details on the well-definedness of this definition can be found in Fasen and Scholz [13]. In our
case of a cointegrated process Y the process (Xϑ∗ (k))k∈N is non-stationary in contrast to the stationary
process (εϑ∗ (k))k∈N . We obtain recursively
(h)
k−1
(h)
(h) (h)
(h)
εϑ∗ (k) = Yϑ (k) −Cϑ (eAϑ h − Kϑ Cϑ )k−1 Xϑ∗ (1) − ∑ Cϑ (eAϑ h − Kϑ Cϑ ) j−1 Kϑ Yϑ (k − j).
j=1
(h)
Since all eigenvalues of (eAϑ h − Kϑ Cϑ ) lie inside the unit circle (see Scholz [35, Lemma 4.6.7]) the
j−1 (h) j
(h)
function L(z, ϑ ) = Id −Cϑ ∑∞j=1 eAϑ h − Kϑ Cϑ
Kϑ z for z ∈ C is well-defined and due to Fasen
and Scholz [13, Lemma 5.6] has the representation as
⊥T
L(z, ϑ ) = −α (ϑ )C1,
ϑ z + k(z, ϑ )(1 − z)
(h)
(h)
Aϑ h −K C )i K
for some linear filter k(z, ϑ ) = Id − ∑∞j=1 K j (ϑ )z j with K j (ϑ ) = ∑∞
ϑ
i= j Cϑ (e
ϑ
ϑ in Md,d (R)
and a matrix α (ϑ ) ∈ Md,d−c (R) with full rank d − c. This representation of L(z, ϑ ) helps us to
choose the initial condition in the Kalman recursion appropriate so that the linear innovations are
really stationary. Therefore,
it is important to know that the stationary process Yst,ϑ can be deRt
fst,ϑ (t − s) dLϑ (s), t ∈ R, with fst,ϑ (u) = C2,ϑ eA2,ϑ u B2,ϑ 1[0,∞) (u) and
fined on R as Yst,ϑ (t) = −∞
Lϑ (−t−) for t < 0 with
the Levy process (Lϑ (t))t∈R is defined on the negative real-line as Lϑ (t) = e
(h)
e
an independent copy (Lϑ (t))t≥0 of (Lϑ (t))t≥0 . Then we have an adequate definition of ∆Yϑ (k) :=
R kh
(h)
(h)
(h)
Yϑ (k) − Yϑ (k − 1) for negative values as well as ∆Yϑ (k) = −∞
f∆,ϑ (kh − s) dLϑ (s), k ∈ Z, with
f∆,ϑ (u) = fst,ϑ (u) − fst,ϑ (u − h) +C1,ϑ B1,ϑ 1[0,h) (u). As notation we use B for the backshift operator
(h)
(h)
satisfying BYϑ (k) = Yϑ (k − 1).
Lemma 2.3. Let Assumption A hold. Then
(h)
(h)
εϑ∗ (k) = −Π(ϑ )Yϑ (k − 1) + k(B, ϑ )∆Yϑ (k),
7
k ∈ N,
(h)
(h)
(h)
∞
⊥ T and k(B, ϑ )∆Y
where Π(ϑ ) = α (ϑ )C1,
ϑ
ϑ (k) = ∆Yϑ (k) − ∑ j=1 K j (ϑ )∆Yϑ (k − j). The matrix
sequence (K j (ϑ )) j∈N is uniformly exponentially bounded, i.e. there exist positive constants c and
0 < ρ < 1 such that supϑ ∈Θ kK j (ϑ )k ≤ cρ j , j ∈ N.
Proof. It remains to show that (K j (ϑ )) j∈N is uniformly exponentially bounded. The proof follows in
(h)
the same line as Schlemm and Stelzer [34, Lemma 2.6] using that all eigenvalues of (eAϑ h − Kϑ Cϑ )
lie inside the unit circle (cf. Scholz [35, Lemma 4.6.7]).
(h)
(h)
Due to Π(ϑ )Yϑ (k − 1) = Π(ϑ )Yϑ ,st (k − 1) we receive
(h)
(h)
εϑ∗ (k) = −Π(ϑ )Yϑ ,st (k − 1) + k(B, ϑ )∆Yϑ (k).
(h)
From this representation we see nicely that (εϑ∗ (k))k∈N is indeed a stationary process. Defining Yϑ
on the negative integers as
k−1
(h)
(h)
(h)
Yϑ (−k) = C1,ϑ Z +Yst,ϑ (0) − ∑ ∆Yϑ (− j) = C1,ϑ Z + Lϑ (−kh) +Yst,ϑ (−k)
j=0
(h)
for k ∈ N0 ,
(h) (h)
we use as initial condition in the Kalman recursion Xϑ∗ (1) = ∑∞j=0 (eAϑ h − Kϑ Cϑ ) j Kϑ Yϑ (− j) so
that
(h)
(h)
(h) (h)
εϑ∗ (k) = Yϑ (k) − ∑∞j=1 Cϑ (eAϑ h − Kϑ Cϑ ) j−1 Kϑ Yϑ (k − j).
Definition 2.4. The pseudo-innovations are defined for k ∈ N as
(h)
(h)
(h)
εk (ϑ ) = −Π(ϑ )Yk−1 + k(B, ϑ )∆Yk
∞
(h)
(h)
(h) (h)
= Yk − ∑ Cϑ (eAϑ h − Kϑ Cϑ ) j−1 Kϑ Yk− j .
j=1
(h)
For ϑ = ϑ 0 the pseudo-innovations (εk (ϑ 0 ))k∈N are the linear-innovations (εϑ∗ 0 (k))k∈N .
Lemma 2.5. Let Assumption A hold.
(h)
(h)
(a) The matrix functions Π(ϑ ), k(z, ϑ ), Vϑ and (Vϑ )−1 are Lipschitz continuous on Θ and three
times partial differentiable.
(h)
(b) supϑ ∈Θ k(Vϑ )−1 k ≤ C.
(h)
(c) infϑ ∈Θ σmin ((Vϑ )−1 ) > 0.
Proof. (a) is a consequence of Assumption A and [35, Lemma 5.9.3]. However, [35, Lemma 5.9.3]
shows only the twice continuous differentiability but the proof of the existence of the third partial
differential is analog.
(b) follows from (a) and the compactness of Θ.
(h)
(c) Due to [35, Lemma 5.9.1] the matrix (Vϑ )−1 is non-singular. Thus, we can conclude the statement
from (a) and the compactness of Θ.
Thus, the pseudo innovations are three times differentiable and we receive an analog version of
Lemma 2.3.
8
Lemma 2.6. Let Assumption A hold and let u, v ∈ {1, . . . , s}. Then the following results hold.
(i) The matrix sequence (∂v K j (ϑ )) j∈N in Md,d (R) is uniformly exponentially bounded such that
(h)
(h)
(h)
∂v εk (ϑ ) = −∂v Π(ϑ )TYk−1 − ∑∞j=1 ∂v K j (ϑ )∆Yk− j .
(ii) The matrix sequence (∂u,v K j (ϑ )) j∈N in Md,d (R) is uniformly exponentially bounded such that
(h)
(h)
(h)
∂u,v εk (ϑ ) = −∂u,v Π(ϑ )TYk−1 − ∑∞j=1 ∂u,v K j (ϑ )∆Yk− j .
Proof. The proof is analog to Schlemm and Stelzer [34, Lemma 2.11] and recall the representation
given in Lemma 2.3 where (K j (ϑ )) j∈N is an uniformly exponentially bounded matrix sequence.
Finally, we end this subsection with some probabilistic properties of the pseudo-innovations. For
reasons of brevity, we write ∂i1 := ∂ ϑ∂ 1i for the partial derivatives with respect to the ith -component of
the long-run parameter vector ϑ1 ∈ Θ1 , i ∈ {1, . . . , s1 }, and similarly ∂ jst := ∂ ϑ∂ 2 j for the partial deriva-
tives with respect to the jth -component of the short-run parameter vector ϑ2 ∈ Θ2 , j ∈ {1, . . . , s2 }.
Analogously we define ∂i,1j and ∂i,stj , respectively for the second partial derivatives.
Lemma 2.7. Let Assumption A hold and i, j ∈ {1, . . . , s2 }. Then
(h)
(h)
(h)
(a) (εk (ϑ 0 )T , ∂ jst εk (ϑ 0 )T , ∂i,stj εk (ϑ 0 )T )k∈N is a stationary and ergodic sequence.
(h)
(h)
(b) Ekεk (ϑ 0 )k4 < ∞,
(h)
Ek∂ jst εk (ϑ 0 )k4 < ∞
(h)
(c) E(∂ist εk (ϑ 0 )εk (ϑ 0 )T ) = 0d×d
(h)
(h)
and
(h)
Ek∂i,stj εk (ϑ 0 )k4 < ∞.
and
(h)
(h)
E(∂i,stj εk (ϑ 0 )εk (ϑ 0 )T ) = 0d×d .
(h)
(d) E(εk (ϑ 0 )εk (ϑ 0 )T ) = Vϑ0 .
Proof.
(a) Representation (1.2) yields
(h)
(h)
(h)
Π(ϑ 0 )Yk
⊥
= α (ϑ10 , ϑ20 )(C1,
)TYk = Π(ϑ 0 )Yst,k ,
ϑ10
⊥ T (h)
(h)
) Yst,k ,
∂ist Π(ϑ 0 )Yk = ∂ist α (ϑ 0 ) (C1,
ϑ10
(h)
(h)
⊥
∂i,stj Π(ϑ 0 )Yk = ∂i,stj α (ϑ 0 ) (C1,
)TYst,k ,
ϑ0
1
and hence,
(h)
(h)
(h)
εk (ϑ 0 ) = −Π(ϑ 0 )Yst,k−1 + k(B, ϑ )∆Yk ,
(h)
(h)
∞
(h)
∂ist εk (ϑ 0 ) = −∂ist Π(ϑ 0 )TYst,k−1 − ∑ ∂ist Kl (ϑ 0 )∆Yk−l ,
(h)
(h)
l=1
∞
(2.3)
(h)
∂i,stj εk (ϑ 0 ) = −∂i,stj Π(ϑ 0 )TYst,k−1 − ∑ ∂i,stj Kl (ϑ 0 )∆Yk−l .
l=1
These are obviously stationary processes. Fasen and Scholz [13, Proposition 5.8] state already that
(h)
(εk (ϑ 0 ))k∈N is ergodic with finite second moments. The same arguments lead to the ergodicity of
(h)
(h)
(h)
(εk (ϑ 0 )T , ∂ jst εk (ϑ 0 )T , ∂i,stj εk (ϑ 0 )T )k∈N .
(h)
(b) The finite fourth moment of (εk (ϑ 0 ))k∈N and its partial derivatives are consequences of their
9
series representation (2.3) with uniformly exponentially bounded coefficient matrices and the finite
(h)
(h)
fourth moment of Yst,k and ∆Yk due to Assumption (A3) and [25, Proposition 3.30].
(h)
(h)
(c) A consequence of (2.3) is that both ∂ist εk (ϑ 0 ) and ∂i,stj εk (ϑ 0 ) are elements of the Hilbert
(h)
(h)
space generated by {Yl , −∞ < l < k}. But εk (ϑ 0 ) is orthogonal to the Hilbert space generated by
(h)
{Yl , −∞ < l < k} so that the statements follow.
(d) is a conclusion of the construction of the linear innovations by the Kalman filter.
2.3 Quasi-maximum likelihood estimation
We estimate the model parameters via an adapted quasi-maximum likelihood estimation method. Minus two over n times the logarithm of the pseudo-Gaussian likelihood function is given by
(h)
Ln (ϑ ) =
i
1 n h
(h)
(h) −1 (h)
(h)
T
π
+
log
detV
+
ε
ϑ
)
V
ε
ϑ
)
.
d
log
2
(
(
∑
ϑ
ϑ
k
k
n k=1
(h)
The pseudo-innovations εk (ϑ ) are constructed by the infinite past {Y (h) (l) : −∞ < l < k}. However,
(h)
(h)
the infinite past is not known, we only have the finite observations Y1 , . . . ,Yn . Therefore, we have to
(h)
approximate the pseudo-innovations and the likelihood-function. For a starting value Xb1 (ϑ ), which
is usually a deterministic constant, we define recursively the approximate pseudo-innovations as
(h)
(h)
(h) (h)
(h)
Xbk (ϑ ) = (eAϑ h − Kϑ Cϑ )Xbk−1 (ϑ ) + Kϑ Yk−1 ,
(h)
(h)
(h)
b
εk (ϑ ) = Yk −Cϑ Xbk (ϑ ),
and the approximate likelihood-function as
i
n h
(h)
(h) −1 (h)
T
cn(h) (ϑ ) = 1 ∑ d log 2π + log detV (h) + b
b
(
(
ε
ϑ
)
V
ε
ϑ
)
.
L
k
k
ϑ
ϑ
n k=1
Then the QML estimator
T bT T
cn(h) (ϑ )
ϑbn := (ϑbn,1
, ϑn,2 ) := argminϑ ∈Θ L
cn(h) (ϑ ). The estimator
is defined as the minimizer of the pseudo-Gaussian log-likelihood function L
ϑbn,1 estimates the long-run parameter ϑ1 and the estimator ϑbn,2 estimates the short-run parameter ϑ2 .
cn(h) (ϑ ) or Ln(h) (ϑ ) as a conclusion
However, for our asymptotic results it doesn’t matter if we use L
of the next proposition.
Assumption B. For every u, v ∈ {1, . . . , s} we assume that
(h)
(h)
2
2
b
b
E sup kX1 (ϑ )k < ∞, E sup k∂u X1 (ϑ )k < ∞
ϑ ∈Θ
ϑ ∈Θ
(h)
and Xb1 (ϑ ) is independent of (Lϑ (t))t≥0 .
and
(h)
E sup k∂u,v Xb1 (ϑ )k2
ϑ ∈Θ
<∞
Proposition 2.8. Let Assumption A and B hold. Moreover, let γ < 1 and u, v ∈ {1, . . . , s}. Then
p
cn(h) (ϑ ) − Ln(h) (ϑ )| −−
(a) nγ supϑ ∈Θ |L
→ 0,
10
cn(h) (ϑ ) − ∂u Ln(h) (ϑ )| −−p→ 0,
(b) nγ supϑ ∈Θ |∂u L
cn(h) (ϑ ) − ∂u,v Ln(h) (ϑ )| −−p→ 0.
(c) nγ supϑ ∈Θ |∂u,v L
The proof of this proposition is similarly to the proof of [33, Lemma 2.7 and Lemma 2.15]. However,
(h)
(h)
they are some essential differences since in their paper (Yk )k∈N and (εk (ϑ ))k∈N are stationary
sequences where in our setup they are non-stationary. Furthermore, we require different convergence
rates. A detailed proof can be found in Appendix B.
We split now the pseudo-innovation sequence based on the decomposition ϑ = (ϑ1T , ϑ2T )T so that
one part is stationary and depends only ϑ2 :
(h)
(h)
(h)
εk (ϑ ) = εk,1 (ϑ ) + εk,2 (ϑ ),
(h)
(h)
(h)
(2.4)
εk,1 (ϑ ) := − Π(ϑ1 , ϑ2 ) − Π(ϑ10 , ϑ2 ) Yk−1 + k(B, ϑ1 , ϑ2 ) − k(B, ϑ10 , ϑ2 ) ∆Yk
where
(h)
(h)
(h)
(h)
εk,2 (ϑ ) := εk,2 (ϑ2 ) = −Π(ϑ10 , ϑ2 )Yk−1 + k(B, ϑ10 , ϑ2 )∆Yk .
and
Due to similar calculations as in (2.3) we receive that the process
(h)
(h)
(h)
εk,2 (ϑ2 ) = −Π(ϑ10 , ϑ2 )Yst,k−1 + k(B, ϑ10 , ϑ2 )∆Yk ,
(2.5)
k ∈ N,
(h)
is indeed stationary. Moreover, εk,1 (ϑ10 , ϑ2 ) = 0 for any ϑ2 ∈ Θ2 and k ∈ N. Finally, we separate the
(h)
log-likelihood function Ln (ϑ ) in
(h)
(h)
(h)
Ln (ϑ ) = Ln,1 (ϑ ) + Ln,2 (ϑ2 ),
where
(h)
(h)
(h)
Ln,1 (ϑ ) := Ln (ϑ1 , ϑ2 ) − Ln (ϑ10 , ϑ2 )
(h)
(h)
= log detVϑ − log detVϑ 0 ,ϑ +
1
2
1 n (h)
(h) −1 (h)
εk,1 (ϑ )T Vϑ
εk,1 (ϑ )
∑
n k=1
2
1 n (h)
(h) −1 (h)
(h)
(h) −1 (h)
T
ε
ϑ
)
V
ε
ϑ
εk,2 (ϑ2 )T Vϑ
εk,2 (ϑ2 )
(
(
)
+
2
∑
∑
k,1
k,2
ϑ
n k=1
n k=1
1 n (h)
(h) −1 (h)
εk,2 (ϑ2 ),
− ∑ εk,2 (ϑ2 )T Vϑ 0 ,ϑ
1 2
n k=1
1 n (h)
(h)
(h)
(h)
(h) −1 (h)
εk,2 (ϑ2 ).
Ln,2 (ϑ2 ) := Ln (ϑ10 , ϑ2 ) = d log 2π + log detVϑ 0 ,ϑ + ∑ εk,2 (ϑ2 )T Vϑ 0 ,ϑ
1 2
1 2
n k=1
n
+
(h)
(h)
Obviously, Ln,2 (ϑ2 ) depends only on the short-run parameters whereas Ln,1 (ϑ ) depends on all
parameters. Furthermore, we have the following relations:
(h)
Ln,1 (ϑ10 , ϑ2 ) = 0
(h)
and
(h)
(h)
Ln (ϑ10 , ϑ2 ) = Ln,2 (ϑ2 ) for any ϑ2 ∈ Θ2 .
(h)
(2.6)
This immediately implies Ln (ϑ 0 ) = Ln,2 (ϑ20 ). In the remaining of the paper we will see that the
(h)
asymptotic properties of ϑbn,1 are determined by L (ϑ ) whereas the asymptotic properties of ϑbn,2
n,1
11
(h)
(h)
are completely determined by Ln,2 (ϑ2 ). Since Ln,2 (ϑ2 ) is based only on stationary processes it
is not surprising that ϑbn,2 exhibits the same asymptotic properties as QML estimators for stationary
processes.
2.4 Identifiability
In order to properly estimate our model, we need a unique minimum of the likelihood function and
therefore we need some identifiability criteria for the family of stochastic processes (Yϑ , ϑ ∈ Θ). The
first assumption guarantees the uniqueness of the long-run parameter ϑ10 .
⊥T C k ≥ ckϑ − ϑ 0 k for ϑ ∈ Θ.
Assumption C. There exist a constant c > 0 so that kC1,
1
1
ϑ1 1
Remark 2.9.
⊥T C k has a zero in ϑ 0 but not that kC ⊥T C k =
(i) Without Assumption C we have only that kC1,
ϑ1 1
1
1,ϑ1 1 6 0
0
⊥T
0
for ϑ1 6= ϑ1 . In particular, C1,ϑ1 C1 6= 0(d−c)×c for ϑ1 6= ϑ1 implies that the space spanned by C1
and C1,ϑ1 are not the same.
⊥T and C ⊥T C = 0
⊥T
(ii) Due to the Lipschitz-continuity of C1,
(d−c)×c the upper bound kC1,ϑ1 C1 k ≤
ϑ1
1,ϑ 0 1
1
Ckϑ1 − ϑ10 k is valid as well.
⊥T C B k > 0 for ϑ 0 6= ϑ since
(iii) Note that Assumption C implies that kΠ(ϑ )C1 B1 k = kα (ϑ )C1,
1
1
ϑ1 1 1
(h)
α (ϑ ) and B1 have full rank, and thus, the process εk,1 (ϑ ) k∈N is indeed non-stationary for all
long-run parameters ϑ1 6= ϑ10 .
(iv) The matrix function α (ϑ ) is continuous and has full column rank d − c so that necessarily
infϑ ∈Θ σmin (α (ϑ )) > 0. Applying Bernstein [5, Corollary 9.6.7] gives for some C > 0
⊥T
0
kΠ(ϑ )C1 k ≥ inf {σmin (α (ϑ ))} kC1,
ϑ1 C1 k ≥ Ckϑ1 − ϑ1 k.
ϑ ∈Θ
The next assumption guarantees the uniqueness of the short-run parameter ϑ20 .
Assumption D. For any ϑ20 6= ϑ2 ∈ Θ2 there exists a z ∈ C such that either
h
h
i−1 (h)
i−1 (h)
(h)
(h)
K
or Vϑ 0 ,ϑ 6= V (h) .
Kϑ 0 ,ϑ 6= C IN − eAh − K (h)C z
Cϑ 0 ,ϑ2 IN − eAϑ2 h − Kϑ 0 ,ϑ Cϑ 0 ,ϑ2 z
1
1
2
1
1
2
1
2
(h)
Lemma 2.10. Let Assumption A and D hold. The function L2 : Θ2 → R defined by
(h) −1 (h)
(h)
(h)
(h)
ε1,2 (ϑ2 )
L2 (ϑ2 ) := d log(2π ) + log detVϑ 0 ,ϑ + E ε1,2 (ϑ2 )T Vϑ 0 ,ϑ
1
2
1
2
(2.7)
has a unique global minimum at ϑ20 .
Proof. The proof is analogous to the proof of Lemma 2.10 in Schlemm and Stelzer [34].
(h)
Without the additional Assumption D we obtain only that L2 (ϑ2 ) has a minimum in ϑ20 but not the
uniqueness.
Due to Fasen and Scholz [13, Theorem 3.1] a canonical form for cointegrated state space processes
already exists and can be used to construct a model class satisfying Assumption C and Assumption D.
Further details are presented in [12].
12
3 Consistency of the QML estimator
In order to show the consistency of the QML estimator, we follow the ideas of Saikkonen [30]. Thus,
we prove the consistency in three steps. In the first step, we prove the consistency of the long-run
QML estimator ϑbn,1 and next we determine its consistency rate. Thirdly, we prove the consistency of
the short-run QML estimator ϑbn,2 by making use of the consistency rate of the long-run QML estimator. Throughout the rest of this paper we assume that Assumption A - D always hold. Furthermore,
we denote by (W (r))0≤r≤1 = ((W1 (r)T ,W2 (r)T ,W3 (r)T )T )0≤r≤1 a (2d + m)-dimensional Brownian
motion with covariance matrix
!
T
Z h
ΣL
ΣL eA2 u
duψ (1)T
(3.1)
ΣW = ψ (1)
Tu
A
u
A
u
T
A
2
2
2
e B 2 ΣL e B 2 ΣL B 2 e
0
where
C1 B1
C2
,
ψ0 := 0d×m
C2
Im×m 0m×N−c
∞
ψ (z) =
∑ ψ jz j,
z ∈ C,
j=0
0d×m C2 (eA2 h j − eA2 h( j−1) )
, j ≥ 1,
ψ j = 0d×m
C2 eA2 h j
Im×m
0m×N−c
(3.2)
(Wi (r))0≤r≤1 , i = 1, 2, are d-dimensional Brownian motions and (W3 (r))0≤r≤1 is an m-dimensional
Brownian motion.
3.1 Consistency of the long-run QML estimator
To show the consistency for the long-run parameter it suffices to show the following theorem where
B(ϑ10 , δ ) := {ϑ1 ∈ Θ1 : kϑ1 − ϑ10 k ≤ δ } denotes the closed ball with radius δ around ϑ10 , and
B(ϑ10 , δ ) := Θ1 \B(ϑ10 , δ ) denotes its complement.
Theorem 3.1. For any δ > 0 we have
lim P
inf
n→∞
cn(h) (ϑ 0 ) > 0 = 1.
cn(h) (ϑ ) − L
L
ϑ ∈B(ϑ10 ,δ )×Θ2
Corollary 3.2. In particular, ϑbn,1 − ϑ10 = o p (1).
3.1.1 Proof of Theorem 3.1
The following lemmata are important for the proof of the theorem.
(h)
Lemma 3.3. Let L(h) := (Lk )k∈Z := (L(kh))k∈Z and define
(h)
Ln,1,1 (ϑ ) :=
(h)
i
1 n h
(h) −1
(h) T
(h)
Vϑ
Π(ϑ )C1 B1 Lk−1 ,
Π(ϑ )C1 B1 Lk−1
∑
n k=1
(h)
(h)
Ln,1,2 (ϑ ) := Ln,1 (ϑ ) − Ln,1,1 (ϑ ).
(h)
Then |Ln,1,2 (ϑ )| ≤ Ckϑ1 − ϑ10 kUn for ϑ ∈ Θ with Un = 1 + Vn + Wn = O p (1), and Un and Vn are
defined as in Proposition A.3.
13
Proof. Define
(h)
(h)
(h)
εk,1,1 (ϑ ) := − Π(ϑ1 , ϑ2 ) − Π(ϑ10 , ϑ2 ) C1 B1 Lk−1 = −Π(ϑ1 , ϑ2 )C1 B1 Lk−1 ,
(h)
(h)
(h)
εk,1,2 (ϑ ) := εk,1 (ϑ ) − εk,1,1 (ϑ )
(h)
(h)
= − Π(ϑ1 , ϑ2 ) − Π(ϑ10 , ϑ2 ) Yst,k−1 + k(B, ϑ1 , ϑ2 ) − k(B, ϑ10 , ϑ2 ) ∆Yk .
(h)
(h)
(h)
(h)
Then (εk,1,2 (ϑ ))k∈N is a stationary sequence and εk,1 (ϑ ) = εk,1,1 (ϑ ) + εk,1,2 (ϑ ). First, note that
(h)
(h)
(h)
Ln,1,2 (ϑ ) = log detVϑ1 ,ϑ2 − log detVϑ 0 ,ϑ +
1
2
2 n (h)
(h) −1 (h)
(h)
εk,1,1 (ϑ )T Vϑ
[εk,2 (ϑ2 ) + εk,1,2 (ϑ )]
∑
n k=1
1 n (h)
(h)
(h)
(h) −1
εk,1,2 (ϑ )T Vϑ
[2εk,2 (ϑ2 ) + εk,1,2 (ϑ )]
∑
n k=1
1 n (h)
(h) −1
(h)
(h) −1
εk,2 (ϑ2 ).
− Vϑ 0 ,ϑ
+ ∑ εk,2 (ϑ2 )T Vϑ
1 2
n k=1
+
In the following we use Bernstein [5, (2.2.27) and Corollary 9.3.9] to get the upper bound
1 n (h)
(h)
(h) −1 (h)
[εk,2 (ϑ ) + εk,1,2 (ϑ )]
εk,1,1 (ϑ )T Vϑ
∑
n k=1
1 n (h)
(h) −1 (h)
(h)
[εk,2 (ϑ ) + εk,1,2 (ϑ )]
tr εk,1,1 (ϑ )T Vϑ
∑
n k=1
!
n
(h) −1 1
(h)
(h)
(h)
= tr Vϑ
∑ [εk,2 (ϑ ) + εk,1,2 (ϑ )]εk,1,1 (ϑ )T
n k=1
=
(h) −1
≤ k(Vϑ
k
1 n (h)
(h)
(h)
∑ [εk,2 (ϑ ) + εk,1,2 (ϑ )]εk,1,1 (ϑ )T .
n k=1
Similarly we find upper bounds for the other terms. Moreover, due to Lemma 2.5 (b)
(h)
(h)
(h)
|Ln,1,2 (ϑ )| ≤ | log detVϑ1 ,ϑ2 − log detVϑ 0 ,ϑ | +C
1
2
1 n (h)
(h)
(h)
[εk,2 (ϑ ) + εk,1,2 (ϑ )]εk,1,1 (ϑ )T
∑
n k=1
+C
1 n
(h)
(h)
(h)
[2εk,2 (ϑ ) + εk,1,2 (ϑ )]εk,1,2 (ϑ )T
∑
n k=1
+C
Vϑ1 ,ϑ2
(h)
−1
(h)
− Vϑ 0 ,ϑ
1
2
−1
1 n (h)
(h)
∑ εk,2 (ϑ2 )εk,2 (ϑ2 )T .
n k=1
Since Vϑ−1 and log detVϑ are Lipschitz continuous by Lemma 2.5(a), we obtain
(h)
|Ln,1,2 (ϑ )| ≤ C kϑ1 − ϑ10 k +
1 n (h)
(h)
(h)
∑ [εk,2 (ϑ ) + εk,1,2 (ϑ )]εk,1,1 (ϑ )T
n k=1
14
(3.3)
1 n
1 n (h)
(h)
(h)
(h)
(h)
+
[2εk,2 (ϑ ) + εk,1,2 (ϑ )]εk,1,2 (ϑ )T + kϑ1 − ϑ10 k
∑
∑ εk,2 (ϑ2 )εk,2 (ϑ2 )T
n k=1
n k=1
!
.
Moreover, Π(ϑ ) is Lipschitz continuous as well (see Lemma 2.5(a)) and the sequence of matrix functions (K j (ϑ )) j∈N and (∇ϑ K j (ϑ )) j∈N are exponentially bounded (see Lemma 2.3 and Lemma 2.6).
(h)
Due to (A.4) and εk,1,1 (ϑ10 , ϑ2 ) = 0 we receive
1 n (h)
(h)
(h)
∑ [εk,2 (ϑ ) + εk,1,2 (ϑ )]εk,1,1 (ϑ )T ≤ Ckϑ1 − ϑ10 kVn
n k=1
(3.4)
(h)
and due to (A.6) and εk,1,2 (ϑ10 , ϑ2 ) = 0
1 n
(h)
(h)
(h)
[2εk,2 (ϑ ) + εk,1,2 (ϑ )]εk,1,2 (ϑ )T ≤ Ckϑ1 − ϑ10 kWn .
∑
n k=1
(3.5)
1 n (h)
(h)
∑ εk,2 (ϑ2 )εk,2 (ϑ2 )T ≤ CWn
n k=1
(3.6)
Finally,
(h)
as well. Then (3.3)-(3.6) result in the upper bound |Ln,1,2 (ϑ )| ≤ Ckϑ1 − ϑ10 k(1 +Vn +Wn ). A direct
consequence of Proposition A.3 is Un = 1 +Vn +Wn = O p (1).
Lemma 3.4.
(h)
(h)
p
(a) supϑ2 ∈Θ2 |Ln,2 (ϑ2 ) − L2 (ϑ2 )| −→ 0 as n → ∞.
(b)
(h)
1
n Ln,1 (ϑ )
R
(h)
−−
→ 01 k(Vϑ )−1/2 Π(ϑ )C1 B1W3 (r)k2 dr and the convergence holds in the space of
continuous functions on Θ with the supremum norm.
w
Proof.
(a) is a consequence of Proposition A.1(a) and the continuous mapping theorem.
(b) First, supϑ ∈Θ | n1 Ln,1,2 (ϑ )| = o p (1) due to Lemma 3.3 and Θ compact. Second, a conclusion of
Proposition A.1(b) and the continuous mapping theorem is that
!
!
1 n (h) (h)T
1 (h)
(h) −1/2
(h) −1/2
T
T T
Π(ϑ )C1 B1
(ϑ ) = tr Vϑ
L
∑ Lk−1Lk−1 B1 C1 Π(ϑ ) Vϑ
n n,1,1
n2 k=1
Z 1
w
(h) −1/2
(h) −1/2
T
T
T T
Π(ϑ )C1 B1
−
−
→ tr Vϑ
W3 (r)W3 (r) dr B1 C1 Π(ϑ ) Vϑ
=
Z 1
0
0
(h)
k(Vϑ )−1/2 Π(ϑ )C1 B1W3 (r)k2 dr,
and the convergence holds in the space of continuous functions on Θ with the supremum norm due
(h)
to the continuity of Π(ϑ ) and (Vϑ )−1 (cf. Lemma 2.5). In the first and in the last equality we used
Bernstein [5, 2.2.27] which allows us to permutate matrices in the trace.
15
Proof of Theorem 3.1. On the one hand, due to Proposition 2.8
inf
ϑ ∈B(ϑ10 ,δ )×Θ2
≥
=
cn(h) (ϑ 0 )
cn(h) (ϑ ) − L
L
inf
ϑ ∈B(ϑ10 ,δ )×Θ2
inf
(h)
(h)
cn(h) (ϑ ) − Ln(h) (ϑ )|
(Ln (ϑ ) − Ln (ϑ 0 )) − 2 sup |L
ϑ ∈B(ϑ10 ,δ )×Θ2
ϑ ∈Θ
(h)
(h)
Ln (ϑ ) − Ln (ϑ 0 ) + o p (1).
On the other hand, due to Lemma 2.10 and Lemma 3.4(a)
(h)
(h)
inf Ln,2 (ϑ2 ) − Ln,2 (ϑ20 )
ϑ2 ∈Θ2
≤
(h)
(h)
(h)
(h)
(h)
(h)
sup |Ln,2 (ϑ2 ) − L2 (ϑ2 )| + inf L2 (ϑ2 ) − L2 (ϑ20 ) + |L2 (ϑ20 ) − Ln,2 (ϑ20 )| = o p (1).
ϑ2 ∈Θ2
ϑ2 ∈Θ2
Using (2.6) and the above results we receive
cn(h) (ϑ 0 ) ≥
cn(h) (ϑ ) − L
L
inf
ϑ ∈B(ϑ10 ,δ )×Θ2
≥
=
(h)
(h)
Ln (ϑ ) − Ln (ϑ 0 ) + o p (1)
inf
ϑ ∈B(ϑ10 ,δ )×Θ2
(h)
(h)
(h)
Ln,1 (ϑ ) + inf Ln,2 (ϑ2 ) − Ln,2 (ϑ20 ) + o p (1)
inf
ϑ ∈B(ϑ10 ,δ )×Θ2
ϑ ∈Θ2
(h)
Ln,1 (ϑ ) + o p (1).
inf
ϑ ∈B(ϑ10 ,δ )×Θ2
Hence, it suffices to show that for any c > 0
lim P
inf
(h)
Ln,1 (ϑ )
ϑ ∈B(ϑ10 ,δ )×Θ2
n→∞
> c = 1.
(3.7)
An application of Lemma 3.4(b) and the continuous mapping theorem yield
1 (h)
w
Ln,1 (ϑ ) −
inf
−
→
0
n
ϑ ∈B(ϑ1 ,δ )×Θ2
inf
ϑ ∈B(ϑ10 ,δ )×Θ2
Z 1
0
(h)
k(Vϑ )−1/2 Π(ϑ )C1 B1W3 (r)k2 dr.
(3.8)
Due to Bernstein [5, Corollary 9.6.7]
Z 1
0
(h)
(h)
k(Vϑ )−1/2 Π(ϑ )C1 B1W3 (r)k2 dr ≥ σmin ((Vϑ )−1 )
Z 1
0
kΠ(ϑ )C1 B1W3 (r)k2 dr.
(3.9)
Moreover,
Z 1
0
kΠ(ϑ )C1 B1W3 (r)k2 dr
Z 1
tr [B1W3 (r)]T [Π(ϑ )C1 ]T [Π(ϑ )C1 ][B1W3 (r)] dr
0
Z 1
T
T
= tr [Π(ϑ )C1 ] [Π(ϑ )C1 ] [B1W3 (r)][B1W3 (r)] dr
=
0
where
we used Bernstein [5, 2.2.27] to permutate the matrices in the trace. The random matrix
R1
T
[B
W
1 3 (r)] [B1W3 (r)] dr is P-a.s. positive definite since B1 and the covariance matrix of W3 have
0
full rank. Hence, there exists an m × m-dimensional symmetric positive random matrix W ∗ with
16
R1
T
0 [B1W3 (r)][B1W3 (r)] dr
Z 1
0
= W ∗W ∗T . Then we obtain similarly as above with Bernstein [5, 2.2.27]
kΠ(ϑ )C1 B1W3 (r)k2 dr = tr [W ∗ ]T [Π(ϑ )C1 ]T [Π(ϑ )C1 ]W ∗ = kΠ(ϑ )C1W ∗ k2 .
Again an application of Bernstein [5, Corollary 9.6.7] and (3.9) yields
Z 1
0
(h)
(h)
k(Vϑ )−1/2 Π(ϑ )C1 B1W3 (r)k2 dr ≥ σmin ((Vϑ )−1 )
(h)
Z 1
0
kΠ(ϑ )C1 B1W3 (r)k2 dr
(3.10)
= σmin ((Vϑ )−1 )kΠ(ϑ )C1W ∗ k2
(h)
≥ σmin ((Vϑ )−1 )σmin W ∗W ∗T kΠ(ϑ )C1 k2
Z 1
(h) −1
T
B1W3 (r)[B1W3 (r)] dr kΠ(ϑ )C1 k2 .
= σmin ((Vϑ ) )σmin
0
R
R1
1
T
T
T
T
Since B1 0 W3 (r)W3 (r) drB1 is P-a.s. positive definite σmin B1 0 W3 (r)W3 (r) drB1 > 0 P-a.s. On
(h)
the one hand, infϑ ∈B(ϑ 0 ,δ )×Θ2 σmin ((Vϑ )−1 ) > 0 due Lemma 2.5. On the other hand, Assumption C
1
(cf. Remark 2.9) implies that infϑ ∈B(ϑ 0 ,δ )×Θ2 kΠ(ϑ )C1 k2 > c2 δ 2 > 0. To conclude
1
inf
ϑ ∈B(ϑ10 ,δ )×Θ2
Z 1
0
(h)
k(Vϑ )−1/2 Π(ϑ )C1 B1W3 (r)k2 dr > 0
(h)
P-a.s.
p
which finally gives with (3.8) that infϑ ∈B(ϑ 0 ,δ )×Θ2 Ln,1 (ϑ ) −→ ∞ and thus, (3.7) is proven.
1
3.2 Super-consistency of the long-run QML estimator
From the previous section we already know that the QML estimator ϑbn,1 for the long-run parameter
is consistent. In the following we will calculate its consistency rate. For 0 ≤ γ < 1 define the set
for n ∈ N
(3.11)
Nn,γ (ϑ10 , δ ) := ϑ1 ∈ Θ1 : kϑ1 − ϑ10 k ≤ δ n−γ
and N n,γ (ϑ10 , δ ) := Θ1 \Nn,γ (ϑ10 , δ ) as its complement.
Theorem 3.5. Let 0 ≤ γ < 1. For any δ > 0 we have
(h)
(h)
0
c
c
Ln (ϑ ) − Ln (ϑ ) > 0 = 1.
lim P
inf
n→∞
ϑ ∈N n,γ (ϑ10 ,δ )×Θ2
Corollary 3.6. In particular, ϑbn,1 − ϑ10 = o p (n−γ ) for 0 ≤ γ < 1.
3.2.1 Proof of Theorem 3.5
The proof uses the next lemma.
Lemma 3.7. Let the notation of Lemma 3.3 hold. Then
(h)
(h)
(h)
(h)
(a) Ln,1,1 (ϑ ) ≥ Cσmin ((Vϑ )−1 )kϑ1 − ϑ10 k2 σmin 1n ∑nk=1 B1 Lk−1 [B1 Lk−1 ]T .
(h)
(h)
(h)
(h)
(b) Ln,1,1 (ϑ ) ≤ Ck(Vϑ )−1 kkϑ1 − ϑ10 k2 tr 1n ∑nk=1 B1 Lk−1 [B1 Lk−1 ]T .
17
Proof.
(a) Several applications of Bernstein [5, Corollary 9.6.7] give similarly as in (3.10)
(h)
Ln,1,1 (ϑ ) =
≥
1 n
(h)
(h)
∑ k(Vϑ )−1/2Π(ϑ )C1 B1Lk−1k2
n k=1
(h)
σmin ((Vϑ )−1 )σmin
!
1 n
(h) T
(h)
∑ B1Lk−1[B1Lk−1] kΠ(ϑ )C1 k2 .
n k=1
An application of Assumption C (cf. Remark 2.9) yields (a).
(b) The submultiplicativity of the norm gives
(h)
Ln,1,1 (ϑ ) =
1 n
(h)
(h)
∑ k(Vϑ )−1/2 Π(ϑ )C1 B1Lk−1k2
n k=1
(h)
≤ k(Vϑ )−1/2 k2 kΠ(ϑ )C1 k2
=
1 n
(h)
∑ kB1 Lk−1k2
n k=1
!
1 n
(h) T
(h)
∑ [B1Lk−1][B1Lk−1] .
n k=1
(h)
k(Vϑ )−1/2 k2 kΠ(ϑ )C1 k2 tr
In the last line we applied Bernstein [5, 2.2.27]. Due to Π(ϑ10 , ϑ2 )C1 = 0d×c we have
(h)
Ln,1,1 (ϑ )
≤
!
1 n
(h) T
(h)
∑ B1Lk−1 [B1Lk−1] .
n k=1
(h)
k(Vϑ )−1 kkΠ(ϑ )C1 − Π(ϑ10 , ϑ2 )C1 k2 tr
Finally, the Lipschitz continuity of Π(ϑ ) and hence of Π(ϑ )C1 yield the statement.
Proof of Theorem 3.5. Due to Proposition 2.8 the lower bound
inf
cn(h) (ϑ 0 ) ≥
cn(h) (ϑ ) − L
n L
ϑ ∈N n,γ (ϑ10 ,δ )×Θ2
≥
inf
(h)
(h)
n Ln (ϑ ) − Ln (ϑ 0 ) + o p (1)
inf
ϑ ∈N n,γ (ϑ10 ,δ )×Θ2
(h)
(h)
(h)
nLn,1 (ϑ ) + inf n Ln,2 (ϑ2 ) − Ln,2 (ϑ20 ) + o p (1)
ϑ ∈N n,γ (ϑ10 ,δ )×Θ2
ϑ ∈Θ2
(h)
holds. We investigate now the second term. Note that Ln,2 (ϑ2 ) depends only on the short-run pa(h)
rameter. Therefore, we take the infeasible estimator ϑbst := arg min
L (ϑ2 ) for the short-run
ϑ2 ∈Θ2
n,2
(h)
n,2
parameter ϑ20 minimizing Ln,2 (ϑ2 ). For this reason, we can interpret this as a „classical“ stationary
(h)
estimation problem. Applying a Taylor-expansion of nLn,2 around ϑ20 yields
√
√
(h)
(h)
(h)
st
st
n · Ln,2 (ϑbn,2
n∇ϑ2 Ln,2 (ϑ n,2 ) · n(ϑbn,2
) − Ln,2 (ϑ20 ) =
− ϑ20 )
st − ϑ 0 k. Since √n∇ L (h) (ϑ
for an appropriate intermediate value ϑ n,2 ∈ Θ2 with kϑ n,2 − ϑ20 k ≤ kϑbn,2
ϑ2 n,2
n,2 )
2
√ bst
0
and n(ϑn,2 − ϑ2 ) are asymptotically normally distributed (these are special and easier calculations
(h)
st ) − L (h) (ϑ 0 ) = O (1). Finally,
as in Section 4.2) we can conclude n · Ln,2 (ϑbn,2
p
2
n,2
inf
cn(h) (ϑ 0 ) ≥
cn(h) (ϑ ) − L
n· L
ϑ ∈N n,γ (ϑ10 ,δ )×Θ2
18
inf
(h)
n · Ln,1 (ϑ ) + O p (1).
ϑ ∈N n,γ (ϑ10 ,δ )×Θ2
Thus, if we can show that
p
(h)
sup
ϑ ∈N n,γ (ϑ10 ,δ )×Θ2
(3.12)
nLn,1 (ϑ ) −−→ ∞,
then for any c > 0
lim P
n→∞
(h)
(h)
0
c
c
Ln (ϑ ) − Ln (ϑ ) > 0
inf
ϑ ∈N n,γ (ϑ10 ,δ )×Θ2
≥ lim P
n→∞
inf
ϑ ∈N n,γ (ϑ10 ,δ )×Θ2
(h)
(h)
0
c
c
n Ln (ϑ ) − Ln (ϑ ) > c = 1.
Before we prove (3.12) we first note that due to Equation (3.7) we only have to consider the set
M n,γ (ϑ10 , δ1 ) := N n,γ (ϑ10 , δ1 ) ∩ B(ϑ10 , δ1 ) ⊆ Θ1 ∩ B(ϑ10 , δ1 )
(h)
for n large enough instead of the whole set N n,γ (ϑ10 , δ1 ) in the infimum. Note that infϑ ∈Θ σmin ((Vϑ )−1 ) >
0 by Lemma 2.5. Then Lemma 3.3 and Lemma 3.7 give the lower bound
(h)
(h)
(h)
Ln,1 (ϑ ) ≥ Ln,1,1 (ϑ ) − |Ln,1,2 (ϑ )|
≥
≥ Cnkϑ1 − ϑ10 k2 σmin
|
Finally,
inf
ϑ ∈M n,γ (ϑ10 ,δ )×Θ2
!
1 n
(h) T
(h)
∑ B1Lk−1[B1Lk−1] −Ckϑ1 − ϑ10 kUn
n k=1
!
!
1
1 n
(h) T
(h)
∑ B1Lk−1[B1Lk−1] − nkϑ1 − ϑ 0k Un .
n2 k=1
1
{z
}
(h)
Cσmin ((Vϑ )−1 )kϑ1 − ϑ10 k2 σmin
(h)
nLn,1 (ϑ )
=:Zn (ϑ )
inf
≥
ϑ ∈Mn,γ (ϑ10 ,δ )×Θ2
≥ Cn2−2γ
inf
Cn2 kϑ1 − ϑ10 k2
ϑ ∈M n,γ (ϑ10 ,δ )×Θ2
!
Zn (ϑ )
Zn (ϑ ).
Due to Proposition A.1(b) and Lemma 3.3 we receive
Z 1
w
T
T
inf
→ σmin B1
Zn (ϑ ) −−
W3 (r)W3 (r) drB1 > 0
ϑ ∈M n,γ (ϑ10 ,δ )×Θ2
inf
ϑ ∈M n,γ (ϑ10 ,δ )×Θ2
!
P-a.s.
0
(h)
p
Thus, finally supϑ ∈Mn,γ (ϑ 0 ,δ )×Θ2 nLn,1 (ϑ ) −−→ ∞ for 0 ≤ γ < 1.
1
3.3 Consistency of the short-run QML estimator
Next, we consider the consistency of the short-run parameter estimator ϑbn,2 with the help of the order
of consistency of the long-run parameter estimator ϑbn,1 which we determined in Corollary 3.6. We
show a sufficient condition given by the next theorem. Therefore define for δ > 0 the set B(ϑ20 , δ ) :=
{ϑ2 ∈ Θ2 : kϑ2 − ϑ20 k ≤ δ } as closed ball with radius δ around ϑ20 and B(ϑ20 , δ ) := Θ2 \B(ϑ20 , δ ) as
19
its complement.
Theorem 3.8. Then for any δ > 0 we have
(h)
(h)
0
c
c
lim P
inf
Ln (ϑ ) − Ln (ϑ ) > 0 = 1.
ϑ ∈Θ1 ×B(ϑ20 ,δ )
n→∞
Corollary 3.9. In particular, ϑbn,2 − ϑ20 = o p (1).
3.3.1 Proof of Theorem 3.8
Again we prove some auxiliary results before we state the proof of the theorem.
Lemma 3.10. For
1
2
< γ < 1, δ1 > 0 and ε > 0 we have
(h)
lim P
sup
|Ln,1 (ϑ )| ≤ ε = 1.
n→∞
ϑ ∈Nn,γ (ϑ10 ,δ1 )×Θ2
Proof. Due to Lemma 3.3 and Lemma 3.7 we have the upper bound
(h)
(h)
(h)
|Ln,1 (ϑ )| ≤ |Ln,1,1 (ϑ )| + |Ln,1,2 (ϑ )|
≤
(h)
Ck(Vϑ )−1 kkϑ1 − ϑ10 k2 tr
!
1 n
(h)
(h) T
∑ B1Lk−1[B1Lk−1] +Ckϑ1 − ϑ10 kUn.
n k=1
Then, using Lemma 2.5 results in
sup
ϑ ∈Nn,γ (ϑ10 ,δ1 )×Θ2
(h)
Ln,1 (ϑ )
1−2γ
≤ C δ1 n
tr
!
1 n
(h) T
(h)
∑ B1Lk−1[B1Lk−1 ] +Cδ1n−γ Un .
n2 k=1
(3.13)
Since Un = O p (1) by Lemma 3.3 and
!
Z1
1 n
w
(h)
(h) T
T
T
tr
∑ B1Lk−1[B1Lk−1] −−→ tr B1 0 W3 (r)W3 (r) drB1 > 0 P-a.s.
n2 k=1
by Proposition A.1(b) and the continuous mapping theorem, the right hand side of (3.13) converges
to 0 in probability if 12 < γ < 1. This proves the lemma.
Lemma 3.11. For any δ > 0 and ε > 0 we have
(h)
(h)
0
lim P
inf Ln,2 (ϑ2 ) − Ln,2 (ϑ2 ) > ε = 1.
ϑ2 ∈B(ϑ20 ,δ )
n→∞
Proof. We have
(h)
(h)
Ln,2 (ϑ2 ) − Ln,2 (ϑ20 )
inf
ϑ2 ∈B(ϑ20 ,δ )
≥
inf
ϑ2 ∈B(ϑ20 ,δ )
(h)
(h)
Ln,2 (ϑ2 ) − L2 (ϑ2 ) +
20
inf
ϑ2 ∈B(ϑ20 ,δ )
(h)
(h)
−Ln,2 (ϑ20 ) + L2 (ϑ20 )
+
inf
ϑ2 ∈B(ϑ20 ,δ )
(h)
(h)
L2 (ϑ2 ) − L2 (ϑ20 ) .
On the one hand, the first two terms converge to zero in probability due to Lemma 3.4(a) and the con
(h)
(h)
(h)
tinuous mapping theorem. On the other hand, infϑ2 ∈B(ϑ 0 ,δ ) L2 (ϑ2 ) − L2 (ϑ20 ) > 0 since L2 (ϑ2 )
2
has a unique minimum in ϑ20 by Lemma 2.10.
Proof of Theorem 3.8. Let us assume that 12 < γ < 1. Apparently, the parameter subspace Θ1 is
the union of Θ1 = N n,γ (ϑ10 , δ1 ) ∪ Nn,γ (ϑ10 , δ1 ) and thus, we have already shown Theorem 3.8 for
the set N n,γ (ϑ10 , δ1 ) × B(ϑ20 , δ ) instead of Θ1 × B(ϑ20 , δ ) in Theorem 3.5. It remains to investigate
Nn,γ (ϑ10 , δ1 ) × B(ϑ20 , δ ). For any δ1 > 0 we obtain by Proposition 2.8
(h)
(h)
0
c
c
Ln (ϑ ) − Ln (ϑ ) > 0
lim P
inf
n→∞
ϑ ∈Nn,γ (ϑ10 ,δ1 )×B(ϑ20 ,δ )
= lim P
n→∞
≥ lim P
n→∞
≥ lim P
n→∞
inf
ϑ ∈Nn,γ (ϑ10 ,δ1 )×B(ϑ20 ,δ )
(h)
(h)
Ln (ϑ ) − Ln (ϑ 0 )
(h)
Ln,1 (ϑ ) + inf
inf
ϑ ∈Nn,γ (ϑ10 ,δ1 )×B(ϑ20 ,δ )
ϑ2 ∈B(ϑ20 ,δ )
(h)
sup
|Ln,1 (ϑ )|
0
0
ϑ ∈Nn,γ (ϑ1 ,δ1 )×B(ϑ2 ,δ )
≤ε;
>0
(h)
(h)
Ln,2 (ϑ2 ) − Ln,2 (ϑ20 )
inf
ϑ2 ∈B(ϑ20 ,δ )
>0
(h)
(h)
Ln,2 (ϑ2 ) − Ln,2 (ϑ20 ) >
ε .
Then a consequence of Lemma 3.10 and Lemma 3.11 is
(h)
(h)
0
c
c
Ln (ϑ ) − Ln (ϑ ) > 0 ≥ 1
lim P
inf
n→∞
ϑ ∈Nn,γ (ϑ10 ,δ1 )×B(ϑ20 ,δ )
which proves in combination with Theorem 3.5 the claim.
4 Asymptotic distributions of the QML estimator
The aim of this section is to derive the asymptotic distributions of the long-run parameter estimator
ϑbn,1 and the short-run parameter estimator ϑbn,2 . These two estimators have a different asymptotic
behavior and a different convergence rate. On the one hand, we prove the asymptotic normality of
the short-run QML estimator and on the other hand, we show that the long-run QML estimator is
asymptotically mixed normally distributed.
4.1 Asymptotic distribution of the long-run parameter estimator
We derive in this section the asymptotic distribution of the long-run QML estimator ϑbn,1 . From
Corollary 3.6 we already know that ϑbn,1 − ϑ10 = o p (n−γ ), for 0 ≤ γ < 1. Since the true parameter
ϑ 0 = ((ϑ10 )T , (ϑ20 )T )T is an element of the interior of the compact parameter space Θ = Θ1 × Θ2
due to Assumption A, the estimator ϑbn,1 is at some point also an element of the interior of Θ1 with
probability one. Because the parametrization is assumed to be threefold continuously differentiable,
T ,ϑ
bT )T via the first order condition ∇ϑ L
cn(h) (ϑbn,1 , ϑbn,2 ) = 0s .
we can find the minimizing ϑbn = (ϑbn,1
1
1
n,2
21
We apply a Taylor-expansion of the score vector around the point (ϑ10 , ϑbn,2 ) resulting in
c(h) (ϑ , ϑbn,2 )n(ϑbn,1 − ϑ 0 ),
cn(h) (ϑ 0 , ϑbn,2 ) + n−1 ∇2 L
0s1 = ∇ϑ1 L
ϑ1
n
n,1
1
1
(h)
(4.1)
c (ϑ , ϑbn,2 ) denotes the matrix whose ith row, i = 1, . . . , s1 , is equal to the ith row of
where ∇ϑ2 1 L
n
n,1
(h)
i
2
c
b
In the case
∇ϑ1 Ln (ϑ n,1 , ϑn,2 ) with ϑ in,1 ∈ Θ1 such that kϑ in,1 − ϑ10 k ≤ kϑbn,1 − ϑ10 k.
c(h) (ϑ , ϑbn,2 ) is non-singular we receive
∇ϑ2 1 L
n
n,1
−1
c(h) (ϑ , ϑbn,2 )
cn(h) (ϑ 0 , ϑbn,2 ).
n(ϑbn,1 − ϑ10 ) = − n−1 ∇2ϑ1 L
∇ ϑ1 L
n,1
1
n
cn(h) (ϑ ) and the HesThus, we have to consider the asymptotic behavior of the score vector ∇ϑ1 L
cn(h) (ϑ ). Based on Proposition 2.8 it is sufficient to consider ∇2 Ln(h) (ϑ ) and
sian matrix ∇2ϑ1 L
ϑ1
(h)
∇ϑ1 Ln (ϑ ), respectively.
4.1.1 Asymptotic behavior of the score vector
First, we show the convergence of the gradient with respect to the long-run parameter ϑ1 . For this,
we consider the partial derivatives with respect to the ith -component of the parameter vector ϑ , i =
1, . . . , s1 , of the log-likelihood function. These partial derivatives are given due to the differentiation
rules for matrix functions (see, e.g., Lütkepohl [23, Appendix A.13]) by
(h)
∂i Ln (ϑ )
= tr
+
1 n (h) −1 (h)
(h)
(h) −1
(h)
T
− ∑ tr Vϑ
εk (ϑ )εk (ϑ ) Vϑ
∂iVϑ
n k=1
(h) −1 (h)
(h)
∂i εk (ϑ )T Vϑ
εk (ϑ ).
(4.2)
(h)
(h) −1
∂iVϑ
Vϑ
2 n
∑
n k=1
Proposition 4.1. The score vector with respect to the long-run parameters ϑ1 satisfies
(h)
(1)
w
∇ϑ1 Ln (ϑ 0 ) −−→ J1 (ϑ 0 ) := J1 (ϑ 0 )
(s1 )
···
J1
where
(i)
J1 (ϑ 0 )
= 2 tr
+ 2 tr
(h) −1
Vϑ 0
"
−∂i1 Π(ϑ 0 ), 0d×d
(h) −1
Vϑ 0
Z
0
1
#
#
T
W (r) dW (r)
∞
T
(ϑ 0 ) ,
k(1, ϑ 0 )
−Π(ϑ 0 )
!#
Γ∂ 1 k(B,ϑ 0 )∆Y (h) ,ε (h) (ϑ 0 ) (0) + ∑ Γ−∂ 1 Π(ϑ 0 )∆Y (h) ,ε (h) (ϑ 0 ) ( j)
i
j=1
i
and (W # (r))0≤r≤1 = ((W1 (r)T ,W2 (r)T )T )0≤r≤1 with the notation of Proposition A.1.
Proof. Equation (4.2) implies for i = 1, . . . , s1 that
n
(h) −1 1 (h)
(h)
(h)
(h) −1
(h) −1 1
(h)
0 (h)
0 T
)
)
∂i1 Ln (ϑ 0 ) = tr Vϑ 0
∂i Vϑ 0 − tr Vϑ 0
∂i1Vϑ 0 Vϑ 0
ε
ϑ
ε
ϑ
(
(
∑ k
k
n k=1
22
+ 2 · tr
(h) −1 1
Vϑ 0
n
n
∑
k=1
(h)
(h)
∂i1 εk (ϑ 0 ) εk (ϑ 0 )T
=: In,1 + In,2 + In,3 .
(h)
(h)
(h)
Note that the second term In,2 converges due to the ergodicity of (εk (ϑ 0 ))k∈N , E(εk (ϑ 0 )εk (ϑ 0 )T ) =
(h)
Vϑ 0 (see Lemma 2.7(a,e)) and Birkhoff’s Ergodic Theorem (cf. Bradley [7, 2.3 Ergodic Theorem])
so that
(h) −1 (h)
a.s.
(h) −1
(h) −1 1 (h)
1 (h)
In,2 −−→ − tr Vϑ 0
∂i Vϑ 0 Vϑ 0
∂i Vϑ 0 .
Vϑ 0 = − tr Vϑ 0
a.s.
Hence, In,1 + In,2 −−→ 0. Thus, it only remains to show the convergence of the last term In,3 . We obtain
with Proposition A.1(a,c) and the continuous mapping theorem
(h)
1 n
(h)
∂i1 εk (ϑ 0 ) εk (ϑ 0 )T
∑
n k=1
(h)
(h)
1 n
1 n
(h) T
(h)
1
0
0
∂
ϑ
ϑ
[
[ ∂i1 Π(ϑ 0 ) Yk−1 ][Π(ϑ 0 )Yst,k−1 ]T
][k(B,
]
+
Π(
)
Y
)∆Y
∑
∑
i
k−1
k
n k=1
n k=1
(h) (h)
1 n
+ ∑ [ ∂i1 k(B, ϑ 0 ) ∆Yk ]εk (ϑ 0 )T
n k=1
∞
Z 1
w
−−→ − ∂i1 Π(ϑ 0 )
W1 (r)dW1 (r)T k(1, ϑ 0 )T − ∑ Γ∂i1 Π(ϑ 0 )∆Y (h) ,k(B,ϑ 0 )∆Y (h) ( j)
=−
0
Z 1
+ ∂i1 Π(ϑ 0 )
0
j=1
∞
W1 (r) dW2 (r)T Π(ϑ 0 )T + ∑ Γ∂ 1 Π(ϑ 0 )∆Y (h) ,Π(ϑ 0 )Y (h) ( j)
j=1
st
i
(4.3)
+ Γ∂ 1 k(B,ϑ 0 )∆Y (h) ,ε (h) (ϑ 0 ) (0).
i
w
(i)
Then the continuous mapping theorem results in In,3 −−→ J1 (ϑ 0 ) which concludes the proof.
4.1.2 Asymptotic behavior of the Hessian matrix
(h)
The second partial derivatives of the log-likelihood function Ln (ϑ ) are given by
(h)
(h)
(h)
(h) −1
(h) −1 2 (h)
(h) −1
∂i, j Ln (ϑ ) = tr Vϑ
∂i, jVϑ − Vϑ
∂iVϑ
∂ jVϑ
Vϑ
1 n (h) −1 (h)
(h)
(h) −1 2 (h)
− ∑ tr Vϑ
εk (ϑ )εk (ϑ )T Vϑ
∂i, jVϑ
n k=1
−1 (h)
1 n (h) −1
(h) −1
(h)
(h)
(h)
∂ jVϑ
∂iVϑ
V (h) εk (ϑ )εk (ϑ )T Vϑ
+ ∑ tr Vϑ
n k=1
1 n (h) −1 (h)
(h)
(h)
(h)
(h) −1
(h) −1
εk (ϑ )εk (ϑ )T Vϑ
∂ jVϑ
∂iVϑ
Vϑ
+ ∑ tr Vϑ
n k=1
(h) −1 (h)
1 n (h) −1
(h)
(h)
∂ j εk (ϑ )εk (ϑ )T Vϑ
∂iVϑ
− ∑ tr Vϑ
n k=1
2 n
(h)
(h) −1 (h)
+ ∑ ∂i, j εk (ϑ )T Vϑ
εk (ϑ )
n k=1
23
(h) −1
2 n (h) −1 (h)
(h)
(h)
tr Vϑ
εk (ϑ ) ∂i εk (ϑ )T Vϑ
∂ jVϑ
∑
n k=1
2 n (h)
(h) −1
(h)
∂ j εk (ϑ )
+ ∑ ∂i εk (ϑ )T Vϑ
n k=1
−
8
=:
∑ In, j .
(4.4)
j=1
Since the Hessian matrix should be asymptotically positive definite we need an additional assumption.
⊥T C
Assumption E. The ((d − c)c × s1 )- dimensional gradient matrix ∇ϑ1 C1,
is of full column
1
ϑ1
rank s1 .
The asymptotic distribution of the Hessian matrix is given in the next proposition.
Proposition 4.2. Let Assumption E additionally hold. Define the (s1 × s1 )-dimensional random matrix Z1 (ϑ 0 ) as
Z 1
(h) −1 1
0
0
T
1
0 T
∂i Π(ϑ ) W1 (r)W1 (r) dr ∂ j Π(ϑ )
[Z1 (ϑ )]i, j := 2 · tr Vϑ 0
0
for i, j = 1, . . . , s1 . Then Z1 (ϑ 0 ) is almost surely positive definite and
(h)
w
n−1 ∇ϑ2 1 Ln (ϑ 0 ) −−→ Z1 (ϑ 0 ).
Proof. First, we prove the asymptotic behavior of the score vector and then, in the next step, that the
limit is almost surely positive definite.
Step 1: The first term n1 In,1 in (4.4) converges to zero due to the additional normalizing rate of n−1 .
Due to Proposition A.1 (a,c) we have for j = 2, . . . , 7 that In, j = O p (1) (see exemplarily (4.3) for In,5 )
and hence, 1n ∑7j=2 In, j converges in probability to zero. To summarize
(h)
n−1 ∂i,1j Ln (ϑ 0 )
1
= In,8 + o p (1) = 2 · tr
n
(h) −1 1
Vϑ 0
n2
n
∑
(h)
(h)
∂i1 εk (ϑ 0 )∂ j1 εk (ϑ 0 )T
k=1
+ o p (1).
Due to Lemma 2.6 and Proposition A.1 (a,c) we receive
(h)
n−1 ∂i,1j Ln (ϑ 0 )
= 2 · tr
(h) −1 1
Vϑ 0
n2
n
∑
(h) (h)T
∂i1 Π(ϑ 0 )Yk−1Yk−1 ∂ j1 Π(ϑ 0 )T
k=1
+ o p (1).
Then Proposition A.1(b) and the continuous mapping theorem result in
(h)
n−1 ∂i,1j Ln (ϑ 0 )
w
−−→ 2 · tr
(h) −1 1
∂i Π(ϑ 0 )
Vϑ 0
Z 1
0
T
W1 (r)W1 (r) dr
T
∂ j1 Π(ϑ 0 )
.
In particular, we have also the joint convergence of the partial derivatives.
R
Step 2: Note that we can take W1 = C1 B1W3 and define M := B1 01 W3 (r)W3 (r)T drBT
1 , which is a
P-a.s. positive definite c × c matrix. We apply the Cholesky decomposition M = M∗ M∗T . By using
24
properties of the vec operator and the Kronecker product (see [5, Chapter 7.1]) we have
T
(h) − 1
(h) − 1
Vϑ 0 2 ∂i1 Π(ϑ 0 )C1 M Vϑ 0 2 ∂ j1 Π(ϑ 0 )C1
T
(h) − 12
(h) − 1
⊥T
0 1 ⊥T
α
(
ϑ
∂
vec
V
C
M
C
M
= 2vec Vϑ 0 2 α (ϑ 0 )∂i1C1,
)
C
j 1,ϑ10 1 ∗
ϑ10 1 ∗
ϑ0
T
(h) −1
⊥T
0 T
0
1 ⊥T
)
V
)
vec
C
= 2vec ∂i1C1,
M
⊗
.
C
α
(
ϑ
α
(
ϑ
∂
C
0
0
1
1
0
j 1,ϑ
ϑ
ϑ
[Z1 (ϑ 0 )]i, j = 2 tr
1
1
(4.5)
(h) −1
(h) −1
α (ϑ 0 ) = rank(M) · rank α (ϑ 0 )T Vϑ 0
α (ϑ 0 ) due
Furthermore, rank M ⊗ α (ϑ 0 )T Vϑ 0
(h) −1
to [5, Fact 7.4.23] and thus, M ⊗ α (ϑ 0 )T Vϑ 0
α (ϑ 0 ) has full rank c · (d − c) a.s. Now, if we
consider the Hessian matrix Z1 (ϑ 0 ), we have
T
(h) −1
0 T
0
⊥T
⊥T
)
V
)
∇
C
Z1 (ϑ 0 ) = 2∇ϑ1 C1,
M
⊗
.
C
C
α
(
ϑ
α
(
ϑ
0
0
ϑ
1
1
0
1
1,ϑ
ϑ
ϑ
1
1
⊥T C
is of full column rank
Due to Assumption E the ((d − c)c × s1 )-dimensional matrix ∇ϑ1 C1,
1
0
ϑ1
and hence, the product has full rank s1 . Therefore, we have the positive definiteness almost surely.
4.1.3 Asymptotic mixed normality of the long-run QML estimator
We are able now to show the weak convergence of the long-run QML estimator and thus, we have one
main result.
Theorem 4.3. Let Assumption E additionally hold. Then we have as n → ∞
w
n(ϑbn,1 − ϑ10 ) −−→ −Z1 (ϑ 0 )−1 · J1 (ϑ 0 )
where J1 (ϑ 0 ) is defined as in Proposition 4.1 and Z1 (ϑ 0 ) as in Proposition 4.2, respectively.
Proof. From (4.1) we know that
cn(h) (ϑ 0 , ϑbn,2 ) + n−1 ∇2 L
c(h) (ϑ , ϑbn,2 )n(ϑbn,1 − ϑ 0 ).
0s1 = ∇ϑ1 L
1
ϑ1
n
n,1
1
(4.6)
(h)
In Proposition 4.1 we already derived the asymptotic behavior of the score vector ∇ϑ1 Ln (ϑ10 , ϑ20 )
(h)
and in Proposition 4.2 the asymptotic behavior of the Hessian matrix n−1 ∇2ϑ1 Ln (ϑ10 , ϑ20 ). However,
(h)
for the proof of Theorem 4.3 we require now the asymptotic behavior of ∇ϑ1 Ln (ϑ10 , ϑbn,2 ) and
n−1 ∇2 L (h) (ϑ , ϑbn,2 ). Therefore we use a kind of stochastic equicontinuity condition.
ϑ1
n
n,1
Lemma 4.4. For every ε > 0 and every η > 0, there exists an integer n(ε , η ) and real numbers
δ1 , δ2 > 0 such that for 21 < γ < 1,
(h)
(h)
(a) P supϑ2 ∈B(ϑ 0 ,δ2 ) k∇ϑ1 Ln (ϑ10 , ϑ2 ) − ∇ϑ1 Ln (ϑ10 , ϑ20 )k > ε ≤ η for n ≥ n(ε , η ),
2
(h)
(h)
(b) P supϑ ∈Nn,γ (ϑ 0 ,δ1 )×B(ϑ 0,δ2 ) kn−1 ∇2ϑ1 Ln (ϑ )−n−1 ∇2ϑ1 Ln (ϑ 0 )k > ε ≤ η
1
2
25
for n ≥ n(ε , η ).
Proof.
(h)
(h)
(a) Note that on the one hand, ∇ϑ1 Ln,1,1 (ϑ10 , ϑ2 ) = 0 since εn,1,1 (ϑ10 , ϑ2 ) = 0 and on the other hand,
(h)
∇ϑ1 Ln,2 (ϑ2 ) = 0 clearly. Hence,
(h)
sup
ϑ2 ∈B(ϑ20 ,δ2 )
(h)
sup
=
(h)
k∇ϑ1 Ln (ϑ10 , ϑ2 ) − ∇ϑ1 Ln (ϑ10 , ϑ20 )k
ϑ2 ∈B(ϑ20 ,δ2 )
(h)
k∇ϑ1 Ln,1,2 (ϑ10 , ϑ2 ) − ∇ϑ1 Ln,1,2 (ϑ10 , ϑ20 )k.
We can conclude with similar calculations as in Lemma 3.3 applying (A.4) and (A.6) that
(h)
sup
ϑ2 ∈B(ϑ20 ,δ2 )
(h)
k∇ϑ1 Ln,1,2 (ϑ10 , ϑ2 ) − ∇ϑ1 Ln,1,2 (ϑ10 , ϑ20 )k ≤
sup
ϑ2 ∈B(ϑ20 ,δ2 )
Ckϑ2 − ϑ20 kUn ≤ Cδ2Un .
Since Un = O p (1) due to Lemma 3.3 we obtain the statement.
(h)
(b) Due to ∇2ϑ1 Ln,2 (ϑ2 ) = 0 we have
(h)
sup
ϑ ∈Nn,γ (ϑ10 ,δ1 )×B(ϑ20 ,δ2 )
≤
(h)
kn−1 ∇2ϑ1 Ln (ϑ ) − n−1 ∇2ϑ1 Ln (ϑ 0 )k
(h)
sup
ϑ ∈Nn,γ (ϑ10 ,δ1 )×B(ϑ20 ,δ2 )
(h)
sup
+
(h)
kn−1 ∇2ϑ1 Ln,1,1 (ϑ ) − n−1 ∇ϑ2 1 Ln,1,1 (ϑ 0 )k
ϑ ∈Nn,γ (ϑ10 ,δ1 )×B(ϑ20 ,δ2 )
(h)
kn−1 ∇2ϑ1 Ln,1,2 (ϑ ) − n−1 ∇2ϑ1 Ln,1,2 (ϑ 0 )k.
Then the first term is bounded by (A.2) and the second term by (A.4) and (A.6), respectively. Hence,
≤
sup
ϑ ∈Nn,γ (ϑ10 ,δ1 )×B(ϑ20 ,δ2 )
≤ C δ2
1
1 n (h) (h)
Ckϑ − ϑ 0 k 2 ∑ Lk−1 [Lk−1 ]T + Ckϑ − ϑ 0 kUn
n k=1
n
!
1
1 n (h) (h) T
Lk−1 [Lk−1 ] + Cδ2Un .
∑
2
n k=1
n
Since Un = O p (1) due to Lemma 3.3 and
statement (b) follows.
1
n2
(h)
(h)
∑nk=1 Lk−1 [Lk−1 ]T = O p (1) due to Proposition A.1(b),
cn(h) (ϑ 0 , ϑbn,2 ) to J1 (ϑ 0 ) follows then by Proposition 2.8, ProposiThe weak convergence of ∇ϑ1 L
1
tion 4.1 and Lemma 4.4(a). Due to Proposition 2.8, Proposition 4.2 and Lemma 4.4(b) we have that
c(h) (ϑ , ϑbn,2 ) converges weakly to the random matrix Z1 (ϑ 0 ). In particular, Proposition A.1
n−1 ∇ϑ2 1 L
n,1
n
also guarantees the joint convergence of both terms. Finally, the almost sure positive definiteness of
Z1 (ϑ 0 ) allows us to take the inverse and reorder (4.1) so that
−1
w
c(h) (ϑ , ϑbn,2 )
cn(h) (ϑ 0 , ϑbn,2 ) −−
→ −Z1 (ϑ 0 )−1 · J1 (ϑ 0 ).
∇ ϑ1 L
n(ϑbn,1 − ϑ10 ) = − n−1 ∇2ϑ1 L
1
n
n,1
26
4.2 Asymptotic distribution of the short-run parameter estimator
Lastly, we derive the asymptotic normality of the short-run QML estimator ϑbn,2 which we prove by
using a Taylor-expansion of the QML-function similarly as in Section 4.1. Before we start the proof
(h)
(h)
we want to derive some mixing properties of the process (Yst,k , ∆Yk )k∈Z because this will be used
throughout this section.
(h)
(h)
Lemma 4.5. The process (Yst,k , ∆Yk )k∈Z is strongly mixing with mixing coefficients α∆Y (h) ,Y (h) (m) ≤
st
Cρ m for some 0 < ρ < 1. In particular, for any δ > 0,
∞
∑ α∆Y
m=1
δ
(h) ,Y (h)
st
(m) 2+δ < ∞.
(h)
Proof. Due to Equation (2.2) the process Yst has the state space representation
(h)
(h)
(h)
(h)
Xst,k = eA2 h Xst,k−1 +
with
Yst,k = C2 Xst,k
Z kh
(k−1)h
eA2 (kh−u) B2 dLu ,
k ∈ N.
(h)
Masuda [26, Theorem 4.3] proved that (Xst,k )k∈N is β -mixing with an exponentially rate since
(h)
(h)
EkXst,k k2 < ∞. Having Ek∆Lk k2 < ∞ in mind as well we can conclude on the same way as in [26,
Theorem 4.3] that the Markov process
!
! Z
(h)
(h)
kh
∆Lk−1
∆Lk
0m×m
0m×(N−c)
Im
dLu .
=
+
(h)
(h)
0(N−c)×m
eA2 h
eA2 (kh−u) B2
Xst,k
Xst,k−1
(k−1)h
is β -mixing with mixing coefficients β∆L(h) ,X (h) (m) ≤ Cρ1m for some 0 < ρ1 < 1. Hence, it is as well
α -mixing with mixing coefficient α∆L(h) ,X (h) (m) ≤ β∆L(h) ,X (h) (m) ≤ Cρ1m . Finally, it is obvious of the
definition of α -mixing that
(h)
∆Yk
(h)
Yst,k
!
=
C1 B1 C2
−C2
0d×m C2 0d×N−c
(h)
∆Lk
(h)
Xst,k
(h)
Xst,k−1
is α -mixing with α∆Y (h) ,Y (h) (m) ≤ α∆L(h) ,X (h) (m − 1) ≤ Cρ1m−1 .
st
4.2.1 Asymptotic behavior of the score vector
First, we prove that the partial derivatives have finite variance.
(h)
Lemma 4.6. For any ϑ2 ∈ Θ2 , n ∈ N, and i = 1, . . . , s2 the random variable E|∂ist Ln (ϑ 0 )|2 < ∞.
Proof. We have due to Lemma 2.7 (b) and the Cauchy-Schwarz inequality
(h)
(h) −1 (h)
εk (ϑ 0 )εk (ϑ 0 )T
Vϑ 0
(h) −1 st (h)
∂i Vϑ 0
(h) −1 (h) 0
(h)
εk (ϑ )
+ 2 · ∂ist εk (ϑ 0 )T Vϑ 0
21
(h)
(h)
(h)
≤ C · Ekεk (ϑ 0 )k4 +C · Ekεk (ϑ 0 )k4 Ek∂ist εk (ϑ 0 )k4 < ∞,
E − tr
Vϑ 0
so that the statement follows with (4.2).
27
2
Now we can prove the convergence of the covariance matrix of the score vector where we plug in the
true parameter.
(h)
(h) −1 (h)
(h)
εk,2 (ϑ2 ) that
Lemma 4.7. We have for all ϑ2 ∈ Θ2 and ℓk,2 (ϑ2 ) = εk,2 (ϑ2 )T Vϑ 0 ,ϑ
1
h
2
i
(h)
(h)
(h)
lim Var ∇ϑ2 Ln (ϑ 0 ) = ∑ Cov ∂ist ℓ1,2 (ϑ20 ), ∂ jst ℓ1+l,2 (ϑ20 )
n→∞
l∈Z
1≤i, j≤s2
=: I(ϑ20 ).
(4.7)
Proof. We can derive the result in a similar way as in Schlemm and Stelzer [34, Lemma 2.14]. Hence,
we only sketch the proof to show the differences. A detailed proof can be found in Scholz [35, Section
5.9]. It is sufficient to show that for all ϑ2 ∈ Θ2 and all i, j = 1, . . . , s2 the sequence
(h)
[Var ∇ϑ2 Ln (ϑ 0 ) ]i, j = n−1
n
n
∑ ∑
k1 =1 k2 =1
(h)
(h)
(i, j)
Cov ∂ist ℓk1 ,2 (ϑ20 ), ∂ jst ℓk2 ,2 (ϑ20 ) =: In (ϑ20 )
(4.8)
converges as n → ∞. By the representation of the partial derivatives in (4.2) and (2.3) the sequence
(h) −1 (h) 0
(h)
(h) −1 st (h)
(h) −1 (h)
(h)
(h)
∂ist ℓk,2 (ϑ20 ) = − tr Vϑ 0
εk,2 (ϑ20 )εk,2 (ϑ20 )T Vϑ 0
∂i Vϑ 0 + ∂ist εk,2 (ϑ20 )T Vϑ 0
εk,2 (ϑ2 )
(h) −1 (h) 0
(h) −1 (h)
(h)
(h) −1 st (h)
(h)
= − tr Vϑ 0
εk (ϑ 0 )εk (ϑ 0 )T Vϑ 0
∂i Vϑ 0 + ∂ist εk (ϑ 0 )T Vϑ 0
εk (ϑ )
is stationary and the covariance in (4.8) depends only on the difference l = k1 − k2 . If we can show
that
st (h)
0
st (h)
0
(
(
ℓ
),
ℓ
)
|<∞
(4.9)
|
Cov
∂
ϑ
∂
ϑ
∑
i 1,2 2
j 1+l,2 2
l∈Z
then the Dominated Convergence Theorem implies
(i, j)
In
(ϑ20 )
n−1
=
n
∑
(h)
(h)
(n − |l|) Cov ∂ist ℓ1,2 (ϑ20 ), ∂ jst ℓ1+l,2 (ϑ20 )
l=−n
n→∞
−−−→
st (h)
0
st (h)
0
∑ Cov ∂i ℓ1,2(ϑ2 ), ∂ j ℓ1+l,2 (ϑ2 ) .
l∈Z
Due to Lemma 4.5 and the uniformly exponentially bound of (K j (ϑ )) and (∂ist K j (ϑ )) finding the
dominant goes in the same vein as in the proof of [34, Lemma 2.14].
In the following we derive the convergence of the score vector with respect to the short-run parameters
by a truncation argument.
Proposition 4.8. For the gradient with respect to the short-run parameters the asymptotic behavior
√
w
(h)
n · ∇ϑ2 Ln (ϑ 0 ) −−→ N (0, I(ϑ20 ))
holds, where I(ϑ20 ) is the asymptotic covariance matrix given in (4.7).
(h)
Proof. First, we realize that representation (4.2) and Lemma 2.7 (c,d) result in E ∇ϑ2 Ln (ϑ 0 ) =
0s2 . Due to (2.3) we can rewrite (4.2) for m ∈ N as
(h)
∂ist Ln (ϑ 0 ) =
1 n
1 n (i)
(i)
(i)
(i)
Ym,k − EYm,k + ∑ Zm,k − EZm,k ,
∑
n k=1
n k=1
28
(4.10)
(i)
where Ym,k := tr
+
(h) −1 st (h)
∂i Vϑ 0
m
∑
ι1 =0
m
+
−
ι2 =0
m
∑
tr
∑
tr
ι1 ,ι2 =0
+2·
(i)
(h) −1
(h)
Vϑ 0
(h) −1 st (h)
∂i Vϑ 0
(h)T
(h) −1 st (h)
∂i Vϑ 0
(h)T
(h)
Π(ϑ 0 )Yst,k−1 ∆Yk−ι2 Kι2 (ϑ 0 )T Vϑ 0
(h) −1
Vϑ 0
(h)
(h) −1 st (h)
∂i Vϑ 0
(h)T
∑
tr
∑
ι2 =0
m
∑
tr
ι1 ,ι2 =0
(i)
(i)
Kι1 (ϑ 0 )∆Yk−ι1 ∆Yk−ι2 Kι2 (ϑ 0 )T Vϑ 0
ι1 =0
m
m
−2·
(h) −1
Vϑ 0
− tr
(h) −1 (h)T
(h)
Yst,k−1 Π(ϑ 0 )T
∂ist Π(ϑ 0 )Yst,k−1 Vϑ 0
(h)
(h) −1 (h)T
Yst,k−1 Π(ϑ 0 )T
tr ∂ist Kι1 (ϑ 0 )∆Yk−ι1 Vϑ 0
+ 2 · tr
−2·
Π(ϑ 0 )Yst,k−1Yst,k−1 Π(ϑ 0 )T Vϑ 0
(h) −1
(h) (h)T
(h) −1 st (h)
Kι1 (ϑ 0 )∆Yk−ι1 Yst,k−1 Π(ϑ 0 )T Vϑ 0
tr Vϑ 0
∂i Vϑ 0
Vϑ 0
(h)T
(h)
(h) −1
∂ist Π(ϑ 0 )Yst,k−1 Vϑ 0
∆Yk−ι2 Kι2 (ϑ 0 )T
(h)
(h) −1
(h)T
∂ist Kι1 (ϑ 0 )∆Yk−ι1 Vϑ 0
∆Yk−ι2 Kι2 (ϑ 0 )T ,
Zm,k :=Vm,k +Um,k ,
∞
(i)
(h) −1
(h) (h)T
(h) −1 st (h)
and Vm,k := ∑ tr Vϑ 0
∂i Vϑ 0
Kι1 (ϑ 0 )∆Yk−ι1 Yst,k−1 Π(ϑ 0 )T Vϑ 0
ι1 =m+1
∞
−
ι1 =m+1 ι2 =0
∞
+2·
(i)
Um,k :=
∞
∑ ∑ tr
−2·
∑
∑
tr
(h) −1
∑ ∑
+2·
tr
tr
ι2 =m+1
∞
∞
∑ ∑
(h)
(h) −1 st (h)
∂i Vϑ 0
(h)T
Kι1 (ϑ 0 )∆Yk−ι1 ∆Yk−ι2 Kι2 (ϑ 0 )T Vϑ 0
(h)T
(h)
(h) −1 st (h)
∂i Vϑ 0
Π(ϑ )Yst,k−1 ∆Yk−ι2 Kι2 (ϑ 0 )T Vϑ 0
(h) −1
Vϑ 0
(h)T
(h)
(h) −1
∆Yk−ι2 Kι2 (ϑ 0 )T ,
∂ist Kι1 (ϑ 0 )∆Yk−ι1 Vϑ 0
(h)
(h)T
(h) −1 st (h)
∂i Vϑ 0
Kι1 (ϑ 0 )∆Yk−ι1 ∆Yk−ι2 Kι2 (ϑ 0 )T Vϑ 0
(h)
(h) −1
(h)T
∂ist Π(ϑ 0 )Yst,k−1 Vϑ 0
∆Yk−ι2 Kι2 (ϑ 0 )T
tr
ι1 =0 ι2 =m+1
(1) T
Vϑ 0
∞
∑
(h) −1
Vϑ 0
(h)
(h) −1 (h)T
∂ist Kι1 (ϑ 0 )∆Yk−ι1 Vϑ 0
Yst,k−1 Π(ϑ 0 )T
ι1 =m+1 ι2 =0
ι1 =0 ι2 =m+1
m
−2·
∑ ∑ tr
ι2 =m+1
∞
−
tr
ι1 =m+1
∞
∞
∞
(h) −1
(h)T
(h)
∂ist Kι1 (ϑ 0 )∆Yk−ι1 Vϑ 0
∆Yk−ι2 Kι2 (ϑ 0 )T .
(1) T
(s ) T
(s ) T
We define Ym,k := (Ym,k , . . . ,Ym,k2 )T as well as Zm,k := (Zm,k , . . . , Zm,k2 )T and use a truncation
argument analogous to Schlemm and Stelzer [34, Lemma 2.16]. The main difference to [34] is that in
(i)
(i)
(i)
our case the definition of Ym,k , Vm,k and Um,k is more complex including the two stochastic processes
(h)
∆Y (h) , Yst and additional summands. We show the claim in three steps.
(h)
Step 1: The process Ym,k depends only on m + 1 past values of ∆Y (h) and Yst . Hence, it inherits the
29
(h)
strong mixing property of (∆Y (h) ,Yst ) and satisfies αYm (l) ≤ α∆Y (h) ,Y (h) (max{0, l − m − 1}). Thus,
st
δ /(2+δ )
∑∞
l=1 (αYm (l))
< ∞. Using the Cramér-Wold device and the univariate
by Lemma 4.5 we have
central limit theorem of Ibragimov [17, Theorem 1.7] for strongly mixing random variables we obtain
1 n
w
√ ∑ (Ym,k − EYm,k ) −−→ N (0s2 , Im (ϑ20 ))
n k=1
as n → ∞ where Im (ϑ20 ) := ∑l∈Z Cov(Ym,1 , Ym,1+l ). Next, we need to show that
m→∞
Im (ϑ20 ) −−−→ I(ϑ20 ).
(4.11)
(h)
(h)
( j)
(i)
Therefore, we first prove that Cov Ym,k ,Ym,k+l → Cov ∂ist ℓ1,2 (ϑ 0 ), ∂ jst ℓ1+l,2 (ϑ 0 ) as m → ∞. Note
that the bilinearity property of the covariance operator implies
(i) ( j)
(h)
(h)
| Cov Ym,k ,Ym,k+l − Cov ∂ist ℓk,2 (ϑ 0 ), ∂ jst ℓk+l,2 (ϑ 0 ) |
(i)
( j)
(h)
(i)
(h)
(h)
= | Cov Ym,k ,Ym,k+l − ∂ jst ℓk+l,2 (ϑ 0 ) + Cov Ym,k − ∂ist ℓk,2 (ϑ 0 ), ∂ jst ℓk+l,2 (ϑ 0 ) |
1/2
(i) 1/2
( j)
(h)
≤ Var Ym,1
Var Ym,1 − ∂ jst ℓ1,2 (ϑ 0 )
1/2
1/2
(i)
(h)
(h)
+ Var Ym,1 − ∂ist ℓ1,2 (ϑ 0 )
Var ∂ jst ℓl,2 (ϑ 0 )
,
(4.12)
where
(i)
(h)
Ym,k − ∂ist ℓk,2 (ϑ 0 ) = −
∞
∑
tr
∑
tr
ι1 =m+1
∞
−
ι2 =m+1
+
∑
(h) −1
Vϑ 0
tr
ι1 ,ι2
max{ι1 ,ι2 }>m
∞
+2·
+2·
−2·
∑
tr
∑
tr
ι1 =m+1
∞
ι2 =m+1
∑
(h) −1
Vϑ 0
ι1 ,ι2
max{ι1 ,ι2 }>m
(h)
(h) −1 st (h)
∂i Vϑ 0
(h)T
Kι1 (ϑ 0 )∆Yk−ι1 Yst,k−1 Π(ϑ 0 )T Vϑ 0
(h)
(h)T
(h) −1 st (h)
∂i Vϑ 0
Π(ϑ 0 )Yst,k−1 ∆Yk−ι2 Kι2 (ϑ 0 )T Vϑ 0
(h) −1
Vϑ 0
(h)
(h)T
(h) −1 st (h)
∂i Vϑ 0
Kι1 (ϑ 0 )∆Yk−ι1 ∆Yk−ι2 Kι2 (ϑ 0 )T Vϑ 0
(h)
(h) −1 (h)T
Yst,k−1 Π(ϑ 0 )T
∂ist Kι1 (ϑ 0 )∆Yk−ι1 Vϑ 0
(h) −1
(h)
(h)T
∂ist Π(ϑ 0 )Yst,k−1 Vϑ 0
∆Yk−ι2 Kι2 (ϑ 0 )T
tr
(h)
(h) −1
(h)T
∂ist Kι1 (ϑ 0 )∆Yk−ι1 Vϑ 0
∆Yk−ι2 Kι2 (ϑ 0 )T .
We obtain with the Cauchy-Schwarz inequality, the exponentially decreasing coefficients (Kl (ϑ 0 ))l∈N
(h)
and the finite 4th-moment of Yst and ∆Y (h) due to Assumption A that for some 0 < ρ < 1,
(i)
(h)
Var Ym,1 − ∂ist ℓ1,2 (ϑ 0 ) ≤ Cρ m .
(h)
(i)
(i)
Moreover, by the proof of Lemma 4.6 we have Var ∂ jst ℓ1,2 (ϑ 0 ) < ∞ and then, Var Ym,1 ) ≤ 2E Ym,1 −
2
2
(h)
(h)
∂ist ℓ1,2 (ϑ 0 ) + 2E ∂ jst ℓ1,2 (ϑ 0 ) < ∞ as well. Thus, (4.12) converges uniformly in l at an exponential
30
rate to zero as m → ∞ and
(h)
(h)
( j) m→∞
(i)
Cov Ym,k ,Ym,k+l −−−→ Cov ∂ist ℓ1,2 (ϑ 0 ), ∂ jst ℓ1+l,2 (ϑ 0 ) .
Then the same arguments as in [34, Lemma 2.16] guarantee that there exists a dominant (cf. Scholz
[35, Section 5.9]) so that dominated convergence results in (4.11) (cf. proof of Lemma 4.7).
Step 2: In this step, we show that √1n ∑nk=1 (Zm,k − EZm,k ) is asymptotically negligible. We have
1 n
tr Var √ ∑ Zm,k
n k=1
!
1 n
≤ 2 · tr Var √ ∑ Um,k
n k=1
!
1 n
+ 2 · tr Var √ ∑ Vm,k
n k=1
!
,
(4.13)
where Um,k and Vm,k are defined in the same vein as Zm,k . Since both terms can be treated similarly
we consider only the first one
!
s2
∞
1 n
1 n
( j)
(i)
′
tr Var √ ∑ Um,k
)
≤
tr
Cov(U
,
U
=
m,k
m,k
∑ ∑ | Cov(Um,1 ,Um,1+l )|. (4.14)
n k=1
n k,k∑
′ =1
i, j=1 l=−∞
With the same arguments as in [34, Lemma 2.16] we obtain independent of i and j the upper bound
∞
(i)
( j)
2m
∑ | Cov(Um,1 ,Um,1+l )| ≤
l=0
(i)
∞
( j)
∑ | Cov(Um,1 ,Um,1+l )| +
l=0
≤ Cρ m
∑
l=2m+1
(i)
( j)
| Cov(Um,1 ,Um,1+l )|
δ
δ +2
m + ∑ α∆Y (h) ,Y (h) (l)
,
∞
st
l=0
which implies tr Var √1n ∑nk=1 Um,k ≤ C(m +C)ρ m due to (4.14). With the same ideas one obtains
an equivalent bound for tr Var √1n ∑nk=1 Vm,k
and thus, we have with (4.13) that
1 n
tr Var √ ∑ Zm,k
n k=1
!
≤ C(m +C)ρ m .
(4.15)
Step 3: With the multivariate Chebyshev inequality (cf. Schlemm [32, Lemma 3.19]) and (4.15) from
Step 2 we obtain for every ε > 0 that
√
1 n
(h)
0
n∇ϑ2 Ln (ϑ ) − √ ∑ [Ym,k − EYm,k ] > ε
lim lim sup P
m→∞ n→∞
n k=1
!
s2
1 n
s2
≤ lim lim sup 2 tr Var √ ∑ Zm,k
≤ lim 2 C(m +C)ρ m = 0.
m→∞ n→∞ ε
m→∞
n k=1
ε
All in all, the results of Step 1 and Step 3 combined with Brockwell and Davis [8, Proposition 6.3.9]
yield the asymptotic normality in Proposition 4.8.
4.2.2 Asymptotic behavior of the Hessian matrix
We require an additional assumption for the Hessian matrix with respect to the short-run parameters
(h)
to be positive definite. Therefore, we need some notation. We write shortly Fϑ := eAϑ h − Kϑ Cϑ .
31
The function is similar to the function in Schlemm and Stelzer [34, Assumption C11]. However, we
define Fϑ different since we do not have a moving average representation of Y (h) with respect to the
innovations ε (h) . Hence, we have to adapt the criterion in [34] and define the function
h
iT
ih
(h) T
j T
T
T
I ⊗ Kϑ ⊗Cϑ (vec IN ) (vec Fϑ ) . . . (vec Fϑ )
.
ψϑ , j := j+1
(4.16)
(h)
vec Vϑ
Assumption F. Let there exist a positive index j0 such that the [( j0 + 2)d 2 × s2 ] matrix ∇ϑ2 ψϑ 0 , j0 has
rank s2 .
Proposition 4.9. Let Assumption F additionally hold. Then
p
(h)
∇2ϑ2 Ln (ϑ 0 ) −−→ Zst (ϑ 0 ),
where the (s2 × s2 )-dimensional matrix Zst (ϑ 0 ) is given by
(h) −1 st (h) 0
(h)
[Zst (ϑ 0 )]i, j = 2E ∂ist ε1 (ϑ 0 )T Vϑ 0
∂ j ε1 (ϑ )
1
(h) −1 st (h)
(h) − 1
(h) −
(h)
∂ j Vϑ 0 Vϑ 0 2 .
+ tr Vϑ 0 2 ∂ist Vϑ 0 Vϑ 0
Moreover, the limiting matrix Zst (ϑ 0 ) is almost surely a non-singular deterministic matrix.
Proof. We proceed as in the proof of Proposition 4.2.
(h)
(h)
(h)
Step 1: Since (∂i,stj εk (ϑ 0 ), ∂ jst εk (ϑ 0 ), εk (ϑ 0 ))k∈N is a stationary and ergodic sequence with finite
absolute moment (see Lemma 2.7(a)) we obtain with Birkhoff’s Ergodic Theorem
p
(h)
(h) −1 st (h)
(h)
(h)
(h) −1
(h) −1
∂i,stj Ln (ϑ 0 ) −−→ tr Vϑ 0
∂i, jVϑ 0 − Vϑ 0
∂ist Vϑ 0 Vϑ 0
∂ jst Vϑ 0
i
h
(h) −1 st (h)
(h)
(h)
(h) −1
− tr Vϑ 0
∂i, jVϑ 0
E ε1 (ϑ 0 )ε1 (ϑ 0 )T Vϑ 0
h
i
(h) −1
(h) −1 st (h)
(h)
(h)
(h)
(h) −1
∂ jst Vϑ 0 Vϑ 0
∂i Vϑ 0
E ε1 (ϑ 0 )ε1 (ϑ 0 )T Vϑ 0
+ tr Vϑ 0
h
i
(h) −1
(h)
(h)
(h) −1 st (h)
(h)
(h) −1
∂ jst Vϑ 0 Vϑ 0
∂i Vϑ 0
+ tr Vϑ 0
E ε1 (ϑ 0 )ε1 (ϑ 0 )T Vϑ 0
h
i
(h)
(h)
(h) −1 st (h)
(h) −1
E ∂ jst ε1 (ϑ 0 )ε1 (ϑ 0 )T Vϑ 0
− tr Vϑ 0
∂i Vϑ 0
h
i
(h) −1
(h)
(h)
+ 2 · tr Vϑ 0
E ε1 (ϑ 0 ) ∂i,stj ε1 (ϑ 0 )T
h
i
(h) −1
(h) −1 st (h)
(h)
(h)
∂ j Vϑ 0
− 2 · tr Vϑ 0
E ε1 (ϑ 0 )∂ist ε1 (ϑ 0 )T Vϑ 0
i
h
(h)
(h)
(h) −1
+ 2 · E ∂ist ε1 (ϑ 0 )T Vϑ 0
∂ jst ε1 (ϑ 0 ) .
Combining this with Lemma 2.7 (c,d) results in
h
(h) −1 st (h) 0 i
p
(h)
(h)
(h)
(h) −1
(h) −1 st (h)
∂i,stj Ln (ϑ 0 ) −−→ tr Vϑ 0
∂ist Vϑ 0 Vϑ 0
∂ j Vϑ 0 + 2 · E ∂ist ε1 (ϑ 0 )T Vϑ 0
∂ j ε1 (ϑ ) .
Step 2: Next we check that Zst (ϑ 0 ) is positive definite with probability one which we show by contradiction similarly to the corresponding proofs in Schlemm and Stelzer [34, Lemma 3.22] or Boubacar
32
and Francq [6, Lemma 4], respectively. From Step 2 we know that
p
(h)
where
and
∇2ϑ2 Ln (ϑ 0 ) −−→ Zst (ϑ 0 ) = Zst,1 (ϑ 0 ) + Zst,2 (ϑ 0 ),
h
i
(h) −1
(h)
(h)
∂ jst ε1 (ϑ 0 )
Zst,1 (ϑ 0 ) := 2 · E ∂ist ε1 (ϑ 0 )T Vϑ 0
1≤i, j≤s2
h
1
1 i
−
−1
−
(h)
(h)
(h)
(h)
(h)
Zst,2 (ϑ 0 ) := tr Vϑ 0 2 ∂ist Vϑ 0 Vϑ 0
∂ jst Vϑ 0 Vϑ 0 2
(4.17)
1≤i, j≤s2
.
We can factorize Zst,2 (ϑ 0 ) in the following way
Zst,2 (ϑ 0 ) = a1 . . . as2
T
a1 . . . as2
with
ai :=
(h) − 21
Vϑ 0
(h) − 21
⊗ Vϑ 0
(h)
vec ∂ist Vϑ 0
and thus, Zst,2 (ϑ 0 ) is obviously positive semi-definite. Similarly, Zst,1 (ϑ 0 ) is positive semi-definite.
It remains to check that for any c ∈ Rs2 \ {0s2 } we have cT Zst,i (ϑ 0 )c > 0 for at least one i ∈ {1, 2}.
We assume for the sake of contradiction that there exists a vector c ∈ Rs2 \{0s2 } such that
cT Zst,1 (ϑ 0 )c + cT Zst,2 (ϑ 0 )c = 0.
(✸)
In order to be zero, each summand cT Zst,1 (ϑ 0 )c and cT Zst,2 (ϑ 0 )c must be zero, since Zst,1 (ϑ 0 ) as
well as Zst,2 (ϑ 0 ) are positive semi-definite. But cT Zst,1 (ϑ 0 )c = 0 is only possible if
i
h
∞
(h)
(h) (h)
c P-a.s.
0d = (∇ϑ2 ε1 (ϑ 0 ))c = − ∑ ∇ϑ2 Cϑ 0 Fϑj−1
0 Kϑ 0 Yk− j
j=1
Rewriting this equation yields
i
i
h
h
∞
(h) (h)
(h) (h)
∇ϑ2 Cϑ 0 Kϑ 0 Yk−1 c = − ∑ ∇ϑ2 Cϑ 0 Fϑj−1
c P-a.s.
0 Kϑ 0 Yk− j
(4.18)
j=2
Hence, for every row i = 1, . . . , d and c = (c1 , . . . , cm )T we obtain
"
#
"
s2
d
∑ ∑
m=1 l=1
(h)
(h)
∂mst (Cϑ 0 Kϑ 0 )i,l Yk−1,l
∞
cm = − ∑
s2
d
∑ ∑
j=2 m=1 l=1
(h)
(h)
∂mst (Cϑ 0 Fϑj−1
0 Kϑ 0 )i,l Yk− j,l
#
cm
P-a.s.
which is equivalent to
i T
i T
h
h
∞
(h)
(h)
(h)
j−1 (h)
T
∇
K
c
=
−
Y
∇ϑ2 eT
K
F
C
e
C
0
0
ϑ
∑ 2 i ϑ ϑ 0 ϑ 0 c Yk− j
i ϑ
k−1
ϑ0
P-a.s.
j=2
i T
h
(h)
(h)
(h)
But then ∇ϑ2 eT
c Yk−1 lies in span{Y j : j ≤ k − 2}. By the definition of the linear innoK
C
0
i ϑ
ϑ0
h
i T
(h)
(h)
(h)
(h)
(h)
vations this is only possible if ∇ϑ2 eT
C
c εk−1 = 0 P-a.s. However, Vϑ 0 = E(εk−1 (εk−1 )T )
K
0
i ϑ
ϑ0
i
h
(h)
is non-singular due to [35, Lemma 5.9.1] so that necessarily ∇ϑ2 eT
i Cϑ 0 Kϑ 0 c = 0d for i = 1, . . . , d.
33
(h)
This is again equivalent to ∇ϑ2 (Cϑ 0 Kϑ 0 )c = 0d 2 . Plugging this in (4.18) gives
i
i
h
h
∞
(h) (h)
(h) (h)
∇ϑ2 Cϑ 0 Fϑ 0 Kϑ 0 Yk−2 c = − ∑ ∇ϑ2 Cϑ 0 Fϑj−1
0 Kϑ 0 Yk− j c.
j=3
(h)
Then we can show similarly ∇ϑ2 (Cϑ 0 Fϑ 0 Kϑ 0 )c = 0d 2 and obtain recursively that
(h)
∇ϑ2 (Cϑ 0 Fϑj 0 Kϑ 0 )c = 0d 2 ,
(4.19)
j ∈ N0 .
On the other hand, we obtain due cT Zst,2 (ϑ 0 )c = 0 under assumption (✸) that
(h)
∇ϑ2 Vϑ 0 c = 0d 2 .
(4.20)
The definition of ψϑ , j in (4.16), (4.19) and (4.20) imply that ∇ϑ2 ψϑ 0 , j c = 0( j+2)d 2 holds for all
j ∈ N, which contradicts Assumption F. Hence, Zst (ϑ 0 ) is almost surely positive definite.
4.2.3 Asymptotic normality of the short-run QML estimator
We conclude this section with the last main result of this paper, namely the asymptotic distribution of
the short-run QML estimator.
Theorem 4.10. Let Assumption F additionally hold. Furthermore, suppose
(h)
(h)
I(ϑ 0 ) = lim Var ∇ϑ2 Ln (ϑ 0 )
and Zst (ϑ 0 ) = lim ∇ϑ2 2 Ln (ϑ 0 ).
n→∞
Then as n → ∞,
√
n→∞
w
n(ϑbn,2 − ϑ20 ) −−→ N (0, Zst (ϑ 0 )−1 I(ϑ 0 )Zst (ϑ 0 )−1 ).
(4.21)
Again we need the following auxiliary result for the proof.
Lemma 4.11. For every ε > 0 and every η > 0, there exists an integer n(ε , η ) and real numbers
δ1 , δ2 > 0 such that for 43 < γ < 1,
√
√
(h)
(h)
(a) P supϑ1 ∈Nn,γ (ϑ 0 ,δ1 ) k n∇ϑ2 Ln (ϑ1 , ϑ20 )− n∇ϑ2 Ln (ϑ10 , ϑ20 )k > ε ≤ η for n ≥ n(ε , η );
1
(h)
(h)
(b) P supϑ ∈Nn,γ (ϑ 0 ,δ1 )×B(ϑ 0,δ2 ) k∇2ϑ2 Ln (ϑ ) − ∇2ϑ2 Ln (ϑ 0 )k > ε ≤ η
1
2
for n ≥ n(ε , η ).
Proof.
(a) We use the upper bound
sup
ϑ1 ∈Nn,γ (ϑ10 ,δ1 )
≤
√
√
(h)
(h)
k n∇ϑ2 Ln (ϑ1 , ϑ20 ) − n∇ϑ2 Ln (ϑ10 , ϑ20 )k
sup
ϑ1 ∈Nn,γ (ϑ10 ,δ1 )
+
√
√
(h)
(h)
k n∇ϑ2 Ln,1,1 (ϑ1 , ϑ20 ) − n∇ϑ2 Ln,1,1 (ϑ10 , ϑ20 )k
sup
ϑ1 ∈Nn,γ (ϑ10 ,δ1 )
√
√
(h)
(h)
k n∇ϑ2 Ln,1,2 (ϑ1 , ϑ20 ) − n∇ϑ2 Ln,1,2 (ϑ10 , ϑ20 )k.
34
(4.22)
Since Π(ϑ 0 )C1 = 0d×c and ∇ϑ2 (Π(ϑ 0 )C1 ) = 0dcs2 we can apply (A.3) and receive
sup
ϑ1 ∈Nn,γ (ϑ10 ,δ1 )
≤C
√
√
(h)
(h)
k n∇ϑ2 Ln,1,1 (ϑ1 , ϑ20 ) − n∇ϑ2 Ln,1,1 (ϑ10 , ϑ20 )k
sup
n
3
2
ϑ1 ∈Nn,γ (ϑ10 ,δ1 )
≤ Cn
3
2 −2γ
tr
kϑ1 − ϑ10 k2 tr
1 n (h) (h) T
∑ Lk−1 [Lk−1]
n2 k=1
!
1 n (h) (h) T
∑ Lk−1[Lk−1]
n2 k=1
(4.23)
!
p
−−→ 0
(4.24)
(h)
(h)
where we used γ > 3/4 and tr n12 ∑nk=1 Lk−1 [Lk−1 ]T = O p (1) due to Proposition A.1(b). For the
second term we get by (A.4) and (A.6), and similar calculations as in Lemma 3.3 that
sup
ϑ1 ∈Nn,γ (ϑ10 ,δ1 )
√
√
(h)
(h)
k n∇ϑ2 Ln,1,2 (ϑ1 , ϑ20 ) − n∇ϑ2 Ln,1,2 (ϑ10 , ϑ20 )k
≤
sup
ϑ1 ∈Nn,γ (ϑ10 ,δ1 )
√
1
p
nCkϑ1 − ϑ10 kUn ≤ Cn 2 −γ Un −−→ 0
(4.25)
due to γ > 3/4 and Un = O p (1). A combination of (4.22)-(4.25) proves (a).
(b) The proof is similar to (a).
Proof of Theorem 4.10. The proof is similar to the proof of Theorem 4.3 using Proposition 4.8, Proposition 4.9, Proposition 2.8 and Lemma 4.11.
5 Conclusion
The main contribution of the present paper is the development of a QML estimation procedure for the
parameters of cointegrated solutions of continuous-time linear state space models sampled equidistantly. To the best of our knowledge it is the first paper estimating the parameters of a cointegrated
output Y of a linear state space and MCARMA model, respectively. We showed that the QML estimator for the long-run parameter is super-consistent and that of the short-run parameter is consistent.
Moreover, the QML estimator for the long-run parameter converges with a n-rate to a mixed normal
√
distribution whereas the short-run parameter converges with a n-rate to a normal distribution.
In this paper we lay the mathematical basis for QML for cointegrated solutions of state-space models. In a separate paper [12] we present a canonical form for the state space model satisfying the
assumptions of this paper, and apply the method to a simulation study. In this simulation study we see
that the estimator works quite well in practice. We decided to split the paper because the introduction
into a canonical form is quite lengthy and would blow up the present paper. Moreover, a drawback of
our estimation procedure is that we assume that the cointegration rank is known in advance which is
not the case in reality. First we have to estimate and test the cointegration rank. For this it is possible
to incorporate some well-known results for estimating and testing the cointegration rank for cointegrated VARMA processes as, e.g., presented in [3, 24, 28, 37]. This will also be considered in [12].
Some parts of [12] can already be found in Scholz [35].
35
A Auxiliary results
A.1 Asymptotic results
For the derivation of the asymptotic behavior of our estimators we require the asymptotic behavior of
the score vector and the Hessian matrix. To obtain these asymptotic results we use the next proposition.
(h)
Proposition A.1. Let Assumption A hold. Furthermore, let (Lk )k∈N0 := (L(kh))k∈N0 be the Lévy
(h)
process sampled at distance h and ∆Lk = L(kh) − L((k − 1)h). Define for n ∈ N, k ∈ N0 ,
(h)
∆Yk
(h)
(h)
ξk := Yst,k
(h)
∆Lk
(h)
Sn :=
and
n
(h)
∑ ξk
.
k=1
∞
i
i
Let L(z, ϑ ) = ∑∞
i=0 Li (ϑ )z and L(z, ϑ ) = ∑i=0 Li (ϑ )z , ϑ ∈ Θ, z ∈ C, where (Li (ϑ ))i∈N0 is a nonstochastic uniformly exponentially bounded continuous matrix sequence in Md,2d+m (R) and similarly (Li (ϑ ))i∈N0 is a nonstochastic uniformly exponentially bounded continuous matrix sequence in
Md,2d+m (R). Moreover, Π(ϑ ) ∈ Md,2d+m (R), Π(ϑ ) ∈ Md,2d+m (R) are continuous matrix functions
(h)
(h)
(h)
as well. We write L(B, ϑ )ξ (h) = (L(B, ϑ )ξk )k∈N0 with L(B, ϑ )ξk = ∑∞
i=0 Li (ϑ )ξk−i and similarly
(h)
T
T
T
T
L(B, ϑ )ξ . Let (W (r))0≤r≤1 = ((W1 (r) ,W2 (r) ,W3 (r) ) )0≤r≤1 be the Brownian motion as defined in the beginning of Section 3. Then
(a) sup
ϑ ∈Θ
i p
h
1 n
(h)
(h) T
(h)
(h) T
ϑ
)
ξ
ϑ
)
ξ
ϑ
)
ξ
ϑ
)
ξ
[L(B,
][L(B,
]
−
E
[L(B,
][L(B,
]
−→ 0
∑
1
1+ j
k
k+ j
n k=1
n
(h)
(h)
w
−
→ Π(ϑ )
(b) n−2 ∑ Π(ϑ )Sk−1 [Sk−1 ]T Π(ϑ )T −
k=1
−1
(c) n
n
∑
(h)
(h)
Π(ϑ )Sk−1 [L(B, ϑ )ξk ]T
k=1
w
−
−
→ Π(ϑ )
for j ∈ N0 ,
Z 1
W (r)W (r)T dr Π(ϑ )T ,
Z 1
W (r)dW (r)T L(1, ϑ )T + ∑ ΓΠ(ϑ )ξ (h) ,L(B,ϑ )ξ (h) ( j).
0
0
∞
j=1
The stated weak convergence results also hold jointly.
Before we state the proof of Proposition A.1 we need some auxiliary results.
Lemma A.2. Let ψ de defined as in (3.2). Then the following statements hold.
(h)
(h)
(a) E(ξk ) = 02d+m and Ekξk k4 < ∞.
(b)
1
n
(h)
p
∑nk=1 ξk −−→ 02d+m
(h)
(h) (h) T
1 n
n ∑k=1 ξk [ξk+l ]
and
p
(h)
(h)
−−→ E(ξ1 [ξ1+l ]T ) =: Γξ (h) (l) for l ∈ N0 .
(h)
T
(c) ∑∞
l=0 Ekξ1 [ξ1+l ] k < ∞.
w
(h)
−−→ (ψ (1)W ∗ (r))0≤r≤1 where (W ∗ (r))0≤r≤1 is a (m + (N − c))-dimensional
(d) √1n S⌊nr⌋
0≤r≤1
Brownian motion with covariance matrix
ΣW ∗ =
Z h
0
T
ΣL
ΣL BT2 eA2 u
T
A
u
A
u
e 2 B2 ΣL e 2 B2 ΣL BT2 eA2 u
36
!
du
and ψ is defined as in (3.2).
(e)
1
n
(h)
(h)
w
∑nk=2 Sk−1 [ξk ]T −−→ ψ (1)
R1
0
W ∗ (r)dW ∗ (r)T ψ (1)T + ∑∞
l=1 Γξ (h) (l).
(h)
Proof. We shortly sketch the proof. The sequence (ξk )k∈N has the MA-representation
(h)
∆Yk
(h)
(h)
Yst,k = ξk =
(h)
∆Lk
k
∑
(h)
(A.1)
ψk− j η j
j=−∞
T
R kh
(h)
(h)
(h) T
T
A2 (kh−u) B dL . Hence, (ξ (h) )
with the iid sequence ηk := ∆L(h)
=
and
R
,
R
2
u
k∈N
(k−1)h e
k
k
k
k
is stationary and ergodic as a measurable map of a stationary ergodic process (see Krengel [22, Theorem 4.3 in Chapter 1]).
(a) is due to Assumption A.
(b) is a direct consequence of Birkhoff’s ergodic theorem.
(h)
(c) follows from Ekηk k4 < ∞, kψ j k ≤ Cρ j for some C > 0, 0 < ρ < 1 and the MA-representation
(A.1).
(d,e) are conclusions of Johansen [19, Theorem B.13] and the MA-representation (A.1).
Proof of Proposition A.1. (a) The proof follows directly by Theorem 4.1 of Saikkonen [29] and the
comment on [29, p.163, line 4] if we can show that Assumption 4.1 and 4.2 of that paper are satisfied.
Since we have uniformly exponentially bounded families of matrix sequences, Saikkonen [29, Assumption 4.1] is obviously satisfied. Saikkonen [29, Assumption 4.2 ] is satisfied due to Lemma A.2.
Note that we have two different coefficient matrices, whereas the results in Saikkonen [29] are
proved for the same coefficient matrix. However, [29, Theorem 4.1] also holds if the coefficient matrices are different as long as each sequence of matrix coefficients satisfies the necessary conditions
as mentioned in the paper of Saikkonen [29, p. 163].
(b,c) Due to Lemma A.2, Saikkonen [29, Assumption 4.3] is satisfied as well. Hence, we can
conclude the weak convergence result from [29, Theorem 4.2(iii)] and [29, Theorem 4.2(iv)], respectively.
A.2 Equicontinuity results
A kind of stochastic equicontinuity condition for the processes given in Proposition A.1 is presented
next.
Proposition A.3. Let the assumption and notation of Proposition A.1 hold. Assume further that
Π(ϑ ), Π(ϑ ) are Lipschitz-continuous and the sequence of matrix functions (∇ϑ (Li (ϑ )))i∈N0 and
(∇ϑ (Li (ϑ )))i∈N0 are uniformly exponentially bounded.
n
(h)
(h)
(a) Define Xn (ϑ ) = ∑ Π(ϑ )Sk−1 [Sk−1 ]T Π(ϑ )T . Then
k=1
kXn (ϑ ) − Xn (ϑ 0 )k ≤ Ckϑ − ϑ 0 k
37
n
(h)
(h)
∑ Sk−1 [Sk−1 ]T
k=1
.
(A.2)
If additionally Π(ϑ 0 ) = 0d×(2d+m) and Π(ϑ 0 ) = 0d×(2d+m) then
kXn (ϑ ) − Xn (ϑ 0 )k ≤ Ckϑ − ϑ 0 k2
n
n
(h)
(h)
∑ Sk−1 [Sk−1 ]T
(A.3)
.
k=1
(h)
(h)
(b) Define Xn (ϑ ) = ∑ Π(ϑ )Sk−1 [L(B, ϑ )ξk ]T . Then
k=1
kXn (ϑ ) − Xn (ϑ 0 )k ≤ Cnkϑ − ϑ 0 kVn
(A.4)
where
Vn =
1 n
1 n (h) (h) T
(h)
(h)
(h)
(h)
Sk−1 [ξk ] + kSn k[kρ (B)kξn k] + ∑ k∆Sk k[kρ (B)kξk k]
∑
n k=1
n k=1
+
i
1 n (h) h
(h) T
Sk−1 L(B, ϑ 0 )ξk
∑
n k=1
(A.5)
= O p (1),
(h)
(h)
kρ (z) = c ∑∞j=0 ρ j z j for some 0 < ρ < 1, c > 0, and kρ (B)kξk k := c ∑∞j=0 ρ j kξk− j k.
n
(h)
(h)
(c) Define Xn (ϑ ) = ∑ [L(B, ϑ )ξk ][L(B, ϑ )ξk ]T . Then there exists a random variable Wn =
k=1
O p (1) so that
kXn (ϑ ) − Xn (ϑ 0 )k ≤ Cnkϑ − ϑ 0 kWn .
(A.6)
In particular, Vn +Wn = O p (1).
Proof.
(a) We have the upper bound
kXn (ϑ ) − Xn (ϑ 0 )k
n
≤
(h)
(h)
∑ [Π(ϑ ) − Π(ϑ 0 )]Sk−1 [Sk−1 ]TΠ(ϑ )T
k=1
n
+
(h)
(h)
∑ Π(ϑ 0 )Sk−1 [Sk−1 ]T[Π(ϑ ) − Π(ϑ 0 )]T
k=1
≤ kΠ(ϑ ) − Π(ϑ 0 )kkΠ(ϑ )k + kΠ(ϑ ) − Π(ϑ 0 )kkΠ(ϑ 0 )k
n
(h)
(h)
∑ Sk−1 [Sk−1 ]T
.
k=1
Since Π(ϑ ) and Π(ϑ ) are Lipschitz continuous, max(kΠ(ϑ ) − Π(ϑ 0 )k, kΠ(ϑ ) − Π(ϑ 0 )k) ≤ Ckϑ −
ϑ 0 k and supϑ ∈Θ max(kΠ(ϑ )k, kΠ(ϑ )k) ≤ C. Thus, (A.2) holds. Moreover, (A.3) is valid because for
Π(ϑ 0 ) = 0d,2d+m , Π(ϑ 0 ) = 0d,2d+m the upper bound
kXn (ϑ ) − Xn (ϑ 0 )k = kXn (ϑ )k ≤ kΠ(ϑ )kkΠ(ϑ )k
n
(h)
(h)
∑ Sk−1 [Sk−1 ]T
k=1
≤ kΠ(ϑ ) − Π(ϑ 0 )kkΠ(ϑ ) − Π(ϑ 0 )k
38
n
(h)
(h)
∑ Sk−1 [Sk−1 ]T
k=1
≤ Ckϑ − ϑ 0 k2
n
(h)
(h)
∑ Sk−1 [Sk−1 ]T
k=1
is valid.
(b) Using a Taylor expansion leads to
vec(L(z, ϑ )) − vec(L(z, ϑ 0 )) =
∞
∑ [vec(L j (ϑ )) − vec(L j (ϑ 0 ))]z j =
j=0
∞
∑ ∇ϑ vec(L∗j (ϑ ( j)))(ϑ − ϑ 0 )z j
j=0
where vec(L∗j (ϑ ( j))) denotes the matrix whose ith row is equal to the ith row of vec(L j (ϑ i ( j)))
with ϑ i ( j) ∈ Θ such that kϑ i ( j) − ϑ 0 k ≤ kϑ − ϑ 0 k for i = 1, . . . , d(2d + m). Due to assumption,
k∇ϑ vec(L∗j (ϑ ( j)))k ≤ Cρ j for j ∈ N0 and some 0 < ρ < 1 so that
kL(z, ϑ ) − L(z, ϑ 0 )k ≤ kρ (|z|)kϑ − ϑ 0 k.
(A.7)
Hence,
(h)
(h)
k L(B, ϑ ) − L(B, ϑ 0 ) ξk k ≤ kϑ − ϑ 0 k[kρ (B)kξk k].
(A.8)
Define L∇ (z, ϑ , ϑ 0 ) := L(z, ϑ ) − L(z, ϑ 0 ) =: ∑∞j=0 L∇j (ϑ , ϑ 0 )z j . Then we apply a Beveridge-Nelson
decomposition (see Saikkonen [29, (9)]) to get
(h)
L∇ (B, ϑ , ϑ 0 )ξk
(h)
= L∇ (1, ϑ , ϑ 0 )ξk + ηk (ϑ , ϑ 0 ) − ηk−1 (ϑ , ϑ 0 )
(h)
∇
0
with ηk (ϑ , ϑ 0 ) := − ∑∞j=0 ∑∞
i= j+1 Li (ϑ , ϑ )ξk− j . Thus,
h
(h) iT
1 n
(h)
Π(ϑ )Sk−1 L(B, ϑ ) − L(B, ϑ 0 ) ξk
∑
n k=1
= Π(ϑ )
1 n (h) (h) T ∇
1 n (h)
1 n (h)
Sk−1 [ξk ] L (1, ϑ , ϑ 0 )T + Π(ϑ ) ∑ Sk−1 [ηk (ϑ , ϑ 0 )]T − Π(ϑ ) ∑ Sk−1 [ηk−1 (ϑ , ϑ 0 )]T
∑
n k=1
n k=1
n k=1
= Π(ϑ )
1 n (h) (h) T ∇
1 n
(h)
(h)
0 T
0 T
]
L
[
S
(1,
)
+
)]
−
(
ξ
ϑ
,
ϑ
Π(
ϑ
)S
[
η
ϑ
,
ϑ
Π(
ϑ
)
n
n
∑ k−1 k
∑ ∆Sk [ηk (ϑ , ϑ 0 )]T .
n k=1
n k=1
Due to (A.7), kL∇ (1, ϑ , ϑ 0 )k ≤ Ckϑ − ϑ 0 k and kL∇j (ϑ , ϑ 0 )k ≤ Ckϑ − ϑ 0 kρ j so that kηk (ϑ , ϑ 0 )k ≤
(h)
kϑ − ϑ 0 k[kρ (B)kξk k] as well. Finally, we receive
(h) iT
1 n (h) h
Sk−1 L(B, ϑ ) − L(B, ϑ 0 ) ξk
(A.9)
∑
n k=1
#
"
n
n
1
1
(h)
(h)
(h)
(h)
(h)
(h)
≤ Ckϑ − ϑ 0 k
∑ Sk−1 [ξk ]T + kSn k[kρ (B)kξn k] + n ∑ k∆Sk k[kρ (B)kξk k] ,
n k=1
k=1
Π(ϑ )
and
[Π(ϑ ) − Π(ϑ 0 )]
i
i
1 n (h) h
1 n (h) h
(h) T
(h) T
≤ Ckϑ − ϑ 0 k
. (A.10)
Sk−1 L(B, ϑ 0 )ξk
Sk−1 L(B, ϑ 0 )ξk
∑
∑
n k=1
n k=1
39
Then (A.9) and (A.10) result in (A.4).
(h)
(h) T
1 n
n ∑k=1 Sk−1 [ξk ]
in the definition of Vn is O p (1) by
(h)
1 n
Lemma A.2. Moreover,
= n ∑k=1 ξk = O p (1) by Birkhoff’s Ergodic Theorem; similarly the
(h)
(h)
1 n
third term n ∑k=1 k∆Sk k[kρ (B)kξk k] is O p (1) by Birkhoff’s Ergodic Theorem. Finally, the last
h
i
n (h)
(h) T
term n1 ∑ Sk−1 L(B, ϑ 0 )ξk
is O p (1) by Proposition A.1(c).
k=1
It remains to prove (A.5). The first term
1 (h)
n Sn
(c) The proof is similarly to the proof of (b).
B Proof of Proposition 2.8
First, we present some auxiliary results for the proof of Proposition 2.8.
(h)
(h)
(h) (h)
Lemma B.1. Let Assumption A and B hold. Define X1 (ϑ ) = ∑∞j=0 (eAϑ h − Kϑ Cϑ ) j Kϑ Y− j . Then
n
o
(h)
(h)
1
E supϑ ∈Θ kb
< ∞.
εk (ϑ )k2
(a) E supϑ ∈Θ kX1 (ϑ )k2 < ∞ and maxk∈N (1+k)
n
o
(h)
(h)
1
< ∞.
εk (ϑ )k2
(b) E supϑ ∈Θ k∂u X1 (ϑ )k2 < ∞ and maxk∈N (1+k)
E supϑ ∈Θ k∂u b
n
o
(h)
(h)
1
(c) E supϑ ∈Θ k∂u,v X1 (ϑ )k2 < ∞ and maxk∈N (1+k)
E supϑ ∈Θ k∂u,v b
< ∞.
εk (ϑ )k2
(h)
Proof. We prove (a) exemplary for (b) and (c). First, remark that EkY j k2 ≤ C(1 + | j|) for j ∈ Z.
(h)
Since all eigenvalues of (eAϑ h − Kϑ Cϑ ) lie inside the unit circle (see Scholz [35, Lemma 4.6.7]) and
all matrix functions are continuous on the compact set Θ and, hence, bounded, we receive for some
(h)
(h)
(h)
0 < ρ < 1 that supϑ ∈Θ keAϑ h − Kϑ Cϑ k ≤ ρ and supϑ ∈Θ kX1 (ϑ )k ≤ C ∑∞j=0 ρ j kY− j k. Thus,
(h)
E sup kX1 (ϑ )k2
ϑ ∈Θ
∞
≤C
(h)
∑ ρ j (EkY− j k2 )1/2
j=0
!2
∞
≤C
∑ ρ j (1 + j)1/2
j=0
!2
< ∞.
Similarly,
k−1
(h)
(h)
(h)
sup kb
εk (ϑ )k ≤ kYk k +Cρ k−1 sup kXb1 (ϑ )k + ∑ Cρ j kYk− j k,
ϑ ∈Θ
such that
E
(h)
sup kb
εk (ϑ )k2
ϑ ∈Θ
ϑ ∈Θ
2 2k−2
2
≤ 3EkYk k + 3C ρ
E
j=1
(h)
sup kXb1 (ϑ )k2
ϑ ∈Θ
(h)
k−1
+3
j=1
≤ C (1 + k) + ρ 2k−2 E sup kXb1 (ϑ )k2 + k
ϑ ∈Θ
∑ Cρ
∞
∑ρj
j=0
Finally, due to Assumption B
max
k∈N
1
(h)
εk (ϑ )k2
E sup kb
(1 + k)
ϑ ∈Θ
(h)
≤ C 1 + E sup kXb1 (ϑ )k2 +
ϑ ∈Θ
40
j
(h)
(EkYk− j k2 )1/2
!2
.
!2
∑ ρ j < ∞.
∞
j=0
!2
Lemma B.2. Let Assumption A and B hold. Furthermore, let u, v ∈ {1, . . . , s}.
(a) Then there exists a positive random variable ξ with Eξ 2 < ∞ and a constant 0 < ρ < 1 so that
(h)
(h)
supϑ ∈Θ kb
εk (ϑ ) − εk (ϑ )k ≤ Cρ k−1 ξ for any k ∈ N.
(b) Then there exists a positive random variable ξ u with E(ξ (u) )2 < ∞ and a constant 0 < ρ < 1 so
(h)
(h)
εk (ϑ ) − ∂u εk (ϑ )k ≤ Cρ k−1 ξ (u) for any k ∈ N.
that supϑ ∈Θ k∂u b
(c) Then there exists a positive random variable ξ (u,v) with E(ξ (u,v) )2 < ∞ and a constant 0 < ρ < 1
(h)
(h)
εk (ϑ ) − ∂u,v εk (ϑ )k ≤ Cρ k−1 ξ (u,v) for any k ∈ N.
so that supϑ ∈Θ k∂u,v b
Proof. (a) We use the representation
(h)
(h)
(h)
(h)
(h)
b
εk (ϑ ) − εk (ϑ ) = Cϑ (eAϑ h − Kϑ Cϑ )k−1 (Xb1 (ϑ ) − X1 (ϑ ))
(h)
(h)
and define ξ = supϑ ∈Θ kXb1 (ϑ )k + supϑ ∈Θ kX1 (ϑ )k. Due to Assumption B and Lemma B.1(a) we
(h)
know that Eξ 2 < ∞. Since all eigenvalues of (eAϑ h − Kϑ Cϑ ) lie inside the unit circle and Cϑ is
bounded as a continuous function on the compact set Θ there exists a C > 0 and 0 < ρ < 1 so that
(h)
supϑ ∈Θ kCϑ (eAϑ h − Kϑ Cϑ )k−1 k ≤ Cρ k−1 and
(h)
(h)
(h)
(h)
(h)
sup kb
εk (ϑ ) − εk (ϑ )k ≤ sup kCϑ (eAϑ h − Kϑ Cϑ )kk−1 sup kXb1 (ϑ ) − X1 (ϑ )k ≤ Cρ k−1 ξ .
ϑ ∈Θ
ϑ ∈Θ
ϑ ∈Θ
(b,c) can be proven similarly.
Proof of Proposition 2.8.
(a) First,
cn(h) (ϑ ) − Ln(h) (ϑ )
L
i
1 n h (h)
(h) −1 (h)
(h) −1 (h)
(h)
(h)
(h)
T
T
b
b
b
=
ε
ϑ
)
−
ε
ϑ
))
V
ε
ϑ
)
−
ε
ϑ
)
V
ε
ϑ
)
−
ε
ϑ
))
.
(
(
(
(
(
(
(
(
∑ k
ϑ
ϑ
k
k
k
k
k
n k=1
Then
(h)
(h)
cn (ϑ ) − Ln (ϑ )|
n sup |L
ϑ ∈Θ
n
(h) −1
(h)
(h)
(h)
(h)
≤ sup k(Vϑ ) k ∑ sup kb
εk (ϑ ) − εk (ϑ )k sup kb
εk (ϑ )k + sup kεk (ϑ )k .
ϑ ∈Θ
k=1 ϑ ∈Θ
ϑ ∈Θ
ϑ ∈Θ
Due to Lemma 2.5 and Lemma B.2(a)
n
≤ Cξ
∑ρ
k=1
k
(h)
(h)
sup kb
εk (ϑ )k + sup kεk (ϑ )k
ϑ ∈Θ
ϑ ∈Θ
with E(ξ 2 ) < ∞. From this and Cauchy-Schwarz inequality we can conclude that
(h)
(h)
c
nE sup |Ln (ϑ ) − Ln (ϑ )|
ϑ ∈Θ
41
2 1/2
≤ C(Eξ )
"
1/2
1/2 #
(h)
(h)
2
2
+ E sup kεk (ϑ )k
.
∑ ρ E sup kbεk (ϑ )k
n
k
k=1
ϑ ∈Θ
ϑ ∈Θ
An application of Lemma B.1(a) yields
∞
≤ C(Eξ 2 )1/2 ∑ ρ k (1 + k)1/2 < ∞.
k=1
cn(h) (ϑ ) − Ln(h) (ϑ )| = O p (1) so that (a) follows. Again (b) and (c) can be
This proves, n supϑ ∈Θ |L
proven similarly.
References
[1] AOKI , M. (1990). State space modeling of time series 2. ed. Springer, Berlin.
[2] BAUER , D. AND WAGNER , M. (2002). Asymptotic properties of pseudo maximum likelihood estimates for multiple frequency I(1) processes. Diskussionsschriften. Universitaet Bern, Departement Volkswirtschaft.
[3] BAUER , D. AND WAGNER , M. (2002). Estimating cointegrated systems using subspace algorithms. J.
Econometrics 111, 47–84.
[4] B ERGSTROM , A. R. (1997). Gaussian estimation of mixed-order continuous-time dynamic models with
unobservable stochastic trends from mixed stock and flow data. Econometric Theory 13, 467–505.
[5] B ERNSTEIN , D. S. (2009). Matrix mathematics: theory, facts, and formulas 2nd ed. Princeton Univ.
Press, Princeton.
[6] B OUBACAR M AÏNASSARA , Y. AND F RANCQ , C. (2011). Estimating structural VARMA models with
uncorrelated but non-independent error terms. J. Multivar. Anal. 102, 496–505.
[7] B RADLEY, R. C. (2007). Introduction to strong mixing conditions vol. 1. Kendrick, Heber City.
[8] B ROCKWELL , P. J. AND DAVIS , R. A. (1998). Time Series: Theory and Methods 2nd ed. Springer Ser.
Statist. Springer, New York.
[9] C HAMBERS , A. AND M C C RORIE , J. R. (2007). Frequency domain estimation of temporally aggregated
Gaussian cointegrated systems. J. Econometrics 136, 1–29.
[10] FASEN , V. (2013). Time series regression on integrated continuous-time processes with heavy and light
tails. Econometric Theory 29, 28–67.
[11] FASEN , V. (2014). Limit theory for high frequency sampled MCARMA models. Adv. Appl. Probab. 46,
846–877.
[12] FASEN -H ARTMANN , V.
process. In preparation.
AND
S CHOLZ , M. (2017). A canonical form for a cointegrated MCARMA
[13] FASEN -H ARTMANN , V. AND S CHOLZ , M. (2017). Cointegrated continuous-time linear state-space and
MCARMA models. Submitted for publication.
[14] H ANNAN , E. AND D EISTLER , M. (2012). The Statistical Theory of Linear Systems. Society for Industrial
and Applied Mathematics, Philadelphia.
[15] H ARVEY, A. C. AND S TOCK , J. H. (1985). The estimation of higher-order continuous time autoregressive
models. Econometric Theory 1, 97–112.
42
[16] H ARVEY, A. C. AND S TOCK , J. H. (1988). Continuous time autoregressive models with common
stochastic trends. J. Econom. Dynam. Control. 12, 365–384.
[17] I BRAGIMOV, I. A. (1962). Some limit theorems for stationary processes. Theory Probab. Appl. 7,
349–382.
[18] J OHANSEN , S. (1991). Estimation and hypothesis testing of cointegration vectors in Gaussian vector
autoregressive models. Econometrica 59, 1551–1580.
[19] J OHANSEN , S. (2009). Likelihood-based inference in cointegrated vector autoregressive models. Advanced texts in econometrics. Oxford Univ. Press, Oxford.
[20] K ESSLER , M. AND R AHBEK , A. (2001). Asymptotic likelihood based inference for co-integrated homogenous Gaussian diffusions. Scand. J. Statist. 28, 455–470.
[21] K ESSLER , M. AND R AHBEK , A. (2004). Identification and inference for multivariate cointegrated and
ergodic Gaussian diffusions. Stat. Inference Stoch. Process. 7, 137–151.
[22] K RENGEL , U. (1985). Ergodic theorems: with a supplement. de Gruyter Stud. Math. 6. De Gruyter,
Berlin.
[23] L ÜTKEPOHL , H. (2005). New introduction to multiple time series analysis. Springer, Berlin.
[24] L ÜTKEPOHL , H. AND C LAESSEN , H. (1997). Analysis of cointegrated VARMA processes. J. Econometrics 80, 223–239.
[25] M ARQUARDT, T.
117, 96–120.
AND
S TELZER , R. (2007). Multivariate CARMA processes. Stochastic Process. Appl.
[26] M ASUDA , H. (2004). On multidimensional Ornstein-Uhlenbeck processes driven by a general Lévy
process. Bernoulli 10, 97–120.
[27] R EINSEL , G. C. (1997). Elements of multivariate time series analysis 2. ed. Springer-Verlag, New York.
[28] S AIKKONEN , P. (1992). Estimation and testing of cointegrated systems by an autoregressive approximation. Econometric Theory 8, 1–27.
[29] S AIKKONEN , P. (1993). Continuous weak convergence and stochastic equicontinuity results for integrated
processes with an application to the estimation of a regression model. Econometric Theory 9, 155–188.
[30] S AIKKONEN , P. (1995). Problems with the asymptotic theory of maximum likelihood estimation in
integrated and cointegrated systems. Econometric Theory 11, 888–911.
[31] S ATO , K.-I. (1999). Lévy processes and infinitely divisible distributions. Cambridge Stud. Adv. Math.
68. Cambridge Univ. Press, Cambridge.
[32] S CHLEMM , E. (2011). Estimation of continuous-time ARMA models and random matrices with dependent entries. PhD thesis. Technische Universität München.
[33] S CHLEMM , E. AND S TELZER , R. (2012). Multivariate CARMA processes, continuous-time state space
models and complete regularity of the innovations of the sampled processes. Bernoulli 18, 46–63.
[34] S CHLEMM , E. AND S TELZER , R. (2012). Quasi maximum likelihood estimation for strongly mixing
state space models and multivariate Lévy-driven CARMA processes. Electron. J. Stat. 6, 2185–2234.
[35] S CHOLZ , M. (2016). Estimation of Cointegrated Multivariate Continuous-time Autoregressive Moving
Average Processes. PhD thesis. Karlsruher Institute of Technology (KIT), Karlsruhe.
[36] S TOCKMARR , A. AND JACOBSEN , M. (1994). Gaussian diffusions and autoregressive processes: weak
convergence and statistical inference. Scand. J. Statist. 21, 403–429.
[37] YAP, S. F. AND R EINSEL , G. C. (1995). Estimation and testing for unit roots in a partially nonstationary
vector autoregressive moving average model. J. Amer. Statist. Assoc. 90, 253–267.
43
| 10math.ST
|
arXiv:1411.7631v2 [cs.DS] 17 Nov 2015
Approximate Undirected Maximum Flows in
O(mpolylog(n)) Time
Richard Peng
Georgia Tech
[email protected]
November 18, 2015
Abstract
We give the first O(mpolylog(n)) time algorithms for approximating maximum
flows in undirected graphs and constructing polylog(n)-quality cut-approximating
hierarchical tree decompositions. Our algorithm invokes existing algorithms for
these two problems recursively while gradually incorporating size reductions. These
size reductions are in turn obtained via ultra-sparsifiers, which are key tools in
solvers for symmetric diagonally dominant (SDD) linear systems.
1
Introduction
The problem of finding maximum flows and minimum cuts has been studied extensively
in algorithmic graph theory and combinatorial optimization. It led to important tools
in algorithm design such as augmenting paths [FJF56], blocking flows [Din70, EK72],
dynamic trees [GN80, ST83], dual algorithms [GT86], scaling algorithms [GR98], graph
sparsification [BK96], and electrical flows [CKM+ 11, Ma̧d13]. In its simplest form, the
maximum flow problem asks to route the most flow from a source to a sink while obeying
edge capacities. Its dual, the minimum cut problem, asks for the minimum capacity of
edges whose removal disconnects the sink from the source.
Approximating maximum flows in undirected graphs has received much attention recently due to its tighter interactions with randomized and numerical tools [CKM+ 11,
LRS13, She13a, KLOS14]. Algorithms for this variant have applications in graph partitioning [KRV09, OSVV08, She09], image processing [CMMP13], and as we will describe,
the construction of oblivious routing schemes [RST14].
Recently, algorithms that approximate undirected maximum flows in O(m1+o(1) ǫ−2 )
time were given by Sherman [She13a] and Kelner et. al. [KLOS14]. At the core of these
algorithms are congestion-approximators [Ma̧d10a] and oblivious routing schemes respectively [KLOS14]. Congestion-approximators can be viewed as a small set of representative
1
cuts in the graph, and oblivious routing schemes are more powerful in that they preserve
flows as well as cuts. The runtime of these algorithms stems from both the quality of these
approximators as well as the cost of constructing them. A natural question stemming from
them is to further improve this running time.
Oblivious routing schemes are of independent interest in the study of graph partitioning and routing. Schemes with quality polylog(n) were shown to exist by Räcke [Räc02],
and invoking them would lead to a better running time of mpolylog(n) after preprocessing. However, finding these schemes requires solving an intricate sequence of ratio cut
problems [HHR03, BKR03].
The current best algorithms for approximating ratio cuts are based on invoking (approximate) maximum flows [KRV09, OSVV08, She09]. Following the break-through on
approximate maximum flows, Räcke et al. [RST14] gave a more efficient algorithm for constructing oblivious routing schemes. This result can be viewed as producing a polylog(n)quality oblivious routing scheme by computing maximum flows on graphs of total size
O(mpolylog(n)). This leads to a chick-and-egg situation when approximators and maximum flow algorithms are viewed as black boxes: either gives the other via an overhead of
polylog(n), but to get the calls started we need to invoke routines that run in O(m1+o(1) )
time and produce mo(1) -approximations.
In this paper, we complete this cycle of algorithmic invocations by resolving this
chicken-and-egg situation, leading to improved algorithms to all intermediate problems.
The key observation is that the oblivious routing schemes produced by the Räcke et al.
algorithm have fixed size: producing them via recursive calls does not affect the cost of
invoking them, and any error introduced in the recursion will only show up as a slightly
larger overhead on this fixed size. The main steps of our algorithm on a graph G are:
1. Produce a graph H with size m/polylog(n) that can polylog(n)-approximate G.
2. Construct an approximator for H using the Räcke et. al. algorithm, making more
recursive maximum flow calls.
3. Convert this scheme to one for G, and use it to solve approximate maximum flows.
The size reduction allows us to bound the total size of the maximum flow instances
computed recursively by at most m/2, giving a total size bound of O(m). As H polylog(n)approximates G, the approximator for H returned by the recursive calls is still a polylog(n)quality approximator for G. The fact that its size is O(n) then allows us to bound the
overall cost by O(mpolylog(n)).
This recursive scheme allows us to bypass the more expensive approximators used to
initiate this sequence of algorithmic calls. The total cost in turn reduces from O(m1+o(1) )
to O(mpolylog(n)). Furthermore, these size reductions can be directly obtained via ultrasparsifiers from solvers for linear systems in graph Laplacians [ST14]. This results in
a short pseudocode when the pieces are viewed as black-boxes. Our algorithm is also
analogous to iterative schemes for computing row samples of matrices [LMP13]: the
2
congestion-approximator plays a similar role to the small row sample, and the call structure is analogous to what we use here, with ultra-sparsifiers being the size reductions.
We will introduce the algorithmic tools that we invoke in Section 2, and describe
our algorithm in Section 3. For simplicity, we will limit our presentation to the cut
setting and utilize the oblivious routing schemes as congestion-approximators. As the
oblivious routing construction by Räcke et al. [RST14] also produces embeddings, and size
reductions similar to ultra-sparsifiers were used in the flow based algorithm by Kelner et
al., we believe this scheme can be extended to the flow setting as well.
We will also not optimize for the exponent in log n because further runtime improvements based on this approach are likely. However, major obstacles remain in obtaining
running times of m log5 n or faster:
1. Random sampling based ultra-sparsifiers incur an overhead of log2 n in error.
2. Current oblivious routing constructions are based on top-down divide-and-conquer
with log n levels, each making a sequence of log n maximum flow calls through
rebalancings [RST14]. At present these routines also incur several additional log
factors due to error accumulations over levels of recursion.
3. Oblivious routing schemes incur a distortion of at least log n [Räc08].
4. Producing balanced cuts using maximum flows requires log n maximum flow invocation [OSVV08, She09].
5. The invocation of congestion-approximators to produce approximate maximum flows
requires an iteration count that’s at least quadratic in the distortion, as well as incurring another log n factor overhead. [She13a, KLOS14]. 1
Directly combining these estimates leads to a total cost of about m log11 n. An optimistic
view is that the algorithms using congestion-approximators can depend linearly on the
distortion, and reusing maximum flow calls across the construction scheme leads to recursion on graphs with total size m log n. Even in this case, the overall cost is still about
m log5 n. Therefore, we believe obtaining a running time of O(m log3 n) will require significant improvements to both algorithms that construct oblivious routings and iterative
methods that utilize them.
2
Background
Our presentation follows the notations from [She13a] and [KLOS14]. A flow f meets
demands b if for all vertices v, the total amount of flow enter/leaving v is b v . For edge
capacities u, the congestion of f is the maximum of |f e /u e | over all edges. By a standard
1
We cite the lower cost bounds from [KLOS14] here under the belief that these routines have inherent
connections.
3
reduction via binary search (e.g. Sections 2.2 and 3.1 of [CKM+ 11]), we can focus on the
decision version. For a fixed demand, the problem asks to either route it with congestion
at most 1 + ǫ, or certify via a cut that it cannot be routed with congestion less than 1.
A cut is defined by a subset of vertices S: its demand, b(S), is the total demand of
vertices in S, and its capacity, u(S), is the total capacity of edges leaving S. The ratio
between demand and capacity is a lower bound for the minimum congestion, and the
maxflow-mincut theorem states that the minimum congestion needed to route a demand
is in fact equal to the maximum demand/capacity ratio over all cuts S.
The connections between flows, cuts, congestion, and demand brings us to the notion of
(1 + ǫ)-approximate flow/cut solutions, which will be our standard notion of approximate
solutions. For a demand b and an error ǫ, such a pair consists of a flow and cut whose
congestion and demand/capacity value are within a factor of 1 + ǫ of each other.
We will make extensive use of approximations, and denote them using the ≈κ notation.
For two scalar quantities, x and y, we use x ≈κ y to mean that there exist parameters
γmin and γmax ≤ γmin κ such that γminx ≤ y ≤ γmax x.
2.1
Congestion Approximators
We will use an algorithm by Sherman [She13a] on using congestion-approximators to
compute approximate maximum flows.
Definition 2.1 (Definition 1.1. in [She13b]). An α-congestion-approximator of G is a
matrix R such that for any demand vector b,
kRbk∞ ≈α opt(b)
where opt(b) is the minimum congestion required to route the demands b in G.
Theorem 2.2 (Theorem 1.2. from [She13b]). There is a routine ApproximatorMaxFlow that, given demands b and access to an α-congestion-approximator R, makes
O(α2 log2 nǫ−3 ) iterations and returns an (1 + ǫ)-approximate flow/cut solution for these
demands. Each iteration takes O(m) time, plus computing matrix-vector products involving R and RT .
Räcke et. al. [RST14] showed that these congestion approximators can be efficiently
computed using approximate maximum flow routines. This result can be pharaphrased
as:
Theorem 2.3 (main result of [RST14]). There is a routine CongestionApproximator
that takes a graph G, returns with high probability an O(log4 n)-congestion-approximator
R such that matrix-vector products in R and RT can be performed in O(n) time. Furthermore, this approximator is computed via a series of approximate flow/cut solutions
with error 1/Θ(log3 n) on graphs of sizes m1 , . . . mN such that
N
X
i=1
mi ≤ O(m log4 n),
4
plus an additional running time overhead of O(m log6 n).
This summarizes several aspects of the algorithm for constructing oblivious routings
by Räcke et. al. [RST14]: the fact that the oblivious routing scheme produced gives
a congestion-approximator was observed in the second paragraph of the abstract. The
approximation guarantee is from Theorem 4.1. The invocation costs of R and RT also
follow from oblivious routing scheme being a tree.
The error tolerance in the maximum flow calls of 1/Θ(log3 n) is stated in the abstract
and utilized in the rebalancing step of the proof of Lemma 3.1. Overall the algorithm
performs O(log n) levels of partition based recursion, and the total sizes of graphs at each
level is O(m). Each partition step may adjust the partition O(log n) times using the cutmatching game by Khandekar et. al. [KRV09], which in turn needs O(log2 n) approximate
flow/cut solutions. Combining these bounds gives a total size of O(m log4 n). The running
time overhead comes from applying the O(log2 n) matchings produced in the cut-matching
game to a random vector before routing it using approximate maximum flows.
2.2
Ultra-Sparsifiers and Size Reductions
Ultra-sparsifiers are controlled ways of reducing graphs to tree-like structures. As they
involve pairs of graphs on the same vertex set, we will use scripts to denote the graph
in question in our notations. The following construction can be obtained from [KMP14]
and [AN12].
Theorem 2.4. There is a routine Ultra-Sparsify that takes a graph G = (V, EG , u G )
with n vertices and m edges, and any parameter κ > 1, returns in O(m log n log log n) time
a graph H = (V, EH , u H ) on the same set of vertices with n − 1 + O(m log2 n log log n/κ)
edges such that with high probability we have
u G (S) ≈κ u H (S)
for all subsets of vertices S ⊆ V .
Since minimum cut seeks to minimize u(S)/b(S), u G (S) ≈kappa u H (S) for all S
implies optG (b) ≈κ optH (S), and an α-congestion-approximator for H is also a καcongestion-approximator for G. Note that since we only need to preserve cuts, the
Spielman-Teng construction of ultra-sparsifiers [ST14] with spectral sparsifiers replaced
by cut-sparsifiers [BK96] also gives a similar bound.
These edge reductions are complemented by vertex reductions, which also are crucial
in algorithms using ultra-sparsifiers [ST14, Ma̧d10a, KMP14, Pen13, She13a, KLOS14].
Lemma 2.5 (Lemma 5.8 of [Ma̧d10b], paraphrased). When given a graph H with n
vertices and m = n − 1 + m′ edges, we can produce a graph H ′ = Reduce(H) with O(m′ )
edges such that any α-congestion-approximator RH ′ for H ′ can be converted into an O(α)congestion-approximator R H for H. Furthermore, matrix-vector products involving RH
or RTH can be computed by performing a single matrix-vector product in RH ′ or RTH ′
respectively plus an overhead of O(m).
5
Combining these two steps for edge and vertex reductions gives our key size reduction
routines:
Corollary 2.6. There are routines UltraSparsifyAndReduce and Convert so that
when given a graph G with n vertices and m edges, and an approximation factor κ,
UltraSparsifyAndReduce(G, κ) produces G′ such that with high probability.
1. G′ has at most O(m log2 n log log n/κ) edges, and
2. given an α-congestion-approximator R G′ for G′ , RG = Convert(G, G′ , R′ )
(a) is an O(κα)-congestion-approximator for G, and
(b) matrix-vector products involving R G or RTG can each be performed using one
matrix-vector product involving RG′ or R TG′ plus an overhead of O(m).
3
Recursive Algorithm
Our algorithm recursively calls the two routines for utilizing and constructing congestionapproximators, while reducing sizes using UltraSparsifyAndReduce. Its pseudocode
is given in Figure 1
f = RecursiveApproxMaxFlow(G, ǫ, b)
1. Set κ ← C log6 n log log n for some absolute constant C.
2. G′ ← UltraSparsifyAndReduce(G, κ)
3. RG′ ← CongestionApproximator(G′ ), which in turm makes recursive calls to
RecursiveApproxMaxFlow.
4. RG ← Convert(G, G′ , RG′ )
5. Return ApproximatorMaxFlow(G, RG , ǫ) .
Figure 1: Recursive Algorithmm for Approximate Maximum Flow
We will simplify the analysis by bounding the size reductions at each recursive call
and the overall failure probability of any call.
Lemma 3.1. We have |EG′ | ≤ O(|EG |/(C log4 n)) during each recursive call, and with
high probability all the function invocations terminate correctly,
6
Proof. Corollary 2.6 gives that the size of G′ is at most O(m log2 n log log n/κ), and the
bound follows from the choice of κ = C log6 n log log n.
We can then follow the call structure of this algorithm and accumulate failure probabilities. At each step, Theorem 2.3 gives that the total size of the graphs recursed on
is bounded by O(|EG′ | log4 n) = O(|EG |/C). Therefore, a sufficiently large C means the
total number of recursive calls is bounded by O(m) with high probability. Accumulating
the failure probabilities over these steps using the union bound then gives the overall
success probability.
We remark that to bound the failure probability of each recursive call by 1 − nc , the
routines also need to use n̄, the initial vertex count, instead of the size of the current
instance. This is a situation that occur frequently in analyses of recursive invocations of
Monte-Carlo randomized algorithms [ST14, Pen13, CKM+ 14]. We omit the details here
due to the large number of routines used in black-box manners.
For the rest of this proof we will assume that all black-box invocations terminate
correctly.
Lemma 3.2. On input of a graph with size m, with high probability the cost of the final
call to ApproximatorMaxFlow is at most O(m log32 n log2 log nǫ−3 ).
Proof. The guarantees of CongestionApproximator from Theorem 2.3 gives that
RG′ is an O(log4 n)-congestion-approximator for G′ , and matrix-vector products involving RG′ and RG′ cost O(n). Combining this with Corollary 2.6 gives that RG as returned
by Convert on Line 4 of RecursiveApproxMaxFlow is an O(log10 n log log n)congestion-approximator for G, and the cost of matrix-vector products RG and RTG is
O(m). The running time and error guarantees then follow from Theorem 2.2.
Theorem 3.3. With high probability, RecursiveApproxMaxFlow returns an (1 + ǫ)approximate flow/cut solution in time O(m log32 n log2 log n max{log9 n, ǫ−3 }).
Proof. Theorem 2.3 guarantees that the error parameter in all intermediate calls is at
most ǫ = 1/Θ(log3 n). Let the running time of RecursiveApproxMaxFlow on a
graph with m edges and error ǫ be T (m). We will show by induction, or guess-and-check,
that we can choose C to ensure T (m) ≤ Cm log41 n log2 log n.
The base case of m ≤ log10 n̄, where n̄ is the top level vertex count, follows from
invoking existing approximate maximum flow algorithms [CKM+ 11]. For the inductive
case, let the graphs that we recurse on have sizes m1 . . . mN . Theorem 2.3 and Lemma 3.2
give the following recurrence:
T (m) ≤
N
X
i=1
T (mi ) + O(m log6 n)
+O(m log32 n log2 log nǫ−3 )
≤
N
X
i=1
T (mi ) + O(m log41 n log2 log n).
7
Since all graphs that we compute approximate maximum flows on are subgraphs of
G , Lemma 3.1 allows us to invoke the inductive hypothesis, giving
′
T (m) ≤
N
X
Cmi log41 n log2 log n + O(m log41 n log2 log n).
i=1
The total sizes of the graphs that we recurse on can in turn be bounded via Theorem 2.3
and Corollary 2.6.
N
X
i=1
mi ≤ O(log4 n|EG′ |) ≤ O(m log6 n log2 log n/κ).
Choosing C appropriately then allows us to bound this by m/2, giving a total of
T (m) ≤
C
m log41 n log2 log n + O(m log41 n log2 log n).
2
The inductive hypothesis then follows by picking C to be twice the constant of the trailing
term.
This gives the bound of O(m log41 n log2 log n) when ǫ is set to 1/Θ(log3 n). For the
general case of arbitrary ǫ, Lemma 3.2 gives a bound of O(m log32 n log2 log nǫ−3 ). Note
that the first term is still present, since the second to last call is made on a graph of
size m/2 with ǫ = 1/Θ(log3 n). Summing over both terms then gives the overall runtime
bound.
We remark that the ǫ−3 term arises from a similar dependency in the congestionapproximator based flow routine by Sherman [She13a], which is stated in Theorem 2.2.
Invoking this algorithm in Theorem 2.3 also gives an O(mpolylog(n)) time algorithm
for constructing hierarchical tree decomposition based oblivious routing schemes.
Corollary 3.4. Given an undirected graph G, we can construct in O(m log45 n log2 log n)
time a tree that with high probability corresponds to an O(log4 n)-competitive oblivious
routing scheme .
References
[AN12]
Ittai Abraham and Ofer Neiman. Using petal decompositions to build a low
stretch spanning tree. In Proceedings of the 44th symposium on Theory of
Computing, STOC ’12, pages 395–406, 2012.
[BK96]
András A. Benczúr and David R. Karger. Approximating s-t minimum cuts
in Õ(n2 ) time. In Proceedings of the 28th annual ACM symposium on Theory
of computing, STOC ’96, pages 47–55, 1996.
8
[BKR03]
Marcin Bienkowski, Miroslaw Korzeniowski, and Harald Räcke. A practical
algorithm for constructing oblivious routing schemes. In Proceedings of the
15th annual ACM symposium on Parallel algorithms and architectures, SPAA
’03, pages 24–33, 2003.
[CKM+ 11] Paul Christiano, Jonathan A. Kelner, Aleksander Ma̧dry, Daniel A. Spielman,
and Shang-Hua Teng. Electrical flows, Laplacian systems, and faster approximation of maximum flow in undirected graphs. In Proceedings of the 43rd
annual ACM symposium on Theory of computing, STOC ’11, pages 273–282,
2011.
[CKM+ 14] Michael B. Cohen, Rasmus Kyng, Gary L. Miller, Jakub W. Pachocki,
Richard Peng, Anup B. Rao, and Shen Chen Xu. Solving SDD linear systems
in nearly mlog 1/2 n time. In Proceedings of the 46th Annual ACM Symposium
on Theory of Computing, STOC ’14, pages 343–352, 2014.
[CMMP13] Hui Han Chin, Aleksander Ma̧dry, Gary L. Miller, and Richard Peng. Runtime
guarantees for regression problems. In Proceedings of the 4th conference on
Innovations in Theoretical Computer Science, ITCS ’13, pages 269–282, 2013.
[Din70]
Yefim A. Dinitz. Algorithm for Solution of a Problem of Maximum Flow in a
Network with Power Estimation. Soviet Math Doklady, 11:1277–1280, 1970.
[EK72]
Jack Edmonds and Richard M. Karp. Theoretical improvements in algorithmic efficiency for network flow problems. Journal of the ACM, 19(2):248–264,
April 1972.
[FJF56]
Lester R. Ford Jr and Delbert R. Fulkerson. Maximal flow through a network.
Canadian Journal of Mathematics, 8:399–404, 1956.
[GN80]
Zvi Galil and Amnon Naamad. An O(EV log2 V ) algorithm for the maximal
flow problem. Journal of Computer and System Sciences, 21(2):203–217, 1980.
[GR98]
Andrew V. Goldberg and Satish Rao. Beyond the flow decomposition barrier.
Journal of the ACM, 45:783–797, September 1998.
[GT86]
Andrew V. Goldberg and Robert E. Tarjan. A new approach to the maximum
flow problem. In Proceedings of the 18th annual ACM symposium on Theory
of computing, STOC ’86, pages 136–146, 1986.
[HHR03]
Chris Harrelson, Kirsten Hildrum, and Satish Rao. A polynomial-time tree
decomposition to minimize congestion. In Proceedings of the 15th annual ACM
symposium on Parallel algorithms and architectures, SPAA ‘03, pages 34–43,
2003.
9
[KLOS14] Jonathan A. Kelner, Yin Tat Lee, Lorenzo Orecchia, and Aaron Sidford. An
almost-linear-time algorithm for approximate max flow in undirected graphs,
and its multicommodity generalizations. In Proceedings of the 25th Annual
ACM-SIAM Symposium on Discrete Algorithms, SODA ‘14, pages 217–226,
2014.
[KMP14]
Ioannis Koutis, Gary L. Miller, and Richard Peng. Approaching optimality
for solving SDD linear systems. SIAM Journal on Computing, 43(1):337–354,
2014.
[KRV09]
Rohit Khandekar, Satish Rao, and Umesh Vazirani. Graph partitioning using
single commodity flows. Journal of the ACM, 56(4):19, 2009.
[LMP13]
Mu Li, Gary L. Miller, and Richard Peng. Iterative row sampling. In 54th
Annual IEEE Symposium on Foundations of Computer Science, FOCS ‘13,
pages 127–136, 2013.
[LRS13]
Yin Tat Lee, Satish Rao, and Nikhil Srivastava. A new approach to computing
maximum flows using electrical flows. In Proceedings of the 45th annual ACM
symposium on theory of computing, STOC ’13, pages 755–764, 2013.
[Ma̧d10a]
Aleksander Ma̧dry. Fast approximation algorithms for cut-based problems
in undirected graphs. In 51th Annual IEEE Symposium on Foundations of
Computer Science, FOCS ‘10, pages 245–254, 2010.
[Ma̧d10b]
Aleksander Ma̧dry. Fast approximation algorithms for cut-based problems in
undirected graphs. CoRR, abs/1008.1975, 2010.
[Ma̧d13]
Aleksander Ma̧dry. Navigating central path with electrical flows: From flows
to matchings, and back. In 54th Annual IEEE Symposium on Foundations of
Computer Science, FOCS ‘13, pages 253–262, 2013.
[OSVV08] Lorenzo Orecchia, Leonard J. Schulman, Umesh V. Vazirani, and Nisheeth K.
Vishnoi. On partitioning graphs via single commodity flows. In Proceedings of
the 40th annual ACM symposium on Theory of computing, STOC ’08, pages
461–470, 2008.
[Pen13]
Richard Peng. Algorithm Design Using Spectral Graph Theory. PhD thesis,
Carnegie Mellon University, August 2013. CMU CS Tech Report CMU-CS13-121.
[Räc02]
Harald Räcke. Minimizing congestion in general networks. In Proceedings of
the 43rd Symposium on Foundations of Computer Science, FOCS ‘02, pages
43–52, 2002.
10
[Räc08]
Harald Räcke. Optimal hierarchical decompositions for congestion minimization in networks. In Proceedings of the 40th annual ACM symposium on
Theory of computing, STOC ’08, pages 255–264, 2008.
[RST14]
Harald Räcke, Chintan Shah, and Hanjo Täubig. Computing cut-based hierarchical decompositions in almost linear time. In Proceedings of the 25th
Annual ACM-SIAM Symposium on Discrete Algorithms, SODA ‘14, pages
227–238, 2014.
√
Jonah Sherman. Breaking the multicommodity flow barrier for O( logn)approximations to sparsest cut. In 50th Annual IEEE Symposium on Foundations of Computer Science, FOCS ’09, pages 363–372, 2009.
[She09]
[She13a]
Jonah Sherman. Nearly maximum flows in nearly linear time. In 54th Annual
IEEE Symposium on Foundations of Computer Science, FOCS ‘13, pages
263–269, 2013.
[She13b]
Jonah Sherman. Nearly maximum flows in nearly linear time.
abs/1304.2077, 2013.
[ST83]
Daniel D Sleator and Robert Endre Tarjan. A data structure for dynamic
trees. Journal of Computer and System Sciences, 26(3):362–391, 1983.
[ST14]
Daniel A. Spielman and Shang-Hua Teng. Nearly linear time algorithms for
preconditioning and solving symmetric, diagonally dominant linear systems.
SIAM Journal on Matrix Analysis and Applications, 35(3):835–885, 2014.
11
CoRR,
| 8cs.DS
|
Deterministic Time-Space Tradeoffs for k-SUM
Andrea Lincoln∗1 , Virginia Vassilevska Williams†2 , Joshua R.
Wang‡3 , and R. Ryan Williams§4
1
2
3
arXiv:1605.07285v1 [cs.DS] 24 May 2016
4
Computer Science Department,
[email protected]
Computer Science Department,
[email protected]
Computer Science Department,
[email protected]
Computer Science Department,
[email protected]
Stanford University, USA
Stanford University, USA
Stanford University, USA
Stanford University, USA
Abstract
Given a set of numbers, the k-SUM problem asks for a subset of k numbers that sums to zero.
When the numbers are integers, the time and space complexity of k-SUM is generally studied in
the word-RAM model; when the numbers are reals, the complexity is studied in the real-RAM
model, and space is measured by the number of reals held in memory at any point.
We present a time and space efficient deterministic self-reduction for the k-SUM problem
which holds for both models, and has many interesting consequences. To illustrate:
q
n lg(n)
3-SUM is in deterministic time O(n2 lg lg(n)/ lg(n)) and space O
lg lg(n) . In general, any
polylogarithmic-time improvement over quadratic time for 3-SUM can be converted into an
algorithm with an identical time improvement but low space complexity as well.
√
3-SUM is in deterministic time O(n2 ) and space O( n), derandomizing an algorithm of Wang.
A popular conjecture states that 3-SUM requires n2−o(1) time on the word-RAM. We show
that the 3-SUM Conjecture is in fact equivalent to the (seemingly weaker) conjecture that
every O(n.51 )-space algorithm for 3-SUM requires at least n2−o(1) time on the word-RAM.
√
For k ≥ 4, k-SUM is in deterministic O(nk−2+2/k ) time and O( n) space.
1998 ACM Subject Classification F.2.1 Numerical Algorithms and Problems
Keywords and phrases 3SUM; kSUM; time-space tradeoff; algorithm.
Digital Object Identifier 10.4230/LIPIcs.ICALP.2016.XXX
∗
†
‡
§
Supported by a Stanford Graduate Fellowship.
Supported by NSF Grants CCF-1417238, CCF-1528078 and CCF-1514339, and BSF Grant
BSF:2012338.
Supported by a Stanford Graduate Fellowship.
Supported in part by NSF CCF-1552651. Any opinions, findings and conclusions or recommendations
expressed in this material are those of the authors and do not necessarily reflect the views of the
National Science Foundation.
© Andrea Lincoln, Virginia Vassilevska Williams, Joshua R. Wang and R. Ryan Williams;
licensed under Creative Commons License CC-BY
43rd International Colloquium on Automata, Languages, and Programming (ICALP 2016).
Editors: Ioannis Chatzigiannakis, Michael Mitzenmacher, Yuval Rabani, and Davide Sangiorgi; Article No. XXX;
pp. XXX:1–XXX:16
Leibniz International Proceedings in Informatics
Schloss Dagstuhl – Leibniz-Zentrum für Informatik, Dagstuhl Publishing, Germany
XXX:2
Deterministic Time-Space Tradeoffs for k-SUM
1
Introduction
We consider the k-SUM problem: given a list S of n values, determine whether there are
Pk
distinct a1 , . . . , ak ∈ S such that
i=1 ai = 0. This classic problem is a parameterized
version of the Subset Sum problem, which is among Karp’s original NP-Complete problems.1
The brute-force algorithm for k-SUM runs in O(nk ) time, and it is known [22] that an
no(k) time algorithm (where the little-o depends on k) would violate the Exponential Time
Hypothesis [18]. A faster meet-in-the-middle algorithm reduces the k-SUM problem on n
numbers to 2-SUM on O(ndk/2e ) numbers, which can then be solved by sorting and binary
search in O(ndk/2e log n) time. The belief that this meet-in-the-middle approach is essentially
time-optimal is at the heart of many conditional 3-SUM-hardness results in computational
geometry (e.g. [15]) and string matching (e.g. [5, 2]).
The space usage of the meet-in-the-middle approach is prohibitive: the O(n log n) time
solution for 2-SUM uses linear space, which causes the fast k-SUM algorithm to need
Ω(ndk/2e ) space. However, the brute-force algorithm needs only O(k log n) space. This
leads to the natural question: how well can one trade off time and space in solving k-SUM?
Schroeppel and Shamir [23] first studied time-space tradeoff algorithms for Subset Sum.
They showed how to reduce Subset Sum to an instance of k-SUM for any k ≥ 2: split the
elements into k sets of n/k elements each; for each set, compute 2n/k sums corresponding
to the subsets of the set; this forms a k-SUM instance of size 2n/k . Since the k-SUM
instance does not have to be explicitly stored, any time T (N ), space S(N ) algorithm for
k−SUM immediately implies a time T (2n/k ), space S(2n/k ) algorithm for Subset Sum.
Furthermore, Schroeppel and Shamir gave a deterministic Õ(n2 ) time, Õ(n) space algorithm
for 4-SUM, implying a O∗ (2n/2 ) time, O∗ (2n/4 ) space algorithm for Subset Sum.2 They
also generalized the algorithm to provide a smooth time-space tradeoff curve, with extremal
points at O∗ (2n/2 ) time, O∗ (2n/4 ) space and O∗ (2n ) time, O∗ (1) space.
A recent line of work leading up to Austrin et al. [6] has improved this long-standing
tradeoff curve for Subset Sum via randomized algorithms, resulting in a more complex curve.
Wang [25] moved these gains to the k-SUM setting. In particular, for 3-SUM he obtains an
√
Õ(n2 ) time, Õ( n) space Las Vegas algorithm.
Despite the recent progress on the problem, all of the improved algorithms for the general
case of k-SUM have heavily relied on randomization, either utilizing hashes or random prime
moduli. These improvements also all rely heavily on the values in the lists being integers.
For the general case of k-SUM, the previous best deterministic k-SUM results (even for
integer inputs) are the brute-force algorithm, the meet-in-the-middle algorithm, and the
Schroeppel and Shamir 4-SUM algorithm, and simple combinations thereof.
1.1
Our Results
We consider new ways of trading time and space in solving k-SUM, on both integer and real
inputs (on the word-RAM and real-RAM respectively), without the use of randomization.
Our improvements for k-SUM naturally extend to improvements to Subset Sum as well.
Our main result is a deterministic self-reduction for k-SUM. Informally, we show how to
deterministically decompose a list of n numbers into a small collection of shorter lists, such
1
2
Karp’s definition of the Knapsack problem is essentially Subset Sum [19].
The notation Õ suppresses polylogarithmic factors in n, and O∗ suppresses polynomial factors in n.
A. Lincoln, V. Vassilevska Williams, J. R. Wang and R. R. Williams
XXX:3
that the k-SUM solution is preserved. This result is shown for k = 3 in Section 4. It is
shown for general k in Section 5.
I Theorem 1. Let g be any integer between 1 and n. k-SUM on n numbers can be reduced
to O(kg k−1 ) instances of k-SUM on n/g numbers. The reduction uses O(ng k−1 ) additional
time and O(n/g) additional words of space.
Theorem 1 has several interesting applications. First, it leads to more efficient k-SUM
algorithms. For example, Gold and Sharir, building on other recent advances, report a
deterministic algorithm for 3-SUM that works in both the word-RAM and real-RAM models
and which runs in time O(n2 lg lg(n)/ lg(n)) [16]. However, this algorithm uses a considerable
amount of space to store a table of permutations. Applying Theorem 1 in multiple ways and
calling their algorithm, we recover the same asymptotic running time but with drastically
better space usage:
I Theorem 2. There
is an O(n2 lg lg(n)/ lg(n)) time deterministic algorithm for 3-SUM
q
n lg(n)
that stores at O( lg lg(n) ) numbers in memory at point. (An analogous statement holds for
3-SUM over the integers.)
Theorem 1 also directly leads to a derandomization of Wang’s space-efficient algorithm
for 3-SUM:
I Theorem 3. For all s ∈ [0, 1/2] there is a deterministic time O(n3−2s ), algorithm which
uses O(ns ) words of space for 3-SUM.
From Theorem 1 we can also derive a more space-efficient algorithm for 4-SUM, and lift
it to a new algorithm for k-SUM:
I Theorem 4. For k ≥ 4, k-SUM is solvable in deterministic O(nk−2+2/(k−3) ) time and
√
O( n) space in terms of words.
A more plausible 3-SUM conjecture.
A rather popular algorithmic conjecture is the 3-SUM Conjecture that 3-SUM on n integers
requires n2−o(1) time on a word-RAM with O(log n) bit words. This conjecture has been
used to derive conditional lower bounds for a variety of problems [15, 5, 2, 20, 3], and appears
to be central to our understanding of lower bounds in low-polynomial time. To refute the
conjecture, one could conceivably construct an algorithm that runs in O(n1.99 ) time, but
utilizes Ω(n1.99 ) space in some clever way. Here we consider a seemingly weaker (and thus
more plausible) conjecture:
I Conjecture 5 (The Small-Space 3-SUM Conjecture). On a word-RAM with O(log n)-bit
words, there exists an > 0 such that every algorithm that solves 3-SUM in O(n1/2+ ) space
must take at least n2−o(1) time.
This conjecture looks weaker than the original 3-SUM Conjecture, because we only have
√
to prove a quadratic-time lower bound for all algorithms that use slightly more than n
space. Proving time lower bounds is generally much easier when space is severely restricted
(e.g. [9, 14, 12, 26, 8]).
Our self-reduction for 3-SUM yields the intriguing consequence that the original 3-SUM
Conjecture is equivalent to the Small-Space 3-SUM conjecture! That is, the non-existence
of a truly subquadratic-time 3-SUM algorithm is equivalent to the non-existence of a truly
subquadratic-time n0.51 -space 3-SUM algorithm, even though the latter appears to be a
more plausible lower bound. We prove:
ICALP 2016
XXX:4
Deterministic Time-Space Tradeoffs for k-SUM
I Theorem 6. If 3-SUM is solvable in time O(n2− ) time, then for every α > 0 there is a
δ > 0 such that 3-SUM is solvable in O(n2−δ ) time and space O(n1/2+α ) in terms of words.
Theorem 6 is interesting, regardless of the veracity of the 3-SUM conjecture. On the
one hand, the theorem reduces the difficulty of proving the 3-SUM Conjecture if it is true,
because we only have to rule out small-space sub-quadratic time algorithms. On the other
hand, the theorem means that refuting the 3-SUM conjecture immediately implies a trulysubquadratic time algorithm for 3-SUM using small space as well, which would be an algorithmic improvement.
2
Preliminaries
2.1
k-SUM and Selection
We will use the following version of the k-SUM problem:
I Definition 7. In the k-SUM problem, we are given an unsorted list L of n values (over Z
Pk
or R) and want to determine if there are a1 , . . . , ak ∈ L such that i=1 ai = 0.
One fundamental case is the 3-SUM problem. Sometimes 3-SUM is presented with three
separate lists, which we denote as 3-SUM’, but the two are reducible to each other in linear
time, and with no impact on space usage.
I Definition 8. In the 3-SUM problem, we are given an unsorted list L of n values and want
to know if there are a, b, c ∈ L such that a + b + c = 0. In the 3-SUM’ problem, we are given
three unsorted lists A, B, and C of values, where |A| = |B| = |C| = n, and want to know if
there are a ∈ A, b ∈ B, c ∈ C such that a + b + c = 0.
As part of our k-SUM algorithms, the classical Selection Problem will also arise:
I Definition 9. In the s-Select problem, we are given an unsorted list L of n values and
a natural number s, and want to determine the sth smallest value in L.
2.2
Computational Model
As standard when discussing sub-linear space algorithms, the input is provided in read-only
memory, and the algorithm works with auxiliary read/write memory which counts towards
its space usage.
Computation on Integers. When the input values are integers, we work in the word-RAM
model of computation: the machine has a word size w, and we assume all input numbers
can be represented with w bits so that they fit in a word. Arithmetic operations (+, −, ∗)
and comparisons on two words are assumed to take O(1) time. Space is counted in terms of
the number of words used.
Computation on Reals. When the input values are real numbers, we work in a natural
real-RAM model of computation, which is often called the comparison-addition model (see,
for example, [21]). Here, the machine has access to registers that can store arbitrary real
numbers; addition of two numbers and comparisons on real numbers take O(1) time. Space
is measured in terms of the number of reals stored.
Time-Space Complexity Notation. We say that k-SUM is solvable in TISP(T (n), S(n))
if k-SUM on lists of length n can be solved by a single algorithm running in deterministic
O(T (n)) time and O(S(n)) space simultaneously on the real-RAM (and if the lists contain
integers, on the word-RAM).
A. Lincoln, V. Vassilevska Williams, J. R. Wang and R. R. Williams
2.3
XXX:5
Other Prior Work
Baran, Demaine and Patrascu [7] obtained randomized slightly subquadratic time algorithms
for Integer 3-SUM in the word-RAM. Grønlund and Pettie [17] studied 3-SUM over the reals,
presenting an O(n2 /(log n/ log log n)) time randomized algorithm, as well as a deterministic
algorithm running in O(n2 /(log n/ log log n)2/3 ) time. Recently, Gold and Sharir [16] improved this deterministic running time to O(n2 /(log n/ log log n)). Abboud, Lewi and Williams [1] showed that Integer k-SUM is W[1]-complete under randomized FPT reductions
(and under some plausible derandomization hypotheses, the reductions can be made deterministic). In the linear decision tree model of computation, k-SUM over the reals is known
to require Ω(ndk/2e ) depth k-linear decision trees [13, 4], but the problem can be solved
√
with O(nk/2 log n) depth (2k − 2)-linear decision trees [17]. The randomized decision tree
complexity was improved by Gold and Sharir [16] to O(nk/2 ).
3
Building Blocks
In this section, we describe two tools we use to obtain our main self-reduction lemma for
k-SUM and 3-SUM. The first tool helps us guarantee that we don’t have to generate too
many subproblems in our reduction; the second will allow us to find these subproblems in a
time and space efficient way.
3.1
Domination Lemma
Our deterministic self-reduction for k-SUM will split lists of size n into g sublists of size n/g,
then solve subproblems made up of k-tuples of these sublists. Naively, this would generate
g k subproblems to enumerate all k-tuples. In this section, we show that we only need to
consider O(kg k−1 ) subproblems.
First, we define a partial ordering on k-tuples on [n]k . For t, t0 ∈ [n]k , we say that t ≺ t0
if t[i] < t0 [i] for all i = 1, . . . , k. (Geometrically, the terminology is that t0 dominates t.)
I Lemma 10 (Domination Lemma). Suppose all tuples in a subset S ⊆ [n]k are incomparable
with respect to ≺. Then |S| ≤ knk−1 .
The Domination Lemma can be seen as an extension of a result in [24] (also used in [11]
in a different context) which covers the k = 3 case.
Proof. We will give a cover of all elements in [n]k with few chains under ≺. Then by
Dilworth’s theorem, any set of incomparable elements under ≺ can only have one element
from each chain.
Take any k-tuple t ∈ [n]k such that t[i] = 1 for some i = 1, . . . , k. Letting ` ∈ [n] be the
largest element in t, we define the chain C(t) = {t0 , t1 , . . . , tn−` }, where each tj is given by
tj [i] = t[i] + j for all i = 1, . . . , k. Clearly C(t) forms a chain in [n]k under ≺. Moreover
these chains cover all elements of [n]k : observe that the tuple t appears in the chain C(t0 )
where t0 [i] = t[i] − minj t[j] + 1 for all i = 1, . . . , k.
The number of chains is exactly the number of k-tuples with a 1 in at least one coordinate.
This number is less than k times the number of tuples that have a 1 in dimension i. The
number of tuples with a 1 in dimension i is nk−1 . Thus, the total number of chains is
≤ knk−1 .
J
The Domination Lemma can be applied to show that in any list of numbers, not too
many k-SUM subproblems can have k-SUM solutions. In the following, let g divide n for
ICALP 2016
XXX:6
Deterministic Time-Space Tradeoffs for k-SUM
y
3
2
z
3
1
2
1
0
1
2
3
x
Figure 1 Domination Lemma chains when n = 3 and k = 3. The chain {(1, 1, 1), (2, 2, 2), (3,
3, 3)} is highlighted in red. In three dimensions, the number of chains is roughly proportional to
the surface area of the cube, which is only O(n2 ), despite the fact that there are O(n3 ) points.
Figure 2 A depiction of how L is divided.
simplicity. Given a list L of n numbers divided into g groups of size n/g, a subproblem of L
is simply the union of a k-tuple of groups from L. Note that a subproblem contains at most
kn/g numbers.
I Corollary 11. Given a k-SUM instance L, suppose L is divided into g groups L1 , . . . , Lg
where |Li | = n/g for all i, and for all a ∈ Li and b ∈ Li+1 we have a ≤ b. Then there are
O(k · g k−1 ) subproblems L0 of L such that the smallest k-sum of L0 is less than zero and
the largest k-sum of L0 is greater than zero. Furthermore, if some subproblem of L has its
largest or smallest k-sum equal to 0, then the corresponding k-SUM solution can be found
in O(g k ) time.
Proof. We associate each subproblem of L with a corresponding k-tuple (x1 , . . . , xk ) ∈ [g]k
corresponding to the k sublists (Lx1 , . . . , Lxk ) of L.
Let m[i] be the element in position i · (n/g) when L is in sorted order. Consider any
Pk
Pk
subproblem with i=1 m[xi ] > 0 (smallest k-sum greater than zero) or i=1 m[xi + 1] < 0
(largest k-sum less than zero). We call such a subproblem trivial, since it cannot contain
k-SUM solutions.
Pk
In O(g k ) time, we can determine whether any subproblem has
i=1 m[xi ] = 0, and
A. Lincoln, V. Vassilevska Williams, J. R. Wang and R. R. Williams
XXX:7
return the corresponding k-SUM solution if this is the case. Otherwise, we can assume that
Pk
Pk
for each subproblem either it is trivial, or i=1 m[xi ] < 0 < i=1 m[xi + 1].
Consider the set of non-trivial subproblems. Because for all a ∈ Li and b ∈ Li+1 we
have a ≤ b, if for two subproblem k-tuples we have t ≺ t0 , then the smallest k-sum of the
subproblem t0 is at least the largest k-sum of the subproblem t. This implies that at least
one of the two subproblems must be trivial. In other words, the set of nontrivial problems
corresponds to a set of incomparable k-tuples in [g]k . Applying Lemma 10, the number of
nontrivial subproblems is O(kg k ).
J
3.2
Bucket Retrieval and Space-Efficient Selection
A randomized algorithm for k-SUM can partition a list of numbers by choosing a hash
function at random, then loop over the hash function range to partition a given list into
smaller buckets. Given a hash and a bucket number, it is easy to retrieve the contents of
that bucket by scanning the list.
To derandomize this process, we could try to create small “hash” buckets by grouping
the n/g smallest elements together, then the next n/g smallest elements, and so on, without
actually sorting the list. However, retrieving the contents of a bucket may now be difficult
to do with small space: we need to know the smallest and largest elements of a bucket to
retrieve its elements, and we may not be able to store all of these extrema. We require an
efficient algorithm to compute the largest element of a bucket, given the smallest element
and the bucket size.
This problem is equivalent to the selection problem, also known as s-Select, which asks
for the sth smallest element of a list, when we set s = n/g. To reduce from our problem to
s-Select, pretend that every entry less than our smallest element is ∞. (To reduce from
s-Select to our problem, we can pretend our smallest element is −∞.)
The classic median-of-median algorithm can solve s-Select in O(n) time and O(n)
space [10]. Since we care about space usage, we provide an algorithm below which has O(n)
running time, but uses much less space. This algorithm turns out to be optimal for our
purposes, since retrieving the bucket afterwards will already take O(n) time and O(s) space.
I Lemma 12. s-Select can be solved in O(n) time and O(s) space.
Proof. The plan is to scan through the elements of the list, inserting them to a data structure
D which will allow us to track the smallest s elements. We perform n insertions, then query
D to ask for the smallest s elements it contains. To get the claimed algorithm for selection,
we give a data structure can handle these operations in O(1) amortized update time and
O(s) query time, with a data structure using only O(s) space.
One first attempt might be to build a heap of s + 1 elements, which throws away the
largest element whenever it gets full. Since heaps have logarithmic update time and linear
space usage, this results in O(log s) update time, O(s) query time, and O(s) space.
We can improve the update time by batching when we throw out large elements. Suppose
instead we keep an array which can hold up to 2s elements. When the array gets full, we
throw out the largest s elements. To do this, we first compute the (s + 1)th smallest element
in the array. This can be done in O(s) time and O(s) space via the classical median-ofmedians algorithm. We then do a linear scan of the array, and write all elements strictly
less than the median to a new array. To handle ties, we write a copy of the median to the
new array, until it has s elements. When we are given our final query, we again throw out
large elements so that we only have s elements left, and then return those.
ICALP 2016
XXX:8
Deterministic Time-Space Tradeoffs for k-SUM
Updates now take amortized constant time: after s updates, we take O(s) time to clear
out the large elements. The final query takes O(s) time, since we again need to throw out
large elements. The space usage is O(s) since we store up to 2s elements, and running
median-of-medians takes O(s) space. This completes the proof.
J
We will call the above algorithm NextGroup. NextGroup takes as input a value
v, a natural number s, and a list of numbers L, and outputs the next s elements of L in
sorted order after the value v. Other variations on deterministic s-Select algorithms are
mentioned in Appendix A.
Subquadratic 3-SUM implies Subquadratic small-space 3-SUM
4
We will begin by using our building blocks to prove a self reduction for 3-SUM. Then we will
show three intriguing consequences of this self reduction. First, the self reduction can be
used to show a general theorem that takes subquadratic algorithms for 3-SUM and produces
√
subquadratic time algorithms that run in nearly n space. Second, we show that algorithms
for 3-SUM that are subquadratic by polylog factors can be used to obtain 3-SUM algorithms
with the same asymptotic running time and simultaneously small space. Finally, we will
prove that the Small-Space 3-SUM conjecture is equivalent to the 3-SUM conjecture.
4.1
3-SUM Self Reduction
We now proceed to solve 3-SUM using our bucket retrieval subroutine. We will use max S
and min S to refer to the maximum and minimum elements of a list S, respectively.
As anticipated, we split the three arrays into groups of size n/g, and solve 3-SUM on subproblems of this size. Naively there are O(g 3 ) subproblems to solve, but we use Corollary 11
to argue we only get O(g 2 ) subproblems.
I Theorem 13 (3-SUM Self-Reduction Theorem). If 3-SUM is solvable in TISP(T (n), S(n))
then for any g, 3-SUM can be solved in TISP(g 2 (n + T (n/g)), n/g + S(n/g)).
Proof. Consider the following algorithm.
Algorithm 1: 3-SUM Algorithm
Set preva = −∞;
for i ∈ [0, g − 1] do
Set A0 = NextGroup(A, preva, n/g + 1);
Set prevb = −∞;
for j ∈ [0, g − 1] do
Set B 0 = NextGroup(B, prevb, n/g + 1);
Set C 0 = NextGroup(C, − max A0 − max B 0 , n/g + 1);
while min C 0 ≤ − min A0 − min B 0 do
if 3-SUM(A0 , B 0 , C 0 ) returns true then
return true;
Set C 0 = NextGroup(C, max C 0 , n/g + 1);
Set prevb = max B 0 ;
Set preva = max A0 ;
return false;
A. Lincoln, V. Vassilevska Williams, J. R. Wang and R. R. Williams
XXX:9
Algorithm 1 is correct because we consider all possible elements of C where the sum of
elements from A0 and B 0 could land, and the choices of A0 and the choices of B 0 cover all
of A and B, respectively. If there are multiple copies of a value in a list we will fail to list
all copies only if it already appeared in a previous sublist. This will not affect correctness
because the value will have already been analyzed.
It’s easy to see that the algorithm calls NextGroup O(g) times for A0 , O(g 2 ) times for
0
B . We claim that we also only call it O(g 2 ) times for C 0 . To show this, we want to apply
Corollary 11. Unfortunately, the groups of C that we extract don’t always line up with our
ideal n/g division; since we start at − max A0 − max B 0 , we may not align at the endpoints
of blocks. Fortunately, we’ve only introduced an extra O(1) possibilities of C 0 for every
(A0 , B 0 ) pair, or O(g 2 ) extras total. Hence we still only make O(g 2 ) calls to NextGroup.
By Lemma 12, these calls will require O(ng 2 ) time and O(n/g) space.
Our algorithm also calls the TISP(T (n), S(n)) algorithm for 3-SUM O(g 2 ) times on
instances of size O(n/g), which requires O(g 2 T (n/g)) time and O(S(n/g)) space.
We have shown Algorithm 1 is correct and has the desired runtime and space usage, so
this completes the proof.
J
4.2
General Theorem for Space Reduction
Our self-reduction for 3-SUM yields the following intriguing consequence: subquadratic-time
algorithms for 3-SUM imply subquadratic-time small-space algorithms for 3-SUM. Plugging
this connection into known 3-SUM algorithms, we can automatically obtain more spaceefficient 3-SUM algorithms for free. From a complexity-theoretic point of view, the consequence is perhaps even more intriguing: it means that the 3-SUM Conjecture is equivalent
to the statement that there is no subquadratic-time n0.51 -space 3-SUM algorithm, even
though the latter appears to be a more plausible lower bound(!).
We begin by stating our generic space reduction theorem.
I Theorem 14 (3-SUM Space Reduction). Suppose 3-SUM is solvable in n2 /f (n) time, where
1 ≤ f (n) ≤ n. Then 3-SUM is solvable by an algorithm running in O(n2 /f (n/g)) time and
O(n/h) space simultaneously, where g(n), h(n) ∈ [1, n] satisfy the relations
r
n
n
n
2
and h +
≤O
.
g(n) ≥ Ω
f (n/g(n))
f (n/(hg(n/h)))
f (n/g(n))
Proof. We will apply our Self-Reduction Theorem for 3-SUM (Theorem 13) in two different
ways. First, we will use the self-reduction (and the constraint on g(n)) to convert our 3SUM algorithm into a linear-space algorithm, with a modest increase in running time (if at
all). Pushing the linear-space algorithm through the self-reduction once more will reduce
the space bound further, without increasing the running time asymptotically (using the
constraint on h(n)).
Let T (n) := n2 /f (n). Set the parameter g(n) ≥ 1 to satisfy
r
n2 /g 2
n
T (n/g) =
= O(n); or, equivalently g = Ω
.
(1)
f (n/g)
f (n/g)
Assuming g satisfies (1), applying the 3-SUM Self-Reduction (Theorem 13) with T (n) = S(n)
and g, we can then solve 3-SUM in
n2
TISP g 2 (n + T (n/g)), n/g + T (n/g) = TISP
,n .
(2)
f (n/g)
ICALP 2016
XXX:10 Deterministic Time-Space Tradeoffs for k-SUM
Now, set new time and space bounds T (n) := n2 /f (n/g(n)), S(n) = n from (2). Then,
applying the 3-SUM Self-Reduction (Theorem 13) with the new T (n), S(n) and some parameter h, we can then solve 3-SUM in TISP(h2 (n + T (n/h)), n/h + S(n/h)) =
n2 /h2
n2
2
TISP h n +
, n/h ⊆ TISP
, n/h ,
f (n/(hg(n/h)))
f (n/g)
by our hypothesis on h.
J
Space-Efficient Fast 3-SUM
4.3
When we apply Theorem 14 directly to known algorithms, we obtain immediate space improvements with negligible loss in running time. Very recently, Gold and Sharir [16] have
given a faster 3-SUM algorithm in the real-RAM model, building on the work of Gronlund
and Pettie [17]:
I Theorem 15 (Gold and Sharir [16]). 3-SUM can be solved in O(n2 lg lg(n)/ lg(n)) time
over the reals and integers.
As discussed in the introduction, their novel approach
uses quite a bit ofspace. Applying
p
n lg(n)/ lg lg(n) , with the same
Theorem 14, we can reduce the space usage to only O
asymptotic running time of Gold and Sharir.
q
lg(n)
n lg(n)
I Corollary 16 (Space-Efficient 3-SUM Algorithm). 3-SUM is in TISP n2 lglg(n)
, lg
lg(n) .
Proof. We shall apply Theorem 14. First, set f (n) := lg(n)/ lg lg(n), so that 3-SUM is
2
solvable in O(nq
/f (n)) time by Theorem
q 15.
lg(n)
Set g(n) := n lg
and h(n) :=
lg(n)
of logarithms, observe that
√
f (n/g) = f (Õ( n)) = Θ(f (n)),
n lg lg(n)
lg(n) .
By our choice of f (n) and basic properties
(3)
and furthermore
√
f (n/(hg(n/h))) = f Õ( n)/Õ(n1/4 ) = Θ(f (n)).
(4)
By (3), we have
s
r
n lg lg(n)
n
g=
≥Ω
, so the first constraint of Theorem 14 is satisfied.
lg(n)
f (n/g)
Moreover, by (4) we have
n
n lg lg(n)
n
h +
=
+
, which is O
f (n/(hg(n/h)))
lg(n)
Θ(f (n))
2
n
f (n/g)
by (3).
Therefore the second constraint of Theorem 14 is also satisfied,
and 3-SUM is solvable by
p
2
an algorithm running in O(n /f (n)) time and O
nf (n) space simultaneously.
J
In general, Theorem 14 provides a generic reduction from faster 3-SUM algorithms to
faster space-efficient 3-SUM algorithms. To illustrate:
I Corollary 17. If 3-SUM is solvable in O(n2 / lga (n)) time for some constant a > 0, then
√
3-SUM is in TISP(n2 / lga (n), n lga/2 (n)).
A. Lincoln, V. Vassilevska Williams, J. R. Wang and R. R. Williams
XXX:11
Proof. We apply Theorem 14. By assumption we have 3-SUM in O(n2 /f (n)) time, where
√
√
f (n) = lga n. Set g(n) := n/ lga/2 (n), and h(n) := n/ lga/2 (n). Note that f (n/g(n)) =
Θ(lga (n)) and f (n/(h(n) · g(n/h(n)))) = Θ(lga (n)), similar to Corollary 16. Therefore
g(n) =
√
n/ lg
a/2
(n) ≥ Ω
r
n
f (n/g(n))
and
h2 +
n
≤O
f (n/(hg(n/h)))
n
lga n
≤O
n
f (n/g(n))
.
Hence Theorem 14 applies to these settings of the parameters, and 3-SUM is in O(n2 /f (n/g)) =
√
O(n2 / lga (n)) time and O(n/h) = O( n lga/2 (n)) space.
J
4.4
The 3-SUM Conjecture and Small Space
Finally, we use the Space Reduction Theorem (Theorem 14) to show that the 3-SUM conjecture is false, then it is also false with respect to small-space algorithms.
I Lemma 18. If 3-SUM is in O(n2− ) time for some > 0, then for every α > 0, there is a
δ > 0 such that 3-SUM is solvable in O(n2−δ ) time and O(n1/2+α ) space, simultaneously.
Proof. The proof of Theorem 14 applies the 3-SUM Self Reduction (Theorem 13) twice.
We will basically perform the first part of the proof of Theorem 14, but instead of applying
the second part of the proof, we have to choose a different setting of parameters, focused on
minimizing the space usage instead of preserving running time.
Let T (n) := n2 /f (n) with f (n) = n . We first reduce the space usage of the algorithm
to linear. To this end, set g(n) := n(1−)/(2−) . Then, applying the 3-SUM Self-Reduction
(Theorem 13) with T (n) = S(n) and g(n), we can then solve 3-SUM in
n2
n2
, n = TISP
TISP(g 2 (n + T (n/g)), n/g + T (n/g)) = TISP
,
n
.
f (n/g)
n/(2−)
Now reset f (n) := n/(2−) , and reset g(n) := n1/2+α with α ∈ (0, 1/2). Applying the
3-SUM Self-Reduction (Theorem 13) with T (n) = n2 /f (n), S(n) = n, and g(n) as above,
we find an algorithm for 3-SUM in
TISP n2−2α + n2−(1/2−α)/(2−) , n1/2+α .
Note that for all > 0 and α ∈ (0, 1/2), the running time bound is truly subquadratic.
Further note that for any α ≥ 1/2, we only have more space to work with, so we clearly
obtain O(n2−δ ) time and O(n1/2+α ) space (for some δ > 0) in that case as well.
J
This lemma can be applied to show that the 3-SUM Conjecture is equivalent to seemingly
much weaker statement:
Reminder of The Small-Space 3-SUM Conjecture (Conjecture 5) On a word-RAM with
O(log n)-bit words, there exists an > 0 such that every algorithm that solves 3-SUM in
O(n1/2+ ) space must take at least n2−o(1) time.
I Theorem 19. The Small-Space 3-SUM Conjecture is equivalent to the 3-SUM Conjecture.
ICALP 2016
XXX:12 Deterministic Time-Space Tradeoffs for k-SUM
Proof. It suffices to show that the 3-SUM Conjecture if true implies the Small-Space 3-SUM
Conjecture and that the refutation of the 3-SUM Conjecture implies the Small-Space 3-SUM
Conjecture. First, we observe that the 3-SUM Conjecture trivially implies the Small-Space
3-SUM Conjecture.
Suppose the 3-SUM Conjecture is false. Then a O(n2− ) time algorithm for 3-SUM
exists, and Lemma 18 implies that for every α > 0, there is a δ > 0 such that 3-SUM is
solvable in O(n2−δ ) time and O(n1/2+α ) space, simultaneously. But this means that for any
choice of 0 > 0 for the Small-Space 3-SUM Conjecture, we can find a truly-subquadratic
0
3-SUM algorithm that uses only O(n1/2+ /2 ) space. This would falsify the Small-Space
3-SUM Conjecture.
J
We conclude that, in order to prove the 3-SUM conjecture, it is sufficient to prove that
no algorithm can solve 3-SUM in TISP(n2− , n0.51 ) for some > 0.
5
5.1
k-SUM
k-SUM Self-Reduction
We now generalize from 3-SUM to k-SUM. Again, we plan to split the lists into g groups
of size O(n/g). By Corollary 11, we will have only O(g k−1 ) subproblems of size O(n/g).
Unlike 3-SUM, where we just used the naive algorithm to solve subproblems, in this section
we use a general algorithm; we reduce from k-SUM to itself (albeit on smaller instances).
I Theorem 20. Suppose real k-SUM can be solved in TISP(T (n), S(n)). Then for any g, it
can also be solved in TISP(g k−1 (n + T (n/g)), n/g + S(n/g)).
Proof. This follows from a generalized analysis of the proof of Theorem 13. We brute force
over which groups the first k − 1 elements are in. We then extract groups where the negative
sum of elements from these first k − 1 groups could land. By Corollary 11 and similar
reasoning as before, there are only O(g k−1 ) tuples of blocks. For each tuple, we make a call
to NextGroup and to our input k-SUM algorithm on a subproblem of size O(n/g). This
gives the desired time and space, completing the proof.
J
5.2
Applying our k-SUM Self-Reduction
We want to apply the self-reduction on efficient deterministic algorithms. One of the best
starting points is the Schroeppel-Shamir 4-SUM algorithm, which we note is actually deterministic and works on reals because it simply uses priority queues and reduces to the
classic 2-SUM algorithm, both of which only use comparisons.
I Lemma 21 (From [23]). Real 4-SUM is solvable in TISP(n2 , n).
Another useful fact observed by Wang is that an algorithm for k-SUM can be transformed
into an algorithm for (k + 1)-SUM by brute-forcing one element:
I Lemma 22 (From [25]). If Real k-SUM is solvable in TISP(T (n), S(n)) then real k+1-SUM
is solvable in TISP(nT (n), S(n) + 1).
Suppose we want to use our results to derive a linear-space algorithm for k-SUM. We
will assume k is a multiple of 4, although Lemma 22 allows us to fill in for the other values
of k. By writing down sums of k/4 elements, we can transform k-SUM to 4-SUM, yielding
a TISP(nk/2 , nk/4 ) algorithm. We can then apply Theorem 20 with g = n(k−4)/k to get a
A. Lincoln, V. Vassilevska Williams, J. R. Wang and R. R. Williams
XXX:13
TISP(nk−3+4/k , n) algorithm. Notice that this algorithm runs significantly faster than O(nk )
time; we get O(n11/2 ) for 8-SUM and O(n28/3 ) for 12-SUM. As a coarse upper bound, we
can apply Lemma 22 and round down our savings (to make things cleaner), compensating
for k which are not a multiple of 4, we get:
I Corollary 23. For k ≥ 4, k-SUM is solvable in TISP(nk−3+4/(k−3) , n).
√
Suppose we wanted to use O( n) space instead. We get smaller subproblems by making
√
more groups; choosing g = n(k−2)/k instead yields a TISP(nk−2+2/k , n). Similarly applying
Lemma 22 and round down our savings to compensate for k which are not a multiple of 4,
we get another coarse upper bound:
√
I Corollary 24. For k ≥ 4, k-SUM is solvable in TISP(nk−2+2/k , n).
6
Future Work
We would like to extend these results to derandomize other known randomized algorithms
for k-SUM. To do that, it seems we require a “deterministic simulation” of the hash functions used in those results. Baran, Demaine, and Patrascu use hashing to get subquadratic
algorithms for 3-SUM [7]; Patrascu uses it to reduce 3-SUM to Convolution 3-SUM [20];
Wang uses it to produce a family of linear-space algorithms for k-SUM [25]. Which of these
results, if any, can be derandomized?
The hash families involved have three crucial properties: load-balancing (the hash buckets are not “too large”), few subproblems (the number of k-tuples of hash buckets examined
is “small”), and few false positives (there are few non-k-SUM solutions mapped to k-tuples
of hash buckets examined). Our s-Select algorithm (Lemma 12) and Domination Lemma
(Lemma 10) are used to achieve the first two properties, without using randomization. Can
the last property also be simulated deterministically? (Note that it’s not entirely clear what
it would mean to simulate “few false positives” deterministically.) If so, it is likely that all
these results can be derandomized efficiently.
References
1
2
3
4
5
6
A. Abboud, K. Lewi, and R. Williams. Losing weight by gaining edges. In Algorithms ESA 2014 - 22th Annual European Symposium, Wroclaw, Poland, September 8-10, 2014.
Proceedings, pages 1–12, 2014.
A. Abboud, V. Vassilevska Williams, and O. Weimann. Consequences of faster alignment
of sequences. In Automata, Languages, and Programming - 41st International Colloquium,
ICALP 2014, Copenhagen, Denmark, July 8-11, 2014, Proceedings, Part I, pages 39–51,
2014.
A. Abboud and V. V. Williams. Popular conjectures imply strong lower bounds for dynamic
problems. In 55th IEEE Annual Symposium on Foundations of Computer Science, FOCS
2014, Philadelphia, PA, USA, October 18-21, 2014, pages 434–443, 2014.
N. Ailon and B. Chazelle. Lower bounds for linear degeneracy testing. J. ACM, 52(2):157–
171, 2005.
A. Amir, T. M. Chan, M. Lewenstein, and N. Lewenstein. On hardness of jumbled indexing.
In Automata, Languages, and Programming - 41st International Colloquium, ICALP 2014,
Copenhagen, Denmark, July 8-11, 2014, Proceedings, Part I, pages 114–125, 2014.
P. Austrin, P. Kaski, M. Koivisto, and J. Määttä. Space-time tradeoffs for subset sum:
An improved worst case algorithm. In Automata, Languages, and Programming - 40th
International Colloquium, ICALP 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part
I, pages 45–56, 2013.
ICALP 2016
XXX:14 Deterministic Time-Space Tradeoffs for k-SUM
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
A
I. Baran, E. D. Demaine, and M. Patraşcu. Subquadratic algorithms for 3sum. In Algorithms and Data Structures, pages 409–421. Springer, 2005.
P. Beame, R. Clifford, and W. Machmouchi. Element distinctness, frequency moments,
and sliding windows. In FOCS, pages 290–299, 2013.
P. Beame, M. E. Saks, X. Sun, and E. Vee. Time-space trade-off lower bounds for randomized computation of decision problems. J. ACM, 50(2):154–195, 2003.
M. Blum, R. W. Floyd, V. Pratt, R. L. Rivest, and R. E. Tarjan. Time bounds for selection.
Journal of computer and system sciences, 7(4):448–461, 1973.
A. Czumaj and A. Lingas. Finding a heaviest triangle is not harder than matrix multiplication. In Proc. SODA, pages 986–994, 2007.
S. Diehl, D. van Melkebeek, and R. Williams. An improved time-space lower bound for
tautologies. J. Comb. Optim., 22(3):325–338, 2011.
J. Erickson. Lower bounds for linear satisfiability problems. In Proceedings of the Sixth Annual ACM-SIAM Symposium on Discrete Algorithms, 22-24 January 1995. San Francisco,
California., pages 388–395, 1995.
L. Fortnow, R. J. Lipton, D. van Melkebeek, and A. Viglas. Time-space lower bounds for
satisfiability. J. ACM, 52(6):835–865, 2005.
A. Gajentaan and M. H. Overmars. On a class of O(n2 ) problems in computational geometry. Computational geometry, 5(3):165–185, 1995.
O. Gold and M. Sharir. Improved bounds for 3sum, k-sum, and linear degeneracy. arXiv
preprint arXiv:1512.05279, 2015.
A. Gronlund and S. Pettie. Threesomes, degenerates, and love triangles. In Foundations of
Computer Science (FOCS), 2014 IEEE 55th Annual Symposium on, pages 621–630. IEEE,
2014.
R. Impagliazzo and R. Paturi. On the complexity of k-SAT. J. Comput. Syst. Sci.,
62(2):367–375, 2001.
R. M. Karp. Reducibility among combinatorial problems. Springer, 1972.
M. Patrascu. Towards polynomial lower bounds for dynamic problems. In Proceedings of
the forty-second ACM symposium on Theory of computing, pages 603–610. ACM, 2010.
S. Pettie and V. Ramachandran. A shortest path algorithm for real-weighted undirected
graphs. SIAM J. Comput., 34(6):1398–1431, 2005.
M. Pătraşcu and R. Williams. On the possibility of faster sat algorithms. In Proceedings of
the Twenty-First Annual ACM-SIAM Symposium on Discrete Algorithms, SODA ’10, pages
1065–1075, Philadelphia, PA, USA, 2010. Society for Industrial and Applied Mathematics.
R. Schroeppel and A. Shamir. A T = O(2n/2 ), S = O(2n/4 ) algorithm for certain npcomplete problems. SIAM journal on Computing, 10(3):456–464, 1981.
V. Vassilevska and R. Williams. Finding, minimizing, and counting weighted subgraphs.
In Proceedings of the forty-first annual ACM symposium on Theory of computing, pages
455–464. ACM, 2009.
J. R. Wang. Space-efficient randomized algorithms for k-sum. In Algorithms-ESA 2014,
pages 810–829. Springer, 2014.
R. R. Williams. Time-space tradeoffs for counting NP solutions modulo integers. Computational Complexity, 17(2):179–219, 2008.
s-Select
In addition to NextGroup we have two other s-Select algorithms. We present two
algorithms to solve this subtask. The first requires the values to be integers in the range
[−R, R] and runs in word-TISP(n log R, 1) (recall we are in the word-RAM model and we are
measuring space in terms of the number of words). The other needs no assumptions and
A. Lincoln, V. Vassilevska Williams, J. R. Wang and R. R. Williams
XXX:15
returns the answers for g choices of k in TISP(n2 , g). The NextGroupalgorithm discussed
in subsection 3.2 runs in TISP(n, s).
A.1
Bounded Range s-Select
This first algorithm runs a binary search over the bounded range to locate the sth smallest
element.
Algorithm 2: Bounded Range s-Select Algorithm
Set ` = −R, r = R;
while ` < r do
Set m = b `+r
2 c;
Set c = 0;
for a ∈ L do
if m ≥ a then
Increment c;
if c ≥ s then
Set r = m;
else
Set ` = m + 1;
return `;
I Theorem 25. Algorithm 2 solves s-Select in word-TISP(n log R, 1).
Proof. Algorithm 2 returns the smallest integer v such that there are s values less than or
equal to v. Since all values are integers, by assumption, this is the sth smallest value. The
algorithm runs for O(log R) iterations, but each iteration does a scan of L that takes O(n)
time. The algorithm keeps a constant number of values, so it uses O(1) space.
J
A.2
Batch real k-Select
When we lose the range and integrality assumptions, we can still gain when we have several
s-Select instances with the same list L. In particular, suppose there are g indices we want
to know: s1 , . . . , sg , where g ≤ n, we can go through the list in order in n2 time noting and
ICALP 2016
XXX:16 Deterministic Time-Space Tradeoffs for k-SUM
saving the value of all of those indices. Furthermore, we can use this method over the reals.
Algorithm 3: Batch s-Select Algorithm
Set prev = −∞;
Create a return vector V of length g;
Set i = 1;
while i ≤ n do
Set curr = ∞;
for a ∈ L do
If a > prev, set curr = min(curr, a);
Set dup = 0;
for a ∈ L do
If a = curr, increment dup;
for j = [1, g] do
If kj ∈ [i, i + dup), set V [j] = curr;
Set prev = curr;
Increment i by dup;
return V ;
I Theorem 26. Algorithm 3 solves batch real s-Select in TISP(n2 , g).
Proof. Algorithm 3 repeatedly scans L, each time finding the next largest element. After
it finds the sth smallest element, it checks to see if s was one of the requested indices, and
if so, fills it into its answer. The algorithm performs O(n) scans of L and the kj , but since
g ≤ n, this runs in O(n2 ) time. Keeping g elements around takes O(g) space.
J
| 8cs.DS
|
1
Flow: Architecture and Benchmarking for
Reinforcement Learning in Traffic Control
arXiv:1710.05465v1 [cs.AI] 16 Oct 2017
Cathy Wu∗ , Aboudy Kreidieh† , Kanaad Parvate∗ , Eugene Vinitsky‡ , Alexandre M Bayen∗†§
∗ UC Berkeley, Electrical Engineering and Computer Science
† UC Berkeley, Department of Civil and Environmental Engineering
‡ UC Berkeley, Department of Mechanical Engineering
§ UC Berkeley, Institute for Transportation Studies
Abstract—Flow is a new computational framework, built to
support a key need triggered by the rapid growth of autonomy
in ground traffic: controllers for autonomous vehicles in the
presence of complex nonlinear dynamics in traffic. Leveraging
recent advances in deep Reinforcement Learning (RL), Flow
enables the use of RL methods such as policy gradient for traffic
control and enables benchmarking the performance of classical
(including hand-designed) controllers with learned policies (control laws). Flow integrates traffic microsimulator SUMO with
deep reinforcement learning library rllab and enables the easy
design of traffic tasks, including different networks configurations
and vehicle dynamics. We use Flow to develop reliable controllers
for complex problems, such as controlling mixed-autonomy traffic
(involving both autonomous and human-driven vehicles) in a ring
road. For this, we first show that state-of-the-art hand-designed
controllers excel when in-distribution, but fail to generalize; then,
we show that even simple neural network policies can solve the
stabilization task across density settings and generalize to outof-distribution settings.
Index Terms—Learning and Adaptive Systems; Deep Reinforcement Learning; Traffic Microsimulation
I. I NTRODUCTION
Transportation accounts for 28% of energy consumption in
the US. Workers spent on aggregate over three million driveryears commuting to their jobs [1], with significant impact
on nation-wide congestion. Based on 2012 estimates, U.S.
commuters experienced an average of 52 hours of delay per
year, causing $121 billion of delay and fuel costs annually
[2]. Depending on its use in traffic, automation has the
potential to achieve many benefits or to exacerbate problems
at the system level, with potential amelioration or worsening
of various system metrics including greenhouse gas (GHG)
emissions, vehicle miles traveled (VMT), total travel time
(TTT). Estimates project that 2% of fuel consumption today is
wasted due to congestion, a figure that rises to 4.2% in 2050
[3]. As such, the potential efficiency improvement provided
by autonomous vehicles is two to four percent of total fuel
consumption due to the alleviation of congestion alone.
In recent breakthrough experiments, Stern et al. [4] demonstrated a reduction in fuel consumption over 40% by the
insertion of an autonomous vehicle in ring traffic to dampen
the famous ring instabilities displayed by Sugiyama et al. in
his seminal 2008 experiment [5]. This very disruptive field
Corresponding author: Cathy Wu ([email protected])
Email addresses: {aboudy, kanaad, evinitsky, bayen}@berkeley.edu
operational test is one of the motivations for the present work:
it demonstrates the power of automation and its potential
impact on complex traffic phenomena such as stop-and-go
waves [6].
The breakthrough results [4], [7] are part of a broader
core set of robotics challenges concerning the deployment
of multi-agent automation systems, such as fleets of selfdriving cars [8], [9], coordinated traffic lights [10], [11],
or other coordinated infrastructure. Robotics has already
demonstrated tremendous potential in improving transportation systems through autonomous vehicles research; highly
related problems include localization [12], [13], [14], path
planning [15], [16], collision avoidance [17], and perception
[18] problems. Considerable progress has also been made
in recent decades in vehicle automation, including anti-lock
braking systems (ABS), adaptive cruise control, lane keeping,
automated parking, etc. [19], [20], [21], [22], which also have
great potential to improve energy efficiency and safety in
traffic. Down the road, the emergence of automated districts,
i.e. districts where all vehicles are automated and operate
efficiently with collaborative path-planning, might push this
paradigm to next generation mobility [23]. Fleets of autonomous vehicles have recently been explored in the context
of shared-mobility systems, such as autonomous mobility-ondemand systems, which abstracts out the low-level vehicle
dynamics and considers a queuing theoretic model. Lowlevel vehicle dynamics, however, are of crucial importance, as
exhibited by [24] and because many traffic phenomena, which
affect energy consumption, safety, and travel time are exhibited
at the level of low-level dynamics [5], [25], [26], [27]. In some
settings, model-based controllers enable analytical solutions,
or tractable algorithmic solutions. However, often, due to the
nonlinearity of the models, numerous guarantees are lost in
the process of developing controllers (i.e. optimality, run-time,
complexity, approximation ratio, etc.). For example, while the
ring setting enables elegant controllers to work in practice, the
extension of these results (both theoretical and experimental)
to arbitrary settings (network topologies, number of lanes,
heterogeneity of the fleet, etc.) is challenging.
Deep reinforcement learning (RL), which is the main enabler in our framework, is a powerful tool for control and has
already had demonstrated success in complex but data-rich
problem settings such as Atari games [28], 3D locomotion
and manipulation [29], [30], [31], chess [32], among others.
2
RL testbeds exist for different problem domains, such as the
Arcade Learning Environment (ALE) for Atari games [33],
DeepMind Lab for a first-person 3D game [34], OpenAI gym
for a variety of control problems [35], FAIR TorchCraft for
Starcraft: Brood War [36], MuJoCo for multi-joint dynamics
with Contact [37], TORCS for a car racing game [38], among
others. DeepMind and Blizzard will collaborate to release
the Starcraft II AI research environment [39]. Each of these
RL testbeds enables the study of control through RL of a
specific problem domain by leveraging of the data-rich setting
of simulation. One of the primary goals of this article is to
present a similarly suitable RL testbed for traffic dynamics by
making use of an existing traffic simulator.
These recent advances in deep RL provide a promising
alternative to model-based controller design, which the present
article explores. One key step in the development of such
paradigms is the ability to provide high fidelity microsimulations of traffic that can encompass accurate vehicle dynamics
to simulate the action of these new RL-generated control
policies, a pre-requisite to field experimental tests. This is
precisely one of the aims of the present article. RL promises
an approach to design controllers using black box machine
learning systems. It still requires physical vehicle response
to be incorporated in the simulation to learn controllers that
match physical vehicle dynamics. This problem extends beyond the vehicle for which the controller is to be designed.
For example, although vehicle velocity is intuitive as a control
variable, it is important to keep in mind that other variables,
such as actuator torques, are those actually controlled; another
example is that the input may consist of data from cameras,
LIDAR, or radar. The conversion between the variables might
or might not be direct and may require the design of additional
controllers, the performance of which would also have to be
considered.
In the present article, we propose the first (to our knowledge) computational framework and architecture to systematically integrate deep RL and traffic microsimulation, thereby
enabling the systematic study of autonomous vehicles in
complex traffic settings, including mixed-autonomy and fullyautonomous settings. Our framework permits both RL and
classical control techniques to be applied to microsimulations.
As classical control is a primary approach for studying traffic
dynamics, supporting benchmarking with such methods is
crucial for measuring progress of learned controllers. As an
illustration, this article provides a benchmark of the relative performance of learned and explicit controllers [4] for
the mixed-autonomy ring road setting. The computational
framework encompasses model-free reinforcement learning
approaches, which complement model-based methods such as
model-based reinforcement learning, dynamic programming,
optimal control, and hand-designed controllers; these methods
dramatically range in complexity, sometimes exhibiting prohibitive computational costs. Our initial case study investigates
microscopic longitudinal dynamics (forwards-backwards) [40]
and lateral dynamics (left-right) [41] of vehicles. We study
a variety of network configurations, and our proposed framework largely extends to other reinforcement learning methods
and other dynamics and settings, such as coordinated behaviors
[42], other sophisticated behavior models, and more complex
network configurations.
The contribution of this article includes three components,
(1) a computational framework and architecture, which provides a rich design space for traffic control problems and
exposes model-free RL methods, (2) the implementation of
several instantiations of RL algorithms that can solve complex
control tasks, and (3) a set of use cases that illustrates
the power of the building block and benchmark scenarios.
Specifically, our contributions are:
•
•
•
•
•
•
Flow, a computational framework for deep RL and control
experiments for traffic microsimulation. Flow integrates
the traffic microsimulator SUMO [43] with a standard
deep reinforcement learning library rllab [44], thereby
permitting the training of large-scale reinforcement learning experiments at scale on Amazon Web Services (AWS)
Elastic Compute Cloud (EC2) for traffic control tasks.
Our computational framework is open-source and available at https://github.com/cathywu/flow.
An interface, provided by Flow for the design of traffic
control tasks, including customized configurations of different road networks, vehicle types and vehicle dynamics,
noise models, as well as other attributes provided by a
standard Markov Decision Process (MDP) interface.
Extensions of SUMO to support high frequency simulation and greater flexibility in controllers.
Exposing model-free reinforcement algorithms for discounted finite (partially observed) MDPs such as policy
gradient, with specific examples including Trust Region
Policy Optimization (TRPO) [30] and Generalized Advantage Estimation (GAE) [29], to the domain of traffic
control problems.
Benchmarking of relative performance of learned and
explicit controllers in rich traffic control settings. We
present a benchmark on the mixed-autonomy single-lane
ring road network and find that a reinforcement learning
agent is capable of learning policies exceeding the performance of state-of-the-art controllers. The particular case
of Sugiyama instabilities [5] is used to demonstrate the
power of our tool.
Case studies for building block networks. We demonstrate deep RL results on traffic at the level of multiagent vehicle control. We demonstrate all-human, mixedautonomy, and fully-autonomous experiments on more
complex traffic control tasks, such as a multi-lane ring
road and a figure 8 network. We provide additional
networks, including a merge network and an intersection
networks.
The rest of the article is organized as follows. Section II
provides background on the RL framework used in the rest
of the article. Section III describes the architecture of Flow
and the processes it can handle in the three computational
environments they are run (incl. SUMO and rllab). Section IV presents the various building blocks used by SUMO
for building general networks (underlying maps). Section V
presents the various settings for the optimization, incl. action
/ observation space, reward functions and policies. This is
3
followed by two experimental sections: in Section VI, in which
we benchmark the performance of the RL-based algorithm to
the seminal FollowerStopper controller [4], and Section VII
which presents a series of various other experiments on the
building block network modules of Flow. Finally, Section VIII
presents related work to place this in the broader context of
traffic flow modeling, deep RL and microsimulations.
II. P RELIMINARIES
In this section, we define the notation used in subsequent
sections.
The system described in this article solves tasks which
conform to the standard interface of a finite-horizon discounted
Markov decision process (MDP) [45], [46], defined by the
tuple (S, A, P, r, ρ0 , γ, T ), where S is a (possibly infinite) set
of states, A is a set of actions, P : S × A × S → R≥0
is the transition probability distribution, r : S × A → R
is the reward function, ρ0 : S → R≥0 is the initial state
distribution, γ ∈ (0, 1] is the discount factor, and T is the
horizon. For partially observable tasks, which conform to the
interface of a partially observable Markov decision process
(POMDP), two more components are required, namely Ω, a
set of observations, and O : S × Ω → R≥0 , the observation
probability distribution.
RL studies the problem of how agents can learn to take
actions in its environment to maximize its cumulative reward.
The Flow framework uses policy gradient methods [47], a
class of reinforcement learning algorithms which optimize
a stochastic policy πθ : S × A → R≥0 . These algorithms
iteratively update the parameters of the policy through optimizing the expected cumulative reward using sampled data
from SUMO. The policy usually consists of neural networks,
and may be of several forms. Two policies used in this article
are the Multilayer Perceptron (MLP) and Gated Recurrent Unit
(GRU). MLP is a classical artificial neural network with multiple hidden layers and utilizes backpropagation to optimize its
parameters [48]. GRUs are recurrent neural network capable
of storing memory on the previous states of the system through
the use of parametrized update and reset gates, which are also
optimized by the policy gradient method [49]. This enables
GRUs to make decisions based on both current input and past
inputs.
The autonomous vehicles in our system execute controllers
which are parameterized policies, trained using policy gradient
methods. For all experiments in this article, we use the
Trust Region Policy Optimization (TRPO) [30] policy gradient
method for learning the policy, linear feature baselines as
described in [44], discount factor γ = 0.999, and step size
0.01. For most experiments, a diagonal Gaussian MLP policy
is used with hidden layers (100, 50, 25) and tanh nonlinearity. The experiment stabilizing the ring, described later,
uses a hidden layer of shape (3,3). For experiments requiring
memory, a GRU policy with hidden layers (5,) and tanh nonlinearity is used.
III. OVERVIEW OF F LOW
Flow is created to fill the gap between modern machine
learning and complex control problems in traffic. Flow is
Fig. 1: Flow Process Diagram. Flow interfaces SUMO via TraCI with rllab to
permit the construction and simulation of traffic MDPs and for the training and
evaluation of policies (control laws). After initializing the simulation in some
initial configuration, rllab collects samples by advancing and observing the
simulation. In each step, vehicles are provided actions through a pre-specified
controller or through a policy (via rllab). These actions are then applied via
TraCI and the simulation progresses. At the end of an episode, rllab issues
a reset command to the environment, which returns vehicles to their initial
(possibly random) position.
a computational framework for traffic microsimulation with
RL methods. Although the architecture is agnostic to specific
machine learning and traffic software packages, we chose to
integrate widely used open-source tools to promote access and
extension.
The first of those open-source tools is SUMO (Simulation
of Urban MObility) [43]. SUMO is a continuous-time and
continuous-space microscopic traffic simulator. It is capable of
handling large road networks and of modeling the dynamics of
each vehicle in the simulation. SUMO was chosen particularly
for its extensibility, as it includes an API called TraCI (Traffic
Control Interface). TraCI allows users to extend existing
SUMO functionality through querying and modifying the state
of the simulation, at the single time-step resolution. This
allows the user to easily provide intricate, custom commands
that modify the simulation directly.
Secondly, we use rllab, an open source framework that
enables running and evaluating RL algorithms on a variety
of different scenarios, from classic tasks such as cartpole
balancing to more complicated tasks such as 3D humanoid
locomotion [44]. Flow uses rllab to facilitate the training, optimization, and application of control policies that manipulate
the simulation. By modeling traffic scenarios as reinforcement learning problems, we use rllab to issue longitudinal
and lateral controls to vehicles. Rllab further interfaces with
OpenAI Gym, another framework for the development and
4
evaluation of reinforcement learning algorithms. The SUMO
environments built in Flow are also compatible with OpenAI
Gym.
Flow encapsulates SUMO via TraCI to permit the definition and simulation of traffic MDPs for rllab to train and
evaluate policies. After initializing the simulation in some
initial configuration, rllab collects samples by advancing and
observing the simulation. In each step, vehicles are provided
actions through a pre-specified controller or through a policy.
These actions are then applied via TraCI and the simulation
progresses. After a specified number of timesteps (i.e. the
end of a rollout) or after the simulation has terminated early
(i.e. a vehicle has crashed), rllab issues a reset command
to the environment, which returns vehicles to their initial
(possibly random) position. The interactions between Flow,
SUMO/TraCI, and rllab are illustrated in Figure 1.
In addition to learned policies, Flow supports classical
control (including hand-designed controllers and calibrated
models of human dynamics) for longitudinal and lateral control. Flow also supports the car following models and lanechanging models that are provided in SUMO. These models
work analogously to the policies generated by rllab, providing
longitudinal and lateral controls to vehicles through ordinary
differential equations. Together, these controllers comprise the
overall dynamics of mixed-autonomy, fully-human, or fullautonomy settings.
Additionally, Flow provides various failsafes presented in
Appendix C, including the ones that are built into SUMO, to
prevent the vehicles from crashing and the simulation from
terminating early.
Flow can be used to perform both pure model-based control
experiments by using only pre-specified controllers for issuing
actions, as well as experiments with a mixture of pre-specified
and learned controllers. Together, this permits the study of
heterogeneous or mixed-autonomy settings.
A. Architecture of Flow
supporting components as well as their interactions are summarized in Figure 2.
The scenario for an experiment specifies network configuration in the form of network shape and attributes, for
example two-lane loop road with circumference 200m, or by
importing OpenStreetMap data (see Figure 3). Based on the
specifications provided, the net and configuration files needed
by SUMO are generated. The user also specifies the number
and types of vehicles (car following model and a lane-change
controller), which will be placed in the scenario.
The generator is a predefined class, which allows for
rapid generation of scenarios with user-defined sizes, shapes,
and configurations. The experiments presented in this article
include large loop roads generated by specifying the number
of lanes and ring circumference, figure eight networks with
a crossing intersection, closed loop “merged” networks, and
standard intersections.
The environment encodes the MDP, including functions
to step through the simulation, retrieve the state, sample and
apply actions, compute the reward, and reset the simulation.
The environment is updated at each timestep of the simulation
and, importantly, stores each vehicle’s state (e.g. position and
velocity). Information from the environment is provided to
a controller or passed to rllab to determine an action for a
vehicle to apply, e.g. an acceleration. Note that the amount
of information provided to either RL or to a controller can be
restricted as desired, thus allowing fully observable or partially
observable MDPs. This article studies both fully and partially
observed settings.
When provided with actions to apply, Flow calls the action applicator which uses TraCI to enact the action on
the vehicles. Actions specified as accelerations are converted
into velocities, using numerical integration and based on the
timestep and current state of the experiment. These velocities
are then applied to vehicles using TraCI.
IV. N ETWORKS
Flow currently supports learning policies on a variety of networks with a fixed number of vehicles. These include closed
networks such as single and multi-lane ring roads, figure eight
networks, and loops with merge as well as open networks, such
as intersections. See Figure 3 for various example networks
supported by Flow. In each of these networks, Flow can be
used to study the design or learning of controllers which
optimize the system-level velocity or fuel consumption, in the
presence of different types of vehicles, model noise, etc.
Fig. 2: Flow Architecture. A Flow experiment involves a scenario and
environment, interfaced with rllab and controllers. The experiment scenario
runs a generator to create road networks for use in SUMO, which is started
by the environment. Controllers and rllab take experiment states and return
actions, which are applied through SUMO’s TraCI API. (See Section III-A).
An experiment using Flow requires defining two components: a scenario and an environment. These and several
Single-lane Ring Roads: The ring road network consists
of a circular lane with a specified length, inspired by the
230m track studied by Sugiyama et al. [5]. This network has
been extensively studied and serves as an experimental and
numerical baseline for benchmarking.
Multi-lane Ring Roads: Multi-lane ring roads are a natural extension to problems involving a single lane ring. The
inclusion of lane-changing behavior in this setting makes
studying such problems exceedingly difficult from an analytical perspective, thereby constraining most classical control
techniques to the single-lane case. Many multi-lane models
5
Fig. 3: Various network building blocks supported by the Flow framework. Top left: Single-lane Ring Road Network. Top middle: Multi-Lane Ring Road
Network. Top right: Figure-Eight Road Network. Bottom left: Intersection Network. Bottom Middle: Closed Loop Merge Network. Bottom right: Imported
San Francisco Network (currently operational for forward simulation). Maps in Flow can be generated from OSM data and visualized using SUMO.
forgo longitudinal dynamics in order to encourage tractable
analysis [50], [51], [52], [53]. Recent strides have been made
in developing simple stochastic models that retain longitudinal
dynamics while capturing lane-changing dynamics in a single
lane setting [54]. Modern machine learning methods, however,
do not require a simplification of the dynamics for the problem
to become tractable, as explored in Section VII.
the control zone, the system speeds or slows down vehicles
to either maximize average velocity or minimize experienced
delay. The building block can be used to build a general
schema for arbitrary maps such as one the one shown in
Figure 3 (bottom right).
Figure Eight: The figure eight network is a simple closed
network with an intersection. Two ring roads, placed at opposite ends of the network, are connected by two perpendicular
intersections. Vehicles that try to cross this intersection from
opposite ends are constrained by a right-of-way model provided by SUMO to prevent crashes.
Flow provides an interface for fine-grained traffic control
task design. This section describes the options in the task
design space, beyond the selection of a network configuration,
as described in Section IV.
Loops with Merges: This network permits the study of merging behavior in closed loop networks. This network consists
of two ring roads which are connected together. Vehicles in
the smaller ring stay within this ring, while vehicles in the
larger ring try to merge into the smaller ring and then back
out to the larger ring. This typically results in congestion at
the merge points.
Intersections: This network permits the study of intersection
management in an open network. Vehicles arrive in the control
zone of the intersection according to a Poisson distribution. At
V. TASK SPACE
Action Space: When following a pre-defined route, a vehicle performs longitudinal (acceleration) and lateral (lanechanging) actions. Accordingly, for tasks with k autonomous
vehicles, the action space is a set of accelerations c ∈ Rk
and lane-changing decisions d ∈ [−1, 1]k . The lane-changing
values are rounded to the nearest integer (-1, 0, 1) denoting
lane-change left, do not lane-change, and lane-change right,
respectively; this keeps the action space representation continuous. In cases where the network only has one lane, the action
space may be reduced to solely a set of accelerations.
Observation Space: The observation space may be any set
of state information the user wishes to provide to the agent.
6
This information may fully or partially describe the state of
the environment. For instance, the autonomous vehicles may
observe only the preceding vehicle, only nearby vehicles, or
all vehicles and their corresponding position, relative position,
velocity, lane information, etc.
Custom Reward Functions: The reward function can be
any function of vehicle speed, position, fuel consumption,
acceleration, distance elapsed, etc. Note that existing OpenAI
Gym environments (atari and mujoco) come with a prespecified reward function [35]. However, depending on the
context, a researcher, control engineer, or planner may desire
a different reward function or may even want to study a range
of reward functions.
For all experiments presented in this article, we evaluate the
reward on the average velocity of vehicles in the network. At
times, this reward is also augmented with an added penalty
to discourage accelerations or excessive lane-changes by the
autonomous vehicles.
Heterogeneous Settings: Flow supports traffic settings with
heterogeneous vehicle types, such as those with different controllers or parameters. Additionally, simulations can contain
both learning agents (autonomous vehicles) and vehicles with
pre-specified controllers or dynamics. This permits the use of
Flow for mixed autonomy experiments.
Noise and Perturbations: Arbitrary vehicle-level perturbations can be specified in an experiment, choosing and randomly perturbing a vehicle by overriding its control inputs
and commanding a deceleration for some duration. Gaussian
noise may also be introduced to the accelerations of all human
car-following models in Flow.
Vehicle Placement: Flow supports several vehicle placement
methods that may be used to generate randomized starting
positions. Vehicles may be distributed uniformly across the
length of the network or perturbed from uniformity by some
noise. In addition, vehicles may be bunched together to reduce
the space they take up on the network initially, and spread
out across one or multiple lanes (if the network permits it);
these create configurations resembling traffic jams. Finally, the
sequence in which vehicles are placed in the system may also
be randomly shuffled, and thus their ordering in the state space
may be randomized.
VI. C ASE STUDY: MIXED - AUTONOMY RING
This section uses Flow to benchmark the relative performance of an explicit controller and the reinforcement learning
approach to a given set of scenarios. The next section will
show similar outcomes of our RL approaches, including examples for which there are no known explicit controllers.
The goal of this section is to demonstrate the performance
of the reinforcement learning approach on the problem introduced by the seminal work of Stern et al. [4] on the mixedautonomy single-lane ring, following the canonical singlelane ring setup of Sugiyama et al. [5], consisting of 22
human-driven vehicles on a 230m ring track. The seminal
work of Sugiyama et al. [5] shows that such a dynamical
system produces backward propagating waves, causing part
of the traffic to come to a complete stop, even in the absence of typical traffic perturbations, such as lane changes
and intersections. The breakthrough study of Stern et al. [4]
studies the case of 21 human-driven vehicles and one vehicle
following one of two proposed controllers, which we detail
in Sections VI-1 and VI-2. This setting invokes a cascade of
nonlinear dynamics from n (homogeneous) agents. In this and
following sections, we study the potential for machine learning
techniques (RL in particular) to produce well-performing controllers, even in the presence of highly nonlinear and complex
settings.
We begin by defining the experimental setup and the stateof-the-art controllers that had been designed for the mixedautonomy ring setting. We then benchmark the performance
of the controller learned by Flow under the same experimental
setup against the hand-designed controllers under a partially
observed setting.
Experimental Scenario: In our numerical experiments, we
similarly study 22 vehicles, one of which is autonomous,
with ring lengths ranging between 180m and 380m, resulting
in varying traffic densities. The vehicles are each 5m long
and follow Intelligent Driver Model (IDM) dynamics with
parameters specified by [55]. The IDM dynamics are additionally perturbed by Gaussian acceleration noise of N (0, 0.2),
calibrated to match measures of stochasticity to the IDM
model presented by [56]. We focus on the partially observed
setting of observing only the velocity of the autonomous
vehicle, the velocity of its preceding vehicle, and its relative
position to the preceding vehicle. Each experiment runs for a
finite time horizon, ranging from 150 to 300 seconds.
Definitions: We briefly present the important terms used in
this case study. Uniform flow is an equilibrium state of the
dynamical system (and a corresponding solution to the dynamics) where vehicles are traveling at a constant velocity. In this
article, because the dynamical system has multiple equilibria,
we use uniform flow to describe the unstable equilibrium
in which the velocity is constant. We call this velocity the
equilibrium velocity of the system. Uniform flow differentiates
it from the stable equilibrium in which stop-and-go waves are
formed, which does not exhibit a constant velocity.
Settings: We compare the following controllers and observation settings for the single autonomous vehicle:
•
•
•
•
•
Learned agent with GRU policy with partial observation.
Learned agent with MLP policy with partial observation.
Proportional Integral (PI) controller with saturation with
partial observation. This controller is given in [4] and is
provided in Section VI-2.
FollowerStopper with partial observation and desired
velocity fixed at 4.15 m/s. The FollowerStopper controller
is introduced in [4] and is provided in Section VI-1.
FollowerStopper requires an external desired velocity, so
we selected the largest fixed velocity which successfully
stabilizes the ring at 260m; this is further discussed in
the results.
Fully-human setting using Intelligent Driver Model
(IDM) controller, which is presented in more details in
7
Appendix A. This setting reduces to Sugiyamas result of
traffic jams [5] and serves as a baseline comparison.
Explicit Controllers: In this section, we describe the two
state-of-the-art controllers for the mixed-autonomy ring,
against which we benchmark our learned policies generated
using Flow.
1) FollowerStopper: Recent work by [4] presented two
control models that may be used by autonomous vehicles
to attenuate the emergence of stop-and-go waves in a traffic
network. The first of these models is the FollowerStopper.
This model commands the autonomous vehicles to maintain a
desired velocity U , while ensuring that the vehicle does not
crash into the vehicle behind it. Following this model, the
command velocity v cmd of the autonomous vehicle is:
0
if ∆x ≤ ∆x1
v ∆x−∆x1
if
∆x1 < ∆x ≤ ∆x2
∆x2 −∆x1
(1)
v cmd =
∆x−∆x
2
v + (U − v) ∆x3 −∆x2 if ∆x2 < ∆x ≤ ∆x3
U
if ∆x3 < ∆x
where v = min(max(v lead , 0), U ), v lead is the speed of
the leading vehicles, ∆x is the headway of the autonomous
vehicle, subject to boundaries defined as:
∆xk = ∆x0k +
1
(∆v− )2 , k = 1, 2, 3
2dk
(2)
The parameters of this model can be found in [4].
2) PI with Saturation: In addition to the FollowerStopper
model, [4] presents a model titled the “PI with Saturation
Controller” that attempts to estimate the average equilibrium
velocity U for vehicles on the network, and then drives at that
speed. This average is computed
Pm AVas a temporal average from
1
its own history: U = m
j=1 vj . The target velocity at any
given time is then defined as:
∆x − gl
v target = U + v catch × min max
,0 ,1
(3)
gu − gl
Finally, the command velocity for the vehicle at time j + 1,
which also ensures that the vehicle does not crash, is:
cmd
vj+1
= βj (αj vjtarget + (1 − αj )vjlead ) + (1 − βj )vjcmd
(4)
The values for all parameters in the model can be found in
[4].
Results: Through this detailed case study of the mixedautonomy single-lane ring, we demonstrate that Flow enables the fine-grained benchmarking of classical and learned
controllers. Videos and additional results are available at
https://sites.google.com/view/ieee-tro-flow.
1) Performance: Figure 6 shows several key findings. This
traffic density vs. velocity plot shows the performance of
the different learned and hand-designed controllers. First, we
observe that GRU and MLP controllers (in partially observed
settings) are capable of matching the uniform flow speed very
closely for all trained densities, thereby effectively stabilizing
traffic in all densities in the training range. The PI with
Saturation controller, on the other hand, is only capable of
properly performing at densities less than or equal to the
density at which it was calibrated (less congested settings).
Figure 4 shows the velocity profiles for the different learned
and hand-designed controllers for the 260m ring and additionally includes the FollowerStopper controller. We observe
that although all controllers are able to stabilize the system,
the GRU controller allows the system to reach the uniform
flow equilibrium velocity most quickly. The GRU and MLP
policies stabilize the system with less oscillatory behavior than
the FollowerStopper and PI with Saturation controllers, as
observed in the velocity profiles. In addition, the FollowerStopper controller is the least performant; the controller can
only stabilize a 260m ring road to a speed of 4.15 m/s, well
below the 4.82 m/s uniform flow velocity.
Finally, Figure 5 shows the space-time curves for all vehicles in the system, using a variety of controllers. We observe
that the PI with Saturation and FollowerStopper controllers
leave much smaller openings in the network (smaller headways) than the MLP and GRU policies. The MLP policy
exhibits the largest openings, as can be seen by the large
white portion of the MLP plot within Figure 5. If this were
instead applied in a multi-lane ring study, then the smaller
openings would have the benefit of preventing opportunistic
lane changes, so this observation can lead to better reward
design for more complex mixed-autonomy traffic studies.
2) Robustness: One of the strengths of our GRU and MLP
policies is that it does not rely on external calibration of
parameters that is specific to a particular traffic setting, such
as density.
Although the PI with Saturation controller can conceptually
adjust to different densities, with its moving average filter, we
experimentally found that its performance is sensitive to its
parameters. Using parameters calibrated for 260m ring roads
(as described in [4]), the PI with Saturation controller indeed
performs the best at 260m among the density range considered
in this study. However, this controller’s performance quickly
degrades at higher density (more congested settings), dipping
close to the stop-and-go equilibrium velocity.
Similarly, the FollowerStopper Controller suffers from the
same calibration deficiencies as the PI with Saturation Controller. Additionally, the desired velocity must be provided
beforehand. Interestingly and moreover, we found that this
controller often fails to stabilize the system if provided too
high of a desired velocity, even if it is well below the
equilibrium velocity. Instead, if a lower desired velocity is first
provided as an intermediate control target, then the desired
velocity may then subsequently be achieved. This suggests
that a simple control law such as the FollowerStopper cannot
optimally stabilize a mixed-autonomy ring, and additionally,
that there is additional tuning and augmentation necessary to
use the FollowerStopper controller.
3) Generalization of the Learned Control Policy: Training
on different vehicle densities encourages the learning of a
more robust policy. We found the policy to generalize even
to densities outside of the training regime. Figure 6 shows the
average velocity vehicles in the network achieve for the final
100s of simulation time; the gray regions indicate the testtime densities. Surprisingly, we found that even when training
on different densities but in the absence of acceleration error
in the human driver models, the learned policies successfully
8
Fig. 4: All experiments are run for 300 seconds with the autonomous vehicle acting as a human driver before it is “activated”. As we can see, an autonomous
vehicle trained in a partially observable ring road setting with variable traffic densities is capable of stabilizing the ring in a similar fashion to the FollowerStopper
and PI with Saturation Controller. Among the four controller, the GRU controller allows the system to reach the uniform flow equilibrium velocity most
quickly. In addition, the FollowerStopper controller is the most brittle and can only stabilize a 260m ring road to a speed of 4.15 m/s, well below the 4.82
m/s uniform flow velocity.
9
Fig. 5: Prior to the activation of the autonomous vehicles, all settings exhibit backward propagating waves resulting from stop-and-go behavior. The autonomous
vehicles then perform various controlled policies aimed at attenuating these waves. Top left: Space-time diagram for the ring road with a FollowerStopper
Controller. Top Right: Space-time diagram for the ring road with a PI with Saturation Controller. Bottom left: Space-time diagram for the ring road with an
MLP Controller. Bottom right: Space-time diagram for the ring road with a GRU Controller.
stabilized settings with human model noise during test time.
Fig. 6: The performance of the MLP, GRU, and PI Saturation controllers for
various densities are averaged over ten runs for each of the tested densities.
The GRU and MLP controllers are capable of matching the uniform flow
speed very closely for all trained densities. The PI with Saturation controller,
on the other hand, is only capable of properly performing at densities less than
or equal to the density at which it was calibrated. Remarkably, the GRU and
MLP controllers are also reliable enough to stabilize the system at velocities
close to the uniform flow equilibrium even for densities outside the training
set.
Discussion: This benchmark study demonstrates that deep RL,
policy gradient methods in particular, using the same state
information provided to the hand-designed controllers and
with access to samples from the overall traffic system (via
a black box simulator), can learn a controller which performs
better than state-of-the-art hand-designed controllers for the
given setting, in terms of average system-level velocity.
This study focuses on the partially observed setting, since
it is the more realistic setting for near-term deployments. Furthermore, there are hand-designed controllers in the literature
for this setting, with which we can benchmark. We would
expect that the fully observed setting (with an MLP policy)
would perform as well if not better than our learned policies
in the partially observed setting. Since our policies already
closely track the equilibrium velocity curve, we do not explore
the fully observed setting.
VII. F LOW EXPERIMENTS
This section uses Flow to extend the settings typically
studied for controller design, presented in Section VI, to
include examples more representative of real-world traffic.
As traffic is a complex phenomena, it is crucial to build
tools to explore more complex and realistic settings. In the
following, we demonstrate these for three examples: a setting
with multiple autonomous vehicles, a multi-lane ring road
setting, and a figure eight road setting. A multi-lane ring
10
road is a simple closed network which extends the wellstudied single-lane ring road but adds in lateral dynamics (lane
changes).
Three natural settings for benchmarking are the fully autonomous setting, the mixed-autonomy setting, and the fullyhuman setting. Designed controllers for these settings may be
implemented in Flow for additional benchmarking as well.
In the following experiments, a fully observable setting is
assumed. The experiments are run on Amazon Web Services
(AWS) Elastic Compute Cloud (EC2) instances of model
c4.2xlarge, which have eight CPUs and 15 GB of memory.
the average speed of vehicles in the network. Figure 8 shows
the average velocity of vehicles in the network for different
levels of autonomy. With the inclusion of a single autonomous
vehicle. With one autonomous vehicle, the vehicles begin
moving around 1.5 times as fast as they they had when they
were forced to queue, while the fully autonomous setting
exhibits an improvement of almost three time to the average
velocities of vehicles.
Single-lane ring road with multiple autonomous vehicles:
In this experiment, a total of 22 vehicles are placed in a ring
road with a circumference of 230m. Strings of autonomous
vehicles are placed consecutively, with between three and
eleven autonomous vehicles. A string of consecutive autonomous vehicles learn to drive with a smaller headway than
the human models, resulting in greater roadway utilization,
thereby permitting a higher velocity for the overall system, as
can be seen in Figure 7.
Fig. 8: Velocity profile in the figure eight for different levels of autonomous
penetration. Similar to the platooning setting, the performance of the network
improves as the number of autonomous vehicles improves. In particular, the
inclusion of full autonomy almost triples the average velocity in the network
from around 5 m/s in the absence of autonomy for around 14 m/s.
For each of these benchmarks, more investigation is required
to understand the learned behaviors and policies and thereby
take steps towards a real-world deployment.
VIII. R ELATED W ORK
Fig. 7: Velocity profile for single-lane ring road with multiple autonomous
vehicles. The addition of autonomous vehicles permits in exceeding the
uniform flow equilibrium velocity. This velocity increases as the level of
autonomous penetration increases. At three autonomous vehicles, the average
velocity settles at 3.70 m/s; at 11 autonomous vehicles, the average velocity
settles at 4.44 m/s.
Multi-lane ring road with multiple autonomous vehicles:
The single-lane multiple vehicle experiment is extended to
the multiple lane setting, with 44 vehicles placed in a twolane ring road of circumference 230m. In this setting, a string
of six autonomous vehicles are initialized side-by-side (all in
one lane). The human-driven vehicles follow IDM longitudinal
control and SUMO’s lane changing model for lateral control.
The resulting average velocity is 3.66 m/s, an improvement
over the 3.45 m/s uniform flow equilibrium velocity. This
experiment demonstrates the reinforcement learning policy’s
ability to generalize to settings with discontinuous model
dynamics, such as lane changes.
Figure Eight: For this experiment, 14 vehicles are placed in
a figure eight with a ring radius of 30m and total length of
402m. The intersection in this environment is not controlled by
a traffic light; instead vehicles cross the intersection following
a right-of-way model provided by SUMO to prevent crashes.
In the absence of autonomous vehicles, human drivers begin
queuing at the intersection, leading to a significant reduction in
Traffic Dynamics: Modeling and analysis of traffic dynamics
is notoriously complex and yet is historically considered a prerequisite for traffic control [55], [57]. Researchers classically
trade away the complexity of the model (and thus the realism
of the model) in favor of the tractability of analysis, using high
level abstraction with the goal of designing optimal controllers
or other controllers with desirable properties, such as safety or
comfort [58], [59], [60], [61]. Consequently, results in traffic
control can largely be classified as small-scale simulationbased numerical analysis (for example, [62], [63], [64], [65])
or theoretical analysis on simple settings such as assuming
non-oscillatory responses (e.g. [66]) or focusing on a singlelane ring road (e.g. [67], [68], [69], [70], [71], [72]).
In particular, with the advent of autonomous vehicles, new
frameworks and techniques are urgently needed to establish
a foundation for studying the control and the effects of
autonomous vehicles, thereby preparing the world for their
adoption. Modern reinforcement learning techniques indicate
promise towards the goal of obtaining controllers with desirable (though perhaps not optimal) properties while simultaneously studying complex settings.
Deep RL and Traffic: Several recent studies incorporated
ideas from deep learning in traffic optimization. Deep RL
has been used for traffic prediction [73], [74] and control
[75]. A deep RL architecture was used in [74] to predict
traffic flows, demonstrating success even during special events
with nonlinear features; to learn features to represent states
11
involving both space and time, [73] additionally used hierarchical autoencoding in the traffic flow prediction problem.
A multi-agent deep RL algorithm was introduced in [75]
to learn a policy for ramp metering. For additional uses of
deep learning in traffic, we refer the reader to [76], which
presents an overview comparing non-neural statistical methods
versus neural networks in transportation research. These recent
results demonstrate that deep learning and deep RL are a
promising approach to traffic problems. This article aims to
bridge the gap between deep RL and traffic control problems
by providing a computational framework for learning wellperforming controllers; a preliminary prototype of our architecture is published in [77].
richer control actions allow Flow to support a larger class
of controllers, thus permitting a more realistic and suitable
testbed for reinforcement learning in traffic dynamics. SUMO
also includes a Python API called TRAffic Control Interface
(TraCI), from which the user can retrieve information about
the vehicles’ current states and issue precise commands to
set the vehicles’ velocities, positions, and lanes. Using this
interface, we can interface SUMO with RL libraries, read out
state information, issue actions, define our own car following
models, etc.
Traffic Simulators: Traffic microsimulators include Quadstone Paramics [78], VISSIM [79], [80], AIMSUN [81],
MATSIM [82], POLARIS [83], and SUMO [43]. The first
three are closed-source commercial software, whereas the
latter two are open source software. Each of these tools
are capable of large-scale traffic microsimulation and can
handle a variety of policies and control strategies. Each tool
offers an Application Programming Interface (API) which
permits overriding or extending the default models such as
car following, lane changing, route choice, etc. Each of these
simulators are widely used in the research community. These
tools differ in their precise offerings and features, such as
visualization tools, supported models, and simulation speed.
Because most studies focus their study on a single simulator,
a comprehensive comparison of these tools is unfortunately
lacking.
In the present work, we choose to integrate SUMO, an opensource, extensible, microscopic simulator that can simulate
large road networks. SUMO discretizes time and progresses
the simulation for a user-specified timestep; furthermore, because SUMO is microscopic, individual vehicles are controlled
by car following models—functions of the vehicle’s headway,
velocity and the velocity of the preceding vehicle. The acceleration provided by the car following model is applied as
a change of velocity over the course of the next timestep.
SUMO’s car following models include IDM, IDMM, and
Wiedermann.
SUMO has several current issues which limit its suitability
for RL. First, all SUMO built-in car following models are configured with a minimal time headway, τ , that is used to ensure
safety [84], and do not support time delays. Second, SUMO’s
car following models are calibrated for a simulation timestep
of 1.0 seconds, and their behavior for smaller timesteps is
known to produce unnatural behaviors [85] whereas we would
like to simulate at 10-100ms timesteps. Finally, there does
not yet exist an interface between SUMO and RL libraries.
Because the results of an RL experiment rely on the realism
of the model/simulator, we need the traffic models to capture
more realistic fine-grained dynamics, including operating at a
higher granularity (smaller simulation step), with a different
model of time delays, with acceleration-based control, etc.
Our work aims to address each of these limitations. Flow
extends SUMO to permit rich custom controllers which may
operate at smaller simulation steps and with time delays. These
Flow is a computational framework built on open source
tools; it enables learning policies for autonomous vehicles in
complex traffic settings involving nonlinear vehicle dynamics
and arbitrary network configurations. This article demonstrates
its capabilities and provides several concrete examples and
a case study which effectively benchmarks learned policies
against established control results. The expansion and combination of benchmark networks to additional network types,
including arbitrary grid networks, more complex intersections,
and importing arbitrary map networks, is the subject of
ongoing work, and will be operational soon (it is already
functional for simulation). More advanced RL algorithms
will be developed alongside larger networks because current
algorithms suffer poor sample complexity in the presence of
combinatorial structures such as graphs (road networks) [86]
and multiple agents [87]. Interesting and promising future directions include extending Flow to support additional features,
such as evaluating safety (in addition to efficiency), using
Flow as a tool to design specific controllers (which can be
interpreted or for which properties such as optimality can be
proven), and using it to inform public policy in preparation
for the increased adoption of autonomous vehicles. Finally,
as seen in many traffic management project led by State
agencies, microsimulation tools are the last step before field
implementation, which we hope to see for this work as well.
IX. C ONCLUSION
ACKNOWLEDGMENTS
The authors would like to thank Leah Dickstein and Nathan Mandi for
early prototyping, Nishant Kheterpal, Kathy Jang, Saleh Albeaik and Ananth
Kuchibhotla for helping to build out the features, Rocky Duan and Alex Lee
for rllab support, Jakob Erdmann for SUMO support, and Professor Alexander
Skabardonis for several insightful discussions about vehicle dynamics and failsafes. The team is extremely grateful to Professor Dan Work for technical
conversations about the ring experiment and work, and to the inspirational
work of the Piccoli-Seibold-Sprinkle-Work team.
A PPENDIX A
C LASSICAL CONTROLLERS
This section presents several classical controllers available
in Flow that have been and may be used to model human or
non-human driving behavior during experimentation.
12
A. Longitudinal controllers
Longitudinal Controllers: Longitudinal dynamics are usually
defined by car following models [67]. Standard car following
models (CFMs) are of the form:
ai = v̇i = f (hi , ḣi , vi ),
(5)
where the acceleration ai of vehicle i is some typically nonlinear function of hi , ḣi , vi , which are respectively the headway,
relative velocity, and velocity for vehicle i. A general model
may include time delays from the input signals hi , ḣi , vi to the
resulting output acceleration ai . Example CFMs include the
Intelligent Driver Model (IDM) [88] and the Optimal Velocity
Model (OVM) [89], [90]. Our presented system implements
several known CFMs and provides an easy way to implement
custom CFMs.
Custom longitudinal controllers can be implemented in Flow
using methods similar to the general car following model
equation (5) shown above, in which a vehicle’s acceleration
is some function of its speed, headway, and relative velocity.
Car following models are not limited to those inputs, however;
full access to the state of the environment at each timestep is
provided to controllers.
Out of the box, Flow supports a variety of car following
models, including SUMO default models and custom models
not provided by SUMO. Each model specifies the acceleration
for a vehicle at a given time, which is commanded to that
vehicle for the next time-step using TraCI.
Controllers with arbitrary time delays between perception
and action are supported in Flow. Delays are implemented by
storing control actions in a queue. For delayed controllers, a
new action is computed using the state at each timestep and
enqueued, and an action corresponding to some previous state
is dequeued and commanded. Descriptions of supported carfollowing models follow below.
1) Second-order linear model: The first, and simplest, car
following model implemented is the forward-looking car following model specified in [67]. The model specifies the acceleration of vehicle i as a function of a vehicle’s current position
and velocity, as well as the position and velocity of the vehicle
ahead. Thus: v̇i = kd (di − ddes ) + kv (vi−1 − vi ) + kc (vi − vdes )
where vi , xi are the velocity and position of the i-th vehicle,
di := xi−1 − xi is the headway for the i-th vehicle, kd , kc , kv
are controller gains for the difference between the distance to
the leading car and the desired distance, relative velocity, and
the difference between current velocity and desired velocity,
respectively. In addition, ddes , vdes are the desired headways
and velocities respectively.
2) Intelligent Driver Model: The Intelligent Driver Model
(IDM) is a microscopic car-following model commonly used
to model realistic driver behavior [88]. Using this model, the
acceleration for vehicle α is defined by its bumper-to-bumper
headway sα (distance to preceding vehicle), velocity vα , and
relative velocity ∆vα , via the following equation:
aIDM =
δ ∗
2
vα
s (vα , ∆vα )
dvα
=a 1−
−
dt
v0
sα
(6)
where s∗ is the desired headway of the vehicle, denoted by:
vα ∆vα
∗
(7)
s (vα , ∆vα ) = s0 + max 0, vα T + √
2 ab
where s0 , v0 , T, δ, a, b are given parameters. Typical values for
these parameters can be found in [88].
3) Optimal Velocity Model (OVM): Another car following
model implemented in Flow is the optimal velocity model from
[69]. A variety of optimal velocity functions exist for use in
specifying car following models [91], [55]; [69] uses a cosinebased function to define optimal velocity V (h) as a function
of headway:
h ≤ hst
0
h−hst
vmax
V (h) =
2 (1 − cos(π hgo − hst )) hst < h < hgo
vmax
h ≥ hgo
The values hst , hgo correspond to headway thresholds for
choosing an optimal velocity, so that for headways below hst ,
the optimal velocity is 0, and for headways above hgo , the
optimal velocity is some maximum velocity vmax . The optimal
velocity transitions using a cosine function for headways
between hst and hgo . V (h) is used in the control law for
the acceleration of the i-th vehicle, where v̇i = α[V (hi ) −
vi ] + β[vi−1 − vi ] at each timestep. This controller can also be
implemented with delay to simulate perception and reaction
times for human drivers, in which case v̇i (t) would be a
function of states hi (t − τ ), vi (t − τ ), vi−1 (t − τ ).
4) Bilateral control model (BCM): The bilateral controller
presented by [70], [71] considers not only the relation of a
subject vehicle to the vehicle ahead but also to the vehicle
behind it. In their controller, the subject vehicle’s acceleration
depends on the distance and velocity difference to both the
vehicle ahead and behind, with
v˙i = kd hi + kv ((vi−1 − vi ) − (vi − vi+1 )) + kc (vi − vdes )
where hi := (xi−1 − xi ) − (xi − xi+1 ). In [70], [71], Horn
and Wang argue that bilateral controllers can stabilize traffic.
Lateral Controllers: SUMO has lateral dynamics models
dictating when and how to lane change [92]; however, to
extend lateral control to the RL framework, Flow permits
the easy design of new and higher fidelity lane changing
models. The current implementation of Flow includes a proof
of concept lane-changing model in which vehicles change
lanes stochastically based on speed advantage when adjacent
lanes satisfy a set of constraints. Vehicles in Flow do not
check to change lanes at each timestep, as that might lead
to an excessive number of lane changes. Instead, at some
time interval, the vehicle determines if it should lane change.
SUMO’s existing lane-changing models can also be used in a
Flow experiment in place of custom models.
As with longitudinal controllers, custom lateral controllers
can also be built in Flow. These lane-changing models have
access to the full state of the environment at each time step to
use as potential inputs. This allows, for example, a vehicle to
identify all nearby vehicles in adjacent lanes and their speeds,
and then send a lane-change command if a lane is clear and
offers potentially higher speed. Due to the rich development
13
interface available, Flow supports the integration of complex
lateral controllers.
A PPENDIX B
A DDITIONAL EXPERIMENTS
This section uses Flow to benchmark the controllers described in the previous section. The experiments in this section
contain no learning components.
Single-lane Ring (all human driver models):
1) OVM from uniform initial state: The first experiment
runs the Sugiyama setup from an initial state in which all 22
vehicles were spaced evenly around the ring road and start with
the same velocity. Each of the vehicles was using a Optimal
Vehicle Model (OVM) controller, as described in the section
on controllers above. The experiment begins from a stopped
state, gets up to speed, and proceeds free of traffic shockwaves
for its duration.
A. OVM from a nonuniform motion state (Figure 11)
This experiment simulates the Sugiyama setup but from
a non-uniform initial configuration. Starting with the first
vehicle, the subsequent position of each vehicle is drawn
from a Gaussian distribution with mean equal to the length of
track divided by number of vehicles and a standard deviation
given by one fifth the mean. The unstable starting state also
incorporates a bunching factor, in which no vehicles are placed
on some segment of the track, with the length of that segment
being a user-defined variable. All 22 vehicles use the OVM
controller. Instability is apparent from the beginning, with
traffic rapidly degrading into traffic shockwaves and failing
to recover.
Fig. 11: 22 OVM vehicles from a nonuniform ring road initial state, showing
stop-and-go traffic with an average speed of 7.8 m/s.
Fig. 9: 22 OVM vehicles from uniform state on a ring road, showing an
average speed of 4.87 m/s across all vehicles.
2) OVM with a perturbation (Figure 10): In this experiment, 22 OVM vehicles are run from a uniform, evenly-spaced
starting state. No traffic shockwaves form until the system is
perturbed 9 seconds into the experiment, once the vehicles
have roughly reached their equilibrium velocities from the
unperturbed setting. One vehicle is randomly chosen and an
acceleration of −5 m/s2 is applied for 1.5 seconds. The
braking of that vehicle forces the vehicles behind it to slow
down as well, and the system degrades into stop-and-go traffic.
1) BCM with a perturbation (Figure 12): 22 vehicles implementing the bilateral car following model (BCM), described
in the controllers section, are implemented in this simulation.
The simulation begins from a uniform, evenly-spaced starting
state. As with the experiment above, a random vehicle is
perturbed at an acceleration of −5m/s2 , 9 seconds into the
simulation for 1.5 seconds. Some braking results, but unlike
the OVM case described above, the BCM vehicles recover
from this perturbation and traffic returns to uniform motion
shortly after.
Fig. 12: 22 BCM vehicles on a ring road with a perturbation, showing an
average speed of 7.9 m/s.
Fig. 10: 22 OVM vehicles on a ring road with a perturbation, breaking down
from uniform motion into stop-and-go traffic with an average speed of 7.5
m/s.
2) BCM from an nonuniform state (Figure 13): Again, 22
BCM vehicles are run in this simulation, but from the same
nonuniform starting state as in the nonuniform motion OVM
case, in which vehicles are spaced randomly subject to a
bunching factor. There is some initial instability and small
traffic shockwaves, but again the BCM vehicles recover from
this non-stable state and return to uniform motion.
14
rest at the final position of the rear bumper of the preceding vehicle. If the preceding vehicle is initially at position
xi−1 (0), and decelerates maximally, it will come to rest at
v 2 (0)
position xi−1 (0) + i−1
2a . Because the fail-safe issues the
maximum velocity, if the ego vehicle has delay τ , it will
first travel a distance of vsafe τ and then begins to brake with
maximum deceleration, which brings it to rest at position
safe
.
xi (0) + vsafe · τ + v2a
Fig. 13: 22 BCM vehicles from a nonuniform ring road initial state, showing
an average speed of 7.9 m/s.
3) Mixed BCM/OVM from a nonuniform initial state (Figure 14): Here, 11 BCM vehicles and 11 OVM vehicles
begin from a randomly spaced, and bunched starting state as
described above. The proportion of bilateral control vehicles
proves sufficient to prevent the stop-and-go waves seen in
the unstable OVM setting. Some velocity variation persists,
however, unlike the full-BCM unstable setting which returns
to a completely uniform motion state.
Fig. 14: 11 BCM and 11 OVM vehicles, from a nonuniform ring road initial
state, showing an average speed of 7.1 m/s.
A PPENDIX C
FAIL - SAFES
Flow supplements its car following models with safe driving
rules that prevent the inherently unstable car following models
from crashing. As SUMO experiments terminate when a
collision occurs, Flow provides a fail-safe mechanism, called
the final position rule, which runs constantly alongside other
controllers. Fail-safes are passed in the action commanded by
the vehicle controller, regardless of whether it is an action
specified by RL or a control model. Fail-safes are a standard
feature in any traffic simulator that is required to handle large
perturbations and string unstable traffic. The conservativeness
of the fail-safe affects the braking behavior of the traffic.
In general, fail-safes operate according to the principle of
maintaining a minimum safe distance from the leading vehicle
where the maximum acceleration and deceleration of the
leading vehicle is stochastically generated [93], [94].
Final Position Rule: This fail-safe aims to keep a velocity
such that if the preceding vehicle suddenly starts braking
with max deceleration a, then even if the following vehicle
has a delay τ it can still slow down such that it comes to
SUMO-Imposed Safety Behavior: In addition to incorporating its own safe velocity models, Flow leverages various safety
features from SUMO, which may also be used to prevent
longitudinal and lateral collisions. These fail-safes serve as
bounds on the accelerations and lane-changes human and
autonomous vehicles may perform, and may be relaxed on
any set of vehicles in the network to allow for the prospect of
more aggressive actions to take place.
R EFERENCES
[1] U. DOT, “National transportation statistics,” Bureau of Transportation
Statistics, Washington, DC, 2016.
[2] D. Schrank, B. Eisele, and T. Lomax, “Ttis 2012 urban mobility report,”
Texas A&M Transportation Inst.. The Texas A&M Univ. System, 2012.
[3] Z. Wadud, D. MacKenzie, and P. Leiby, “Help or hindrance? the travel,
energy and carbon impacts of highly automated vehicles,” Transportation Research Part A: Policy and Practice, vol. 86, pp. 1–18, 2016.
[4] R. E. Stern, S. Cui, M. L. D. Monache, R. Bhadani, M. Bunting,
M. Churchill, N. Hamilton, R. Haulcy, H. Pohlmann, F. Wu,
B. Piccoli, B. Seibold, J. Sprinkle, and D. B. Work, “Dissipation
of stop-and-go waves via control of autonomous vehicles: Field
experiments,” CoRR, vol. abs/1705.01693, 2017. [Online]. Available:
http://arxiv.org/abs/1705.01693
[5] Y. Sugiyama, M. Fukui, M. Kikuchi, K. Hasebe, A. Nakayama, K. Nishinari, S.-i. Tadaki, and S. Yukawa, “Traffic jams without bottlenecks–
experimental evidence for the physical mechanism of the formation of
a jam,” New Journal of Physics, vol. 10, no. 3, p. 033001, 2008.
[6] M. Garavello and B. Piccolli, Traffic flow on networks: Conservation
Laws Models. Springfield, MO: American Institute of Mathematical
Sciences, 2006.
[7] F. Wu, R. Stern, S. Cui, M. L. D. Monache, R. Bhadanid, M. Bunting,
M. Churchill, N. Hamilton, R. Haulcy, B. Piccoli, B. Seibold, J. Sprinkle,
and D. Work, “Tracking vehicle trajectories and fuel rates in oscillatory
traffic,” Transportation Research Part C: Emerging Technologies, 2017.
[8] M. Pavone, S. L. Smith, E. Frazzoli, and D. Rus, “Robotic load balancing
for mobility-on-demand systems,” The International Journal of Robotics
Research, vol. 31, no. 7, pp. 839–854, 2012.
[9] e. a. Cathy Wu, “Emergent behaviors in mixed-autonomy traffic,”
Conference on Robot Learning, 2017.
[10] F. Belletti, D. Haziza, G. Gomes, and A. M. Bayen, “Expert level
control of ramp metering based on multi-task deep reinforcement
learning,” CoRR, vol. abs/1701.08832, 2017. [Online]. Available:
http://arxiv.org/abs/1701.08832
[11] X.-F. Xie, S. F. Smith, L. Lu, and G. J. Barlow, “Schedule-driven
intersection control,” Transportation Research Part C: Emerging Technologies, vol. 24, pp. 168–189, 2012.
[12] S. Sukkarieh, E. M. Nebot, and H. F. Durrant-Whyte, “A high integrity
imu/gps navigation loop for autonomous land vehicle applications,”
IEEE Transactions on Robotics and Automation, vol. 15, no. 3, pp.
572–578, Jun 1999.
[13] M. W. M. G. Dissanayake, P. Newman, S. Clark, H. F. DurrantWhyte, and M. Csorba, “A solution to the simultaneous localization
and map building (slam) problem,” IEEE Transactions on Robotics and
Automation, vol. 17, no. 3, pp. 229–241, Jun 2001.
[14] Y. Cui and S. S. Ge, “Autonomous vehicle positioning with gps in urban
canyon environments,” IEEE Transactions on Robotics and Automation,
vol. 19, no. 1, pp. 15–25, Feb 2003.
[15] Z. Shiller and Y. R. Gwo, “Dynamic motion planning of autonomous
vehicles,” IEEE Transactions on Robotics and Automation, vol. 7, no. 2,
pp. 241–249, Apr 1991.
15
[16] S. D. Bopardikar, B. Englot, and A. Speranzon, “Multiobjective path
planning: Localization constraints and collision probability,” IEEE
Transactions on Robotics, vol. 31, no. 3, pp. 562–577, June 2015.
[17] J. Minguez and L. Montano, “Extending collision avoidance methods to
consider the vehicle shape, kinematics, and dynamics of a mobile robot,”
IEEE Transactions on Robotics, vol. 25, no. 2, pp. 367–381, April 2009.
[18] K. Kanatani and K. Watanabe, “Reconstruction of 3-d road geometry
from images for autonomous land vehicles,” IEEE Transactions on
Robotics and Automation, vol. 6, no. 1, pp. 127–132, Feb 1990.
[19] B. Van Arem, C. J. Van Driel, and R. Visser, “The impact of cooperative
adaptive cruise control on traffic-flow characteristics,” IEEE Transactions on Intelligent Transportation Systems, vol. 7, no. 4, pp. 429–436,
2006.
[20] J. Lee, J. Choi, K. Yi, M. Shin, and B. Ko, “Lane-keeping assistance
control algorithm using differential braking to prevent unintended lane
departures,” Control Engineering Practice, vol. 23, pp. 1–13, 2014.
[21] Y. S. Son, W. Kim, S.-H. Lee, and C. C. Chung, “Robust multirate
control scheme with predictive virtual lanes for lane-keeping system
of autonomous highway driving,” IEEE Transactions on Vehicular
Technology, vol. 64, no. 8, pp. 3378–3391, 2015.
[22] S. Lefevre, Y. Gao, D. Vasquez, H. E. Tseng, R. Bajcsy, and F. Borrelli,
“Lane keeping assistance with learning-based driver model and model
predictive control,” in 12th International Symposium on Advanced
Vehicle Control, 2014.
[23] G. Meyer and S. Shaheen, Eds., Disrupting Mobility: Impacts of Sharing
Economy and Innovative Transportation on Cities. Springer, 2017.
[24] D. Sadigh, S. Sastry, S. A. Seshia, and A. D. Dragan, “Planning for
autonomous cars that leverage effects on human actions.” in Robotics:
Science and Systems, 2016.
[25] J. Lee, M. Park, and H. Yeo, “A probability model for discretionary lane
changes in highways,” KSCE Journal of Civil Engineering, vol. 20, no. 7,
pp. 2938–2946, 2016.
[26] J. Rios-Torres and A. A. Malikopoulos, “A survey on the coordination
of connected and automated vehicles at intersections and merging at
highway on-ramps,” IEEE Transactions on Intelligent Transportation
Systems, vol. 18, no. 5, pp. 1066–1077, 2017.
[27] ——, “Automated and cooperative vehicle merging at highway onramps,” IEEE Transactions on Intelligent Transportation Systems,
vol. 18, no. 4, pp. 780–789, 2017.
[28] V. Mnih, K. Kavukcuoglu, D. Silver, A. Graves, I. Antonoglou, D. Wierstra, and M. Riedmiller, “Playing atari with deep reinforcement learning,” arXiv preprint arXiv:1312.5602, 2013.
[29] J. Schulman, P. Moritz, S. Levine, M. Jordan, and P. Abbeel, “Highdimensional continuous control using generalized advantage estimation,”
arXiv preprint arXiv:1506.02438, 2015.
[30] J. Schulman, S. Levine, P. Abbeel, M. I. Jordan, and P. Moritz, “Trust
region policy optimization,” in ICML, 2015, pp. 1889–1897.
[31] N. Heess, G. Wayne, D. Silver, T. Lillicrap, T. Erez, and Y. Tassa,
“Learning continuous control policies by stochastic value gradients,” in
Advances in Neural Information Processing Systems, 2015, pp. 2944–
2952.
[32] M. Lai, “Giraffe: Using deep reinforcement learning to play chess,”
arXiv preprint arXiv:1509.01549, 2015.
[33] M. G. Bellemare, Y. Naddaf, J. Veness, and M. Bowling, “The arcade
learning environment: An evaluation platform for general agents,” J.
Artif. Intell. Res.(JAIR), vol. 47, pp. 253–279, 2013.
[34] C. Beattie, J. Z. Leibo, D. Teplyashin, T. Ward, M. Wainwright,
H. Küttler, A. Lefrancq, S. Green, V. Valdés, A. Sadik et al., “Deepmind
lab,” arXiv preprint arXiv:1612.03801, 2016.
[35] G. Brockman, V. Cheung, L. Pettersson, J. Schneider, J. Schulman, J. Tang, and W. Zaremba, “Openai gym,” arXiv preprint
arXiv:1606.01540, 2016.
[36] G. Synnaeve, N. Nardelli, A. Auvolat, S. Chintala, T. Lacroix, Z. Lin,
F. Richoux, and N. Usunier, “Torchcraft: a library for machine learning
research on real-time strategy games,” arXiv preprint arXiv:1611.00625,
2016.
[37] E. Todorov, T. Erez, and Y. Tassa, “Mujoco: A physics engine for modelbased control,” in Intelligent Robots and Systems (IROS), 2012 IEEE/RSJ
International Conference on. IEEE, 2012, pp. 5026–5033.
[38] B. Wymann, E. Espié, C. Guionneau, C. Dimitrakakis, R. Coulom, and
A. Sumner, “Torcs, the open racing car simulator,” Software available
at http://torcs. sourceforge. net, 2000.
[39] O. Vinyals, “Deepmind and blizzard to release starcraft ii
as an ai research environment,” https://deepmind.com/blog/
deepmind-and-blizzard-release-starcraft-ii-ai-research-environment/,
2016.
[40] M. Brackstone and M. McDonald, “Car-following: a historical review,”
Transportation Research Part F: Traffic Psychology and Behaviour,
vol. 2, no. 4, pp. 181–196, 1999.
[41] Z. Zheng, “Recent developments and research needs in modeling lane
changing,” Transportation research part B: methodological, vol. 60, pp.
16–32, 2014.
[42] A. Kotsialos, M. Papageorgiou, and A. Messmer, “Optimal coordinated
and integrated motorway network traffic control,” in 14th International
Symposium on Transportation and Traffic Theory, 1999.
[43] D. Krajzewicz, J. Erdmann, M. Behrisch, and L. Bieker, “Recent
development and applications of sumo-simulation of urban mobility,”
International Journal On Advances in Systems and Measurements,
vol. 5, no. 3&4, 2012.
[44] Y. Duan, X. Chen, R. Houthooft, J. Schulman, and P. Abbeel,
“Benchmarking deep reinforcement learning for continuous control,”
CoRR, vol. abs/1604.06778, 2016. [Online]. Available: http://arxiv.org/
abs/1604.06778
[45] R. Bellman, “A markovian decision process,” DTIC Document, Tech.
Rep., 1957.
[46] R. A. Howard, “Dynamic programming and markov processes,” 1960.
[47] R. S. Sutton, D. A. McAllester, S. P. Singh, Y. Mansour et al., “Policy
gradient methods for reinforcement learning with function approximation.” in NIPS, vol. 99, 1999, pp. 1057–1063.
[48] S. Haykin, Neural networks: a comprehensive foundation. Prentice
Hall PTR, 1994.
[49] J. Chung, C. Gulcehre, K. Cho, and Y. Bengio, “Gated feedback
recurrent neural networks,” in International Conference on Machine
Learning, 2015, pp. 2067–2075.
[50] P. G. Michalopoulos, D. E. Beskos, and Y. Yamauchi, “Multilane
traffic flow dynamics: some macroscopic considerations,” Transportation
Research Part B: Methodological, vol. 18, no. 4, pp. 377–395, 1984.
[51] A. Klar and R. Wegener, “A hierarchy of models for multilane vehicular
traffic i: Modeling,” SIAM Journal on Applied Mathematics, vol. 59,
no. 3, pp. 983–1001, 1998.
[52] A. Sasoh and T. Ohara, “Shock wave relation containing lane change
source term for two-lane traffic flow,” Journal of the Physical Society
of Japan, vol. 71, no. 9, pp. 2339–2347, 2002.
[53] C. F. Daganzo, “A behavioral theory of multi-lane traffic flow. part i:
Long homogeneous freeway sections,” Transportation Research Part B:
Methodological, vol. 36, no. 2, pp. 131–158, 2002.
[54] C. Wu, A. Kreidieh, E. Vinitsky, and A. Bayen, “Multi-lane reduction:
A stochastic single-lane model for lane changing,” in Submission, 2017.
[55] M. Treiber and A. Kesting, “Traffic flow dynamics,” Traffic Flow
Dynamics: Data, Models and Simulation, Springer-Verlag Berlin Heidelberg, 2013.
[56] ——, “The intelligent driver model with stochasticity-new insights into
traffic flow oscillations,” Transportation Research Procedia, vol. 23, pp.
174–187, 2017.
[57] M. Papageorgiou, C. Diakaki, V. Dinopoulou, A. Kotsialos, and Y. Wang,
“Review of road traffic control strategies,” Proceedings of the IEEE,
vol. 91, no. 12, pp. 2043–2067, 2003.
[58] P. A. Ioannou and C.-C. Chien, “Autonomous intelligent cruise control,”
IEEE Trans. on Vehicular technology, vol. 42, no. 4, pp. 657–672, 1993.
[59] A. Vahidi and A. Eskandarian, “Research advances in intelligent collision avoidance and adaptive cruise control,” IEEE transactions on
intelligent transportation systems, vol. 4, no. 3, pp. 143–153, 2003.
[60] Technical Committee ISO/TC 204, Intelligent transport systems, Intelligent transport systems – Adaptive Cruise Control systems – Performance
requirements and test procedures, ISO ISO 15 622:2010, 2010.
[61] E. W. Martin, K. Boriboonsomsin, N. D. Chan, N. Williams, S. A.
Shaheen, and M. Barth, “Dynamic ecodriving in northern california: A
study of survey and vehicle operations data from an ecodriving feedback
device,” in 92nd Annual Meeting of the Transportation Research Board,
Washington, DC, January, 2013.
[62] C.-Y. Liang and P. Huei, “String stability analysis of adaptive cruise
controlled vehicles,” JSME International Journal Series C Mechanical
Systems, Machine Elements and Manufacturing, vol. 43, no. 3, pp. 671–
677, 2000.
[63] A. Bose and P. A. Ioannou, “Analysis of traffic flow with mixed manual
and semiautomated vehicles,” IEEE Trans. on Intelligent Transportation
Systems, vol. 4, no. 4, pp. 173–188, 2003.
[64] P. A. Ioannou and M. Stefanovic, “Evaluation of acc vehicles in mixed
traffic: Lane change effects and sensitivity analysis,” IEEE Transactions
on Intelligent Transportation Systems, vol. 6, no. 1, pp. 79–89, 2005.
[65] M. A. S. Kamal, J.-i. Imura, T. Hayakawa, A. Ohata, and K. Aihara,
“Smart driving of a vehicle using model predictive control for improving
16
[66]
[67]
[68]
[69]
[70]
[71]
[72]
[73]
[74]
[75]
[76]
[77]
[78]
[79]
[80]
[81]
[82]
[83]
[84]
[85]
[86]
[87]
[88]
traffic flow,” IEEE Transactions on Intelligent Transportation Systems,
vol. 15, no. 2, pp. 878–888, 2014.
D. Swaroop, “String stability of interconnected systems: An application
to platooning in automated highway systems,” California Partners for
Advanced Transit and Highways (PATH), 1997.
G. Orosz, R. E. Wilson, and G. Stépán, “Traffic jams: dynamics
and control,” Philosophical Trans. of the Royal Society of London A:
Mathematical, Physical and Engineering Sciences, vol. 368, no. 1928,
pp. 4455–4479, 2010.
G. Orosz, J. Moehlis, and F. Bullo, “Delayed car-following dynamics
for human and robotic drivers,” in ASME 2011 International Design
Engineering Technical Conferences and Computers and Information in
Engineering Conference. American Society of Mechanical Engineers,
2011, pp. 529–538.
I. G. Jin and G. Orosz, “Dynamics of connected vehicle systems
with delayed acceleration feedback,” Transportation Research Part C:
Emerging Technologies, vol. 46, pp. 46–64, 2014.
B. K. Horn, “Suppressing traffic flow instabilities,” in Intelligent Transportation Systems-(ITSC), 2013 16th International IEEE Conference on.
IEEE, 2013, pp. 13–20.
L. Wang, B. K. Horn, and G. Strang, “Eigenvalue and eigenvector
analysis of stability for a line of traffic,” Studies in Applied Mathematics,
2016.
C. Wu, A. Bayen, and A. Mehta, “Stabilizing traffic with autonomous
vehicles,” in Submission, 2017.
Y. Lv, Y. Duan, W. Kang, Z. Li, and F.-Y. Wang, “Traffic flow
prediction with big data: a deep learning approach,” IEEE Transactions
on Intelligent Transportation Systems, vol. 16, no. 2, pp. 865–873, 2015.
N. G. Polson and V. O. Sokolov, “Deep learning for short-term traffic
flow prediction,” Transportation Research Part C: Emerging Technologies, vol. 79, pp. 1–17, 2017.
F. Belletti, D. Haziza, G. Gomes, and A. M. Bayen, “Expert level
control of ramp metering based on multi-task deep reinforcement
learning,” CoRR, vol. abs/1701.08832, 2017. [Online]. Available:
http://arxiv.org/abs/1701.08832
M. G. Karlaftis and E. I. Vlahogianni, “Statistical methods versus
neural networks in transportation research: Differences, similarities and
some insights,” Transportation Research Part C: Emerging Technologies,
vol. 19, no. 3, pp. 387–399, 2011.
C. Wu, K. Parvate, N. Kheterpal, L. Dickstein, A. Mehta, E. Vinitsky,
and A. Bayen, “Framework for control and deep reinforcement learning
in traffic,” in Submission, 2017.
G. D. Cameron and G. I. Duncan, “Paramicsparallel microscopic simulation of road traffic,” The Journal of Supercomputing, vol. 10, no. 1,
pp. 25–53, 1996.
M. Fellendorf, “Vissim: A microscopic simulation tool to evaluate
actuated signal control including bus priority,” in 64th Institute of
Transportation Engineers Annual Meeting. Springer, 1994, pp. 1–9.
M. Fellendorf and P. Vortisch, “Microscopic traffic flow simulator
vissim,” in Fundamentals of traffic simulation. Springer, 2010, pp.
63–93.
J. Casas, J. L. Ferrer, D. Garcia, J. Perarnau, and A. Torday, “Traffic simulation with aimsun,” in Fundamentals of traffic simulation. Springer,
2010, pp. 173–232.
K. N. Horni, A. and K. A. (eds.), The Multi-Agent Transport Simulation
MATSim. Ubiquity, London, 2016.
J. Auld, M. Hope, H. Ley, V. Sokolov, B. Xu, and K. Zhang, “Polaris:
Agent-based modeling framework development and implementation for
integrated travel demand and network and operations simulations,”
Transportation Research Part C: Emerging Technologies, vol. 64, pp.
101–116, 2016.
J. Erdmann. (2016) Simulation of urban mobility - wiki:
Car-following-models. [Online]. Available: http://sumo.dlr.de/wiki/
Car-Following-Models#tau
(2016) Simulation/basic definition. [Online]. Available: http://sumo.dlr.
de/wiki/Simulation/Basic Definition#Defining the Time Step Length
H. Dai, E. B. Khalil, Y. Zhang, B. Dilkina, and L. Song, “Learning
combinatorial optimization algorithms over graphs,” arXiv preprint
arXiv:1704.01665, 2017.
R. Lowe, Y. Wu, A. Tamar, J. Harb, P. Abbeel, and I. Mordatch, “Multiagent actor-critic for mixed cooperative-competitive environments,”
CoRR, vol. abs/1706.02275, 2017. [Online]. Available: http://arxiv.org/
abs/1706.02275
M. Treiber, A. Hennecke, and D. Helbing, “Congested traffic states in
empirical observations and microscopic simulations,” Physical review E,
vol. 62, no. 2, p. 1805, 2000.
[89] M. Bando, K. Hasebe, A. Nakayama, A. Shibata, and Y. Sugiyama,
“Structure stability of congestion in traffic dynamics,” Japan Journal of
Industrial and Applied Mathematics, vol. 11, no. 2, pp. 203–223, 1994.
[90] ——, “Dynamical model of traffic congestion and numerical simulation,” Physical review E, vol. 51, no. 2, p. 1035, 1995.
[91] M. Batista and E. Twrdy, “Optimal velocity functions for car-following
models,” Journal of Zhejiang University-SCIENCE A, vol. 11, no. 7, pp.
520–529, 2010.
[92] J. Erdmann, “SUMO’s lane-changing model,” in Modeling Mobility with
Open Data. Springer, 2015, pp. 105–123.
[93] R. Dowling, A. Skabardonis, and V. Alexiadis, “Traffic analysis toolbox
volume iii: guidelines for applying traffic microsimulation modeling
software,” Tech. Rep., 2004.
[94] H. Yeo, A. Skabardonis, J. Halkias, J. Colyar, and V. Alexiadis, “Oversaturated freeway flow algorithm for use in next generation simulation,”
Transportation Research Record: Journal of the Transportation Research
Board, no. 2088, pp. 68–79, 2008.
| 3cs.SY
|
arXiv:1705.04596v1 [math.CO] 12 May 2017
A NOTE ON IDENTITIES IN PLACTIC MONOIDS AND
MONOIDS OF UPPER-TRIANGULAR TROPICAL MATRICES
ALAN J. CAIN, GEORG KLEIN, LUKASZ KUBAT, ANTÓNIO MALHEIRO,
AND JAN OKNIŃSKI
Abstract. This paper uses the combinatorics of Young tableaux to prove
the plactic monoid of infinite rank does not satisfy a non-trivial identity, by
showing that the plactic monoid of rank n cannot satisfy a non-trivial identity
of length less than or equal to n. A new identity is then proven to hold for the
monoid of n × n upper-triangular tropical matrices. Finally, a straightforward
embedding is exhibited of the plactic monoid of rank 3 into the direct product
of two copies of the monoid of 3 × 3 upper-triangular tropical matrices, giving
a new proof that the plactic monoid of rank 3 satisfies a non-trivial identity.
1. Introduction
Whether the plactic monoid (the monoid of Young tableaux, which is famed for
its ubiquity [Lot02, Chapter 5]) and its finite-rank variants satisfy non-trivial identities is an actively-researched open question [KO15, Izh17]. Various monoids that are
related to the plactic monoid satisfy non-trivial identities. For instance, the Chinese
monoid [CEK+ 01], which has the same growth type as the plactic monoid [DK94],
satisfies Adian’s identity xyyxxyxyyx = xyyxyxxyyx [JO11, Corollary 3.3.4]. (This
is the shortest non-trivial identity satisfied by the bicyclic monoid [Adi66, Chapter IV, Theorem 2].) Furthermore, various ‘plactic-like’ monoids of combinatorial
objects satisfy non-trivial identities [CM]: for instance, the hypoplactic monoid
(the monoid of quasi-ribbon tableaux [KT97, Nov00]), the sylvester monoid (binary search trees [HNT05]), and the Baxter monoid (pairs of twin binary search
trees [Gir12]).
Let plac denote the (infinite-rank) plactic monoid and let placn denote the plactic
monoid of rank n, for any n ∈ N. First, plac1 is monogenic and thus commutative
and so trivially satisfies xy = yx. The monoid plac2 is isomorphic to the Chinese
monoid of rank 2 and so satisfies Adian’s identity. The third and fifth authors
proved that plac3 satisfies the identity uvvuvu = uvuvvu, where u(x, y) and v(x, y)
are respectively the left and right side of Adian’s identity (and so the identity
uvvuvu = uvuvvu has sixty variables x or y on each side) [KO15, Theorem 2.6].
Furthermore, plac3 does not satisfy Adian’s identity [KO15, p. 111–2]. Izhakian
developed a theory that allows one to show that plac3 is isomorphic to a subdirect
The
first
author
was
supported
by
an
Investigador
FCT
fellowship
(IF/01622/2013/CP1161/CT0001).
For the first and fourth authors, this work was partially supported by by the Fundação para a
Ciência e a Tecnologia (Portuguese Foundation for Science and Technology) through the project
UID/MAT/00297/2013 (Centro de Matemática e Aplicações) and the project PTDC/MHCFIL/2583/2014. Much of the research leading to this paper was undertaken during visits by
the first and fourth authors to the University of Warsaw and these authors thank the university
for its hospitality.
1
2
A.J. CAIN, G. KLEIN, L. KUBAT, A. MALHEIRO, AND J. OKNIŃSKI
product of two copies of the monoid of 3×3 upper-triangular tropical matrices U3 (T)
[Izh17]. Since the same author had already proven that for any n ∈ N the monoid
of n × n upper-triangular tropical matrices Un (T) satisfies a non-trivial identity
[Izh14], this gives an alternative proof that plac3 satisfies a non-trivial identity. It
remains open whether placn satisfies a non-trivial identity for n ≥ 4.
This note contributes further to this topic. First, Section 3 uses the combinatorics of Young tableaux to prove that the infinite-rank plactic monoid plac does
not satisfy a non-trivial identity, in contrast to the Chinese, hypoplactic, sylvester,
and other monoids discussed above. Since plac is the union of all the finite-rank
plactic monoids placn , this implies that there is no non-trivial identity satisfied by
all the placn . However, it is still possible that there is a hierarchy of identities
satisfied by the various placn . Section 4 gives a new, simple, identity satisfied by
the monoid of n × n upper-triangular tropical matrices Un (T); the proof is based
on an approach developed by the fifth author [Okn15]. Finally, Section 5 gives an
elementary proof that plac3 embeds into the direct product of two copies of U3 (T);
this gives another proof that plac3 satisfies a non-trivial identity.
2. Preliminaries and notation
This section briefly recalls some definitions and sets up notation; see the references for further background.
An identity is a formal equality between two words in the free monoid, and is
non-trivial if the two words are distinct. A monoid M satisfies such an identity
if the equality holds in M under every substitution of letters in the words by
elements of M . For example, any commutative monoid satisfies the non-trivial
identity xy = yx.
For background on the plactic monoid, Young tableaux, and Schensted’s algorithm, see [Lot02, Ch.5]. Let A = {1 < 2 < · · ·} be the set of natural numbers
viewed as an infinite ordered alphabet. For n ∈ N, let An = {1 < 2 < · · · < n}
be the set of the first n natural numbers viewed as a finite ordered alphabet. For
any u ∈ A∗ , let Pplac (u) be the Young tableaux (the ‘plactic P-symbol’) computed
from u using Schensted’s algorithm. The plactic congruence ≡plac relates words in
A∗ that have the same image under u 7→ Pplac (u). The plactic monoid plac is the
factor monoid A∗/≡plac ; the plactic monoid of rank n is the factor monoid A∗n /≡plac
(where ≡plac is naturally restricted to A∗n ).
The tropical semiring is T = R ∪ {−∞}, and its addition and multiplication
operations ⊕ and ⊗ are defined by x ⊕ y = max{x, y} and x ⊗ y = x + y. The set
of n × n upper-triangular tropical matrices is denoted Un (T). (An upper-triangular
tropical matrix has all entries below the main diagonal equal to −∞, since this is
the additive identity of T.) For X, Y ∈ Un (T), write X ∼diag Y if X and Y have
equal corresponding diagonal entries.
Let ψ1 : Un (T) → Un−1 (T) be the map that sends a matrix Z ∈ Un (T) to the
matrix in Un−1 (T) obtained by erasing the rightmost column and bottommost row
of Z. Let ψ2 : Un (T) → Un−1 (T) be the map that sends a matrix Z ∈ Un (T) to the
matrix in Un−1 (T) obtained by erasing the leftmost column and topmost row of Z.
The maps ψ1 and ψ2 are monoid homomorphisms.
A NOTE ON IDENTITIES
3
3. The infinite-rank plactic monoid
Proposition 3.1. The plactic monoid placn does not satisfy any non-trivial identity
of length less than or equal to n.
Proof. Suppose, with the aim of obtaining a contradiction, that placn satisfies a nontrivial identity of length less than or equal to n. Without loss of generality, assume
that it satisfies such an identity over the variable set {x, y}, say u(x, y) = v(x, y) of
length equal to n (that is, with |u| = |v| = n). Interchanging u and v if necessary,
assume u is lexicographically less than v (where the variable set is ordered by
x < y). Suppose u(x, y) = u1 · · · un and v(x, y) = v1 · · · vn , where each ui and vi is
a variable x or y. If j is minimal such that uj and vj are different variables, then
uj is x and vj is y.
Let s = 12 · · · n ∈ A∗n and let t = 12 · · · (n − j)(n − j + 2) · · · n ∈ A∗n . (So
the word t does not contain the generator n − j + 1.) Since
placn satisfies the
identity u(x, y) = v(x, y), the equality u Pplac(s), Pplac (t) = v Pplac (s), Pplac (t)
holds. Thus the Young tableaux Pplac u(s, t) and Pplac v(s, t) are equal. In
particular, the height of the leftmost columns of these Young tableaux are equal.
By Schensted’s theorem [Sch61], the height of the leftmost column of Pplac (w) (for
w ∈ A∗ ) is equal to the length of the longest strictly decreasing subsequence in
w. Thus the lengths of the longest strictly decreasing subsequences of u(s, t) and
v(s, t) are equal.
Since s and t only contain symbols in {1, . . . , n}, the longest strictly decreasing
subsequences of u(s, t) and v(s, t) cannot be longer than n.
In u(s, t), there is a strictly decreasing subsequence of length n, namely n(n −
1) · · · 21, where, for i ∈ {1, . . . , n}, the symbol i is chosen from the instance of s or t
that was substituted for un−i+1 . Note in particular that since n−(n−j +1)+1 = j,
the symbol n − j + 1 is chosen from the instance of s substituted for uj (which is
the variable x). By the previous paragraph, n(n − 1) · · · 21 is a longest strictly
decreasing subsequence of u(s, t).
Thus v(s, t) must also have a strictly decreasing subsequence of length n. Since
each word s or t is strictly increasing, such a subsequence contains at most one
symbol chosen from the instance of s or t substituted for each vi . Since |v| = n,
this implies that exactly one symbol is chosen from each instance of s or t. Hence,
for i ∈ {1, . . . , n}, the symbol i must be chosen from the instance of s or t that was
substituted for vn−i+1 . In particular, since n − (n − j + 1) + 1 = j, the symbol
n − j + 1 is chosen from the instance of t substituted for vj (which is the variable
y). This is a contradiction, because the word t does not contain a symbol n − j + 1.
Therefore placn does not satisfy a non-trivial identity of length less than or equal
to n.
Since every finite-rank plactic monoid is a submonoid of the infinite-rank plactic
monoid, the following result is immediate from Proposition 3.1:
Theorem 3.2. The infinite-rank plactic monoid plac does not satisfy any nontrivial identity.
4
A.J. CAIN, G. KLEIN, L. KUBAT, A. MALHEIRO, AND J. OKNIŃSKI
4. A new identity for the monoid of upper-triangular tropical
matrices
Define
u0 (p, q) = p,
v0 (p, q) = q,
u1 (p, q) = pqppq,
v1 (p, q) = pqqpq,
and inductively define
un (p, q) = u1 un−1 (p, q), vn−1 (p, q) ,
vn (p, q) = v1 un−1 (p, q), vn−1 (p, q) .
for n ≥ 2. Note that the preceding equations hold for n = 1, but we only use them
as a definition for n ≥ 2. Note also that u1 (xy, yx) = v1 (xy, yx) is Adian’s identity.
Proposition 4.1. Let X, Y ∈ Un (T) with X ∼diag Y .
vn−1 (X, Y ).
Then un−1 (X, Y ) =
The proof strategy is similar to that used by the fifth author to show that Un (T)
satisfied a different set of identities [Okn15].
Proof. Proceed by induction on n. For n = 1, since the only entry of a 1 × 1
matrix is on its main diagonal, it follows from X ∼diag Y that X = Y ; hence
u0 (X, Y ) = X = Y = v0 (X, Y ). This is the base of the induction.
For the induction step, let n ≥ 2 and assume the result holds for n − 1. Let A =
un−2 (X, Y ) and B = vn−2 (X, Y ). Recall the homomorphisms ψ1 , ψ2 : Un (T) →
Un−1 (T) defined in Section 2. By the induction hypothesis,
un−2 ψ1 (X), ψ1 (Y ) = vn−2 ψ1 (X), ψ1 (Y ) and
un−2 ψ2 (X), ψ2 (Y ) = vn−2 ψ2 (X), ψ2 (Y ) .
Thus
ψ1 (A) = ψ1 un−2 (X, Y ) = ψ1 vn−2 (X, Y ) = ψ1 (B) and
ψ2 (A) = ψ2 un−2 (X, Y ) = ψ2 vn−2 (X, Y ) = ψ2 (B).
Therefore the matrices A and
can differ only in their (1, n)-th entries.
B
Denote the matrix C = cij by (c11 , c1n , cnn ; κ) for some suitable array κ representing the rest of C. That is,
c11
c1n
.
κ
(c11 , c1n , cnn ; κ) denotes
cnn
Note that if D = (d11 , d1n , dnn ; µ), then
CD = c11 + d11 , max{c11 + d1n , c1n + dnn , γ}, cnn + dnn ; ν ,
for some γ and some array ν. In fact, γ is the maximum of the other sums of pairs
in the scalar product of the first row of C and first column of D and so is only
dependent on κ and µ (and not on c11 , c1n , cnn , d11 , d1n , or dnn ) and ν is only
dependent on κ, µ, c11 and dnn (and not on c1n , cnn , d11 , or d1n ).
So A = (c, a, d; κ1 ) and B = (c, b, d; κ1 ) for some c, a, b, d ∈ T and some array
κ1 . Then
AB = 2c, max{b + c, a + d, γ2 }, 2d, κ2
A NOTE ON IDENTITIES
5
for some γ2 ∈ T and array κ2 . Next,
ABA = (AB)A = 3c, max{a + 2c, b + c + d, a + 2d, d + γ2 , γ3 }, 3d; κ3 ,
ABB = (AB)B = 3c, max{b + 2c, b + c + d, a + 2d, d + γ2 , γ3 }, 3d; κ3 ;
for some γ3 ∈ T and array κ3 ; note that the these are equal in (AB)A and (AB)B
because they depend only on equal corresponding entries of A and B. Finally,
ABAAB = (ABA)AB = 5c, max{b + 4c, a + 3c + d, 3c + γ2 , a + 2c + 2d,
b + c + 3d, a + 4d, 4d + γ2 , 2d + γ3 , γ5 }, 5d; κ5 ,
ABBAB = (ABB)AB = 5c, max{b + 4c, a + 3c + d, 3c + γ2 , b + 2c + 2d,
b + c + 3d, a + 4d, 4d + γ2 , 2d + γ3 , γ5 }, 5d; κ5 ;
for some γ5 ∈ T and array κ5 ; note that these are equal in (ABA)AB and (ABB)AB
because they depend only on equal corresponding entries of ABA and ABB. Note
that the expressions for ABAAB and ABBAB only differ in the terms a + 2c + 2d
and b + 2c + 2d, respectively.
Now consider the four possible relative orders of a and b and of c and d. In each
case, there is some element that appears in the max{. . .} terms of the expressions
for both ABAAB and ABBAB and that is greater than both a + 2c + 2d and
b + 2c + 2d:
a ≥ b ∧ c ≥ d =⇒ a + 3c + d ≥ a + 2c + 2d, b + 2c + 2d;
a ≥ b ∧ c ≤ d =⇒ a + 4d ≥ a + 2c + 2d, b + 2c + 2d;
a ≤ b ∧ c ≥ d =⇒ b + 4c ≥ a + 2c + 2d, b + 2c + 2d;
a ≤ b ∧ c ≤ d =⇒ b + c + 3d ≥ a + 2c + 2d, b + 2c + 2d.
So in each case, a + 2c + 2d and b + 2c + 2d are not the maximum terms in the
expressions for ABAAB and ABBAB. Thus u1 (A, B) = ABAAB = ABBAB =
v1 (A, B). Therefore un−1 (X, Y ) = u1 (A, B) = v1 (A, B) = vn−1 (X, Y ).
Hence, by induction, the result holds for all n.
Theorem 4.2. The monoid of n × n upper-triangular tropical matrices Un (T)
satisfies the identity un−1 (xy, yx) = vn−1 (xy, yx).
Proof. Let X, Y ∈ Un (T). Then XY ∼diag Y X; the result is immediate from
Proposition 4.1.
5. A tropical representation of plac3
For any w ∈ A+ and any p, q ∈ A, define:
the maximal length of a nondecreasing subsequence
wpq = in w with entries in the interval [p, q]
−∞
if p ≤ q,
if p > q.
∗
For the identity ε of A , define εpq = 0 if p = q and εpq = −∞ otherwise.
Define a map φn : A∗ → Un (T) by φn (w) = wpq .
Lemma 5.1. The map φn is a homomorphism.
Proof. Proceed by induction on n. If n = 1 then the claim is clear. Assume
that n ≥ 2 and recall the homomorphisms ψ1 , ψ2 : Un (T) → Un−1 (T) defined in
Section 2. Let ϑ1 = ψ1 ◦ φn and ϑ2 = ψ2 ◦ φn . Clearly, ϑ1 is simply φn−1 and is
6
A.J. CAIN, G. KLEIN, L. KUBAT, A. MALHEIRO, AND J. OKNIŃSKI
thus a homomorphism by the induction hypothesis. Furthermore, if w 7→ w is the
∗
map from {2, . . . , n} to A∗n−1 , extending a 7→ a − 1, then ϑ2 (w) = φn−1 (w) and
so is a homomorphism by the induction hypothesis.
By the definition of matrix multiplication in Un (T), it now remains to prove that
for every u, v ∈ Pn the (1, n)-th entries of φn (uv) and φn (u)φn (v) are equal for all
u, v ∈ A∗n . In other words,
(5.1)
(uv)1n = max{u11 + v1n , u12 + v2n , . . . , u1n + vnn }.
However, it is clear that the longest nondecreasing subsequence in the product
uv is of the form αβ, where for some j the word α is the longest nondecreasing
subsequence in u with entries in the interval [1, j] and β is the longest nondecreasing
subsequence of v with entries in the interval [j, n]. Therefore (5.1) indeed holds and
the result follows.
Thus, by induction on n, the map φn is a homomorphism from A∗n to Un (T).
Lemma 5.2. The map φn factors to give a homomorphism φn : placn → Un (T).
Proof. Notice that the plactic relations (baa, aba), (bab, bba), (bca, bac), (cab, acb)
(for a < b < c), with a, b, c ∈ A, preserve wpq for any w ∈ A∗ and any p, q ∈ A.
This is easy to see by a direct verification of the possible cases: the intersection
{a, b, c} ∩ [p, q] is either a single generator, or is equal to {a, b}, {b, c} or {a, b, c}.
It follows that if u, v ∈ A∗n are such that u ≡plac v, then φn (u) = φn (v).
Define fn : A∗n → A∗n as follows. For any i ∈ An , define
fn (i) = n(n − 1) · · · (i + 1)(i − 1) · · · 1,
and for w = a1 · · · ak ∈ A∗n , where ai ∈ A, define fn (w) = fn (ak ) · · · fn (a1 ).
It is straightforward to prove that the antihomomorphism fn factors to give an
antihomomorphism
fn : placn → placn .
Let F = Fij be the n × n tropical matrix with Fi,n+1−i = 0 for i = 1, 2, . . . , n
and all other entries being −∞. Define an involution πn : Un (T) → Un (T) by
x 7→ (F xF )T (conjugation by F composed with transposition); note that πn is an
antihomomorphism (and in fact an antiautomorphism, since it is bijective). Define
σn = πn ◦ φn ◦ fn ; since fn and πn are antihomomorphisms, σn is a homomorphism.
Finally, define
the homomorphism Ψ3 : plac3 → U3 (T) × U3 (T) by Ψ3 (u) =
φ3 (u), σ3 (u) .
Proposition 5.3. The map Ψ3 is an embedding.
Proof. An arbitrary element of plac3 has a unique representation by a word of the
form 3ζ 2δ 3ǫ 1α 2β 3γ , where ζ ≤ δ ≤ α and δ + ǫ ≤ α + β. (This is the ‘row reading’
of a Young tableau.) Notice that, by the definition of φ3 ,
α
α+β
α+β+γ
(5.2)
φ3 (3ζ 2δ 3ǫ 1α 2β 3γ ) = −∞ β + δ max{β + ǫ} + δ + γ .
−∞ −∞
ζ +ǫ+δ
An arbitrary element of plac3 also has a unique representative of the form
u = (321)k1 (21)k2 (31)k3 1k4 (32)k5 2k6 3k7 ,
A NOTE ON IDENTITIES
7
for some ki ∈ N ∪ {0} and either k4 = 0 or k5 = 0. (This is the column reading of
a Young tableau.) Straightforward computation shows that
(21)k7 (31)k6 (31)k5 (21)k5
(32)k3 (21)k3 (32)k2 (31)k2 (32)k1 (31)k1 (21)k1 if k4 = 0,
f3 (u) =
(21)k7 (31)k6 (32)k4 (32)k3
if k5 = 0;
(21)k3 (32)k2 (31)k2 (32)k1 (31)k1 (21)k1
thus
f3 (u) =
(
(321)2k1 +k2 +k3 +k5 (21)k7 (31)k6 1k5 2k3 3k2
(321)2k1 +k2 +k3 (21)k7 (31)k6 (32)k4 2k3 3k2
if k4 = 0,
if k5 = 0.
Regardless of whether k4 = 0 or k5 = 0, the row reading of u (or more precisely
Pplac (u)) has the form:
3k1 2k1 +k2 3k3 +k5 1k1 +k2 +k3 +k4 2k5 +k6 3k7 .
By (5.2), φ3 (u) determines the following numbers:
k7 , k5 + k6 , k1 + k2 + k3 + k4 ,
(5.3)
k1 + k2 , k1 + k3 + k5 , max{k3 + k5 , k5 + k6 }.
The row reading of f (u) (or more precisely Pplac f (u) ) has the form:
32k1 +k2 +k3 +k5 22k1 +k2 +k3 +k5 +k7 32k1 +k2 +k3 +k4 +k5 +k6 12k1 +k2 +k3 +2k5 +k6 +k7 2k3 +k4 3k2 .
Therefore, since πn is bijective, we know by (5.2) that σ3 (u) determines the following
numbers:
k2 , k3 + k4 , 2k1 + k2 + k3 + 2k5 + k6 + k7 ,
(5.4)
2k1 + k2 + k3 + k5 + k7 ,
4k1 + 2k2 + 2k3 + k4 + 2k5 + k6 ,
max{k3 + k4 , 2k1 + k2 + k3 + k4 + k5 + k6 }.
Consider another elemenent u′ ∈ plac3 , with
′
′
′
′
′
′
′
u′ = (321)k1 (21)k2 (31)k3 1k4 (32)k5 2k6 3k7 ,
and suppose that φ3 (u) = φ3 (u′ ) and σ3 (u) = σ3 (u′ ). By (5.3), k7 = k7′ . By (5.4),
k2 = k2′ . Consequently, (5.3) implies that k1 = k1′ . Thus,
k3 + k4 = k3′ + k4′ ,
k3 + k5 = k3′ + k5′ ,
k5 + k6 = k5′ + k6′ ,
respectively by (5.3), (5.4), and (5.3) together with k1 = k1′ .
If k4 = k4′ = 0, then k3 = k3′ , and so k5 = k5′ , and so k6 = k6′ ; thus u = u′ .
Similarly, if k5 = k5′ = 0, then k6 = k6′ and k3 = k3′ , and so k6 = k6′ ; thus u = u′ .
So suppose that k4 = 0 and k5′ = 0. Then
k3 = k3 + k4 = k3′ + k4′ = k3′ + k5′ + k4′ = k3 + k5 + k4′ ;
so k5 +k4′ = 0 and so k5 = 0. Hence k6 = k6′ , and k3 = k3′ and so k4 = k4′ . Therefore
u = u′ . Parallel reasoning shows that k4′ = 0 and k5 = 0 implies u = u′ .
Therefore φ3 (u) = φ3 (u′ ) and σ3 (u) = σ3 (u′ ) implies u = u′ .
Hence the map Ψ3 : plac3 → U3 (T) × U3 (T) with Ψ3 (u) = φ3 (u), σ3 (u) is an
embedding.
Since Ψ3 embeds plac3 into the direct product of two copies of U3 (T), the following result is immediate from Theorem 4.2:
Corollary 5.4. plac3 satisfies u2 (xy, yx) = v2 (xy, yx).
8
A.J. CAIN, G. KLEIN, L. KUBAT, A. MALHEIRO, AND J. OKNIŃSKI
References
[Adi66]
S. Adian. ‘Defining relations and algorithmic problems for groups and
semigroups’. Trudy Mat. Inst. Steklov,
85 (1966),
pp. 3–123. url:
http://www.mathnet.ru/eng/tm2766.
[CEK+ 01] J. Cassaigne, M. Espie, D. Krob, J.-C. Novelli, & F. Hivert. ‘The Chinese Monoid’.
Int. J. Alg. Comput., 11, no. 3 (2001), pp. 301–334. doi: 10.1142/S0218196701000425.
[CM]
A. J. Cain & A. Malheiro. ‘Identities in plactic, hypoplactic, sylvester, Baxter, and
related monoids’. arXiv: 1611.04151.
[DK94]
G. Duchamp & D. Krob. ‘Plactic-growth-like monoids’. In M. Ito & H. Jürgensen, eds,
Words, Languages and Combinatorics, II, p. 124–142, River Edge, NJ, 1994. World
Scientific.
[Gir12]
S. Giraudo. ‘Algebraic and combinatorial structures on pairs of twin binary trees’. J.
Algebra, 360 (2012), pp. 115–157. doi: 10.1016/j.jalgebra.2012.03.020.
[HNT05] F. Hivert, J.-C. Novelli, & J.-Y. Thibon. ‘The algebra of binary search trees’. Theoret.
Comput. Sci., 339, no. 1 (2005), pp. 129–165. doi: 10.1016/j.tcs.2005.01.012.
[Izh14]
Z. Izhakian. ‘Semigroup identities in the monoid of triangular tropical matrices’. Semigroup Forum, 88, no. 1 (2014), pp. 145–161. doi: 10.1007/s00233-013-9507-6.
[Izh17]
Z. Izhakian. ‘Tropical plactic algebra, the cloaktic monoid, and semigroup representations’. 2017. arXiv: 1701.05156v1.
[JO11]
J. Jaszuńska & J. Okniński. ‘Structure of Chinese algebras’. J. Algebra, 346, no. 1
(2011), pp. 31–81. doi: 10.1016/j.jalgebra.2011.08.020.
[KO15]
L. Kubat & J. Okniński. ‘Identities of the plactic monoid’. Semigroup Forum, 90, no. 1
(2015), pp. 100–112. doi: 10.1007/s00233-014-9609-9.
[KT97]
D. Krob & J.-Y. Thibon. ‘Noncommutative Symmetric Functions IV: Quantum Linear
Groups and Hecke Algebras at q = 0’. J. Algebraic Combin., 6, no. 4 (1997), pp. 339–
376. doi: 10.1023/A:1008673127310.
[Lot02]
M. Lothaire. Algebraic Combinatorics on Words. No. 90 in Encyclopedia of Mathematics and its Applications. Cambridge University Press, 2002.
[Nov00]
J.-C. Novelli. ‘On the hypoplactic monoid’. Discrete Mathematics, 217, no. 1-3 (2000),
pp. 315–336. doi: 10.1016/S0012-365X(99)00270-8.
[Okn15]
J. Okniński. ‘Identities of the semigroup of upper triangular tropical matrices’. Comm.
Algebra, 43, no. 10 (2015), pp. 4422–4426. doi: 10.1080/00927872.2014.946141.
[Sch61]
C. Schensted. ‘Longest increasing and decreasing subsequences’. Canad. J. Math., 13
(1961), pp. 179–191. doi: 10.4153/CJM-1961-015-3.
Centro de Matemática e Aplicações (CMA), Faculdade de Ciências e Tecnologia,
Universidade Nova de Lisboa, 2829–516 Caparica, Portugal
E-mail address: [email protected]
Institute of Mathematics, University of Warsaw, Banacha 2, 02–097 Warsaw, Poland
E-mail address: [email protected]
Institute of Mathematics, University of Warsaw, Banacha 2, 02–097 Warsaw, Poland
E-mail address: [email protected]
Centro de Matemática e Aplicações (CMA), Faculdade de Ciências e Tecnologia,
Universidade Nova de Lisboa, 2829–516 Caparica, Portugal
Departamento de Matemática, Faculdade de Ciências e Tecnologia, Universidade
Nova de Lisboa, 2829–516 Caparica, Portugal
E-mail address: [email protected]
Institute of Mathematics, University of Warsaw, Banacha 2, 02–097 Warsaw, Poland
E-mail address: [email protected]
| 4math.GR
|
Prime factorization using quantum annealing and
computational algebraic geometry
arXiv:1604.05796v2 [quant-ph] 16 Jun 2016
Raouf Dridi∗ and Hedayat Alghassi†
1QB Information Technologies (1QBit)
458–550 Burrard Street
Vancouver, British Columbia, Canada V6C 2B5
June 17, 2016
Abstract
We investigate prime factorization from two perspectives: quantum annealing and
computational algebraic geometry, specifically Gröbner bases. We present a novel
autonomous algorithm which combines the two approaches and leads to the factorization of all bi-primes up to just over 200 000, the largest number factored to date
using a quantum processor. We also explain how Gröbner bases can be used to
reduce the degree of Hamiltonians.
1
Introduction
Prime factorization is at the heart of secure data transmission because it is widely believed
to be NP-complete. In the prime factorization problem, for a large bi-prime M , the task
is to find the two prime factors p and q such that M = pq. In secure data transmission,
the message to be transmitted is encrypted using a public key which is, essentially, a large
bi-prime that can only be decrypted using its prime factors, which are kept in a private
key. Prime factorization also connects to many branches of mathematics; two branches
relevant to us are computational algebraic geometry and quantum annealing.
To leverage the problem of finding primes p and q into the realm of computational algebraic
geometry, it suffices to transform it into an
S. This is done
P algebraic system of equations
P
using the binary representation p = 1 + i=1..sp 2i Pi and q = 1 + i=1..sq 2i Qi , which is
plugged into M = pq and expanded into a system of polynomial equations. The reader is
invited to read the sections Methods 4.1 and 4.2 for the details of this construction. The
system S is given by this initial system of equations in addition to the auxiliary equations
∗
†
[email protected]
[email protected]
1
expressing the binary nature of the variables Pi and Qi , carry-on, and connective variables.
The two primes p and q are then given by the unique zero of S. In theory, we can solve
the system S using Gröbner bases; however, in practice, this alone does not work, since
Gröbner basis computation (Buchberger’s algorithm) is exponential.
The connection to quantum annealing can also be easily described. Indeed, finding p
and q can be formulated into an unconstrained binary optimization problem (P), where
the cost function f is the sum of the squares of polynomials in S. The unique zero of S
now sits on the unique global minimum of (P) (which has minimum energy equal to zero).
There are, however, a few non-trivial requirements we need to deal with before solving
the cost function using quantum annealing. These requirements concern the nature of
cost functions that quantum annealers can handle. In particular, we would like the cost
function of (P) to be a positive quadratic polynomial. We also require that the coefficients
of the cost function be rather uniform and match the hardware-imposed dynamic range.
In the present paper, we suggest looking into the problem through both lenses, and
demonstrate that indeed this approach gives better results. In our scheme, we will be using quantum annealing to solve (P), but at the same time we will be using Gröbner bases
to help us reduce the cost function f into a positive quadratic polynomial f + with desired
values for the coefficients. We will be also using Gröbner bases at the important step of
pre-processing f + before finally passing it to the quantum annealer. This pre-processing
significantly reduces the size of the problem. The result of this combined approach is an
algorithm with which we have been able to factorize all bi-primes up to 2 × 105 using the
D-Wave 2X processor. The algorithm is autonomous in the sense that no a priori knowledge, or manual or ad hoc pre-processing, is involved. We refer the interested reader to
Supplementary materials 5 for a brief description of the D-Wave 2X processor, along with
some statistics for several of the highest numbers that we embedded and solved. More
detail about the processor architecture can be found in [JAG+ 11]. Another important
reference is the work of S. Boixo et al. in [BAS+ 13], which presents experimental evidence that the scalable D-Wave processor implements quantum annealing with surprising
robustness against noise and imperfections. Evidence that, during a critical portion of
quantum annealing, the qubits become entangled and entanglement persists even as the
system reaches equilibrium is presented in [LPS+ 14].
Relevant to us also is the work in [PS01], which uses algebraic geometry to solve optimization problems (though not specifically factorization; see Methods 4.4 for an adaptation
to factorization). Therein, Gröbner bases are used to compute standard monomials and
transform the given optimization problem into an eigenvalue computation. Gröbner basis computation is the main step in this approach, which makes it inefficient, given the
high complexity of Gröbner basis computation. In contrast to that work, we ultimately
solve the optimization problem using a quantum annealing processor and pre-process and
adjust the problem with algebraic tools, that is, we reduce the size of the cost function
and adjust the range of its parameters. However, we share that work’s point of view of
using real algebraic geometry, and our work is the first to introduce algebraic geometry,
and Gröbner bases in particular, to solve quantum annealing-related problems. We think
that this is a fertile direction for both practical and theoretical endeavours.
2
Mapping the factorization problem into a degree-4 unconstrained binary optimization
problem is first discussed in [Bur02]. There, the author proposes solving the problem using
a continuous optimization method he calls curvature inversion descent. Another related
work is the quantum annealing factorization algorithm proposed in [SS10]. We will discuss
it in the next section and improve upon it in two ways. The first involves the addition
of the pre-processing stage using Gröbner bases of the cost function. This dramatically
reduces the number of variables therein. The second way concerns the reduction of the
initial cost function, for which we propose a general Gröbner basis scheme that precisely
answers the various requirements of the cost function. In Results 2.2, we present our
algorithm (the column algorithm) which outperforms this improved algorithm (i.e., the
cell algorithm). Using a reduction proposed in [SS10] and ad-hoc simplifications and
tricks, the paper [XZL+ 12] reports the factorization of bi-prime 143 on a liquid-crystal
NMR quantum processor, which until now was the largest reported bi-prime number
factored in any quantum computation realization.
This review is far from complete without mentioning Shor’s algorithm [Sho97] and Kitaev’s
phase estimation [Kit95], which, respectively, solve the factorization problem and the
abelian hidden subgroup problem in polynomial time, both for the gate model paradigm.
The largest number factored using a physical realization of Shor’s algorithm is 15 [MNM+ 16];
see [SSV13] also for a discussion about oversimplification in the previous realizations. Finally, in [Rau13], it has been proved that contextuality is needed for any speed-up in a
measurement-based quantum computation factorization algorithm.
2
Results
The binary multiplication of the two primes p and q can be expanded in two ways: cellbased and column-based procedures (see Methods 4.1 and 4.2 ). Each procedure leads to
a different unconstrained binary optimization problem. The cell-based procedure creates
the unconstrained binary quadratic programming problem
P
(
minZ2 ij Hij 2 ,
(2.1)
(P1 )
with Hij := Qi Pj + Si,j + Zi,j − Si+1,j−1 − 2 Zi,j+1 ,
and the column-based procedure results in the problem
P
minZ2 1≤i≤(sp +sq +1) Hi 2 ,
sq +1+i−m
sq
(P2 )
i
P
P
P i j−i
with Hi :=
Qj Pi−j +
Zj,i − mi −
2 Zi,i+j .
j=0
j=1
(2.2)
j=1
The two problems (P1 ) and (P2 ) are equivalent. Their cost functions are not in quadratic
form, and thus must be reduced before being solved using a quantum annealer. The
reduction procedure is not a trivial task. In this paper we define, for both scenarios:
1) a reduced quadratic positive cost function and 2) a pre-processing procedure. Thus,
we present two different quantum annealing-based prime factorization algorithms. The
3
first algorithm’s decomposition method (i.e., the cell procedure, Methods 4.1 ) has been
addressed in [SS10], without pre-processing and without the use of Gröbner bases in the
reduction step. Here, we discuss it from the Gröbner bases framework and add the important step of pre-processing. The second algorithm, however, is novel in transformation of
its quartic terms to quadratic, outperforming the first algorithm due to its having fewer
variables.
We write R[x1 , . . . , xn ] for the ring of polynomials in x1 , . . . , xn with real coefficients and
V(f ) for the affine variety defined by the polynomial f ∈ R[x1 , . . . , xn ], that is, the set of
zeros of the equation f = 0. Since we are interested only in the binary zeros (i.e., xi ∈ Z2 ),
we need to add the binarization polynomials xi (xi − 1), where i = 1, ..., n, to f and obtain
the system S = {f, xi (xi − 1), i = 1, ..., n}. The system S generates an ideal I by taking
all linear combinations over R[x1 , . . . , xn ] of all polynomials in S; we have V(S) = V(I).
The ideal I reveals the hidden polynomials which are the consequence of the generating
polynomials in S. To
√ hidden polynomials is given by rthe so√ be precise, the set of all
called radical ideal √I, which is defined by I = {g ∈ R[x1 , . . . , xn ]| ∃r ∈ N : g ∈ I}.
In practice, the ideal I is infinite, so we represent such an √
ideal using a Gröbner basis B
which one might take to be a triangularization of the ideal I. In fact, the computation
of Gröbner√
bases generalizes Gaussian elimination
in linear systems. We also have V(S) =
√
V(I) = V( I) = V(B) and I(V(I)) = I. A brief review of Gröbner bases is given in
Methods 4.3.
2.1
The cell algorithm
Suppose we would like to define the variety V(I) by the set of global minima of an
unconstrained optimization problem minZn2 (f + ), where f + is a quadratic polynomial.
For instance, we would like f + to behave like f 2 . Ideally, we want f + to remain in
R[x1 , . . . , xn ] (i.e., not in a larger ring), which implies that no slack variables will be
added. We also want f + to satisfy the following requirements:
√
(i) f + vanishes on V (I) or, equivalently, f + ∈ I.
(ii) f + > 0 outside V (I), that is, f + > 0 over Zn2 − V (I).
(iii) Coefficients of the polynomial f + are adjusted with respect to the dynamic range
allowed by the quantum processor.
Let B be a Gröbner basis for I. We can then go ahead and define
X
f+ =
at t,
t∈B| deg(t)≤2
where the real
√ coefficients ai are subject to the requirements above; note that we already
+
have f ∈ I and thus the first requirement (i) is satisfied.
Let us apply this procedure to the optimization problem (P1 ) above. There, f = Hij
and the ring of polynomials is R[Pj , Qi , Si,j , Si+1,j−1 , Zi,j , Zi,j+1 ]. We obtain the following
Gröbner basis:
4
t1
:= Qi Pj + Si,j + Zi,j − Si+1,j−1 − 2 Zi,j+1 ,
t2
:= (−Zi,j+1 + Zi,j ) Si+1,j−1 + (Zi,j+1 − 1) Zi,j ,
t3
:= (−Zi,j+1 + Zi,j ) Si,j + Zi,j+1 − Zi,j+1 Zi,j ,
t4
:= (Si+1,j−1 + Zi,j+1 − 1) Si,j − Si+1,j−1 Zi,j+1 ,
t5
:= (−Si+1,j−1 − 2 Zi,j+1 + Zi,j + Si,j ) Qi − Si,j − Zi,j + Si+1,j−1 + 2 Zi,j+1 ,
t6
:= (−Si+1,j−1 − 2 Zi,j+1 + Zi,j + Si,j ) Pj − Si,j − Zi,j + Si+1,j−1 + 2 Zi,j+1 ,
t7
:= (−Zi,j+1 + Zi,j+1 Zi,j ) Qi + Zi,j+1 − Zi,j+1 Zi,j ,
t8
:= −Si+1,j−1 Zi,j+1 + Si+1,j−1 Qi Zi,j+1 ,
t9
:= (−Zi,j+1 + Zi,j+1 Zi,j ) Pj + Zi,j+1 − Zi,j+1 Zi,j ,
(2.3)
t10 := −Si+1,j−1 Zi,j+1 + Si+1,j−1 Pj Zi,j+1 .
We have used the lexicographic order plex(Pj , Qi , Si,j , Si+1,j−1 , Zi,j , Zi,j+1 ); see Methods
4.3 for definitions. Note that t1 = Hij . We define
X
X
Hij+ =
at t, that is, Hij+ =
ai ti ,
1≤i≤6
t∈B| deg(t)≤2
where the real coefficients ai are to be found. We need to constrain the coefficients ai
with the other requirements. The second requirement (ii), which translates into a set
of inequalities on the unknown coefficients ai , can be obtained through a brute force
evaluation of Hij and Hij+ over the 26 points of Z62 . The outcome of this evaluation is a set
of inequalities expressing the second requirement (ii) (see Supplementary materials 5 ).
The last requirement (iii) can be expressed in different ways. We can, for instance, require that the absolute values of the coefficients of Hij+ , with respect to the variables
Pj , Qi , Si,j , Si+1,j−1 , Zi,j , and Zi,j+1 , be within [1 − , 1 + ]. This, together with the set of
inequalities from the second requirement, define a continuous optimization problem and
can be easily solved. Another option is to minimize the distance between the coefficients to
one coefficient. The different choices of the objective function and the solution of the corresponding continuous optimization problem are presented in Supplementary materials 5 .
Having determined the quadratic polynomial Hij+ ∈ R satisfyies the important requirements (i, ii, and iii) above, we can now phrase our problem
(P1 ) as the equivalent quadratic
P
unconstrained binary optimization problem minZ2 ij Hij+ . Notice that this reduction is
performed only once for all cases; it need not to be redone for different bi-primes M .
Before passing the problem to the quantum annealer, we use Gröbner bases P
to reduce the
size of the problem. In fact, what we pass to the quantum annealer is H = NFB Hij+ ,
where NF is the normal form and B is now the Gröbner basis cutoff, which we discuss in
the next section. The largest bi-prime number that we embedded and solved successfully
using the cell algorithm is ∼35 000. The following table presents some bi-prime numbers M that we factored using the cell algorithm, the number of variables using both the
customized reduction CustR and the window-based GB reduction, the overall reduction
5
percentage R%, and the embedding and solving status inside the D-Wave 2X processor
Embed.
Cell algorithm
M
31861
34889
46961
150419
2.2
p×q
CustR GB R% Embed
√
211 × 151
111
95 14
√
251 × 139
111
95 14
311 × 151
125
109 13
×
431 × 349
143
125 12
×
The column algorithm (factoring up to 200 000)
The total number of variables in the cost function of the previous method is 2sp sq , before
any pre-processing. Here we present the column-based algorithm where the number of
variables (before pre-processing) is bounded by 1 + sp sq + log2 (sp )(sp + sq ). Recall that
here we are phrasing the factorization problem M = pq as
X
(P2 ) : minP1 ,...,Psp ,Q1 ,...,Qsq ,Z12 ,Z23 ,Z24 ,...∈Z2
Hi 2 ,
i
where Hi , for 1 ≤ i ≤ sp , is
Hi =
sq
X
j=0
Li
i
X
X
Qj Pi−j +
Zj,i − mi −
2j−i Zi,i+j
j=1
(Q0 = P0 = m0 = 1, Li = sq + 1 + i − mi ).
j=1
The cost function is of degree 4 and, in order to use quantum annealing, it must be
replaced with a positive quadratic polynomial with the same global minimum. The idea
is to replace the quadratic terms Qj Pi−j inside the different Hi with new binary variables
Wi−j,j , and add the penalty (Qj Pi−j − Wi−j,j )+ to the cost function (now written in terms
of the variables Wi−j,j ). To find (Qj Pi−j − Wi−j,j )+ , we run Gröbner bases computation
on the system
Qj Pi−j − W,
Qj 2 − Qj ,
(2.4)
2
P
−
P
,
i−j
i−j
Wi−j,j 2 − Wi−j,j .
Following the same steps as in the previous section, we get
(Qj Pi−j − Wi−j,j )+ = a(Qj Wi−j,j − Wi−j,j ) + b(Pi−j Wi−j,j − Wi−j,j ) + c(Pi−j Qj − Wi−j,j ),
with a, b, c ∈ R such that −a − b − c > 0, −b − c > 0, −a − c > 0, c > 0 (e.g., c = 1, a =
b = −2). The new cost function is now
X
X
H=
Hi (W )2 +
(Qj Pi−j − Wi−j,j )+ .
i
ij
6
We can obtain a better Hamiltonian by pre-processing the problem before applying the
W transformation. Indeed, let us first fix a positive integer cutoff ≤ (sp + sq + 1) and let
B ⊂ R [P1 , . . . , Psp , Q1 , . . . , Qsq , Z12 , Z23 , Z24 . . .] be a Gröbner basis of the set of polynomials
{Hi }i=1...cutoff ∪ {Pi (Pi − 1), Qi (Qi − 1), Zij (Zij − 1)}i,j .
In practice, the cutoff is determined by the size of the maximum subsystem of polynomials Hi on which one can run a Gröbner basis computation; it is defined by the hardware.
We also define a cutoff on the other tail of {Hi }, that is, we consider {Hi }i=2ndcutoff...(sp +sq +1) .
Notice that here we are working on the original Hi rather than the new Hi (W ). This is because we would like to perform the replacement Qj Pi−j → Wi−j,j after the pre-processing
(some of the quadratic terms might be simplified by this pre-processing). Precisely, what
we pass to the quantum annealer is the quadratic positive polynomial
X
2 X
H=
NFWi−j,j −LT(NFBc (Qj Pi−j )) (NFBc (Hi )) +
(Wi−j,j − LT (NFBc (Qj Pi−j )))+ .
ij
(2.5)
Here LT stands for the leading term with respect to the graded reverse lexicographic
order. The second summation is over all i and j such that LT (NFB (Qj Pi−j )) is still
quadratic. The outer normal form in the first summation refers to the replacement
LT (NFB (Qj Pi−j )) → Wi−j,j , which is again performed only if LT (NFB (Qj Pi−j )) is still
quadratic.
The columns of the following table present: a sample of bi-prime numbers and their prime
factors, the number of variables using each of a naı̈ve polynomial-to-quadratic transformation P2Q, our novel polynomial-to-quadratic transformation CustR, and our windowbased reduction GB after applying pre-processing. The overall reduction percentage R%
and the embedding and solving status in the D-Wave 2X processor Embed are also shown.
The adjacency matrix of the corresponding positive quadratic polynomial graph H and
its embedded pattern inside the Chimera graph of the D-Wave 2X processor for one of
the bi-primes are also depicted (see Figure 1). Details pertaining to use of the hardware
can be found in Supplementary materials 5.3.
Column Algorithm
M
150419
151117
174541
200099
223357
3
p×q
P 2Q CustR GB R% Embed
√
431 × 349 116
86
73 37
√
433 × 349 117
88
72 38
√
347 × 503 117
86
72 38
√
499 × 401 115
89
75 35
557 × 401 125
96
80 36
×
Discussion
In this work, factorization is connected to quantum annealing through binarization of the
long multiplication. The algorithm is autonomous in the sense that no a priori knowledge,
or manual or ad hoc pre-processing, is involved. We have attained the largest bi-prime
7
Figure 1: The column algorithm: the adjacency matrix pattern (left) and embedding into
the the D-Wave 2X quantum processor (right) of the quadratic binary polynomial for
M = 200 099.
factored to date using a quantum processor, though more-subtle connections might exist.
A future direction that this research can take is to connect factorization (as an instance of
the abelian hidden subgroup problem), through Galois correspondence, to covering spaces
and thus to covering graphs and potentially to quantum annealing. We believe that morerewarding progress can be made through the investigation of such a connection.
4
4.1
Methods
Column factoring procedure
Here we discuss the two single-bit multiplication methods of the two primes p and q.
The first method generates a Hamiltonian for each of the columns of the long multiplication expansion, while the second method generates a Hamiltonian for each of the
multiplying cells in the long multiplication expansion. The column factoring procedure of
p = 2sp Psp + 2sp−1 Psp−1 + ... + 2P1 + 1 and q = 2sq Qsq + 2sq−1 Qsq−1 ... + 2Q1 + 1 is depicted
in the following table:
8
···
Psp
msp+sq+1
...
···
···
···
···
Qsq−1Psp
Qsq Psp Qsq Psp−1
msp+sq msp+sq−1
Pi
···
Pi
···
Q1Pi−1
···
Q2Pi−2
..
···
· · · Qsq−1Pi−sq+1
···
Qsq Pi−sq
···
mi
Psp
Q1Psp−1
Q2Psp−2
..
Qsq−1Psp−sq+1
Qsq Psp−sq
msp
···
···
···
···
···
···
···
···
Psq
Qsq
Psq
Q1Psq−1
Q2Psq−2
..
Qsq−1P1
Qsq
msq
· · · P2 P1 P0 = 1
· · · Q2 Q1 Q0 = 1
· · · P2 P1
1
· · · Q1 P 1 Q1
· · · Q2
···
...
···
m2
m1 m0 = 1
The equation for an arbitrary column (i) can be written as the sum of the column’s multiplication terms (above) plus all previously generated carry-on terms from lower significant
columns (j < i). This sum is equal to the column’s bi-prime term mi plus the carry-ons
generated from higher significant columns. The polynomial equation for the i-th column
is
sq
P
Qj Pi−j +
j=0
i
P
Zj,i = mi +
j=1
Li
P
2j−i Zi,i+j (Q0 = P0 = m0 = 1) .
j=1
The above equation is used as the main column procedure’s equation Hi . The Hamiltonian
generation and reduction is discussed in detail in Results 2.2.
4.2
Cell bi-prime factoring procedure
In the cell multiplication procedure, the ultimate goal is to break each of the column equations discussed above into multiple smaller equations so that each equation contains only
one quadratic term. This not only simplifies the generation of quadratic Hamiltonians,
but also generates Hamiltonians with more-uniform quadratic coefficients in comparison
to the column procedure. The following table depicts the structure of the cell procedure:
.
...
Psp
· · · Pi+j · · ·
0
Q1 P n
Z1,n
Pn
Q1Pn−1
Z1,n−1
..
Z1,n+1
Q2Pn
Z2,n
S25
Q2Pn−1
Z2,n−1
S24
Q2P4
Z2,n−2
..
..
..
..
Zi,j+1
msq+sp+1
Zsq−1,sp+1
Qsq Psp
Zsq,sp
msq+sp
Zsq−2,sp+1
Qsq−1Psp
Zsq−1,sp
Ssq−1,sp−1
Qsq−1Psp−1
Zsq−1,sp−1
Ssq−1,sp−2
Qsq−1Psp−2
Zsq−1,sp−2
Ssq−1,sp−3
Qsq−1Psp−3
Zsq−1,sp−3
Ssq,sp−1
Qsq Psp−1
Zsq,sp−1
msq+sp−1
Ssq,sp−2
Qsq Psp−2
Zsq,sp−2
msq+sp−2
Ssq,sp−3
Qsq Psp−3
Zsq,sp−3
msq+sp−3
Ssq,sp−4
Qsq Psp−4
Zsq,sp−4
msq+sp−4
Si,j
Qi P j
Zi,j
Si+1,j−1
..
..
· · · mi+j · · ·
9
Psq
Qsq
Psq
Q1Psq
Z1,3
···
···
···
S2,sq−1
Q2Psq−1
Z2,sq−1
···
..
..
Ssq−1,1
Qsp−1P1
Zsq−1,1
Ssq−1,0
Qsq−1
0
msq−1
Ssq0
Qsq
0
msq
P3
Q3
P3
Q1P2
Z1,2
P2
Q2
P2
Q1 P 1
Z1,1
S2,1
Q2P1
Z2,1
S20
Q2
0
m2
...
P1
Q1
P1
Q11
0
m1
P0 = 1
Q0 = 1
m0 = 1
Each cell contains one of the total (sp − 1)(sq − 1) quadratic terms in the form of Qi Pj .
To chain a cell to its upper cell, one extra sum variable Si,j is added. Also, each carry-on
variable Zi,j in a cell is the carry-on of the cell directly to its right, so each cell contains
four variables. The sum of three terms Qi Pj , Si,j , and Zi,j is at most 3; thus, it generates an additional sum variable Si+1,j−1 and one carry-on variable Zi,j+1 . Therefore, the
equation for an arbitrary cell indexed (i, j), shown in the centre of the above table, is
Si,j + Qi Pj + Zi,j = Si+1,j−1 + 2Zi,j+1 .
As we can see, only six binary variables are involved in each cell equation and the equation
contains one quadratic term, so it can be transformed into a positive Hamiltonian without
adding slack variables. The Hamiltonian generation and reduction procedure is discussed
in detail in Results 2.1.
4.3
Gröbner bases
Good references for the following definitions are [Stu96, CLO98].
Normal forms. A normal form is the remainder of Euclidean divisions in the ring of
polynomials R[x1 , . . . , xn ]. Precisely, the normal form of a polynomial f ∈ R[x1 , . . . , xn ],
with respect to the set of polynomials B ⊂ R[x1 , . . . , xn ] (usually a Gröbner basis), is the
polynomial NF(f ) ∈ R[x1 , . . . , xn ], which is the image of f modulo B. It is the remainder
of the Euclidean of f by all g ∈ B.
Term orders. A term order on R[x1 , . . . , xn ] is a total order ≺ on the set of all monomials
xa = xa11 . . . xann , which has the following properties: (1) if xa ≺ xb , then xa+c ≺ xb+c
for all positive integers a, b, and c; (2) 1 ≺ xa for all strictly positive integers a. An
example of this is the pure lexicographic order plex(x1 , . . . , xn ). Monomials are compared
first by their degree in x1 , with ties broken by degree in x2 , etc. This order is usually
used in eliminating variables. Another example, is the graded reverse lexicographic order
tdeg(x1 , . . . , xn ). Monomials are compared first by their total degree, with ties broken by
reverse lexicographic order, that is, by the smallest degree in xn , xn−1 , etc.
Gröbner bases. Given a term order ≺ on R[x1 , . . . , xn ], then by the leading term (initial
term) LT of f we mean the largest monomial in f with respect to ≺. A (reduced) Gröbner
basis to the ideal I with respect to the ordering ≺ is a subset B of I such that: (1) the
initial terms of elements of B generate the ideal LT(I) of all initial terms of I; (2) for each
g ∈ B, the coefficient of the initial term of g is 1; (3) the set LT(g) minimally generates
LT(I); and (4) no trailing term of any g ∈ B lies in LT(I). Currently, Gröbner bases are
computed using sophisticated versions of the original Buchberger algorithm, for example,
the F4 algorithm by J. C. Faugère.
4.4
Factorization as an eigenvalue problem
In this section, for completeness, we describe how the factorization problem can be solved
using eigenvalues and eigenvectors. This is an adaptation of the method presented in
10
[PS01] to factorization, which is itself an adaption to real polynomial optimization of the
method of solving polynomial equations using eigenvalues in [CLO98].
Let H be in R[x1 , . . . , xn ] as in (2.5), where we have used the notation xi instead of the
P s, Qs, Zs, and W s. Define
X
Hα := H +
αi xi (xi − 1),
i
which is in the larger ring R[x1 , . . . , xn , α1 , . . . , αn ]. We also define the set of polynomials
C = {∂Hα /∂x1 , . . . , ∂Hα /∂xn , ∂Hα /∂α1 , . . . , ∂Hα /∂αn } .
The variety V(C) is the set of all binary critical points of H. Its coordinates ring is
the residue algebra A := R[x1 , . . . , xn , α1 , . . . , αn ]/C. We need to compute a basis for A.
This is done by first computing a Gröbner basis for C and then extracting the standard
monomials (i.e., the monomials in R[x1 , . . . , xn , α1 , . . . , αn ] that are not divisible by the
leading term of any element in the Gröbner basis). In the simple example below, we
do not need to compute any Gröbner basis since C is a Gröbner basis with respect to
plex(α, x). We define the linear map
mHα : A → A
g 7→ Hα g
Since the number of critical points is finite, the algebra A is always finite-dimensional by
the Finiteness Theorem ([CLO98]). Now, the key points are:
• The value of Hα (i.e., values of H), on the set of critical points V(C), are given by
the eigenvalues of the matrix mHα .
• Eigenvalues of mxi and mαi give the coordinates of the points of V(C).
• If v is an eigenvector for mHα , then it is also an eigenvector for mxi and mαi for
1 ≤ i ≤ n.
We illustrate this in an example. Consider M = pq = 5 × 3 and let
H = 2 + 7 x4 + 2 x3 + 2 x4 x3 − 2 x3 x 2 − x1 − 4 x4 x1 − 2 x3 x1 + x2 x1
be the corresponding Hamiltonian as in (2.5), where x1 = p2 , x2 = q1 , x3 = w2,1 , and
x4 = z2,3 . A basis for the residue algebra A is given by the set of the 16 monomials
{1, x4 , x3 , x4 x3 , x2 , x4 x2 , x3 x2 , x3 x2 x4 , x1 , x4 x1 , x3 x1 , x1 x3 x4 , x2 x1 , x4 x1 x2 , x1 x3 x2 , x1 x3 x2 x4 }.
11
The matrix mHα is
2 7
0 9
0 0
0 0
0 0
0 0
0 0
0 0
mHα :=
0 0
0 0
0 0
0 0
0 0
0 0
0 0
0 0
2
2
0 0 −2
0
4
0 0
4
9
0 0 −2
0
−1 −4 −2
0
−2
0
−5
0
0
0
1
0
0
−2 0
1
0
−3 −4 0
0
1
−7 0
0
0
0
0
0 13 0 0
0
−2
0
0
0
0
0
2 7
0
2
0
0
0
0
0 −4 −2
0
0
0 9
0
2
0
0
0
0
0 −4
0
0
0 0
2
9
0
0
0
0
0
0
−2
0
0
0 0
0
11
0
0
0
0
0
0
0
0
0
0 0
0
0
1
3
0
2
1
0
−2
0
0
0 0
0
0
0
4
0
2
0
1
0
0
0
0 0
0
0
0
0
1
5
0
0
−1
0
0
0 0
0
0
0
0
0
6
0
0
0
0
0
0 0
0
0
0
0
0
0
2
3
−2
0
0
0 0
0
0
0
0
0
0
0
5
0
0
0
0 0
0
0
0
0
0
0
0
0
0
0
0
0 0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
−2
−4
−6
0
−2
0
−1
2
0
5
5
We expect the matrix’s smallest eigenvalue to be zero and, indeed, we get the following
eigenvalues for mHα :
{0, 1, 2, 4, 5, 6, 9, 11, 13}.
This is also the set of values which Hα takes on V(C). The eigenvector v which corresponds
to the eigenvalue 0 is the column vector
v := (1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0)T .
This eigenvector is used to find the coordinates of x̂ ∈ V(C) that cancel (minimize) Hα .
The coordinates of the global minimum x̂ = (x̂1 , . . . , x̂n ) are defined by mxi v = x̂i v, and
this gives x1 = x2 = x3 = 1, x4 = 0, and α1 = 2α2 = α3 = 2, α4 = 5.
12
5
Supplementary materials
5.1
Continuous optimization problems for the requirements (ii–
iii)
In Results 2.1, we describe how a positive quadratic polynomial Hij+ can be extracted
using Gröbner bases. Here we provide the details of the calculation.
The second requirement (ii) is equivalent to each of the following linear polynomials being
greater than zero:
a1 , −a1 + a3 , −a1 − a4 , −a1 + a5 , −a1 + a6 , 2 a1 + a3 , 2 a1 − a4 , −a2 − a1 , −a2 + 2 a1 ,
−2 a1 + a3 + 2 a5 , −2 a1 + a3 + 2 a6 , −2 a1 − a4 + 2 a5 , −2 a1 − a4 + 2 a6 , −a1 + a5 + a6 ,
a1 + a3 − a5 , a1 + a3 − a6 , a1 − a4 − a5 , a1 − a4 − a6 , −a2 − 2 a1 + 2 a5 , −a2 − 2 a1 + 2
a6 , −a2 + a1 − a5 , −a2 + a1 − a6 , −2 a1 + a3 + 2 a5 + 2 a6 , −2 a1 − a4 + 2 a5 + 2 a6 ,
a1 + a3 − a5 − a6 , a1 − a4 − a5 − a6 , −a2 − 2 a1 + a3 − a4 , −a2 − 2 a1 + 2 a5 + 2 a6 ,
−a2 + a1 − a5 − a6 , −a2 + 3 a1 + a3 − a4 , −a2 − 3 a1 + a3 − a4 + 3 a5 ,
−a2 − 3 a1 + a3 − a4 + 3 a6 , −a2 + 2 a1 + a3 − a4 − 2 a5 , −a2 + 2 a1 + a3 − a4 − 2 a6 ,
−a2 − 3 a1 + a3 − a4 + 3 a5 + 3 a6 , −a2 + 2 a1 + a3 − a4 − 2 a5 − 2 a6
For the third requirement (iii), the first choice for the objective function f : R5 → R is
2
2
f (a1 , . . . , a5 ) = (−a1 + a5 + a6 )2 − 1 + (−2 a1 + a3 + 2 a5 + 2 a6 )2 − 1
2
2
+ (a1 − a2 − a5 − a6 )2 − 1 + (a1 − a4 − a5 − a6 )2 − 1
2
2
2
2
+ 2 a2 2 − 1 + a1 2 − 1 + 2 a3 2 − 1 + 2 a4 2 − 1
2
2
2
2
+ 2 a5 2 − 1 + 2 a6 2 − 1 + 4 a5 2 − 1 + 4 a6 2 − 1
The solution is a1 = 0.214, a2 = −1.082, a3 = 0.514, a4 = −1.082, a5 = 0.314, and
a6 = 0.314.
The second choice for f is
2
+ (−2 a1 + a3 + 2 a5 + 2 a6 )2 − a2
2
2
+ (a1 − a2 − a5 − a6 )2 − a2 + (a1 − a4 − a5 − a6 )2 − a2
2
2
2
2
+ 2 a2 2 − a2 + a1 2 − a2 + 2 a3 2 − a2 + 2 a4 2 − a2
2
2
2
2
+ 2 a5 2 − a2 + 2 a6 2 − a2 + 4 a5 2 − a2 + 4 a6 2 − a2
(5.1)
f (a1 , . . . , a5 ) =
(−a1 + a5 + a6 )2 − a2
2
The solution is a1 = 1.0, a2 = −4.0, a3 = 4.0, a4 = −4.0, a5 = 2.0, and a6 = 2.0 (identical
to the solution given in [SS10]).
5.2
Basic description of the quantum annealing processor
Here we introduce the quantum annealing concept that ultimately solves a general Ising
(quadratic unconstrained binary optimization, or ”QUBO”) problem, then talk about the
13
important topic of embedding a QUBO problem into the specific quantum annealer (the
D-Wave 2X processor).
Quantum annealing (QA), along with the D-Wave processors, have been the focus of
much research. We refer the interested reader to [JAG+ 11, CCD15, BAS+ 13, BRI+ 14,
LPS+ 14]. QA is a paradigm designed to find the ground state of systems of interacting
spins represented by a time-evolving Hamiltonian:
S(s) = E(s)HP −
HP = −
X
1X
∆(s)σix ,
2 i
hi σix +
i
X
Jij σiz σjz .
i<j
The parameters hi and Jij encode the particular QUBO problem P into its Ising formulation. QA is performed by first setting ∆ E, which results in a ground state into which
the spins can be easily initialized. Then ∆ is slowly reduced and E is increased until
E ∆. At this point the system is dominated by HP , which encodes the optimization
problem. Thus, the ground state represents the solution to the optimization problem.
An embedding is the mapping of the nodes of an input graph to the nodes of the destination graph. The graph representing the problem’s QUBO matrix needs to be embedded
into the actual physical qubits on the processor in order for it to solve the QUBO problem. The specific existing connectivity pattern of qubits in the D-Wave chip is called the
Chimera graph. Embedding an input graph (a QUBO problem graph) into the hardware
graph (the Chimera graph) is in general NP-hard ([Cho08]).
Figure 1–right shows an embedding of the (column algorithm) QUBO corresponding to
the bi-prime M = 200 099 into the Chimera graph of the D-Wave 2X chip consisting of
a 12 by 12 lattice of 4 by 4 bipartite blocks. The Chimera graph is structured so that
the vertical and horizontal couplers in its lattice are connected only to either side of each
bipartite block. Each node in this graph represents one qubit and each edge represents
a coupling between two qubits. Adjacent nodes in the Chimera graph can be grouped
together to form new effective (i.e., logical) nodes, creating nodes of a higher degree. Such
a grouping is performed on the processor by setting the coupler between two qubits to a
large negative value, forcing two Ising spins to align such that the two qubits end up with
the same values. These effective qubits are expected to behave identically and remain in
the same binary state at the time of measurement. The act of grouping adjacent qubits
(hence forming new effective qubits) is called chain creation or chain identification.
An embedding strategy consists of two tasks: mapping and identification. Mapping is the
assignment of the nodes of the input graph to the single or effective nodes of the destination
graph. Solving such problems optimally is in general NP-hard, but one can devise various
approximations and enhancement strategies to overcome these difficulties, for example,
using statistical search methods like simulated annealing, structure-based methods, or a
combination of both. For a better understanding of current embedding approaches, we
refer the reader to [Cho08, BCI+ 14, JWA14, TAA15]. In Figure 1–right, the blue lines
14
indicate the identified couplers, the yellow lines indicate the problem couplers (i.e., the
edges of the problem graph), and the grey lines indicate empty couplers.
5.3
Embedding and solving details
We have used one of the D-Wave 2X processors, DW2X SYS4, as our quantum annealing
solver. This processor operates at a temperature range of 26(±5) millikelvin (mK) and
has 1100 qubits with a 95.5-qubit yield. To utilize the processor, we used D-Wave’s
SAPI software development kit (version 2.2.1). To embed the problem graph into the
hardware graph we used the sapiFindEmbedding and sapiEmbedProblem modules, and
to solve the problems we used the sapiSolveIsing and sapiUnembedAnswer modules. For
all problems we opted for the maximum number of reads available (10 000) in order to
increase the fraction of ground state samples. The following table shows some statistics
of the embedding and solving stages for several of the highest numbers that we were able
to successfully embed and solve.
Embedding & Solving Statistics
M
31861
34889
150419
151117
174541
200099
n emT ry idC prC #qubits jRatio rT ime
95
33
848 721
815
10
3.52
95
27
803 740
833
10
3.52
73
1
941 830
902
64
3.52
72
7
1001 846
918
64
3.52
72
3
1004 897
966
64
3.52
75
5
884 824
897
64
3.52
In the above table, M stands for the bi-prime, n is the number of variables in the QUBO
problem, emTry is the number of block trials of the sapiFindEmbedding routine, idC
is the total number of identified couplers, prC is the total number of problem couplers,
max({|J |})
#qubits is the total number of (physical) qubits, jRatio is the ratio min({|Jijij|}) , and rTime
is the chip run time in seconds.
6
Acknowledgements
We would like to thank Pooya Ronagh for constructive discussions and helpful comments
on the paper. We also thank Marko Bucyk for proofreading the manuscript.
References
[BAS+ 13]
Sergio Boixo, Tameem Albash, Federico M. Spedalieri, Nicholas Chancellor,
and Daniel A. Lidar, Experimental signature of programmable quantum annealing, Nat Commun 4 (2013).
[BCI+ 14]
Zhengbing Bian, Fabian Chudak, Robert Israel, Brad Lackey, William G
Macready, and Aidan Roy, Discrete optimization using quantum annealing
on sparse ising models, Frontiers in Physics 2 (2014), no. 56.
15
[BRI+ 14]
Sergio Boixo, Troels F. Ronnow, Sergei V. Isakov, Zhihui Wang, David
Wecker, Daniel A. Lidar, John M. Martinis, and Matthias Troyer, Evidence for
quantum annealing with more than one hundred qubits, Nat Phys 10 (2014),
no. 3, 218–224.
[Bur02]
C.J.C. Burges, Factoring as optimization, Tech. Report MSR-TR-2002-83,
Microsoft Research, January 2002.
[CCD15]
Cristian S. Calude, Elena Calude, and Michael J. Dinneen, Guest column:
Adiabatic quantum computing challenges, SIGACT News 46 (2015), no. 1,
40–61.
[Cho08]
Vicky Choi, Minor-embedding in adiabatic quantum computation: I. the parameter setting problem, Quantum Information Processing 7 (2008), no. 5,
193–209.
[CLO98]
David A. Cox, John B. Little, and Donal O’Shea, Using algebraic geometry,
Graduate texts in mathematics, Springer, New York, 1998.
[JAG+ 11]
M. W. Johnson, M. H. S. Amin, S. Gildert, T. Lanting, F. Hamze, N. Dickson,
R. Harris, A. J. Berkley, J. Johansson, P. Bunyk, E. M. Chapple, C. Enderud,
J. P. Hilton, K. Karimi, E. Ladizinsky, N. Ladizinsky, T. Oh, I. Perminov,
C. Rich, M. C. Thom, E. Tolkacheva, C. J. S. Truncik, S. Uchaikin, J. Wang,
B. Wilson, and G. Rose, Quantum annealing with manufactured spins, Nature
473 (2011), no. 7346, 194–198.
[JWA14]
Cai Jun, G. Macready William, and Roy Aidan, A practical heuristic for
finding graph minors, Preprint arXiv:1406.2741 (2014).
[Kit95]
A.Yu. Kitaev, Quantum measurements and the abelian stabilizer problem,
quant-ph/9511026 (1995).
[LPS+ 14]
T. Lanting, A. J. Przybysz, A. Yu. Smirnov, F. M. Spedalieri, M. H. Amin,
A. J. Berkley, R. Harris, F. Altomare, S. Boixo, P. Bunyk, N. Dickson, C. Enderud, J. P. Hilton, E. Hoskinson, M. W. Johnson, E. Ladizinsky, N. Ladizinsky, R. Neufeld, T. Oh, I. Perminov, C. Rich, M. C. Thom, E. Tolkacheva,
S. Uchaikin, A. B. Wilson, and G. Rose, Entanglement in a quantum annealing processor, Phys. Rev. X 4 (2014), 021041.
[MNM+ 16] Thomas Monz, Daniel Nigg, Esteban A. Martinez, Matthias F. Brandl,
Philipp Schindler, Richard Rines, Shannon X. Wang, Isaac L. Chuang, and
Rainer Blatt, Realization of a scalable shor algorithm, Science 351 (2016),
no. 6277, 1068–1070.
[PS01]
Pablo A. Parrilo and Bernd Sturmfels, Minimizing polynomial functions, DIMACS Series in Discrete Mathematics and Theoretical Computer Science
(2001).
[Rau13]
Robert Raussendorf, Contextuality in measurement-based quantum computation, Phys. Rev. A 88 (2013), 022322.
16
[Sho97]
Peter W. Shor, Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer, SIAM J. Comput. 26 (1997), no. 5,
1484–1509. MR 1471990
[SS10]
Gernot Schaller and Ralf Schutzhold, The role of symmetries in adiabatic quantum algorithms, Quantum Information & Computation 10 (2010),
no. 1&2, 109–140.
[SSV13]
John A. Smolin, Graeme Smith, and Alexander Vargo, Oversimplifying quantum factoring, Nature 499 (2013), no. 7457, 163–165.
[Stu96]
Bernd Sturmfels, Gröbner bases and convex polytopes, University Lecture
Series, vol. 8, American Mathematical Society, Providence, RI, 1996. MR
1363949
[TAA15]
Boothby Tomas, D. King Andrew, and Roy Aidan, Fast clique minor generation in chimera qubit connectivity graphs, Preprint arXiv:1507.04774 (2015).
[XZL+ 12]
Nanyang Xu, Jing Zhu, Dawei Lu, Xianyi Zhou, Xinhua Peng, and Jiangfeng
Du, Quantum factorization of 143 on a dipolar-coupling nuclear magnetic
resonance system, Phys. Rev. Lett. 108 (2012), 130501.
17
| 0math.AC
|
NOETHERIANITY OF SOME DEGREE TWO
TWISTED COMMUTATIVE ALGEBRAS
arXiv:1501.06925v2 [math.AC] 29 Sep 2015
ROHIT NAGPAL, STEVEN V SAM, AND ANDREW SNOWDEN
Abstract. The resolutions of determinantal ideals exhibit a remarkable stability property:
for fixed rank but growing dimension, the terms of the resolution stabilize (in an appropriate
sense). One may wonder if other sequences of ideals or modules over coordinate rings of
matrices exhibit similar behavior. We show that this is indeed the case. In fact, our main
theorem is more fundamental in nature: it states that certain large algebraic structures
(which are examples of twisted commutative algebras) are noetherian. These are important
new examples of large noetherian algebraic structures, and ones that are in some ways quite
different from previous examples.
Contents
1. Introduction
2. Generalities on tca’s
3. ModK and algebraic representations
4. Proof of the main theorems
5. A Gröbner-theoretic approach to the main theorems
References
1
5
8
15
17
20
1. Introduction
Let An be the coordinate ring of the space of symmetric bilinear forms on Cn , that is,
Sym(Sym2 (Cn )). Inside of Spec(An ) is the closed subset V (In,r ) of forms of rank at most r
defined by the determinantal ideal In,r . The resolution of An /In,r over An is explicitly known
by a classical result of Lascoux [L] (see also [We, Chapter 6]). The explicit description of the
resolution reveals an interesting feature: its terms stabilize as n grows. More precisely, the
decomposition of TorpAn (An /In,r , C) into irreducible representations of GLn is independent
of n for n ≫ p, r, when one appropriately identifies irreducibles of GLn with a subset of
those for GLn+1 .
Given this observation, one may wonder if the same phenomenon holds true more generally.
That is, suppose that for each n ≥ 0 we have a finitely generated GLn -equivariant An -module
Mn such that the M• are “compatible” in an appropriate sense. Do the resolutions of the
Mn stabilize?
Date: September 18, 2015.
2010 Mathematics Subject Classification. 13E05, 13A50.
SS was supported by a Miller research fellowship. AS was supported by NSF grant DMS-1303082.
1
2
ROHIT NAGPAL, STEVEN V SAM, AND ANDREW SNOWDEN
The main result of this paper (Theorem 1.1) implies that the answer to this question is
“yes.” In fact, Theorem 1.1 establishes a more fundamental result: compatible sequences of
finitely generated equivariant An -modules are “noetherian” in an appropriate sense.
1.1. Statement of results. Instead of working with a compatible sequence of An -modules,
we prefer to pass to the limit in n and work with a single module over the ring Sym(Sym2 (C∞ )).
This ring, with its GL∞ action, is an example of a twisted commutative algebra (tca);
see §2.1 for the general definition. Given a tca A, there is a notion of (finitely generated) Amodule, and A is said to be noetherian if any submodule of a finitely generated A-module
is again finitely generated.
Our main result is the following theorem:
V
Theorem 1.1. The tca’s Sym(Sym2 (C∞ )) and Sym( 2 (C∞ )) are noetherian.
We also prove a variant of the above result. A bivariate tca is like a tca, but where the
group GL∞ × GL∞ acts. We prove:
Theorem 1.2. The bivariate tca Sym(C∞ ⊗ C∞ ) is noetherian.
Remark 1.3. Let FIM be the category whose objects are finite sets and where a morphism
X → Y is a pair (f, Γ) consisting of an injection f : X → Y and a perfect matching Γ on Y \
f (X). Then the category of Sym(Sym2 (C∞ ))-modules is equivalent to the category of FIMmodules over C (see [SS3, §4.3], where FIM is called the upwards Brauer category). Thus
Theorem 1.1 shows that finitely generated FIM-modules are noetherian. This is reminiscent
of the noetherianity result for FI-modules (see [CEF, Theorem 1.3]), but much more difficult.
There are analogous reinterpretations for the other two cases.
1.2. Motivation. We offer a few pieces of motivation for our work.
• Our main theorems generalize and place into the proper context the stability phenomena observed in the resolutions of determinantal ideals and related ideals (such
as those considered in [RW]).
• The algebras appearing in Theorems 1.1 and 1.2 are closely related to the representation theory of orthogonal and symplectic groups; for example, see [SS3] or Example 1.4 below. We believe our theorems will have useful applications in this area.
• The tca’s we consider provide important new additions to the growing list of large
noetherian algebraic structures; see §1.3 for further discussion.
• FIM-modules are formally very similar to the FI-modules studied in [CEF, CEFN].
Numerous examples of FI-modules have been found, and the noetherian property
for FI-modules often translates to interesting new theorems about the examples
(e.g., representation stability in the cohomology of configuration spaces). We do
not currently have analogous examples of FIM-modules, but when examples are
found (which we expect), Theorem 1.1 will yield interesting new results about them.
Example 1.4. For δ ∈ C define the Brauer category B(δ) as follows: objects are finite
sets, and morphisms are Brauer diagrams, where composition of Brauer diagrams uses the
parameter δ. One can regard FIM as a subcategory of B(δ), and from this one can deduce
noetherianity of B(δ)-modules from Theorem 1.1. Suppose that δ = n − m with integers n
and m. Then one obtains an interesting B(δ)-module by S 7→ (Cn|m)⊗S , where Cn|m is the
super vector space of the indicated super dimension. This module is closely connected to
the representation theory of the orthosymplectic Lie algebra osp(n|m). Our theorem shows
NOETHERIANITY OF SOME DEGREE TWO TCA’S
3
that any submodule of this module is finitely generated. The second and third author plan
to study B(δ)-modules more closely in a future paper, and the noetherian property will be
of foundational importance.
1.3. Connection to previous work. Theorem 1.1 fits into a theme that has emerged in
recent years where large algebraic structures have been found to be noetherian. See [AH,
Co, HS] for examples of S∞ -equivariant polynomial rings. Some other examples include ∆modules [Sn], FI-modules [CEF, CEFN] (see also [SS1]), FS-modules [SS4], VIC(R)-modules
[PS], and certain spaces of infinite matrices [DK, DE, Eg].
However, the noetherian results of this paper seem fundamentally more difficult than the
previous ones. We do not know how to make this observation precise, but offer the following
observation. One can almost always use Gröbner bases to reduce a noetherianity problem
in algebra to one in combinatorics (see [SS4]). In the previous noetherianity results, the
combinatorial problems ultimately concern words in a formal language, and can be easily
solved using Higman’s lemma. In contrast, the combinatorial problem that naturally arises
in the present case (Question 5.2) is graph-theoretic, and does not seem approachable by
Higman’s lemma. Alternatively, this division can be seen in terms of the asymptotics of
Hilbert functions: in the previous noetherian results, the Hilbert functions have exponential
growth, while in the present case the growth is super-exponential.
Due to this fundamental new difficulty, we have been forced to introduce new methods to
prove the main theorem. We believe these will be useful more generally.
1.4. Outline of proof. We now outline the proof of noetherianity for A = Sym(Sym2 (C∞ )).
Let K = Frac(A) and let Modtors
A be the category of torsion A-modules, where we say that an
A-module M is torsion if M ⊗A K = 0. If I is a non-zero ideal of A then the quotient tca A/I
is “essentially bounded,” and it is not difficult to conclude from this that A/I is noetherian
(see Proposition 2.4); it follows that finitely generated objects of Modtors
are noetherian.
A
,
which
we
denote by ModK .
We next consider the Serre quotient category ModA / Modtors
A
The intuition for ModK comes from the following picture, which is not rigorous:
The scheme Spec(A) is the space of symmetric bilinear forms on C∞ . A-modules
correspond to GL∞ -equivariant quasi-coherent sheaves on Spec(A). Torsion Amodules correspond to sheaves that restrict to zero on the open set U of nondegenerate forms. Thus objects of ModK correspond to equivariant quasi-coherent
sheaves on U. But such sheaves correspond to representations of O∞ , since GL∞
acts transitively on U with stabilizer O∞ .
The above reasoning is fraught with errors. Nonetheless, it leads to a correct statement: we
prove (Theorem 3.1) that ModK is equivalent to the category of algebraic representations of
O∞ , as defined in [SS3]. The results of [SS3] can therefore be transferred to ModK , and give
an essentially complete understanding of this category.
We would now like to piece together what we know about Modtors
and ModK to deduce
A
the noetherianity of A. However, the noetherianity of A is not a formal consequence of what
we have so far: we need to use more information about how ModA is built out of the two
and ModK . We proceed in three steps.
pieces Modtors
A
(1) We show that if M is a finitely generated torsion A-module then M admits a resolution
by finitely generated projective A-modules (Proposition 4.3). The essential input here
is [RW], which explicitly computes the resolutions of certain torsion modules.
4
ROHIT NAGPAL, STEVEN V SAM, AND ANDREW SNOWDEN
(2) We next show that the section functor ModK → ModA , defined as the right adjoint of
the localization functor ModA → ModK , takes finite length objects of ModK to finitely
generated objects of ModA . This follows from step (1) and the structural results for
ModK (see Proposition 4.8).
(3) Finally, the noetherianity of A is deduced from (2), and our knowledge of Modtors
A and
ModK , by a short argument (see Theorem 4.9).
Remark 1.5. Let us offer some broader context for this proof. Suppose that X is a scheme
equipped with an action of a group G. We say that X is topologically G-noetherian if
every descending chain of G-stable Zariski closed subsets in X stabilizes. We say that X is
(scheme-theoretically) G-noetherian if the analogous statement holds for subschemes1 .
Suppose that U is a G-stable open subscheme of X, and let Z be the complement of U. One
would then like to relate the noetherianity of X to that of U and Z.
For topological noetherianity, there is no problem: if U and Z are topologically Gnoetherian then so is X (see [DK, §5]). This is a fundamental tool used in various topological
noetherianity results, such as [DE, DK, Eg]. Unfortunately, the analogous statement for
scheme-theoretic G-noetherianity does not hold: this is why we cannot directly conclude the
and ModK .
noetherianity of A from that of Modtors
A
The main technical innovation in this paper is our method for deducing (in our specific
situation) scheme-theoretic noetherianity of X from that of U and Z, together with some
extra information. This approach is likely to be applicable in other situations, and could
be very useful: for instance, if one could upgrade the topological results of [DK] to schemetheoretic results, it is likely that one could also get finiteness results for higher syzygies in
addition to results about equations (and not just set-theoretic equations).
1.5. Twisted graded-commutative algebras. One can define a notion of twisted gradedcommutative algebra, the basic examples being exterior algebras on finite length polynomial
representations of GL∞ . The noetherianity problem for these algebras is interesting, and has
applications similar to V
the commutative case. Transpose duality interchanges the algebras
∞
∞
Sym(C ⊗ C ) and (C∞ ⊗ C∞ ), and so noetherianity of the latter is an immediate
V
VV
consequence of Theorem 1.2. However, the noetherianity of (Sym2 (C∞ )) and ( 2 (C∞ ))
cannot be formally deduced from the results of this paper. We treat these algebras in a followup paper [NSS]. The main ideas are the same, but the details are more complicated: for
example,
while Sym(Sym2 (C∞ )) is closely related to the orthogonal group O∞ , the algebra
V
2
(Sym (C∞ )) is closely related to the periplectic superalgebra pe∞ .
1.6. Open questions. We list a number of open problems related to this paper.
(1) Theorem 1.1 states that the tca Sym(V ) is noetherian when V is an irreducible polynomial representation of degree 2. It would be natural to generalize this result by
allowing V to be a finite length representation of degree ≤ 2. Eggermont [Eg] has
shown that these tca’s are topologically noetherian (i.e., radical ideals satisfy the ascending chain condition). This suggests that they are all noetherian. However, new
ideas are needed to actually prove this.
(2) It is desirable to have results (either positive or negative) when V has degree > 2. One
might begin by trying to prove topological noetherianity for degree 3 representations.
The third author is currently investigating this with H. Derksen and R. Eggermont.
1One
should ask that all G-equivariant coherent sheaves are noetherian, not just the structure sheaf.
NOETHERIANITY OF SOME DEGREE TWO TCA’S
5
(3) Are the characteristic p analogs of the tca’s considered in this paper noetherian? Our
methods do not apply there. We point out that there are two versions of tca’s in
positive characteristic: one defined in terms of polynomial representations, and one
defined in terms of symmetric groups.
(4) Theorem 1.1 shows that A = Sym(Sym2 (C∞ )) is noetherian if we make use of the
GL∞ action. On the other hand, it is known that A is not noetherian if one only
makes use of the S∞ action [Dr, Example 2.4]. What happens for other groups? Is A
noetherian with respect to O∞ or Sp∞ ?
(5) In §4.2, we show that torsion modules over Sym(C∞ ⊗ C∞ ) satisfy the property (FT)
by appealing to [RW], which explicitly computes the resolutions of certain torsion
modules. We also show that torsion modules over Sym(Sym2 (C∞ )) satisfy (FT), but
deduce this by a rather clumsy argument from the previous case since the analog of
[RW] is not known in this case. We therefore believe that carrying out the analog of
[RW] for Sym(Sym2 (C∞ )) would be a worthwhile undertaking.
(6) Question 5.2 is an interesting and purely combinatorial question that is needed for the
Gröbner approach to Theorem 1.1.
1.7. Outline of paper. In §2, we review definitions and prove some general properties of
tca’s. These include generalities on the localization functor ModA → ModK and the section
functor S : ModK → ModA used in the proof of the main result. In §3 we prove that for the
specific algebras under consideration, the Serre quotient category ModK can be described
in terms of representations of infinite rank classical groups. The proofs of Theorem 1.1 and
Theorem 1.2 are in §4. Finally, §5 discusses an incomplete Gröbner theoretic approach to
the main theorems.
Remark 1.6. Transpose duality [SS2, §7.4] interchanges the two algebras in Theorem 1.1,
so it suffices to prove the noetherianity for either
V one. We give arguments for both when
convenient, but sometimes omit details for Sym( 2 (C∞ )).
2. Generalities on tca’s
2.1. Definitions. A representation of GL∞ is polynomial if it appears as a subquotient
of a (possibly infinite) direct sum of representations of the form (C∞ )⊗k . Polynomial representations are semi-simple, and the simple ones are the Sλ (C∞ ), where Sλ denotes the Schur
functor corresponding to the partition λ. A polynomial representation is said to have finite
length if it is a direct sum of finitely many simple representations. See [SS2] for details.
A twisted commutative algebra (tca) is a commutative associative unital C-algebra
A equipped with an action of GL∞ by C-algebra homomorphisms such that A forms a
polynomial representation of GL∞ . Alternatively, A is a polynomial functor from vector
spaces to commutative algebras [SS2, Theorem 5.4.1]; when used in this perspective, we use
A(V ) to denote its value on a vector space V .
We write |A| when we want to think of A simply as a C-algebra, and forget the GL∞ action.
An A-module is an |A|-module M equipped with an action of GL∞ that is compatible with
the one on A (i.e., g(ax) = (ga)(gx) for g ∈ GL∞ , a ∈ A, and x ∈ M) and such that M
forms a polynomial representation of GL∞ . An ideal of A is an A-submodule of A, i.e., a
GL∞ -stable ideal of |A|. We denote the category of A-modules by ModA . We write |M|
when we want to think of M as a module over |A|, forgetting its GL∞ -structure.
6
ROHIT NAGPAL, STEVEN V SAM, AND ANDREW SNOWDEN
We say that A is finitely generated if |A| is generated as a C-algebra by the GL∞
orbits of finitely many elements. Equivalently, A is finitely generated if it is a quotient of
a tca of the form Sym(V ), where V is a finite length polynomial representation of GL∞ .
An A-module M is finitely generated if it is generated as an |A|-module by the GL∞
orbits of finitely many elements. Equivalently, M is finitely generated if it is a quotient of an
A-module of the form A ⊗ V , where V is a finite length polynomial representation of GL∞ .
We note that the A ⊗ V are exactly the projective A-modules. An A-module if noetherian
if every submodule is finitely generated. We say that A is noetherian (as an algebra) if
every finitely generated A-module is noetherian.
Remark 2.1. We say that A is weakly noetherian if it is noetherian as a module over itself,
i.e., if ideals of A satisfy ACC. Of course, noetherian implies weakly noetherian. However,
it is not clear if weakly noetherian implies noetherian: not every A-module is a quotient of
a direct sum of copies of A, due to the equivariance, and so there is no apparent way to
connect the noetherianity of A as an A-module to that of general modules.
There are “bivariate” versions of the above concepts. A representation of GL∞ × GL∞ is
polynomial if it appears as a subquotient of a (possibly infinite) direct sum of representations of the form (C∞ )⊗a ⊗ (C∞ )⊗b . Polynomial representations are again semi-simple, and
the simple ones are the Sλ (C∞ ) ⊗ Sµ (C∞ ). A bivariate tca is a commutative associative
unital C-algebra A equipped with an action of GL∞ × GL∞ by C-algebra homomorphisms
such that A forms a polynomial representation of GL∞ × GL∞ . The remaining definitions
in the bivariate case should now be clear.
Since GL∞ sits inside of GL∞ × GL∞ (diagonally), any action of GL∞ × GL∞ can be
restricted to one of GL∞ . Thus bivariate tca’s can be regarded as tca’s, and similarly for
modules. This restriction process preserves finite generation (of algebras and modules) since
the tensor product of finite length polynomial representations is again finite length.
2.2. Annihilators. Let A be a tca and M be an A-module. The annihilator of M, denoted
Ann(M), is the set of elements a ∈ A such that am = 0 for all m ∈ M. This is an ideal of
|A| and GL∞ stable, and thus an ideal of A.
Proposition 2.2. Let A be a tca and let M be an A-module. Suppose am = 0 for some a ∈ A
and m ∈ M. Then there exists an integer n, depending only on m, such that an (gm) = 0 for
all g ∈ GL∞ (C).
Proof. First, we claim that ak+1 Xk · · · X1 m = 0 for any X1 , . . . , Xk ∈ gl∞ . We proceed by
induction on k. The k = 0 case is simply the statement am = 0, which is given. Suppose
now that ak Xk−1 · · · X1 m = 0. Applying Xk , we obtain
kak−1 (Xk a)(Xk−1 · · · X1 m) + ak (Xk · · · X1 m) = 0.
Multiplying by a kills the first term and shows ak+1 Xk · · · X1 m = 0. This completes the
proof of the claim.
Let M ′ ⊂ M be the GL∞ representation generated by m. Suppose that a belongs to A(V )
with V ⊂ C∞ . Pick m′ ∈ M ′ that also generates M ′ and belongs to M ′ (U) with U ∩ V = 0.
We can write m′ = Xm for some X ∈ U(gl∞ ), and so the claim shows that an m′ = 0 for
some n. We claim that this n works for all elements in M ′ . Indeed, given any g ∈ GL∞ , we
can find f : C∞ → C∞ such that f agrees with g on U and is the identity on V . We then
have f∗ (a) = a and f∗ (m′ ) = gm′ , and so 0 = f∗ (an m′ ) = an (gm′ ).
NOETHERIANITY OF SOME DEGREE TWO TCA’S
7
Corollary 2.3. Suppose |A| is a domain. Let M be a finitely generated A-module such that
M ⊗A Frac(A) = 0. Then Ann M 6= 0.
Proof. Let m1 , . . . , mr be generators for M. Since M ⊗A Frac(A) = 0, we can find a 6= 0 in
A such that ami = 0 for all 1 ≤ i ≤ r. By the proposition, there exists n > 0 such that
an (gmi ) = 0 for all 1 ≤ i ≤ r and all g ∈ GL∞ . Thus 0 6= an ∈ Ann(M).
2.3. Essentially bounded tca’s. We say that a polynomial representation V of GL∞
is essentially bounded if there exist integers r and s such that for any simple Sλ (C∞ )
appearing in V we have λr ≤ s. Similarly, we say that a polynomial representation V of
GL∞ ×GL∞ is essentially bounded if there exist integers r and s such that for any simple
Sλ (C∞ ) ⊗ Sµ (C∞ ) appearing in V we have λr ≤ s and µr ≤ s. The Littlewood–Richardson
rule [SS2, (2.14)] implies that the tensor product of essentially bounded representations is
again essentially bounded. In particular, if V is an essentially bounded representation of
GL∞ × GL∞ then its restriction to the diagonal GL∞ is still essentially bounded. Note also
that any finite length representation is essentially bounded.
Proposition 2.4. Let A be a finitely generated and essentially bounded (bivariate) tca. Then
A is noetherian.
Proof. We treat only the univariate case, the bivariate case is similar. Let P be a finitely
generated projective A-module. Note that P is essentially bounded. We must show that P
is noetherian. Suppose that every partition appearing in P has at most r rows and at most
s columns. Let Cr|s be a super vector space with r-dimensional even part and s-dimensional
odd part.
For any symmetric monoidal category C and choice of object V ∈ C, there is a symmetric
monoidal functor Reppol (GL∞ ) → C that sends Sλ (C∞ ) to Sλ (V ). We apply this with C
the category of super vector spaces, equipped with the usual tensor product and the signed
symmetry (see [SS2, (7.3.3)]), and V = Cr|s . We thus obtain a natural map
{A-submodules of P } → {A(Cr|s )-submodules of P (Cr|s)}.
It follows from [BR, Theorem 3.20] that this map is injective. Since A(Cr|s ) is a finitely
generated superalgebra, the finitely generated module P (Cr|s) is noetherian. Thus the right
side satisfies ACC and so the left side does as well.
Remark 2.5. This argument is modeled on the discussion in [SS2, §9.1].
2.4. Serre quotients. Let A be a tca with |A| a domain, and let K = Frac(|A|). The
field K has an action of GL∞ , and we write |K| when we want to disregard this action. A
K-module is a |K|-vector space V equipped with a compatible action of GL∞ such that
V is spanned over |K| by polynomial elements (i.e., elements generating a polynomial Csubrepresentation). We write ModK for the category of K-modules. If V is a polynomial
representation of GL∞ then K ⊗ V is a K-module. All K-modules are quotients of such
K-modules. Note, however, that K ⊗ V is usually not projective as a K-module.
An A-module M is torsion if M ⊗A K = 0. Write Modtors
for the category of torsion
A
gen
tors
modules. We let ModA be the Serre quotient ModA / ModA , and we let T : ModA →
Modgen
A be the localization functor. The functor ModA → ModK given by M 7→ M ⊗A K
gen
is exact and kills Modtors
A , and thus induces an exact functor F : ModA → ModK . Note
that F (T (M)) = M ⊗A K, by definition. Given a K-module M, let S(M) = M pol be the
8
ROHIT NAGPAL, STEVEN V SAM, AND ANDREW SNOWDEN
set of polynomial elements in M. This is naturally an A-module, and the resulting functor
S : ModK → ModA is right adjoint to F T . The following diagram summarizes the situation.
ModAdd■
t
T ttt
t
t
t
yy t
t
Modgen
A
F
■■
■■S
■■
■■
// ModK
Proposition 2.6. Let M be a K-module. Then the natural map M pol ⊗A K → M is an
isomorphism of K-modules. In particular, we have a natural isomorphism F T S = id.
Proof.
Injectivity is free. For surjectivity, pick v ∈ M. By definition, we can write v =
Pn
x
i=1 i wi , where xi ∈ K and wi ∈ M is polynomial. Again, by definition, we can write
xi = ai /bi ,Qwhere ai and bi are P
polynomial elements of K. We therefore have v = b−1 w,
n
where b = i=1 bi ∈ K and w = ni=1 (ai b/bi )wi is a polynomial element of M.
Proposition 2.7. The functor F is an equivalence of categories.
Proof. Proposition 2.6 shows that F has a right quasi-inverse, and so is therefore essentially
surjective and full. We show that F is faithful. Let M and N be A-modules, and consider
a morphism fe: M → N in Modgen
mapping to 0 in ModK . Write fe = T (f ) for some
A
′
′
morphism f : M → N/N in ModA , where M ′ and N ′ are submodules of M and N with
M/M ′ and N ′ torsion. Since f : M ′ ⊗ K → N/N ′ ⊗ K is 0, it follows that the image of f
is a torsion submodule of N/N ′ , and therefore of the form N ′′ /N ′ , where N ′′ is a torsionsubmodule of N containing N ′ . But then the image f ′ of f in Hom(M ′ , N/N ′′ ) is 0, and
since fe = T (f ) = T (f ′ ) we have fe = 0.
Proposition 2.8. Let W be a finite length polynomial representation with W GL∞ = 0. Set
A = Sym(W ). Then S(K ⊗ V ) = A ⊗ V for any polynomial representation V .
P
Proof. Suppose that x = si=1 (fi /g) ⊗ vi is a polynomial element of K ⊗ V , written in lowest
terms (that is, gcd(g, f1, . . . , fs ) = 1 and {v1 , . . . , vs } is linearly independent). Let m ≫ 0 be
such that g and each fi belong to A(Cm ), and let n = m + 1. We can think of x as a section
of a vector bundle on Cn having a pole along the divisorP
g = 0. Since x ∈ (K ⊗ V )pol , it
generates a finite dimensional representation of GLn . Let k (fj,k /gj ) ⊗ vj,k for 1 ≤ j ≤ r be
a basis; then every element can be written with common denominator g1 · · · gr . In particular,
the GLn -orbit of the divisor g = 0 is contained in g1 · · · gr = 0 and hence is finite. But GLn
is connected, so the irreducible components of g = 0 are preserved. Thus g is semi-invariant
under GLn . Any one-dimensional polynomial representation of GLn must be of the form
Sd,...,d(Cn ). But g ∈ A(Cm ) and is nonzero, and so it must be the case that g is actually
invariant under GLn (d must be zero because otherwise Sd,...,d(Cn ) = 0), and thus under
GL∞ . Since AGL∞ = C, we conclude that g is constant, and so x ∈ A ⊗ V , as required.
There is also a version of the above discussion for bivariate tca’s. The statements and
proofs are nearly identical.
3. ModK and algebraic representations
S
3.1. The main theorem and its consequences. A representation of O∞ = n≥1 On is
algebraic if it appears as a subquotient of a (possibly infinite) direct sum of tensor powers of
NOETHERIANITY OF SOME DEGREE TWO TCA’S
9
the standard representation C∞ . We write Rep(O∞ ) for the category of such representations.
This category was studied in [SS3].
We let A = Sym(Sym2 (C∞ )) and K = Frac(A) until §3.5. We let e1 , e2 , . . . be a basis
for C∞ , and let xi,j = ei ej , so that A = C[xi,j ]. Define m ⊂ |A| to be the ideal generated
by xi,i − 1 and xi,j for i 6= j. This ideal is not stable by GL∞ , but is stable by O∞ . The
e
quotient A/m is isomorphic to C. For an A-module M, define Φ(M)
= M/mM. This is
naturally a representation of O∞ . The main result of §3 is the following theorem (see §3.5
for analogous results in the other two cases):
e induces an equivalence of categories Φ : ModK → Rep(O∞ ).
Theorem 3.1. The functor Φ
We give the proof in the following subsections. The precise definition of Φ is given in §3.3.
For now, we note the following consequences of this theorem:
Corollary 3.2. We have the following:
(a) Finitely generated objects of ModK have finite length.
(b) If V is a finite length polynomial representation of GL∞ then K ⊗ V is a finite length
injective object of ModK , and all finite length injective objects have this form.
(c) Associating to λ the socle of K ⊗ Sλ (C∞ ) gives a bijection between partitions and
isomorphism classes of simple objects of ModK .
(d) Every finite length object M of ModK has a finite injective resolution M → I• where
each Ik is a finite length injective object.
Proof. These properties are proven for Rep(O∞ ) in [SS3]:
(a) [SS3, Proposition 4.1.5],
(b,c) [SS3, Proposition 4.2.9],
(d) dualize the explicit projective resolutions in [SS3, (4.3.9)].
3.2. Local structure at m of A-modules. The main result of this section is the following:
Proposition 3.3. Let M be an A-module. Then Mm is a free Am -module.
Let M∞ be the set of infinite complex matrices, indexed by Z≥0 . Let B ⊂ M∞ be the
set of upper triangular matrices, and let B ⊂ B be the group of invertible upper triangular
matrices. Let bi,j : M∞ → C be the function taking the (i, j) matrix entry. We let C[B] be
the polynomial ring C[bi,j ]i≤j , and we let C[B] = C[B][b−1
i,i ]. Elements of V ⊗ C[B] can be
thought of as (certain) functions B → V .
If V is a polynomial representation of GL∞ then every v ∈ V spans a finite dimensional
subrepresentation of B. It follows that we can give V the structure of a C[B]-comodule,
that is, we have a map V → V ⊗ C[B]. Explicitly, this map takes v to the function B → V
given by b 7→ bv. In fact, the image of the comultiplication map is contained in V ⊗ C[B].
Let H = B ∩ O∞ . Explicitly, H is the group of diagonal matrices with diagonal entries
±1, almost all of which are 1. If V is a polynomial representation of GL∞ then the map
V → V ⊗ C[B] above actually lands in the H-invariants of the target. Here we let B, and
H, act on C[B] by right translation.
Let M be an A-module. We then obtain a map
M → M ⊗ C[B] → M/mM ⊗ C[B].
10
ROHIT NAGPAL, STEVEN V SAM, AND ANDREW SNOWDEN
The image lands in the H-invariants (note that m is H-stable, so H still acts on M/mM),
and so we have a map
ϕM : M → (M/mM ⊗ C[B])H .
We now study this map. We first treat the case where M = A. Then A/mA = C, and so
our map takes the form
ϕA : A → C[B]H
The invariant ring C[B]H is easily seen to be the subring of C[B] generated by the bi,j bi,k ,
with i ≤ j, k. Since B acts on A by algebra homomorphisms, the map A → A ⊗ C[B] is
an algebra homomorphism, and so ϕA is an algebra homomorphism as well. Due to this, it
suffices to understand where the generators xi,j go. For m ∈ B, we have
X
mei =
bk,i (m)ek ,
k≤i
and so
m(ei ej ) =
X
k≤i
bk,i (m)ek
!
X
bℓ,j (m)eℓ
ℓ≤j
Thus the map A → A ⊗ C[B] is given by
xi,j 7→
X
!
=
X
bk,i (m)bℓ,j (m)ek eℓ .
k≤i,ℓ≤j
bk,i bℓ,j xk,ℓ .
k≤i, ℓ≤j
To compute ϕA , we now apply the homomorphism A → A/mA = C, which takes xi,j to δi,j .
Set Xi,j = ϕ(xi,j ), we thus find
X
Xi,j = ϕ(xi,j ) =
bk,i bk,j .
k≤i,j
Proposition 3.4. The localization of ϕA at m is an isomorphism.
′
Proof. Let me be the extension of m to C[B]H via ϕA . Let i ≤ j. We have Xi,j = bi,i bi,j +Xi,j
,
′
where Xi,j is the sum of the bk,i bk,j with k < i. Since Xi,j ∈ m for i 6= j and Xi,i − 1 ∈ m,
an easy inductive argument shows that b2i,i − 1 ∈ m and bi,j bi,k ∈ m if i 6= j or i 6= k. In
particular, b2i,i is a unit in the localization. The expression Xi,j Xi,k = b2i,i bi,j bi,k + · · · (where
the missing terms involve only smaller variables) shows, inductively, that bi,j bi,k belongs to
the image of ϕA localized at m. Since these generate C[B]H , the result follows. (It is easy
to see that ϕA , and hence its localization, is injective.)
A monomial character of H is a homomorphism H → C× of the form (z1 , z2 , . . .) 7→
· · · where the ni are integers (it suffices to consider ni ∈ {0, 1}) and ni = 0 for i ≫ 0.
A representation of H is admissible if it is a sum of monomial characters.
z1n1 z2n2
Proposition 3.5. Let V be an admissible representation of H. The localization of (V ⊗
C[B])H at m is a free Am -module, and the fiber at m is canonically isomorphic to V .
Proof. It suffices to treat the case where V is one dimensional. Let χ = zi1 · · · zir be the
corresponding (monomial) character. Then an argument similar to the one in the proof of
Proposition 3.4 shows that for any nonzero v ∈ V , the element v ⊗ (bi1 ,i1 · · · bir ,ir ) is an
H invariant and the localization of (V ⊗ C[B])H at m is a free Am -module generated by
v ⊗ (bi1 ,i1 · · · bir ,ir ). The second statement follows immediately from this.
NOETHERIANITY OF SOME DEGREE TWO TCA’S
11
Now let M be an A-module, and consider the map
ϕM : M → (M/mM ⊗ C[B])H .
The target is naturally a module over the ring C[B]H , which is itself an A-algebra, and one
easily verifies that ϕM is a map of A-modules.
Proposition 3.6. Let M be an A-module. The localization of ϕM at m is an isomorphism.
Proof. Note that for any M, the quotient M/mM is an admissible representation of H.
Since such representations are semi-simple, it follows that the target of ϕM commutes with
direct limits in M. It therefore suffices to treat the case where M is finitely generated as an
A-module. Let N = (M/mM ⊗ C[B])H
m , and let R be the kernel of (ϕM )m . Since M/mM
is an admissible representation of H, Proposition 3.5 shows that N is a free Am -module
whose fiber at m is isomorphic to M/mM. It follows that (ϕM )m is a surjection, since it is a
surjection mod m and N is free. We thus have an isomorphism Mm = R ⊕ N, which shows
that R is finitely generated. Since (ϕM )m induces an isomorphism on the fiber at m, we see
that R/mR = 0. Thus R = 0 by Nakayama’s lemma, which completes the proof.
Proposition 3.3 follows from the above proposition, since as noted in the above proof, the
target of (ϕM )m is a free Am -module.
3.3. Definition of Φ. We begin with some simple observations.
e ⊗ V ) is isomorphic to
Lemma 3.7. If V is a polynomial representation of GL∞ then Φ(A
e
the restriction of V to O∞ . For any A-module M, Φ(M)
is an algebraic representation of
O∞ .
Proof. The first part is clear. For the second part, pick a surjection A ⊗ V → M of Ae is right exact, there is an induced surjection V → Φ(M).
e
modules. Since Φ
As any quotient
of an algebraic representation is algebraic, the result follows.
Lemma 3.8. If I is a non-zero ideal of A then I + m = A.
Proof. Suppose I is a non-zero ideal of A. Let An = Sym(Sym2 (Cn )), regarded as a subring
of |A|. Then A is the union of the An , and so for n sufficiently large, I ′ = I ∩ An is a nonzero GLn -stable ideal of An . Of course, m′ = m ∩ An is a maximal ideal of An . The scheme
Spec(An ) is the space of symmetric bilinear forms on Cn , and m′ ∈ Spec(An ) represents the
sum of squares form, which has maximal rank. Since V (I ′ ) is a proper closed GLn -stable
subset of Spec(An ), it cannot contain any form of maximal rank (as the orbit of any such
form is dense), and so I ′ 6⊂ m′ . It follows that I 6⊂ m, and so I + m = A.
e
Lemma 3.9. If M is a torsion A-module then Φ(M)
= 0.
e commutes with direct limits, it suffices to treat the case where M is finitely
Proof. Since Φ
generated and torsion. By Corollary 2.3, M has non-zero annihilator I, and I + m = A by
the Lemma 3.8. Thus
M/mM = M ⊗A/I (A/(I + m)) = 0.
e is exact.
Lemma 3.10. The functor Φ
Proof. This follows immediately from Proposition 3.3.
12
ROHIT NAGPAL, STEVEN V SAM, AND ANDREW SNOWDEN
e is an exact functor killing Modtors . It follows that Φ
e factors through the Serre
Thus Φ
A
tors
quotient ModA / ModA , which we identify with ModK . In other words, there exists an exact
e
functor Φ : ModK → Rep(O∞ ), unique up to isomorphism, such that Φ(M)
= Φ(M ⊗A K).
e
Since Φ is compatible with direct limits, so is Φ.
3.4. Proof of Theorem 3.1. We now prove that Φ is an equivalence. We first prove that
it is faithful, then full, and finally essentially surjective.
Lemma 3.11. Φ is faithful.
e ) = 0. The square
Proof. Let f : M → N be a map of A-modules, and suppose Φ(f
M
ϕM
(M/mM ⊗ C[B])H
//
f
f ⊗1
N
ϕN
//
(N/mN ⊗ C[B])H
e ) = f = 0, the right map is 0. Since ϕM and ϕN are isomorphisms
commutes. Since Φ(f
after localizing at m, the induced map f : Mm → Nm is 0. This implies that the induced map
f : M ⊗A K → N ⊗A K is 0, and so f = 0 in ModK . This shows that Φ is faithful.
In what follows, we give GL∞ and B the direct limit topology (thinking of them as the
direct limits of GLn and B ∩ GLn in the Zariski topology).
Lemma 3.12. Let M be an A-module and let x ∈ M ⊗A K. Then there exists a dense
Zariski open subset V of B such that bx ∈ Mm for all b ∈ V .
Proof. Given h ∈ C[B], let Uh = {b ∈ B | h(b) 6= 0} be the corresponding Zariski open subset
of B. Let V = {b ∈ B | bx ∈ Mm }. We can find nonzero a ∈ A such that ax ∈ M. Note that
b ∈ UϕA (a) if and only if ba ∈
/ m; since ϕA (a) is not the zero function by Proposition 3.4, we
can find such a b. Then bx ∈ Mm and so V 6= ∅.
P
We claim that V is open. Suppose b ∈ V and write bx = i mi ⊗ (fi /c) with mi ∈ M,
fi ∈ A, and c ∈ A \ m. Then 1 ∈ UϕA (c) and b′ bx ∈ Mm for each b′ ∈ UϕA (c) . So UϕA (c) b ⊆ V ,
showing that V is open. Finally, since B is a directed union of irreducible spaces, a nonempty
open subset, like V , is dense.
Lemma 3.13. Let M be an A-module, and let x ∈ M ⊗A K. Suppose that there exists a
dense Zariski open subset U of B such that for all b ∈ U we have bx ∈ Mm and bx = 0,
where the overline denotes reduction mod m. Then x = 0.
Proof. Replacing x with ax, for an appropriate a ∈ A, it suffices to treat the case x ∈ M.
Then b 7→ bx defines a function B → M/mM which is continuous for the Zariski topology.
The hypothesis implies that it vanishes on a dense subset of B, and therefore it vanishes on
all of B. So ϕM (x) = 0, and so x = 0 since ϕM is injective after localizing at m.
Lemma 3.14. Let U be a dense Zariski open subset of B. Then for all g ∈ GL∞ the set
O∞ Ug −1 ∩ B contains a dense Zariski open subset of B.
Proof. Pick g ∈ GL∞ ; then g ∈ GLn for n large enough. Since On ∩ Un is a finite set,
the multiplication map On × Un → GLn has dense image (by a dimension count). Since it
is also constructible, it contains a dense open subset which we may assume is closed under
multiplication by On . In particular, we conclude that O∞ Ug −1 contains a Zariski dense open
NOETHERIANITY OF SOME DEGREE TWO TCA’S
13
subset V such that O∞ V = V . By a similar argument O∞ B contains a dense open subset
of GL∞ . This implies that V ∩ O∞ B is nonempty and hence there exists h ∈ O∞ such that
V ∩ hB is nonempty. Multiplying on the left by h−1 shows that V ∩ B is a nonempty open
subset of B. Since B is a directed union of irreducible spaces, we conclude that V ∩ B is a
dense open subset of B.
We now begin the proof of fullness. Let M and N be torsion-free A-modules and let
f : M/mM → N/mN be a map of O∞ representations. The diagram in Lemma 3.11 allows
us to define a map fm : Mm → Nm , and this induces a map f : M ⊗A K → N ⊗A K a |K|linear map. By definition, the map fm is characterized as follows: if x ∈ Mm and y ∈ Nm
then y = fm (x) if and only if f (bx) = by for all b ∈ B, where overlines denote reduction
modulo m. Using Lemma 3.13, we can say more: if f (bx) = by for all b in some dense Zariski
open subset U ⊂ B then y = fm (x). Indeed, putting y ′ = fm (x) we have f (bx) = by ′ for all
b ∈ B, and so by = by ′ for all b ∈ U, and so y = y ′ by the lemma. We now give a similar
characterization for f .
Lemma 3.15. Let x ∈ M ⊗A K and y ∈ N ⊗A K. Then y = f (x) if and only if the following
condition holds:
(∗) There exists a dense Zariski open dense subset U of B such that for all b ∈ U we
have bx ∈ Mm and by ∈ Nm and f (bx) = by.
Proof. Suppose y = f (x). Pick non-zero a ∈ A such that ax ∈ M. Let V be a dense Zariski
open subset of B such that ba ∈ Am and ba−1 ∈ Am and bx ∈ Mm and by ∈ Nm for all b ∈ V
(Lemma 3.12). Put z = f (ax). Since ax ∈ Mm we have z = fm (ax), and so bz = f (bax)
for all b ∈ B. For b ∈ V we have f (bax) = ba · f (bx) and bz = bay = ba · by, and so
ba · by = ba · f (bx). Since ba−1 ∈ Am , it follows that ba 6= 0, and so by = f (bx). So (∗) holds.
Now suppose (∗) holds. Let a be a non-zero element of A such that ax ∈ M. Let z = f (ax).
Since ax ∈ M, we have z = fm (ax), and so bz = f (bax) for all b ∈ B. Let V be a dense
Zariski open subset of B such that ba ∈ Am for all b ∈ V (Lemma 3.12). Then for b ∈ U ∩ V
we have bz = f (bax) = ba · f (bx) = ba · by = bay. It follows from Lemma 3.13 that z = ay,
and so ay = f (ax). Since f is K-linear, we conclude y = f (x).
Lemma 3.16. The map f : M ⊗A K → N ⊗A K is GL∞ -equivariant.
Proof. Let x ∈ M ⊗A K and let y = f (x) and let g ∈ GL∞ . We must show gy = f (gx). Let
U be a dense Zariski open subset of B such that bx ∈ Mm and by ∈ Nm and by = f (bx) for
all b ∈ U (Lemma 3.15). Let V = O∞ Ug −1 ∩ B, and let b ∈ V . We can then write bg = h′ b′
with h′ ∈ O∞ and b′ ∈ U. We have bgx = h′ b′ x ∈ Mm since b′ x ∈ Mm and Mm is stable by
O∞ . Similarly, bgy ∈ Nm . Furthermore,
f (bgx) = f (h′ b′ x) = h′ f (b′ x) = h′ b′ y = bgy.
This is the only place where we use the O∞ -equivariance of f . Since this holds for all
b ∈ V and V contains a dense Zariski open of B (Lemma 3.14), it follows that gy = f (gx)
(Lemma 3.15). This completes the proof.
We have shown that Φ is full. The following lemma completes the proof of the theorem.
Lemma 3.17. Φ is essentially surjective.
14
ROHIT NAGPAL, STEVEN V SAM, AND ANDREW SNOWDEN
Proof. Since Φ is full and compatible with direct limits, it suffices to show that all finitely
generated objects of Rep(O∞ ) are in the essential image of Φ. Thus let M be such an object.
By the results of [SS3, §4], we can realize M as the kernel of a map f : I → J, where I and
J are injective objects of Rep(O∞ ). Every injective object of Rep(O∞ ) is the restriction to
O∞ of a polynomial representation of GL∞ . Thus I = Φ(M) and J = Φ(N) for some M
and N in ModK , and f = Φ(f ′ ) for some f ′ : M → N in ModK . The exactness of Φ shows
that M ∼
= Φ(ker(f ′ )), and so Φ is essentially surjective.
V
3.5. The other two cases. Everything in this section can be adapted to Sym( 2 (C∞ )).
This is straightforward (and not even logically necessary, per Remark 1.6), so we do not
comment further on it.
Everything can also be adapted to the bivariate tca A = Sym(C∞ ⊗ C∞ ). We will make a
few comments on how this goes. First, we state the analogs of Theorem 3.1 and Corollary 3.2.
A representation of GL∞ is algebraic if it appears as a subquotient of a (possibly infinite)
⊗b
∞
direct sum of representations of the form (C∞ )⊗a ⊗ (C∞
∗ ) . Here C∗ is the restricted dual
∞
∗
of C , defined as the span of the dual basis {ei } in the usual dual space (C∞ )∗ . One easily
checks that C∞
∗ is indeed a representation of GL∞ . We write Rep(GL∞ ) for the category
of algebraic representations. This was also studied in [SS3].
By the “twisted diagonal embedding” GL∞ → GL∞ × GL∞ , we mean the embedding
given by g 7→ (g, t g −1). We note that the algebraic representations of GL∞ are exactly
those appearing as a subquotient of the restriction of a polynomial representation from
GL∞ × GL∞ via the twisted diagonal embedding.
We identify A with C[xi,j ] in the obvious manner, and let m ⊂ |A| be the ideal generated
by xi,i − 1 and xi,j for i 6= j. This ideal is stable under the twisted diagonal GL∞ . For an
e
A-module M, define Φ(M)
= M/mM. This is naturally a representation of GL∞ .
e induces an equivalence Φ : ModK → Rep(GL∞ ).
Theorem 3.18. The functor Φ
Corollary 3.19. We have the following:
(a) Finitely generated objects of ModK have finite length.
(b) If V is a finite length polynomial representation of GL∞ × GL∞ then K ⊗ V is a finite
length injective object of ModK , and all finite length injective objects have this form.
(c) Associating to (λ, µ) the socle of K ⊗Sλ (C∞ ) ⊗Sµ (C∞ ) gives a bijection between pairs
of partitions and isomorphism classes of simple objects of ModK .
(d) Every finite length object M of ModK has finite injective resolution M → I• where
each Ik is a finite length injective object.
Proof. These properties are proven for Rep(GL∞ ) in [SS3]:
(a) [SS3, Proposition 3.1.5],
(b,c) [SS3, Proposition 3.2.14],
(d) dualize the explicit projective resolutions in [SS3, (3.3.7)].
The proof of Theorem 3.18 closely follows that of Theorem 3.1. The main differences occur
in the analog of §3.2. In the present case, one takes B ⊂ M∞ × M∞ to be the set of pairs
of upper-triangular matrices. The group H is replaced with the intersection of B and the
twisted diagonal GL∞ inside of GL∞ × GL∞ , and consists of pairs (h, h−1 ) where h ∈ GL∞
is a diagonal matrix. With these definitions, everything proceeds in a similar way.
NOETHERIANITY OF SOME DEGREE TWO TCA’S
15
4. Proof of the main theorems
4.1. The structure of ideals. We have the following multiplicity-free decompositions:
M
Sym(Sym2 C∞ ) =
S2λ (C∞ )
M
V
Sym( 2 C∞ ) =
S(2λ)† (C∞ )
M
Sym(C∞ ⊗ C∞ ) =
Sλ (C∞ ) ⊗ Sλ (C∞ ).
For a proof, see [M, §I.5, Example 5] for the first two decompositions and [M, §I.4, (4.3)] for
the last one. In all cases, the sum is over partitions λ. For the purposes of stating the next
result we write Eλ for the λ summand. Let Iλ be the ideal generated by Eλ .
Proposition 4.1. Eµ ⊆ Iλ if and only if λ ⊆ µ.
V
Proof. For Sym(Sym2 C∞ ), see [Ab], for Sym( 2 C∞ ), see [AdF, Theorem 3.1], and for
Sym(C∞ ⊗ C∞ ), see [CEP, Theorem 4.1]. Since [Ab] is a difficultVreference to obtain, we
note that the result for Sym(Sym2 C∞ ) follows from that of Sym( 2 C∞ ) because the two
are transpose dual (see [SS2, §7.4]). Proofs of these results will also appear in [NSS].
Corollary 4.2. Let A be one of the three algebras above, and let I be any non-zero ideal of
A. Then A/I is essentially bounded, and, in particular, noetherian.
Proof. Suppose that I is a non-zero ideal of A. Then I contains some Eλ , and thus Iλ . Thus
by the proposition, A/I contains no partition µ satisfying λ ⊂ µ, and is therefore essentially
bounded. Noetherianity of A/I follows from Proposition 2.4.
4.2. The (FT) property. Let B be a (bivariate) tca with B0 = C, so that B+ (the ideal of
B generated by positive degree elements) is maximal. We say that a B-module M is (FT)
over B if TorB
i (M, C) is a finite length representation of GL∞ (or GL∞ × GL∞ ) for all
i ≥ 0. The i = 0 case implies that M is finitely generated as a B-module, by Nakayama’s
lemma [SS2, Proposition 8.4.2]. Conversely, if B is noetherian then any finitely generated
B-module satisfies (FT). We note that if
0 → M1 → M2 → M3 → 0
is a short exact sequence of B-modules and two of the modules are (FT) then so is the third.
The main result we need concerning (FT) is the following proposition:
V
Proposition 4.3. Let A be one of Sym(Sym2 C∞ ), Sym( 2 C∞ ), or Sym(C∞ ⊗ C∞ ), and
let M be a finitely generated torsion A-module. Then M satisfies (FT) over A.
We begin with some lemmas.
Lemma 4.4. Let B → B ′ be a homomorphism of (bivariate) tca’s, with B0 = B0′ = C, and
let M be a B ′ -module. Suppose that B ′ is (FT) over B. Then M is (FT) over B if and only
if M is (FT) over B ′ .
Proof. First suppose that M is (FT) over B ′ . Starting with a free resolution of M over B ′ ,
and a free resolution of B ′ over B, we get an acyclic double complex of B-modules resolving
M. This leads to a spectral sequence
′
B
B
′
E2p,q = TorB
p (Torq (M, C), B ) =⇒ Torp+q (M, C).
16
ROHIT NAGPAL, STEVEN V SAM, AND ANDREW SNOWDEN
′
Note that TorB
q (M, C) is a trivial B module (meaning B+ acts by 0), and so
′
′
B
B
B
′
′
TorB
p (Torq (M, C), B ) = Torq (M, C) ⊗C Torp (B , C).
Each of the Tor’s on the right has finite length by assumption, and so the left side also has
finite length. It follows that TorB
i+j (M, C) has finite length, and so M is (FT) over B.
Now suppose that M is (FT) over B. In particular, M is a finitely generated B-module,
′
and so also a finitely generated B ′ -module. This shows that TorB
0 (M, C) is finite length. Let
P → M → 0 be a minimal projective cover and let N be the kernel. Since B ′ is (FT) over
B, we conclude that P , and hence N are both (FT) over B. In particular, N is a finitely
′
generated as a module over B, and hence over B ′ . This shows that TorB
1 (M, C) is finite
′
length; to get the statement for TorB
i (M, C), we can iterate this argument i times.
Lemma 4.5. Let A be the bivariate tca Sym(C∞ ⊗ C∞ ). Then A/Iλ satisfies (FT) over A
for all rectangular partitions λ.
Proof. This follows from [RW, Theorem 1.2], taking m = n = ∞ (the results there are
stated for finite m and n, but since the answer is given in terms of Schur functors, it can be
extended to the infinite case): one has to show that the coefficient of w i , as a polynomial
in z, is of bounded degree. To see that, note that fixing w i means that q is bounded from
above, and then the result is clear from the form of the polynomials hr×s (z, w).
V
Lemma 4.6. Let B be Sym(Sym2 C∞ ) or Sym( 2 C∞ ). Then B/Iλ satisfies (FT) over B
for all rectangular partitions λ.
e be the
Proof. Let A = Sym(C∞ ⊗C∞ ). Let Jλ be the ideal in A generated by Sλ ⊗Sλ . Let A
tca obtained from A by restricting to the diagonal GL∞ action. Then there is a surjection of
e → B, induced by the natural map (C∞ )⊗2 → Sym2 (C∞ ), and ϕ(Jλ ) ⊂ Iλ . (Note
tca’s ϕ : A
that ϕ(Jλ ) is nonzero: if λ is a single column, then this is an ideal generated by minors
of a given size and the image of every power of Jλ is nonzero; in general, some power of
a determinantal ideal belongs to Jλ after we specialize to large enough finite-dimensional
vector spaces.)
Since A/Jλ is (FT) over A (Lemma 4.5), each TorA
i (A/Jλ , C) is a finite length GL∞ ×GL∞
module, and hence remains finite length under the restriction to the diagonal copy of GL∞ .
e λ is (FT) over A.
e Also A/J
e λ is essentially bounded (since the bivariate tca A/Jλ is)
So A/J
e λ , thus
and hence noetherian (Proposition 2.4). It follows that B/ϕ(Jλ ) is (FT) over A/J
e as well (Lemma 4.4).
over A
e (the resolution of B over A
e is a Koszul complex) so another
Next, B is (FT) over A
application of Lemma 4.4 gives that B/ϕ(Jλ ) is (FT) over B. Finally, B/Iλ is a finitely
generated module over B/ϕ(Jλ ) and the latter is noetherian (Corollary 4.2), so B/Iλ is (FT)
over B/ϕ(Jλ ). We apply Lemma 4.4 again to deduce that B/Iλ is (FT) over B.
Remark 4.7. It would be interesting to prove directly that B/Iλ satisfies (FT) over B by
∞
∞
computing TorB
i (B/Iλ , C), as is done in [RW] for Sym(C ⊗ C ).
Proof of Proposition 4.3. Let I be the annihilator of M. This is non-zero by Corollary 2.3.
Thus I contains an ideal generated by a rectangular partition; replace I with this ideal.
Since A/I is noetherian (Corollary 4.2), M is (FT) over A/I. By Lemma 4.5 or 4.6, A/I is
(FT) over A. Thus by Lemma 4.4, M is (FT) over A.
NOETHERIANITY OF SOME DEGREE TWO TCA’S
4.3. Completion of the proofs. Let A be one of the tca’s Sym(Sym2 C∞ ) or Sym(
or the bivariate tca Sym(C∞ ⊗ C∞ ), and let K = Frac(A).
17
V2
C∞ ),
Proposition 4.8. If M is a finite length K-module then S(M) satisfies (FT) over A.
Proof. We prove this by induction on the injective dimension of M, which is possible by
Corollary 3.2(d) (and its analogs). If M is injective then S(M) is a finitely generated
projective A-module (Corollary 3.2(b), Proposition 2.8), and thus satisfies (FT). Now let M
be a finite length object of ModK with positive injective dimension. We can then find an
exact sequence
0 → M → I → N → 0,
where I is injective and N has smaller injective dimension than M. Applying S, we obtain
an exact sequence
0 → S(M) → S(I) → S(N) → (R1 S)(M) → 0.
By induction, S(N) is (FT) over A, and so finitely generated. It follows that (R1 S)(M)
is finitely generated. By Proposition 2.6 and the fact that localization is exact, we have
(R1 S)(M) ⊗A K = 0, and so (R1 S)(M) satisfies (FT) over A by Proposition 4.3. Thus S(I),
S(N), and (R1 S)(M) all satisfy (FT) over A, and so S(M) satisfies (FT) over A as well.
The following completes the proof of our main results: Theorem 1.1 and Theorem 1.2.
Theorem 4.9. A is noetherian.
Proof. Let P be a finitely generated projective A-module, and let N1 ⊂ N2 ⊂ · · · be an
ascending chain of A-submodules of P . Since P ⊗A K is finite length (Corollary 3.2(a)),
it follows that the ascending chain Ni ⊗A K stabilizes, and so we may as well assume it is
stationary to begin with. Let M ⊂ P be the common value of S(Ni ⊗A K), which is finitely
generated by Proposition 4.8. Then N• is an ascending chain in M. Let M ′ = M/N1 and
Ni′ = Ni /N1 ⊂ M ′ , so that N•′ is an ascending chain in M ′ . Since M ′ is finitely generated
and M ′ ⊗ K = 0, Corollary 2.3 implies that I = Ann(M ′ ) is non-zero. Thus M is a module
over A/I, which is noetherian (Corollary 4.2), and so N•′ stabilizes. This implies that N•
stabilizes, and so P is noetherian.
Remark 4.10. The above proof has three key ingredients:
(1) Finitely generated objects of ModK are noetherian.
(2) If I is a non-zero ideal of A then A/I is noetherian.
(3) If M is a finite length object of ModK then S(M) is a finitely generated A-module.
Let us make one comment regarding (3). Given a finite length object M in ModK , we can
realize M as the kernel of a map I → J where I and J are finite length injective objects of
ModK . Since S is left-exact, it follows that S(M) is the kernel of the map S(I) → S(J),
and we know that S(I) and S(J) are finitely generated projective A-modules. Thus finite
generation of S(M) would follow immediately if we knew A to be coherent (which exactly
says that the kernel of a map of finitely generated projective modules is finitely generated).
Since coherence is a weaker property than noetherianity, it should be easier to prove; however,
we have not found any way to directly prove coherence.
5. A Gröbner-theoretic approach to the main theorems
In this section we outline a possible approach to proving Theorem 1.1 using Gröbner bases.
This leads to an interesting combinatorial problem that we do not know how to resolve.
18
ROHIT NAGPAL, STEVEN V SAM, AND ANDREW SNOWDEN
5.1. Admissible weights. A weight of GL∞ is a sequence of non-negative integers w =
(w1 , w2 , . . .) such that
L wi = 0 for i ≫ 0. Every polynomial representation V of GL∞
decomposes as V =
Vw , where Vw is the w weight space. A weight is admissible if wi is 0
or 1 for all i. An admissible weight vector is an element of some Vw with w an admissible
weight. We require the following fact: if V is a polynomial representation of GL∞ then V
is generated, as a representation, by its admissible weight vectors.
5.2. Degree one tca’s. We begin by sketching a Gröbner-theoretic proof that the tca
A = Sym(C∞ ⊕ C∞ ) is noetherian. This proof comes from transferring the proof in [SS4]
that Rep(FI2 ) is noetherian through Schur–Weyl duality, and can easily be adapted to treat
all tca’s generated in degree ≤ 1. Let x1 , x2 , . . . be a basis for the first C∞ , and let y1 , y2 , . . .
be a basis for the second C∞ , so that A is the polynomial ring C[x1 , x2 , . . . , y1 , y2 , . . .].
Let M be the set of pairs Γ = (S, ϕ), where S is a finite subset of N = {1, 2, . . .} and
ϕ : S → {red, blue} is a function. Given Γ, Γ′ ∈ M, we define Γ → Γ′ (a “move”) if one of
the following two conditions hold:
• S ′ is obtained from S by adding a single element and leaving the colors unchanged
(i.e., ϕ′ |S = ϕ).
• There exists some i ∈ S such that i + 1 6∈ S and S ′ is obtained from S by replacing
i with i + 1 (and leaving all colors unchanged).
We define Γ ≤ Γ′ if there is a sequence of moves taking Γ to Γ′ . This partially orders M.
We also define a total order on M, as follows. Given two finite subsets S and S ′ of N,
define S S ′ if max(S) < max(S ′ ), or max(S) = max(S ′ ) = n and S \{n} S ′ \{n}. Given
S ⊂ N and ϕ, ϕ′ : S → {red, blue}, define ϕ ϕ′ by thinking of ϕ and ϕ′ as words in R
and B and using the lexicographic order (with R B, say). Finally, define (S, ϕ) (S ′ , ϕ′ )
using the lexicographic order (i.e., S ≺ S ′ , or S = S ′ and ϕ ϕ′ ).
Given Γ ∈ M, define
(
Y xi if ϕ(i) = red
mΓ =
.
yi if ϕ(i) = blue
i∈S
If f ∈ A is an admissible weight vector of weight w, then f is a linear combination of the
mΓ ’s where Γ has the same support as w. We define the initial variable of f , denoted in(f ),
to be the largest Γ (under ) such that mΓ appears in f with non-zero coefficient.
Now let I be an ideal of A. Let in(I) ⊂ M be the set of in(f )’s where f varies over the
admissible weight vectors in I. One then proves the following two statements:
(1) in(I) is a poset ideal of M, that is, in(I) is closed under moves, and
(2) if I ⊂ J and in(I) = in(J) then I = J.
From this, weak noetherianity of A follows from noetherianity of M, which is an easy exercise.
A slight modification of this argument shows that A is noetherian.
5.3. Degree two tca’s. We now sketch our Gröbner approach to the noetherianity of A =
Sym(Sym2 (C∞ )). Let xi,j , with i ≤ j, be a basis for Sym2 (C∞ ), so that A = C[xi,j ].
Let M be the set of undirected matchings Γ on N. (Recall that a graph is a matching if
each vertex has valence 0 or 1.) Given Γ, Γ′ ∈ M, we define Γ → Γ′ if one of the following
two conditions hold:
• Γ′ is obtained from Γ by adding a single edge.
• There exists an edge (i, j) in Γ such that j + 1 is not in Γ, and Γ′ is obtained from
Γ by replacing (i, j) with (i, j + 1). (Here we allow i < j or j < i.)
NOETHERIANITY OF SOME DEGREE TWO TCA’S
19
We call Γ → Γ′ a “type I move”. We define Γ ≤ Γ′ if there is a sequence of type I moves
transforming Γ to Γ′ . This partially orders M.
We also define a total order on M as follows. First, suppose that i < j and k < ℓ are
elements of N. Define (i, j) (k, ℓ) if j < ℓ, or j = ℓ and i ≤ k. Now, let Γ and Γ′ be two
elements of M, and let e1 · · · en and e′1 · · · e′m be their edges, listed in increasing
order. We define Γ Γ′ if m > n, or if m = n and (e1 , . . . , en ) (e′1 , . . . , e′m ) under the
lexicographic order.
Q
Given Γ ∈ M, define mΓ = (i,j)∈Γ xi,j . Once again, every admissible weight vector is a
sum of mΓ ’s, and we define the initial term in(f ) of an admissible weight vector f to be the
largest Γ (under the order ) for which the coefficient of mΓ is non-zero in f .
Let I be an ideal of A. Define in(I) as before. Once again, in(I) is closed under type I
moves, and therefore forms a poset ideal of (M, ≤). The weak noetherianity of A would
follow from the noetherianity of the poset (M, ≤), but the latter property fails:
Example 5.1. For n ≥ 3, define Γn ∈ M to have edges (2i + 1, 2i + 4) for i = 0, 1, . . . , n − 2
and (2, 2n − 1). Then Γn is supported on {1, . . . , 2n}. It is easy to verify that the Γn are
incomparable, so (M, ≤) is not a noetherian poset.
The above observation is not the end of the road, however: the set in(I) is closed under
more than just type I moves. Suppose Γ ∈ in(I) and that e = (i, j) and e′ = (k, ℓ) are edges
appearing in Γ, with i < j and k < ℓ and j < ℓ. We then have the following observations:
• Suppose k < i < j < ℓ and that every number strictly between k and i that appears
in Γ is connected to a number larger than j. Let Γ′ be the graph obtained by replacing
e and e′ with (k, j) and (i, ℓ). Then Γ′ ∈ in(I).
• Suppose i < k < j < ℓ and that every number strictly between k and j that appears
in Γ is connected to a number larger than j. Let Γ′ be the graph obtained by replacing
e and e′ with (i, k) and (j, ℓ). Then Γ′ ∈ in(I).
Write Γ ⇒ Γ′ to indicate that Γ′ is related to Γ by one of the above two modifications. We
call this a “type II move.” Here is a pictorial representation of these moves (we use labels
a < b < c < d, and the dotted lines indicate that any element there is either not on an edge,
or is connected to a number larger than c):
a
b
c
d
⇒
a
b
c
⇒
d
a
b
c
d
′
We define a new partial order ⊑ on M as follows: Γ ⊑ Γ if there exists a sequence of moves
(of any type) taking Γ to Γ′ . The above observations show that in(I) is a poset ideal of
(M, ⊑). This leads to the important open question:
Question 5.2. Is the poset (M, ⊑) noetherian?
Remark 5.3. The sequence defined in Example 5.1 is comparable in (M, ⊑). Let σi be the
element (i, i + 1) · · · (3, 4)(2, 3) of the symmetric group S2n . For each 2 ≤ i ≤ 2n − 4, we
have type II moves σi Γn → σi+1 Γn , so Γn ⊑ σ2n−3 Γn . Finally, (2n − 1, 2n) is a valid type II
move for σ2n−3 Γn . It is now easy to check that ((2n − 1, 2n)σ2n−3 )Γn embeds into Γm (via
type I moves) for any m > n. This shows Γn ⊑ Γm for any m > n ≥ 3.
A positive answer to Question 5.2 would show that A is weakly noetherian. A slight
modification of this question would give noetherianity. Furthermore, this approach would
even give results in positive characteristic.
20
ROHIT NAGPAL, STEVEN V SAM, AND ANDREW SNOWDEN
References
Silvana Abeasis, The GL(V )-invariant ideals in S(S 2 V ), Rend. Mat. (6) 13 (1980), no. 2, 235–262.
S. Abeasis, A. Del Fra, Young diagrams and ideals of Pfaffians, Adv. in Math. 35 (1980), no. 2,
158–178.
[AH]
Matthias Aschenbrenner, Christopher J. Hillar, Finite generation of symmetric ideals, Trans. Amer.
Math. Soc. 359 (2007), 5171–5192, arXiv:math/0411514v3.
[BR]
A. Berele, A. Regev, Hook Young diagrams with applications to combinatorics and to representations of Lie superalgebras, Adv. in Math. 64 (1987), 118–175.
[CEF] Thomas Church, Jordan Ellenberg, Benson Farb, FI-modules and stability for representations of
symmetric groups, Duke Math. J. 164 (2015), no. 9, 1833–1910, arXiv:1204.4533v4.
[CEFN] Thomas Church, Jordan S. Ellenberg, Benson Farb, Rohit Nagpal, FI-modules over Noetherian
rings, Geom. Top. 18 (2014), 2951–2984, arXiv:1210.1854v2.
[Co]
D. E. Cohen, On the laws of a metabelian variety, J. Algebra 5 (1967), 267–273.
[CEP] C. de Concini, David Eisenbud, C. Procesi, Young diagrams and determinantal varieties, Invent.
Math. 56 (1980), no. 2, 129–165.
[Dr]
Jan Draisma, Noetherianity up to symmetry, Combinatorial algebraic geometry, Lecture Notes in
Math. 2108, Springer, 2014, arXiv:1310.1705v2.
[DE]
Jan Draisma, Rob H. Eggermont, Plücker varieties and higher secants of Sato’s Grassmannian, J.
Reine Angew. Math., to appear, arXiv:1402.1667v3.
[DK]
Jan Draisma, Jochen Kuttler, Bounded-rank tensors are defined in bounded degree, Duke Math. J.
163 (2014), no. 1, 35–63, arXiv:1103.5336v2.
[Eg]
Rob H. Eggermont, Finiteness properties of congruence classes of infinite-by-infinite matrices, Linear
Algebra Appl. 484 (2015), 290–303, arXiv:1411.0526v1.
[HS]
Christopher J. Hillar, Seth Sullivant, Finite Gröbner bases in infinite dimensional polynomial rings
and applications, Adv. Math. 221 (2012), 1–25, arXiv:0908.1777v2.
[L]
Alain Lascoux, Syzygies des variétés déterminantales, Adv. in Math. 30 (1978), no. 3, 202–237.
[M]
I. G. Macdonald, Symmetric Functions and Hall Polynomials, second edition, Oxford Mathematical
Monographs, Oxford, 1995.
[NSS] Rohit Nagpal, Steven V Sam, Andrew Snowden, Noetherianity of some degree two twisted skewcommutative algebras; in preparation.
[RW]
Claudiu Raicu, Jerzy Weyman, The syzygies of some thickenings of determinantal varieties,
arXiv:1411.0151v1.
[PS]
Andrew Putnam, Steven V Sam, Representation stability and finite linear groups,
arXiv:1408.3694v2.
[SS1]
Steven V Sam, Andrew Snowden, GL-equivariant modules over polynomial rings in infinitely many
variables, Trans. Amer. Math. Soc., to appear, arXiv:1206.2233v3.
[SS2]
Steven V Sam, Andrew Snowden, Introduction to twisted commutative algebras,
arXiv:1209.5122v1.
[SS3]
Steven V Sam, Andrew Snowden, Stability patterns in representation theory, Forum Math., Sigma
3 (2015), e11, 108 pp., arXiv:1302.5859v2.
[SS4]
Steven V Sam, Andrew Snowden, Gröbner methods for representations of combinatorial categories,
arXiv:1409.1670v2.
[Sn]
Andrew Snowden, Syzygies of Segre embeddings and ∆-modules, Duke Math. J. 162 (2013), no. 2,
225–277, arXiv:1006.5248v4.
[We]
Jerzy Weyman, Cohomology of Vector Bundles and Syzygies, Cambridge Tracts in Mathematics
149, Cambridge University Press, Cambridge, 2003.
[Ab]
[AdF]
NOETHERIANITY OF SOME DEGREE TWO TCA’S
Department of Mathematics, University of Wisconsin, Madison, WI
Current address: Department of Mathematics, The University of Chicago, Chicago, IL
E-mail address: [email protected]
URL: http://math.uchicago.edu/~nagpal/
Department of Mathematics, University of California, Berkeley, CA
Current address: Department of Mathematics, University of Wisconsin, Madison, WI
E-mail address: [email protected]
URL: http://math.wisc.edu/~svs/
Department of Mathematics, University of Michigan, Ann Arbor, MI
E-mail address: [email protected]
URL: http://www-personal.umich.edu/~asnowden/
21
| 0math.AC
|
EXPANSION FOR MOMENTS OF
REGRESSION QUANTILES WITH
APPLICATIONS TO NONPARAMETRIC
TESTING
arXiv:1306.6179v3 [math.ST] 14 Jul 2017
Enno Mammen§
Heidelberg University, Germany
Ingrid Van Keilegom ∗∗
KU Leuven, Belgium
Kyusang Yu ‡‡
Konkuk University, Seoul, Korea
July 17, 2017
Abstract
We discuss nonparametric tests for parametric specifications of regression quantiles. The test is based on the comparison of parametric and nonparametric fits of
these quantiles. The nonparametric fit is a Nadaraya-Watson quantile smoothing
estimator.
An asymptotic treatment of the test statistic requires the development of new
mathematical arguments. An approach that makes only use of plugging in a Bahadur expansion of the nonparametric estimator is not satisfactory. It requires too
strong conditions on the dimension and the choice of the bandwidth.
Our alternative mathematical approach requires the calculation of moments of
Nadaraya-Watson quantile regression estimators. This calculation is done by application of higher order Edgeworth expansions.
§
Institut für Angewandte Mathematik, Universität Heidelberg, Im Neuenheimer Feld 205, 69120 Heidelberg, Germany. E-mail address: [email protected].
∗∗
ORSTAT, KU Leuven, Naamsestraat 69, 3000 Leuven, Belgium.
E-mail address:
[email protected].
‡‡
Department of Applied Statistics, Konkuk University, Seoul 143-701, Korea, E-mail address:
[email protected] .
1
AMS 1991 subject classifications. primary 62G07, secondary 62G20
Journal of Economic Literature Classification: C14
Keywords and phrases. Nonparametric Regression; Quantiles; Bahadur Expansions; Kernel Smoothing; Nonparametric Testing; Goodness-of-fit tests.
1
Introduction
Consider a data set of n i.i.d. tuples (Xi , Yi ), where Yi is a one-dimensional response
variable and Xi is a d-dimensional covariate. For 0 < α < 1 we denote the conditional
α-quantile of Yi given Xi = x by mα (x). Thus we can write
Yi = mα (Xi ) + εi,α
(i = 1, . . . , n),
(1)
with error variables εi,α that fulfill qα (εi,α |Xi ) = 0. Here, qα (εi,α |Xi ) is the α-quantile of
the conditional distribution of εi,α given Xi . Consider the null hypothesis
H0 : For all α ∈ A there exists a θ(α) ∈ Θ, such that mα = mα,θ(α) ,
(2)
where {mα,θ : θ ∈ Θ} is a parametric class of regression quantiles, Θ is a compact subset
of IRk and A ⊂ (0, 1). The set A can be a singleton A = {α}, but can also be a closed
subset of (0, 1) if a set of quantile functions is checked.
In this paper we aim at studying a test statistic for H0 , and to study its asymptotic
properties under the null and the alternative. We will see that this problem is an example
of a quantile model where the asymptotics cannot be developed by standard tools of
quantile regression. In particular, a direct application of Bahadur expansions requires
assumptions that are too restrictive.
Our test statistic is based on kernel smoothing. Let K(u1 , . . . , ud ) =
Qd
j=1
k(uj ), where
k is a one-dimensional density function defined on [−1, 1], and let h = (h1 , . . . , hd ) be a
d-dimensional bandwidth parameter. We assume that all bandwidths h1 , . . . , hd are of the
same order. For simplicity of notation we further assume that they are identical and by
abuse of notation we write h = h1 = . . . = hd . For any 0 < α < 1 and any x in the support
2
RX of X, let Fεα |X (·|x) be the conditional distribution function of εα = Y − mα (X), given
X = x, and let rα,θ(α) (x) be the α-quantile of Y − mα,θ(α) (X) given that X = x. Define
n
X
x − Xi
τα (Yi − mα,θ(α)
rbα (x) = arg min
K
b (Xi ) − r),
r
h
i=1
b
where τα (u) = αu+ − (1 − α)u− , u+ = uI(u > 0) and u− = uI(u < 0) and where θ(α)
is
an estimator of θ(α).
Note that instead of estimating the conditional quantile rα,θ(α) (x) by the above estimator, we could have considered the alternative estimator
n
X
x − Xi
alt
rbα (x) = arg min
K
τα (Yi − m) − mα,θ(α)
b (x).
m
h
i=1
However, the latter estimator has the important drawback that the consideration of responses Yi in a neighborhood of x induces a smoothing bias, whereas rbα (x) has no smoothing related bias, since it is based on the errors Yi − mα,θ(α) (Xi ), whose conditional quantile
of order α is exactly zero under H0 for all Xi .
We suppose that A is a closed subinterval of (0, 1). We define the following test
statistic :
Z Z
TbA =
A
RX
rbα (x)2 w(x, α)dxdα,
(3)
for some weight function w(x, α). For the case that A contains only one value α we use
Z
rbα (x)2 w(x)dx
(4)
Tbα =
RX
for some weight function w(x). One could also generalize our results to the case that A
is a finite set. To keep notation simple we omit this case in our mathematical analysis.
Our test is an omnibus test that has power against all types of alternatives. It is based
on the comparison of a kernel quantile estimator with the parametric fit. We will show
that the test statistic is asymptotically equivalent to a weighted L2 -distance between the
nonparametric and the parametric estimator. Similar tests have been used in a series of
papers for mean regression. Early references are Härdle and Mammen (1993), GonzálezManteiga and Cao-Abad (1993), Hjellvik, Yao and Tjøstheim (1998), Zheng (1996) and
3
Fan, Zhang and Zhang (2001). Furthermore recent references are Dette and Sprekelsen
(2004), Kreiss, Neumann and Yao (2008), Haag (2008), Leucht (2012), Gao and Hong
(2008) and Ait-Sahalia, Fan and Peng (2009). Most of the more recent work concentrates
on time series data.
The classical way to carry over results from parametric and nonparametric mean regression to quantile regression is the use of Bahadur expansions. The main point is that
asymptotically quantile regression is equivalent to weighted mean regression. This approach has been used in Chaudhuri (1991), Truong (1989), He and Ng (1999), He, Ng
and Portnoy (1998) and more recently in Hoderlein and Mammen (2009), Hong (2003),
Kong, Linton and Xia (2010), Lee and Lee (2008), El Ghouch and Van Keilegom (2009),
Li and Racine (2008), and De Backer, El Ghouch and Van Keilegom (2017). A detailed
review of quantile regression can be found in the book by Koenker (2005). Testing procedures in quantile regression were considered in Zheng (1998), Koenker and Machado
(1999), Bierens and Ginther (2001), Horowitz and Spokoiny (2002), Koenker and Xiao
(2002), and He and Zhu (2003), among others. They all considered tests for the parametric form of the quantile function. More recently, Rothe and Wied (2013) proposed
a test statistic for the hypothesis that the conditional distribution belongs to a certain
parametric class. Tests based on quantiles of the errors have also been considered in Su
and White (2012) in the context of testing conditional independence. Other recent papers are the ones by Volgushev et al. (2013) and Conde-Amboage, Sánchez-Sellero and
González-Manteiga (2015), who considered significance tests in quantile regression and
developed a test statistic based on marked empirical processes.
In this paper we will discuss how results from mean regression carry over to our
case. Whereas elsewhere a first attempt could be based on the application of a Bahadur
expansion, we will see that in our setting the accuracy of a direct application of Bahadur
expansions is too poor. We will shortly explain this here for the testing problem where A
contains only one value α. Suppose for simplicity at this stage that the parametric model
b
contains only one value θ0 = θ0 (α) and that θb = θ(α)
= θ0 . The Bahadur expansion of
4
rbα (x) is given by
Pn
reα (x) = −
x−Xi
h
{I(εi,α ≤ 0) − α}
,
x−Xi
K
f
(0|X
)
i
εα |X
i=1
h
i=1 K
Pn
(5)
where fεα |X is the conditional density of εα given X. This gives the following approximation for Tbα :
Z
Teα =
RX
reα (x)2 w(x)dx.
One can show that up to a logarithmic factor supx |b
rα (x) − reα (x)| and supx |b
rα (x)| are of
order (nhd )−3/4 and (nhd )−1/2 , respectively. This implies that up to a logarithmic factor,
the difference Tbα − Teα is of order (nhd )−5/4 . On the other hand as it is also the case in
mean regression Teα is equal to the sum of a deterministic term and a random term of
order n−1 h−d/2 . Thus the above approximation only helps if (nhd )−5/4 << n−1 h−d/2 or
equivalently if nh3d → ∞ for sample size n going to ∞. E.g. if one applies a bandwidth
h ∼ n−1/(4+d) that leads to rate optimal estimation of twice differentiable functions this
assumption would allow only a one-dimensional setting d = 1. Also in the case of minimax
optimal testing with twice differentiable functions under the alternative (see Ingster (1993)
and Guerre and Lavergne (2002)), the optimal bandwidth h ∼ n−2/(8+d) is only allowed
for dimension d = 1. In this paper we develop an asymptotic theory for L2 -type quantile
tests that works under the assumption that nh3d/2 → ∞. In the above examples this
allows dimensions d ≤ 7 and d ≤ 3. Furthermore, for our asymptotic discussion of
the distribution of the test statistic on the hypothesis we only need the assumption that
nhd → ∞. Thus on the hypothesis, our basic assumptions coincide with conditions needed
for the asymptotics of mean regression. We conjecture that also for the alternative the
assumption nh3d/2 → ∞ could be weakened but that then the asymptotic mean of the
test statistic changes. We will comment on this after the statement of Theorem 2.
In our approach we will make use of the fact that Bahadur expansions of kernel quantile
estimators calculated at two different points are asymptotically independent if they are
calculated at points that are such that the supports of the kernels do not overlap. Thus
the variance of an integral over a Bahadur expansion should be of smaller order than the
5
variance of the Bahadur expansion at a fixed point. The main technical difficulty that will
come up when applying this idea is the need to calculate moments of the kernel regression
quantiles. We will introduce a method for the expansion of such moments that is based on
Edgeworth expansions in a related problem. Our main result gives a bound between the
moments of kernel regression quantiles and the moments of its Bahadur approximation.
The paper is organized as follows. In the next section we will state our result on
moments of kernel regression quantiles. Our main result on the asymptotics of L2 -type
quantile tests is given in Section 3. We will also introduce some kind of wild bootstrap
procedure adapted to quantile regression and give a theoretical result on its consistency.
In Section 4 we present the results of a simulation study, and we analyze data on Engel
curves. The proofs are postponed to the last three sections.
2
Asymptotic moments
In this section we will present an asymptotic result on higher order moments of kernel
regression quantiles. This result will be our most important ingredient for getting our
result on the asymptotic distribution of our test statistic. In our result the moments of
kernel regression quantiles are compared with the moments of their Bahadur approximations. Recall that we are interested in the null hypothesis H0 defined in (2). We suppose
that for all α ∈ A,
mα (·) = mα,θ0 (α) (·) + n−1/2 h−d/4 ∆α (·).
(6)
For the case ∆α ≡ 0 the function mα lies on the hypothesis. In order to develop our
asymptotic theory, we need to work under the following assumptions. In the formulation
of the assumptions and in the proofs we use the convention that C, C1 , C2 , ... are generic
strictly positive constants that are chosen large enough, that c, c1 , c2 , ... are generic strictly
positive constants that are chosen small enough, and that C ∗ , C1∗ , C2∗ , ... are generic strictly
positive constants that are arbitrarily chosen. Using this convention we write Ln =
∗
(log n)C for a sequence with C > 0 large enough and L∗n = (log n)C for a sequence with
6
an arbitrarily chosen constant C ∗ > 0. All these variable names are used for different
constants and sequences, even in the same equation.
We will make use of the following assumptions.
(B1) The support RX of X is a compact convex subset of IRd . The density fX of X
is bounded and bounded away from zero on RX . The function ∆α is uniformly
absolutely bounded for α ∈ A.
(B2) The conditional distribution of εα given X = x allows a density fεα |X (e|x) that is
twice differentiable with respect to e. For this derivative it holds that |fε00α |X (e|x)| ≤
C for |e| ≤ c, x ∈ RX , and α ∈ A. The density fεα |X (e|x) also satisfies fεα |X (e|x) > 0
and |fεα |X (e0 |x0 ) − fεα |X (e|x)| ≤ C(kx0 − xk + |e0 − e|) for x, x0 ∈ RX and e, e0 ∈ R,
where k · k is the Euclidean norm. Moreover, the functions fX (x), mα (x) and ∆α (x)
are continuously differentiable with respect to x.
(B3) The bandwidth h satisfies h = o(1) and nhd /L∗n → ∞. The kernel k is a symmetric, continuously differentiable probability density function with compact support,
[−1, 1], say. It fulfills a Lipschitz condition and it is monotone strictly increasing on
[−1, 0]. It holds that k 0 (k −1 (u)) ≥ min c{uκ , (k(0) − u)κ } for some 0 ≤ κ < 1 where
k −1 : [0, k(0)] → [−1, 0] denotes the inverse of k : [−1, 0] → [0, k(0)].
In our asymptotics, the density fX and the functions ∆α are fixed and do not depend
on n. The cumulative distribution function F (·|x) of Y given X = x may depend on n.
We do not indicate this in our notation.
Assumptions (B1)–(B3) are standard assumptions for the study of smoothing estimators, with the exception of the last assumption in (B3). We now shortly explain why
this assumption is needed here. For fixed u and x = (x1 , . . . , xd )| , define the random
| n
o
Pn x1 −X1,j
xd −Xd,j
∆
h
d −1/2
I(εj,α ≤ ∆α (x) + u(nh )
) − α with
vector Vn = j=1 k( h ), ..., k( h )
−1/2 −d/4
ε∆
h
∆α (Xj ), and where ∆hα (x) is defined in (10) below. In the proof of
j,α = εj,α + n
the following Theorem 1 we will develop Edgeworth expansions for the distribution of Vn .
7
Typically, the summands of Vn do not fullfil non-lattice type assumptions that are needed
for the verification of Edgeworth expansions. But under (B3) a non-lattice assumption
can be verified for the conditional distribution of a finite sum of summands of Vn . For
more details we refer to the proof of Theorem 1. The last assumption in (B3) can be
easily verified. It just puts a simple bound on the derivative of k −1 . E.g., it can be easily
checked for the triangle kernel and for all kernels of the form k (z) = 1 (|z| ≤ 1) cr (1 − z 2 )
r
with r ≥ 1. In case that k 0 is bounded away from zero on bounded intervals of (−1, 0)
the assumption follows if for some l, l∗ ∈ N, it holds that k 0 (x) = (x + 1)l + o((x + 1)l ) for
x ≥ −1 and x + 1 small enough and that k 0 (x) = −x2l
∗ +1
∗
+ o(x2l ) for x in a neighborhood
of 0.
We put
rbα∆ (x)
= arg min
r
n
X
K
i=1
rb∆ (x)
α
r∆
(x)
=
α
0
x − Xi
h
τα (ε∆
i.α − r),
if |b
rα∆ (x)| ≤ Ln (nhd )−1/2
(7)
(8)
otherwise.
In the main result of this section we will consider conditional moments of the truncated
kernel smoothing quantiles r∆
α , conditioned on the number of covariables falling into local
neighborhoods. Note that, with positive probability, kernel smoothing quantiles are not
defined because there is no covariable in the support of the kernel, with positive probability. Thus unconditional moments are not defined. In the following theorem we will
condition on local neighborhoods N − (x) = {u : xj − h ≤ uj ≤ xj + h for all j = 1, . . . , d}
that are designed such that the result can be easily used for the asymptotic analysis
of our test statistic in the next section. Note that N − (x) is the support of the kernel
h−d K(h−1 [x − ·]). The theorem could also easily be stated with other local neighborhoods. The conditional moments of the truncated kernel smoothing quantiles r∆
α will be
compared with the conditional moments of the following modified Bahadur expansion,
denoted by reα∆ (x) :
reα∆ (x) = reα∆,− (x) + ∆hα (x),
8
(9)
where ∆hα (x) is defined such that
h x − X n
oi
j
h
Exj K
I(ε∆
≤
∆
(x))
−
α
= 0.
j,α
α
h
(10)
Here Exj denotes the conditional expectation, given that j ∈ N − (x). Furthermore reα∆,− (x)
is defined as
Pn
reα∆,− (x)
x−Xi
h
h
{I(ε∆
i,α ≤ ∆α (x)) − α}
= − P
n
x−Xi
fεα |X (∆hα (x, Xi )|Xi )
K
i=1
h
Pn
x−Xi
K
{I(εi,α ≤ ∆hα (x, Xi )) − α}
i=1
h
= − P
,
n
x−Xi
h (x, X )|X )
K
f
(∆
i
i
εα |X
α
i=1
h
i=1
K
where
∆hα (x, Xj ) = ∆hα (x) − n−1/2 h−d/4 ∆α (Xj ).
We have the following asymptotic result for the moments of kernel quantile estimators
and their Bahadur approximations.
Theorem 1. Assume (B1)–(B3). Then, for natural numbers l ≥ 1,
o
n
2l
∆,−
2l
−
(x)
−
r
e
(x)
N
(x)
=
m
= O(Ln (nhd )−l−1 ),
E r∆,−
α
α
n
o
2l−1
∆,−
2l−1
−
E r∆,−
(x)
−
r
e
(x)
N
(x)
=
m
= O(Ln (nhd )−l ),
α
α
(11)
(12)
uniformly in x ∈ RX , α ∈ A and C1∗ nhd ≤ m ≤ C2∗ nhd where N − (x) is the random
∆
h
number of Xi ’s that lie in N − (x), and where r∆,−
α (x) = r α (x) − ∆α (x). For the second
moments of the uncentered estimators r∆
eα∆ we have that
α and r
n
o
2
∆
2
−
E r∆
(x)
−
r
e
(x)
N
(x)
=
m
= O(Ln n−3/2 h−5d/4 ).
α
α
(13)
Under the additional assumption that ∆α ≡ 0 we get that
n
o
2
∆
2
−
E r∆
(x)
−
r
e
(x)
N
(x)
=
m
= O(Ln (nhd )−2 ).
α
α
(14)
We can apply the theorem when ∆α ≡ 0, in which case ∆hα ≡ 0 and reα∆ (x) = reα∆,− (x)
∆,−
∆,−
and r∆
eα∆,− (x) replaced by
α (x) = r α (x). Hence, (11) and (12) hold with r α (x) and r
r∆
eα∆ (x). In particular, for l = 1 (14) follows directly from (11).
α (x) and r
9
3
Asymptotic theory
b
We suppose that there exists an estimator θ(α)
that converges to θ0 (α). Hence, on the
hypothesis the true value of θ(α) is equal to θ0 (α). On the alternative, θ0 (α) may depend
b
on the chosen estimator θ(α).
In order to develop the asymptotic distribution of TbA and Tbα , we need the following
additional assumptions.
(B4) We assume that
sup
x∈RX ,α∈A
>
− 1 −c
b
|mα,θ(α)
b (x) − mα,θ0 (α) (x) − (θ(α) − θ0 (α)) γα (x)| = OP (n 2 )
for some function γα (x). The function w(x) is continuous, and the functions w(x, α),
γα (x) and ∆α (x) are continuous with respect to (α, x). For g(x) = w(x, α) and
g(x) = w(x) it holds that |g(x0 )−g(x)| ≤ Ckx0 −xk, and |γα (x0 )−γα (x)| ≤ Ckx0 −xkδ
for some 0 < δ < 1 and for all x, x0 ∈ RX and all α ∈ A.
(B5) For some ρ > 0 it holds that
−1/2 −d/4
∗
−δ − 21 −ρ
∗
− 14 d4
b
sup kθ(α) − θ0 (α)k = OP (n
h
)/Ln ∧ (h n
) ∧ (n h /Ln ) .
α∈A
The first assumption in (B4) can be shown under smoothness conditions on the relation
θ → mα,θ (x). For the case that A contains only one single element, this assumption in (B4)
would directly follow from (B5) and the assumption that θ → mα,θ (x) has a derivative that
b
is continuous in x. Assumption (B5) states that θ(α)
achieves at least a nearly parametric
rate. In the case of linear quantile regression (i.e. mα (X) = θ(α)> X), such an assumption
b
has been shown in Angrist et al (2006). Note that supα∈A kθ(α)
− θ0 (α)k = OP n−1/2
1
1
d
implies (B5) if ρ is chosen such that hδ nρ → 0. Note that n− 2 = o(n− 4 h 4 /L∗n ) because
of nhd /L∗n → ∞.
We now state our main result on the asymptotic distribution of our test statistics.
10
Theorem 2. Assume (B1)-(B5). For the case that ∆α 6≡ 0 make the additional assumption that nh3d/2 /L∗n → ∞. Then,
d
nhd/2 TbA − bh,A → N (DA , VA ),
d
nhd/2 Tbα − bh,α → N (Dα , Vα ),
where
Z Z
∆α (x)2 w(x, α) dx dα,
DA =
A
RX
bh,A = h
VA
Z
Z
w(x, α)
dx dα,
2
A
RX fX (x)fεα |X (0|x)
Z
Z
w(x, α)w(x, β)
2
2
(4)
α (1 − β)
= 4K (0)
dx dα dβ,
2
4
α,β∈A,α<β
RX fX (x)fεα |X (0|x)
−d/2
K
(2)
α(1 − α)
(0)
Z
∆α (x)2 w(x) dx,
Dα =
RX
−d/2
bh,α = h
K
(2)
Z
(0)α(1 − α)
RX
Vα = 4K (4) (0)α2 (1 − α)2
Z
RX
w(x)
dx,
fX (x)fε2α |X (0|x)
w2 (x)
dx,
fX2 (x)fε4α |X (0|x)
and where for any j, K (j) (0) denotes the j-times convolution product of K at 0.
In our theorem for the alternative we make the additional assumption that nh3d/2 /L∗n
converges to ∞. This assumption is used in the proof for the treatment of the deterministic
term Tn,2 , see Lemma 5. The assumption nh3d/2 /L∗n → ∞ can be weakened but with
another limit for Tn,2 . This would result in a limit theorem for the test statistic with
a mean that differs from bh,α . We have added a short discussion of this point after the
statement of Lemma 5.
We expect that Theorem 2 cannot be used for an accurate calculation of critical values.
The asymptotic normality result of Theorem 2 is based on the fact that kernel smoothers
are asymptotically independent if they are calculated at points that differ more than 2h.
Thus the convergence is comparable to the convergence of the sum of h−d independent
summands. This would motivate a rate of convergence of order h−d/2 . As has been
11
suggested for other goodness-of-fit tests in the literature, also here a way out is to use
a bootstrap procedure. We will introduce some kind of wild bootstrap for quantiles in
which the Bahadur expansion reα of rbα is resampled. For the definition of reα see (5) in
Section 2. For the bootstrap, we define
Pn
reα∗ (x)
=−
x−Xi
h
{I(Ui ≤ α) − α}
,
x−Xi b
K
f
(0|X
)
i
ε
|X
α
i=1
h
i=1 K
Pn
where fbεα |X is an estimator of fεα |X and Ui are independent random variables with uniform
distribution on [0, 1] that are independent of the sample. The bootstrap test statistics are
defined as:
TbA∗
Z Z
=
A
RX
reα∗ (x)2 w(x, α)dx dα
and
Tbα∗ =
Z
RX
reα∗ (x)2 w(x)dx.
For proving the consistency of this bootstrap procedure, we do not specify the choice of
the estimator fbεα |X that is used in the construction of the bootstrap procedure. We only
assume that the estimator is consistent:
(B6) It holds that
sup
fbεα |X (0|x) − fεα |X (0|x) → 0,
α∈A, x∈RX
in probability.
The next theorem shows the consistency of the above bootstrap approach.
Theorem 3. Assume (B1)-(B6). Then,
p
dK (L∗ (nhd/2 TbA∗ − bh,A ), N (DA , VA )) → 0,
p
dK (L∗ (nhd/2 Tbα∗ − bh,α ), N (Dα , Vα )) → 0,
where L∗ (...) denotes the conditional distribution, given the sample. Furthermore, dK is
the Kolmogorov distance, i.e. the sup norm of the difference between the corresponding
distribution functions.
12
Theorem 3 remains to hold if we replace (B1)–(B5) by weaker conditions. We do
not pursuit this because we need for consistency of bootstrap that both, Theorem 2 and
Theorem 3, hold.
4
Numerical study
In this section, we present the results of our numerical studies. In our first simulation
we show that a direct application of the Bahadur representation is not accurate enough
for studying the approximation of the distribution of our test statistics Tbα and TbA . For
R
this purpose, we compare the differences D1 = |b
rα (x)2 − reα (x)2 |w(x)dx and D2 =
R
R
| rbα (x)2 w(x)dx − reα (x)2 w(x)dx|. Here D1 is the integrated difference between the
quantile regression and its Bahadur representation and D2 is the difference between the
test statistic and its approximation based on Bahadur representation. It is clear that
D2 ≤ D1 . Our point is not that D2 is smaller than D1 but that the ratio D1 /D2 is large
and that it is decreasing for an increasing bandwidth. This result supports our theory
that a direct use of Bahadur expansions only works under very restrictive assumptions
on the bandwidth. Table 1 shows the results of D1 and D2 for the one dimensional case.
We also simulated a two dimensional model, whose results are shown in Table 2. In
the one dimensional model, we set Yi = Xi + (0.5Xi + 0.5)i , where i has a standard
normal distribution. This results in the αth quantile function mα (x) = x + 0.5zα (x + 1),
where zα stands for the αth quantile of the standard normal distribution. For the two
dimensional model, we set Yi = X1i + X2i + (0.5X1i − 0.5X2i + 1)i , where i has a
standard normal distribution and we get the αth quantile function mα (x1 , x2 ) = x1 +2x2 +
0.5zα (x1 − x2 + 2). For the one dimensional model, we generated Xi from the uniform
distribution supported on the unit interval (0, 1). For the two dimensional model we
generated (X1i , X2i ) from a distribution on the unit square (0, 1)×(0, 1) which has uniform
marginals but where the joint distribution differs from a uniform distribution. This is done
to allow for a dependence between the two regressors. We generated random vectors from
13
a bivariate normal distribution with correlations ρ = 0.2 and 0.8 and then transformed
them with their marginal distribution functions. We generated 400 data sets of size 200
and 400 for each model. For the one dimensional model, we used the bandwidths h =
0.05, 0.08, 0.1, 0.12 and 0.15 and we used the bandwidths h = 0.125, 0.150, 0.175 and 0.200
for the two dimensional model. We used the R package quantreg for fitting quantile
functions. From Table 1 and Table 2, one can see that the ratio of D1 over D2 is large
for small bandwidths and decreases as the bandwidth grows. This observation supports
our approach for the asymptotic theory. This implies that when we approximate the
test statistic it requires less strict assumptions on the bandwidth if we approximate the
integrated function rather than when we approximate the quantile function itself.
The second simulation study is conducted to show the validity of our bootstrap procedure. We considered four scenarios:
I. All quantiles are linear:
Yi = m0 (Xi ) + σ0 (Xi )i .
II. The median is linear and other quantiles are not linear:
Yi = m0 (Xi ) + σ1 (Xi )i .
III. All quantiles are non-linear:
(a)
Yi = m1 (Xi ) + σ0 (Xi )i ;
(b)
Yi = m1 (Xi ) + σ1 (Xi )i .
Here m0 (x) = x, m1 (x) = sin(2π(x − 0.5)), σ0 (x) = 21 (1 + x), and σ1 (x) = 2(1.1 +
sin(2π(x−0.5))). The covariates Xi are generated from a uniform distribution on the unit
interval (0, 1). We generated 200 samples of size 400. We generated 201 bootstrap samples
for each data set. The three scenarios are shown in Figure 1. In the bootstrap procedure,
we used a kernel density estimator for estimating the conditional density fεα |X (0|x).
14
Bandwidth
n = 200 α = 0.25
0.5
0.75
n = 400 α = 0.25
0.5
0.75
0.05
0.08
0.1
0.12
0.15
D1
0.195
0.116
0.091
0.077
0.059
D2
0.067
0.044
0.037
0.034
0.028
Ratio
2.922
2.653
2.473
2.284
2.073
D1
0.231
0.139
0.110
0.091
0.071
D2
0.124
0.078
0.065
0.056
0.046
Ratio
1.865
1.779
1.687
1.635
1.547
D1
0.196
0.117
0.092
0.077
0.059
D2
0.065
0.044
0.037
0.033
0.029
Ratio
3.028
2.696
2.481
2.305
2.070
D1
0.094
0.057
0.045
0.037
0.029
D2
0.033
0.022
0.019
0.017
0.014
Ratio
2.899
2.536
2.338
2.170
2.027
D1
0.109
0.068
0.054
0.045
0.036
D2
0.058
0.039
0.032
0.028
0.023
Ratio
1.867
1.755
1.684
1.614
1.552
D1
0.094
0.056
0.045
0.037
0.029
D2
0.032
0.022
0.019
0.017
0.015
Ratio
2.959
2.604
2.378
2.192
1.982
Table 1: Difference between two approximations: D1 is the integrated squared approximation error of a quantile estimator by its Bahadur representation and D2 is the approximation error of the test statistic Tbα by Teα .
We tried three bandwidths 0.075, 0.100, and 0.125 for the test statistic, and fifteen
choices of bandwidths (0.1, 0.2, 0.3) × (0.050, 0.075, 0.100, 0.125, 0.150) for estimating the
conditional density of the error used in the bootstrap procedure. We applied the proposed bootstrap test for testing the linearity of the lower quartile, the median, and the
upper quartile functions. We also tested the linearity hypothesis over these three different
quantile levels. In our scenarios there are four models under the null hypothesis: all three
quantiles in scenario I and the median in scenario II. In Table 3, we report the summary
statistics of rejection ratios of 45 different choices of bandwidths. Among 45 different
15
16
0.077
3.221
D2
Ratio
2.093
Ratio
0.247
0.142
D2
D1
0.296
3.066
Ratio
D1
0.081
D2
3.221
Ratio
0.249
0.077
D2
D1
0.247
2.093
Ratio
D1
0.142
D2
3.065
Ratio
0.296
0.081
D2
D1
0.249
D1
2.929
0.047
0.138
1.884
0.087
0.166
2.716
0.051
0.139
2.929
0.047
0.138
1.884
0.087
0.164
2.716
0.051
0.139
0.150
2.446
0.035
0.085
1.667
0.061
0.102
2.369
0.036
0.086
2.446
0.035
0.085
1.667
0.061
0.102
2.369
0.036
0.086
0.175
1.990
0.029
0.058
1.500
0.048
0.072
1.983
0.029
0.058
1.990
0.029
0.058
1.500
0.048
0.072
1.983
0.029
0.058
0.200
3.274
0.022
0.073
1.991
0.044
0.087
3.273
0.023
0.074
3.355
0.045
0.153
2.021
0.089
0.180
3.445
0.044
0.153
0.125
Bandwidths
2.666
0.019
0.051
1.785
0.034
0.061
2.716
0.019
0.051
2.831
0.037
0.106
1.832
0.069
0.126
2.828
0.037
0.105
0.150
2.230
0.017
0.037
1.610
0.028
0.046
2.278
0.017
0.038
2.378
0.032
0.077
1.659
0.056
0.094
2.371
0.033
0.077
0.175
1.899
0.015
0.028
1.467
0.024
0.035
1.958
0.015
0.029
2.022
0.029
0.059
1.504
0.048
0.072
2.024
0.029
0.059
0.200
Strong dependence
left panel in the table is the result for ρ = 0.2 and the right panel shows the result for ρ = 0.8.
Table 2: Difference between two approximations under a two dimensional model: D1 is the integrated squared approximation
error of a quantile estimator by its Bahadur representation and D2 is the approximation error of the test statistic Tbα by Teα . The
0.75
0.5
n = 400 α = 0.25
0.75
0.5
n = 200 α = 0.25
0.125
Weak dependence
choices of bandwidths, there was no case where the bootstrap test did not keep the significance level of 5% under scenario I. In slightly more than half of the cases the bootstrap
test did not keep the significance level in testing the linearity of the median under scenario II. These cases appeared when we used large bandwidths. Concerning the power of
the bootstrap test, we observed that almost all choices of the bandwidth showed a power
near one under scenario III-(a). One exception is the case with the smallest bandwidths
where we observe an empirical power around 0.8. One interesting observation is that the
bootstrap test shows a poor power for the lower quartile in scenario III-(b) where the
empirical power ranges from 0.045 to 0.27. This is however natural since the function
is not so far from a linear function as one can see in Figure 1. We also observed that
the median and the upper quartile in scenario III-(b) showed much stronger power. The
result of the test based on the test statistic integrated over levels shows a similar result.
In this case, only scenario I is in the null hypothesis and there was no case where the
empirical size of the bootstrap test is bigger than 5%. The power behavior is also similar.
The test showed the strongest power with the bigger bandwidths.
Figure 2 shows the distributions of estimated p-values by using the proposed bootstrap.
The plots are based on 200 simulated data sets for scenario II. The left panel shows the
distribution of estimated p-values for testing the linearity of the median, which lies in
the null and the right panel shows the distribution of estimated p-values for testing the
linearity of the upper quartile, which lies in the alternative. The distribution in the left
panel is close to the uniform distribution which we expect for the null hypothesis and the
right panel shows that the bootstrap p-values are close to zero, which we also expect.
To summarize our observations from this simulation study, in our setting the bootstrap
test keeps the level well except for cases where we use too large bandwidths. On the other
hand, too small bandwidths lead to relatively poor power. Interesting cases are scenario
II and scenario III-(b). Under scenario II, the median is linear but both quartiles are
not. The simulation result shows that the bootstrap test keeps the level for the median
and has some power for the other quantiles. Under scenario III-(b), the lower quartile
17
Scenario II
0
y
0.5
−2
−0.5
y
2
1.5
Scenario I
0.4
0.8
0.0
0.4
0.8
x
x
Scenario III−(a)
Scenario III−(b)
0
y
0.0
−2
−1.5
y
2
1.5
4
0.0
0.0
0.4
0.8
0.0
x
0.4
0.8
x
Figure 1: Shape of quantile curves in each scenario. The three curves in each panel
represent the 0.25, 0.5, and 0.75−quantile curves in each scenario.
18
Quartile functions
Scenario I
Scenario II
Scenario III (a)
Scenario III (b)
1st Quartile
Median
3rd Quartile
Sum quartiles
Q1
0.005
0.000
0.005
0.000
Med
0.010
0.005
0.010
0.005
Q3
0.010
0.010
0.015
0.010
Q1
0.470
0.030
0.450
0.380
Med
0.575
0.055
0.545
0.550
Q3
0.630
0.105
0.610
0.695
Q1
0.985
1.000
0.995
1.000
Med
1.000
1.000
1.000
1.000
Q3
1.000
1.000
1.000
1.000
Q1
0.065
0.300
0.735
0.545
Med
0.135
0.385
0.865
0.770
Q3
0.155
0.440
0.935
0.895
Table 3: First quartile, median and third quartile (obtained from 45 choices of the bandwidth) of the rejection proportions based on 200 generated samples.
is non-linear but close to the null. We observe that here the bootstrap test has stronger
power for the median and the upper quartile than for the lower quartile.
In the last simulation study, we compared our test with the test proposed by Zheng
(1998). We considered the same four scenarios as in the previous simulation study. In
this simulation, we generated 500 data sets of 400 observations. For the bootstrap we
generated 501 bootstrap samples. The other simulation settings are the same as in the
previous simulation study. To choose the bandwidth for Zheng’s test, we applied the
function npregbw in the R-package np, which is based on cross-validation with AIC. For
the nonparametric quantile estimator in our procedure, we used the bandwidth proposed
in Yu and Jones (1998). The bandwidths for the kernel estimator for the conditional
density in the bootstrap procedure were chosen by a rule of thumb using the function
bw.nrd in R. The level of the tests was set to 0.05. We observe in Table 4 that the level of
our test is close to the nominal level. None of the two tests is always more powerful than
19
0
0
20 40 60 80
Frequency
120
10 15 20 25 30
p−value under H1
5
Frequency
p−value under H0
0.0
0.2
0.4
0.6
0.8
1.0
0.0
0.2
0.4
p
0.6
0.8
1.0
p
Figure 2: The left panel shows the distribution of estimated p-values under the null and
the right panel shows the distribution of estimated p-values under the alternative.
the other. In the null model both tests keep the level well. In Scenario II, Zheng’s test
shows stronger power than the proposed test, whereas in Scenario III(b), the proposed
test has higher power.
Quartile functions
Scenario I
Scenario II
Scenario III (a)
Scenario III (b)
1st Quartile
Median
3rd Quartile
Sum quartiles
Zheng
0.006
0.000
0.000
·
MVY
0.024
0.052
0.048
0.028
Zheng
0.954
0.008
0.950
·
MVY
0.696
0.002
0.650
0.884
Zheng
0.974
0.994
0.984
·
MVY
0.994
0.992
0.990
1.000
Zheng
0.034
0.334
0.460
·
MVY
0.048
0.404
0.992
0.954
Table 4: Rejection proportions based on 500 generated samples.
Finally, as an illustrating example, we applied the proposed test to a historic data set
20
of Ernst Engel. The data set was used in Koenker (2005), among many other publications.
The data set was first presented by Engel (1857) to support his famous Engel’s law. The
data set has two variables, household income and food expenditure and it contains 235
observations. Figure 3 shows the scatter plot of this dataset and the scatter plot of the
data after a log transform with base 10. As one can see in Figure 3, there is one outlier. We
removed this point from the data. Hence the analysis below is based on 234 observations.
We first analyzed the log transformed income versus the log transformed food expenditure.
We used five different bandwidths for calculating the test statistic. The bandwidth for
the conditional density estimator used in the bootstrap resampling was chosen by a rule
of thumb. To obtain the bootstrap distribution, we resampled the data set 1,001 times.
We test the linearity of quantiles for α = 0.1, 0.2, 0.3, 0.4, 0.5, 0.6, 0.7, 0.8, and 0.9. As
can be seen from Table 5, the test did not reject linearity of quantiles for any of these
values at the significance level 5%. This was the case for all five bandwidth choices. We
also used the log transformed income with the original untransformed food expenditure
as a further example. Figure 4 shows the scatter plot of this dataset together with 0.1,
0.3, 0.5, 0.7, 0.9 linear quantile fits. The figure shows that high level quantiles deviate
from their linear fits. This is also seen by our test, since it rejects the linearity for high
level quantiles. The estimated p-values for the conditional quantiles of level 0.5 or higher
are smaller than 0.05 for every bandwidth we used.
5
Proof of Theorem 1
We need to show equations (11)–(13). Claim (13) follows from (11)–(12) because of
∆hα (x) = O(n−1/2 h−d/4 ). Furthermore, (14) is a direct consequence of (11), see the remark
after the statement of the theorem. It remains to show (11)–(12).
It holds that P (cm0 ≤ N − (x) ≤ Cm0 ) → 1, where we use the shorthand notation
m0 = nhd . At this point and in the following proofs we will make use of our convention
of using the symbols, c, C, ....
21
log10 (income) vs log10 (food expenditure)
Quantile level
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
0.050
0.289
0.246
0.629
0.999
0.996
1.000
0.999
1.000
1.000
0.075
0.152
0.383
0.997
0.992
0.993
0.979
1.000
1.000
1.000
0.100
0.105
0.745
0.997
0.964
0.971
0.970
0.999
1.000
0.993
0.125
0.100
0.986
0.988
0.908
0.895
0.992
1.000
1.000
0.963
0.150
0.149
0.996
0.976
0.894
0.843
0.997
0.999
1.000
0.935
Bandwidth
log10 (income) vs food expenditure
Quantile level
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
0.050
0.305
0.675
0.413
0.135
0.031
0.008
0.012
0.004
0.000
0.075
0.569
0.498
0.268
0.140
0.046
0.027
0.003
0.002
0.000
0.100
0.640
0.324
0.181
0.047
0.015
0.004
0.003
0.001
0.000
0.125
0.531
0.235
0.150
0.034
0.009
0.001
0.002
0.001
0.000
0.150
0.664
0.197
0.088
0.012
0.003
0.002
0.002
0.003
0.000
Bandwidth
Table 5: Estimated p-values for testing the linearity of conditional quantiles of Engel’s
data. The upper table shows the estimated p-values for testing the linearity of conditional quantiles of log10 (food expenditure) as a function of log10 (income) and the lower
table shows the estimated p-values for testing the linearity of conditional quantiles of
food expenditure as a function of log10 (income).
22
2000
●
3.2
●
1500
3.0
●
●●
●
1000
2.8
2.6
Y
●
●●
● ●
●
●
● ●
●● ●
●
● ●
●
●
●●
●
●
●
●●
●
●● ●
●●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●●
●
●
●
●
●
●
●
●●
●●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
2.4
1000
●●●
●
500
engel$foodexp
●
3000
5000
●
●●
●
●●●
●
●●●
● ●
●● ●●
● ●
●
●● ●
●
●
●
●
●
●
● ●●
●● ●
●●
●
●
●●
●
●●
●
●
●
●
●●
● ●● ●
●●● ●
●
●
●
●●
●●
●
●●
●
●●
●
●
●
●
●
●
●●
●
●
●
●
●
●●●●●●
● ●
●
●●
●●
●
●
●●
●●●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●●
●
●
●●
●●
●●
●
●
●
●
●
●
●
●
●
●
●
●●
●●
●
●●●
●●
●●●
●
●●
●●
●●
●●
●●●
●
●
●
●
●●
●
●●
● ●
●
●●
●●
●●●
●●
●
●●
●●
●
●●
2.6
engel$income
3.0
3.4
X
Figure 3: The left panel shows the scatter plot of the original Engel data. The right panel
shows the scatter plot of log transformed data after removing one influential point. The
lines in the right panel represent linear quantile fits of levels 0.1, 0.3, 0.5, 0.7, and 0.9.
First note that
−1/2
rbα∆,− (x) ≤ um0
if and only if
x − X n
o
X
j
−1/2
∆
h
K
I(εj,α ≤ ∆α (x) + um0 ) − α ≥ 0.
h
−
j∈N (x)
Let
oi
h x − X n
j
−1/2
∆
h
I(εj,α ≤ ∆α (x) + um0 ) − α
gx,α (u) =
K
h
h x − X n
oi
j
−1/2
j
h
= Ex K
I(εj,α ≤ ∆α (x, Xj ) + um0 ) − α
h
h x − X
i
j
−1/2
= um0 Exj K
fεα |X (∆hα (x, Xj )|Xj )
h
h
i
1
x − Xj 0
j
h
+ u2 m−1
E
K
f
(∆
(x,
X
)|X
)
j
j
0
x
εα |X
α
2
h
Exj
−3/2
+O(Ln m0
),
23
(15)
2000
1500
●
●
●
1000
●●
500
food expenditure
●
●
● ●
● ●
●
●
●●
● ●●●
●
●
● ●●
●●●
●●● ●
●
●
●
●
●
●●
●
●
●
● ●●
● ●●
●
●
●
●
●
●
●●
●
●●
●
●
●
●●
●●
● ●●
●●
●
●
●
●
●●
●●● ●●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●● ●
●● ● ●
●●
●●●
● ●
●
●●● ● ●
●
●●●
●
●●● ●
●●
●●●
●● ●●
●
● ●
●
●
●
●
●
●
●
●
●
●
● ●●
●
●●
●
● ●●
●●
●
●●●
●
●● ●
● ●●
●●●●●● ●
● ●
●
●● ● ●
● ●
●●
●
●●● ●●
●● ●
● ●
● ●● ●●
2.6
2.8
3.0
3.2
●
●
●
●
●
●
●
●
●●
●
●
●
●
3.4
log10 income
Figure 4: The figure shows the scatter plot of log transformed income versus food expenditure after removing one influential point. The lines represent linear quantile fits of level
0.1, 0.3, 0.5, 0.7, and 0.9.
uniformly in |u| ≤ C ∗ L∗n , because of Assumption (B2). Then, with
ηj,α,u,x = K
x − X n
o
j
−1/2
h
I(ε∆
≤
∆
(x)
+
um
)
−
α
− gx,α (u),
0
j,α
α
h
we have that
P
rbα∆,− (x)
≤
−1/2
um0
N (x), N (x) = m
−
−
X
= P m−1/2
ηj,α,u,x ≥ −m1/2 gx,α (u) N − (x), N − (x) = m .
j∈N − (x)
We now argue that an Edgeworth expansion holds for the conditional density of Tη =
P
m−1/2 j∈N − (x) ηj,α,u,x , given N − (x), N − (x) = m, that is of the form
σ −1
s−3
X
m−r/2 Pr (−φ : {χν })(σ −1 [· − x]) + O(m−(s−2)/2 [1 + |σ −1 [· − x]|s ]−1 )
r=0
24
(16)
where, the error term holds uniformly in α ∈ A, |u| ≤ L∗n and x ∈ RX for C1∗ m0 ≤ m ≤
C2∗ m0 and constants C1∗ < C2∗ . Here, we use standard notation used e.g. in Bhattacharya
and Rao (1976), p. 53. In particular, σ 2 denotes the conditional variance of ηj,α,u,x , given
that j ∈ N − (x), and Pr (−φ : {χν }) denotes a product of a standard normal density φ
with a polynomial that has coefficients depending only on the conditional cumulants χν of
ηj,α,u,x of order ν ≤ s−1, given that j ∈ N − (x). Note that σ 2 and χν depend on u, α, x and
n and that we do not indicate this in our notation. Furthermore, the cumulants and the
variance converge to constants depending on α, uniformly in |u| ≤ L∗n and x ∈ RX . Note
that for n → ∞ the conditional distribution of ηj,α,u,x , given that j ∈ N − (x), converges
to the distribution of K(U )(Z − α) where U and Z are independent random variables,
U has a uniform distribution on [−1, 1] and Z is {0, 1}-valued with P (Z = 1) = α. This
helps to understand that limit theorems hold uniformly. The function Pr (−φ : {χν }) is
defined as
r
X
1
Pr (−φ : {χν })(u) =
(−1)r
m!
m=1
j
X
1 +...+jm
χj1 +2
χjm +2 (r+2m)
· ... ·
φ
(u),
(j1 + 2)!
(jm + 2)!
=r
see Section 7 in in Bhattacharya and Rao (1976). In our case expansion (16) follows from
Theorem 19.3 in Bhattacharya and Rao (1976). For this claim we have to verify that
their conditions (19.27), (19.29) and (19.30) hold. Our setting is slightly different from
theirs, since we consider triangular arrays of independent identically distributed random
variables instead of a sequence of independent random variables as is the case in Theorem
19.3 in Bhattacharya and Rao (1976). But the same proof applies because in our setting
we can verify the following uniform versions of (19.27), (19.29) and (19.30):
i
h
sup
Exj |ηj,α,u,x |s < ∞,
(17)
α∈A,|u|≤L∗n ,x∈RX ,n≥n0
Z
sup
α∈A,|u|≤L∗n ,x∈RX ,n≥n0
sup
q
gα,u,x
(t)dt < ∞ for some q > 0,
{gα,u,x (t) : |t| ≥ b} < 1 for all b > 0
(18)
(19)
α∈A,|u|≤L∗n ,x∈RX ,n≥n0
with gα,u,x (t) = |Exj [exp(itσ −1 ηj,α,u,x )]| for some n0 > 0. Note that gα,u,x , σ and ηj,α,u,x
depend on n.
25
Claim (17) follows by a direct argument using brute force bounds. For the proof of (18),
n
Pp
xd −Xd,j |
x1 −X1,j
I(ε∆
),
...,
k(
))
we consider the conditional density of Up =
(k(
j,α ≤
j=1
h
h
o
−1/2
−
∆hα (x) + um0 ) − α given the value of ε∆
j,α and given that Xj ∈ N (x) for j = 1, ..., p.
For p = 1 this density evaluated at (u1 , . . . , ud ) can be bounded by a constant times
(u1 · ... · ud )−κ ((k(0) − u1 ) · ... · (k(0) − ud ))−κ by Assumptions (B1) and (B3). This bound
holds uniformly over α, u, x and the value of ε∆
1,α .
We now show that for every κ∗ > 0, there exists p∗ > 0 such that the density of Up∗ can
∗
be bounded by a constant times (u1 ·...·ud )κ . For simplification of notation we assume for
the proof that d = 1. For the proof of the claim, we show first that for p ≥ (1−κ)−1 we get
that the conditional density of Up is uniformly bounded. This follows by an evaluation of
R1
Rv
convolution integrals where one uses that 0 u−κ1 (v − u)−κ2 du = v −(κ1 +κ2 −1) 0 w−κ1 (1 −
w)−κ2 dw ≤ Cv −(κ1 +κ2 −1) . Applied to U2 this gives that the density of U2 is bounded by
−(2κ−1)
Cu1
+ C|k(0) − u1 |−(2κ−1) + C(2k(0) − u1 )−(2κ−1) . Note that the density of U1 is
−κ
−κ
bounded by Cu−κ
≤ Cu−κ
. For the density of U3 we get the
1 (k(0)−u1 )
1 +C(k(0)−u1 )
−(3κ−2)
bound Cu1
+C|k(0)−u1 |−(3κ−2) +C|2k(0)−u1 |−(3κ−2) +C(3k(0)−u1 )−(3κ−2) . Finally,
for p ≥ (1 − κ)−1 it holds that pκ − (p − 1) ≤ 0 and we have that for p ≥ (1 − κ)−1 , the
density of Up is uniformly bounded. We now use that the k-fold convolution of a bounded
density with bounded support [0, z] for some z > 0 is bounded by C|u1 |k−1 . This gives
∗
that the density of Up∗ can be bounded by a constant times uκ1 if p∗ ≤ l0 (κ∗ + 1) with
l0 ≥ (1 − κ)−1 , l ∈ N. This result can be easily extended to d > 1.
P
From this result now we want to conclude that the conditional density of pj=1 ηj,α,u,x =
n
o P
n
Pp
xd −Xd,j
−1/2
x−Xj
x1 −X1,j
p
∆
h
K(
)
I(ε
≤
∆
(x)+um
)−α
=
k(
)·...·k(
)
I(ε∆
0
j,α
α
j,α ≤
j=1
j=1
h
h
h
o
−1/2
∆hα (x) + um0 ) − α is uniformly bounded, given the value of ε∆
j,α and given that Xj ∈
N − (x) for j = 1, ..., p. This follows immediately from the following result. Suppose that
Z = (Z1 , ..., Zd ) has support [0, 1]d and a density f that is bounded by f (z) ≤ Dz1 · ... · zd
26
then Z1 · ... · Zd has a density g that is bounded by D. For a proof of this result, note that
Z
g(u) = ∂u
f (z)dz1 ... dzd
z1 ·...·zd ≤u
v
1
∂u
f
, z2 , ..., zd
dv dz2 ... dzd
z2 · ... · zd
z2 · ... · zd
v≤u
Z
u
1
f
, z2 , ..., zd
dz2 ... dzd
z2 · ... · zd
z2 · ... · zd
Z
u
1
f
, z2 , ..., zd
dz2 ... dzd
z2 · ... · zd
u
Z
u
1
D
· z2 · ... · zd · dz2 ... dzd
z2 · ... · zd
u
Z
=
=
≤
≤
= D.
We now apply the result that for p chosen large enough, the conditional density of
Pp
j=1
ηj,α,u,x is bounded, given that Xj ∈ N − (x) for j = 1, ..., p, uniformly over α, u
and x. This implies that the square of this conditional density is integrable and by the
Fourier Inversion Theorem (see Theorem 4.1 (vi) in Bhattacharya and Rao (1976)) the
same holds for the squared modulus of its Fourier transform. Thus the modulus of the
P
−
Fourier transform of the conditional density of 2p
j=1 ηj,α,u,x , given that Xj ∈ N (x) for
j = 1, ..., 2p, is integrable. This shows (18) for q = 2p.
For the proof of (19) one applies the Riemann-Lebesgue Lemma (see Theorem 4.1
in Bhattacharya and Rao (1976)). Consider for simplicity the case where d = 1. For
Exj [exp(itηj,α,u,x )] one gets that
exp[itgx,α (u)]Exj [exp(itηj,α,u,x )]
Z x+h Z
h
i
x−z
−1/2
h
=
exp itK
{I(e ≤ ∆α (x, z) + um0 ) − α}
h
x−h
e∈R
Z x+h
× fεα |X (e|z)fX (z) de dz
fX (z)dz
x−h
Z
1
Z
=
−1
h
i
−1/2
h
exp itK (v) {I(e ≤ ∆α (x, x + hv) + um0 ) − α}
e∈R
Z
1
× fεα |X (e|x + hv)fX (x + hv) de dv
fX (x + hv)dv.
−1
27
The right hand side of this equation converges to
Z
1
Z
1
exp[it(1 − α)K(v)]dv + (1 − α)
α
exp[−itαK(v)]dv.
−1
−1
−1/2
This convergence holds uniformly in t ∈ R, α ∈ A, |u| ≤ L∗n m0
and x ∈ RX . By using
these facts we get (19) from the Riemann-Lebesgue Lemma.
By applying Theorem 19.3 in Bhattacharya and Rao (1976) with s ≥ 4 we get that
−1/2
P rbα∆,− (x) ≤ um0
N − (x), N − (x) = m
(20)
2 −s
= 1 − Φ µα (u) + m−1/2 ρα (u) 1 − µα (u)2 φ µα (u) + O m−1
(1
+
µ
(u)
)
,
α
0
uniformly in u, α and x for C1∗ m0 ≤ m ≤ C2∗ m0 and constants C1∗ < C2∗ . Here we have
used the fact that terms for r = 2, ..., s − 3 in the expansion (16) can be bounded by
2 −s
O m−1
(1
+
µ
(u)
)
. We used the following notation
α
0
µα (u) = −
3
Exj (ηj,α,u,x
)
m1/2 gx,α (u)
and ρα (u) =
,
3
σα (u)
6σα (u)
2
with σα2 (u) = Exj (ηj,α,u,x
). It is easy to show that, uniformly in |u| ≤ C ∗ L∗n ,
2 i
h x − X
i
−1/2
I(εj,α ≤ ∆hα (x, Xj ) + um0 ) − α
σα2 (u) = Exj K 2
h
+O(Ln m−1
0 )
−1/2
= A1 (α) + um0
3
Exj (ηj,α,u,x
)
=
Exj
h
K
3
A2 (α) + O(Ln m−1
0 ),
x − X
i
h
I(εj,α ≤
−1/2
+O(Ln m0
+
−1/2
um0 )
−α
3 i
)
−1/2
= A3 (α) + O(Ln m0
∆hα (x, Xj )
),
and that
−1/2
µα (u) = −um1/2 m0
1
−1/2
A1 (α)−1/2 A5 (α) − u2 m1/2 m−1
A6 (α)
0 A1 (α)
2
1
−3/2
+ u2 m1/2 m−1
(α)A2 (α)A5 (α) + O(Ln m−1
0 A1
0 )
2
28
with
h x − X
i
i
A1 (α) = Exj K 2
(1 − 2α)P (εj,α ≤ ∆hα (x, Xj )) + α2 ,
h
h x − X
i
i
2
h
j
(1 − 2α)fεα |X (∆α (x, Xj )|Xj ) ,
A2 (α) = Ex K
h
h x − X
i
i
3
3
j
2
h
A3 (α) = Ex K
(1 − 3α + 3α )P (εj,α ≤ ∆α (x, Xj )) − α ,
h
i
h x − X
i
2
2
j
h
A4 (α) = Ex K
(1 − 2α)P (εj,α ≤ ∆α (x, Xj )) + α .,
h
h x − X
i
j
A5 (α) = Exj K
fεα |X (∆hα (x, Xj )|Xj ) ,
h
h x − X
i
j
A6 (α) = Exj K
fε0α |X (∆hα (x, Xj )|Xj ) ,
h
−1/2
Note that µα (−u)2 = µα (u)2 + O(Ln m0
). Thus we get that uniformly in |u| ≤ C ∗ L∗n ,
m−1/2 ρα (u) 1 − µα (u)2 φ µα (u) − m−1/2 ρα (−u) 1 − µα (−u)2 φ µα (−u) (21)
= O(Ln m−1
0 ),
−1/2
m−1/2 ρα (u) 1 − µα (u)2 φ µα (u) = O(Ln m0 ).
−1/2
Note also that with um = um1/2 m0
(22)
, uniformly in |u| ≤ C ∗ L∗n ,
−1/2
1 − Φ µα (u) = 1 − Φ − um A1 (α)A5 (α)
u2
−1/2
−1/2
m
+φ − um A1 (α)A5 (α)
(A1 (α)A6 (α)
1/2
2m
−3/2
−A1
(α)A2 (α)A5 (α)) + O(Ln m−1
0 ).
Hence, uniformly in |u| ≤ C ∗ L∗n ,
h
i
−1/2
1 − Φ(µα (u)) + Φ(−µα (−u)) = 2 1 − Φ − um A1 (α)A5 (α) + O(Ln m−1
0 ).(23)
From (21), (23) and the above calculations it now follows for l ≥ 1 that with Dm (α) =
29
−1/2
m1/2 m0
−1/2
A1
(α)A5 (α) and rbα∆,− (x) = rbα∆ (x) − ∆hα (x)
o
n
−1/2
rα∆,− (x)| ≤ L∗n m0 ) N − (x) = m
E ml0 rbα∆,− (x)2l I(|b
Z
L∗n
= 2l
0
−1/2
v 2l−1 P rbα∆,− (x) > vm0
N − (x) = m dv
Z
0
−2l
−L∗n
Z
L∗n
= 2l
0
−1/2
v 2l−1 P rbα∆,− (x) ≤ vm0
N − (x) = m dv
h
−1/2
v 2l−1 P rbα∆,− (x) > vm0
N − (x) = m
i
−1/2
+P rbα∆,− (x) ≤ −vm0
N − (x) = m dv
Z
L∗n
= 2l
h
v 2l−1 Φ µα (v) − m−1/2 ρα (v) 1 − µα (v)2 φ µα (v)
0
i
+1 − Φ µα (−v) + m−1/2 ρα (−v) 1 − µα (−v)2 φ µα (−v) dv + O(Ln m0−1 )
Z
L∗n
= 4l
v
2l−1
Φ − vDm (α) dv + O(Ln m−1
0 )
0
= 4lDm (α)
−2l
L∗n Dm (α)
Z
w2l−1 Φ(−w) dw + O(Ln m−1
0 )
0
Z
h
∗ 2l
∗
−2l
= 2 (Ln ) Φ − Ln Dm (α) + Dm (α)
L∗n Dm (α)
i
v φ(v) dv + O(Ln m−1
0 )
2l
0
uniformly in C1∗ m0 ≤ m ≤ C2∗ m0 with constants C1∗ < C2∗ . If L∗n = (log n)γ is chosen
with γ > 0 large enough we get that the right hand side of the last equation is equal to
R∞
Dm (α)−2l −∞ v 2l φ(v) dv + O(Ln m−1
0 ). This follows since it can be easily shown that
Z
L∗n Dm (α)
2l
Z
∞
z φ(z) dz −
2
0
∗
∗
z 2l φ(z) dz = o(Ln n−C ) = o(m−C ),
−∞
∗
∗ 2l
∗
(Ln ) Φ − Ln Dm (α) = o(m−C )
with γ chosen depending on C ∗ . Thus we get for l ∈ N that
n
o
−1/2
rα∆,− (x)| ≤ L∗n m0 ) N − (x) = m
E rbα∆,− (x)2l I(|b
Z ∞
l
−l A1 (α)
=m
z 2l φ(z) dz + O(Ln (nhd )−l−1 ).
A2l
(α)
−∞
5
30
(24)
With similar arguments one can show that
n
o
−1/2
E rbα∆,− (x)2l−1 I(|b
rα∆,− (x)| ≤ L∗n m0 ) N − (x) = m
=
(2l−1)/2
A
(α)
m−(2l−1)/2 1 2l−1
A5 (α)
Z
(25)
∞
z 2l−1 φ(z) dz + O(Ln (nhd )−l )
−∞
= O(Ln (nhd )−l ).
In this case one applies (22) instead of (21).
For the proof of (11) and (12) it remains to show that uniformly in C1∗ m0 ≤ m ≤ C2∗ m0 ,
with constants C1∗ < C2∗ , and for l ∈ N
n
o
E reα∆,− (x)2l N − (x) = m
=
κ/2
A (α)
m−κ/2 1κ
A5 (α)
Z
(26)
∞
z 2l φ(z) dz + O(Ln (nhd )−l−1 ),
−∞
n
o
∆,−
2l−1
−
E reα (x)
N (x) = m
(27)
= O(Ln (nhd )−l ).
It remains to show (26) – (27). For the proof of (26) note that for independent random
variables Z1 , ..., Zm with mean zero, variance 1 and bounded 2l-th absolute moment it
holds that
m
n
o Z
X
−1/2
2l
E (m
Zi )
=
∞
z 2l φ(z) dz + O(m−1 ),
−∞
i=1
iid
∗
because for Z1∗ , . . . , Zm
∼ N (0, 1) one has
m
n
o
X
P
−1/2
2l
E (m
Zi )
= m−l ∗ E(Zi1 . . . Zi2l ) + O(m−1 )
i=1
= m−l
P∗
E(Zi∗1 . . . Zi∗2l ) + O(m−1 )
m
o
n
X
−1/2
= E (m
Zi∗ )2l + O(m−1 )
i=1
= E((Z1∗ )2l ) + O(m−1 )
Z ∞
=
z 2l φ(z) dz + O(m−1 ),
−∞
31
P∗
where the sum
runs over all indices i1 , . . . , i2l that are such that each value of an
index appears exactly two times. For the proof of (27) one applies that for independent
random variables Z1 , ..., Zm with mean zero, variance 1 and bounded 2l + 1-th absolute
moment it holds that
m
m
o
n
X
X
2l−1
−l+1 −1/2
−1/2
Zi )
= m
m
E(
Zi )2l−1
E (m
i=1
i=1
P
= m−l+1 m−1/2 ∗∗ E(Zi1 . . . Zi2l−1 ) + O(m−3/2 ) = O(m−1/2 ),
where the sum
P∗∗
runs over all indices that are such that one value of an index appears
three times and for all other 2l − 4 indices each value appears exactly two times. This
concludes the proof of the theorem.
6
Proof of Theorem 2
For the proof of Theorem 2 we will use the following corollary of Theorem 1. For the
statement of the corollary we have to define another construction of local neighborhoods.
For their definition suppose first that X is one-dimensional. Then the support RX is a
compact interval. For arbitrary j and for k ∈ {1, 2, 3}, we can then define
Ijk = [(3j + k − 1)h, (3j + k)h],
and
∗
Ijk
= [(3j + k − 2)h, (3j + k + 1)h].
∗
The set of indices of the Xi (i = 1, . . . , n) that fall inside the interval Ijk
is denoted by
Njk . We write Njk for the number of elements of Njk . An arbitrary x ∈ RX belongs to a
unique Ijk and we define N (x) = Njk and N (x) = Njk . Thus N (x) is an interval of length
3h, such that x lies in the middle subinterval of N (x) of length h. If the dimension of X
is larger than one, this partition of the support into small intervals can be generalized in
an obvious way.
Corollary 1. Assume (B1)–(B3). Then, for natural numbers l ≥ 1,
n
o
∆,−
2l
∆,−
2l
E rα (x) − reα (x) N (x) = m = O(Ln (nhd )−l−1 ),
n
o
2l−1
∆,−
2l−1
E r∆,−
(x)
−
r
e
(x)
N
(x)
=
m
= O(Ln (nhd )−l ),
α
α
32
uniformly in x ∈ RX , α ∈ A and C1∗ nhd ≤ m ≤ C2∗ nhd , where N (x) is the random number
∆
h
of Xi ’s that lie in N (x), and where r∆,−
α (x) = r α (x) − ∆α (x). For the second moments
of the uncentered estimators r∆
eα∆ we have that
α and r
o
n
2
2
∆
∆
E rα (x) − reα (x) N (x) = m = O(Ln n−3/2 h−5d/4 ).
Under the additional assumption that ∆α ≡ 0 we get that
n
o
∆
2
∆
2
E rα (x) − reα (x) N (x) = m = O(Ln (nhd )−2 ).
Proof of Corollary 1.
For m+ ≥ m we have by a simple argument with κ = 2l
o
n
n
κ
+
−
κ
∆,−
κ
(x)
N
(x)
=
m
,
N
(x)
=
m
=
E
or κ = 2l + 1 that E r∆,−
(x)
−
r
e
r∆,−
α
α
α (x) −
o
reα∆,− (x)κ N − (x) = m . Note that N − (x) ≤ N (x) because of N − (x) ⊂ N (x). Using (11)
and
m+
−
+
P N (x) ≤
N (x) = m
≤ C exp(−cnhd ),
4
uniformly in m+ ≥ 12 3d fX (x)nhd we conclude that
o
n
κ
∆,−
κ
+
(x)
−
r
e
(x)
N
(x)
=
m
= O(Ln (nhd )−l−1 ),
E r∆,−
α
α
uniformly in x ∈ RX , α ∈ A and 21 3d fX (x)nhd ≤ m+ ≤ 2 3d fX (x)nhd .
Since
P
1 d
3 fX (x)nhd ≤ N (x) ≤ 2 3d fX (x)nhd for all x ∈ RX
2
→ 1,
we get the statement of the corollary.
We now come to the proof of Theorem 2.
We only prove the statement for TbA . The asymptotic result for Tbα follows similarly.
We need to introduce a few more notations. With δθ,α (x) = −(θ(α) − θ0 (α))> γα (x) +
−1/2 −d/4
n−1/2 h−d/4 ∆α (x) and ε∆
h
∆α (Xi ) we define reα∆ as in (9) and we put
i,α = εi,α + n
n
X
x − Xi
∆
τα (εi.α + δθ,α (Xi ) − r).
rbα,θ (x) = arg min
K
r
h
i=1
∆
∆
Note that rbα∆ (x) = rbα,θ
(x), and that rbα (x) = rbα,
(x) + OP (n−1/2−c ) by Assumption (B4).
0
θb
We also define r∆
α as in (8). Let also
Wni (x, h) = Kh (x − Xi )/[
X
j
33
Kh (x − Xj )],
with Kh (·) = K(·/h)/hd .
The proof of Theorem 2 will make use of the following lemmas.
Lemma 1. Suppose that the assumptions of Theorem 2 are satisfied. Then,
sup sup rbα (x) = OP ((nhd )−1/2 Ln ),
(28)
sup sup rbα∆ (x) = OP ((nhd )−1/2 Ln ).
(29)
α∈A x∈RX
α∈A x∈RX
Proof of Lemma 1.
As is known for the case where there is no parametric part and
where ∆α ≡ 0, one has that
∆
sup sup rbα,θ
(x) − reα (x) = OP ((nhd )−3/4 Ln )
0
α∈A x∈RX
with reα defined as in (5). For a proof see Theorem 2 in Guerre and Sabbah (2012). By
standard smoothing theory we have that (still when ∆α ≡ 0)
sup sup reα (x) = OP ((nhd )−1/2 Ln ).
(30)
α∈A x∈RX
This shows (29) when ∆α ≡ 0. We can move from this case to ∆α 6= 0 by adding to the
observations terms of order OP (n−1/2 h−d/4 ). This changes the local quantiles by at most
this amount, and hence (29) still holds when ∆α 6= 0.
∆
In the case of rbα (x) = rbα,
(x) + OP (n−1/2−c ) we have to add to the observations terms
θb
of the order OP (Ln n−1/2 h−d/4 ) = OP ((nhd )−1/2 Ln ). This shows the first statement of the
lemma.
Lemma 2. Suppose that the assumptions of Theorem 2 are satisfied. Then,
b − θ0 (α))> γα (x) = OP (n− 21 −c ).
sup sup rbα (x) − rbα∆ (x) + (θ(α)
α∈A x∈RX
>
b
Proof of Lemma 2. First note that rbα (x)+(θ(α)−θ
0 (α)) γα (x) is equal to the quantile
estimator we would obtain when we shift all observations Yi in the window around x by
b − θ0 (α))> γα (x), and hence we need to show that the distance between
the amount (θ(α)
1
this latter estimator (say rbα,mod (x)) and rbα∆ (x) is OP (n− 2 −c ) uniformly in α and x.
34
Next, note that if now in addition we perturb all observations in the window around
>
b
x by adding mα,θ(α)
b (Xi ) − mα,θ0 (α) (Xi ) − (θ(α) − θ0 (α)) γα (Xi ), the quantile estimator
rbα,mod (x) will get perturbed by at most the maximal perturbation of the observations,
which is of the order OP (n−1/2−c ) by Assumption (B4).
After these two perturbations, the quantile estimator is now based on Yi −mα,θ0 (α) (Xi )+
b − θ0 (α))> (γα (x) − γα (Xi )) instead of Yi − m b (Xi ). Finally note that if we apply
(θ(α)
α,θ(α)
b
one more perturbation by subtracting (θ(α)
− θ0 (α))> (γα (x) − γα (Xi )) for all Xi in the
window around x, the estimator changes by at most OP (h−δ n−1/2−ρ hδ ) = OP (n−1/2−ρ ) by
Assumption (B5). The so-obtained estimator equals rbα∆ (x), which shows the statement of
the lemma.
Lemma 3. Suppose that the assumptions of Theorem 2 are satisfied. Then,
sup sup rbα∆ (x) − reα∆ (x) = OP ((nhd )−3/4 Ln ).
α∈A x∈RX
Proof of Lemma 3. Write
|b
rα∆ (x) − reα∆ (x)|
≤
=
1
n
X
inf x,α fεα |X (0|x)
i=1
1
n
X
inf x,α fεα |X (0|x)
Wni (x, h)fεα |X (0|Xi )b
rα∆ (x) +
n
X
Wni (x, h) I(ε∆
i,α ≤ 0) − α
i=1
Wni (x, h)fεα |X (0|Xi )b
rα∆ (x) − Fbε∆α |X (b
rα∆ (x)|x) + Fbε∆α |X (0|x)
i=1
d −1
+OP ((nh ) ),
(31)
P
where Fbε∆α |X (y|x) = i Wni (x, h)I(ε∆
i,α ≤ y). The latter equality follows from the fact
that
|Fbε∆α |X (b
rα∆ (x)|x) − α| ≤ |Fbε∆α |X (b
rα∆ (x)|x) − Fbε∆α |X (b
rα∆ (x) − |x)|
= OP ((nhd )−1 ).
The following expansion follows from standard kernel smoothing theory, uniformly for
35
d
x ∈ RX , α ∈ A, |y| ≤ an and for sequences an with a−1
n = O(nh ) :
Fbε∆α |X (y|x) − Fbε∆α |X (0|x)
Z y
X
fεα |X (u − n−1/2 h−d/4 ∆α (Xi )|Xi )du + OP ((nhd )−1/2 Ln a1/2
=
Wni (x, h)
n )
0
i
=
X
Z
Wni (x, h)
fεα |X (u|Xi )du + OP ((nhd )−1/2 Ln an1/2 ) + OP (n−1/2 h−d/4 an )
0
i
=y
y
X
Wni (x, h)fεα |X (0|Xi ) + OP ((nhd )−1/2 Ln an1/2 + a2n ) + OP (n−1/2 h−d/4 an ).
i
We now apply this bound to an = (nhd )−1/2 Ln and y = rbα∆ (x), which is possible thanks
to Lemma 1. This combined with (31) shows the statement of the lemma.
For proving Theorem 2, we will make use of the following decomposition, which follows
from Lemma 2 :
Z Z
TbA =
A
i2
b − θ0 (α))> γα (x) w(x, α) dx dα + oP (n−1 h−d/2 )
rbα∆ (x) − (θ(α)
h
rbα∆ (x)2
RX
Z Z
=
A
h
RX
Z Z
+
A
RX
Z Z
+
A
RX
h
n
oi
∆
2
∆
2
∆
2
∆
2
rα (x) − reα (x) − E rα (x) − reα (x) N (x) w(x, α) dx dα
h
−2
RX
Z Z
−2
A
RX
Z Z
+
A
(b
rα∆ (x)
−
reα∆ (x))
b − θ0 (α))> γα (x)
(θ(α)
i
w(x, α) dx dα
h
i
b − θ0 (α))> γα (x) w(x, α) dx dα
reα∆ (x) (θ(α)
h
i2
b − θ0 (α))> γα (x) w(x, α) dx dα
(θ(α)
RX
Z Z
+
A
i
w(x, α) dx dα
n
o
∆
2
∆
2
E rα (x) − reα (x) N (x) w(x, α) dx dα
Z Z
A
−
2
r∆
α (x)
RX
reα∆ (x)2 w(x, α) dx dα + oP (n−1 h−d/2 )
= Tn1 + ... + Tn7 + oP (n−1 h−d/2 ).
Lemma 4. Suppose that the assumptions of Theorem 2 are satisfied. Then,
Tn1 = oP (an ),
for any sequence {an } of positive constants tending to zero as n → ∞.
36
Proof of Lemma 4. Note that
Tn1 ≤ sup sup
α∈A x∈RX
|b
rα∆ (x)|2
Z Z
A
I |b
rα∆ (x)| > Ln (nhd )−1/2 w(x, α) dx dα.
RX
It is easily seen from Lemma 1 that
Z Z
A
I |b
rα∆ (x)| > Ln (nhd )−1/2 w(x, α) dx dα = oP (an ),
RX
for any an → 0, since the indicator inside the integral will be zero from some point on.
From Corollary 1 we get the following result.
Lemma 5. Suppose that the assumptions of Theorem 2 are satisfied. Then,
n
o
∆
2
∆
2
sup sup E rα (x) − reα (x) N (x) = oP ((nhd/2 )−1 ),
α∈A x∈RX
and hence, Tn2 = oP ((nhd/2 )−1 ).
At this point we needed the additional assumption nh3d/2 /L∗n → ∞ for the case that
∆α 6≡ 0. We now shortly outline what happens if we are on the alternative and if this
assumption does not hold. Note that for |m − m0 | = o(m0 )
o
n
2
∆
2
E r∆
(x)
−
r
e
(x)
N
(x)
=
m
α
α
o
n
h
2
∆,−
h
2
(x)
+
∆
(x))
−
(e
r
(x)
+
∆
(x))
N
(x)
=
m
= E (r∆,−
α
α
α
α
n
o
n
o
∆,−
2
∆,−
2
h
∆,−
= E rα (x) − reα (x) N (x) = m + 2∆α (x)E rα (x) N (x) = m .
For the first term on the right hand side we get from Corollary 1 that it is of order
o((nhd/2 )−1 ). For ∆hα (x) one can show that it is equal to n−1/2 h−d/4 ∆α (x)+O(Ln n−1/2 h−d/4 h2 ).
n
o
For the term E r∆,−
(x)
N
(x)
=
m
one can show that it is equal to (nhd )−1 ρ(x) +
α
O(Ln (nhd )−3/2 ) for some function ρ that does not depend on the function ∆α . This can
be done by using the arguments based on Edgeworth expansions that were central in the
proof of Theorem 1. This gives that
Tn2 = n
−3/2 −5d/4
Z Z
h
A
∆α (x)ρ(x)w(x, α) dx dα + o(n−3/2 h−5d/4 ) + o((nhd/2 )−1 ).
RX
37
Suppose now that nh3d/2 → 0. Then it holds that (nhd/2 )−1 = o(n−3/2 h−5d/4 ) and using
Lemma 10 we get that
−1 −d
Tn = n h K
(2)
Z
Z
α(1 − α)
(0)
A
+n−3/2 h−5d/4
RX
Z Z
A
w(x, α)
dx dα
fX (x)fε2α |X (0|x)
∆α (x)ρ(x)w(x, α) dx dα + oP (n−3/2 h−5d/4 ).
RX
This implies that the test rejects for large values of
R R
A
RX
∆α (x)ρ(x)w(x, α) dx dα. Thus,
in this high-dimensional setting the test behaves like a linear test and not like an omnibus
test.
Lemma 6. Suppose the assumptions of Theorem 2 are satisfied. Then,
Tn3 = OP (Ln n−5/4 h−3d/4 ) = oP ((nhd/2 )−1 ).
Proof of Lemma 6.
For simplicity of exposition of the argument, let us assume that
Xi is one-dimensional. For arbitrary j and for k ∈ {1, 2, 3}, define
Z Z
Ujk =
A
Ijk
h
n
oi
∆
2
∆
2
∆
2
∆
2
rα (x) − reα (x) − E rα (x) − reα (x) N (x) w(x, α) dx dα.
Then we can write Tn3 = Tn31 + Tn32 + Tn33 with Tn3k =
P
j
Ujk (k = 1, 2, 3). The
terms Tn31 , Tn32 and Tn33 are sums of O(h−1 ) conditionally independent summands. The
summands are uniformly bounded by a term of order OP (Ln n−5/4 h−1/4 ). This follows
from Lemma 5, from the fact that supα∈A supx |e
rα∆ (x)| = OP (Ln (nh)−1/2 ), see also (30),
and from the Bahadur representation for r∆
α (x), given in Lemma 3. It now follows that
Tn3k = OP (Ln n−5/4 h−3/4 ), which implies the statement of the lemma for d = 1. For d > 1
one can use the same approach.
Lemma 7. Suppose the assumptions of Theorem 2 are satisfied. Then,
Tn4 = oP ((nhd/2 )−1 ).
Proof of Lemma 7.
1
d
This is obvious, since Tn4 = OP (Ln (nhd )−3/4 n− 4 h 4 /L∗n ) =
oP ((nhd/2 )−1 ), thanks to Assumption (B5) and Lemma 3.
38
Lemma 8. Suppose the assumptions of Theorem 2 are satisfied. Then,
Tn5 = oP ((nhd/2 )−1 ).
Proof of Lemma 8. Write
Z Z Pn K x−Xi {I(ε∆ ≤ 0) − α}
i,α
i=1
h
b − θ0 (α))> γα (x)w(x, α) dx dα
(θ(α)
Tn5 = 2
Pn
x−X
i
A RX
fεα |X (0|Xi )
i=1 K
h
Z Z Pn K x−Xi {I(ε∆ ≤ 0) − α}
i,α
i=1
h
2
=
n A RX
gh,α (x)
b − θ0 (α))> γα (x)w(x, α) dx dα + oP ((nhd/2 )−1 )
×(θ(α)
Z
b − θ0 (α))> 1
= 2 (θ(α)
n
A
with gh,α (x) = E K
x−X
h
n
X
d/2 −1
ρh,α (Xi ){I(ε∆
) ),
i,α ≤ 0) − α} dα + oP ((nh
(32)
i=1
fεα |X (0|X) and
Z
ρh,α (v) =
K
RX
Using the notations Qh,α (Xi ) =
x − v γ (x)w(x, α)
α
dx.
h
gh,α (x)
ρ (X )
Pn h,α i
,
j=1 ρh,α (Xj )
Pn
∆
Fbε∆α (y) =
i=1 Qh,α (Xi )I(εi,α ≤ y) and
Fε∆α (y) = P (ε∆
α ≤ y), we have that
n
1X
ρh,α (Xi ){I(ε∆
i,α ≤ 0) − α}
n i=1
n
h
i 1 X
= Fbε∆α (0) − α
ρh,α (Xi )
n i=1
n
n
h
i 1 X
h
i 1 X
b
= Fε∆α (0) − Fε∆α (0)
ρh,α (Xi ) + Fε∆α (0) − α
ρh,α (Xi )
n i=1
n i=1
= OP (n−1/2 ) + OP (n−1/2 h−d/4 ),
uniformly in α ∈ A, and hence the statement of the lemma holds because of (32) and
(B5).
Lemma 9. Suppose the assumptions of Theorem 2 are satisfied. Then,
Tn6 = oP ((nhd/2 )−1 ).
39
Proof of Lemma 9. The statement of the lemma follows from (B5).
Lemma 10. Suppose the assumptions of Theorem 2 are satisfied. Then,
d
nhd/2 Tn7 − bh,A → N (DA , VA ).
Proof of Lemma 10.
The proof is very similar to the proof of e.g. Proposition 1 in
Härdle and Mammen (1993). Write
x − X x − X
XZ Z
j
i
∆
−2
K
{I(ε∆
Tn7 = n
K
i,α ≤ 0) − α}{I(εj,α ≤ 0) − α}
h
h
A
R
X
i,j
×b
gα (x)−2 w(x, α) dx dα,
∆
P
i
where gbα (x) = n−1 ni=1 K x−X
fεα |X (0|Xi ). By writing I(ε∆
i,α ≤ 0) − α = I(εi,α ≤
h
0) − I(εi,α ≤ 0) + I(εi,α ≤ 0) − α , we can decompose Tn7 into Tn7 = Tn71 + Tn72 + 2Tn73 .
As in Härdle and Mammen (1993), Tn73 is negligible. Straightforward calculations show
that Tn71 = (nhd/2 )−1 (DA + oP (1)). Indeed,
E(Tn71 |X1 , . . . , Xn )
x − X x − X
XZ Z
i
j
−2
K
K
Fεα |X (−n−1/2 h−d/4 ∆α (Xi )|Xi ) − Fεα |X (0|Xi )
=n
h
h
A RX
i,j
× Fεα |X (−n−1/2 h−d/4 ∆α (Xj )|Xj ) − Fεα |X (0|Xj ) gbα (x)−2 w(x, α) dx dα
x − X x − X
XZ Z
j
i
−2
=n
K
K
fεα |X (0|Xi )fεα |X (0|Xj )
h
h
A
R
X
i,j
×n−1 h−d/2 ∆α (Xi )∆α (Xj )b
gα (x)−2 w(x, α) dx dα (1 + oP (1))
Z Z
−1 −d/2
=n h
∆2α (x)w(x, α) dx dα (1 + oP (1))
A
RX
= n−1 h−d/2 DA (1 + oP (1)).
Next, write Tn72 = Tn72a + Tn72b with
Tn72a
n
1 X
=
Unii ,
n2 i=1
Tn72b =
1 X
Unij ,
n2 i6=j
40
where
Z Z
Unij =
K
A
RX
x − X x − X
i
j
K
{I(εi,α ≤ 0) − α}{I(εj,α ≤ 0) − α}
h
h
×b
gα (x)−2 w(x, α) dx dα.
By calculating its mean and variance it can be checked that nhd/2 Tn72a = bh,A + oP (1).
d
Thus for the lemma it remains to check that nhd/2 Tn72b → N (0, VA ). For the proof
of this claim one can proceed as in Härdle and Mammen (1993) and apply the central
limit theorem for U-statistics of de Jong (1987). For this purpose one has to verify that
P
4
n2 hd Var(Tn72b ) → VA , max1≤i≤n nj=1 Var(Unij )/Var(Tn72b ) → 0 and E[Tn72b
]/(Var(Tn72b ))2
→ 3. This can be done by straightforward but tedious calculations.
Proof of Theorem 2. The theorem follows immediately from Lemmas 4–10. Lemmas
4–9 imply the negligibility of the terms Tn1 , .., Tn6 . Lemma 10 shows the asymptotic
normality of nhd/2 Tn7 .
7
Proof of Theorem 3
The theorem can be shown by verification of the conditions of the central limit theorem
for U-statistics of de Jong (1987), in the same way as was done in the proof of Lemma
10. The crucial point in the proof is to note that I(Ui ≤ α) has the same distribution as
I(εi,α ≤ 0), and hence the calculations in the proof of Lemma 10 go through in this proof.
Acknowledgments
Research of the first author was prepared within the framework of a subsidy granted to
the HSE by the Government of the Russian Federation for the implementation of the
Global Competitiveness Program and it was supported by Deutsche Forschungsgemeinschaft through the Research Training Group RTG 1953. The research of the second author
was supported by the European Research Council (2016-2021, Horizon 2020 / ERC grant
41
agreement No. 694409), and by IAP research network grant nr. P7/06 of the Belgian
government (Belgian Science Policy).
References
Ait-Sahalia, Y., Fan, J. and Peng, H. (2009). Nonparametric transition-based tests for
diffusions. Journal of the American Statistical Association 104 1102-1116.
Angrist, J., Chernozhukov, V. and Fernández-Val, I. (2006). Quantile regression under
misspecification, with an application to the U.S. wage structure. Econometrica 74
539-563.
Bhattacharya, R. and Rao, R. (1976). Normal Approximations and Asymptotic Expansions. John Wiley & Sons, New York.
Bierens, H.J. and Ginther, D. (2001). Integrated conditional moment testing of quantile
regression models. Empirical Economics 26 307-324.
Chaudhuri, P. (1991). Nonparametric estimates of regression quantiles and their local
Bahadur representation. Annals of Statistics 19 760-777.
Conde-Amboage, M., Sánchez-Sellero, C. and González-Manteiga, W. (2015). A lack-offit test for quantile regression models with high-dimensional covariates. Computational Statistics and Data Analysis 88 128-138.
De Backer, M., El Ghouch, A. and Van Keilegom, I. (2017). Semiparametric copula
quantile regression for complete or censored data. Electronic Journal of Statistics
11 1660-1698.
de Jong, P. (1987). A central limit theorem for generalized quadratic forms. Probability
Theory and Related Fields 75 261-277.
Dette, H. and Sprekelsen, I. (2004). Some comments on specification tests in nonparametric absolutely regular processes. Journal of Time Series Analysis 25 159-172.
42
El Ghouch, A. and Van Keilegom, I. (2009). Local linear quantile regression with dependent censored data. Statistica Sinica 19 1621-1640.
Fan, J., Zhang, C. and Zhang, J. (2001). Generalized likelihood ratio statistics and
Wilks phenomenon. Annals of Statistics 29 153-193.
Gao, J. and Hong, Y. (2008). Central limit theorems for generalized U-statistics with
applications in nonparametric specification. Journal of Nonparametric Statistics 20
61-76.
González-Manteiga, W. and Cao-Abad, R. (1993). Testing the hypothesis of a general
linear model using nonparametric regression estimation. Test 2 161-188.
Guerre, E. and Lavergne, P. (2002). Optimal minimax rates for nonparametric specification testing in regression models. Econometric Theory 18 1139-1171.
Guerre, E. and Sabbah, C. (2012). Uniform bias study and Bahadur representation
for local polynomial estimators of the conditional quantile function. Econometric
Theory 28 87-129.
Haag, B. (2008). Non-parametric regression tests using dimension reduction techniques.
Scandinavian Journal of Statistics 35 719-738.
Härdle, W. and Mammen, E. (1993). Testing parametric versus nonparametric regression. Annals of Statistics 21 1926-1947.
He, X. and Ng, P. (1999). Quantile splines with several covariates. Journal of Statistical
Planning and Inference 75 343-352.
He, X., Ng, P. and Portnoy, S. (1998). Bivariate quantile smoothing splines. Journal of
the Royal Statistical Society - Series B 60 537-550.
He, X. and Zhu, L.-X. (2003). A lack of fit test for quantile regression. Journal of the
American Statistical Association 98 1013-1022.
43
Hjellvik, V., Yao, Q. and Tjøstheim, D. (1998). Linearity testing using local polynomial
approximation. Journal of Statistical Planning and Inference 68 295-321.
Hoderlein, S. and Mammen, E. (2009). Identification and estimation of local average
derivatives in non-separable models without monotonicity. Econometrics Journal
12 1-25.
Hong, S.Y. (2003). Bahadur representation and its applications for local polynomial
estimates in non-parametric M-regression. Journal of Nonparametric Statistics 15
237-251.
Horowitz, J.L. and Spokoiny, V.G. (2002). An adaptive, rate-optimal test of linearity
for median regression models. Journal of the American Statistical Association 97
822-835.
Ingster, Y.I. (1993). Asymptotically minimax hypothesis testing for nonparametric alternatives I, II, III. Math. Methods of Statistics 2 85-114, 171-189, 249-268.
Koenker, R. (2005). Quantile Regression. Cambridge University Press.
Koenker, R. and Machado, J.A.F. (1999). Goodness of fit and related inference processes
for quantile regression. Journal of the American Statistical Association 94 12961310.
Koenker, R. and Xiao, Z. J. (2002). Inference on the quantile regression process. Econometrica 70 1583-1612.
Kong, E., Linton, O. and Xia, Y. (2010). Uniform Bahadur representation for local
polynomial estimates of M-regression and its application to the additive model.
Econometric Theory 26 1529-1564.
Kreiss, J.P., Neumann, M.H. and Yao, Q. (2008). Bootstrap tests for simple structures
in nonparametric time series regression. Statistics and its Interface 1 367-380.
44
Lee, K.L. and Lee, E.R. (2008). Kernel methods for estimating derivatives of conditional
quantiles. Journal of the Korean Statistical Society 37 365-373.
Leucht, A. (2012). Degenerate U - and V -statistics under weak dependence: Asymptotic
theory and bootstrap consistency. Bernoulli 18 552-585.
Li, Q. and Racine, J.S. (2008). Nonparametric estimation of conditional CDF and
quantile functions with mixed categorical and continuous data. Journal of Business
& Economic Statistics 26 423-434.
Rothe, C. and Wied, D. (2013). Misspecification testing in a class of conditional distributional models. Journal of the American Statistical Association 108 314-324.
Su, L. and White, H.L. (2012). Conditional independence specification testing for dependent processes with local polynomial quantile regression. Advances in Econometrics
29 355-434.
Truong, Y.K. (1989). Asymptotic properties of kernel estimators based on local medians.
Annals of Statistics 17 606-617.
Volgushev, S., Birke, M., Dette, H. and Neumeyer, N. (2013). Significance testing in
quantile regression. Electronic Journal of Statistics 7 105-145.
Yu, K. and Jones, M. C. (1998). Local Linear Quantile Regression. Journal of the
American Statistical Association 93 228-237.
Zheng, J.X. (1996). A consistent test of a functional form via nonparametric estimation
techniques. Journal of Econometrics 75 263-289.
Zheng, J.X. (1998). A consistent nonparametric test of parametric models under conditional quantile regressions. Econometric Theory 14 223-238.
45
| 10math.ST
|
arXiv:1803.04078v2 [stat.ME] 30 Mar 2018
Minimum bias multiple taper spectral
estimation ∗
Kurt S. Riedel and Alexander Sidorenko
Courant Institute of Mathematical Sciences, New York University
New York, New York 10012-1185
EDICS: SP 3.1.1
Abstract
Two families of orthonormal tapers are proposed for multitaper
(k)
spectral analysis:
q minimum bias tapers, and sinusoidal tapers {v },
(k)
where vn = N 2+1 sin Nπkn
+1 , and N is the number of points. The resulting sinusoidal multitaper spectral estimate is Ŝ(f ) =
j
2N +2 ) − y(f
1
2K(N +1)
PK
j=1 |y(f +
j
2
2N +2 )| ,
−
where y(f ) is the Fourier transform of the stationary time series, S(f ) is the spectral density, and K is the number
of tapers. For fixed j, the sinusoidal tapers converge to the minimum
bias tapers like 1/N . Since the sinusoidal tapers have analytic expressions, no numerical eigenvalue decomposition is necessary. Both
the minimum bias and sinusoidal tapers have no additional parameter for the spectral bandwidth. The bandwidth of the jth taper is
simply N1 centered about the frequencies 2N±j+2 . Thus the bandwidth
of the multitaper spectral estimate can be adjusted locally by simply
adding
or deleting tapers. The band limited spectral concentration,
Rw
|V
(f
)|2 df , of both the minimum bias and sinusoidal tapers is very
−w
close to the optimal concentration achieved by the Slepian tapers. In
R 1/2
contrast, the Slepian tapers can have the local bias, −1/2 f 2 |V (f )|2 df ,
much larger than of the minimum bias tapers and the sinusoidal tapers.
∗
The authors thank D. J. Thomson and the referees for useful comments. Research
funded by the U.S. Department of Energy.
1
1
Introduction
We consider a stationary time series, {xn , n = 1 . . . N } with a spectral density, S(f ). A common estimator of the spectral density is to smooth the
square of the discrete Fourier transform (DFT) locally:
L
X
1
j
Ŝ(f ) =
|y(f + )|2 ,
(2L + 1)N j=−L
N
(1)
where y(f ) is the Fourier transform (FT) of the stationary time series:
PN
−i2πnf
y(f ) ≡
. Since (1) is quadratic in the FT, y(f ), it is
n=1 xn e
natural to consider a more general class of quadratic spectral estimators. We
examine quadratic estimators where the underlying self-adjoint matrix has
rank K, where K is prescribed. Using the eigenvector representation, the
resulting quadratic spectral estimator can be recast as a weighted sum of K
orthonormal rank one spectral estimators. This class of spectral estimators
was originally proposed by Thomson [19] under the name of multiple taper
spectral analysis (MTSA). We refer the reader to [3, 8, 11, 12, 16, 18, 19] for
excellent expositions and generalizations of Thomson’s theory.
In MTSA, a rank K quadratic spectral estimate is constructed by choosing an orthonormal family of tapers/spectral windows and then averaging
the K estimates of the spectral density. In practice, only the Slepian tapers
(also known as discrete prolate spheroidal sequences [17]) are routinely used
for MTSA.
In the present paper, we propose and analyze two new orthonormal families of tapers: minimum bias (MB) tapers
and sinusoidal tapers. The MB
R 2
tapers minimize the local frequency bias, f |V (f )|2 df , subject to orthonormality constraints, where V (f ) is the DFT of the taper. For continuous time,
the MB tapers have simple analytic expressions. The first taper in the family is Papoulis’ optimal taper [9]. For discrete time, the MB tapers satisfy a
selfadjoint eigenvalue problem and may be computed numerically.
(k)
In the
q case of discrete time, we define the kth sinusoidal taper, v , as
vn(k) = N2+1 sin Nπkn
, where N is the sequence length. The sinusoidal tapers
+1
are an orthonormal family that converge to the MB tapers with rate 1/N as
N → R∞. These results are given in Section 3. Section 4R compares the local
1/2
w
bias, −1/2 f 2 |V (f )|2 df , and the spectral concentration, −w
|V (f )|2 df , of the
MB tapers, the sinusoidal tapers and the Slepian tapers.
2
In Section 5, we show that the quadratic spectral estimator which minimizes the expected square local error is weighted multitaper estimate using
the MB tapers. A local error analysis is given and the optimal number of
tapers is determined. At frequencies where the spectral density is changing rapidly, fewer tapers should be used. In Section 6, we show that kernel
smoother spectral estimates [4, 10] are multitaper estimates and we show
that smoothing the logarithm of the multitaper estimate significantly reduces the variance in comparison with smoothing athe logarithm of a single
taper estimate. We also describe our data adaptive method for estimating
the spectrum. In Section 7, we apply our spectral estimation techniques to
real data and show that our tapers outperform the Slepian tapers whenever
a variable bandwidth is needed. In the Appendix, we show that the leading
principal components of kernel smoother spectral estimates resemble the MB
tapers.
2
Quadratic Estimators of the Power Spectrum
Let N discrete measurements, x1 , x2 , . . . , xN , be given as a realization of
a stationary stochastic process. We normalize the time interval between
measurements to unity. The Cramer representation of a discrete stationary
stochastic process [4, 12] is
x(t) =
Z 1/2
e2πinf dZ(f ) ,
−1/2
where dZ has independent spectral increments: E[dZ(f )dZ(g)] = S(f )δ(f −
g)df dg. We assume that the spectral density, S(f ), is twice continuously
differentiable.
The spectral inverse problem is to estimate the spectral density, S(f ),
given {xn }. As shown in [3, 8], every quadratic, modulation-invariant power
spectrum estimator has the form:
b )
S(f
=
N
X
qnm e2πi(m−n)f xn xm ,
(2)
n,m=1
where Q = [qnm ] is a symmetric matrix of order N and does not depend on
frequency. Consider the eigenvector decomposition: Q =
3
PK
k=1
µk v(k) v(k)
T
,
where K is the rank of Q , and v(1) , v(2) , . . . , v(K) is an orthogonal system
of eigenvectors. The multitaper representation of the quadratic spectral estimator is
b )
S(f
=
K
X
µk
N
X
2
vn(k) xn e−2πinf
.
(3)
n=1
k=1
In the case K = 1, estimator (3) turns out a tapered periodogram estimator:
Sbv (f ) =
N
X
2
vn xn e
−2πinf
,
(4)
n=1
with a taper v = (v1 , v2 , . . . , vN )T . If the tapering is uniform (i.e. v1 = v2 =
. . . = vN = √1N ), we name (4) the periodogram estimator. The estimator (3)
is a linear combination of K orthogonal tapered periodogram estimators. In
MTSA, K is normally chosen to be much less than N . The multiple taper
spectral estimate can be thought of as a low rank, “principal components”
approximation of a general quadratic estimator. Multiple taper analysis has
also been applied to nonstationary spectral analysis [13, 1].
In practice, one does not begin the analysis with a given quadratic estimator, Q . Instead, one usually specifies a family of orthonormal tapers
{v(1) , . . . , v(K) } with desirable properties. Previously, only the family of
Slepian tapers were used in practice. The goal of this article is to introduce other families of tapers.
We define the kth spectral window, V (k) , to be the FT of the kth taper:
V (k) (f ) =
N
X
vn(k) e−i2πnf .
(5)
n=1
The tapers are normally chosen to have their spectral density localized near
zero frequency. We define two common measures
of frequency localization.
R 1/2 2
The local bias of a spectral window V is −1/2 f |V (f )|2 df . The term
“local bias” is used because it is proportional to the leading order term in
the bias error of a taper estimate as N → ∞.
Rw
The spectral concentration in band [−w, w] is defined as −w
|V (f )|2 df .
The bandwidth, w, is a free parameter. The Slepian tapers are the unique sequences which maximize the spectral concentration subject to the constraint
that they form an orthonormal family. Detailed analysis of the Slepian sequences is given in [17]. We stress that the Slepian tapers depend on the
4
bandwidth parameter, w, and that the first 2N w spectral windows are concentrated in the band [−w, w] while the remaining windows are concentrated
outside.
3
3.1
Minimum Bias Tapers
Continuous Time Case
We consider time-limited signals; the time interval is normalized to [0, 1]. In
theR time domain, the taper ν(t) is a function in L2 [0, 1] which we normalize
to 01 ν 2 (t)dt = 1. The functions {sin(πkt), k = 1, 2, . . .} form a complete
orthogonal basis on [0, 1]. (Completeness can be proven by extending ν(t)
to be an odd function on [−1, 1] and using the completeness of the complex
exponentials on [−1,R 1]. See [5].)
P
to
Setting ak = 2 01 ν(t) sin(πkt)dt, then K
k=1 ak sin(πkt)dt converges
P
2
a
ν(t) in L2 [0, 1] as K → ∞. The taper normalization is equivalent to 21 ∞
k=1 k =
1. The Fourier transform of the taper is the complex-valued, spectral window
function:
Z 1
ν(t)e−i2πf t dt .
(6)
V (f ) =
0
V (f ) is defined
on the frequencyR domain [−∞, ∞], belongs to L2 [−∞, ∞],
R∞
and satisfies −∞ |V (f )|2 df = 2π 01 ν 2 (t)dt = 2π.
The local bias of a taper spectral estimate [4, 9, 10] is
S 00 (f ) Z ∞
|V (h)|2 h2 dh .
2
−∞
−∞
(7)
We consider tapers which minimize the leading order term:
b )]−S(f ) =
E[S(f
Z ∞
−∞
Z ∞
2 2
|V (g−f )|2 (S(g)−S(f ))dg ≈
|V (f )| f df =
Z 1
0
!2
∞
1 d X
ak sin(πkt)
2π dt k=1
∞
1Z 1 X
=
ak k sin(πkt)
4 0 k=1
dt
!2
dt =
∞
1X
a2 k 2 .
8 k=1 k
(8)
The last expression attains the global minimum when a21 = 2, a2 = a3 =
. . . = 0. Hence,
√ the leading order term in the bias expression (7) is minimal
for the taper 2 sin(πt) (This result was obtained by Papoulis [9]). In [9],
Papoulis extends ν(t) to be zero outside of (0, 1), and therefore has a Fourier
5
integral representation of ν(t). We have extended ν(t) to be periodic and
vanish at each integer value. Since ν(t) is optimized for t ∈ [0, 1], both
representations are valid.
Equation (8) implies the more general result:
√
Theorem 3.1 vk (t) = 2 sin(πkt) (k = 1, 2, . . .) is the only system of functions in L2 [0, 1] which satisfy the requirements:
(i)
R1 2
v (t)dt
0
k
= 1, and
∞
(ii)
vk minimizes −∞
|V (k) (f )|2 f 2 df in the subspace of functions orthogonal to v1 , . . . , vk−1 .
R
The kth minimum value is
R∞
−∞
|V (k) (f )|2 f 2 df =
k2
4
.
√
We name vk (t) = 2 sin(πkt) (k = 1, 2, . . .) the continuous time minimum
bias tapers. The Fourier transform of vk (t) is
h
k
k
e−iπ(f − 2 ) sin π f − 2
(k)
√
V (f ) =
i 2 π f − k2
f − k−1
2
= e−iπ(
i
h
− (−1)
sin π f +
k
k
2
π f+
k
2
i
k 2 sin πf − πk
2
)·
2 .
√
k
4 2π f 2 − 2
Thus, |V (k) (f )| decays as f −2 for large frequencies.
3.2
Discrete Time Case
We now consider the discrete time domain {1, 2, . . . , N } with the corresponding normalized frequency domain [− 12 , 12 ]. A taper is a vector, ν =
P
2
(ν1 , . . . , νN ), normalized by N
n=1 (νn ) = 1. By the same argument as in the
previous section, the leading order term of the bias of a taper spectral estiR1
mate is proportional to the local bias, −2 1 |V (f )|2 f 2 df , where the frequency
2
window, V (f ), is defined in Eq. (5).
Lemma 3.2 For the frequency window of a discrete time taper,
Z
1
2
− 12
|V (f )|2 f 2 df = ν A ν
6
∗
,
where A = [anm ] with
anm =
Z
1
2
− 12
( 1
i2π(n−m)f
e
2
f df =
if n = m ;
if n 6= m .
12
(−1)n−m
2π 2 (n−m)2
Corollary 3.3 The tapers ν (1) , ν (2) , . . . , ν (N ) , defined by the requirements
(i)
PN
(ii)
ν (k) minimizes
(k) 2
n=1 (νn )
orthogonal to
= 1,
R
1
2
− 12
|V (k) (f )|2 f 2 df in the subspace of vectors
ν (1) , . . . , ν (k−1) ,
are the eigenvectors of the matrix A sorted in the increasing order of the
R1
eigenvalues. The integral −2 1 |V (k) (f )|2 f 2 df is equal to the kth eigenvalue.
2
We name ν (1) , ν (2) , . . . , ν (N ) the discrete minimum bias tapers. They
can be approximated by the sinusoidal tapers, v(1) , v(2) , . . . , v(N ) , which are
discrete analogs of the continuous time minimum
bias tapers. Namely, we
q
(k)
(k) T
2
(k)
(k)
define v = (v1 , . . . , vN ) with vn = N +1 sin Nπkn
, k = 1, 2, . . . , N .
+1
Lemma 3.4 The sinusoidal tapers, v(1) , v(2), . . . , v(N ) , form an orthonormal
k2
1 + O( N1 ) .
basis in RN and the local bias of v(k) is 4N
2
Corollary 3.5 The multitaper estimate (3) using K sinusoidal tapers has
P
k2
K2
local bias equal to K
k=1 µk 4N 2 + O( N 3 ) and has the following representation:
Ŝ(f ) =
K
X
µj
j
j
|y(f +
) − y(f −
)|2 .
2(N
+
1)
2N
+
2
2N
+
2
j=1
The uniformly weighted estimate, µk =
2
O( K
).
N3
1
,
K
has local bias equal to
(9)
K2
12N 2
+
From (9), the reason for the low bias of the sinusoidal tapers is apparent:
the frequency sidelobe from y(f + 2Nj+2 ) cancels the sidelobe of y(f − 2Nj+2 ).
As a result, the sidelobe of y(f + 2Nj+2 ) minus y(f − 2Nj+2 ) is much smaller
than that of the periodogram.
Our preferred weighting is the parabolic weighting: µj = C(1 − j 2 /K 2 )
because the parabolic weighting minimizes the expected square error in kernel
smoothers as K and N tend to infinity. Since the weights decrease smoothly
to zero, the resulting estimate is smooth in frequency.
7
Corollary 3.6 The uniformly weighted multitaper estimate using K sinusoidal tapers can be computed in O(N ln N ) + O(KN ) operations while the
generic multitaper estimate requires O(KN ln N ) operations plus the cost of
computing the K tapers.
The following
result demonstrates
that the kth
i h
i spectral window is conh
k+1
k−1
k+1
k−1
,
,
−
∪
−
.
centrated on 2(N
+1) 2(N +1)
2(N +1)
2(N +1)
Corollary 3.7 The Fourier transform of v(k) equals
h
V (k) (f ) =
k
e−iπ((N +1)f − 2 ) sin N π f −
k
2(N +1)
i
h
i
sin N π f + 2(Nk+1)
k
h
i − (−1)
h
i
q
sin π f + 2(Nk+1)
i 2(N + 1) sin π f − 2(Nk+1)
(N +1)f − k−1
2
= e−iπ(
sin Nπk
+1
)·q
h
·
2
2(N + 1) sin (πf ) −
i
πk
2
2
πk
sin 2(N +1)
sin (N + 1)πf −
.
q
Thus |V (k) (f )| = N2+1 for |f | = 2(Nk+1) , and |V (k) (f )| ∼ N 13/2 for f =
πk
1
O(1). In particular, |V (k) (f )| ≈ √2N
3/2 when f → 2 . In the intermediate
frequencies, 2(Nk+1) < f 12 , |V (k) (f )| decays as f12 .
Numerical evaluation (see Table 1) shows that kv(k) − ν (k) kL2 < 4(Nk+2)
(k)
− k νν(k) k
L∞
k
. (k·kL∞ is the supremum norm in the time domain.) Figure 1 plots the
2(N +2)
envelopes of |V (k) (f )|2 for both the minimum bias and sinusoidal tapers with
N = 200, k = 1. The spectral energy of both tapers is nearly identical for
|f | < .25. Near the Nyquist frequency, the spectral energy of the sinusoidal
taper is roughly three times larger than that of the minimum bias taper. In
the time domain, the sinusoidal tapers are virtually indistinguishable from
the MB tapers.
for all k. The same rate of convergence is observed in L∞ norm:
4
v(k)
kv(k) kL∞
Comparison of Spectral Localizations
We now compare the local bias and the spectral concentration of three families of orthonormal tapers: minimum bias (MB) tapers, sinusoidal tapers
and Slepian tapers. Both the local bias and the spectral concentration of the
8
<
L∞
Slepian tapers depend on the bandwidth parameter, w. For properties of the
Slepian tapers, we refer the reader to [12, 16, 17, 18, 19].
Since the MB tapers minimize the local bias, clearly the sinusoidal tapers
and the Slepian tapers have larger local bias. The only question
is whether
R 1/2 2 (k)
P
(f )|2 df ,
the difference is large or small. Table 2 gives the local bias, K
k=1 −1/2 f |V
of the three families of tapers for N = 50. The sinusoidal tapers come within
0.2% of achieving the optimal local bias. In contrast, the local bias of the
Slepian tapers can be many times larger.
We compute the local bias for three different values of the bandwidth, w.
The general pattern is that the kth Slepian taper has roughly the same local
bias as the MB taper does when N w < k < 2N w. The ratio of the local bias
of the Slepian tapers to that of the MB tapers is smallest at k ≈ 1.2N w. As
|k − 1.2N w| increases, the local bias rapidly departs from the optimal value.
Table 3 compares the spectral concentration of the tapers for N = 50 and
w = .08 . Both the MB tapers and the sinusoidal tapers are within 1.7% of
the optimal value, except for k = 8,R 9. Notice that 2N w = 8. Although the
w
ratio of the spectral concentration, −w
|V (f )|2 df , for the MB and sinusoidal
tapers to that of the Slepian tapers is usually very close to one, the ratio of
the spectral energy outside of the frequency
band |f | < w can be
quite large.
Rw
Rw
2
Thus our conclusions depend on using −w |V (f )| df and not 1− −w |V (f )|2 df
as the measure of frequency concentration.
Figures 1-3 compare |V (k) (f )|2 of the Slepian and MB tapers for N = 200.
For Figures 1 and 2, we select the Slepian parameter, w, equal to .01 so that
K = 2N w equals four. Figure 2 plots |V1 (f )|2 for the frequencies up to
f = 0.14. The central peak of the MB taper is more concentrated around
f = 0 than the Slepian taper is. The first sidelobe of the MB taper is visible
while the first Slepian sidelobe is much smaller.
Figure 1 plots the logarithm of |V1 (f )|2 over the entire frequency range.
The MB taper has smaller range bias in the frequency range |f | < 0.3w and
in the frequency range |f | > 0.13. In the middle frequency range, the Slepian
taper is clearly better. The Slepian penalty function maximizes the energy
inside the frequency band, [−w, w], and thus it is natural that the Slepian
tapers do better for f ∼ w. By using a discontinuous penalty function, the
Slepian spectral windows experience Gibbs phenomenon and decay only as
1
, (|V (f )|2 ∼ f12 ). The MB spectral windows decay as f12 , and thus, it is
f
natural that the MB tapers have lower bias for f ∼ O(1).
P
Figure 3 plots 3k=1 |V (k) (f )|2 for |f | < 0.14 and on this scale, the MB
9
tapers are clearly preferable to the Slepian tapers. For larger frequencies, the
P
(k)
(f )|2 , is very similar to Fig. 2
energy of the multitaper estimate, K
k=1 |V
on the logarithmic scale provided that K << N .
In summary, the sinusoidal tapers perform nearly as well as the MB tapers
while the Slepian tapers have several times larger local bias (except when
k ≈ 1.2N w). For k 2N w, the Slepian tapers have better broad-band bias
protection than the minimum bias tapers do. For k ∼ 2N w, the minimum
bias tapers provide both smaller local bias and better broad-band protection
due to the Gibbs phenomena which the Slepian tapers experience.
5
Local Error Analysis and Optimal Multitapering
We now give a local error analysis of MTSA and determine the optimal
number of tapers. Our results are the multitaper analog of the local error
analysis of the smoothed periodogram [4, 10]. We assume the time series is
a Gaussian processes and do not consider frequencies near f = 0 and f =
1/2. In this case, the variance of the multitaper estimate is approximately
P
2
Variance[Ŝ(f )] ≈ S(f )2 K
k=1 µk due to the orthonormality of the tapers
Asymptotically, the local bias of the multitaper estimate of Eq. (3) is
Bias[Ŝ] = S(f )
K
X
1
λk µk ,
µk − 1 + S 00 (f )
2
k=1
k=1
K
X
!
R 1/2
where λk = −1/2 f 2 |V (k) (f )|2 df . The second term is the MT generalization
P
of (7). When K
µ 6= 1, the MT estimate has bias even in white noise.
k=1
P k
When we require K
k=1 µk = 1, the local expected loss simplifies:
Theorem 5.1 For a Gaussian process, away from f = 0 and f = 1/2, the
P
expected square error of the multitaper spectral estimate (3) with K
k=1 µk = 1
is asymptotically (to leading order in K/N )
"
2
Bias + Variance ≈
K
X
1 00
S (f )
λk µk
2
k=1
#2
+ S(f )2
K
X
µ2k .
(10)
k=1
Theorem 5.2 The multitaper estimate which minimizes the local loss (10)
(with µk ≥ 0) is constructed with the minimum bias tapers.
10
Proof: We order the µk such that µ1 ≥ µ2 ≥ . . . ≥ µK and define µK+1 =
P
∗
0. Since the weights, µk are fixed, we need to minimize K
k=1 µk uk A uk
over all sets of K orthonormal tapers, u1 , . . . , uK . We split the series in K
subseries and minimize each subseries separately:
min
u1 ,...,uK
K
X
µk uk A u∗k =
min
u1 ,...,uK
k=1
K
X
≥
K
X
(µk − µk−1 )
K
X
uj A u∗j
k
X
(k)
(µk − µk−1 ) min
(k)
(k)
u1 ,...,uk
(µk − µk−1 )
k
X
(k)∗
uj A uj
j=1
K
X
λA,j =
j=1
k=1
j=1
k=1
k=1
=
k
X
µk λA,j , (11)
k=1
where the λA,j are the eigenvalues of A , given in increasing order. The
(k)
(k)
(k)
uj are subject to orthonormality constraints that uj · uj 0 = δj,j 0 , but are
otherwise independent and minimized separately. In the last line of (11), we
P
P
(k)
(k)∗
use Fan’s Theorem [6]: minu(k) ,...,u(k) kj=1 uj A uj = kj=1 λA,j , where the
1
k
(k)
uj
are again subject to orthonormality constraints. The theorem is now
proved because the MB tapers are precisely the eigenvectors of A .
Theorem 5.3 The uniformly weighted multitaper estimate using K sinusoidal tapers has an asymptotic local loss of
"
2
Bias + Variance '
S 00 (f )K 2
24N 2
#2
+
S(f )2
.
K
(12)
Corollary 5.4 The asymptotic local loss of (12) is minimized when the number of tapers is chosen as
12S(f )N 2
∼
S 00 (f )
"
Kopt
#2/5
.
(13)
Thus, the optimal number of tapers is proportional to N 4/5 and varies
with the ratio of S(f ) to S 00 (f ). Intuitively (13) shows that fewer tapers
should be used when the spectrum varies more rapidly. A key advantage
of the MB and sinusoidal tapers is that the tapers need not be recomputed
as K is changed. In contrast, the Slepian tapers are most efficient when
the bandwidth parameter, w, is chosen such that K ∼ 2N w. Thus, when
the number of tapers is changed, as in (13), the Slepian tapers should be
recomputed.
11
6
Smoothed Multitaper Estimates
In our own comparison of kernel smoothing and multitaper estimation [16],
we found that a smoothed multiple taper estimate worked best. We now
evaluate the expected error of the kernel smoothed multitaper estimator and
show that smoothing the logarithm of the multitaper estimate is useful for
estimating the logarithm of the spectrum.
We begin by evaluating that the quadratic estimator (2) which is equivalent to a kernel smoother estimates of the spectrum [4, 10]. Let Ŝ(f ) be
the quadratic spectral estimator (2), and smooth it with a kernel κ(·) of
halfwidth w :
Z w
g b
bb
+ g)dg ,
(14)
S(f ) =
κ( )S(f
w
−w
where w is the bandwidth parameter and κ(·) is a kernel smoother with
domain [−1, 1]. This can be rewritten as
b ) =
S(f
b
N
X
q̃ nm ei2π(m−n)f xn xm ,
(15)
n,m=1
w
where q̃ nm = qnm κ̂m−n with κ̂m = −w
κ(g/w)e2πimg dg. Thus smoothing replaces the original quadratic estimator with matrix [qnm ] by another
quadratic estimator with matrix Q̃ = [q̃ nm ]. By Theorem 5.2, this hybrid
method cannot outperform the pure multitaper method with minimum bias
tapers.
We now show that combining kernel smoothing with multitapering does
improve the estimation of the logarithm of the spectral density, θ(f ) =
log[S(f )]. One standard approach is to kernel smooth the logarithm of the
tapered periodogram. This approach has the disadvantage that |y(f )|2 has a
χ22 distribution and log[χ22 ] has a long lower tail of its distribution. As a result, log[|y(f )|2 ] has an appreciable bias and its variance is inflated by π 2 /6.
A common alternative is to estimate the spectrum either by kernel smoothing
or by multitapering and then to take logarithms. This approach has the disadvantage that the smoothed spectral estimate tends to be more sensitive to
nonlocal bias effects than the corresponding smoothed log-spectral estimate.
To robustify the log-spectral estimate while reducing the variance inflation from the long tail, we propose the following hybrid estimate: 1) compute
the multitaper estimate using the sinusoidal tapers with µk = K1 and then
2) smooth θ̂M T (f ) ≡ ln[ŜM T (f )] − BK /K, where BK is the bias of ln[χ22K ].
R
12
(BK ≡ ψ(K) − ln K where ψ(K) is the digamma function). For white noise,
the variance of θ̂M T (f ) = ψ 0 (K)∼ K1 + 2K1 2 , so the variance enhancement
from the logarithm tends rapidly to zero.
In [15], we show that the asymptotic error for this scheme is
K2
bk w 2 +
24N 2
"
00
θ (f )
2
#2
1
Cκ
1+
+
Nw
2K
2
,
(16)
where bκ and Cκ are constants which depend on the kernel shape. In (16), we
assume uniformly weighted sinusoidal tapers are used and 1 K N w. In
1
) is the variance enhancement from the logarithmic
(16), one factor of (1 + 2K
1
transformation and one factor of (1 + 2K
) arises in the variance calculation
of (15) with sinusoidal tapers. Optimizing (16) with respect to both w and
K yield w ∼ N −1/5 and K ∼ N 8/15 , thus the smoothing halfwidth w is much
larger than K/N . The expected error (16) depends weakly on K provided
that 1 K N w.
For simplicity, we set K = N 8/15 and optimize (16) with respect to the
halfwidth w. The resulting halfwidth depends on θ00 (f ): wopt (θ00 (f )) with
wopt ∼ |θ00 (f )|−2/5 N −1/5 . Thus when the log-spectrum varies rapidly, the
halfwidth should be reduced as |θ00 (f )|−2/5 .
Since θ00 (f ) is unknown, we consider two stage estimators which begin by
making a preliminary estimate of θ00 (f ) prior to estimating θ(f ). We then
insert the estimate θ00d
(f ) into the expression for wopt : w(f ) = wopt (θc00 (f )) and
use a variable halfwidth kernel smoother with halfwidth ŵ(f ) to estimate
θ(f ). Multiple stage kernel estimators are described in [2, 7, 13, 14, 15].
These multiple stage schemes have a convergence rate of N −4/5 and have a
relative convergence rate of at least N −2/9 . A more detailed description is
given in [2, 13, 15].
7
Application
We now compare spectral estimates on an actual data series. We use the
microwave scattering data set which is described in [16]. The data measures
turbulent plasma fluctuations in the Tokamak Fusion Test Reactor at Princeton. The spectrum is dominated by a 1 MHz peak which is quasicoherent.
The spectral density varies by over five orders of magnitude.
13
The bias versus variance trade-off of Sec. 5 shows that fewer tapers should
be used near the peak. To make the spectral estimate smooth, a parabolic
weighting of the tapers is used as described in Sec. 3. To determine how
many tapers to use locally, we use the multiple stage “plug-in” method as
described in the previous section; i.e. we determine the number of tapers
using a pre-estimate on the same data. To reduce the fluctuations from the
estimate of the optimal number, we use a longer data segment to determine
the number of tapers at each frequency. We find the optimal number of
sinusoidal tapers is roughly 24 for frequencies in the 200 to 800 kHz range.
Near the 1 MHz peak, as few as 12 tapers are used to minimize the local bias
error. Between 1300 and 2400 kHz, the spectrum is flatter and we use up to
40 tapers.
The dotted line is the sinusoidal multitaper estimate, and the solid, more
wiggly, curve is the corresponding Slepian estimate using 24 tapers with
w = 60 kHz. The 1 MHz peak is poorly resolved in the Slepian estimate, and
the regions of high curvature are artificially flattened. For f ≥ 1.5 MHz, the
Slepian estimate is artificially bumpy due to statistical noise. The variable
taper number estimate suppresses these bumps by averaging over a larger
frequency halfwidth. We have also used a variable taper number estimate
with the Slepian tapers. Since the Slepian parameter, w was fixed at 100 kHz
to allow for forty tapers, the artificial broadening was even more exreme.
Comparing with a converged estimate of the spectrum based on N =
45, 000 shows that the sinuosidal taper estimate is more accurate. Another
significant difference is that the Slepian multitaper estimate requires much
more CPU time than the sinusoidal multitaper estimate.
8
Conclusion
We have
q proposed and analyzed the minimum bias and the sinusoidal tapers,
(k)
, for multitaper spectral estimation. The resulting sinuvn = N2+1 sin Nπkn
+1
j
soidal multitaper spectral estimate is Ŝ(f ) = 2K(N1 +1) K
j=1 |y(f + 2N +2 ) −
y(f − 2Nj+2 )|2 . The sinusoidal tapers have low bias because the frequency
sidelobe from y(f + 2Nj+2 ) cancels the sidelobe of y(f − 2Nj+2 ).
P
R 1/2
The minimum bias tapers minimize the local bias, −1/2 f 2 |V (k) b(f )|2 df ,
and have good broad-band bias protection as well. Asymptotically, the
quadratic spectral estimate which minimizes the expected local square er14
ror is a multiple taper estimate using the minimal bias tapers.
The sinusoidal tapers have
a simple analytic form and approximate the
minimum bias tapers to O N1 . The kth sinusoidal taper has its spectral
k+1
k−1
≤ |f | ≤ 2(N
.
energy concentrated in the frequency bands 2(N
+1)
+1)
The minimum bias and sinusoidal tapers have no auxiliary bandwidth parameter, and the bandwidth of the spectral estimate is determined solely by
the number of used tapers. By adaptively adding and deleting tapers, a multitaper estimate with the optimal convergence properties of kernel smoothers
can be constructed. In contrast, the Slepian tapers need to be recomputed
with a different bandwidth. Thus the Slepian tapers are only practical for
fixed bandwidth estimation and this is inherently inefficient.
9
Appendix: Multitaper decomposition of kernel estimates
In Sec. 6, we showed that kernel smoother estimators (14) have an equivalent
multitaper representation (3) We now show that the equivalent multitapers
of some popular kernel smoother estimates of the spectrum strongly resemble
the MB/sinusoidal tapers. In one special case, this corresondence is exact;
i.e. the smoothed periodogram can be exactly decomposed into MB tapers.
Theorem 9.1 Let w = 21 and κ(f ) be the parabolic kernel, κ(f ) = 23 − 6f 2 .
The eigenvectors of the kernel smoothed periodogram are exactly the discrete
minimum bias tapers.
Proof: The Q̃ matrix in (15) can be calculated explicitly for this case.
We find Q̃ = [bnm ] = N1 ( 32 I − 6A ) where A is the matrix from Lemma 3.2.
Thus Q̃ and A have the same eigenvectors.
To illustrate that this result is typical even when we apply a taper and
smooth over a small band, we consider a smoothed tapered periodogram
with N = 200. We use Tukey’s split-cosine taper [16] and then smooth the
estimate with a square box kernel with a halfwidth of .01. We then evaluate
the corresponding Q̃ matrix and compute its eigenvectors. Figure
q 5 displays
the first 4 eigenvectors. They are very close to the sinusoids N2+1 sin Nπkn
.
+1
Table 4 shows that this spectral estimate is virtually a K = 4 multiple taper
15
spectral estimate. After k > 4, the eigenvalues decrease sharply, and these
higher eigenvectors contribute very little to the overall estimate.
References
[1] M. Amin, “Optimal estimation of evolutionary spectra,”
I.E.E.E. Trans. on Signal Processing vol. 42, 2?, 1994.
[2] T. Brockman, Th. Gasser and E. Hermann, “Locally adaptive
bandwidth choice for kernel regression estimators,” J. Amer. Stat.
Assoc. 88, 1302-1309 (1994).
[3] T. P. Bronez, Nonparametric Spectral Estimation of Irregularly
Sampled Multidimensional Random Processes, PhD Thesis, Arizona State University, 1985.
[4] U. Grenander and M. Rosenblatt, Statistical Analysis of Stationary Time Series, New York: Wiley, 1957.
[5] A. N. Kolmogorov and S. V. Fomin, Reele Funktionen und Funktionalanalysis, Section 7.3.2, Berlin: VEB Deutscher Verlag der
Wissenschaften, 1975.
[6] A. W. Marshall and I. Olkin, Inequalities: Theory of Majorization
and its Applications, p. 511, New York: Academic Press 1979.
[7] H.-G. Müller and U. Stadtmüller, “Variable bandwidth kernel
estimators of regression curves,” Annals of Statistics, vol. 15, pp.
182-201, 1987.
[8] C. T. Mullis and L. L. Scharf, in Advances in Spectrum Analysis,
S. Haykin, Ed., New York: Prentice-Hall, 1990, Chapter 1, pp.
1-57.
[9] A. Papoulis, “Minimum bias windows for high resolution spectral
estimates,” IEEE Trans. Information Theory, vol. 19, pp. 9-12,
1973.
[10] E. Parzens, “On asymptotically efficient consistent estimates
of the spectral density of a stationary time series,” J. Royal
Stat. Soc., vol. 19, pp. 303-322, 1958.
16
[11] J. Park, C. R. Lindberg, and F. L. Vernon, “Multitaper Spectral
analysis of high frequency seismograms,” J. Geophys. Res., vol.
92B, pp. 12765-12684, 1987.
[12] D. Percival and A. Walden, Spectral Analysis for Physical Applications: Multitaper and Conventional Univariate Techniques.
Cambridge: Cambridge University Press, 1993.
[13] K. S. Riedel, “Optimal kernel estimation of evolutionary spectra,”
I.E.E.E. Trans. on Signal Processing vol. 41, 2439-2447, 1993.
[14] K.S. Riedel and A. Sidorenko, “Function estimation using data
adaptive kernel smoothers- How much smoothing?” Computers
in Physics vol. 8, 402-409, 1994.
[15] K. S. Riedel and A. Sidorenko, “Smoothed log-multitaper spectral estimation and data adaptive implementation,” submitted
for publication.
[16] K. S. Riedel, A. Sidorenko, and D. J. Thomson, “Spectral density
estimation for plasma fluctuations I: Comparison of methods,”
Physics of Plasmas vol. 1, pp. 485-500.
[17] D. Slepian, “Prolate spheroidal wave functions, Fourier analysis,
and uncertainty - V: the discrete case,” Bell System Tech. J., vol.
5, pp. 1371-1429, 1978.
[18] D. J. Thomson, “Spectrum estimation and harmonic analysis,”
Proc. IEEE, vol. 70, pp. 1055-1096, 1982.
[19] D. J. Thomson, “Quadratic inverse spectrum estimates: applications to paleoclimatology,” Phil. Trans. R. Soc. Lond. A, vol.
332, p. 539-597, 1990.
17
Table Captions:
Table 1: Convergence of the sinusoidal tapers toR the minimum bias tapers.
P
1/2
2 PK
2
(k)
(f )|2 df ,
Table 2: Normalized bias term, 4(N + 1)2 K
k=1 −1/2 f
k=1 f |V
for N = 50.
R w PK
(k)
(f )|2 df , for N = 50.
Table 3: Spectral concentration, −w
k=1 |V
Table 4: Eigenvectors of the smooth tapered periodogram estimator.
Figure Captions:
Figure 1: Spectral energy of the minimum bias, sinusoidal and Slepian tapers,
N = 200, k = 1, w = .01.
Figure 2: Spectral energy of theRminimum bias and sinusoidal tapers, N = 200, k = 1.
P
1/2
Figure 3 Spectral energy, 3k=1 −1/2 f 2 |V (k) (f )|2 df , of the minimum bias and
Slepian tapers, N = 200, K = 3, w = .01.
Figure 4: Estimated spectral density of the plasma fluctuations. Dashed
line is sinusoidal multitaper estimate and solid line is estimate using Slepian
tapers with w = 60 kHz. Because the Slepian tapers have a fixed bandwidth,
the corresponding estimate spectral density at 1 MHz is artificially broadened
while being undersmoothed for f ≥ 1.5 MHz.
Figure 6: First eigenvectors of the smooth tapered periodogram estimator.
18
19
20
21
22
23
24
Table 1. Convergence of the sinusoidal tapers to the minimum bias tapers
N
maxk
n
20
50
200
800
N +2
kv(k)
k
− ν (k) kL2
o
1
2
3
4
5
6
7
8
9
10
maxk
0.24750
0.24844
0.24852
0.24844
Table 2. Normalized bias term, 4(N + 1)2
N = 50
K
(
Minimum
bias tapers
1.0095
5.0475
14.1328
30.2846
55.5217
91.8634
141.3284
205.9362
287.7056
388.6562
Sinusoidal
tapers
1.0116
5.0580
14.1622
30.3475
55.6366
92.0528
141.6185
206.3570
288.2899
389.4409
w=0.04
1.3439
5.7724
18.0651
58.9520
154.4818
305.4382
496.7959
721.1743
976.5088
1262.4251
25
R 1/2
k=1 −1/2
PK
N +2
k
(k)
− k νν(k) k
L∞
0.4602
0.4760
0.4829
0.4844
v(k)
kv(k) kL∞
f 2 |V (k) (f )|2 df , for
Slepian tapers
w=0.08
w=0.16
2.6316
5.1039
10.5484
20.4670
23.8086
46.1953
42.5181
82.4018
66.9996
129.2087
99.1800
186.7507
150.0103
255.1797
251.8833
334.6717
437.5993
425.4379
702.1523
527.7433
)
L∞
Table 3. Spectral concentration,
k Minimum bias tapers
1
.9997
2
.9988
3
.9972
4
.9940
5
.9888
6
.9760
7
.9381
8
.6084
9
.1688
10
.0637
Rw
−w
|V (f )|2 df , for N = 50, w = 0.08
Sinusoidal tapers
.9997
.9988
.9972
.9937
.9887
.9753
.9417
.6247
.1780
.0624
Slepian tapers
1.
.9999999
.9999989
.99997
.9995
.9928
.9380
.7002
.2981
.0628
Table 4. Eigenvectors of the smooth tapered periodogram estimator
k
1
2
3
4
5
6
7
Weight of the eigenvector
Normalized local bias
R 1/2
λk (B)/tr(B)
4(N + 1)2 −1/2 f 2 |V (f )|2 df
.2856
.2828
.2519
.1416
.0340
.0037
.0002
1.5138
4.7371
9.6254
19.2095
33.7118
51.3616
72.9747
26
Local bias in comparison with
the minimum bias taper (ratio)
1.509
1.181
1.067
1.198
1.345
1.423
1.486
| 10math.ST
|
Human Detection for Night Surveillance using
Adaptive Background Subtracted Image
Yash Khandhediya
Electronics and Communication Department, L. D.
College of Engineering
[email protected]
Karishma Sav
Electronics and Communication Department, L. D.
College of Engineering
[email protected]
Vandit Gajjar
Electronics and Communication Department, L. D.
College of Engineering
[email protected]
Abstract – Surveillance based on Computer Vision has
become a major necessity in current era. Most of the
surveillance systems operate on visible light imaging, but
performance based on visible light imaging is limited due
to some factors like variation in light intensity during the
daytime. The matter of concern lies in the need for
processing images in low light, such as in the need of
nighttime surveillance. In this paper, we have proposed a
novel approach for human detection using FLIR (Forward
Looking Infrared) camera. As the principle involves
sensing based on thermal radiation in the Near IR Region,
it is possible to detect Humans from an image captured
using a FLIR camera even in low light. The proposed
method for human detection involves processing of
Thermal images by using HOG (Histogram of Oriented
Gradients) feature extraction technique along with some
enhancements. The principle of the proposed technique
lies in an adaptive background subtraction algorithm,
which works in association with the HOG technique. By
means of this method, we are able to reduce execution
time, precision and some other parameters, which result in
improvement of overall accuracy of the human detection
system.
of research being pedestrian detection. According to a
research done in 2015, researchers proposed many
techniques; at times a fusion of two or more; for the
purpose of feature extraction from an image. This
research also showed that the lowest miss rate achieved at
that time was of 22.49 % [1]. However, there are a very
few techniques proposed for nighttime surveillance. In
most of the systems proposed for Nighttime surveillance
for human detection, Thermal Imaging is the most
frequently used method, where the features required for
Human detection are extracted from thermal images.
Thermal imaging uses NIR (Near Infrared) band of
Infrared light, which ranges from (0.75 to 1.4 μm). Some
of the existing methodologies make use of thermal
cameras along with visible light cameras [2], by the
means of image fusion but that requires twice the amount
of hardware. On the other hand, some directly perform
the feature extraction on the thermal images reducing the
hardware but at the same time compromising with
accuracy.
The aim of this paper is to propose a technique, which
provides better accuracy and precision, while minimizing
the hardware and execution time requirements.
Keywords—Adaptive Background Subtraction, Human
Detection, Thermal, FLIR, Nighttime Surveillance,
Dynamic Image Processing
I.
INTRODUCTION
The contemporary human detection systems are used in
applications like Autonomous Vehicles, Headcounters,
Search and Rescue Operations, etc. but these surveillance
systems limit itself in night surveillance due to the use of
RGB cameras. As we know that, there are myriads of
applications like border surveillance, security purposes,
monitoring systems, anomaly or intruder detection, which
most seek a system capable of night surveillance.
Many researchers today have proposed efficient methods
of detecting humans from images, the most common area
II.
NEED OF PROPOSED METHOD
The conventional methods of Human Detection use RGB
imaging as input. However, for the application of Human
Detection in Nighttime Surveillance, we cannot use RGB
imaging as the input to our system because at nighttime
the amount of light intensity available is inadequate to
produce clear images. As a solution to this problem, the
proposed method makes use of an FLIR camera and
processes on thermal images; which produces clear
images irrespective of the amount of light intensity.
The most widely used feature extraction technique is
HOG, Histogram of Oriented Gradients[3]. In spite of
good performance of HOG, there also exist some
limitations. Firstly, using HOG in real time application is
1
not feasible due to large execution time. Secondly, the
output of HOG has high recall but low precision of this
output is a matter of concern. So we always have to use
some extra filtering or feature extracting technique to
enhance the performance of the HOG.
The output of the HOG Feature Extraction block is then fed to
Linearly Trained SVM, which generates the prediction Matrix.
The prediction matrix when multiplied with the input image
provides us with the desired output. The results for this
algorithm are summarised in Fig. 2.
Another technique, which is used in for Human
Detection, is background subtraction from current image.
This technique can be used to enhance the performance of
HOG, as only background subtraction has the capability
to detect anomalies in a scene. But this technique is
currently only applicable to images from a static camera.
On the other hand, the proposed technique will be
applicable to images from dynamic cameras. As proposed
in our technique, a fused image is created using the
original image and the background subtracted image and
the performance of HOG on fused image improves
significantly as compared to when applied on the original
image.
Another improvement proposed by our technique is
adaptive background subtraction for dynamic camera. We
have used FLIR camera in capturing images. FLIR
cameras do not provide a wide-angle view. We can use a
number of cameras to solve this problem but it will not be
cost effective and the system would become more
complex as it would also need synchronization between
all the cameras. Therefore, to increase the span, the
camera is made to rotate to cover a broader area.
III.
Figure 2 Results for Static Camera
PROPOSED METHOD
The proposed method reduces the execution time taken
by HOG technique by means of Background Subtraction.
In the block diagram shown in Fig. 1, round blocks
represent our signals and rectangular blocks represent
functional blocks. Background Image, Input Image,
Background subtracted image are signals and Dynamic
background adaption block, Image Fusion Block, HOG
feature extraction block and linearly trained SVM block
are functional bocks. We will describe the algorithm
proposed by us for two different cases.
A. Static Camera: Constant Background Subtraction
For simplicity, first we have applied our algorithm on
thermal images taken from a static camera. The source
for these images is OTCBVS Benchmark Dataset
Collection [4]. In this case we have a single background
image which is subtracted from every image. After
background subtraction, the original image and the
background subtracted image are fused together; and then
HOG features are extracted from this fused image.
B. Dynamic
Camera:
Subtraction
Adaptive
Background
As we are using FLIR Cameras, we need the camera to be
moving to cover a wider angle. This requires an
altogether modified technique. Therefore, we need to
modify the algorithm, to work with dynamic cameras
with. The part of the block diagram in Fig. 1 shown in
Dotted lines is included to accommodate the input from a
dynamic camera. The purpose of this paper lies in the
design of the algorithm which accommodates a
dynamically changing background. This algorithm
corresponds to the proposed feature extraction technique
which will work effectively with dynamic camera
images. The working of this algorithm is summarised in
the Block Diagram in Fig. 3. However, the detailed
explanation and working of the algorithm is presented in
the Next Section. The images for experimentation are
taken from ETHZ Thermal Infrared Dataset [5].
Figure 3 Dynamic Background Adaptation Block
Figure 1 : Block Diagram for Proposed Algorithm
2
IV.
THE PROPOSED FEATURE : ADAPTIVE
BACKGROUND SUBTRACTION
The working principle of this feature is very simple yet
effective. As the problem arises due to a dynamic camera
whose background changes, the algorithm is designed to
shift a constant background by an amount, which is in
proportion with the rotation of the camera. The precise
working of this algorithm can be subdivided into two
parts for detailed analysis.
A.
Vectored Change Detection
In this part of the algorithm, we are firstly selecting a
particular region of the image, which has a specific object
very distinct in properties from its neighboring pixels;
i.e.; an object which does not blend into the background.
Also the object under consideration should be static with
respect to the background. To demonstrate this logic, let
us consider the image shown in Fig. 4.
Figure 5 Object under Consideration for Shifted Camera Image
|∆|=√∆x 2 + ∆y 2
is the magnitude of the difference
vector;
Arg(∆) = tan-1(∆y/∆x)
is the angle of the difference
vector.
Therefore, we now have a difference vector in terms of
magnitude and angle. The magnitude of the vector
represents the amount of shift while the angle represents
the direction of shift.
B.
Figure 4 Region and Object under Consideration for Initial Background
The outermost rectangle represents our image. The
innermost rectangle shaded with lines represents the
object under consideration, while the rectangle exterior to
the object under consideration represents our selected
region. The region is so selected that initially the object
under consideration is exactly at its center. Let the
coordinates of the object under consideration with respect
to the selected region be (x, y).
Let us now consider a second image, which can be an
input image for any arbitrary angle of rotation. The
Selected Region will remain same. Now the selected
region in this second input image will be scanned for the
Object under consideration. This will be done by taking a
window frame of the size of the object and moving this
frame in the entire Selected region. The error is
calculated for each frame and the window frame which
has the minimum error now becomes the new location of
our Object. To visualize the shift in the new image,
consider Fig. 5. Let the location of the object under
consideration in the input image be (x’, y’). If we
compare the two location coordinates of both the images,
we can get a difference vector which can be utilized to
determine the shift required in the background.
∆x = x’ – x
is the change in x coordinate;
∆y = y’ – y
is the change in y coordinate;
(∆x, ∆y) represent the difference vector coordinates,
where the magnitude and angle of the vector are as
described in the equations as follows:
Shifting Background Image
Now we know the magnitude and direction of shift of a
static object under consideration. Because it is a static
object, i.e. it does not move with respect to the camera,
the difference vector actually indicates a shift or
movement of the camera. As the object is static with
respect to the background, the shift of the background has
to be same as the shift in the object. Therefore, if we shift
the original background by this difference vector we will
have a shifted background. This phenomenon is clearly
depicted in Fig. 6.
Figure 6 Adapting Background to Dynamic Camera
Using the procedure explained above an algorithm is
created which can create Adaptive Backgrounds for
Subtraction from images taken from a Dynamic Camera.
An image taken from a dynamic camera is processed
using both constant backround subtraction and Adaptive
background subtraction and the output and original image
are as shown in Fig. 7.
3
Subtraction, for feature extraction from images taken
from a dynamic camera. The proposed feature has been
true to its necessity as it catered to the system by
increasing precision, allowing the camera some freedom
of movement and reducing the execution time of the
system.
VII.
ACKNOWLEDGEMENT
We would like to express our gratitude to Prof. Usha
Neelkantan, HOD of Electronics and Communication
Department. L. D. College of Engineering for her
constant support and motivation. We would also like to
thank Prof. Kinnar Vaghela for without his guidance we
might not have been able to complete our research
successfully.
Figure 7 Output Comparison between images processed using constant
background subtraction and Adaptive Background Subtraction
It is clearly visible that the proposed technique is more
efficient in extracting features as compared to the
available technique.
Table 1 Comparison of HOG, HOG with Background Subtraction and HOG
with Adaptive Background Subtraction for Static and Dyamic Cameras
Parameter
HOG
HOG+BS for
Static Camera
HOG + BS for
Dynamic Camera
HOG+ABS for
Dynamic Camera
Execution Time ( in
Seconds)
1768.29
23.0047
631.0068
478.0096
Precision
12.36%
83.11%
58.36%
76.09%
100%
100%
100%
100%
Recall
V.
RESULTS & COMPARISON
VIII.
For Comparison purposes, we have first detected humans
using only HOG feature Extraction and the results are
compared when HOG is used in association with
Background Subtraction and also with the results
obtained when HOG is used along with our proposed
technique.
[1] Benenson R., Omran M., Hosang J., Schiele B.
(2015) Ten Years of Pedestrian Detection, What
Have We Learned?. In: Agapito L., Bronstein
M., Rother C. (eds) Computer Vision - ECCV
2014 Workshops. ECCV 2014.
Various significant parameters are compared in Table 1.
The Recall is 100% in all the techniques, but we can see
that there is a drastic improvement in Precision. Also the
execution time is significantly reduced. The execution
time increases if we use a dynamic camera and the
precision also reduces but given the flexibility for
movement and coverage of greater angle of the scene is a
feasible trade-off.
VI.
REFERENCES
[2] Alex Leykin, Yang ran and Riad Hammoud,
“Thermal-Visible Video Fusion for Moving
Target Tracking and Pedestrian Classification”
In: Computer Vision and Pattern Recognition,
2007. CVPR '07.
[3] Shyang-Lih Chang, “Nighttime pedestrian detection
using thermal imaging based on HOG feature” In:
2011 International Conference on System Science
and Engineering.
[4] IEEE OTCBVS WS Series Bench Zhang, M.M,
Choi, J., Daniilidis, K., Wolf, M.T. & Kanan, C.
(2015) VAIS: A Dataset for Recognizing
Maritime Imagery in the Visible and Infrared
Spectrums. In: Proc of the 11th IEEE Workshop
on Perception Beyond the Visible Spectrum
CONCLUSION
In this paper, we have proposed a nighttime surveillance
system based on processing of thermal images taken from
a FLIR camera. In addition to this, we have proposed a
novel technique, named Adaptive Background
4
(PBVS-2015).
[5] ETHZ Thermal Infrared Dataset, ASL Datasets
5
| 1cs.CV
|
Semi-Automated Nasal PAP Mask Sizing using Facial Photographs
arXiv:1709.07166v1 [cs.CV] 21 Sep 2017
Benjamin Johnston, Alistair McEwan and Philip de Chazal
Abstract— We present a semi-automated system for sizing
nasal Positive Airway Pressure (PAP) masks based upon a
neural network model that was trained with facial photographs
of both PAP mask users and non-users. It demonstrated an
accuracy of 72% in correctly sizing a mask and 96% accuracy
sizing to within 1 mask size group. The semi-automated system
performed comparably to sizing from manual measurements
taken from the same images which produced 89% and 100%
accuracy respectively.
Index Terms— OSA, PAP, CPAP, neural networks, machine
learning, facial landmarking, telemedicine, sizing
I. I NTRODUCTION
Positive airway pressure or continuous positive airway
pressure (CPAP) therapy, seminally described by Sullivan et
al. in 1981 [1] is generally accepted as the gold standard
treatment for obstructive sleep apnoea (OSA) [2]. Positive airway pressure effectively treats OSA by providing a
pneumatic splint at the location of soft palate, preventing
collapse onto the pharynx and thus allowing the passage of
air to the lungs. PAP therapy is applied using a specially
manufactured device that consists 3 of main components:
a pressure generator, which is a highly sophisticated air
pump used to compress atmospheric air for delivery into the
pharynx; a mask which the patient wears over the nose and
/ or mouth to ensure the pressurised air is delivered to the
correct location and finally a humidifier unit.
The mask is a critical component of the PAP system as it is
the device that is in intimate contact with the patient and must
be capable of maintaining treatment pressure for the duration
of a night’s sleep. Other than potentially reducing treatment
efficacy, issues with mask performance are often immediately
noticeable for the patient such as uncomfortable air leaks
into the eye or visible red marks on the face caused by mask
rubbing during use. While incidents of side effects due to
mask usage vary, a number of studies have observed that
many patients experience difficulties using their mask [3].
Amfilochiou et al. reported incidences of mask leak and red
marks in 48% and 40% of participants [4]; Gay et al. noted
that mask interface issues are the most commonly reported
PAP related side effects [5].
Research supported by ARC grant FT110101098
Ben Johnston and Philip de Chazal are with the Sleep Research Group, Charles Perkins Centre, School of Electrical and Information Engineering, University of Sydney, Sydney, NSW, 2006,
Australia, (phone: +612 911 41528; e-mails: {ben.johnston,
philip.dechazal}@sydney.edu.au)
Alistair McEwan is with the School
Information
Engineering,
University
of
[email protected])
of Electrical and
Sydney,
(e-mail:
In the context of PAP therapy compliance, incidents of
device related side-effects such as mask leakage are not
inconsequential. Engleman in 1994 observed that patients
who experienced side effects used their PAP devices less
that those who did not [6]. More recently in 2003 Massie
and Hart, while studying differences between nasal and nasal
pillows mask types noted a negative correlation with the
occurrence of air leaks and sore eyes with CPAP usage [7].
These side effects often form a barrier to effective therapy
usage, particularly with new patients [8] being introduced to
PAP for the first time. It has been found that the first week
of therapy is critical in determining long term therapy use
patterns, as it is during this time a patient decides if they
are going to continue or abandon treatment [9], [10]. Given
these characteristics and that patients who swap their mask
due to poor fit or comfort problems are 7 times more likely to
discontinue therapy [11] it is critical that patients are issued
with the correct mask size and type on the first attempt.
A. Current Mask Sizing
While the exact details of sizing PAP masks varies between each of the manufacturers, there are two common
methods which are generally used amongst clinicians. One
process uses a fitting template provided by the manufacturer
such as that illustrated in Figure 1a. When using these
templates the patient places their nose within specific features
of the template and the clinician matches the appropriate size
with indications on the guide. The commonly used alternative
sizing methodology uses the experience and expertise of the
clinician to make the mask choice without the use of a guide.
This paper describes the potential use of a third, automated
method of PAP mask sizing with the aim of improving sizing
accuracy and reducing mask related side effects.
B. Potential Applications of Automated Sizing
Automated PAP mask sizing could provide significant benefit to new patients requiring PAP therapy who live in remote
or rural communities and have limited access to medical
services. Through the use of Home Sleep Tests (HST) an
OSA diagnosis can be issued without the patient leaving
the home. However in order to issue a PAP system with
appropriate mask an in-person consult (possibly requiring
hours of travel) is currently required. An automated sizing
system could enable the use of a telemedicine approach to
PAP consults. A patient would send a facial photograph to a
clinician who would use software to analyse the photograph
and automatically determine the correct mask size. The mask
would then be sent to the patient, thus avoiding an inperson visit. Such a system could also provide additional
benefit by reducing consult time and increasing the capacity
of a clinician to see more patients. In this study we have
developed a semi-automated PAP mask sizing system by
processing facial images.
II. I MAGE DATASET
The dataset used throughout this study comprised 251
facial images of male and female, PAP (49 samples) and nonPAP users that were collected in a variety of locations using
smartphone cameras. Care was taken during photography to
ensure the face was not obscured by glasses, hair or hats and
that the pose of the face was approximately parallel with
the smartphone. Participants had their the ALAR or nose
width (see Figure 1c) measured at the time of image capture
using vernier callipers. These nose width measurements were
applied against a sizing template for an Eson nasal PAP mask
manufactured by Fisher & Paykel (F&P) Healthcare (Figure
1a & Table I) to determine the ‘ground truth’ mask size for
each of the selected participants.
Each image in the set (e.g. Figure 1b) is a frontal photographic shot of the participant with an Australian 20 cent
piece placed on the forehead to provide an indication of
scale.
A. Size Overlap
The PAP mask industry provides a margin of overlap for
mask sizes as the means of determining the correct mask
size is not an exact science (see Section I-A). Those mask
users who fall within the boundary between two sizes will
achieve acceptable mask performance with either of the
adjacent mask sizes. This margin of acceptable error provides
some tolerance to mis-sizing. To reflect this situation in the
field, we applied a 2% tolerance to sizing decisions within
this study. For individuals whose ‘ground truth’ nose width
fell within 2% of a size boundary e.g 36.26 - 37.74mm
for a small / medium mask, the predicted mask size was
considered correct if either a small or medium mask is
predicted.
B. Data Pre-Processing
As nasal mask sizes are solely determined by the width of
a user’s nose, the nasal region of each image was extracted
in grayscale using the opencv implementation of the ViolaJones algorithm[12] and the pre-trained nose haarcascade
classifier provided with opencv (Stages 1 & 2 of Figure 2).
Each 200 × 150 image was unwrapped to form a data vector
(x ∈ R251×30000 ) and the two nasal landmark coordinates
were unwrapped to give a 4 element target vector (x ∈
R251×4 ). The x and y datasets were scaled and centered
between -1 and 1 by dividing by their respective maxima
and subtracting the resulting mean (Stage 3 Figure 2).
C. Manual Mask Sizing from the Images
(a) Eson sizing template
(b) Labelled image
In an attempt to determine the optimum performance that
could be achieved by the system, mask sizes were also
calculated manually using the labelled landmarks of the
test set facial photographs. The physical nose width was
calculated by dividing by the distance between the two
labelled landmarks (pixels) and the scale (pixels / mm) as
provided by the 20 cent piece. This physical measurement
was compared with Table I to determine the sizes referred
to as Manually Measured throughout this study.
D. Neural Network Architecture
(c) Illustration indicating ALAR Width
Fig. 1. Dataset (sample image used with permission from Priyanshu Gupta)
III. M ETHODS
Following data collection, the face from each image was
extracted using the opencv implementation of the ViolaJones algorithm[12] into a sub-image and resized to 512 x
512 pixels. The pixel locations of the left and right lateral
nasal walls were then manually identified and recorded for
each image. The scale of each image was recorded in pixels
/ mm using ImageJ (produced by the US National Institute
of Health) by measuring the number pixels that span the
diameter and dividing by the known diameter of the coin
(28.65mm).
As illustrated in Figure 2 the neural network stage used
during this study was a 3 layer architecture, consisting of an
input stage with 30000 inputs, a hidden layer with 40 hidden
units and an output layer with 4 units. The input and hidden
layers also possessed a bias unit. The hidden layer used
a tanh non-linearity activation function, while the output
Size
Small
Medium
Large
Too Large*
Lower Limit (mm)
0
37
41
45
Upper Limit (mm)
37
41
45
∞
TABLE I
F ISHER & PAYKEL E SON MASK SIZES . *N OT ACTUALLY A SIZE BUT IS
USED TO REPRESENT INDIVIDUALS WHO DO NOT FIT AN E SON MASK
Processing stages of the model
layer possessed a linear activation function. The weights
of both the hidden and output layers were initialised using
random values between -0.05 and 0.05. This architecture was
selected following a hyperparameter sweep that produced
optimal validation set performance using 40 training and 13
validation samples.
Once the network architecture was selected, leave-one-out
cross validation was used over the remaining 198 sample test
data set to evaluate the overall performance of the model.
Predicted Mask Sizes
Actual Mask Size
Fig. 2.
Small
Medium
Large
Too Large
Small
61
26
5
1
Medium
8
55
9
0
Large
1
3
21
1
Too Large
0
1
0
6
TABLE II
C ONFUSION MATRIX OF PREDICTED MASK SIZES ( USING THE NOSE
WIDTH FROM THE MEAN TEST SET LANDMARKS )
E. Forward & Back Propagation
F. Weight Updates
Following backpropagation, the weights at each of the
layers of the neural network were updated to reflect their
respective contributions to the error. For the output layer
using a linear activation function, the optimal weights were
determined using the Moore-Penrose pseudo-inverse [15].
The updates to the hidden layer weights were calculated
using the standard update method with momentum. The
learning rate used to update the weights; α started at 0.002
and was reduced by 5% for each improvement in network
performance. The momentum µ was fixed at 0.95 throughout
training.
G. Determining Predicted Mask Size
The leave-one-out training & test regime was repeated 4
times with network weights re-initialised with random values
prior to each repetition. Thus 4 nasal landmark predictions
were produced for each test image. The predicted landmarks
were then transferred back into image space by re-applying
the mean and maximum values calculated in section III-B.
The mean position of each landmark was then computed for
each of the test set images. The nose width was determined
using the length of the line between the two mean predicted
landmarks and the scale of the image as measured in section
Manually Measured Mask Sizes
Actual Mask Size
During training, the forward propagation process differed
from the standard method [13] used for a neural network
slightly in that the hidden unit layer also incorporated
the use of a 70% dropout stage to improve generalisation
performance [14]. The contribution of each weight within
the network to the overall error was computed by backpropagating the sum of squares error function result from the
output layer through the network [13].
Small
Medium
Large
Too Large
Small
81
12
0
0
Medium
2
66
4
0
Large
0
1
23
2
Too Large
0
0
0
7
TABLE III
C ONFUSION MATRIX OF MASK SIZES MANUALLY MEASURED FROM
IMAGES
II. This nose width estimate was then used with the known
mask sizes in Table I to determine the Predicted mask size.
IV. R ESULTS
Tables II to IV summarise the performance of the neural
network sizing model and the manual measurements taken
from the test images; while Figures 3a & b provide examples
of accurate and inaccurate landmark predictions. Using the
confusion matrix in Table II, the semi-automatic sizing
system achieved an overall accuracy of 72% in correctly
estimating the mask size and achieved a within one size
accuracy of 96%. The within one size accuracy figure states
that the system predicted the correct size or an adjacent
size for 96% of samples. The manually measured accuracy
metrics of 89% and 100% respectively are shown in Table
III.
V. D ISCUSSION
The semi-automated mask sizing system produced an
accuracy of 72%, while the manual measurements taken
from the photograph achieved 89%. It was expected that the
manual annotator would achieve 100% accuracy. A review
of the images revealed that parallax error contributed to the
error of the system. The nasal region in some images was
also obscured thus making landmarking more difficult. Such
an issue could contribute significantly to the measurement /
prediction error through an incorrect identification of nasal
width, particularly affecting those measurements which are
very close to the 2% size tolerance.
Another potential source of error could result from the
location of the 20 cent piece on the forehead. It is possible
that in some images the reference coin is some distance
away from the widest part of the nose in terms of depth.
This difference in depth could introduce error as the physical
distance represented by a single pixel at nose and coin would
differ; thus producing errors in final sizing. The model could
benefit from additional work investigating more reliable
means of defining scale within the images.
Given the modest sample size of the datasets used in this
study the system would almost certainly benefit from additional data. This is particularly evident examining the images
where the system performed least effectively (e.g. Figure 3b);
by increasing the number and variety of nose types within
the data we anticipate that the overall performance of the
system would improve.
(a) Correct prediction
(b) Inaccurate prediction
Fig. 3. Nasal landmark prediction examples (blue dots: predicted landmarks, red dots: labelled landmarks)
VI. C ONCLUSION
We intend to continue to improve the accuracy of the
proposed system: collecting a larger data set, investigating
the use of more advanced techniques such as convolutional
neural networks to improve facial landmarking accuracy as
well as methods to offset errors within the system. In order
Man Pred
Sensitivity (%)
Pos. Predict. (%)
S
M
L
TL
S
M
L
TL
66
76
81
86
87
65
60
75
87
92
88
100
98
84
85
78
TABLE IV
S ENSITIVITY & POSITIVE PREDICTIVITY PERFORMANCE OF PREDICTED
(P RED ) MASK SIZES AND THOSE DETERMINED FROM MANUAL
(M AN ) MEASUREMENTS (S: S MALL , M: M EDIUM , L:
L ARGE , TL: T OO L ARGE )
PHOTOGRAPH
for a future version of the system to be effectively used in
the field, a means of automatically determining scale within
the image must also be developed.
This study presented a semi-automated nasal PAP mask
sizing system based on neural networks. The system achieved
72% accuracy in correctly estimating the Fisher & Paykel
Eson mask size and a 96% accuracy in sizing within one size.
This level of performance was comparable to that achieved
using manual measurements on the same data set. Further
improvements could be made increasing and refining the
data sets used to train and evaluate the model as well as
investigating additional methods of determining scale.
R EFERENCES
[1] C E Sullivan, F G Issa, M Berthon-Jones, and L Eves, “Reversal
of obstructive sleep apnoea by continuous positive airway pressure
applied through the nares,” Lancet, vol. 1, no. 8225, pp. 862–865,
1981.
[2] Anonymous, “Indications and standards for use of nasal continuous
positive airway pressure (CPAP) in sleep apnea syndromes. American
Thoracic Society. Official statement adopted March 1944.,” American
Journal of Respiratory and Critical Care Medicine, vol. 150, no. 6,
pp. 1738–1745, dec 1994.
[3] Richard B Berry, “Improving CPAP compliance man more than
machine,” Sleep Medicine, vol. 1, no. 3, pp. 175–178, jul 2000.
[4] Anastasia Amfilochiou, Venetia Tsara, Likurgos Kolilekas, Evangelia
Gizopoulou, Chrysoula Maniou, Demosthenes Bouros, and Vlasios
Polychronopoulos, “Determinants of continuous positive airway pressure compliance in a group of Greek patients with obstructive sleep
apnea,” European Journal of Internal Medicine, vol. 20, no. 6, pp.
645–650, 2009.
[5] Peter Gay, Terri Weaver, Daniel Loube, and Conrad Iber, “Evaluation
of positive airway pressure treatment for sleep related breathing
disorders in adults.,” Sleep, vol. 29, no. 3, pp. 381–401, 2006.
[6] H M Engleman, S E Martin, and N J Douglas, “Compliance
with CPAP therapy in patients with the sleep apnoea/hypopnoea
syndrome.,” Thorax, vol. 49, no. 3, pp. 263–6, 1994.
[7] Clifford A. Massie and Robert W. Hart, “Clinical outcomes related
to interface type in patients with obstructive sleep apnea/hypopnea
syndrome who are using continuous positive airway pressure,” Chest,
vol. 123, no. 4, pp. 1112–1118, 2003.
[8] S S Dickerson and M C Kennedy, “CPAP devices: encouraging
patients with sleep apnea,” Rehabil Nurs, vol. 31, no. 3, pp. 114–
122, 2006.
[9] T E Weaver, N B Kribbs, A I Pack, L R Kline, D K Chugh, G Maislin,
P L Smith, A R Schwartz, N M Schubert, K A Gillen, and D F Dinges,
“Night-to-night variability in CPAP use over the first three months of
treatment.,” Sleep, vol. 20, no. 4, pp. 278–83, 1997.
[10] Carl J. Stepnowsky, Matthew R. Marler, and Sonia Ancoli-Israel,
“Determinants of nasal CPAP compliance,” Sleep Medicine, vol. 3,
no. 3, pp. 239–247, 2002.
[11] Adel Bachour, Pirjo Vitikainen, and Paula Maasilta, “Rates of initial
acceptance of PAP masks and outcomes of mask switching,” Sleep
and Breathing, vol. 20, no. 2, pp. 733–738, 2016.
[12] Paul Viola and Michael J Jones, “Robust Real-time Object Detection,”
International Journal of Computer Vision, , no. February, pp. 1–30,
2001.
[13] Yann LeCun, Leon Bottou, Yoshua Bengio, and Patrick Haffner,
“Gradient-based learning applied to document recognition,” Proceedings of the IEEE, vol. 86, no. 11, pp. 2278–2323, 1998.
[14] Pierre Baldi and Peter Sadowski, “The dropout learning algorithm,”
Artif. Intell., vol. 210, no. 1, pp. 78–122, 2014.
[15] Philip De Chazal, Jonathan Tapson, and André Van Schaik, “A comparison of extreme learning machines and back-propagation trained
feed-forward networks processing the mnist database,” in ICASSP,
IEEE International Conference on Acoustics, Speech and Signal
Processing - Proceedings, 2015, vol. 2015-Augus, pp. 2165–2168.
| 1cs.CV
|
arXiv:1608.02801v4 [math.ST] 20 Dec 2017
ON THE ASYMPTOTIC NORMALITY AND THE
CONSTRUCTION OF CONFIDENCE INTERVALS FOR
ESTIMATORS AFTER SAMPLING WITH PROBABILISTIC
AND DETERMINISTIC STOPPING RULES
BEN BERCKMOES AND GEERT MOLENBERGHS
Abstract. A key feature of a sequential study is that the actual sample size is a random variable that typically depends on the outcomes
collected. While hypothesis testing theory for sequential designs is well
established, parameter and precision estimation is less well understood.
Even though earlier work has established a number of ad hoc estimators
to overcome alleged bias in the ordinary sample average, recent work
has shown the sample average to be consistent. Building upon these results, by providing a rate of convergence for the total variation distance,
it is established that the asympotic distribution of the sample average
is normal, in almost all cases, except in a very specific one where the
stopping rule is deterministic and the true population mean coincides
with the cut-off between stopping and continuing. For this pathological
case, the Kolmogorov distance with the normal is found to equal 0.125.
While noticeable in the asymptotic distribution, simulations show that
there fortunately are no consequences for the coverage of normally-based
confidence intervals.
1. Introduction
In surprisingly many settings, sample sizes are random. These include
sequential trials, clusters of random size, incomplete data, etc. [MKA14] and
[MMA16] studied implications of this on estimators in a unified framework;
[MMA15] focused on the specific but important case of a sequential trial,
which is also the setting of interest in this paper.
While formal sequential methodology dates back to World War II ([W45]),
most emphasis has been placed on design and hypothesis testing. Regarding
parameter estimation after sequential trials, it has been reported that commonly used estimators, such as the sample average, exhibit bias at least in
some settings. In response, a variety of alternative estimators have been proposed ([S78, HP88, EF90]). Building upon [LH99] and [LHW06], [MKA14],
[MMA16], and [MMA15] reviewed several of these and actually showed that
the sample average is a consistent estimator in spite of earlier concern, even
though there is a small amount of finite-sample bias. Their approach is
based on considering a class of stochastic stopping rules that lead to the
Key words and phrases. asymptotic normality, confidence interval, Kolmogorov distance, random sample size, rate of convergence, sequential clinical trial, stopping rule,
total variation distance.
Ben Berckmoes is post doctoral fellow at the Fund for Scientific Research of Flanders (FWO); financial support from the IAP research network #P7/06 of the Belgian
Government (Belgian Science Policy) is gratefully acknowledged.
1
2
BEN BERCKMOES AND GEERT MOLENBERGHS
more commonly encountered deterministic stopping rules as limiting cases.
They used incomplete-data ignorable likelihood theory to this end. In addition, they showed that there exists an alternative, conditional likelihood
estimator that conditions on the sample size realized; this one is unbiased
also in small samples but is slightly less efficient than the sample average,
and is implicitly defined through an estimating equation.
While these earlier results are important, the authors did not address the
limiting distribution of the mean estimated from a sequential trial and its
implications for confidence interval estimation. This is the focus of the current paper. To this end, we consider the manageable but generic case where
in a first step n i.i.d. normally distributed N (µ, 1) observations are collected,
after which a stopping rule is applied and, depending on the outcome, a second i.i.d. set of n observations is or is not collected. The probability
of
β
stopping after the first round is assumed to be of the form Φ α + n Kn ,
with Φ(·) the probit function, Kn the sample sum of the first n observations, and α and β a priori fixed parameters. The setting is formalized in
the next section. While there are many cases where other than normal data
are collected, it is a sufficiently common and at the same time tractable case;
extension to the exponential family is of interest but outside of the scope of
this paper. Also for ease of exposition, we consider a study with two possible
sample sizes, n and 2n. Also this can be generalized in a straightforward
fashion. Finally, depending on the situation, Kn /n may or may not be the
core of the test statistic considered, even though the ratio of the sample sum
over a measure of information is very commonly encountered. Calculations
for alternative functions of Kn will follow logic similar to the one displayed
here.
Employing the total variation distance, we establish that for stochastic
stopping rules asymptotic normality applies. Likewise, we show that this is
true too for deterministic stopping rules, provided that µ 6= 0. For these
cases rates of convergence are established. When µ = 0 there is no weak
convergence; we establish the Kolmogorov distance between the true distribution and the normal.
In Section 2, the formal framework is introduced. In Section 3, the main
result is formulated. The behavior in practice is gauged by way of a simulation study, described in Section 4, with some details relegated to the
Appendix. Implications and ramifications are discussed in Section 5.
2. Formal framework
Let X1 , X2 , . . . , Xn , . . . be independent and identically distributed random variables with law N (µ, 1). Also, let N1 , N2 , . . . , Nn , . . . be random
sample sizes such that each Nn takes the values n or 2n, is independent of
Xn+1 , Xn+2 , . . ., and satisfies the conditional law
β
P [Nn = n | X1 , . . . , Xn ] = Φ α + Kn ,
n
(1)
3
where Φ is the standard normal cumulative distribution function,
n
X
Xi ,
Kn =
i=1
R+ .
α ∈ R, and β ∈
Notice that the restriction that β be positive is merely
for convenience, and that the results presented in this paper can be easily
extended for negative β. We also consider the limiting case of (1) where
β → ∞, which corresponds to
P [Nn = n | X1 , . . . , Xn ] = 1{Kn >0} ,
(2)
where 1{Kn >0} stands for the characteristic function of the set {Kn > 0}.
Finally, we define the estimator
1
µ
bNn =
KNn ,
(3)
Nn
which is the classical average of a sample with random size Nn .
In [MKA14], it is shown that µ
bNn , defined by (3), is, for both the stopping rules (1) and (2), a legitimate estimator for µ in the sense that it is
asymptotically unbiased. More precisely, it is established there that, for the
probabilistic stopping rule (1),
!
α + βµ
β
1
p
φ p
,
(4)
E[b
µ Nn ] = µ +
2n 1 + β 2 /n
1 + β 2 /n
and, for the deterministic stopping rule (2),
√
1
E[b
µNn ] = µ + √ φ( nµ),
2 n
(5)
where φ is the standard normal density. Clearly, (4) and (5) both converge to
µ as n tends to ∞. These authors also consider small sample bias corrected
estimators, but this is outside of the scope of this paper.
In this note, we consider a different aspect of the legitimacy of the estimator µ
bNn . More precisely, we examine the asymptotic normality of the
sequence
p
Nn (b
µNn − µ) .
(6)
n
3. Statement of the main result
Recall that the Kolmogorov distance between random variables ξ and η
is given by
K(ξ, η) = sup |P[ξ ≤ x] − P[η ≤ x]| ,
x∈R
and the total variation distance by
dT V (ξ, η) = sup |P[ξ ∈ A] − P[η ∈ A]| ,
A
the supremum running over all Borel sets A ⊂ R. Clearly, the inequality
K ≤ dT V
holds, and it is known to be strict in general. Also, it is well known that
a sequence of random variables (ξn )n converges weakly to a continuously
distributed random variable ξ if and only if K(ξ, ξn ) → 0. Finally, dT V
4
BEN BERCKMOES AND GEERT MOLENBERGHS
metrizes a type of convergence which is in general strictly stronger than
weak convergence. For more information on these distances, and on the
theory of probability distances in general, we refer the reader to [R91] and
[Z83].
In the following theorem, our main result, we show
√ that if the probabilistic
Nn (b
µNn − µ) n converges
stopping rule (1) is followed, then the sequence
in total variation distance to Φ, and we establish a rate of convergence in
this case. Furthermore, we prove that if the√deterministic stopping rule (2)
is followed and µ 6= 0, then the sequence
Nn (b
µNn − µ) n also converges
in total variation distance to Φ, and we again provide a rate of convergence
in this case. Finally, we establish that if the deterministic
stopping rule (2)
√
N
(b
µ
−
µ)) = 1/8. In
is followed and
µ
=
0,
then,
for
each
n,
K(Φ,
n
N
n
√
Nn (b
µNn − µ) n fails to converge weakly to Φ in this case. We
particular,
nevertheless show that in all cases it is plausible to use estimation (3) for
the construction of reliable confidence intervals for µ.
A proof is given in Appendix A.
Theorem 1. Suppose that the probabilistic stopping rule (1) is followed.
Then, for each n,
p
µNn − µ)) ≤ C(α, β, µ, n),
(7)
dT V (Φ, Nn (b
where
C(α, β, µ, n) =
Φ
r
Z
∞
φ(u)
−∞
β
2n
(α + βµ) + p
u
2n + β 2
2n + β 2
!
β
− Φ α + βµ + √ u
n
du,
which, by√the Dominated Convergence Theorem, converges to 0 as n → ∞,
µNn − µ) n converges in total variation distance to Φ. In
Nn (b
whence
particular, considering the Borel set Ax = [−x, x] for x ≥ 0, (7) gives
1
1
2Φ(x) − 1 − P µ
b Nn − √ x ≤ µ ≤ µ
bNn + √ x ≤ C(α, β, µ, n),
Nn
Nn
which makes it plausible to use µ
bNn for the construction of reliable confidence
intervals for µ.
Now suppose that the deterministic stopping rule (2) is followed. Then,
for each n,
p
µNn − µ)) ≤ C(µ, n),
(8)
dT V (Φ, Nn (b
where
Z ∞
√
φ(u) 1{u>−√nµ} − Φ u + 2nµ du,
C(µ, n) =
−∞
which, if µ 6= 0, √
by the Dominated
Convergence Theorem, tends to 0 as
Nn (b
µNn − µ) n converges in total variation distance to
n → ∞, whence
Φ. In particular, considering the Borel set Ax = [−x, x] for x ≥ 0, (8) gives
1
1
2Φ(x) − 1 − P µ
bNn − √ x ≤ µ ≤ µ
bNn + √ x ≤ C(µ, n),
Nn
Nn
which, if µ 6= 0, makes it plausible to use µ
bNn for the construction of reliable
confidence intervals for µ.
5
If µ = 0, then, for each n,
p
µNn − µ)) = 1/8,
(9)
K(Φ, Nn (b
√
and
Nn (b
µNn − µ) n fails to converge weakly to Φ. Nevertheless, for each
x ∈ R+
,
0
1
1
P µ
bNn − √ x ≤ µ ≤ µ
bNn + √ x = 2Φ(x) − 1.
(10)
Nn
Nn
Thus, also in the case where µ = 0, it is plausible to use µ
bNn for the construction of reliable confidence intervals for µ.
4. Simulations
We have conducted a brief simulation study to illustrate Theorem 1, the
tables of which are√ given in Appendix B. We have studied the empirical
distribution En of Nn (b
µNn − µ), based on 1000 simulations, for both the
probabilistic stopping rule (1) (Tables 1 and 2) and the deterministic stopping rule (2) (Table 3), and different values for β, the true parameter µ,
and the number of observations n. In each case, we have compared the theoretical upper bound for the total variation distance between
the standard
√
µNn − µ), as
normal distribution and the theoretical distribution of Nn (b
given in Theorem 1, with the Kolmogorov distance
between the standard
√
µNn − µ). We have also
normal cdf and the empirical distribution of Nn (b
counted the number of times
out of √
1000 where the true
µ is
√ parameter
bNn + 1.96/ Nn , which would
contained in the interval µ
bNn − 1.96/ Nn , µ
√
be a 95%-confidence interval for µ if Nn (b
µNn − µ) were standard normally
distributed.
The predictions by Theorem 1 are confirmed by the simulation study.
More precisely, in the cases where the stopping rule is close to being deterministic andõ = 0, the simulation study indeed points out that the
µNn − µ) deviates from a standard normal distribution
distribution of Nn (b
(red values in the tables). However, it is also confirmed that for the construction
√ of confidence intervals for µ, it is ‘harmless’ to nevertheless assume
µNn − µ) is standard normally distributed.
that Nn (b
5. Discussion
While sequential designs are in common use in medical and other applications, and while the hypothesis testing theory based there upon has
been well established for a long time, there is more confusion about parameter and precision estimation following such a sequential study. [MKA14],
[MMA16], and [MMA15] showed that the sample average is a valid estimator, with both stochastic and deterministic stopping rules, for a wide class
of normal and exponential-family-based models. They established that this
estimator, in spite of small-sample bias and the fact that there is no uniform
minimum-variance unbiased estimator, is consistent and hence asymptotically unbiased.
Building upon this work, in this paper, we have shown that the sample
average in the case of normally distributed outcomes is also asymptotically
normal in a broad range of situations. First, this is true with stochastic
6
BEN BERCKMOES AND GEERT MOLENBERGHS
stopping rule. Second, it applies in almost all deterministic stopping rule
situations within the class considered, except in the very specific case where
the normal population mean µ = 0. Note that the special status of the null
value stems from the fact that the cut-off between stopping and continuing
associated with our deterministic stopping rule is equal to zero. It can easily
be shown, should the cut-off point be shifted to a non-zero value, that then
the problematic value for µ also shifts.
We also showed that the Kolmogorov distance, for µ = 0, equals
p
µNn − µ)) = 1/8,
K(Φ, Nn (b
√
from which it follows that
Nn (b
µNn − µ) n does not converge weakly to
Φ in this case. It is enlightening that the qualitative non-convergence result
is supplemented with a quantitative determination of the deviation from
normality.
To further examine the extent of the result obtained, simulations show
that, indeed, asymptotic normality becomes more problematic when µ approaches zero and the parameter β approaches +∞, with the latter value
corresponding to a deterministic rule. However, asymptotic normality is invoked predominantly to calculate normally based confidence intervals. It is
therefore very reassuring that using such intervals for µ = 0 and a deterministic stopping rule does not lead to any noticeable effect on the coverage
probabilities.
In summary, we can conclude that for relevant classes of stopping rules,
the sample average and corresponding normal confidence interval can be
used without problem. It will be of interest to examine in more detail the
situation of outcomes that follow an exponential family distribution, other
than the normal one.
References
[EF90] Emerson, S. S.;Fleming, T. R. (1990). Parameter estimation following group sequential hypothesis testing. Biometrika 77, 875–892.
[HP88] Hughes, M.D.; Pocock, S.J. (1988). Stopping rules and estimation problems in
clinical trials. Statistics in Medicine 7, 1231–1242.
[LH99] Liu, A.; Hall, W. J. (1999). Unbiased estimation following a group sequential test.
Biometrika 86, 71–78.
[LHW06] Liu, A.; Hall, W. J.; Yu, K. F.; and Wu, C. (2006). Estimation following a group
sequential test for distributions in the one-parameter exponential family. Statistica
Sinica 16, 165–81.
[MMA15] Milanzi, E.; Molenberghs, G.; Alonso, A.; Kenward, M. G.; Tsiatis, A. A.;
Davidian, M.; Verbeke, G. Estimation after a group sequential trial. Stat. Biosci. 7
(2015), 187–205.
[MMA16] Milanzi, E.; Molenberghs, G.; Alonso, A.; Kenward, M. G.; Verbeke, G.; Tsiatis, A. A.; Davidian, M. Properties of estimators in exponential family settings with
observation-based stopping rules. J. of Biometrics Biostatist. 7, 272.
[MKA14] Molenberghs, G.; Kenward, M. G.; Aerts, M.; Verbeke, G.; Tsiatis, A. A.;
Davidian, M.; Rizopoulos, D. On random sample size, ignorability, ancillarity, completeness, separability, and degeneracy: sequential trials, random sample sizes, and
missing data. Stat. Methods Med. Res. 23 (2014), no. 1, 11–41.
[R91] Rachev, S. T. Probability metrics and the stability of stochastic models. Wiley Series
in Probability and Mathematical Statistics: Applied Probability and Statistics. John
Wiley & Sons, Ltd., Chichester, 1991.
[S78] Siegmund, D. (1978). Estimation following sequential tests. Biometrika 64, 191–199.
7
[W45] Wald, A. Sequential tests of statistical hypotheses. Ann. Math. Statist. 16 (1945),
117-186.
[Z83] Zolotarev, V. M. Probability metrics. (Russian) Teor. Veroyatnost. i Primenen. 28
(1983), no. 2, 264–287.
8
BEN BERCKMOES AND GEERT MOLENBERGHS
Appendix A. Proof of Theorem 1
Before writing down the proof of Theorem 1, we give three lemmas. Part
of Lemma 3 can be found in [MKA14], but as it belongs to the heart of our
calculations, we present a complete proof here.
Lemma 1. For A, B ∈ R,
Z ∞
A
φ(x)Φ(A + Bx)dx = Φ √
.
1 + B2
−∞
(11)
Proof. This is standard.
Lemma 2. For k, z ∈ R,
2z − k
k − z − nµ
k − 2nµ
z − nµ
√
√
√
φ √
.
φ
=φ
φ
n
n
2n
2n
(12)
Proof. This follows by a straightforward calculation.
Lemma 3. Let fNn ,KNn be the joint density of Nn and KNn . Then, for the
probabilistic stopping rule (1),
1
k − nµ
βk
√
fNn ,KNn (n, k) = √ φ
(13)
Φ α+
n
n
n
and
1
fNn ,KNn (2n, k) = √ φ
2n
k − 2nµ
√
2n
α+
1 − Φ q
2n+β 2
2n
and, for the deterministic stopping rule (2),
1
k − nµ
√
fNn ,KNn (n, k) = √ φ
1{k>0}
n
n
and
1
fNn ,KNn (2n, k) = √ φ
2n
k − 2nµ
√
2n
βk
2n
,
k
1−Φ √
.
2n
(14)
(15)
(16)
Proof. First suppose that the probabilistic stopping rule (1) is followed.
Notice that
fNn ,KNn (n, k) = fNn ,Kn (n, k) = fKn (k)fNn |Kn (n | k),
(17)
with fKn the density of Kn , and fNn |Kn the conditional density of Nn given
Kn . Now, the Xi being independent and normally distributed with mean µ
and variance 1, we have
1
k − nµ
√
fKn (k) = √ φ
.
(18)
n
n
Furthermore, by (1),
βk
fNn |Kn (n | k) = Φ α +
n
Combining (17), (18), and (19), establishes (13).
.
(19)
9
We now establish (14). Observe that
fNn ,Kn (2n, k) = fNn ,K2n (2n, k)
= fK2n (k) − fNn ,K2n (n, k)
= fK2n (k) − fNn ,Kn (n, ·) ⋆ fP2n
i=n+1
Xi
(k),
(20)
⋆ being the convolution product, and the last equality following by indepence of Nn and Xn+1 , . . . , X2n . Using (13) and the fact that the Xi are
independent and normally distributed with mean µ and variance 1, (20)
equals
Z
1
k − z − nµ
z − nµ
k − 2nµ
1 ∞
βz
√ φ
√
√
√
φ
φ
Φ α+
dz,
−
n −∞
n
n
n
2n
2n
which, by (12),
Z ∞
1
k − 2nµ
k − 2nµ
2z − k
1
βz
√
√
=√ φ
dz.
φ √
− φ
Φ α+
n
n
2n
2n
2n
2n
−∞
(21)
2z−k
√
After performing the change of variables u = 2n , (21) reduces to
Z ∞
k − 2nµ
1
β
βk
√ φ
√
+ √ u du ,
φ(u)Φ α +
1−
2n
2n
2n
2n
−∞
which, by (11), coincides with
α + βk
k − 2nµ
1
√ φ
√
1 − Φ q 2n .
2
2n
2n
1+ β
2n
This proves that (14) holds.
Now suppose that the detereministic stopping rule (2) is followed.
Of course, (17) and (18) continue to hold, and, by (2),
fNn |Kn (n | k) = 1{k>0} ,
from which (15) follows.
To establish (16), notice that (21) also continues to hold, which, by (15),
gives
Z
k − 2nµ
1
z − nµ
k − z − nµ
1 ∞
√
√
√
fNn ,Kn (2n, k) = √ φ
φ
−
φ
dz,
n 0
n
n
2n
2n
which, by (12),
Z ∞
1
k − 2nµ
k − 2nµ
2z − k
1
√
√
=√ φ
φ √
− φ
dz,
n
2n
2n
2n
2n
0
√
,
which, after performing the change of variables u = 2z−k
2n
"
#
Z ∞
1
k − 2nµ
√
= √ φ
1−
√ φ(u)du
2n
2n
−k/ 2n
1
k − 2nµ
k
√
= √ φ
1−Φ √
.
2n
2n
2n
This finishes the proof of (16).
10
BEN BERCKMOES AND GEERT MOLENBERGHS
Proof of Theorem 1. First suppose that the probabilistic stopping rule (1)
is followed.
For n and a Borel set A ⊂ R,
hp
i
Nn (b
µNn − µ) ∈ A
P
KNn − Nn µ
√
∈A
= P
Nn
Kn − nµ
K2n − 2nµ
√
√
= P
∈ A, Nn = n + P
∈ A, Nn = 2n . (22)
n
2n
Plugging in (13) and (14) in (22), gives
i
hp
µNn − µ) ∈ A = I1 + I2 ,
P
Nn (b
with
I1 =
and
I2 =
Z
1A
Z
1A
k − nµ
√
n
k − 2nµ
√
2n
1
√ φ
n
1
√ φ
2n
k − nµ
√
n
k − 2nµ
√
2n
(23)
βk
Φ α+
n
α+
1 − Φ q
dk
βk
2n
2n+β 2
2n
√
shows that
Performing the change of variables u = k−nµ
n
Z
β
φ(u)Φ α + βµ + √ u du,
I1 =
n
A
dk.
(24)
√
gives
and performing the change of variables u = k−2nµ
2n
"
!#
r
Z
2n
β
φ(u) 1 − Φ
I2 =
(α + βµ) + p
u
du.
2n + β 2
2n + β 2
A
(25)
Combining (23), (24), and (25), yields (7).
Now suppose that the deterministic stopping rule (2) is followed. Fix n
and a Borel set A ⊂ R. Of course, (22) continues to hold. Plugging in (15)
and (16) in (22) gives
i
hp
Nn (b
µNn − µ) ∈ A = L1 + L2 ,
(26)
P
with
L1 =
Z
∞
−∞
and
L2 =
Z
∞
−∞
1A
1A
k − nµ
√
n
k − 2nµ
√
2n
1
√ φ
2n
1
√ φ
n
k − nµ
√
n
k − 2nµ
√
2n
1−Φ
√
leads to
Performing the change of variables u = k−nµ
n
Z
φ(u)1{u>−√nµ} du,
L1 =
A
1{k>0} dk
k
√
2n
dk.
(27)
11
√
and performing the change of variables u = k−2nµ
yields
2n
Z
i
h
√
φ(u) 1 − Φ u + 2nµ du.
L2 =
(28)
A
Now (26), (27), and (28) give (8).
We now turn to the case µ = 0. Replacing A by ]−∞, x] in (26), (27),
and (28), shows that, for x ≥ 0,
Z x
Z x
p
φ(u)Φ(u)du −
φ(u)du
Φ(x) − P[ Nn (b
µNn − µ) ≤ x] =
−∞
=
0
2
[Φ(x)] /2 − Φ(x) + 1/2 ,
which assumes the maximal value 1/8 on [0, ∞[, and, for x ≤ 0,
Z x
p
Φ(x) − P[ Nn (b
φ(u)Φ(u)du
µNn − µ) ≤ x] =
−∞
= [Φ(x)]2 /2,
which assumes the maximal value 1/8 on ] − ∞, 0]. This proves (9). Finally,
replacing A by [−x, x] in (26), (27), and (28), shows that, for x ≥ 0,
p
2Φ(x) − 1 − P[−x ≤ Nn (b
µNn − µ) ≤ x]
Z x
Z x
=
φ(u)du
φ(u)Φ(u)du −
−x
=
0
2
[Φ(x)] /2 − [Φ(−x)]2 /2 − Φ(x) + 1/2
= 0,
which proves (10).
12
BEN BERCKMOES AND GEERT MOLENBERGHS
Appendix B. Tables from the simulation study
Table 1. Simulation study for estimation (3) for the probabilistic stopping rule (1); α = 0; β small; µ, true mean for the standard normal from which the sample is taken; n, number of observations; C = C(α, β, µ, n) in Theorem 1; K, the Kolmogorov
distance
between the standard normal cdf and the empirical cdf
√
of Nn (b
µNn − µ) based on 1000 simulations; L, number of times
out of 1000 where
√ the true parameter
√ µ is contained in the interval µ
bNn − 1.96/ Nn , µ
bNn + 1.96/ Nn (which would be a 95%√
µn − µ) were standard normally disconfidence interval if Nn (b
tributed).
β
µ
n
C
K
L
0 -10
10 0.000 0.024 947
0 -10 100 0.000 0.018 948
0 -10 1000 0.000 0.021 941
0 -1
10 0.000 0.026 947
0 -1 100 0.000 0.030 948
0 -1 1000 0.000 0.021 952
0
0
10 0.000 0.021 941
0
0 100 0.000 0.030 953
0
0 1000 0.000 0.011 958
0
1
10 0.000 0.027 954
0
1 100 0.000 0.017 957
0
1 1000 0.000 0.045 957
0 10
10 0.000 0.039 950
0 10 100 0.000 0.026 943
0 10 1000 0.000 0.024 956
β
µ
n
C
K
L
1 -10
10 0.000 0.015 958
1 -10 100 0.000 0.018 947
1 -10 1000 0.000 0.029 949
1 -1
10 0.081 0.024 960
1 -1 100 0.025 0.047 954
1 -1 1000 0.008 0.014 941
1
0
10 0.120 0.042 950
1
0 100 0.039 0.017 952
1
0 1000 0.013 0.012 954
1
1
10 0.071 0.026 957
1
1 100 0.023 0.016 955
1
1 1000 0.008 0.036 941
1 10
10 0.000 0.037 951
1 10 100 0.000 0.026 952
1 10 1000 0.000 0.028 949
Table 2. Same setup as in Table 1. Now β is moderately large.
β
µ
n
C
K
L
10 -10
10 0.000 0.010 949
10 -10 100 0.000 0.020 955
10 -10 1000 0.000 0.024 952
10 -1
10 0.002 0.015 953
10 -1 100 0.000 0.017 955
10 -1 1000 0.000 0.017 947
10
0
10 0.440 0.084 945
10
0 100 0.300 0.021 948
10
0 1000 0.120 0.047 950
10
1
10 0.001 0.028 942
10
1 100 0.000 0.026 973
10
1 1000 0.000 0.019 940
10 10
10 0,000 0.021 967
10 10 100 0.000 0.009 955
10 10 1000 0.000 0.033 948
β
µ
n
C
K
L
100 -10
10 0.000 0.019 948
100 -10 100 0.000 0.024 944
100 -10 1000 0.000 0.023 946
100 -1
10 0.001 0.039 960
100 -1 100 0.000 0.015 953
100 -1 1000 0.000 0.011 941
100
0
10 0.494 0.145 950
100
0 100 0.481 0.080 948
100
0 1000 0.437 0.068 946
100
1
10 0.001 0.035 946
100
1 100 0.000 0.011 938
100
1 1000 0.000 0.021 951
100 10
10 0.000 0.009 954
100 10 100 0,000 0.014 960
100 10 1000 0.000 0.010 954
13
Table 3. Simulation study for estimation (3) for the deterministic stopping rule (2); µ, true mean for the standard normal from which the sample is taken; n, number of observations; C = C(µ, n) in Theorem 1; K, the Kolmogorov distance
between the standard normal cdf and the empirical cdf of
√
Nn (b
µNn − µ) based on 1000 simulations; L, number of times
out of 1000 where
√ µ is contained in the inter√ the true parameter
bNn + 1.96/ Nn (which would be a 95%val µ
bNn − 1.96/ Nn , µ
√
µn − µ) were standard normally disconfidence interval if Nn (b
tributed).
β
µ
n
C
K
L
∞ -10
10 0.000 0.005 943
∞ -10 100 0.000 0.026 949
∞ -10 1000 0.000 0.029 949
∞ -1
10 0.002 0.034 952
∞ -1 100 0.000 0.025 956
∞ -1 1000 0.000 0.018 959
∞
0
10 0.250 0.130 940
∞
0 100 0.250 0.113 941
∞
0 1000 0.250 0.129 958
∞
1
10 0.002 0.022 955
∞
1 100 0.000 0.034 968
∞
1 1000 0,000 0.005 964
∞ 10
10 0.000 0.016 946
∞ 10 100 0,000 0.021 953
∞ 10 1000 0,000 0.023 952
| 10math.ST
|
1
Recognizing Detailed Human Context
In-the-Wild from Smartphones and
Smartwatches
arXiv:1609.06354v4 [cs.AI] 30 Sep 2017
Yonatan Vaizman∗† Katherine Ellis∗ and Gert Lanckriet, senior member, IEEE
This version was accepted to IEEE Pervasive Computing magazine.
Please cite the official (edited and stylized) paper, which appears in IEEE Pervasive Computing, vol. 16,
no. 4, October-December 2017, pp. 62-74.
Abstract—The ability to automatically recognize a person’s behavioral context can contribute to health monitoring, aging care and
many other domains. Validating context recognition in-the-wild is crucial to promote practical applications that work in real-life settings.
We collected over 300k minutes of sensor data with context labels from 60 subjects. Unlike previous studies, our subjects used their
own personal phone, in any way that was convenient to them, and engaged in their routine in their natural environments. Unscripted
behavior and unconstrained phone usage resulted in situations that are harder to recognize. We demonstrate how fusion of
multi-modal sensors is important for resolving such cases. We present a baseline system, and encourage researchers to use our public
dataset to compare methods and improve context recognition in-the-wild.
Index Terms—Context awareness, Mobile sensors, Artificial intelligence, Machine learning, Human activity recognition.
F
1
I NTRODUCTION
The ability to automatically recognize a person’s context
(i.e., where they are, what they are doing, who they are
with, etc.) is greatly beneficial in many domains. Health
monitoring and lifestyle interventions have traditionally
been based on manual, subjective reporting [1], sometimes
by end-of-day recalling [2]. These can improve with automatic (frequent, effortless, and objective) detection of behaviors like exercise, eating, sleeping, or mental states like
stress. Just-in-time interventions (e.g. for addiction) often
prompt the patient at arbitrary times of the day, possibly
missing times when the patient needs support the most [3].
Automatically recognizing context will help detect critical
times and offer immediate support (e.g. an alcoholic patient
may be in high risk of craving or lapse when the context is
“at a bar, with friends”).
The biomedical research community acknowledges the
effects of behavior, lifestyle and environment on health, disease and treatments [4]. Automatic context recognition tools
will be essential to incorporate behavioral and exposure
aspects into large scale studies and to tailor appropriate
treatment for patients. The range of measured exposures
should be broad and cover diverse life style and environmental aspects. Commercial tools that offer superficial
recognition (e.g. of walking, running, and driving) will not
suffice. Personal assistant systems can adjust to context and
better serve the user. Aging care programs can use automated logging of older adults’ behavior to detect early signs
of cognitive impairment, monitor functional independence,
•
•
•
Y. Vaizman, K. Ellis and G. Lanckriet were with the Department of Electrical and Computer Engineering, University of California, San Diego.
∗ Y. Vaizman and K. Ellis are equal contributors.
† Corresponding author. Email: [email protected]
and support aging at home [5].
In order for such applications to succeed in large scale,
the context recognition component has to be unobtrusive
and to work smoothly, without requiring the person to
adjust their behavior. It is important that research emulates
real-world settings, where such applications will eventually
be deployed. In this work we promote context recognition
in-the-wild, meaning capturing people’s authentic behavior
in their natural environments, with the use of every-day
devices — smartphones and smartwatches. We address the
difficulty that in-the-wild conditions add, and show how
multi-modal sensors can help.
Related work
It is common for people to have their phone close to them
most of the time [6]. This growing trend, and the variety
of built-in sensors, make phones popular agents for recognizing human behavior. Smartwatches are a useful sensing
addition. While capturing informative signals about hand
and arm motion, they remain very natural to wear and don’t
add any burden to the user.
Previous works have shown the advantage of fusing
sensors of different modalities, from smartphones and
smartwatches, to improve recognition of basic movement
activities [7] and more complex activities, like smoking
or drinking coffee [8]. However, most past works have
collected data under heavily controlled conditions, with
researchers instructing subjects to perform scripted tasks.
Fitting models to recognize prescribed activities may result
in poor generalization to real life scenarios [9]. To promote
real-life working applications, we argue that research has
to be done in natural and realistic settings, satisfying four
2
in-the-wild conditions:
1)
2)
3)
4)
Naturally used devices. Introducing a foreign device to the user adds a burden and harms natural behavior. Ideally, subjects would use their own
phone, and possibly additional convenient devices,
like watches.
Unconstrained device placement. It has been shown
that the placement and orientation of sensors have
a great influence on the success of recognition [10].
However, this does not mean we should avoid this
difficulty by forcing specific placement — a practical
real-world application cannot restrict users to keep
their phone in pant pocket for the recognition to
work. Instead, research should address the variability in device placement as a challenge, and provide
solutions to overcome it.
Natural environment. The recorded behavior
should be in the subjects’ natural environment and
on their own free time. They should not be instructed where or when to perform their activity.
Natural behavioral content. In many works the
researchers instructed subjects to perform scripted
tasks [7], [8]. The recorded behavior was then simulated, and not natural. Other works let the subjects
behave on their own time, but still prescribed a list
of targeted activities [11], [12], which may cause
the subject to perform actions they are not used to,
like “vacuum cleaning”. In-the-wild studies should
record the behavior that is natural to each individual
subject.
A major challenge is acquiring labels of the behavioral
context. Attaining in-the-wild conditions usually trades off
with other aspects of the data collection effort, resulting in
fewer labeled examples, smaller range of interest labels or
compromised privacy of the subjects.
Previous research addressed some aspects of in-the-wild
data collection in different ways. Han et al. [13] designed
a decision-tree architecture that activates predetermined
sensors to differentiate eight ambulatory and transportation
states. Such a hand-crafted system is hard to scale to more
contexts. They validated their system with an observer that
followed a single user. Ordonez et al. [14] installed a set
of state-change sensors around a home to detect daily home
activities. While such sensors are un-obtrusive and maintain
natural behavior, the complicated device setup limits the
deployment of data collection and practical applications.
It also cannot track the person outside of the monitored
environment. Dong et al. [15] targeted eating periods and
used an unnatural setup of having a smartphone bound
to the wrist. Subjects had to mark start times of eating,
and after data collection they reviewed and corrected their
markings. This resulted in 449 hours of data with 116
eating periods from 43 subjects. Rahman et al. [16] compared
different approaches for subjects to self-report their stress
level (immediately or by recalling later). They suggested
a compromise approach where the subject can report on
their own time but with the help of cues (like location or
surrounding sound level) to remember how they felt at
specific times of the day.
Choudhury et al. [17] designed a system to address
the requirements for a practical context recognition system,
including unobtrusive lightweight devices, long battery life
and multi-modal sensing. However, most of their validation
was done on controlled data, collected in specific locations,
with constrained positioning of device, and with a sequence
of 8 activities that was scripted, observed, and repeated by
12 subjects. Consolvo et al. [18] utilized the same system
(trained on the controlled data) in a field study of an application to promote physical activity. The mobile app used
a combination of the automated recognition (of walking,
cycling, etc.) and manual editing of a daily journal.
Hemminki et al. [19] targeted detecting transportation
modes and specifically designed features that would be less
sensitive to placement of the phone. Ganti et al. [11] gave
eight subjects a Nokia N95 phone for a period of eight
weeks and asked them to go about their regular routine
and use the phone for recording whenever they can, in
any location or time-of-day. The phone was constrained to
be in the pocket or pouch. The interface allowed selecting
an activity from a set of eight activities and marking when
you start and when you finish. They collected a total of 80
hours. Khan et al. [20] targeted recognition of 15 activities.
To collect measurements and annotations, they handed a
NEXUS phone to subjects for a month. Subjects were free
to perform the prescribed activities on their own time and
they used the phone to mark the beginning and end of
the selected activity. They collected about 3000 examples
per activity from 30 subjects, plus a follow-up validation
with eight subjects using the trained real-time recognition
system.
In Yatani et al.’s [21] out-of-lab study, five subject wore
a phone around their neck to take egocentric snapshots
that were later used to label the activity. A similar label
acquisition strategy was taken in large scale by Ellis et al. [22]
with 40 subjects who recorded hip-mounted accelerometer
and GPS data from routine behavior in natural environment
for several days. The subjects wore a SenseCam device
around their neck, which took snapshots periodically, and
the thousands of images were later used by research assistants to annotate the activity. Pirsavash et al. [12] used
a GoPro video camera for both sensor measurements and
ground truth labels. The subjects wore the device around
the chest in a single morning at their own home, and were
prescribed a list of home activities to perform with no
extra specifications. They recorded over 10 hours of video
from 12 people and later annotated household objects and
activities for about 30k frames (every second). Their dataset
is publicly available. While the camera approach may generate more reliable labels in certain cases, the unnatural and
uncomfortable equipment compromises natural behavior.
Furthermore, offline annotation of images is costly, making
it hard to scale, and violates the privacy of the subjects and
people around them. The alternative of self reporting has the
advantage of collecting labels when a camera is not present
(e.g. “shower”), when the context is not clearly visible in the
image (e.g. “singing”), or when the subject knows best what
is happening (e.g. “with family” vs. “with friends”).
3
Our work
In this work we use smartphone and smartwatch sensors
to recognize detailed situations of people in their natural
behavior. We collected labeled data from over 300k minutes
from 60 subjects. Every minute has multi-sensor measurements and is annotated with relevant context labels. To
the best of our knowledge, this dataset, which is publicly
available, is far larger in scale compared to others collected
in the field. Similar to [11], [15], [20], we rely on selfreport. Unlike those works, our data collection app offers an
extensive menu of over 100 context labels and the ability to
select combinations of relevant labels. This facilitates natural
behavior from the subjects, e.g. they are free to “run on a
treadmill”, while “watching TV” if it is natural to them (in
[11], [20], subjects were forced to choose one activity, possibly causing them to act unnaturally). This also provides
rich descriptions of context, as combinations of different aspects, like environment, activities, company, body posture.
Similar combinatorial representations were previously used
to describe objects and actions in images [12] and locations,
objects, humans, and animals in sound clips [23]. In those
cases annotation was done offline, but in our case, attaining
detailed labeling by self-reporting requires attention and
effort from the subjects. To mitigate it, our app’s interface
offers many reporting-mechanisms to minimize interaction
time. Subjects can report the start of activity (as in [11], [15],
[20]). They can manually edit events in a daily calendar that
included automatically recognized contexts (similar to [18]).
We treat only the manual corrections or additions as ground
truth; the automated predictions act as cues, to help the
subjects recall their context (as suggested in [16]).
The main contribution of this work is the emphasis on
in-the-wild conditions, as mentioned in “previous work”:
1)
2)
3)
4)
Naturally used devices. Subjects used their own personal phones, and a smartwatch that we provided.
Unconstrained device placement. Subjects were free
to carry their phone in any way that was convenient
to them.
Natural environment. Subjects collected data in
their own regular environment for about a week.
Natural behavioral content. No script or tasks were
given. We did not target a specific set of activities.
Instead, the context labels that we analyze came from
the data, as the subjects engaged in their routine and
applied any relevant labels (from the large menu)
that fit what they were doing.
Recognizing context in-the-wild is more challenging,
compared to controlled conditions, because of the large
variability in real-life. Diversity in phone devices and sensor
hardware has an effect on the measurements [24]. Our data
represents both iPhone and Android, including many varieties of devices. Variability in behavioral content is clearly
visible in the ground truth labels of out data, including
combinations like {Running, Outside, Exercise, Talking,
With friends}, {Running, Indoors, Exercise, At the gym,
Phone on table}, {Sitting, Indoors, At home, Watching TV,
Eating, Phone on table}, {Sitting, At a restaurant, Drinking
(alcohol), Talking, Eating}, {Sitting, On a bus, Phone in
pocket, Talking, With friends}, {On a bus, Standing}. Such
variability was missed in works that defined behavior with
a small set of mutually exclusive activities. Variability in
manner or style (e.g. different gaits) is less visible, but is still
captured in our sensor measurements. Such variability can
easily be missed in scripted experiments or if restricting how
to use devices. Our analysis demonstrates the difficulty in
resolving context in-the-wild, and the importance of using
complementary sensing modalities. We show that everyday
devices, in their natural usage, can capture information
about a wide range of behavioral attributes.
C ONTEXT RECOGNITION SYSTEM
Figure 1 illustrates the flow of our recognition system.
The system is based on measurements from five sensors
in a smartphone: accelerometer (Acc), gyroscope (Gyro),
location (Loc), audio (Aud), and phone state (PS), as well
as accelerometer measurements from a smartwatch (WAcc).
For a given minute, the system samples measurements from
these six sensors and the task is to detect the combination
of relevant context labels (Figure 1 (A)), i.e. declare for each
label l a binary decision: yl = 1 (the label is relevant to this
minute) or yl = 0 (not relevant).
For this paper we opted for simple computational methods, based on linear classifiers and basic heuristics for sensor
fusion. We model each label separately and treat every
minute as an independent example. We include time-ofday as part of the PS features, but we do not model the
behavioral time-series throughout the day. The goal of this
paper is to show the potential of context recognition in-thewild, and to establish a baseline. Future papers will use nonlinear methods, dynamic-context models, and interaction
among labels.
Single-sensor classifiers use sensor-specific features and
help us understand how informative each sensor can be,
independently of the other sensors, for a given context label
(Figure 1 (B)). We use logistic regression — a linear classifier
that outputs a continuous value (interpreted as probability)
in addition to the binary decision. This is helpful for sensor
fusion. The following procedure was performed for a given
sensor s and a given label l: (a) For each example, compute a
ds -dimensional feature vector xs . Each sensor has a different
set of relevant features. (b) Standardize each feature by
subtracting mean and dividing by standard deviation (these
statistics are estimated on the training set). (c) Learn a ds dimensional logistic regression classifier from the training
set. (d) Apply the logistic regression classifier to a test
example to obtain a binary classification yl and probability
value P (yl = 1|xs ). To overcome the imbalance between the
positive class and the negative class we applied balanced
class weights (inversely proportional to the class frequency
in the training set).
At this point, it is possible introduce some domain
knowledge and assign appropriate sensors to certain labels. For example, the watch accelerometer can be a good
indicator for specific hand-motion activities, like “washing
dishes”, while audio might better predict environmental
contexts like “in class” or “at a party”. These design decision
are not always obvious, so we continue with sensor-fusion
methods that can learn the best predictors from data.
4
Sensor fusion
Our system further combines information from N different
sensors. We propose three alternative ways.
Early fusion (EF) classifiers combine information from
multiple sensors prior to the classification stage (Figure 1 (C)). The following procedure was performed for
a given label l: (a) Start with the sensor-specific feature
vectors {xs }N
s=1 . (b) Concatenate the (standardized) sensorspecific feature vectors into a single vector x of dimension
PN
d =
s=1 ds (c) Learn a d-dimensional logistic regression classifier from the training set. (d) Apply the logistic
regression classifier to a test example to obtain a binary
classification yl and probability value P (yl = 1|x).
Late fusion classifiers. We use ensemble methods to
combine the predictions of the N single-sensor classifiers.
We chose to combine the probability outputs P (yl = 1|xs ),
and not the binary decisions, to take into account the
“confidence” of each of the N classifiers and avoid overinfluence of irrelevant sensors. We explore two methods for
late fusion:
Late fusion using average probability (LFA) (Figure 1 (D))
applies a simple bagging heuristic and averages the probability values from all the single-sensor classifiers to obtain a
final “probability” value, i.e., P (yl = 1|x1 , x2 , . . . , xN ) =
PN
1
s=1 P (yl = 1|xs ). LFA declares “yes” if the average
N
probability is larger than half. No additional training is
performed after the single-sensor classifiers are learned.
This method grants equal weight to each sensor, hoping
that informative sensors will classify with higher confidence
(probability close to 0 or close to 1) and will influence
the final decision more than irrelevant sensors (which will
hopefully predict with probability close to 0.5).
As mentioned earlier, some sensors may be consistently
better suited for certain labels. As a flexible alternative to
deciding apriori how to assign sensors to labels, we can
let sensor-weights be learned from data. Late fusion using
learned weights (LFL) (Figure 1 (E)) is a second type of
late fusion that places varying weight on each sensor. This
method learns a second layer of N -dimensional logistic
regression model. The second layer’s input is the N probability outputs of the single-sensor models, and the output is
a final decision yl .
devices of generations from iPhone4 to iPhone6 and with
operating system (iOS) versions 7, 8 and 9. 26 subjects
were Android users, with various devices (Samsung, Nexus,
Motorola, Sony, HTC, Amazon Fire-Phone, and Plus-One).
The subjects were from diverse ethnic backgrounds (selfdefined), including Chinese, Mexican, Indian, Caucasian,
African-American, and more. The majority of the subjects
(93%) were right handed, and chose to wear the smartwatch
on their left wrist. The dataset is homogeneous with regard
to occupation; almost all the subjects were students or
research assistants. 34 subjects were female and 26 were
male. Table 1 describes additional subject characteristics.
We installed the app on each subject’s personal phone and
provided the watch to the subject (56 out of the 60 agreed
to wear the watch). The subject then engaged in their usual
behaviors for approximately a week, while keeping the app
running in the background on their phone as much as
possible and convenient. The subject was asked to report
as many labels as possible without interfering too much
with their natural behavior. They were free to remove the
watch whenever they wanted and were asked to turn off
the watch-app when they were not wearing it. Basic compensation of $40 was given to each subject, with additional
incentive of up to $35 that depended on the amount of
labeled data they provided.
The resulted ExtraSensory Dataset, contains a total of
308,320 labeled examples (minutes) from sixty users. Table 1
details statistics (over 60 subjects) about the amount of
data collected. Not all the sensors were available at all
times. Table 2 specifies details on the sensors. The dataset is
publicly available and researchers are encouraged to use it
for developing and comparing context recognition methods
(http://extrasensory.ucsd.edu).
Range
Mean (SD)
Age (years)
18–42
24.7 (5.6)
Height (cm)
145–188
171 (9)
Weight (kg)
50–93
66 (11)
18–32
23 (3)
Body mass index (kg/m2 )
Labeled examples 685–9706 5139 (2332)
Additional unlabeled examples
2–6218
1150 (1246)
Average applied labels per example
1.1–9.7
3.8 (1.4)
Participation duration (days)
2.9–28.1
7.6 (3.2)
TABLE 1
Statistics over the 60 users in the dataset (SD: standard deviation).
DATA COLLECTION
For the purpose of large-scale data collection, we developed
a mobile application (app) called ExtraSensory, with versions
for both iPhone and Android smartphones, and a companion application for the Pebble smartwatch that integrates
with both. The app was used to collect both sensor measurements and ground truth context labels. Every minute
the app records a 20sec window of sensor measurements
from the phone and watch. Within that window, the time
samples of different sensors are not guaranteed to be exactly
aligned. The flexible user interface provided the user with
many mechanisms to self-report the relevant context labels
and cover long behavioral time with minimal effort and time
of interaction with the app (Figure 2).
Sixty subjects (users) were recruited using fliers posted
around the UC San Diego campus and campus-based email
lists. 34 of the subjects were iPhone users, with iPhone
E VALUATION AND RESULTS
We evaluated classification performance using five-fold
cross validation: each fold has 48 users in the training set
and the other twelve users in the test set. We also conducted leave-one-user-out experiments (LOO). To measure
performance, classification accuracy is a misleading metric
because of imbalanced data; for a rare label that appears in
1% of the test set, a trivial classifier that always declares
“no” will achieve 99% accuracy but is completely useless. It
is important to consider competing metrics, like sensitivity
and specificity. A common approach is to observe sensitivity
(recall) against precision, or to calculate their harmonic
mean (F1). However, precision and F1 are less fitting, since
they are very sensitive to how rare labels are. Chance level
can be arbitrarily small, and when averaging precision or
5
A
Sensor
Measurements
Context
Labels
Classifier
listening to music
at the beach
walking
outdoors
B
Sensor
Measurements
Features
acceleration
gyroscope
x11
x12
.
.
.
audio
x21
x22
.
.
.
C
Pr(walking|x1)
+
Pr(walking|x2)
Pr(walking|x3)
+
+
x41
x42
.
.
.
phone state
Label
Probability
+
x31
x32
.
.
.
location
Binary
Classifier
Pr(walking|x4)
-
E
D
Concatenated
Features
x11
x12
.
.
.
x21
x22
.
.
.
Binary
Classifier
Label
Probability
Sensorspecific
Probability
Average
Label
Probability
Pr(walking|x)
-
Pr(walking|x2)
Pr(walking|x3)
...
Binary
Classifier
Label
Probability
Pr(walking|x1)
Pr(walking|x1)
+
Sensorspecific
Probability
+
Pr(walking|x)
+
Pr(walking|x2)
Pr(walking|x3)
Pr(walking|x)
-
...
Fig. 1. Context recognition system. (A) While the person is engaged in natural behavior the system uses sensor measurements from the smartphone
and smartwatch to automatically recognize the person’s detailed context. (B) Single-sensor classifiers. Appropriate features are extracted from each
sensor. For a given context label, classification can be done based on each sensor independently. (C) Under Early fusion (EF), features from multiple
sensors are concatenated to form a long feature vector. (D) Late fusion using averaging (LFA) simply averages the output probabilities of the singlesensor classifiers. (E) Late fusion with learned weights (LFL) learns how much to “listen” to each sensor when making the final classification.
6
Fig. 2. Screenshots from the ExtraSensory mobile application (iPhone version). (A) On the history tab the user can see a daily log of activities
and contexts. The server sends real-time body-state predictions (based on preliminary training data from two iPhone users — the researchers).
These predictions appear with question marks and help the user organize the log and recall when their activity may have changed. The user can
update the history records’ labels, add secondary labels like “at home” and “eating”, merge consecutive records into a longer period, and split
records. (B) The label selection menu is indexed by topics and a “frequently use” link to make it easier for the user to select quickly. (C) Using the
“active feedback” button the user can report they will be engaged in a specific context starting immediately and valid for a set period of time. (D)
Periodic notifications remind the user to provide labels. If the user is engaged in the same context as they recently reported they simply need to
reply “correct” to the question. If any element of the context has changed they can press “not exactly” and be directed to a screen where they can
update the labels of the recent time period. These notifications appear on the watch as well, which enables easier responses.
7
Sensor
Accelerometer
Gyroscope
Magnetometer
Watch Accelerometer
Watch Compass
Location
Location precomputed
Audio
Audio power
Phone State
Low frequency sensors
Core
raw measurements
3-axis (40Hz)
3-axis (40Hz)
3-axis (40Hz)
3-axis (25Hz)
heading angle (var)
long-lat-alt (var)
location variability (1pe)
13MFCC (46ms frames)
1pe
1pe
1pe
examples
308,306
291,883
282,527
210,716
126,781
273,737
263,899
302,177
303,877
308,320
308,312
176,941
users
Why does sensor fusion help?
60
57
58
56
53 The performance of single-sensor classifiers on selected
58 labels (Figure 4 (A)) demonstrates the advantage of having
58 sensors of different modalities. As expected, for detecting
60
60 sleeping, the watch is more informative than the phone’s
60 motion sensors (Acc, Gyro) — during sleep the phone may
60 be lying motionless on a nightstand, while the watch records
51 wrist movements. Similarly, contexts such as “shower” or
TABLE 2
The sensors in the dataset. For each sensor, details of the raw
measurements, the number of examples with measurements from that
sensor and the number of users with measurements from that sensor.
“Core” represents examples that have measurements from all six core
sensors that are analyzed in this paper (Acc, Gyro, WAcc, Loc, Aud and
PS). “1pe” means sampled once per example. “var” means variable
sampling rate — gathering updates whenever the value changes.
F1 over many labels, certain labels will unfairly dominate
the score. Additionally, the self-reported data may be noisy,
possibly including cases where a label was actually relevant,
but was not reported by the subject. Precision and F1 will be
too sensitive to such cases. Unlike F1, the balanced accuracy,
BA=0.5*(sensitivity+specificity), does not suffer from these
issues, and can serve as a convenient objective that fairly
balances competing metrics.
First, we assess the potential of single sensors. Figure 3 (A) shows some specific context labels for which
relatively few examples were collected. If we pick our first
(sometimes second) guess of relevant sensor we can achieve
reasonable recognition of these contexts.
Next, to see if we can do better, we evaluate the three
sensor-fusion methods described in “Sensor fusion” and
compare them to single-sensor classifiers. Figure 3 (B) shows
performance for 25 labels from diverse context domains. In
most cases sensor-fusion managed to match the best fitting
single-sensor. The system learned from data how to best
utilize the different sensors, without the need of a human to
guide it, which can be useful for scalable systems, where the
researcher does not necessarily know which sensor to trust
for which label. Furthermore, in many cases sensor-fusion
improved performance, compared to the best single-sensor,
meaning that there is complementary information in different sensors. We see the overall advantage of multi-sensor
systems over single-sensor systems, shown by the average
performance of the different systems in Figure 3 (C). The
three sensor-fusion alternatives seem to perform similarly
well, with LFL slightly ahead. The selection of a sensorfusion method can be guided by the training data available
to the researcher. When having plenty of labeled examples
that have all six sensors available, the simple EF system
can work. Otherwise, late fusion will be more fitting, still
having plenty of data to train each single-sensor classifier
alone. Leave-one-user-out results are consistent with 5-fold
evaluation (figure 3 shows LOO results for the EF system,
marked “EF-LOO”). For some labels, like “running”, the
system benefited from the larger training set in the LOO
evaluation. Full per-label results are provided in supplemental material.
“in a meeting” have unique acoustic signatures (running
water, voices) that allow the audio-based classifier to perform well. When showering, it is reasonable that the phone
will be in a different room than the person, in which
case the watch is an important indicator of the activity.
Figure 4 (A) demonstrates that the LFL method assigns
reasonable weights to the six sensors — sensors that perform
more strongly for a given label are given higher weight.
Investigating where misclassification occurs helps to understand the predictive ability of the system. Figure 4 (B–
G) shows confusion matrices that depict misclassification
rates between related context labels. For example, a classifier
using the phone’s motion sensors (Acc and Gyro) (Figure 4 (B)) to discriminate between body movement/posture
states confuses even dissimilar labels (“running” vs. “lying
down”). Such errors arise in natural, unconstrained behavior; in-the-wild, people do not always carry their phone in
their pocket — subjects were sometimes running on a treadmill with their phone next to them, motionless. The watch
can help in such situations — when the watch accelerometer
features were added to the classifier (Figure 4 (C)), the
confusion between activities was reduced.
The audio signal from the smartphone (Figure 4 (D))
is informative for labels related to the environmental context. We see a hierarchy of misclassification: while there is
some confusion between labels that share similar acoustic
properties (“toilet” vs. “shower”, “class” vs. “meeting”),
there is a sharper distinction between label groups from
different domains (“toilet or shower” vs. “class or meeting”
vs. “restaurant”).
The phone placement itself provides cues about the
user’s activity; when the phone is lying on a table it is
more likely the user is showering than walking to work.
The ability to recognize the phone’s position will improve
overall context recognition. A single modality is not sufficient to fully identify phone position. A classifier based on
motion sensors is sensitive to movement, so when the phone
was in a bag (possibly motionless) it was often mistaken for
being on a table (Figure 4 (E)). On the other hand, a classifier
using audio alone is more sensitive to whether the phone is
enclosed or exposed to environmental sounds, so with this
classifier cases of “phone in bag” were mistaken for “phone
in pocket” and “phone in hand” was often mislabeled as
“phone on table” (Figure 4 (F)). However, by combining motion and audio modalities, the classifier synthesized these
two dimensions of discrimination to better recognize phone
position (Figure 4 (G)). These examples demonstrate the
large variability in behavior in-the-wild and highlight the
utility of fusing multi-modal sensors.
8
A
0.9
Label
Stairs - going up
Stairs - going down
Elevator
Cleaning
Laundry
Washing dishes
Singing
At a party
At the beach
At a bar
examples
399
390
124
1839
473
851
384
404
122
520
Sensor
Gyro
Gyro
Gyro
WAcc
WAcc
WAcc
Aud
Aud
Loc
PS
BA
0.73
0.73
0.76
0.71
0.66
0.70
0.68
0.81
0.72
0.93
Sensor
Acc
Acc
Aud
Gyro
Acc
Aud
Loc
Acc
PS
Gyro
BA
0.70
0.71
0.71
0.64
0.65
0.60
0.61
0.74
0.70
0.66
C
classifier
p99
Acc
Gyro
WAcc
Loc
Aud
PS
EF
LFA
LFL
EF-LOO
accuracy
0.50
0.73
0.70
0.73
0.71
0.75
0.76
0.87
0.84
0.85
0.86
sensitivity
0.50
0.64
0.64
0.67
0.63
0.65
0.74
0.67
0.76
0.76
0.69
specificity
0.50
0.73
0.69
0.72
0.70
0.75
0.76
0.87
0.83
0.85
0.86
BA
0.50
0.68
0.66
0.70
0.67
0.70
0.75
0.77
0.80
0.80
0.78
precision
0.11
0.17
0.16
0.18
0.17
0.18
0.20
0.24
0.23
0.24
0.24
F1
0.13
0.22
0.20
0.22
0.22
0.22
0.24
0.30
0.29
0.30
0.30
B
Balanced accuracy
0.8
0.7
0.6
0.5
Ly
in
(54g do
35 wn
9)
(82 Sitt
90 ing
4
W )
(11 alk
89 ing
2
Ru )
n
(67ning
Bic 5)
(35yclin
23 g
S )
(42leep
92 ing
La 0)
b
(28 wo
98 rk
In )
(28 cla
In 72 ss
am )
At
ma (2 eetin
in 904 g
wo )
(20rkpla
38 ce
2)
(10 Ind
79 oor
44 s
O )
(76utsid
29 e
In )
(36 a c
35 ar
Dr
ive On a )
(
( 1 b
Dr I'm t 185 us
ive
h )
(I'm (e dri
a p 5034ver)
ass )
(16enge
55 r)
At )
At (839hom
a r 77 e
est )
Ph (1 aura
on 32 nt
e i 0)
n
(15poc
30 ket
1
Ex )
(53ercis
84 e
C )
(22ookin
5 g
Sh 7)
op
(89ping
6)
S
t
Dr
ink (4rollin
ing 34 g
( )
Ba alcoh
thi (86 ol
ng 4) )
-s
(11how
86 er
)
0.4
Fig. 3. Overall performance of the single-sensor classifiers (Acc, Gyro, WAcc, Loc, Aud and PS) and the sensor-fusion classifiers (EF, LFA, LFL and
EF-LOO). (A) Specific labels that had few examples with first and second guess of sensors that intuitively seem relevant and the BA score of the
corresponding single-sensor classifiers. (B) BA scores for selected labels from diverse domains (number of examples in parenthesis). Color legend
is in table (C). (C) Average performance metrics over the 25 context labels from B. All average scores were well above the p99 value, which marks
the 99th percentile of random score — scores above the p99 value have less than 1% probability of being achieved randomly (p99 was estimated
from 100 random simulations).
U SER PERSONALIZATION
People move, behave and uses their phone in different
manners. A system that is fine-tuned to its specific user may
outperform a more general model. To explore the potential
of personalization we performed experiments with a single
test user. We compared three models: (1) universal (trained
on data from other users), (2) individual (trained on half of
the data from the same test user) and (3) adapted (merges
both). We tested the three models on the same unseen data.
Figure 5 shows the results of these experiments. The universal model demonstrates good performance. This shows
the basic ability of a trained system to work well for a new
unseen user. As suspected, the individual model performed
better than the universal model for labels that had many
individual examples (“lying down”, “sitting”, “sleeping”,
“at home”, “computer work”, and “at main workplace”).
However, the individual user is missing data for many context labels. For other labels there are only a limited number
of examples a new user can acquire in a few “training” days,
which risks over-fitting to these few examples. In such cases
a universal model is better, having been trained on plenty
of data from many users. The optimal solution is to benefit
from both universal and individual data: the user-adapted
model shows overall improvement in recognition performance, even among the labels that had over 300 examples
for the test user. LFA is a simple heuristic that manages to
demonstrate this advantage. For each label, when there is
not enough data to train an individual model, the adapted
model relies only on the universal model. When there is
enough data to train an individual model, the adapted
model “listens” to the universal and individual models, in
some cases achieving better performance than either model
on its own (e.g. “sleeping”, “at home”).
In practical systems, the logistics of implementing personalization may not be an obvious task. For medical applications, the clinician or patient may decide that their cause
is important and worth dedicating some effort to provide
individual labeled data for a few days, in order to better
adapt the model. However, in commercial applications the
users (clients) may not be motivated to invest the extra
effort in labeling. In such cases semi-supervised methods
can still be used to make the most of unlabeled data from
the individual user and personalize the model.
C ONCLUSIONS
Our novel data collection brings about behavioral variability
in-the-wild that is underrepresented in controlled studies.
This makes context recognition a harder challenge compared to previous scenarios, hence accuracy levels in-thewild are lower than those reported in experiments that had
some restrictions on behavioral conditions. We demonstrate
that everyday devices, in their normal unconstrained usage,
carry information about the person’s natural behavioral
context. We describe a baseline system, suggest three simple
methods for sensor fusion, and reinforce previous findings
that showed the advantage of fusing multi-modal sensors.
We demonstrate how the sensing modalities complement
9
In a meeting
In a car
Acc
Gyro
WAcc
Loc
Aud
PS
Acc
Gyro
WAcc
Loc
Aud
PS
At main workplace
Acc
Gyro
WAcc
Loc
Aud
PS
Sleeping
6
Acc
Gyro
WAcc
Loc
Aud
PS
Bicycling
Acc
Gyro
WAcc
Loc
Aud
PS
A
Bathing - shower
learned
weight
4
2
0
BA
0.9
0.7
C
0.44
Bicycling
F
Phone in pocket
0.4
0.54
0.2
0.0
nb
ag
e
Ph in h
on
e i and
n
Ph poc
on ke
eo t
nt
ab
le
0.74
ei
on
on
ei
nb
Ph e in h
on
e i and
n
Ph poc
on ke
eo t
nt
ab
le
ag
Phone on table
0.6
0.35
on
0.62
Phone on table
on
0.78
Phone in hand
0.43
Phone in pocket
Ph
Ph
on
ei
on
Ph
0.52
0.8
Phone in bag 0.34
0.23
Phone in hand
nb
ag
e
i
Ph n h
on
e i and
n
Ph poc
on ke
eo t
nt
ab
le
Phone on table
0.38
Ph
Phone in pocket
G
Phone in bag 0.38
Ph
Phone in bag 0.16
0.68
At a restaurant
Ph
E
0.52
In a meeting
0.66
do
w
Sit n
t
Wa ing
lkin
Ru g
nn
Bic ing
ycl
ing
Ly
ing
do
w
Sit n
tin
Wa g
lk
Ru ing
nn
Bic ing
ycl
ing
Bicycling
0.44
In class
0.23
Running
0.50
0.39
Bathing - shower
0.56
Walking
0.19
Running
Phone in hand
0.67
Sitting
0.51
Walking
Toilet 0.42
Ly
ing
Sitting
D
Lying down 0.82
Ba
thi T
ng oil
- s et
ho
we
r
I
In n cla
a
s
At me s
a r eti
est ng
au
ran
t
B
Lying down 0.79
Acc
Gyro
WAcc
Loc
Aud
PS
0.5
Fig. 4. Why sensor fusion helps recognition. (A) The bottom row shows the overall performance (BA) of each single-sensor classifier and the top
row shows the weights that the LFL classifier learned to assign to each sensor (taken from the first cross validation fold). (B–G) Confusion matrices
for subsets of mutually exclusive labels. Rows represent ground truth labels and columns represent predicted labels. Rows are normalized so that
a cell in row i and column j displays the proportion of examples of class i that were assigned to class j . The correct classification rates (main
diagonal) are also marked numerically. The sensors used are: (B) Acc and Gyro; (C) Acc, Gyro and WAcc; (D) Aud; (E) Acc, Gyro and WAcc; (F)
Aud; (G) Acc, Gyro, WAcc and Aud.
0.86
0.74
0.87
0.84
0.83
0.87
1.0
0.9
0.8
0.7
0.6
0.5
0.4
1.0
0.8
0.6
0.4
0.2
0.0
0.56
0.50
0.60
0.67
0.68
0.72
15
l
rag abels
)
e(
11
lab
els
)
rag
e(
wo
Av
e
oo
ch
At
s
ma
in
At
Av
e
l (3
rkp 189)
lac
e(
20
76
On
)
ab
us
(95
In
)
ac
ar
(30
2)
29
6)
)
g(
tin
ee
am
In
In
c
las
s(
41
8
)
)
ute
rw
ork
(10
17
(51
26
2)
Co
mp
At
ho
me
t (9
)
92
ran
tau
ho
l) (
At
a
res
co
(al
ing
Dr
ink
Ind
oo
rs
(74
62
)
20
)
(34
7)
65
ing
g(
ep
Sle
lkin
(47
Wa
tin
g
(34
Sit
wn
do
Ly
ing
43
)
Universal
Individual
Adapted
90
)
F1
BA
10
Fig. 5. User adaptation performance. Balanced accuracy and F1 score were assessed for a single user. The x-axis denotes the labels with the total
number of examples for the user. The “universal” model was trained on data from other users, the “individual” model was trained on data from the
same user and the “adapted” model combines the universal and individual models using LFA. The bars on the right hand side of each plot present
the scores averaged over the 15 tested labels, and averaged over 11 labels that had over 300 examples.
each other, and help resolve contexts that arise with uncontrolled behavior (e.g. running on treadmill with phone on
table, motionless).
Combinatorial representation of behavior is very flexible. A well trained system has the potential to correctly
recognize a new specific situation (combination of labels)
that did not appear in the training. To broaden the range of
contexts, researchers can either use supervised methods and
focus on newly added target labels when collecting extra
data, or use unsupervised methods to discover complex
behaviors as common combinations or sequences of simpler
contexts [25]. The labels in our work were interpreted in
a subjective manner. The same location may be considered
as “school” for one subject and “workplace” for another.
We did not tell the subjects how we define “walking” or
“eating” in order to capture the full scope of what people
consider eating. Domain-expert researchers may decide to
define labels clearly to subjects or use more specific labels
like “eating a meal” and “snacking”.
F UTURE DIRECTIONS
New technologies and original solutions for collecting labels
in-the-wild are required to reduce annotation load from
study subjects and increase reliability of labeling. Online
learning can be used to keep improving real-time recognition, which will require less label-correcting effort from new
research subjects. Active learning can be utilized to collect
data in scale, while sparsely probing subjects to provide
annotations. In parallel, semi-supervised methods can be
used to make the best out of plenty unlabeled data (which
is easy to collect) and reduce the dependence on labeled
examples to a minimum.
The public dataset we collected provides a platform to develop and evaluate these methods, as well as explore feature
extraction, inter-label interaction, time series modeling and
other directions that will improve context recognition.
R EFERENCES
K. Servick, “Mind the phone,” Science, vol. 350, no. 6266, pp. 1306–
1309, 2015.
[2] M. Basner, K. M. Fomberstein, F. M. Razavi, S. Banks, J. H. William,
R. R. Rosa, and D. F. Dinges, “American time use survey: sleep
time and its relationship to waking activities,” Sleep, vol. 30, no. 9,
p. 1085, 2007.
[3] I. Nahum-Shani, S. N. Smith, A. Tewari, K. Witkiewitz, L. M.
Collins, B. Spring, and S. Murphy, “Just in time adaptive interventions (jitais): An organizing framework for ongoing health
behavior support,” Methodology Center technical report, no. 14-126,
2014.
[4] S. Intille, “The precision medicine initiative and pervasive health
research,” IEEE Pervasive Computing, vol. 15, no. 1, pp. 88–91, 2016.
[5] M. L. Lee and A. K. Dey, “Sensor-based observations of daily
living for aging in place,” Personal and Ubiquitous Computing,
vol. 19, no. 1, pp. 27–43, 2015.
[6] A. K. Dey, K. Wac, D. Ferreira, K. Tassini, J.-H. Hong, and J. Ramos,
“Getting closer: an empirical investigation of the proximity of
user to their smart phones,” in Proceedings of the 13th international
conference on Ubiquitous computing. ACM, 2011, pp. 163–172.
[7] J. J. Guiry, P. van de Ven, and J. Nelson, “Multi-sensor fusion
for enhanced contextual awareness of everyday activities with
ubiquitous devices,” Sensors, vol. 14, pp. 5687–5701, 2014.
[8] M. Shoaib, S. Bosch, H. Scholten, P. J. Havinga, and O. D. Incel,
“Towards detection of bad habits by fusing smartphone and
smartwatch sensors,” in Pervasive Computing and Communication
Workshops (PerCom Workshops), 2015 IEEE International Conference
on. IEEE, 2015, pp. 591–596.
[9] J. Kerr, R. E. Patterson, K. Ellis, S. Godbole, E. Johnson, G. Lanckriet, and J. Staudenmayer, “Objective assessment of physical activity: Classifiers for public health.” Medicine and science in sports and
exercise, vol. 48, no. 5, pp. 951–957, 2016.
[10] K. Kunze and P. Lukowicz, “Sensor placement variations in wearable activity recognition,” IEEE Pervasive Computing, vol. 13, no. 4,
pp. 32–41, 2014.
[11] R. K. Ganti, S. Srinivasan, and A. Gacic, “Multisensor fusion
in smartphones for lifestyle monitoring,” in 2010 International
Conference on Body Sensor Networks. IEEE, 2010, pp. 36–43.
[12] H. Pirsiavash and D. Ramanan, “Detecting activities of daily
living in first-person camera views,” in Computer Vision and Pattern
Recognition (CVPR), 2012 IEEE Conference on. IEEE, 2012, pp. 2847–
2854.
[1]
11
[13] M. Han, Y.-K. Lee, S. Lee et al., “Comprehensive context recognizer
based on multimodal sensors in a smartphone,” Sensors, vol. 12,
no. 9, pp. 12 588–12 605, 2012.
[14] F. J. Ordóñez, P. de Toledo, and A. Sanchis, “Activity recognition
using hybrid generative/discriminative models on home environments using binary sensors,” Sensors, vol. 13, no. 5, pp. 5460–5477,
2013.
[15] Y. Dong, J. Scisco, M. Wilson, E. Muth, and A. Hoover, “Detecting
periods of eating during free-living by tracking wrist motion,”
IEEE journal of biomedical and health informatics, vol. 18, no. 4, pp.
1253–1260, 2014.
[16] T. Rahman, M. Zhang, S. Voida, and T. Choudhury, “Towards
accurate non-intrusive recollection of stress levels using mobile
sensing and contextual recall,” in International Conference on Pervasive Computing Technologies for Healthcare, 2014.
[17] T. Choudhury, S. Consolvo, B. Harrison, J. Hightower, A. LaMarca,
L. LeGrand, A. Rahimi, A. Rea, G. Bordello, B. Hemingway et al.,
“The mobile sensing platform: An embedded activity recognition
system,” IEEE Pervasive Computing, vol. 7, no. 2, 2008.
[18] S. Consolvo, D. W. McDonald, T. Toscos, M. Y. Chen, J. Froehlich,
B. Harrison, P. Klasnja, A. LaMarca, L. LeGrand, R. Libby et al.,
“Activity sensing in the wild: a field trial of ubifit garden,” in
Proceedings of the SIGCHI Conference on Human Factors in Computing
Systems. ACM, 2008, pp. 1797–1806.
[19] S. Hemminki, P. Nurmi, and S. Tarkoma, “Accelerometer-based
transportation mode detection on smartphones,” in Proceedings of
the 11th ACM Conference on Embedded Networked Sensor Systems.
ACM, 2013, p. 13.
[20] A. M. Khan, A. Tufail, A. M. Khattak, and T. H. Laine, “Activity recognition on smartphones via sensor-fusion and kda-based
svms,” International Journal of Distributed Sensor Networks, vol. 2014,
2014.
[21] K. Yatani and K. N. Truong, “Bodyscope: a wearable acoustic
sensor for activity recognition,” in Proceedings of the 2012 ACM
Conference on Ubiquitous Computing. ACM, 2012, pp. 341–350.
[22] K. Ellis, S. Godbole, J. Kerr, and G. Lanckriet, “Multi-sensor
physical activity recognition in free-living,” in Proceedings of the
2014 ACM International Joint Conference on Pervasive and Ubiquitous
Computing: Adjunct Publication. ACM, 2014, pp. 431–440.
[23] M. Rossi, G. Troster, and O. Amft, “Recognizing daily life context
using web-collected audio data,” in Wearable Computers (ISWC),
2012 16th International Symposium on. IEEE, 2012, pp. 25–28.
[24] A. Stisen, H. Blunck, S. Bhattacharya, T. S. Prentow, M. B. Kjærgaard, A. Dey, T. Sonne, and M. M. Jensen, “Smart devices are
different: Assessing and mitigatingmobile sensing heterogeneities
for activity recognition,” in Proceedings of the 13th ACM Conference
on Embedded Networked Sensor Systems. ACM, 2015, pp. 127–140.
[25] J. Seiter, O. Amft, M. Rossi, and G. Tröster, “Discovery of activity composites using topic models: An analysis of unsupervised
methods,” Pervasive and Mobile Computing, vol. 15, pp. 215–227,
2014.
Yonatan Vaizman Yonatan Vaizman is a Ph.D.
candidate in the department of Electrical and
Computer Engineering at UC San Diego. His
fields of interest are machine learning, signal
processing, and artificial intelligence. In his research, he applies methods from these fields
to music recommendation, mobile sensor processing, and human behavior recognition. He received his B.S. degree in Computer Science and
Computational Biology from the Hebrew University in Jerusalem, Israel, and his M.S. degree in
Electrical Engineering from UC San Diego.
Katherine Ellis Katherine Ellis is a Research
Scientist at Amazon. Her research interests are
in applications of machine learning to physical
activity measurement, mobile health, social network analysis and music recommendation. She
received a B.S. degree in electrical engineering
from the University of Southern California and
M.S. and Ph.D. degrees in electrical engineering
from UC San Diego. She is an IEEE member and
an ACM member.
Gert Lanckriet Gert Lanckriet is a Principal
Applied Scientist at Amazon, and Professor of
Electrical and Computer Engineering at UC San
Diego. His interests are in data science, on
the interplay between machine learning, applied
statistics, and large-scale optimization, with applications to music and video search and recommendation, multimedia, and personalized, mobile health.
He was awarded the SIAM Optimization Prize
in 2008 and is the recipient of a Hellman Fellowship, an IBM Faculty Award, an NSF CAREER Award, and an Alfred
P. Sloan Foundation Research Fellowship. In 2011, MIT Technology
Review named him one of the 35 top young technology innovators in
the world (TR35). In 2014, he received the Best Ten-Year Paper Award
at the International Conference on Machine Learning.
He received a masters degree in electrical engineering from the
Katholieke Universiteit Leuven, Belgium, and M.S. and Ph.D. degrees
in electrical engineering and computer science from UC Berkeley. He is
a senior IEEE member and an ACM member.
12
S UPPLEMENTARY MATERIAL
Supplementary material has technical details about the following components of the work:
•
•
•
•
•
•
•
•
•
Mobile app
Data collection procedure
Sensor measurements
Extracted features
Label processing
Classification methods
Performance evaluation
User personalization assessment
Detailed results tables
•
•
Mobile app
For the purpose of data collection in a large scale we developed a mobile application called ExtraSensory, with versions
for both iPhone and Android smartphones, and a companion application for the Pebble smartwatch that integrates
with both. The app was used for supervised data collection,
meaning it collects both sensor measurements and ground
truth context labels. The app is scheduled every minute
to automatically record measurements for 20 seconds from
the sensors. Sensors are sampled in frequencies appropriate
for their domain, and include motion-responsive sensors,
location services, audio, environment sensors, as well as bits
of information about the phone’s state. When the watch
is available (within Bluetooth range and paired with the
phone) measurements from the watch are also collected by
the app during the 20 second recording session. More details
about the sensors are provided in “Sensor measurements”.
At the end of the 20 second recording session the measurements are bundled in a zip file and sent through the
internet (if a WiFi network is available) to our lab’s server,
which runs a quick calculation and replies with an initial
prediction of the activity (e.g. sitting, walking, running). All
communication between the app and the server is secure
and encrypted, and identified only by a unique universal
identifier (UUID) that was randomly generated for each
user.
In addition to collecting sensor measurements, the app’s
interface provides several mechanisms for the user to report
labels about their context. This was a crucial part of the
research design and we had to overcome a basic trade-off:
on one hand we wanted to collect ground truth labels for as
many examples (minutes) as possible and with much detail
(combination of all the relevant context labels). On the other
hand we did not want the subject to interact with the app
every minute to report labels, both because it would be an
extreme inconvenience for the subject and because it would
impact the natural behavior of the subject and miss the
point of collecting data in-the-wild. To balance this tradeoff, we designed a flexible interface that helps minimize
the user-app interaction time. The following label-reporting
mechanisms were included:
•
A history journal presents the user’s activities
chronologically as a calendar and enables the user
to easily edit the context labels of time ranges in the
past (up to one day in the past). The user can easily
merge a sequence of minutes to a single “event” with
•
•
the same context labels, or split a calendar event to
describe a change in context. See Figure 2 (A). The
real-time predictions from the server assist the user
to recall when their activity changed — consecutive
minutes with the same prediction from the server are
merged to a single item on the history calendar.
The user can also initiate active feedback by reporting labels describing their context in the immediate
future (starting “now” for up to half an hour in the
future). See Figure 2 (B).
Every x minutes (by default, x is 10 minutes, but can
be set by the user) the app presents a notification
to remind the user to provide labels. If the the user
has recently provided labels, the notification asks
whether the user was still engaged in the same
activities — allowing for a quick and easy response
if the answer is “yes”. See Figure 2 (C).
The notifications also appear on the smartwatch,
allowing for an easier response with a click of a
button on the watch, without using the phone itself.
When selecting labels from the menu, a side-bar index allows quick search of the relevant labels, either
by categories (e.g. sports, work, company) or through
a “frequently used labels” menu, which presents
labels that the user has applied in the past. The
category in which a label was presented in the menu
does not matter, and a label can appear under different categories (e.g. “skateboarding” appears under
“sports”, “leisure” and “transportation”) — the only
reason for these categories is to make it easy for the
user to find the relevant label quickly.
Data collection procedure
The study’s research plan and consent form were approved
by the university’s institutional review board (IRB). Human subjects were recruited for the study via fliers across
campus, university mailing lists and word of mouth. Every
subject read and signed the consent form. The researchers
installed the app on each subject’s personal phone (to
maximize authenticity of natural behavior). The subject
then engaged in their usual behaviors for approximately a
week, while keeping the app running in the background
on their phone as much as was possible and convenient.
The subject was asked to report as many labels as possible
without interfering too much with their natural behavior.
Subjects varied in their level of rigorousness with respect
to providing labels: some wanted to be very precise (with
specific detailed combinations of labels, and trying to keep
minute-to-minute precision) and others tended to be less
specific and to dedicate less effort. The subjects who used
the watch, which we supplied them with, were told that it
is fine to get it wet (wash hands, shower) but not submerge
it (swimming). They were also asked to turn off the watch
app whenever they removed the watch from their wrist and
to turn it back on when they wore the watch — so we can
generally assume that whenever watch measurements are
available they were taken from the subject’s wrist.
Using the app consumes the phone’s battery more
quickly than normal. To make up for this, the researchers
provided participants with an external portable battery,
13
which provides one extra charge during the day. The researchers also provided the subject with the Pebble smartwatch (56 of the subjects agreed to use the watch). The
external battery and the smartwatch were returned at the
end of the study. Each subject was compensated for their
participation. The basic compensation was in the amount
of $40, and an additional amount was calculated based on
the amount of labeled data that the subject contributed (as
an incentive to encourage reporting many labels). The total
compensation per subject was between $40 and $75.
Technical difficulties
During the development of the iPhone app, there were
releases of new iOS versions that caused the app to not work
well and required us to change the code.
Since subjects used their personal phones, the app had to
handle different devices, and in the Android case, different
makers. For some of the Android users when we installed
the app we noticed it didn’t work well. In three cases the
workaround was to install a slightly different version of
the app that didn’t use the gyroscope. After installing the
changed app and making sure it works those users began
collecting records (without gyroscope measurements).
On top of the dataset’s 60 subjects, there were four more
subjects that participated and received the basic compensation, but whose data was not included in the dataset. For
two of them the app didn’t work well on their devices. The
other two were too stressed or otherwise occupied during
participation, and produced too little and un-reliable labels,
so we decided to discard their data.
Sensor measurements
Raw sensor measurements are provided in the publicly
available dataset.
High frequency measurements:
Each sensor (and pseudo-sensor) in the following list was
sampled at 40Hz during the ∼20 second recording session
to produce a time series of ∼800 time points. The sampling
relies on the design of the phone’s hardware and operating system and the sampling rate was not guaranteed to
be accurate (especially for the Android devices). For that
reason the time reference of each sample in a time series
was also recorded; the differences between consecutive time
references were approximately 25 milliseconds.
•
•
•
•
Accelerometer. Time series of 3-axis vectors of acceleration according to standard axes of phone devices.
Gyroscope. Time series of 3-axis vectors of rotation
rate around each of the phone’s 3 axes.
Magnetometer. Time series of 3-axis vectors of the
magnetic field.
Processed signals. Both iPhone and Android operating systems provide processed versions of the
signals: The raw acceleration is split to the gravity
acceleration (estimated direction of gravity at every
moment, the magnitude is always 1G) and the usergenerated acceleration (subtraction of the gravity signal from the raw acceleration). For the gyroscope the
OS has a calibrated version that attempts to remove
drift effects. For the magnetometer the OS has an
unbiased version that subtracts the estimated bias of
the magnetic field created by the device itself.
In this paper we used the raw acceleration signal (which
includes the effects of gravity) and the calibrated version of
the gyroscope signal. Acceleration is reported in units of G
(gravitational acceleration on the surface of the Earth) on
iPhone and in units of m/s2 on Android. Before extracting
features we converted the Android acceleration measurements to units of G.
Watch measurements: From the Pebble smartwatch
we collected signals from the two available sensors—
accelerometer and compass. Acceleration was sampled at
25Hz and describes a 3-axis vector of acceleration (in units
of mG) relative to the watch’s axes-system. The compass
does not have a constant sampling rate; it was requested
to provide an update of the heading whenever a change
of more than one degree was detected. The compass takes
some time to calibrate before providing measurements, so
some examples that have watch acceleration measurements
are missing compass measurements.
Location measurements: Both iPhone and Android provide
location services (based on a combination of GPS, WiFi and
cellular communications). The app samples location data in
a non-constant rate, as the location service updates each
time a movement is detected. This creates a time series
of varying length (sometimes just a single time point in a
recording session, sometimes more than 20 points) of location updates. Each update has a relative time reference and
the estimated location measurements: latitude coordinate,
longitude coordinate, altitude, speed, vertical accuracy and
horizontal accuracy (these accuracies describe the range of
reasonable error in location). Some of these values may be
missing at times (e.g. when the phone is in a place with weak
signals). In addition to the time series of location updates,
the app calculates on the phone some basic heuristic location
features: standard deviation of latitude values, standard
deviation of longitude values, total change of latitude (last
value minus first value), total change of longitude, average
absolute latitude derivative and average absolute longitude
derivative (as proxy to the speed of the user).
To protect our study subjects’ privacy (collected examples with label “at home” that also include the exact location
coordinates may reveal the subject’s identity) the app has an
option to select a location (typically their home) they would
like to disguise. For the subjects that opted to use this option, whenever they were within 500 meters of their chosen
location, the app would not send the latitude and longitude
coordinates from the current recording (but it would send
the other estimated location values such as altitude, speed,
as well as the basic heuristic location features).
Low frequency measurements: These measurements were
sampled just once in a recording session (approximately
once per minute). Some of them describe the phone state
(PS): app state (foreground/background), WiFi connectivity
status, battery status (charging, discharging), battery level,
or phone call status. Other low frequency measurements
are taken from sensors built in to the phone, if available:
proximity sensor, ambient light, temperature, humidity, air
pressure.
Audio data: Audio was recorded from the phone’s mi-
14
crophone in 22,050 Hz for the duration of the recording
session (∼20 seconds). Audio was not available for recording when the phone was being used for a phone call. In
order to maintain the privacy of the subjects, the raw audio
recording was not sent to the server. Instead, standard audio
processing features (Mel Frequency Cepstral Coefficients
(MFCC)) were calculated on the phone itself and only the
features were sent to the server. The MFCCs were calculated
for half-overlapping windows of 2048 samples, based on
40 Mel scaled frequency bands and 13 cepstral coefficients
(including the 0th coefficient). As part of the preprocessing
of the recorded audio the raw audio signal was normalized
to have maximal magnitude of 1 (dividing by the maximum
absolute value of the sound wave). This normalizing factor
is also sent as a measurement separately from the calculated
MFCC features.
Extracted features
For the experiments in this work we focused on six sensors:
accelerometer, gyroscope, watch accelerometer, location, audio and phone state. Other sensors’ measurements are available in the public dataset. Every sensor measures different
physical or virtual properties and has a different form of
raw measurements. Therefore we designed specific features
for each sensor. The published dataset includes files with
these features pre-computed for all the users.
Accelerometer and Gyroscope (26 features each): Since in
natural behavior the phone’s position is not controlled we
cannot assume it is oriented in a particular way, and it
also may be changing its axes-system with respect to the
ground (and with respect to the person). For that reason we
had little reason to assume that any of the phone’s axes
will have a particular coherent correspondence to many
behavioral patterns, and we extracted most of the features
based on the overall magnitude of the signal. We calculated
the vector magnitude signal as the euclidean norm of the
3-axis q
acceleration measurement at each point in time, i.e.,
2
2
2
a[t] = ax [t] + ay [t] + az [t] . We extracted the following
features:
•
•
•
Nine statistics of the magnitude signal: mean, standard deviation, third moment, fourth moment, 25th
percentile, 50th percentile, 75th percentile, valueentropy (entropy calculated from a histogram of
quantization of the magnitude values to 20 bins) and
time-entropy (entropy calculated from normalizing
the magnitude signal and treating it as a probability
distribution, which is designed to detect peakiness in
time—sudden bursts of magnitude).
Six spectral features of the magnitude signal: log
energies in 5 sub-bands (0–0.5Hz, 0.5–1Hz, 1–3Hz,
3–5Hz, >5Hz) and spectral entropy.
Two autocorrelation features from the magnitude
signal. The average of the magnitude signal (DC
component) was subtracted and the autocorrelation
function was computed and normalized such that
the autocorrelation value at lag 0 will be 1. The
highest value after the main lobe was located. The
corresponding period (in seconds) was calculated as
the dominant periodicity and its normalized autocorrelation value was also extracted.
•
Nine statistics of the 3-axis time series: the mean and
standard deviation of each axis and the 3 inter-axis
correlation coefficients.
Watch accelerometer (46 features): From the watch acceleration we extracted the same 26 features as from the phone
accelerometer or gyroscope. Since the watch is positioned
in a more controlled way than the phone (it is firmly fixed
to the wrist), its axes have a strong meaning (e.g. motion
along the x-axis of the watch describes a different kind
of movement than motion along the z-axis of the watch).
Hence we added 15 more axis-specific features—log energies in the same 5 sub-bands as before, this time calculated
for each axis’ signal separately. In addition, to account for
the changes in watch orientation during the recording we
calculated 5 relative-direction features in the following way:
we first calculate the cosine-similarity between the acceleration directions of any two time points in the time series
(value of 1 meaning same direction, value of -1 meaning
opposite directions and value of 0 meaning orthogonal
directions). Then we averaged these cosine similarity values
in 5 different ranges of time-lag between the compared time
points (0–0.5sec, 0.5–1sec, 1–5sec, 5–10sec, >10sec).
Location (17 features): In this work we used location
features that were based only on relative locations, and
not on absolute latitude/longitude coordinates. This was
in order to avoid over-fitting to our location-homogeneous
training set that will not generalize well to the outside
world (e.g., mistakenly learning that a specific location in
the UCSD campus always corresponds to “at work”). Six
features were calculated on the phone — this was in order
to have some basic location features in cases where the
subjects opted to hide their absolute location. These quick
features included standard deviation of latitude, standard
deviation of longitude, change in latitude (last value minus
first value), change in longitude, average absolute value
of derivative of latitude and average absolute value of
derivative of longitude.
The transmitted location measurements were further
processed to extract the following 11 features: number of
updates (indicating how much the location changed during
the 20 second recording), log of latitude-range (if latitudes
were transmitted), log of longitude-range (if longitudes
were transmitted), minimum altitude, maximum altitude,
minimum speed, maximum speed, best (lowest) vertical
accuracy, best (lowest) horizontal accuracy and diameter
(maximum distance between two locations in the recording
session, in meters).
Audio (26 features): From the time series of 13dimensional MFCC vectors (typically around 400 time
frames) we calculated the average and standard deviation
of each of the 13 coefficients.
Phone State (34 features): For this work we used only
the discrete phone state measurements. We represented
them with a 26-dimensional one-hot representation—for
each property we created a binary indicator for each of the
possible values the property can take, plus one indicator
denoting missing data. This representation is a redundant
coding of the phone state, but it facilitates the use of simple,
linear classifiers over this long binary vector representation.
The keys were: app state (3 options: active, inactive, back-
15
ground), battery plugged (3 options: AC, USB, wireless),
battery state (6 options: unknown, unplugged, not charging,
discharging, charging, full), in a phone call (2 options: false,
true), ringer mode (3 options: normal, silent no vibrate,
silent with vibrate) and WiFi status (3 options: not reachable,
reachable via WiFi, reachable via WWAN).
In addition, we added a set of features indicating timeof-day information. We used the timestamp of every example and (using San Diego local time) extracted the hour
component (one out of 24 discrete values). In order to get a
flexible, useful representation we defined 8 half-overlapping
time ranges: midnight-6am, 3am-9am, 6am-midday, 9am3pm, midday-6pm, 3pm-9pm, 6pm-midnight and 9pm-3am.
Then we represented each example’s hour with an 8-bit
binary value, where 2 bins will be active for 1 relevant time
range.
•
Label processing
Since the labels are obtained by subjects self-reporting their
own behaviors, the reliability of annotation is not perfect.
In some cases, this was the result of the subject reporting
labels some time after the activity had occurred and misremembering the exact time. More common are cases where
the subject neglected to report labels when relevant activities
occurred (perhaps because the subject was distracted, did
not have time to specify all the relevant labels, or was not
aware of another relevant label in the vocabulary). As part
of cleaning the data, we created adjusted versions for some
labels using two methods: based on location data and based
on other labels.
Location adjusted labels. We collected absolute location
coordinates of the examples that had location measurements
(selecting the location update with best horizontal accuracy
from each example) and visualized them on a map. This
made it easier to correct some labels which were clearly
reported incorrectly. In examples without location data the
original label was maintained.
•
•
“At the beach”. According to the few examples that
reported being at the beach we marked areas that
should be regarded as beach (and manually verified
their validity by viewing them on a map). We then
adjusted the label by applying “At the beach” to any
example with a location within these areas.
“At home”. For each subject we identified the location of their home (by visualizing on a map all
locations of examples where the subject reported
being at home) and marked the coordinates of a
visual centroid. This was only done when it was
clear that we had indeed identified a location of
a home. Three subjects reported being at home in
two different houses, in which case we marked the
two locations as locations of home. Two subjects
never reported being at home but it was clear from
their location to identify their location of residence.
Some subjects had none or very few examples of “at
home” with location data, so no home location was
noted and their original reported labels were used.
To define the adjusted version of the label “at home”,
whenever a subject’s location was within 15 meters
of their marked home location (or either of the two
marked home locations), the adjusted value was set
to “true”; whenever a subject’s location was farther
than 100 meters from all the subject’s marked home
locations the adjusted value was set to “false”. In
other cases (when the location was between 15 and
100 meters from a home location, or when there was
no location data available) we retained the subject’s
originally reported value for “at home”. This adjustment removed some obviously false reports of “at
home” (e.g., when the subject was clearly on a drive
on a freeway). The adjustment manifested mostly
by adding the missing label “at home” to many
examples where the subject was clearly at home but
failed to report it.
“At main workplace”. Similarly to home label we
identified for each subject (if they used the original
label “at work”) the centroid location of their main
workplace and created a new label — “at main workplace” — in a similar way. Some subjects reported
being at work in different locations, so the original
label “at work” is still valid for analysis and may
have a different meaning than “at main workplace”
(which was designed to capture behavioral patterns
typical to the most common place that a person
works in). This adjustment removed some examples
where the label “At work” was probably incorrectly
reported, but more importantly, it added the missing
label in cases where the subject was clearly present
at their most common workplace.
Labels corrected using other labels. We used reported values
of other labels to adjust some labels. In a few cases it was
clear that the reported labels were mistakes (because the
combination of labels was unreasonable). In other cases
a relevant label was simply not reported, even though it
clearly should be relevant according to the other reported
labels.
•
•
“Walking”. We identified a few cases where subjects reported walking together with labels related to
driving. In cases where location data was available,
it was clear on the map that the correct activity
was the drive and not the walk. In the adjusted
version of “walking” we changed the value to “false”
whenever the subject reported “on a bus”, “in a car”,
“drive (I’m the driver)”, “drive (I’m a passenger)”,
“motorbike”, “skateboarding” or “at the pool”.
“Running”. The adjusted version was set to “false”
for the same activities as in the adjusted “walking” label, plus in cases where the subject reported
“playing baseball” or “playing frisbee”. Although
these cases are likely still valid (because the subject
decided to report they were running during these
playing activities), we decided to create the adjusted
“running” version to represent a more coherent running activity (assuming that the playing activities
involve a mixture of running, walking and standing intermittently). While the adjusted versions of
“walking” and “running” may have a few misses
(e.g., some minutes during a baseball game when
the subject was purely running), these misses don’t
harm the integrity of the multi-class experiments,
16
•
•
•
•
which used only examples that had positive labels
of “running”, “walking”, “sitting”, etc..
“Exercise”. The adjusted version was set to “true”
whenever the subject reported “exercising”, “running”, “bicycling”, “lifting weights”, “elliptical machine”, “treadmill”, “stationary bike” or “at the
gym”. This adjustment boosted the representation
of the exercise behavior and also took advantage of
reported specific activities without enough examples
to be analyzed on their own.
“Indoors”. The adjusted version was set to “true”
whenever the subject reported “indoors”, “sleeping”,
“toilet”, “bathing — bath”, “bathing — shower”,
“in class”, “at home”, “at a bar”, “at the gym” or
“elevator”. It is reasonable that many subjects simply
did not bother to report being indoors every time
they did an activity indoors.
“Outside”. The adjusted version was set to “true”
whenever the subject reported “outside”, “skateboarding”, “playing baseball”, “playing frisbee”,
“gardening”, “raking leaves”, “strolling”, “hiking”,
“at the beach”, “at sea” or “motorbike”.
“At a restaurant”. In the adjusted version we
changed the value to “false” whenever the subject
reported “on a bus”, “in a car”, “drive (I’m the
driver)”, “drive (I’m a passenger)” or “motorbike”.
Classification methods
Our system uses binary logistic regression classifiers (with
a fitted intercept). Logistic regression provides a real-valued
output, interpreted as the probability of the relevance of the
label (value larger than 0.5 yielding a decision of “relevant”).
For each context label we used an independent model.
We first randomly partitioned the training examples into
internal training and validation subsets, allocating one third
of the training examples for the validation subset, while
maintaining the same proportion of positive vs. negative
examples in both subsets. We then used grid search to select
the cost parameter C for logistic regression: for each value
(out of {0.001, 0.01, 0.1, 1, 10, 100}) we trained a logistic
regression model on the internal train subset and tested the
model on the validation subset. We selected the value of C
that resulted in highest F1 measure on the validation subset.
We then re-trained a logistic regression model with the
selected value on the entire training set. For the leave-oneuser-out experiment with the EF system we simplified the
procedure and only trained the logistic regression models
with value of C = 1 (instead of performing grid search).
The learned weights from LFL for a set of selected labels
that are presented in Figure 4 (A) are taken from the first (of
five) training set of the cross validation evaluation. To look
at misclassifications and to produce the confusion matrices
in Figure 4 (B–G) we used the multiclass (one-versus-rest)
version of logistic regression, with a fixed cost value of
C = 1. Each multiclass experiment used the set of examples
annotated with exactly one label from the examined label
subset and with data from all of the sensors of interest
(so an experiment with only accelerometer and gyroscope
sensors might have more examples than an experiment with
accelerometer, gyroscope and watch accelerometer). These
experiments were more fitting than binary classification in
cases where missing labels are common. For example, labels
describing the phone’s position were not always consistently annotated. A binary classifier will use all negative
examples to learn a decision boundary, including examples
the subject forgot to label, which may skew the results if
there are many missing labels.
Performance evaluation
In order to make a fair comparison among the different
sensors, evaluation was done on the subset of examples with
data from all six core sensors available (∼177k examples
from 51 subjects). In the training phase, however, a singlesensor classifier was allowed to use all examples available
(e.g., all examples in the dataset had phone state data, so the
PS single-sensor classifier was trained with all examples).
While the early fusion system benefited from the advantage of modeling correlations between features of different
sensors, it was limited to being trained only on examples
with all sensor data available. The late fusion systems, on
the other hand, had the advantage of using single-sensor
classifiers that were trained on many more examples.
Classifier performance was evaluated using 5-fold cross
validation. The subjects were randomly partitioned once
into 5 folds, while equalizing the proportion of iPhone
vs. Android users between folds (To keep a fair evaluation
it was important to partition the subjects, and not randomly
partition the pool of examples, in order to avoid having
examples from the same subject appear in both the training
set and the test set). The cross validation procedure repeats
the following for each fold: (1) hold out the selected fold
to act as the test set (2) train a classifier on the remaining
folds (3) apply the classifier to the held out test set. For
each fold and for each label, we counted the numbers of
true positives (TP. Examples that were correctly classified as
positive), true negatives (TN. Examples that were correctly
classified as negative), false positives (FP. Examples that
were wrongfully classified as positive) and false negatives
(FN. Examples that were wrongfully classified as negative).
At the end of the 5-fold procedure we summed up the total
numbers of TP, TN, FP and FN over the entire evaluation
set and calculated the following performance metrics:
•
•
•
•
•
Accuracy is the proportion of correctly classified examples out of all the examples. This metric is sensitive to imbalanced label proportion in the data.
True positive rate (TPR, also called sensitivity
or recall) is the proportion of positive examples that were correctly classified as positive: recall=TPR=TP/(TP+FN).
True negative rate (TNR, also called specificity) is the
proportion of negative examples that were correctly
classified as negative: TNR=TN/(TN+FP).
Precision (prec) is the proportion of correctly classified examples out of the examples that the classifier
declared as positive: precision=TP/(TP+FP).
Balanced accuracy is a measure that accounts for the
tradeoff between true positive rate and true negative
rate: BA=(TPR+TNR)/2.
17
•
The F1 measure is another such measure, which
takes the harmonic mean of precision and recall:
F1=(2*TPR*prec)/(TPR+prec).
While the balanced accuracy is easy to interpret (chance
level is always 0.5 and perfect performance is 1) the F1
measure is very sensitive to how rare the positive examples
are, so for each label a typical F1 value is different. The
5-fold subject partition is available with the dataset, and
we encourage researchers using the dataset to evaluate
new methods to use the same 5-fold partition, in order to
promote fair comparisons.
Random chance. To assess the statistical significance
of the performance scores we achieved, we evaluated a
distribution of performance scores achieved by a random
classifier. The random classifier declares “relevant” with
probability 0.5 independently for each example and for
each label. To estimate the distribution of scores that such
a classifier obtains, we ran 100 simulations (each time the
classifier randomly assigned binary predictions and the
performance scores were calculated over the entire evaluation dataset). Chance level (expected value of the random
classifier) of balanced accuracy is 0.5 for every label. For
the F1 measure the chance level for each label is dependent
on the proportion of positive and negative examples in the
data. For each performance measure and for each label we
estimated a value which we call p99, the 99th percentile
among the 100 scores achieved in the 100 simulations. Hence
the probability of obtaining a score greater than p99 by
chance is less than 1%. For average (over a set of labels)
scores the p99 value was calculated similarly (computing
the average score for each of the 100 simulations).
User personalization assessment
To assess the advantages of user personalization, we selected a single test subject that had provided relatively
many examples and many labels. We partitioned this user’s
examples into the first half and second half of the examples
(according to their recording timestamps), to simulate an
adaptation training period (the first half) and a deployment
period (the second half). We used early fusion (EF) classifiers
to combine the features from all 6 sensors. The universal
model was the one used in previous experiments, taken
from the fold where the test user was part of the cross
validation test set (so the universal model was trained on 48
other users). The individual model was trained only on data
from the test user, taken from the first half of the subject’s
examples. The adapted model was a combination of both the
universal and individual models using the LFA method (i.e.,
averaging the probability outputs of both models). All three
models were tested on the same set of unseen test examples
(the second half of the subject’s examples). For some labels,
an insufficient number of examples to train an individual
classifier resulted in a trivial classifier (always declaring the
same answer). In those cases the performance was reported
as chance level (BA of 0.5 and F1 of 0).
18
D ETAILED RESULTS TABLES
5-fold cross validation evaluation
19
p99
0.50
0.50
0.51
0.52
0.51
0.50
0.51
0.51
0.51
0.50
0.50
0.51
0.51
0.52
0.51
0.51
0.50
0.52
0.50
0.51
0.51
0.52
0.53
0.52
0.52
0.50
Gyro WAcc
Loc
Aud
PS
EF
LFA LFL
0.69
0.81
0.66
0.79
0.85
0.87
0.86
0.88
0.61
0.68
0.61
0.65
0.69
0.76
0.75
0.75
0.80
0.75
0.66
0.63
0.70
0.80
0.80
0.80
0.66
0.80
0.56
0.48
0.58
0.62
0.69
0.71
0.81
0.84
0.81
0.77
0.83
0.87
0.87
0.87
0.70
0.81
0.62
0.79
0.87
0.88
0.88
0.89
0.62
0.65
0.84
0.71
0.81
0.84
0.87
0.85
0.63
0.57
0.74
0.76
0.67
0.70
0.77
0.80
0.57
0.62
0.63
0.79
0.73
0.80
0.79
0.82
0.49
0.63
0.76
0.65
0.78
0.80
0.80
0.81
0.66
0.67
0.63
0.71
0.72
0.75
0.75
0.76
0.73
0.70
0.66
0.66
0.73
0.74
0.77
0.78
0.65
0.71
0.81
0.77
0.84
0.85
0.86
0.86
0.69
0.67
0.75
0.74
0.82
0.77
0.84
0.83
0.61
0.75
0.82
0.74
0.83
0.84
0.86
0.87
0.71
0.64
0.79
0.76
0.81
0.84
0.84
0.85
0.63
0.66
0.63
0.71
0.70
0.75
0.77
0.78
0.67
0.68
0.58
0.85
0.77
0.76
0.83
0.81
0.75
0.67
0.61
0.64
0.72
0.77
0.77
0.77
0.73
0.77
0.71
0.70
0.77
0.81
0.80
0.81
0.53
0.68
0.57
0.62
0.68
0.71
0.71
0.72
0.70
0.69
0.54
0.59
0.79
0.69
0.76
0.80
0.74
0.72
0.67
0.64
0.75
0.66
0.77
0.74
0.69
0.50
0.56
0.80
0.74
0.70
0.82
0.81
0.55
0.73
0.47
0.63
0.47
0.64
0.67
0.70
0.66
0.70
0.67
0.70
0.75
0.77
0.80
0.80
TABLE S1
5-fold evaluation performance (BA) of the different classifiers on each label. Part 1 of the labels. For each label ne is the number of examples and
ns is the number of subjects in the testing (possibly more examples participated in the training). p99 marks the 99th percentile of random scores
— a score above the p99 value has less than 0.01 probability to be achieved randomly. For each label the score of the highest performing classifier
is marked in bold.
Lying down
Sitting
Walking
Running
Bicycling
Sleeping
Lab work
In class
In a meeting
At main workplace
Indoors
Outside
In a car
On a bus
Drive (I’m the driver)
Drive (I’m a passenger)
At home
At a restaurant
Phone in pocket
Exercise
Cooking
Shopping
Strolling
Drinking (alcohol)
Bathing - shower
average
ne
54359
82904
11892
675
3523
42920
2898
2872
2904
20382
107944
7629
3635
1185
5034
1655
83977
1320
15301
5384
2257
896
434
864
1186
ns
47
50
50
19
22
40
8
13
34
26
51
36
24
24
24
19
50
16
31
36
33
18
8
10
27
p99
0.51
0.52
0.52
0.51
0.50
0.53
0.53
0.55
0.53
0.50
0.50
0.51
0.51
0.51
0.52
0.52
0.53
0.53
0.55
0.50
0.50
0.51
0.51
0.50
0.51
0.50
0.50
Acc
0.72
0.63
0.77
0.69
0.81
0.75
0.71
0.60
0.60
0.57
0.66
0.70
0.79
0.73
0.79
0.76
0.65
0.62
0.69
0.73
0.52
0.70
0.67
0.71
0.53
0.68
Gyro WAcc
Loc
Aud
PS
EF
LFA LFL
0.64
0.71
0.41
0.60
0.51
0.60
0.70
0.68
0.66
0.66
0.38
0.53
0.65
0.58
0.63
0.63
0.52
0.70
0.58
0.60
0.57
0.65
0.70
0.70
0.54
0.56
0.56
0.64
0.67
0.65
0.70
0.68
0.55
0.60
0.54
0.60
0.57
0.59
0.63
0.63
0.71
0.49
0.54
0.81
0.56
0.54
0.76
0.75
0.66
0.53
0.60
0.49
0.93
0.50
0.61
0.66
0.48
0.47
0.72
0.58
0.70
0.50
0.71
0.70
0.64
0.46
0.61
0.68
0.59
0.50
0.65
0.53
0.61
0.60
0.54
0.65
0.65
0.65
0.67
0.67
0.56
0.62
0.63
0.61
0.68
0.68
0.71
0.70
0.58
0.60
0.51
0.61
0.62
0.66
0.65
0.65
0.51
0.58
0.57
0.64
0.59
0.65
0.66
0.66
0.49
0.62
0.59
0.63
0.58
0.60
0.63
0.63
0.52
0.64
0.54
0.65
0.61
0.64
0.67
0.67
0.55
0.58
0.57
0.65
0.70
0.54
0.64
0.61
0.73
0.65
0.55
0.55
0.51
0.58
0.69
0.67
0.73
0.66
0.55
0.55
0.51
0.58
0.71
0.66
0.76
0.44
0.54
0.71
0.51
0.49
0.73
0.73
0.59
0.67
0.54
0.59
0.63
0.68
0.67
0.68
0.59
0.59
0.66
0.64
0.68
0.70
0.70
0.70
0.68
0.56
0.59
0.59
0.61
0.64
0.67
0.66
0.56
0.55
0.59
0.64
0.69
0.67
0.68
0.69
0.61
0.56
0.53
0.55
0.61
0.61
0.62
0.62
0.57
0.61
0.58
0.68
0.67
0.69
0.71
0.72
0.58
0.53
0.54
0.60
0.60
0.55
0.61
0.58
0.60
0.59
0.56
0.62
0.62
0.60
0.67
0.66
TABLE S2
5-fold evaluation performance (BA) of the different classifiers on each label. Part 2 of the labels. For each label ne is the number of examples and
ns is the number of subjects in the testing (possibly more examples participated in the training). p99 marks the 99th percentile of random scores
— a score above the p99 value has less than 0.01 probability to be achieved randomly. For each label the score of the highest performing classifier
is marked in bold.
Cleaning
Laundry
Washing dishes
Watching TV
Surfing the internet
At a party
At a bar
At the beach
Singing
Talking
Computer work
Eating
Toilet
Grooming
Dressing
At the gym
Stairs - going up
Stairs - going down
Elevator
Standing
At school
Phone in hand
Phone in bag
Phone on table
With co-workers
With friends
average
ne
1839
473
851
9412
11641
404
520
122
384
18976
23692
10169
1646
1847
1308
906
399
390
124
22766
25840
8595
5589
70611
4139
12865
ns
22
12
17
28
28
3
4
5
6
44
38
49
33
25
27
6
17
15
8
51
39
37
22
43
17
25
Acc
0.63
0.65
0.40
0.61
0.56
0.74
0.45
0.62
0.57
0.60
0.57
0.59
0.57
0.44
0.51
0.50
0.70
0.71
0.72
0.60
0.59
0.65
0.59
0.60
0.57
0.55
0.59
20
p99
0.38
0.49
0.12
0.01
0.04
0.33
0.03
0.03
0.03
0.19
0.55
0.08
0.04
0.01
0.06
0.02
0.49
0.02
0.15
0.06
0.03
0.01
0.01
0.01
0.01
0.13
Gyro WAcc
Loc
Aud
PS
EF
LFA LFL
0.59
0.71
0.55
0.69
0.78
0.81
0.79
0.82
0.58
0.67
0.59
0.62
0.72
0.75
0.75
0.74
0.38
0.31
0.22
0.19
0.22
0.38
0.39
0.38
0.03
0.04
0.01
0.01
0.01
0.03
0.04
0.04
0.16
0.23
0.18
0.12
0.17
0.31
0.25
0.26
0.53
0.65
0.44
0.63
0.75
0.79
0.77
0.81
0.06
0.06
0.11
0.09
0.11
0.21
0.16
0.19
0.06
0.04
0.07
0.10
0.06
0.13
0.12
0.14
0.04
0.05
0.05
0.11
0.07
0.17
0.10
0.14
0.18
0.28
0.41
0.31
0.42
0.49
0.47
0.50
0.73
0.70
0.68
0.75
0.71
0.78
0.79
0.78
0.20
0.18
0.15
0.15
0.20
0.23
0.26
0.25
0.07
0.10
0.27
0.13
0.16
0.23
0.22
0.23
0.03
0.03
0.07
0.04
0.06
0.07
0.07
0.06
0.09
0.15
0.37
0.16
0.23
0.31
0.31
0.31
0.04
0.04
0.15
0.07
0.08
0.14
0.12
0.12
0.65
0.64
0.63
0.70
0.67
0.74
0.76
0.77
0.03
0.03
0.02
0.08
0.05
0.11
0.07
0.09
0.33
0.26
0.21
0.25
0.28
0.38
0.36
0.37
0.18
0.24
0.14
0.13
0.19
0.27
0.26
0.25
0.03
0.05
0.03
0.04
0.06
0.09
0.07
0.08
0.03
0.02
0.01
0.02
0.04
0.04
0.04
0.04
0.02
0.01
0.01
0.01
0.02
0.03
0.03
0.03
0.02
0.01
0.01
0.04
0.03
0.07
0.07
0.06
0.02
0.04
0.01
0.02
0.01
0.04
0.04
0.05
0.20
0.22
0.22
0.22
0.24
0.30
0.29
0.30
TABLE S3
5-fold evaluation performance (F1) of the different classifiers on each label. Part 1 of the labels. For each label ne is the number of examples and
ns is the number of subjects in the testing (possibly more examples participated in the training). p99 marks the 99th percentile of random scores
— a score above the p99 value has less than 0.01 probability to be achieved randomly. For each label the score of the highest performing classifier
is marked in bold.
Lying down
Sitting
Walking
Running
Bicycling
Sleeping
Lab work
In class
In a meeting
At main workplace
Indoors
Outside
In a car
On a bus
Drive (I’m the driver)
Drive (I’m a passenger)
At home
At a restaurant
Phone in pocket
Exercise
Cooking
Shopping
Strolling
Drinking (alcohol)
Bathing - shower
average
ne
54359
82904
11892
675
3523
42920
2898
2872
2904
20382
107944
7629
3635
1185
5034
1655
83977
1320
15301
5384
2257
896
434
864
1186
ns
47
50
50
19
22
40
8
13
34
26
51
36
24
24
24
19
50
16
31
36
33
18
8
10
27
p99
0.02
0.01
0.01
0.10
0.12
0.01
0.01
0.00
0.00
0.18
0.21
0.11
0.02
0.02
0.02
0.01
0.01
0.00
0.00
0.21
0.23
0.09
0.06
0.45
0.05
0.13
0.08
Acc
0.61
0.58
0.38
0.03
0.19
0.57
0.08
0.05
0.05
0.23
0.74
0.20
0.15
0.04
0.21
0.07
0.66
0.02
0.28
0.21
0.03
0.03
0.02
0.03
0.01
0.22
Gyro WAcc
Loc
Aud
PS
EF
LFA LFL
0.05
0.05
0.01
0.03
0.02
0.05
0.06
0.05
0.01
0.01
0.00
0.01
0.01
0.02
0.01
0.02
0.01
0.03
0.01
0.02
0.01
0.03
0.03
0.04
0.11
0.12
0.12
0.17
0.18
0.21
0.22
0.22
0.14
0.17
0.13
0.17
0.15
0.18
0.19
0.20
0.01
0.00
0.01
0.03
0.01
0.04
0.03
0.04
0.01
0.01
0.01
0.00
0.09
0.00
0.03
0.06
0.00
0.00
0.01
0.00
0.01
0.00
0.02
0.02
0.01
0.00
0.01
0.01
0.01
0.00
0.01
0.01
0.26
0.24
0.21
0.29
0.27
0.29
0.30
0.30
0.25
0.30
0.31
0.30
0.35
0.38
0.39
0.39
0.14
0.15
0.11
0.16
0.15
0.19
0.18
0.17
0.02
0.03
0.02
0.03
0.03
0.04
0.04
0.04
0.02
0.03
0.03
0.04
0.03
0.05
0.04
0.05
0.02
0.03
0.02
0.03
0.03
0.04
0.04
0.04
0.01
0.02
0.01
0.02
0.02
0.03
0.03
0.03
0.02
0.01
0.01
0.01
0.00
0.01
0.02
0.01
0.02
0.01
0.01
0.01
0.00
0.01
0.02
0.01
0.01
0.00
0.00
0.00
0.00
0.00
0.01
0.01
0.27
0.35
0.23
0.27
0.29
0.36
0.34
0.35
0.29
0.30
0.38
0.34
0.39
0.41
0.41
0.41
0.17
0.11
0.13
0.13
0.13
0.16
0.17
0.16
0.08
0.07
0.09
0.11
0.12
0.15
0.14
0.14
0.58
0.51
0.50
0.51
0.56
0.56
0.59
0.58
0.06
0.07
0.06
0.11
0.08
0.13
0.12
0.13
0.17
0.14
0.15
0.18
0.18
0.15
0.19
0.18
0.11
0.11
0.10
0.11
0.12
0.13
0.14
0.14
TABLE S4
5-fold evaluation performance (F1) of the different classifiers on each label. Part 2 of the labels. For each label ne is the number of examples and
ns is the number of subjects in the testing (possibly more examples participated in the training). p99 marks the 99th percentile of random scores
— a score above the p99 value has less than 0.01 probability to be achieved randomly. For each label the score of the highest performing classifier
is marked in bold.
Cleaning
Laundry
Washing dishes
Watching TV
Surfing the internet
At a party
At a bar
At the beach
Singing
Talking
Computer work
Eating
Toilet
Grooming
Dressing
At the gym
Stairs - going up
Stairs - going down
Elevator
Standing
At school
Phone in hand
Phone in bag
Phone on table
With co-workers
With friends
average
ne
1839
473
851
9412
11641
404
520
122
384
18976
23692
10169
1646
1847
1308
906
399
390
124
22766
25840
8595
5589
70611
4139
12865
ns
22
12
17
28
28
3
4
5
6
44
38
49
33
25
27
6
17
15
8
51
39
37
22
43
17
25
Acc
0.05
0.01
0.01
0.14
0.15
0.01
0.00
0.00
0.01
0.25
0.26
0.15
0.03
0.02
0.02
0.01
0.02
0.02
0.01
0.28
0.30
0.17
0.10
0.58
0.06
0.15
0.11
21
Leave-one-user-out evaluation
22
p99
0.50
0.50
0.51
0.52
0.51
0.50
0.51
0.51
0.51
0.50
0.50
0.51
0.51
0.52
0.51
0.51
0.50
0.52
0.50
0.51
0.51
0.52
0.53
0.52
0.52
0.50
Gyro WAcc
Loc
Aud
PS
EF
LFA LFL
0.69
0.81
0.65
0.79
0.84
0.87
0.86
0.88
0.61
0.68
0.61
0.65
0.69
0.76
0.75
0.75
0.80
0.75
0.66
0.63
0.71
0.80
0.80
0.81
0.69
0.80
0.56
0.50
0.57
0.67
0.72
0.76
0.81
0.85
0.80
0.76
0.80
0.87
0.86
0.87
0.70
0.81
0.62
0.80
0.85
0.88
0.88
0.89
0.61
0.65
0.82
0.70
0.84
0.84
0.84
0.84
0.63
0.58
0.74
0.77
0.72
0.74
0.79
0.81
0.59
0.62
0.66
0.78
0.73
0.81
0.80
0.82
0.49
0.64
0.76
0.65
0.80
0.80
0.81
0.82
0.66
0.68
0.63
0.70
0.72
0.76
0.75
0.76
0.74
0.70
0.66
0.67
0.71
0.75
0.78
0.79
0.66
0.71
0.82
0.76
0.83
0.85
0.86
0.87
0.69
0.68
0.72
0.72
0.80
0.78
0.83
0.82
0.62
0.75
0.83
0.75
0.84
0.84
0.86
0.87
0.70
0.64
0.80
0.77
0.82
0.84
0.83
0.84
0.63
0.66
0.62
0.72
0.72
0.76
0.77
0.77
0.68
0.69
0.57
0.84
0.74
0.79
0.84
0.84
0.75
0.67
0.61
0.64
0.71
0.77
0.77
0.77
0.73
0.77
0.71
0.70
0.75
0.81
0.81
0.81
0.55
0.67
0.57
0.62
0.68
0.71
0.72
0.72
0.69
0.68
0.53
0.57
0.79
0.67
0.75
0.78
0.73
0.70
0.63
0.62
0.71
0.67
0.74
0.75
0.70
0.54
0.56
0.79
0.54
0.68
0.79
0.77
0.54
0.74
0.48
0.63
0.48
0.64
0.69
0.72
0.67
0.70
0.66
0.70
0.74
0.78
0.80
0.81
TABLE S5
Leave-one-user-out evaluation performance (BA) of the different classifiers on each label. Part 1 of the labels. For each label ne is the number of
examples and ns is the number of subjects in the testing (possibly more examples participated in the training). p99 marks the 99th percentile of
random scores — a score above the p99 value has less than 0.01 probability to be achieved randomly. For each label the score of the highest
performing classifier is marked in bold.
Lying down
Sitting
Walking
Running
Bicycling
Sleeping
Lab work
In class
In a meeting
At main workplace
Indoors
Outside
In a car
On a bus
Drive (I’m the driver)
Drive (I’m a passenger)
At home
At a restaurant
Phone in pocket
Exercise
Cooking
Shopping
Strolling
Drinking (alcohol)
Bathing - shower
average
ne
54359
82904
11892
675
3523
42920
2898
2872
2904
20382
107944
7629
3635
1185
5034
1655
83977
1320
15301
5384
2257
896
434
864
1186
ns
47
50
50
19
22
40
8
13
34
26
51
36
24
24
24
19
50
16
31
36
33
18
8
10
27
p99
0.51
0.52
0.52
0.51
0.50
0.53
0.53
0.55
0.53
0.50
0.50
0.51
0.51
0.51
0.52
0.52
0.53
0.53
0.55
0.50
0.50
0.51
0.51
0.50
0.51
0.50
0.50
Acc
0.73
0.63
0.77
0.69
0.81
0.75
0.69
0.61
0.62
0.55
0.67
0.72
0.79
0.74
0.80
0.76
0.65
0.62
0.69
0.74
0.52
0.71
0.64
0.72
0.50
0.68
Gyro WAcc
Loc
Aud
PS
EF
LFA LFL
0.63
0.73
0.42
0.62
0.49
0.70
0.71
0.70
0.65
0.66
0.35
0.52
0.78
0.60
0.68
0.70
0.48
0.69
0.54
0.61
0.54
0.66
0.67
0.68
0.54
0.57
0.57
0.67
0.66
0.69
0.72
0.71
0.58
0.59
0.56
0.60
0.57
0.61
0.62
0.62
0.71
0.48
0.70
0.84
0.67
0.52
0.79
0.76
0.69
0.50
0.64
0.62
0.88
0.52
0.71
0.68
0.51
0.52
0.71
0.58
0.69
0.57
0.71
0.71
0.62
0.46
0.70
0.68
0.60
0.48
0.68
0.53
0.61
0.61
0.55
0.66
0.64
0.66
0.68
0.68
0.57
0.62
0.65
0.59
0.67
0.69
0.71
0.69
0.58
0.60
0.53
0.61
0.63
0.66
0.66
0.66
0.52
0.57
0.57
0.63
0.56
0.65
0.65
0.65
0.53
0.62
0.60
0.65
0.53
0.63
0.64
0.66
0.54
0.66
0.53
0.67
0.55
0.66
0.67
0.68
0.56
0.67
0.51
0.67
0.70
0.58
0.67
0.67
0.76
0.65
0.57
0.57
0.48
0.59
0.69
0.66
0.75
0.66
0.54
0.55
0.48
0.57
0.69
0.63
0.70
0.56
0.57
0.70
0.54
0.50
0.62
0.61
0.59
0.67
0.54
0.59
0.62
0.68
0.66
0.67
0.59
0.59
0.68
0.66
0.70
0.72
0.71
0.71
0.68
0.56
0.58
0.58
0.59
0.63
0.67
0.66
0.56
0.56
0.59
0.69
0.69
0.72
0.71
0.73
0.61
0.56
0.52
0.56
0.61
0.61
0.63
0.62
0.57
0.61
0.61
0.68
0.71
0.69
0.73
0.74
0.57
0.54
0.55
0.62
0.59
0.58
0.63
0.61
0.60
0.60
0.57
0.63
0.62
0.62
0.68
0.67
TABLE S6
Leave-one-user-out evaluation performance (BA) of the different classifiers on each label. Part 2 of the labels. For each label ne is the number of
examples and ns is the number of subjects in the testing (possibly more examples participated in the training). p99 marks the 99th percentile of
random scores — a score above the p99 value has less than 0.01 probability to be achieved randomly. For each label the score of the highest
performing classifier is marked in bold.
Cleaning
Laundry
Washing dishes
Watching TV
Surfing the internet
At a party
At a bar
At the beach
Singing
Talking
Computer work
Eating
Toilet
Grooming
Dressing
At the gym
Stairs - going up
Stairs - going down
Elevator
Standing
At school
Phone in hand
Phone in bag
Phone on table
With co-workers
With friends
average
ne
1839
473
851
9412
11641
404
520
122
384
18976
23692
10169
1646
1847
1308
906
399
390
124
22766
25840
8595
5589
70611
4139
12865
ns
22
12
17
28
28
3
4
5
6
44
38
49
33
25
27
6
17
15
8
51
39
37
22
43
17
25
Acc
0.62
0.67
0.36
0.61
0.55
0.73
0.53
0.66
0.56
0.61
0.59
0.59
0.57
0.46
0.51
0.55
0.68
0.70
0.68
0.60
0.60
0.66
0.60
0.60
0.55
0.56
0.59
23
p99
0.38
0.49
0.12
0.01
0.04
0.33
0.03
0.03
0.03
0.19
0.55
0.08
0.04
0.01
0.06
0.02
0.49
0.02
0.15
0.06
0.03
0.01
0.01
0.01
0.01
0.13
Gyro WAcc
Loc
Aud
PS
EF
LFA LFL
0.59
0.71
0.54
0.69
0.76
0.81
0.79
0.82
0.58
0.68
0.58
0.62
0.71
0.75
0.75
0.74
0.37
0.32
0.21
0.19
0.22
0.38
0.39
0.39
0.02
0.04
0.01
0.01
0.01
0.04
0.04
0.04
0.15
0.23
0.16
0.12
0.15
0.30
0.24
0.26
0.53
0.65
0.44
0.64
0.74
0.79
0.76
0.80
0.06
0.06
0.11
0.08
0.11
0.21
0.15
0.18
0.06
0.04
0.08
0.11
0.07
0.13
0.12
0.14
0.04
0.05
0.06
0.11
0.07
0.17
0.11
0.15
0.19
0.29
0.41
0.31
0.43
0.49
0.48
0.52
0.73
0.71
0.68
0.75
0.71
0.79
0.79
0.79
0.20
0.18
0.16
0.16
0.20
0.23
0.26
0.25
0.08
0.10
0.27
0.13
0.16
0.23
0.22
0.23
0.03
0.03
0.05
0.04
0.05
0.07
0.07
0.07
0.09
0.16
0.38
0.15
0.21
0.31
0.31
0.31
0.04
0.04
0.15
0.07
0.08
0.13
0.12
0.11
0.65
0.65
0.63
0.71
0.69
0.75
0.76
0.76
0.03
0.03
0.02
0.07
0.04
0.11
0.07
0.10
0.34
0.26
0.22
0.25
0.27
0.38
0.37
0.37
0.16
0.22
0.14
0.13
0.15
0.26
0.26
0.24
0.03
0.05
0.03
0.04
0.05
0.08
0.07
0.07
0.02
0.02
0.01
0.01
0.04
0.04
0.04
0.04
0.02
0.01
0.01
0.01
0.02
0.02
0.02
0.02
0.02
0.01
0.01
0.04
0.01
0.05
0.06
0.05
0.02
0.04
0.01
0.02
0.01
0.04
0.04
0.05
0.20
0.22
0.22
0.22
0.24
0.30
0.29
0.30
TABLE S7
Leave-one-user-out evaluation performance (F1) of the different classifiers on each label. Part 1 of the labels. For each label ne is the number of
examples and ns is the number of subjects in the testing (possibly more examples participated in the training). p99 marks the 99th percentile of
random scores — a score above the p99 value has less than 0.01 probability to be achieved randomly. For each label the score of the highest
performing classifier is marked in bold.
Lying down
Sitting
Walking
Running
Bicycling
Sleeping
Lab work
In class
In a meeting
At main workplace
Indoors
Outside
In a car
On a bus
Drive (I’m the driver)
Drive (I’m a passenger)
At home
At a restaurant
Phone in pocket
Exercise
Cooking
Shopping
Strolling
Drinking (alcohol)
Bathing - shower
average
ne
54359
82904
11892
675
3523
42920
2898
2872
2904
20382
107944
7629
3635
1185
5034
1655
83977
1320
15301
5384
2257
896
434
864
1186
ns
47
50
50
19
22
40
8
13
34
26
51
36
24
24
24
19
50
16
31
36
33
18
8
10
27
p99
0.02
0.01
0.01
0.10
0.12
0.01
0.01
0.00
0.00
0.18
0.21
0.11
0.02
0.02
0.02
0.01
0.01
0.00
0.00
0.21
0.23
0.09
0.06
0.45
0.05
0.13
0.08
Acc
0.62
0.58
0.38
0.03
0.19
0.56
0.07
0.05
0.06
0.22
0.75
0.21
0.15
0.04
0.21
0.07
0.67
0.03
0.29
0.21
0.03
0.03
0.01
0.03
0.01
0.22
Gyro WAcc
Loc
Aud
PS
EF
LFA LFL
0.04
0.06
0.01
0.03
0.02
0.07
0.06
0.06
0.01
0.01
0.00
0.01
0.02
0.02
0.02
0.02
0.01
0.02
0.01
0.02
0.01
0.03
0.03
0.03
0.11
0.12
0.12
0.19
0.17
0.23
0.22
0.24
0.16
0.16
0.14
0.17
0.15
0.20
0.19
0.19
0.01
0.00
0.01
0.03
0.01
0.02
0.03
0.04
0.01
0.01
0.01
0.02
0.06
0.01
0.04
0.05
0.00
0.00
0.01
0.00
0.01
0.05
0.02
0.02
0.01
0.00
0.01
0.01
0.01
0.00
0.01
0.01
0.25
0.25
0.21
0.30
0.26
0.30
0.30
0.30
0.26
0.30
0.32
0.28
0.34
0.39
0.39
0.39
0.14
0.15
0.11
0.16
0.15
0.18
0.18
0.18
0.02
0.03
0.02
0.03
0.02
0.04
0.04
0.04
0.02
0.04
0.03
0.04
0.02
0.05
0.04
0.05
0.02
0.03
0.02
0.03
0.02
0.04
0.04
0.04
0.01
0.02
0.01
0.02
0.03
0.04
0.03
0.04
0.02
0.01
0.01
0.01
0.00
0.01
0.02
0.01
0.02
0.01
0.01
0.01
0.00
0.01
0.02
0.01
0.00
0.00
0.00
0.00
0.00
0.00
0.00
0.00
0.27
0.35
0.23
0.27
0.29
0.35
0.34
0.35
0.30
0.29
0.42
0.37
0.40
0.44
0.42
0.42
0.17
0.11
0.13
0.12
0.12
0.16
0.17
0.16
0.08
0.08
0.08
0.13
0.11
0.16
0.15
0.16
0.58
0.51
0.48
0.51
0.56
0.55
0.59
0.58
0.06
0.07
0.07
0.11
0.09
0.13
0.12
0.14
0.17
0.14
0.15
0.20
0.17
0.18
0.20
0.20
0.11
0.11
0.10
0.12
0.12
0.14
0.14
0.14
TABLE S8
Leave-one-user-out evaluation performance (F1) of the different classifiers on each label. Part 2 of the labels. For each label ne is the number of
examples and ns is the number of subjects in the testing (possibly more examples participated in the training). p99 marks the 99th percentile of
random scores — a score above the p99 value has less than 0.01 probability to be achieved randomly. For each label the score of the highest
performing classifier is marked in bold.
Cleaning
Laundry
Washing dishes
Watching TV
Surfing the internet
At a party
At a bar
At the beach
Singing
Talking
Computer work
Eating
Toilet
Grooming
Dressing
At the gym
Stairs - going up
Stairs - going down
Elevator
Standing
At school
Phone in hand
Phone in bag
Phone on table
With co-workers
With friends
average
ne
1839
473
851
9412
11641
404
520
122
384
18976
23692
10169
1646
1847
1308
906
399
390
124
22766
25840
8595
5589
70611
4139
12865
ns
22
12
17
28
28
3
4
5
6
44
38
49
33
25
27
6
17
15
8
51
39
37
22
43
17
25
Acc
0.04
0.01
0.00
0.14
0.14
0.01
0.01
0.00
0.01
0.25
0.28
0.15
0.03
0.02
0.02
0.01
0.01
0.01
0.00
0.28
0.30
0.17
0.11
0.59
0.06
0.16
0.11
| 2cs.AI
|
1
Interference Modeling for Cellular Networks
under Beamforming Transmission
Hussain Elkotby, Student Member IEEE and Mai Vu, Senior Member IEEE
arXiv:1706.00050v1 [cs.IT] 31 May 2017
Abstract
We propose analytical models for the interference power distribution in a cellular system employing
MIMO beamforming in rich and limited scattering environments, which capture non line-of-sight signal
propagation in the microwave and mmWave bands, respectively. Two candidate models are considered:
the Inverse Gaussian and the Inverse Weibull, both are two-parameter heavy tail distributions. We further
propose a mixture of these two distributions as a model with three parameters. To estimate the parameters
of these distributions, three approaches are used: moment matching, individual distribution maximum
likelihood estimation (MLE), and mixture distribution MLE with a designed expectation maximization
algorithm. We then introduce simple fitted functions for the mixture model parameters as polynomials of
the channel path loss exponent and shadowing variance. To measure the goodness of these models, the
information-theoretic metric relative entropy is used to capture the distance from the model distribution
to a reference one. The interference models are tested against data obtained by simulating a cellular
network based on stochastic geometry. The results show that the three-parameter mixture model offers
remarkably good fit to simulated interference power. The mixture model is further used to analyze the
capacity of a cellular network employing joint transmit and receive beamforming and confirms a good
fit with simulation.
Keywords: mmWave cellular; interference model; stochastic geometry; moment matching; maximum
likelihood estimation; mixture distribution.
I. I NTRODUCTION
The current scarcity of wireless spectrum coupled with the predicted exponential increase
in capacity demand has focused attention on denser network deployment and the underutilized
millimeter wave (mmWave) bands (30-300 GHz) [1]–[3]. Fifth generation (5G) wireless systems
aiming to cater for the capacity demand are expected to provide a minimum of 1 Gb/s data rate
anywhere with up to 5 Gb/s for high mobility users and 50 Gb/s data rates for pedestrians [2].
Both dense deployments and mmWave make promising candidates for the 5G systems through
the resources reuse over smaller areas and the huge amount of available spectrum [2], [4].
Modeling and characterization of wireless interference under these scenarios is essential for
cellular system analysis and design. Due to the different characteristics of signal propagation in
The authors are with the Department of Electrical and Computer Engineering, Tufts University, Medford, MA, USA. Emails:
[email protected], [email protected]
2
conventional microwave and mmWave bands, we use the terminology rich and limited scattering
environments to refer to the signal propagation in microwave and mmWave bands.
A. Background and Related Works
We argue for the important role that interference characterization plays in evaluating and predicting the network performance in both microwave and mmWave bands. Traditionally, mmWave
bands are considered for backhaul in cellular systems and for high-volume consumer electronics
such as personal area and local area networks, but not for cellular access due to concerns about
short-range and non-line-of-sight coverage issues [2], [4]. MmWave has, however, recently been
shown to be suitable for cellular communications, provided short cell radius of the order of
100-200 meters and sufficient beamforming gain between communicating nodes [2]. Reducing
the cell radius leads to dense base station (BS) deployments. Even under beamforming, these
high BS and user densities can drive cellular networks to be more interference rather than noise
limited. While large adaptive arrays with narrow beams can boost the received signal power
and hence reduce the impact of out-of-cell interference [3], [5], this interference remains an
important performance-limiting factor in dense mmWave networks [6].
In next generation of wireless networks with a large number of subscribers and dense BSs
deployment, interference modeling is an important step towards network realization. Existing
stochastic geometry based work either uses the interference Laplace transform to evaluate simple transmission schemes [7], [8], or models the interference using moment matching gamma
distribution [9], [10]. Gaussian distribution is another approximation that is considered for the
centered and normalized aggregate wireless interference power [11], [12]. The central limit
theorem which justifies the Gaussian approximation, however, does not apply when some of the
interferers are dominant. Also, the Gaussian distribution does not model the interference very
well at low density of interferers or when the exclusion region, the region with no interferers, is
relatively small, as the cell sizes shrink. The distribution of the interference power at relatively
small exclusion regions has a heavy tail which can not be captured by the Gaussian distribution
[12]. Here we propose analytical distribution models characterized by only a few parameters,
which can be fitted to simple polynomial functions of channel path loss exponent and shadowing
variance, and test their fitness against network simulation based on stochastic geometry. A closed
form distribution of the interference helps in designing a cellular system by allowing the analysis
of system capacity and comparing different transmission techniques, which may not be directly
achievable with a characteristic function of the interference using the Laplace transform. Further,
having the interference distribution can significantly speed up system capacity evaluation by
3
generating the interference directly to use in capacity numerical computation, instead of running
time-consuming simulations.
To evaluate an interference model, we apply it to a cellular network and analyze the system
performance. For cellular network analysis, stochastic geometry is shown to capture the main
performance trends with analytical tractability. Stochastic geometry is used to develop a tractable
model for downlink heterogeneous cellular networks [8], which is applied to analyze coordinated
multipoint beamforming [7]. These stochastic geometry based networks are useful in verifying
that the performance of a cellular network matches experimental trends, and can also be used
to verify the accuracy of an interference model.
B. Approaches to Interference Modeling
The underlying question is "What parameterized distribution can best model out-of-cell interference and how can we estimate the parameters of this distribution?". We focus on parameterized
distributions with as few parameters as possible to make the model the simplest while having
a good fit. We test the goodness of the proposed interference models against simulation of a
cellular network based on stochastic geometry. We note that testing against actual measurement
data is also feasible and is desirable when such data are available.
To estimate the parameters of the proposed interference models, we use both moment matching
and maximum likelihood estimation (MLE) techniques. Specifically, we consider three approaches: analytical moment matching, individual distribution MLE, and mixture distribution
MLE. We exploit the iterative expectation maximization (EM) algorithm to estimate the parameters of the mixture MLE model. To evaluate the goodness of each model, we introduce the use
of the information-theoretic relative entropy or Kullback-Leibler (KL) divergence as a measure
for the relative distance between the modeled distributions and simulated data.
In our interference model development, we consider the interference at a BS in a MIMO
uplink scenario, but the results are also applicable to downlink. The developed interference
models apply to all transmit beamforming techniques, as long as the beamforming vector is
independent of the interference channels. We verify the modeled interference power distribution
against network simulation for a wide range of realistic channel propagation parameters.
C. Main Results and Contributions
We develop out-of-cell interference models that represent the interference power as a random variable with a known, parametrized probability density function. This representation is
important for cellular network performance evaluation, prediction and design. We further apply
the developed models in analyzing the capacity and outage performance of a MIMO cellular
network employing joint transmit and receive beamforming.
4
The main contributions and novelties of this paper are a new analytical model for interference
power distribution and methods for estimating its parameters for both rich scattering and limited
scattering environments, which are summarized as:
1) We propose the use of two distributions to model interference power, each distribution
characterized by two parameters: the inverse Gaussian (IG) as a light-to-heavy tailed
distribution and the inverse Weibull (IW) as a heavy tailed one. Further, we propose a
novel model as a mixture of these two distributions with remarkably good fit to simulation
data while having only three parameters.
2) We apply three approaches to estimate the interference models parameters: moment
matching (MM), individual distribution MLE, and mixture distribution MLE. In the MM
approach, a simple matching of the first two interference power moments is used. In the
other two approaches, a combination of MM and MLE techniques is used in designing
an iterative EM algorithm which maximizes a log likelihood function of the interference
data.
3) We propose the use of the relative entropy or Kullback-Leibler distance from information
theory to measure the goodness of each model. This metric measures the relative distance
between a modeled distribution and reference (simulated) data, which gives a good
indication of how far the proposed interference model is from the referenced interference.
4) We provide simple polynomial functions with fitted coefficients to express the mixture
MLE model parameters in terms of channel characteristics, including the path loss exponent and shadowing standard deviation. These polynomials can be used as a simple
representation of network interference in complex system-level simulations.
5) We apply the interference models to evaluate the performance of a cellular network with
joint transmit and receive beamforming. User’s outage probabilities using the MM and
mixture MLE interference models are compared to stochastic geometry based system
simulation.
6) Our proposed mixture model shows excellent fit in both interference distribution and
network performance evaluation for a wide range of channel propagation parameters,
including path loss exponent from 2 to 5 and shadowing standard deviation from 0 dB
to 9 dB.
This work can be extended to model interference in more complicated propagation environments, including those with a probabilistically parametrized LOS and NLOS channel model, and
to more heterogeneous network deployment such as those involving relaying nodes [13]–[15].
5
The importance of our developed mixture model comes from the fact that we can fit the
data set of out-of-cell interference into a simple mathematical model, a distribution with known
probability density function. This mathematical model can be used to study the performance of
a cellular network where model parameters can be specifically tailored for each network setting.
These parameters can be derived by applying the MLE method to interference data obtained
either via simulation (such as those based on stochastic geometry networks, including point
processes and random shapes), or via actual measurement campaigns. The flexibility of adapting
the parameters of this mixture distribution makes it a versatile tool in modeling interference.
II. M ODELS FOR NETWORK AND CHANNEL PROPAGATION
A. Network model based on stochastic geometry
We consider a cellular system consisting of multiple cells with an average cell radius R0 . Each
cell has a single BS that is equipped with NBS antennas and serves multiple user equipments
(UEs). Each UE is equipped with NUE antennas and uses a distinct resource block in each cell,
hence there is no intra-cell interference. However, each UE suffers from out-of-cell interference
due to frequency reuse in all other cells. In this paper, we denote all transmissions on the same
resource block from all cells other than the cell under study as the out-of-cell interference.
Due to the irregular structure of current and future cellular networks, we employ stochastic
geometry to describe the network. We consider uplink transmissions in this paper, although
results are also applicable to downlink. We model the active UEs in different cells contending
for the same resource block and causing interference to each other as being distributed on a
two-dimensional plane according to a homogeneous and stationary Poisson point process (PPP)
Φ1 with intensity λ̃1 = ηλ1 , where η represents the user density factor and can be varied.
Furthermore, under the assumption that each BS serves a single mobile in a given resource
block, we adopt the model in [16] which places each BS uniformly in the Voronoi cell of its
served UE. According to this model, the distance, rc , between each BS and its served UE is
√
Rayleigh distributed and has an average value of Rc = 1/(2 ηλ1 ). Throughout this paper, we
assume that λ1 is fixed and that Rc changes with the parameter η.
In order to develop a model for the out-of-cell interference power in a stochastic geometry
based network, we consider a cell under study with a typical radius Rc in a field of active UE
interferers with intensity λ̃1 . As such, our network model consists of a typical cell under study
centered at its BS and surrounded by Voronoi cells of other active uplink UEs who interfere
with the considered BS at the origin. Our goal is to model this out-of-cell interference to the
considered BS receiver, taking into account channel propagation features as discussed next.
6
B. Channel propagation model
We consider two channel models for two different environments, the rich and the limited
scattering environments, which are typical for signal propagation in the microwave and mmWave
bands, respectively.
For the rich scattering environment, we consider a complete channel model with shadowing,
path loss and small scale fading. As such, we express a typical MIMO channel with Tx-Rx
distance r in the following form:
H=
p
l (r)H̃
(1)
where H̃ is a random matrix that captures the effects of small scale fading and which can be
modeled as i.i.d. CN (0, 1); and function l (r) captures the large scale fading which includes
both path loss and shadowing. The large scale fading function l (r) is modeled as a log-normal
random variable multiplied with the pathloss as a function of the distance r as follows:
l (r) = Ls βr −α = Ls lp (r),
(2)
where Ls ∼ log(0, σSF ) is a log-normal random variable with standard deviation σSF dB; α is
the pathloss exponent; and β is the intercept of the pathloss formula. The intercept represents
the reference attenuation point that determines the tilt of the path loss model [17].
For the limited scattering environment, as typical in mmWave, the signal propagation charac-
teristics differ considerably. The path loss in mmWave systems is severe with distance-dependent
LOS and NLOS propagation, often modeled as a probabilistic function of mixed LOS and NLOS
[4], [13]. Further, mmWave signals can be severely vulnerable to shadowing and blockage effects
[18]. For limited scattering, however, we only focus on the NLOS interference component in
this paper, leaving the composite interference from both NLOS and LOS components as a future
work. As such, the large scale fading can be modeled as having a single slope as in (2).
The main feature, due to limited scattering, is that the channel becomes highly directional.
Specifically, for the small scale fading, a directional H̃ can be defined for K scatterers as
K
X
H̃ =
ak1 urx θkrx1 u∗tx θktx1
(3)
k1 =1
where K denotes the number of channel path clusters; ak1 is the complex channel coefficient
of the k1th path cluster, assuming (2-D) beamforming; θkrx1 and θktx1 respectively are the horizontal
angles of arrival (AoA) and departure (AoD) of the k1th path cluster; and urx (·) ∈ CNBS and
utx (·) ∈ CNUE are the vector response functions for the BS and UE antenna arrays.
Based on these channel models, we can express the channels of the direct link between the
considered active UE and its BS and the interfering links from other active UEs as follows:
7
H0 =
q
l (kp0 k2 )H̃0 ,
Hk =
q
l (kzk k2 )H̃k ,
(4)
where p0 and zk are vectors representing the 2-D location of the considered active UE and the
k th interfering UE in Φ1 with respect to the origin (i.e. the considered BS). Here H0 is the direct
channel from the considered active UE and Hk is the channel from the k th interfering UE in
Φ1 to the considered BS.
Through a number of recent mmWave channel measurement campaigns, channel parameters
for the model in (2) have been identified [18]–[21]. For channel propagation at 28 GHz, typical
values of the path loss exponent range from 1.68 to 2.55 in LOS and from 2.92 to 5.76 in NLOS
environments. Shadowing standard deviation ranges from 0.2 dB to 8.66 dB in LOS and from
8.7 dB to 9.7 dB in NLOS. In this paper, we develop an interference model that works well for
these ranges of channel parameters and beyond, as shown later in the numerical section.
III. I NTERFERENCE F ORMULATION UNDER MIMO B EAMFORMING
In this section, we present the MIMO beamforming signal model and formulate the out-ofcell interference at the considered BS under transmit beamforming from all active UEs in rich
and limited scattering environments. Beamforming has been adopted as an essential technique
for mmWave communications to overcome the huge propagation loss at high mmWave carrier
frequencies [2], [22]. We then formulate the per-user achievable rate and outage probability under
an example of dominant mode joint transmit and receive beamforming in the rich scattering
environment, and directional analog beamforming in the limited scattering environment.
A. MIMO Beamforming Signal Model
We now describe the signal model for single-stream MIMO beamforming, i.e., no spatial
multiplexing. We model the received signal {y0 ∈ CNBS ×1 } at the considered BS as
y0 = H0 x0 + v0 + z0
(5)
where x0 ∈ CNUE ×1 is the transmitted signal vector from the considered UE; z0 ∈ CNBS ×1 is an
i.i.d. noise vector distributed as CN (0, σ 2 I); H0 ∈ CNBS ×NUE is the considered UE-to-BS channel
matrix; and v0 ∈ CNBS ×1 represents the interference vector received at the considered BS from
interfering UEs in all other cells.
The transmit signal vector under beamforming from each user can be generally described as
p
x = w PU.
(6)
where U is a standard Gaussian signal with zero mean and unit variance; P represents the total
power allocated to the active UE within a single transmission period; and w ∈ CNUE ×1 is the unit
norm beaforming vector at the active UE. We will use this signal model with the appropriate
subscript to denote the transmit vector from an active UE, either intended or interfering one.
8
B. Interference Signal Formulation
For the purpose of modeling network-wide interference, we emphasize that the distribution
of interference is independent of the beamforming scheme employed. The only condition is that
the transmit and receive beamforming vectors, which are designed for the intended channel, are
independent of the interference channels. This condition is realistic in most practical scenarios.
For the interfering active UE in the k th cell, denote the interference channel as Hk and the unitnorm interfering beamforming vectors as wk ∈ CNUE ×1 , which can represent either a baseband
digital precoder or analog RF beamforming or a hybrid of both of these forms.
1) Rich Scattering Environment: Given that wk depends on the direct channel between the
k th active UE and its associated BS, it is independent of the interference channel Hk . We can
denote the effective interference vector from the k th interfering active UE as
q
q
hk = Hk wk = l (kzk k2 )H̃k wk = l (kzk k2 )h̆k ,
(7)
where h̆k is a random vector with i.i.d. elements as CN (0, 1). This follows from the fact that
the inner product of a vector of i.i.d. complex Gaussian variables (the column of H̃k ) with
an arbitrary unit norm vector is a complex Gaussian variable of the same distribution as each
element in the original vector.
The interference vector at the receiving antenna array as presented in (5) can be expressed as
X
Xq
Pk l (kzk k2 )h̆k Uk ,
(8)
v0 =
hk xk =
k6=0
k6=0
where the summation is over all interfering users.
2) Limited Scattering Environment: In this environment, we assume directional analog beamforming only and consider the composite effect of both transmit beamforming vector, wk ,
and receive combining vector, w̄0 ∈ CNBS ×1 , on the received interference power. We further
approximate the BSs and UEs antenna array patterns by a sectored antenna model with M and
m representing the main and back lobes gains, and θM representing the beamwidth of the main
lobe. Then, given the independence between wk , w̄0 , and Hk , the received interference signal
after both transmit and receive beamforming is
Xq
X
∗
∗
w̄0 Hk wk xk =
v̄0 = w̄0 v0 =
Gk Pk l (kzk k2 )ak Uk ,
k6=0
(9)
k6=0
where ak is the effective channel coefficient and Gk is the effective antenna gain from the k th
interfering active UE and can be modeled, assuming channel clusters are well separated, as
9
Gk =
MM,
M 2
with probability p1 = K( θ2π
)
mM,
M
M 2
M
)( θ2π
) + (K 2 − K)( θ2π
)
with probability p2 = 2K( 2π−Kθ
2π
mm,
M 2
with probability p3 = ( 2π−Kθ
)
2π
(10)
where K is the number of clusters (the special case of a single cluster channel model, K = 1,
is discussed in [13], [23]). Note the difference between the formulations in (8) and (9) in that
(8) is an interference vector at the receiving antenna array, before receiver processing, whereas
the interference in (9) applies after receive beamforming.
3) Modeling the Interference: For each spatial and channel fading realization, based on the
large number of interferers, the out-of-cell interference can be modeled as a complex Gaussian
random vector for (8) or a complex Gaussian scalar for (9) with zero mean and covariance Σ0
or variance σ02 . These covariance and variance, however, are random and dependent on user locations and channel fading. The matrix Σ0 is symmetric with diagonal elements representing the
interference power at each receiving antenna element, and the off-diagonal elements representing
the correlation among interference signals at different antenna elements. The variance σ02 on the
other hand represents the total interference power after receiver beamforming. We analyze the
off-diagonal and diagonal elements of the covariance matrix separately in Sec. V-A. We show
later in the numerical analysis section that the correlation among antenna elements is weak and
negligible; hence we focus on modeling the interference power elements in Σ0 and σ02 .
C. Achievable Rate and Outage Probability Formulation
The main goal of this paper is to model the interference as formulated above. In order to
evaluate this model, we apply it in capacity analysis. In this section, we formulate the capacity
and show how it is affected by interference.
To establish the per-user capacity in the rich scattering environment, we assume the transmit
beamforming vector w0 as the right singular vector corresponding to the dominant mode of H0 ,
and consider either an interference-aware (IA) or interference-unaware (IU) receive combining
vectors. The noise plus interference in the received signal in (5) can be treated as a Gaussian
random vector with a random covariance matrix R0 , which is dependent on interfering nodes
locations and their interference channels. This covariance matrix can be expressed as
R0 = Σ0 + σ 2 I,
(11)
where Σ0 is the interference covariance matrix discussed in Sec. V-A. Applying a receive
combining vector sd ∈ CNBS ×1 to the received signal y0 in (5) to get
√
ỹ0 = s∗d y0 = s∗d H0 w0 P U0 + s∗d R0 z̃0 ,
10
where z̃0 is a vector of i.i.d. zero mean and unit variance complex normal entries, we can then
write the per-user capacity for the given combining vector sd as
|s∗d H0 w0 |2
P .
C = log 1 + ∗
sd R 0 sd
(12)
For interference-unaware (IU) combining, we design the receive combining vector without
knowledge of the interference statistics – particularly its covariance. As such, the IU combining
vector is chosen as the left singular vector corresponding to the dominant mode of H0 , sd =
v1 (H0 ), resulting in the following per-user capacity:
|λmax (H0 )|2
CIU = log2 1 + 2
P ,
σ + v1∗ Σ0 v1
(13)
where λmax (H0 ) is the maximum singular value of H0 .
As seen in capacity formula (13), with IU combining, the effective post-combining interference
is σI2 = v1∗ Σ0 v1 . Since Σ0 is a random covariance, this post-combining interference is also
random. Its distribution, however, can be characterized in the same way as the pre-combining
interference power at each antenna element, i.e., the diagonal elements of Σ0 , as stated in Lemma
1. As a result, the IU capacity depends only on the interference power at each antenna element
but not on the correlation between interference at different antenna elements.
Lemma 1 (Interference Power Distribution for IU Combining). The post-combining interference
power v1∗ Σ0 v1 is a random variable that has the same distribution as a diagonal element of Σ0 .
Proof: See Appendix A for detail.
For interference-aware (IA) combining, the receive combining vector can be designed as a
−1/2
1/2
function of the interference statistics. Define s̃d = R0 sd ; then replacing sd = R0
it is straightforward to see that the vector which maximizes (12) is
interference-aware per-user capacity can then be obtained as
CIA = log2 1 + ks̃⋆d k2 P .
s̃⋆d
= (R0 )
s̃d into (12),
−1/2
H0 w0 . The
(14)
This IA capacity depends on the complete interference covariance Σ0 ; it is therefore dependent
on both the interference power at each antenna element and the correlation between interference
at different antenna elements.
In the limited scattering environment, we can express the per-user capacity, assuming perfect
beam alignment between the UE and its serving BS [13], as
M 2 |a0 |2 l (kp0 k2 ) P
,
C = log2 1 +
σ 2 + σ02
(15)
11
where M is the antenna array main lobe gain; a0 is the effective complex channel coefficient;
p0 is the location of the active UE with respect to the BS; and σ02 is the total interference power.
Achieving the capacity in (15) does not require knowledge of the interference covariance matrix.
The rates in Eqs. (13) – (15) are random quantities due to channel fading and interference.
We investigate the outage probability at a given target rate as a performance metric, defined as
po (RT ) = P{C < RT },
(16)
where RT is the target rate at which the active UE under consideration transmits.
IV.
I NTERFERENCE M ODELING A PPROACHES
AND
F ITNESS M ETRIC
In wireless cellular networks at system level simulations, the most difficult part is to simulate
interference from other cells to the cell under study. This is mainly due to the processing and
memory power required. These simulations can be substantially simplified if we can characterize
the interference by a simple parametrized distribution that represents a good fit to the actual
interference. In this section, we introduce the approaches we use to model the interference power
terms on the diagonal of Σ0 and σ02 . Then, we introduce the information-theoretic based metric
used to measure the fitness of each of those models. Finally, we discuss candidate distributions
considered for the interference model, the Inverse Gaussian and Inverse Weibull distributions.
A. Interference Modeling Approaches
We introduce three different approaches for modeling the distribution of the interference power
at the receive antenna. These approaches are Moment Matching (MM), individual distribution
MLE (individual MLE), and mixture distribution MLE (mixture MLE).
1) MM Approach: In this approach, we leverage tools from stochastic geometry to analytically
derive the first two moments of each interference power term. Then, we match these two moments
with those of the two-parameter candidate distributions to estimate these two parameters and
hence specify the distribution. This approach is the simplest and does not require complex
computations to estimate the distributions parameters. Thus, it is often used in the literature to
produce analytically tractable models [10], [24], [25]. We will show, however, that this approach
may not produce a good fit for the model.
2) Individual MLE Approach: In this approach, to simplify parameter estimation but improve
the model fitness, we use a combination of MM and MLE, a powerful estimation technique which
is often used in signal detection and estimation [26]. Here we only match the first moment using
the analysis results derived based on stochastic geometry, which helps in either determining one
12
of the parameters for the candidate distribution, or getting one parameter in terms of the other.
Then, we use MLE to determine the other parameter of the candidate distribution.
3) Mixture Approach: This approach is the most complex but also most accurate, in which we
model the interference probability density function as a mixture of the two candidate distributions.
We again use a combination of MM and MLE techniques to simplify parameter estimation. In
this approach, we do not determine the optimal values of the distributions parameters in closed
form, but design an efficient Expectation Maximization (EM) iterative algorithm to identify these
paramters, as discussed in Sec. VI-C.
B. KL Divergence Fitness Metric
In order to measure the developed models goodness or fitness, we use a concept from information theory as the relative entropy [27]. In this paper, we measure the relative entropy
between a proposed model and the data obtained by simulating the network based on stochastic
geometry as discussed in Sec. II-A, but it should be noted that other data such as those obtained
from measurement campaigns can also be used to test our models via relative entropy. The
relative entropy of a distribution P with respect to another distribution Q, also called KullbackLeibler divergence DKL (P ||Q), reflects the difference, or distance, between these two probability
distributions. The distribution P usually represents the true distribution of data or observations,
while Q is typically used to represent a modeled distribution or an approximation to the true
distribution P . This relative entropy is defined for continuous probability distributions as
Z ∞
p(x)
dx
(17)
DKL (P ||Q) =
p(x) log
q(x)
−∞
where p(x) and q(x) denote the probability density functions of P and Q, respectively. This
definition can also be described as the expectation of the logarithmic difference between the
probabilities P and Q. Kullback-Leibler divergence metric has been used to measure the accuracy
of modeling composite fading and shadowing wireless channels such as the Rayleigh-Inverse
Gaussian and mixture Gamma distributions [28], [29].
C. Candidate Distributions for the Interference Model
We consider two candidate distributions for interference modeling: the inverse Gaussian (IG)
and the inverse Weibull (IW), both are characterized by two parameters. The IG distribution
is also known as the Wald distribution and is usually used to model nonnegative positively
skewed data. For example, a composite Rayleigh-IG distribution is used to approximate the
composite Rayleigh-Lognormal distribution in [28]. The name "Inverse Gaussian" comes from the
13
inverse relationship between the cumulant generating functions of these distributions and those
of Gaussian distributions. It is a two-parameter family of continuous probability distributions
which is specified by a shape parameter λ and a scale parameter µ. Given an IG random
variable γIG (µ, λ), its probability density function is defined as [30]–[32]
r
λ
−λ(t − µ)2
fγIG (t|µ, λ) =
,
t > 0, λ, µ > 0.
exp
2πt3
2µ 2 t
The mean and variance of γIG (µ, λ) can be written in the following form [32]
µ3
E[γIG ] = µ,
var[γIG ] =
.
λ
(18)
(19)
The IW distribution is also known as the complementary Weibull distribution and is usually
used to model nonnegative positively skewed data that exhibits a long right tail. It is also specified
by two parameters, a shape parameter c and a scale parameter b (or λIW in some text). Given
an IW random variable γIW (b, c), its probability
function is defined as [33], [34]
( density
−c−1
−c )
c t
t
fγIW (t|b, c) =
, t ≥ 0, b, c > 0.
(20)
exp −
b b
b
The mean and variance of γIW (b, c) can be written in the following form [33]
2
1
var[γIW ] = b 2 Γ(1 − ), if c > 2,
E[γIW ] = bΓ(1 − ), if c > 1,
c
c
R ∞ t−1 −x
where the Gamma function Γ(t) is defined as Γ(t) = 0 x e dx.
(21)
In a recent and independent work, the Gaussian, Gamma, Inverse Gamma, and Inverse Gaus-
sian distributions are considered as models for the interference distribution in a stochastic
geometry based spatial network [35]. Different point processes are considered in this work,
including PPP, Strauss process, and Poisson cluster process. The inverse Gaussian distribution
is shown to be a reasonable model for the interference created by BSs distributed according to
the Strauss point and Poisson cluster processes. Further, both the Gamma and IG were shown
to be suitable for the PPP network geometry. This prior work, however, considered a bounded
path loss model l(r) = (1 + r α )−1 and Rayleigh fading with no shadowing.
In our work, we find through simulations that the Gaussian, Gamma and Inverse Gamma distributions are all poor models for the interference power when shadowing is present. Shadowing
introduces large variation in the interference power and causes a medium to heavy tail, which
none of these distributions are capable of capturing. Thus we need to find other distributions that
can more closely model heavy tail interference. As such, we examine the Inverse Gaussian and
also introduce the Inverse Weibull as a good candidate for parameterized heavy tail distributions
that can capture shadowing with large standard deviation.
14
V.
A NALYTICAL M OMENTS
OF I NTERFERENCE AND
M OMENT M ATCHING M ODELS
In this section, we analytically derive the first two moments of the diagonal and off-diagonal
elements of the interference covariance matrix. We then use the derived moments of the interference power at each antenna element in rich scattering, and the post receive beamforming
interference power σ02 in the limited scattering environment, to develop the MM interference
models.
A. Analytical Moments of Interference
1) Interference Power: In the rich scattering environment, the diagonal elements of the interference covariance matrix Σ0 represent the interference power at each antenna element and
they are uncorrelated with the off-diagonal elements. A correlation between any two of these
diagonal elements exists and can be determined similarly to the second moment of the offdiagonal elements (Lemma 3). However, since this correlation is not strong as shown in the
numerical analysis in Sec. VII-A, we model the diagonal elements of Σ0 as a random vector of
independent elements. Each of these diagonal elements can be generally expressed as
X
l (kzk k2 )gk Pk .
q0 =
(22)
k>0:zk ∈Φ1
where gk are all i.i.d. exp(1) and represent the power gain of the small-scale Rayleigh channel
fading from the k th interferer.
Similarly, in the limited scattering environment, the interference power can be expressed as
X
(1)
(2)
(3)
σ02 = q̄0 =
Gk l (kzk k2 )gk Pk = q̄0 + q̄0 + q̄0 ,
(23)
k>0:zk ∈Φ2
where we assume that the interferers are distributed according to PPP Φ2 with intensity λ2 . Using
the thinning property of random point processes [23], from Φ2 , we define three independent PPPs
Ni , i ∈ {1, 2, 3} with intensities τi = pi λ2 . Then, we can define the normalized interference power
terms as
(i)
X
q̄0
=
l (kzk k2 )gk Pk ,
G(i) k>0:z ∈N
k
where G
(i)
(24)
i
∈ {MM, Mm, mm}. Comparing Eqs. (22) and (24), we note that the distribution of
the normalized interference power for each thinned process in (24) can be characterized as that
of the interference power in (22) by matching the intensity τi to the intensity of the interferers in
the rich scattering environment, λ̃1 . Hence, we focus on the characterization of the rich scattering
environment interference power in (22), based on which the three separate interference power
terms for the limited scattering environment in (23) can be derived.
15
Lemma 2 characterizes the first two moments of the out-of-cell interference power q0 at each
receiving antenna.
Lemma 2 (Interference Power Moments). For network-wide deployment of MIMO transmit
beamforming, the out-of-cell interference power at each antenna of the interfered receiver has
the following first and second moments:
E [q0 ] = νζ1 Rc2−α ,
where
var [q0 ] = 2ν̃ζ2 Rc2(1−α) .
ζ2 = 2Pk2,
ζ 1 = Pk ,
ν=
(25)
2πλ1 βE[Ls ]
,
α−2
ν̃ =
πλ1 β 2 E[L2s ]
.
2(α − 1)
(26)
Proof: See Appendix B for details.
2) Interference Correlation among Different Antennas: The first moment of the off-diagonal
elements of the covariance matrix Σ0 represents the direct correlation among interference signals
at different receiving antenna elements. The second moment, however, represents the correlation
between received interference powers. These off-diagonal elements are expressed as in (47) for
i 6= j in Appendix A. Assuming antenna elements are spaced sufficiently far apart such that
they experience independent fading, Lemma 3 characterizes their first and second moments.
Lemma 3 (Interference Correlation Moments). For network-wide deployment of MIMO transmit
beamforming, the correlation among interference at different receiving antenna elements of the
BS has the following first and second moments:
1
E [q̃0 ] = 0,
E (q̃0 )2 = var [q0 ] .
2
(27)
where var [q0 ] is defined in Lemma 2.
Proof: See Appendix B for details.
The interference correlation coefficient Cxy can then be written as
Cxy =
q̃0
,
E [q0 ]
(28)
Based on Lemmas 2 and 3, we can derive the variance of this correlation coefficient as
2
2
(α − 2)2 E [L2s ]
(α − 2)2 σζSF
var [Cxy ] = E Cxy = κ
e 2 ,
=κ
(α − 1)
(α − 1) (E [Ls ])2
κ=
ζ2
.
8πλ1 ζ12Rc2
(29)
This variance increases with increasing path loss exponent, α, and shadow fading standard
deviation, σSF . We perform numerical analysis of this correlation coefficient in Sec. VII-A and
show that the correlation among interference at different antenna elements is in general weak.
16
B. Moment Matching Interference Models
Given the first two moments of the interference power in Lemma 2, we can use moment
matching as the simplest and most straightforward method to estimate the parameters of the
candidate distributions. This method, however, may not produce the best fit. Specifically, we use
the two analytically derived moments to estimate the (µ, λ) and (b, c) parameters of the IG and
IW distributions. The fitted distribution can then be used to represent the marginal distribution
of the interference power at each receiving antenna element, as stated in Lemmas 4 and 5 next.
Lemma 4 (Estimation of IG Parameters using MM). Given the derived moments in Lemma 2,
the shape and scale parameters λ and µ of an IG model for the interference power γIG [µ, λ]
can be estimated as
µ = E[q0 ],
(E[q0 ])3
.
λ=
var[q0 ]
(30)
Proof: Follows directly from the definition of λ and µ in (19).
Lemma 5 (Estimation of IW Parameters using MM). Given the derived moments in Lemma 2,
the shape and scale parameters c and b of an IW model for the interference power γIW [b, c]
can be estimated, assuming c > 2, by solving the following equation:
Γ(1 − 2/c)
E[q0 ]
var[q0 ] −
− 1 (E[q0 ])2 = 0,
b=
.
2
Γ (1 − 1/c)
Γ(1 − 1/c)
(31)
If the above equation gives a value of c < 2, then set c = 2.01 and compute b accordingly.
Proof: Follows directly from the equations for b and c in (21).
The equation in (31) can be solved numerically to obtain c, which is then used to obtain b.
Remark 1. For the expressions in (21), we note that the mean is infinite for c < 1 and that the
variance is infinite for c < 2. This is a consequence of the heavy right tail of the IW distribution.
Hence, for the IW moment matching in Lemma 5, we assume that c > 2.
Remark 2. For the path loss exponent value α = 2, we use numerically evaluated mean and
variance to perform moment matching since the expressions in Lemma 2 can not be evaluated
analytically at this value of α.
VI.
I NDIVIDUAL
AND
M IXTURE MLE I NTERFERENCE M ODELS
In this section, we apply maximum likelihood estimation to compute the model parameters. We
discuss both the individual MLE and mixture interference models and develop an EM algorithm
17
to estimate the model parameters. Maximum likelihood is one of the dominant methods of
estimation in statistics. A typical MLE problem is to estimate the parameter set θ of a candidate
distribution p(y|θ) from a given data set y and can be expressed as an optimization as follows:
arg max log p(y|θ)
θ
subject to θ ∈ Θ,
(32)
where log p(y|θ) is the log likelihood of the observed data y, and Θ is a closed convex set.
A. Individual MLE Interference Models
In individual MLE interference model, we use only a single distribution from the candidates
to model the interference power at each antenna. We use the maximum likelihood optimization
problem in (32) to estimate the parameters of each distribution. However, to simplify the
estimation, we use moment matching first. In moment matching first, we match the mean, µY ,
of the observed data set to that of each of the candidate distributions. This matching results in
the scale parameters µ and b for the IG and IW distributions as
µY
µ = µY ,
b=
.
(33)
Γ(1 − 1/c)
Next, we replace these expressions of the scale parameters into the log-likelihood function in
(32) for each candidate distribution. In the case of IG distribution, this substitution results in a
single-parameter log-likelihood function as follows
1
λ (y − µY )2
1
log λ − log 2πy 3 − 2
= log fγIG (y|λ).
(34)
log fγIG (y|µ, λ) =
2
2
2µY
y
Hence, the MLE problem in (32) becomes very simple and has a closed form solution for λ.
Similarly, in the case of IW, the substitution results in a single-parameter log-likelihood function
c
µcY c
µY
log fγIW (y|b, c) = log
−
y −c = log fγIW (y|c). (35)
Γ(1 − 1/c)c y (c+1)
Γ(1 − 1/c)
The derivation and final expressions of the optimal parameters, λ and c, that optimize the fit of
each candidate distribution are presented in Sec. VI-C.
B. Mixture MLE Interference Model
In our mixture model, the probability density function (pdf) of the interference model is now
a mixture of both IG and IW distributions as defined in the next theorem.
Theorem 1. Given a data set Y , the pdf of the mixture interference model can be written as
fY (y|θ) = w1 fγIG (y|λ) + w2 fγIW (y|c),
(36)
P
where {w1 , w2 : 2i=1 wi = 1} are the weight parameters for mixing the IG and IW distributions
and fγIG (y|λ) and fγIW (y|c) are as given in Eqs. (34) and (35) with the scale parameters ob-
tained through moment matching first as in (33). This mixture model is a 3-parameter distribution
with the parameter set as θ = {w1 , λ, c}.
18
Given the pdf of the mixture model in Theorem 1, we note that the individual MLE models
are special cases of this mixture model. By setting w1 = 1 , we have the IG individual MLE
model and by setting w2 = 1, we have the IW individual model. Subsequently we focus on the
mixture model parameters estimation, which can be applied to the individual models as well.
C. MLE Models Parameters Estimation
We have three parameters to be optimized in the mixture model which is significantly more
than the single parameter in the individual MLE model. This mixture leads to a more complex
MLE optimization problem and the EM algorithm [36] becomes an appealing approach. Here, we
identify the complete data X as the observed data Y plus some hidden data Z, i.e. X = (Y, Z),
where Y is the observed set of points that we model by a weighted IG and IW distribution and
Z ∈ {1, 2} is a discrete random variable representing the assignment of each data point to the
two candidate distributions. Then, we can define the pdf of the complete data X ∈ R+ as
fX (x|θ) = fX (Y = y, Z = i|θ) = wi φi (y|θi ),
(37)
where φ1 (y|θ1 ) = fγIG (y|λ) and φ2 (y|θ2 ) = fγIW (y|c).
Next, we present the algorithm for estimating the parameters of the MLE interference models.
We focus on the representative case of the mixture MLE model, which includes the individual
MLE models as special cases. Given n observations, in order to develop the EM algorithm to
estimate the parameters of our mixture model, we use Proposition 1 below [37] which can be
easily verified using the independence assumption, the fact that the observed data Y = f (X) is
a deterministic function of the complete data X for some function f , and Bayes’ rule.
Proposition 1. [37] Let the complete data X consist of n i.i.d. samples: X1 , X2 , ..., Xn , which
Q
satisfies f (X|θ) = ni=1 f (Xi |θ) for all θ ∈ Θ, and let yi = f (xi ), i = 1, 2, ..., n, then
n
X
(m)
Q(θ|θ ) =
Qi (θ|θ(m) )
(38)
i=1
(m)
We also define a responsibility function γij , which represents our guess at the mth iteration
of the probability that the ith sample belongs to the j th distribution component, as
(m)
(m)
γij
= p(Zi = j|Yi = yi , θ
(m)
(m)
wj φj (yi |θj )
) = P2
l=1
(m)
wl
(m)
φl (yi |θl
)
,
i ∈ {1, 2, ..., n}, j ∈ {1, 2}
(39)
where θ1 and θ2 represent the shape parameters λ and c, respectively.
An EM algorithm includes two steps: the E-step to calculate the conditional expectation of
the log likelihood of the complete data, and the M-step to maximize this conditional expectation
function. Lemma 6 provides the final expression for the EM algorithm Q-function in the E-step.
19
Lemma 6. Let the complete data X consist of n i.i.d. samples: X1 , X2 , ..., Xn , which satisfies
Q
f (X|θ) = ni=1 f (Xi |θ) for all θ ∈ Θ, and let yi = T (xi ), i = 1, 2, ..., n, then we have
Q(θ|θ
(m)
) =
2
X
(m)
nj
j=1
(m)
(m)
where nj
=
n
1 (m)
λ X (m) (yi − µY )2
log wj + n1 log λ − 2
γ
2
2µY i=1 i1
yi
(m)
(m)
+ cn2 log µY − cn2 log Γ(1 − 1/c) + n2 log c
c X
n
n
X
µY
(m)
(m)
γi2 yi−c ,
− c
γi2 log yi −
Γ(1
−
1/c)
i=1
i=1
(40)
(m)
Pn
i=1
γij , j ∈ {1, 2}; and θ = {w1 , λ, c}.
Proof: See Appendix C for details.
In the M-step, to update our estimate of the parameter θ, we solve the following optimization
problem for the optimal θ∗ :
arg max Q(θ|θ
θ
(m)
)
subject to
2
X
j=1
The optimal θ∗ is then found as in Theorem 2.
wj = 1, wj ≥ 0 , j ∈ {1, 2}.
(41)
n
o
(m+1)
Theorem 2. The optimal new estimate of θ(m+1) = w1
, λ(m+1) , c(m+1) that maximizes the
Q-function in (40) at the mth iteration are determined as follows:
(m)
(m)
nj
n1 µ2Y
(m+1)
(m+1)
, j ∈ {1, 2},
λ
= Pn (m) (y −µ )2
wj
=
i
Y
n
i=1 γi1
yi
(42)
and c (m+1) is obtained by solving
the following equation numerically:
"
#
0
n
X
µY
1
1
(m)
γi2 log yi
log
=
1−ψ 1−
−
+
c
Γ(1 − c1 ) c
i=1
c
#
"
n
X
yi Γ(1 − c1 ) ψ(1 − c1 )
µ
Y
(m)
−c
+
+
log
γi2 yi
µY
c
Γ 1 − 1c
i=1
(m)
n2
(43)
Proof: See Appendix D for details.
Algorithm 1 summarizes the EM algorithm for the mixture distribution interference model.
In the case of IG individual MLE model, we can set w1 = 1 and the resulting Q-function in
(52) represents the log-likelihood function of the IG distribution. Hence, problem (41) results in
the MLE of a single parameter, λ. The optimal value of λ can be obtained from (42) by setting
(m)
n1
(m)
= n and γi1 = 1. Similarly, the optimal value of c for the IW individual MLE model can
(m)
be obtained from the numerical solution of (43) after setting w2 = 1, n2
(m)
= n and γi2 = 1.
20
1.
(0)
Initialize wj , λ(0) , and c(0) , j ∈ {1, 2}, and compute the initial log-likelihood:
Initialization:
L(0)
(m)
=
n
1X
(0)
(0)
log w1 fγIG yi |λ(0) + w2 fγIW yi |c(0) .
n i=1
(m)
as given in Eq. (39) and nj
2.
E-step:
Compute γij
3.
M-step:
Compute the new estimate for wj
(m+1)
=
Pn
i=1
(44)
(m)
γij .
, λ(m+1) , and c(m+1) , j ∈ {1, 2} as given
in Eqs. (42), and (43), respectively.
4.
Convergence check:
Compute the new log-likelihood function
L(m+1) =
n
1X
(m+1)
(m+1)
fγIW yi |c(m+1) .
log w1
fγIG yi |λ(m+1) + w2
n i=1
(45)
Return to 2 if |L(m+1) − L(m) | ≥ δ for a preset threshold δ; Otherwise end the algorithm.
Algorithm 1. MLE Models EM Algorithm
D. Functional Fitting of MLE Model Parameters to Channel Propagation Characteristics
By performing the MLE parameters estimation, we observe that these parameters can be fitted
directly to rather simple functions of the channel features, including the shadowing variance and
path loss exponent. These functions present excellent fit with simulated data for the range of
mmWave propagation parameters as measured in recent campaigns [18]–[21].
Corollary 1 presents the polynomial function form that we use to fit the MLE parameters to
the channel shadowing variance. Note the same functional form applies to all three parameters
of the mixture MLE model, each parameter with a different set of fitting coefficients.
Corollary 1. For a given path loss exponent, the parameters of the mixture MLE algorithm can
be estimated directly as a function of the shadowing standard deviation σSF as
3
2
log10 (θ) = a3 σSF
+ a2 σSF
+ a1 σSF + a0
(46)
where θ represents any of the parameters {w1 , c, λ}. The function coefficients for each parameter
are obtained via numerical fitting based on the EM estimated parameter values. Parameters b
and µ can then be obtained analytically based on Eq. (33) and Lemma 2.
In Appendix E, we provide representative values of the functional coefficients fitted against
simulation data based on stochastic geometry.
Similarly, the MLE parameters can be fitted to functions of the channel path loss exponent
using a simple least square optimization procedure. Corollary 2 presents the polynomial function
forms that we use to fit the MLE parameters to the path loss exponent.
Corollary 2. At a fixed value of the shadowing variance, the IG weight w1 and the IW shape
parameter c of the mixture MLE model can be estimated directly as a 4th order polynomial
21
function of the path loss exponent α. The logarithm of the IG shape parameter log10 (λ) can be
estimated as a polynomial function of α of the 3rd degree. The coefficients for each function can
be obtained via least square fitting based on the EM estimated parameter values.
Using these functional fits, we can bypass the MLE iterative algorithm in Algorithm 1 and
directly use the table of fitted function coefficients. These functional fits therefore provide a
simple and powerful way of modeling the interference and its direct dependence on the channel
propagation features.
Note that the coefficients examples in Appendix E are verified against simulated data using
stochastic geometry based network settings and need further verification against actual measurement data, for which the coefficient values may change slightly. We expect, however, that the
identified function forms in (46) remain a good fit. To fit the function coefficients, apply the
MLE algorithm to the measured data to identify the interference model parameters. Then fit
these model parameters to the function forms in (46) to identify the coefficient values. Once
the fit is verified, the function with the identified coefficients can be used directly to model
the interference in a new environment with given shadowing variance and path loss exponent,
without the need to measure new data or perform the MLE algorithm again.
VII.
N UMERICAL P ERFORMANCE R ESULTS
In this section, we use simulation data obtained from the stochastic geometry based network
setting in Sec. II-A to numerically verify the validity of the analytical results and proposed
interference models. We first verify the validity of our moment matching interference models.
We then discuss the fit of the MLE individual and mixture interference models. Last, we apply
these interference models to evaluate the outage performance of a cellular system employing
MIMO joint transmit-receive dominant mode beamforming.
Since interference in the limited scattering environment can be derived as the sum of interference components from independent, thinned processes, each of which exhibits similar
characteristics as the interference in a rich scattering environment but with a different interferer
density as in [23], we focus on the rich scattering environment in our simulation. For the
simulations setting, we consider a typical cell of radius Rc = 150 m, which is related to the
active UEs density λ1 as ηλ1 = 0.25Rc−2 , where η = 1 in the typical case. Later we vary η to
examine the effect of user density on performance.
A. Interference Correlation among Different Antenna Elements
This part aims to examine the correlation between interference at different antenna elements
to see if this correlation is negligible. We use a kernel distribution to fit the actual interference
22
0.95
Probability(|C
xy
|≤0.3)
1
0.95
0.9
0.9
0.85
0.8
0.85
0.75
0.7
10
0.8
8
5
6
4
4
σ SF (dB)
3
2
0
α
0.75
2
Fig. 1: The probability of weak interference correlation versus shadowing standard deviation and path loss exponent.
correlation. A kernel distribution is a nonparametric representation of the probability density
function of a random variable. It can be used when a parametric distribution cannot properly
describe the simulation data, or when assumptions about the distribution of the data are to be
avoided, as is the case for testing the fit of our proposed parameterized interference distributions.
We examine the interference correlation via the correlation coefficient defined in Sec. V-A2.
In Fig. 1, we plot the probability that the correlation coefficient is smaller than 0.3, and show
that this probability is significant for a wide range of the shadowing standard deviation and the
path loss exponent. This figure demonstrates that the interference correlation among different
antenna elements is in general weak. As shown later in the system performance evaluation (Sec.
VII-E), the impact of interference correlation on transmission rate differs depending on the
receive combining vector, as discussed in Sec. III-C. For IA combining, interference correlation
can have an impact on capacity; whereas for IU combining, the interference correlation has no
impact and can be ignored. In this paper we do not model the interference correlation, hence
IU combining is more appropriate.
B. Moment Matching Interference Models Evaluation
We now use the relative entropy metric described in Sec. IV-A to measure the goodness of the
MM interference models in Section V-B. In Fig. 2a, we plot the relative entropy versus shadowing
standard deviation σSF at a sample path loss exponent value of α = 3.5. The result shows that
IG approximates the simulated interference distribution well at low values of shadowing standard
deviation σSF and diverges at higher values.
The IW distribution, on the other hand, does not show a good fit at the simulated path loss
value. Our extensive simulation and testing suggests that IW can be a good approximation of
the simulated data distribution only for low values of α (lower than shown in Fig. 2). The
moment matching IW distribution diverges significantly as the path loss exponent increases.
This divergence is caused by the fact that the optimal shape parameter c, as we will see later in
23
1.8
2.5
×10
4
Simulation Data
Moment Matching IW
Moment Matching IG
Moment Matching IG
Moment Matching IW
1.6
1.4
2
1
1.5
PDF
Relative Entropy
1.2
0.8
0.6
1
0.4
0.2
0.5
0
-0.2
0
0
1
2
3
4
5
6
7
8
9
σ SF (dB)
(a) Relative entropy at α = 3.5.
0
0.5
1
1.5
2
2.5
Interference Power (W)
3
×10
-4
(b) Sample PDF at α = 3.5, σSF = 4 dB.
Fig. 2: Relative entropy and sample interference distributions of moment matching interference models. System
parameters: Pmax = 30 dBm, η = 1, δ = 10−6 , σSF = 4 dB, α = 3.5.
this section, obtained at high values of α is close to or less than 2. At this range of c values,
the variance of the IW distribution is infinite and the moment matching model is not applicable.
In Fig. 2b, we show a sample interference power distribution at one antenna element for
α = 3.5 and σSF = 4 dB to visually confirm the match, or rather the mismatch, of the momentmatched IW interference distribution. The moment-matched IG distribution also starts to diverge
from the simulated data at this value of σSF , as indicated in Fig. 2a.
C. Individual and Mixture MLE Interference Models Evaluation
Next, we evaluate the fit of the individual and mixture MLE interference models. Fig. 3 shows
the relative entropy measures for these 3 models against simulated data as well as representative
sample distributions. In Fig. 3a, we see that our proposed mixture model outperforms both the
individual IG and IW models. This result aligns with our expectation since the pdf of the mixture
model is a combination of both the individual IG and IW distributions. Hence, performance of
the mixture model should be at least as good as that of the individual models. The fact that the
mixture model performs better than either individual one is because the relative entropy measure
is a non-linear function of the distribution densities.
Comparing between Figs. 2 and 3 also reveals that all MLE models perform much better than
the MM models: at the worst σSF = 9 dB, the IW distribution under individual MLE has a
maximum relative entropy of about merely 0.23 compared to a maximum of 1.8 under MM.
Further, we see that the proposed mixture model follows the simulated data distribution almost
exactly even at large shadowing: the maximum relative entropy is barely 0.03.
Consistently in all our extensive simulations and testing, the mixture MLE interference model
provides the best fit. This model requires an iterative algorithm to fit the parameters initially,
before fitting the functional coefficients as in Corollary 1. The MM models are attractive from
the simplicity point of view since the model parameters can be determined analytically without
24
7000
0.25
Mixture Model
IG MLE
IW MLE
0.2
Simulation Data
Mixture Model
IW MLE
IG MLE
6000
5000
4000
PDF
Relative Entropy
0.15
0.1
3000
0.05
2000
0
1000
-0.05
0
0
1
2
3
4
5
6
7
8
9
0
σ SF (dB)
1
2
3
4
5
Interference Power (W)
(a) Path loss exponent α = 3.5.
6
7
8
×10
-4
(b) Sample PDF at α = 3.5, σSF = 9 dB.
Fig. 3: Relative entropy and sample interference distributions of the individual and mixture MLE models. System
parameters: Pmax = 30 dBm, η = 1, δ = 10−6 , σSF = 9 dB, α = 3.5.
optimization. However, our simulation results suggest that the IG MM model should only be
used for the range of shadowing standard deviation σSF < 3 dB, at which the relative entropy
of the IG MM model is approximately within 1% of the mixture model.
In Fig. 4, we plot the number of iterations required by Algorithm 1 to obtain the optimal values
of the mixture MLE model parameters versus σSF at two samples of the path loss exponent
α = {2.5, 4}, where the preset threshold value is chosen to be δ = 10−6 , the model weights are
(0)
(0)
initialized as w1 = w2 = 0, and the model shape parameters λ(0) and c(0) are initialized to the
optimal values of the corresponding individual MLE models. The number of iterations required
by the EM algorithm to obtain the optimal mixture MLE model parameters is in general less
than 200. In Fig. 5, we study the sensitivity of Algorithm 1 to the initial values of the parameters.
We consider the sample data obtained at path loss exponent α = 2, shadowing value σSF = 4
(m)
dB, and density factor η = 1. In this figure, we plot the IG weight parameter w1
iteration (m) for different initial values
(0)
w1 ,
at each
which shows that the weight parameter converges
to the same value after at most 170 iterations. We also note from simulations that the likelihood
function is concave in both of the shape parameters c and λ at a fixed value of the weight
parameter, therefore it has a unique maximum. Hence, we can conclude based on numerical
evidence that Algorithm 1 converges to the same optimal parameter values irrespective of their
initializations.
D. Mixture Model Parameters and Function Coefficients Fitting
In this section, we use the EM algorithm discussed in Sec. VI-C. along with Theorem 2
to obtain the mixture model parameters. We then fit the estimated parameters w1 , c, λ, into a
function in terms of σSF as in Corollary 1. After that, Eq. (33) can be used to determine the
parameter b. We can also use (25) to determine the parameter µ directly, but instead we provide
25
0.9
220
w 1(0) = 0.1
α = 2.5
α =4
200
w (0)
= 0.5
1
0.8
w 1(0) = 0.9
180
0.7
160
0.6
w (m)
1
# Iterations
140
120
0.5
0.4
100
0.3
80
0.2
60
0.1
40
20
0
1
2
3
4
5
6
7
8
9
0
10
0
10
1
10
2
Iteration # (m)
σ (dB)
Fig. 4: Number of iteration required to obtain optimal Fig. 5: Sensitivity analysis of the MLE EM algorithm
parameters of the mixture MLE model versus σSF at path
using sample data obtained at path loss exponent and
loss exponent values α = {2.5, 4} using the threshold
shadowing standard deviation values of α = 2, σSF =
value δ = 10−6 .
4 dB and η = 1.
a function fitted to the simulated data for this parameter, since (25) is invalid at α = 2. The
coefficients of the fitted functions are provided for representative values in Appendix E.
In Fig. 6, we plot the mixture model weight factor obtained from both simulation (cross
markers) and functional fit (lines). The estimated parameters and fitted functions show an
excellent fit to the simulated data. The results confirm that larger shadowing results in an increase
in the IW component and a decrease in the IG component in our mixture interference model. The
increase in shadowing standard deviation σSF implies a higher probability of high interference
power, leading to a heavier interference distribution tail. As the path loss exponent α increases,
however, the IW distribution starts to diverge from the simulated data and hence reduces in
weight, thus the IG weight w1 increases as shown. Note also that as α increases, shadowing
has less effect on the mixture model weights, especially at low active UEs density. As such, the
weight distribution at high path loss is less sensitive to shadowing.
In Fig. 7, we plot the IW and IG shape parameters {c, λ} versus σSF at α = 3. These curves
match the simulated data perfectly, verifying the functional fits in Corollary 1. At higher path
loss exponents, however, we noted some irregularities in the values of simulated c specifically
at α ≥ 4 and σSF ≤ 4 (not shown in the figure). This irregularity is caused by the fact that the
IG distribution has a much higher weight than IW in this range, hence the IW distribution can
assume a looser range of values for its parameters without affecting the goodness of the fit. The
functional fit for c in (46) thus can still be applied in this high path loss range.
These plots demonstrate that the fitted functions for parameters of the mixture MLE model are
accurate for the practical ranges of channel path loss and shadowing. These functions therefore
provide an extremely simple yet accurate way to estimate interference distribution parameters.
26
1
Sim Data
α =2
α =3.5
α =5
0.9
0.8
10
0
IW, c
Shape Parameters
0.7
IG weight
0.6
0.5
0.4
0.3
0.2
10
-1
10
-2
Sim Data
η=1
η=3
IG, λ
0.1
0
0
1
2
3
4
5
6
7
8
0
9
1
2
3
4
5
6
7
8
9
σ SF (dB)
σ SF (dB)
Fig. 6: IG weight, w1 , in the mixture MLE model. Fig. 7: IW and IG parameters comparison between
System parameters: Pmax = 30 dBm, η = 3, δ = 10−6 ,
simulation (markers) and fitted functions in Corollary
α = {2, 3.5, 5}.
1 (lines). System settings: Pmax = 30 dBm, α = 3,
η = {1, 3}, δ = 10−6 .
E. Rate CDF and Outage Performance
We now apply the proposed interference models to evaluate the cellular system performance.
In particular, we evaluate the transmission rate cumulative distribution function (CDF), which
is related to the outage probability, of a cell edge user at a distance of 145 m from the base
station with η = 1 (note Rc = 150 m and ηλ1 = 0.25Rc−2 ). In this simulation scenario, we do
not consider uplink scheduling; instead, we consider a random user with a random channel to
the considered BS. We further normalize the simulation results by the channel bandwidth and
show rates in bps/Hz. The uplink maximum transmission power is 30 dBm. We use the dominant
mode transmit beamforming discussed in Sec. III-C and assume a noise variance of σ 2 = −124
dBm/Hz and a path loss intercept β = −72.3 dB.
In Fig. 8, we plot the interference-aware capacity in (14) and compare the user transmission
rate CDFs based on IG MM and mixture interference models to the simulated data. Both models
show good accuracy for the interference power as in the left plot at a low σSF value. At larger
shadowing, however, as in the right plot with σSF = 9 dB, only the mixture model remains
accurate while the IG MM model diverges significantly. This result also suggests that interference
has a strong impact on user transmission rate CDF even at the somewhat high noise variance
of σ 2 = −124 dBm/Hz. We also note that the slight mismatch between the mixture model and
simulation is due to the interference correlation, which we did not model but does have an impact
on capacity in an interference-aware combining scheme.
To further examine the accuracy of the mixture interference power model, we consider the
interference-unaware combining scheme with capacity in (13). IU capacity does not depend on
interference correlation as a result of Lemma 1. Results in Fig. 9 shows that the capacity using
interference power model matches with simulation almost perfectly in all considered antenna
1
1
0.9
0.9
0.8
0.8
0.7
0.7
Outage Probability
Outage Probability
27
0.6
0.5
0.4
0.3
0.2
0.6
0.5
0.4
0.3
0.2
Mixture Model
Moment Matching IG
Sim Data
0.1
Mixture Model
Moment Matching IG
Sim Data
0.1
0
0
0
1
2
3
4
5
6
0
Rate (bps/Hz)
(a) σSF = 1 dB.
1
2
3
4
5
6
7
8
Rate (bps/Hz)
(b) σSF = 9 dB.
Fig. 8: User transmission rate CDF comparison among simulation, IG MM model, and mixture MLE model.
System settings: Pmax = 30 dBm, η = 1, α = 3, σSF = {1, 9} dB.
configurations, even at a high shadowing variance of σSF = 9 dB. This result confirms the
validity of our interference power distribution in capacity evaluation.
Our interference distribution models have been validated against simulation based on stochastic
geometry. The ideal next step would be to evaluate the models against actual measurement data,
but at the point of writing this paper, such data are not available. As stochastic geometry has
been shown to reasonably capture cellular performance compared to actual data [8], we expect
that the mixture model with adjusted functional coefficients will also present a good fit to actual
measurement data. The mixture MLE model can provide a valuable tool for cellular system
performance evaluation and prediction.
VIII. C ONCLUSION
We introduced new interference models based on moment matching and maximum likelihood
estimation techniques for both the rich scattering and limited scattering NLOS propagations. A
novel model as a mixture between the Inverse Gaussian and Inverse Weibull presents remarkably
good fit with simulation, capturing the heavy-tail characteristics of interference especially in
high shadowing environments. We designed an expectation maximization algorithm to estimate
the parameters of this mixture model. We also fitted the mixture model parameters to simple
polynomial functions of the channel propagation features, which provide a simple way to model
the interference without any optimization. The fitted mixture model can then be integrated into
a more complex system level simulation to evaluate and predict cellular performance, or used
to aid system design. The next step would be to test the mixture model with appropriately
adjusted parameters and functional fitting coefficients against data from measurement campaigns
to evaluate the model in an actual system setting.
28
1
0.9
0.8
Outage Probability
0.7
0.6
0.5
0.4
0.3
0.2
Analysis, N UE = N BS = 2
Analysis, N UE = N BS = 4
Analysis, N UE = N BS = 8
0.1
Sim Data
0
0
1
2
3
4
5
6
7
8
Rate (bps/Hz)
Fig. 9: User transmission rate CDF comparison among simulation and mixture MLE model. System settings:
Pmax = 30 dBm, η = 1, α = 3, σSF = 9 dB, NUE = NBS = {2, 4, 8}.
A PPENDIX A: P ROOF
OF
L EMMA 1
Given the interference vector in (8), the element in the ith row and j th column of the
interference covariance matrix Σ0 can be expressed as
X
[Σ0 ]ij =
l (kzk k2 )h̆(k,i) h̆∗(k,j) Pk ,
(47)
k>0:zk ∈Φ1
where h̆(k,i) , h̆(k,j) are i.i.d. CN (0, 1) representing the Rayleigh small-scale fading channels
from the k th UE to the ith and j th antenna element of the considered BS, respectively. The
post-combining interference power term v1∗ Σ0 v1 can then be written as
!
!∗
X
X
X
Pk l (kzk k2 )
v1∗ Σ0 v1 =
[v1 ]i h̆(k,i)
[v1 ]i h̆(k,i) .
i
k>0:zk ∈Φ1
(48)
i
Since the direct channel small-scaling fading component is assumed to be independent of
interference channels small-scale fading, v1 is independent of all h̆k . Thus the distribution of
P
∗
i [v1 ]i h̆(k,i) is CN (0, 1) as v1 is unit-norm, which renders the distribution of v1 Σ0 v1 in (48)
the same as that of the diagonal elements of Σ0 in (47).
A PPENDIX B: P ROOF
OF
L EMMAS 2 AND 3
We first derive the Laplace transform of the interference power term, q0 , which is then used
to characterize its moments. We develop the Laplace transform of the interference power at the
destination as follows:
Y
Lq0 (s) = Eq0 e−sq0 = EΦ1 ,T
zk ∈Φ1 \z0
= EΦ1
Y
zk ∈Φ1 \z0
e−sgk l (kzk k2 )Pk , i 6= j
LJ0 (s, kzk k2 ) = exp −2πλ1
Z
∞
Rc
(1 − LJ0 (s, r)) rdr ,
(49)
29
where the last equality follows from the Laplace functional expression for PPP using polar
coordinates and assuming the field of interferers outside a cell of fixed radius Rc ; LT (s) is the
d
Laplace transform of the composite shadowing and small scale fading channel, where T = Ls G
with G ∼ exp(1) as an exponential random variable, and LJ0 (s, kzk k2 ) is expressed as
LJ0 (s, kzk k2 ) = LT (slp (kzk k2 )Pk )
(50)
Then, we obtain the results in Lemma 2 based on the interference power Laplace transform
and evaluating the following formulas:
E [q0 ] =−
∂Lq0 (s)
∂s
,
var [q0 ] =
s=0
∂ 2 Lq0 (s)
− (E [q0 ])2 .
2
∂s
s=0
(51)
The proof to Lemma 3 follows the same procedure with the only difference in that we replace
q0 in Eqs. (49) and (51) with q̃0 , and the Laplace transform, LT (s), in eq. (50) with the Laplace
d
transform LT ∗ (s) of the composite random variable T ∗ = Ls H̃1 H̃2 where H̃1 , H̃2 ∼ CN (0, 1)
are independent and identically distributed complex normal random variables.
A PPENDIX C: P ROOF
OF
L EMMA 6
We start by writing the expression for the EM algorithm Q-function using Proposition 1 as
Q(θ|θ
(m)
) =
n
X
i=1
=
EXi |Yi ,θ(m) [log fXi (xi |θ)] =
2
n X
X
(m)
γij
log wj +
n
X
i=1
i=1 j=1
(m)
γi1
2
n X
X
i=1 j=1
p(Zi = j|Yi = yi , θ(m) ) log fXi (xi |θ)
log φ1 (yi |θ1 ) +
n
X
i=1
(m)
γi2 log φ2 (yi |θ2 ).
(52)
Using the probability density functions of IG and IW distributions in Eqs. (18) and (20) along
with moment matching first, we can write log φ1 (yi |λ) and log φ2 (yi |c) as in Eqs. (34) and
P
(m)
(m)
(35), respectively. Then, substituting into Eq. (52), replacing ni=1 γij by nj , and dropping
constant terms without affecting the EM algorithm, we get the final expression in Eq. (40).
A PPENDIX D: P ROOF
OF
T HEOREM 2
We first solve for wj using the method of Lagrange multipliers as follows.
!
2
2
X
X
(m)
J(w, ν) =
nj log wj + ν 1 −
wj
j=1
∂J
∂wj
=
(m)
nj
wj
j=1
(m)
− ν = 0 , j ∈ {1, 2}
⇒
nj
ν=
.
wj
(53)
30
Substituting into the constraint
(m)
(m+1)
wj
nj
= Pk
P2
(m)
j=1 nj
j=1 wj
= 1, we get the weight wj update as
(m)
(m)
= Pk
j=1
nj
Pn
i=1
(m)
γij
(m)
nj
= Pn
nj
=
n
i=1 1
, j ∈ {1, 2}.
(54)
Then, we can find the update of λIW by simply taking the partial derivative of the Q-function
w.r.t. λIW as
∂Q θ|θ(m)
∂λ
n
1 (m)
1 X (m) (yi − µY )2
=
n − 2
γ
= 0.
2λ 1
2µY i=1 i1
yi
(55)
Solving for λ (m+1) results in Eq. (42).
Similarly, taking the partial derivative of the Q-function w.r.t. c to get
"
# X
n
∂Q θ|θ(m)
1
1
µ
Y
(m)
(m)
+
1 − ψ(1 − )
log
= n2
−
γi2 log yi
∂c
c
Γ(1 − 1c ) c
i=1
#c n
#c ! n
"
"
X
X (m)
d
µY
µY
(m) −c
γ
y
log
y
−
γi2 yi−c . (56)
+
i
i2
i
1
1
dc
Γ(1 − c ) i=1
Γ(1 − c )
i=1
Equating to zero, we obtain the equation in (43).
A PPENDIX E: F ITTED F UNCTIONAL C OEFFICIENTS
FOR THE
M IXTURE MLE M ODEL
The fitted coefficient values in Table I are obtained for the functional fits in (46) by comparing
our Mixture model against simulation data. These coefficients are estimated for a maximum
transmission power of Ps = 30 dBm. To estimate the mixture distribution parameters at a different
transmission power Pnew dBm, we only need to update the b, λ and µ parameters by scaling
each of them by the corresponding transmit power scaling factor, i.e. bnew = 100.1(Pnew −Ps ) × b.
Parameter c stay unchanged with respect to the transmission power.
R EFERENCES
[1]
S. Rajagopal, S. Abu-Surra, and M. Malmirchegini, “Channel feasibility for outdoor non-line-of-sight mmwave mobile
communication,” in IEEE Vehicular Tech. Conf. (VTC Fall), Sept 2012, pp. 1–6.
[2]
W. Roh, J.-Y. Seol, J. Park, B. Lee, J. Lee, Y. Kim, J. Cho, K. Cheun, and F. Aryanfar, “Millimeter-wave beamforming
as an enabling technology for 5G cellular communications: theoretical feasibility and prototype results,” IEEE Comm.
Magazine, vol. 52, no. 2, pp. 106–113, February 2014.
[3]
F. Boccardi, R. Heath, A. Lozano, T. Marzetta, and P. Popovski, “Five disruptive technology directions for 5G,” IEEE
Comm. Magazine, vol. 52, no. 2, pp. 74–80, Feb. 2014.
[4]
T. Bai, V. Desai, and R. W. Heath, “Millimeter wave cellular channel models for system evaluation,” in IEEE ICNC,
2014, pp. 178–182.
[5]
T. Bai, A. Alkhateeb, and R. Heath, “Coverage and capacity of millimeter-wave cellular networks,” IEEE Comm. Magazine,
vol. 52, no. 9, pp. 70–77, September 2014.
31
coeff.
α
2
a3
a2
a1
a0
-111.99
-589.09
-1021.1
-873.55
coeff.
a3
a2
a1
a0
2
7.5381
-23.171
-133.81
685.25
α
3
-41.663
-214.46
-443.27
-433.55
3
5.9903
-11.084
-81.932
314.72
3.5
13.4287
-43.972
-230.91
-243.78
3.5
7.0852
8.8851
-105.21
239.38
4
16.8309
-17.117
-137.71
-149.15
4
15.616
15.137
-142
223.73
5
5.7399
-1.4256
-40.481
-122.15
5
11.126
-6.9276
-121.18
224.88
(a) IG weight parameter w1 (×103 ).
coeff.
(b) IW shape parameter c(×103 ).
a3
a2
a1
a0
2
-0.6594
12.124
17.277
1134.1
3
1.258
47.252
128.5
3.5
1.604
56.81
4
8.84
56.04
5
13.99
49.3
α
coeff.
a3
a2
a1
a0
2
0.05993
19.152
44.478
-351.06
-2502.3
3
0.25864
105.43
313.42
-2929.1
117.1
-4102
3.5
0.82885
105.83
311.6
-4186.3
78.43
-5577
4
0.96339
105.86
311.24
-5398.9
65.3
-8338
5
1.1855
105.94
310.68
-7752.1
α
(c) IG shape parameter λ(×103 ).
(d) IG scale parameter µ(×103 ).
TABLE I: Fitting coefficients for the mixture model parameters w1 , b, λ, and µ at η = 1.
[6]
M. Rebato, M. Mezzavilla, S. Rangan, F. Boccardi, and M. Zorzi, “Understanding noise and interference regimes in 5g
millimeter-wave cellular networks,” in European Wireless 2016; 22th European Wireless Conference, May 2016, pp. 1–5.
[7]
A. Giovanidis and F. Baccelli, “A stochastic geometry framework for analyzing pairwise-cooperative cellular networks,”
CoRR, vol. abs/1305.6254, 2013.
[8]
J. Andrews, F. Baccelli, and R. Ganti, “A tractable approach to coverage and rate in cellular networks,” IEEE Trans. on
Comm., vol. 59, no. 11, pp. 3122–3134, November 2011.
[9]
H. ElSawy, E. Hossain, and M. Haenggi, “Stochastic geometry for modeling, analysis, and design of multi-tier and
cognitive cellular wireless networks: A survey,” IEEE Comm. Surveys Tutorials, vol. 15, no. 3, pp. 996–1019, 2013.
[10]
R. Heath, M. Kountouris, and T. Bai, “Modeling heterogeneous network interference using Poisson point processes,” IEEE
Trans. on Signal Processing, vol. 61, no. 16, pp. 4114–4126, Aug 2013.
[11]
S. Ak, H. Inaltekin, and H. V. Poor, “Gaussian approximation for the downlink interference in heterogeneous cellular
networks,” in 2016 IEEE International Symposium on Information Theory (ISIT), July 2016, pp. 1611–1615.
[12]
M. Aljuaid and H. Yanikomeroglu, “Investigating the gaussian convergence of the distribution of the aggregate interference
power in large wireless networks,” IEEE Transactions on Vehicular Technology, vol. 59, no. 9, pp. 4418–4424, Nov 2010.
[13]
T. Bai and R. Heath, “Coverage and rate analysis for millimeter-wave cellular networks,” IEEE Trans. on Wireless Comm.,
vol. 14, no. 2, pp. 1100–1114, Feb 2015.
[14]
H. Elkotby and M. Vu, “Uplink user-assisted relaying in cellular networks,” IEEE Trans. on Wireless Comm., vol. 14,
no. 10, pp. 5468–5483, Oct 2015.
[15]
A. Altieri, L. Rey Vega, P. Piantanida, and C. Galarza, “Analysis of a cooperative strategy for a large decentralized wireless
network,” IEEE/ACM Trans. on Networking, vol. 22, no. 4, pp. 1039–1051, Aug 2014.
[16]
T. Novlan, H. Dhillon, and J. Andrews, “Analytical modeling of uplink cellular networks,” IEEE Trans. on Wireless
Comm., vol. 12, no. 6, pp. 2669–2679, June 2013.
[17]
G. R. MacCartney, J. Zhang, S. Nie, and T. S. Rappaport, “Path loss models for 5G millimeter wave propagation channels
in urban microcells,” in 2013 IEEE Global Comm. Conf. (GLOBECOM), pp. 3948–3953.
32
[18]
M. R. Akdeniz, Y. Liu, M. K. Samimi, S. Sun, S. Rangan, T. S. Rappaport, and E. Erkip, “Millimeter wave channel
modeling and cellular capacity evaluation,” IEEE Journal on Sel. Areas in Comm., vol. 32, no. 6, pp. 1164–1179, 2014.
[19]
M. Samimi, T. Rappaport, and G. Maccartney, “Probabilistic omnidirectional path loss models for millimeter-wave outdoor
communications,” IEEE Wireless Comm. Letters, vol. 4, no. 4, pp. 357–360, Aug 2015.
[20]
T. Rappaport, S. Sun, R. Mayzus, H. Zhao, Y. Azar, K. Wang, G. Wong, J. Schulz, M. Samimi, and F. Gutierrez,
“Millimeter wave mobile communications for 5G cellular: It will work!” IEEE Access, vol. 1, pp. 335–349, 2013.
[21]
T. Rappaport, F. Gutierrez, E. Ben-Dor, J. Murdock, Y. Qiao, and J. Tamir, “Broadband millimeter-wave propagation
measurements and models using adaptive-beam antennas for outdoor urban cellular communications,” IEEE Trans. on
Antennas and Propagation, vol. 61, no. 4, pp. 1850–1859, April 2013.
[22]
Y. Niu, Y. Li, D. Jin, L. Su, and A. V. Vasilakos, “A survey of millimeter wave (mmwave) communications for 5G:
Opportunities and challenges,” CoRR, vol. abs/1502.07228, 2015. [Online]. Available: http://arxiv.org/abs/1502.07228
[23]
E. Turgut and M. C. Gursoy, “Coverage in heterogeneous downlink millimeter wave cellular networks,” arXiv preprint
arXiv:1608.01790, 2016.
[24]
A. Afzal and S. A. Hassan, “A stochastic geometry approach for outage analysis of ad hoc SISO networks in Rayleigh
fading,” in 2013 IEEE Global Communications Conference (GLOBECOM), Dec 2013, pp. 336–341.
[25]
S. Akoum and R. W. Heath, “Interference coordination: Random clustering and adaptive limited feedback,” IEEE
Transactions on Signal Processing, vol. 61, no. 7, pp. 1822–1834, April 2013.
[26]
[27]
H. V. Poor, An introduction to signal detection and estimation.
Springer Science & Business Media, 2013.
T. M. Cover and J. A. Thomas, Differential Entropy. John Wiley & Sons, Inc., 2005, pp. 243–259. [Online]. Available:
http://dx.doi.org/10.1002/047174882X.ch8
[28]
R. Agrawal et al., “On efficacy of Rayleigh-Inverse Gaussian distribution over K-distribution for wireless fading channels,”
Wireless Communications and Mobile Computing, vol. 7, no. 1, pp. 1–7, 2007.
[29]
S. Atapattu, C. Tellambura, and H. Jiang, “A Mixture Gamma Distribution to Model the SNR of Wireless Channels,”
IEEE Transactions on Wireless Communications, vol. 10, no. 12, pp. 4193–4203, December 2011.
[30]
M. C. Tweedie, “Statistical Properties of Inverse Gaussian Distributions. I.” The Annals of Math. Stat., pp. 362–377, 1957.
[31]
M. C. Tweedie et al., “Statistical Properties of Inverse Gaussian Distributions. II.” The Annals of Math. Stat., vol. 28,
no. 3, pp. 696–705, 1957.
[32]
R. S. C. J. L. Folks, “The Inverse Gaussian Distribution and Its Statistical Application – A Review,” Journal of the Royal
Stat. Society. Series B (Methodological), vol. 40, no. 3, pp. 263–289, 1978.
[33]
H. Rinne, The Weibull distribution: a handbook.
CRC Press, 2008.
[34]
K. Sultan, N. Alsadat, and D. Kundu, “Bayesian and Maximum Likelihood Estimations of the Inverse Weibull parameters
under progressive type-II censoring,” Journal of Stat. Computation and Sim., vol. 84, no. 10, pp. 2248–2265, 2014.
[35]
M. Kountouris and N. Pappas, “Approximating the interference distribution in large wireless networks,” in 2014 11th
IEEE Int. Symp. on Wireless Comm. Systems (ISWCS), pp. 80–84.
[36]
A. P. Dempster, N. M. Laird, and D. B. Rubin, “Maximum Likelihood from Incomplete Data via the EM Algorithm,”
Journal of the royal statistical society. Series B (methodological), pp. 1–38, 1977.
[37]
Y. Chen and M. R. Gupta, “EM demystified: An Expectation-Maximization Tutorial,” University of Washington, 2010.
| 7cs.IT
|
arXiv:1803.09928v1 [cs.LG] 27 Mar 2018
Entropy Controlled Non-Stationarity for Improving Performance of
Independent Learners in Anonymous MARL Settings
Tanvi Verma, Pradeep Varakantham and Hoong Chuin Lau
School of Information Systems, Singapore Management University, Singapore
[email protected], [email protected],[email protected]
Abstract
With the advent of sequential matching (of supply and demand) systems (uber, Lyft, Grab for
taxis; ubereats, deliveroo, etc for food; amazon prime, lazada etc. for groceries) across
many online and offline services, individuals
(taxi drivers, delivery boys, delivery van drivers,
etc.) earn more by being at the ”right” place
at the ”right” time. We focus on learning techniques for providing guidance (on right locations to be at right times) to individuals in the
presence of other ”learning” individuals. Interactions between indivduals are anonymous,
i.e, the outcome of an interaction (competing
for demand) is independent of the identity of
the agents and therefore we refer to these as
Anonymous MARL settings.
Existing research of relevance is on independent learning using Reinforcement Learning
(RL) or on Multi-Agent Reinforcement Learning (MARL). The number of individuals in aggregation systems is extremely large and individuals have their own selfish interest (of
maximising revenue). Therefore, traditional
MARL approaches are either not scalable or
assumptions of common objective or action coordination are not viable. In this paper, we
focus on improving performance of independent reinforcement learners, specifically the
popular Deep Q-Networks (DQN) and Advantage Actor Critic (A2C) approaches by exploiting anonymity. Specifically, we control nonstationarity introduced by other agents using entropy of agent density distribution. We demonstrate a significant improvement in revenue for
individuals and for all agents together with our
learners on a generic experimental set up for aggregation systems and a real world taxi dataset.
1
Introduction
Systems that aggregate supply to ensure a better matching of demand and supply have significantly improved
performance metrics in taxi services, food delivery and
grocery delivery. From the individual perspective (taxi
drivers, delivery boys, delivery van drivers), learning to
be at the ”right” place at the ”right” time is essential to
maximize their revenue. From an individual perspective,
this learning problem is challenging because of the uncertainty about demand (which will determine the revenue
earned) and the locations of other ”learning” individuals
(which will determine whether the demand is assigned to
the current individual).
Given the presence of multiple learning agents, a key
focus area of relevance is Multi-Agent Reinforcement
Learning (MARL) [Littman, 1994; Claus and Boutilier,
1998; Busoniu et al., 2008], where multiple agents are
learning to maximize their individual rewards. There are
two main issues with such an approach in case of multiagent sequential matching problems: (a) The definition
of fairness when learning for multiple agents is unclear
as the agent actions are not synchronised, agents can
have different starting beliefs and demand is dynamic or
non-stationary. (b) The scale of matching problems is
typically very large (with thousands of agents) and hence
computing policies for all agents is computationally very
challenging.
A thread of MARL has also focussed on teams of agents
that maximize the global reward [Perolat et al., 2017;
Nguyen et al., 2017] or agents cooperate to achieve a common goal [Hausknecht and Stone, 2015; Foerster et al.,
2016]. The learning approaches there are also limited in
scalability with respect to number of agents. Furthermore,
the problems of interest in this paper are focussed on individual agents that are maximizing their own revenue
rather than a team revenue. Therefore, existing MARL
approaches are not suitable for the problem and hence we
focus on improving performance of independent learners
(ILs) in this paper.
Our work is motivated by the recent success of use entropy
regularizers in improving performances of reinforcement
learning algorithms [Mnih et al., 2016; Haarnoja et al.,
2017b; Schulman et al., 2017]. We use entropy of agent
population distribution as the regularizer. The intuition
is, as the agents are competing for resources, the policy which encourages even agent population distribution
is more advantageous for individual as well collective
agents.
Existing work [Verma et al., 2017] in multi-agent sequential matching problems has employed Reinforcement
Learning (RL) for each individual to learn a decision making policy. However, this line of work has assumed that
other agents employ stationary and fixed strategies, rather
than adaptive strategies. Due to the non-stationarity introduced when multiple agents learn independently, the performance of traditional table based Q-learning approaches
is extremely poor.
The use of deep neural networks (instead of table based
representations) has become hugely popular in the reinforcement learning community [Mnih et al., 2015; Silver et al., 2016, 2017]. Policy gradient methods and
Q-learning methods have been successfully used in deep
neural networks.
We make the following key contributions:
• Extending on past work in multi-agent planning under uncertainty [Varakantham et al., 2012, 2014], we
describe the notion of interaction anonymity in the context of multi-agent reinforcement learning.
• We then provide mechanisms to exploit interaction
anonymity by extending the well known DQN (Deep QNetwork) and A2C (Advantage Actor-Critic) methods.
Specifically, we control the non-stationarity introduced
by other agents by finding policies that also maximize
or minimize the entropy on agent count distribution.
• To demonstrate the utility of our approaches, we performed extensive experiments on a synthetic data set
(that is representative of multiple multi-agent sequential matching problems) and a real taxi data set. We
observe that our individuals learners based on DQN
and A2C are able to learn policies that are reasonably
fair (minor differences in value) and most importantly,
the individual and joint (social welfare) values of the
learning agents are significantly higher than existing
benchmarks.
2
Motivating Problems
This paper is motivated by the following matching problems, where there are multiple agents and matching of
agents to customer demand has to be done on a continuous basis. We refer to these problems as Multi-Agent
Sequential Matching Problems (MSMPs) and our focus
is on enabling individual agents to learn effectively and
efficiently.
Taxi Aggregation: Companies like Uber, Lyft, Didi,
Grab etc. all provide taxi supply aggregation systems.
The goal is to ensure wait times for customers is minimal
or amount of revenue earned is maximized by matching
taxi drivers to customers on a regular basis. However,
these goals of the aggregation companies may not be correlated to the individual driver objective of maximizing
their own revenue. The methods provided in this paper
can be used to guide individual drivers based on their
past experiences of customer demand and taxi supply (obtained directly/indirectly from the aggregation company),
while also considering that other drivers are learning to
improve their revenue.
Food or Grocery Delivery: Aggregation systems have
also become very popular for food delivery (Deliveroo,
Ubereats, Foodpanda, DoorDarsh etc.) and grocery delivery (AmazonFresh, Deliv, RedMart etc.) services. They
offer access to multiple restaurants/grocery stores to the
customers and use services of delivery boys/delivery vans
to deliver the food/grocery. Similar to taxi aggregation
systems, our work can be used to guide delivery boy/van
to improve their individual revenue based on current location and presence of other delivery boys/vans near that
location (obtained directly/indirectly from the aggregation
company).
Supply Aggregation in Logistics: More and more online buyers now prefer same day delivery services and
tradition logistic companies which maximize usage of
trucks, drivers and other resources are not suitable for it.
Companies like Amazon Flex, Postmates, Hitch etc. connect shippers with travellers/courier personnels to serve
same day/on-demand delivery requests. The courier personnels in this system can employ the proposed method
to learn to be at ”right” place at ”right” time by learning
from past experiences.
Sensor Networks: Another motivating problem is target
tracking by a team of sensors [Nair et al., 2005]. Each
sensor node can scan in one of the four directions. To
track a target accurately and receive the associated reward, a small number of sensors must scan the target
simultaneously. Every sensor can interact with only a
limited number of neighbour sensors. In this example
having more number of sensors scanning same location
is required for high reward as opposed to the previous
examples where more number of agents decrease individual rewards. Hence, by modifying our proposed methods
slightly, it can be used by individual sensors to learn to
align in a direction based on past rewards and alignments
of neighbouring sensor nodes.
3
Background: Reinforcement Learning
(RL)
In this section, we briefly describe the Reinforcement
Learning (RL) problem and leading approaches (of relevance to this paper) for solving large scale RL problems.
The RL problem for an agent is to maximize the long run
reward while operating in an environment represented as
a Markov Decision Process (MDP). Formally, an MDP is
represented by the tuple S, A, T , R , where S is the set
of states encountered by the agent, A is the set of actions,
T (s, a, s0 ) represents the probability of transitioning from
state s to state s0 on taking action a and R(s, a) represents the reward obtained on taking action a in state s.
The RL problem is to learn a policy that maximizes the
long term reward while only obtaining experiences (and
not knowing the full reward, R and transition, T models) of transitions and reinforcements. An experience is
defined as (s, a, s0 , r) and typically there is an episode
of experiences that ends when s0 is a terminal state. In
this paper, we are interested in episodic problems (ex: an
episode ends once the taxi driver gets a customer).
We now describe three approaches that are of relevance
to work described in this paper.
3.1
Q-Learning
One of the most popular approaches for RL is Qlearning Watkins and Dayan [1992], where the Q function
is represented as a table (and initialised to arbitrary fixed
values) with an entry in the table for each state and action combination. Q-values are updated based on each
experience given by (s, a, s0 , r):
0
0
Q(s, a) = R(s, a) + γ ∗ max
Q(s , a ) − Q(s, a) (1)
0
a
3.2
Deep Q-Networks (DQN)
Instead of a tabular representation for Q function employed by Q-Learning, the DQN approach Mnih et al.
[2015] employs a deep network to represent the Q function. Unlike with the tabular representation that is exhaustive (stores Q-value for every state, action pair), a deep
network predicts Q-values based on similarities in state
and action features. This deep network for Q-values is
parameterised by a set of parameters, θ and the goal is to
learn values for θ so that a good Q-function is learnt.
We learn θ using an iterative approach that employs gradient descent on the loss function. Specifically, the loss
function at each iteration is defined as follows:
L(θ) = E(e∼U (J )) [(y DQN − Q(s, a; θ− ))2 ]
where y DQN = r + γmaxa0 Q(s0 , a0 ; θ− ) is the target
value computed by a target network parameterised by
previous set of parameters, θ− . Parameters θ− are frozen
for some time while updating the current parameters θ. To
ensure independence across experiences (a key property
required by Deep Learning methods to ensure effective
learning), this approach maintains a replay memory J
and then samples experiences from that replay memory.
Like with traditional Q-Learning, DQN also typically
employs an -greedy policy.
3.3
Advantage Actor Critic (A2C)
DQN learns the Q-function and then computes policy
from the learnt Q-function. A2C is a policy gradient
method that directly learns the policy while ensuring that
the expected value is maximized. To achieve this, A2C
employs two deep networks, a policy network to learn
policy, π(a|s; θp ) parameterized by θp and a value network to learn value function (and not Q function) of the
computed policy, V π (s; θv ) parameterized by θv .
The policy network parameters are updated based on the
policy loss, which in turn is based on the advantage associated with the value function. Formally, the policy loss
is given by:
To ensure a good explore-exploit tradeoff, an -greedy
policy is typically employed.
π(s) =
arg maxa∈A Q(s, a), with probability 1 −
a
a1 , with probability ∗ P e 1 ak
e
a2 , with probability ∗
...
ai ∈A
ea 2
P
ai ∈A
ea k
Q-learning is guaranteed to converge to the optimal solution for stationary domains Watkins and Dayan [1992].
L(θp ) = ∇θp logπ(a|s; θp )A(s, a; θv )
where
A(s, a; θv ) =
i=k−1
X
γ i rt+i + γ k V (sk ; θv ) − V (s; θv )
i=0
(2)
The first term in equation 2 is the k-step (or till the end
of the episode) discounted reward following the current
policy and using a discount factor γ.
are dependent on other agents but only on counts. We
focus on developing independent learners for Anonymous
MARL settings.
Dynamic Bayes Network (DBN) in Figure 1 provides a graphical representation for MSMPs of interest. As can be observed from the DBN, agents
are independent of each other given the agent
counts vector, D = hD1 , D2 , . . . Dt , . . .i, where Dt =
(dt (s1), dt (s2), . . .).
In this paper, our focus is on learning the policy from past
experiences when the reward and transition functions are
not known. Transition and reward functions are unknown
or uncertain because of two reasons: (i) Matching of
an agent to customer demand is done by aggregation
companies like Uber and hence individual agents may not
be aware of what demand is assigned to them; and (ii)
Due to uncertainty in future demand, individual agents
are not aware of the consequences of moving to a specific
state.
Experience for each agent is given by
hs, d(s), a, r, s0 , d(s0 )i,
Figure 1: A DBN depicting relationship between policy
of agents and agent population density distribution Dt .
Where rti is the immediate reward received agent i by
taking action ait in state Sti at time t.
4
Exploiting Anonymity for Independent
Learning
In the Multi-agent Sequential Matching Problems
(MSMPs) described in Section 2, we have individual
agents learning to improve their expected reward in presence of other learning agents. The model for an individual agent, i is the same as in RL, i.e., S, A, T , R .
However, the key difference is that reward and transition functions are dependent on other agents and more
specifically on counts of agents. The reward function,
R(s, a, d(s)) refers to the reward for taking action a in
state s when there are d(s) other agents in state s 1 . The
transition function, T (s, a, s0 , d(s)) refers to the transition to s’ on taking action a from state s, when there are
d(s) other agents in state s. In the literature Varakantham et al. [2012, 2014], this dependence of reward and
transition functions on agent counts is referred to as interaction anonymity. We refer to these as Anonymous
MARL problems, as the reward and transition functions
1
This can be easily extended to consider count of number
of agents in same or relevant state, action pairs as described in
Kumaret al. Kumar and Varakantham [2017]
where d(s) and d(s’) represent the count of other agents2
in states s and s0 respectively.
The RL agent learning in MSMPs is faced with nonstationarity due to changing policies of other learning
agents (that are dependent on policy of the RL agent).
However, the useful structure in MSMPs is that each
agent is affected in the same way (through rewards and
transitions that are dependent on agent counts) by every
other agent due to interaction anonymity. We exploit the
interaction anonymity for independent learning using four
key steps.
First, to ensure better learning, we normalize each agent
counts vector into a probability distribution. That is to
say, d(s) will
Pnow refer to the the fraction of agents in
state s. and s d(s) = 1.
Second, we make policy, Q-function and V-function dependent on distribution of agent count. This is to ensure
that the learnt policy or value function captures any dependency3 on observed agent counts in states. That is to
say:
π : S × A × [0, 1] → [0, 1],
where π(a|s, d(s)) is the probability of taking action a in
2
These counts can typically be obtained directly (provided
by the aggregation company) or indirectly (through customer
application).
3
If there is no dependency on observed counts, then this
method should return same policies as without observed counts
in state space
state s when there is d(s) fraction of agents in state s.
Q : S × A × [0, 1] → R
where Q(s, a, d(s)) is the Q-value for taking action a in
state s when there are d(s) fraction of agents in state s.
V : S × [0, 1] → R,
where V (s, d(s)) is the value for state s.
Third, we modify deep network architectures employed
by Deep RL approaches such as DQN and A2C to exploit
anonymity captured through agent counts vector. Figure
3 shows how architecture of DQN can be modified into
Density Entropy (explained later in the section) based
DQN (DE-DQN). Similarly, figure 3 depicts transformation of standard A2C network into Density Entropy based
A2C (DE-A2C). Similar to DQN, DE-DQN estimates
action-value function. Unlike DQN, DE-DQN predicts
agent density distribution, D(s0 |s, d(s); θ) based on past
experience.
Similarly, apart from maintaining policy and value estimates, DE-A2C (figure 3) also maintains an estimate of
agent population density distribution. We use a softmax
layer to predict D. In the deep network π, V, Q and D are
parameterised by the network parameter θ as shown in
the figures 2 and 3.
policy output and a shared network for state-action/value
output and density prediction output.
Finally and most importantly, apart from maximizing the
value of the independent learner, we also maximize (or
minimize) entropy of the agent density distribution, D.
Entropy for the agent count distribution, D is given by:
X
HD = −
D(s0 |s, d(s); θ)log(D(s0 |s, d(s); θ)
s0 ∈S
As described in literature Haarnoja et al. [2017a], individual policy entropy is maximized so as to deal with
non-stationarity introduced by environments (which ensures we have different policies that work for different
scenarios of non-stationarity). However, in anonymous
MARL settings of interest in this paper, non-stationarity
for a learning agent is also introduced by other learning
agents. Therefore, depending on domain characteristics4 ,
we maximize/minimize density entropy to control the nonstationarity introduced by other agents. In other words,
we find a policy that will ensure other agents choose policies that will force density distribution to have high/low
entropy depending on the domains.
We now provide specific changes required to the target
value and the loss function to maximize density entropy
in DQN and A2C.
4.1
Figure 2: DQN and DE-DQN networks
DE-DQN
As we wish to maximize the density entropy, we augment
the reward with the density entropy. β is the hyperparameter which controls the effect of density entropy term. The
target value y for a given experience can be computed as
follows
(
r + βHD if s0 is terminal
y=
r + βHD + γmaxa0 Q(s0 , a0 , d(s0 ); θ− ) otherwise
θ− is the network parameter for the target network.
DE-DQN optimizes a single combined loss Lθ with respect to the joint parameter θ. Lθ combines Q-loss LQ
and D-loss LD :
Lθ = LQ + λLD
(3)
λ is the weightage term used for the density prediction
loss. Q-loss is computed using standard mean squared
Figure 3: A2C and DE-A2C networks
All the output layers can either have separate non-output
layers each or they can share the non-output layers. Without loss of generality, we assume separate network for
4
For taxi aggregation, food/grocery delivery and supply aggregation in logistics, revenue is reduced if agents are present
in one state and hence entropy needs to be maximized for those
settings. For sensor network (and other coverage) problems,
revenue is increased if more agents are present in one state and
hence entropy needs to be minimized in those cases.
error loss as given in equation 4. Equation 5 shows how
LD is computed using local observation .
LQ = E(e∼U (J )) [(y − Q(s, a, d(s); θ))2 ]
0
0
LD = −E(e∼U (J )) [d(s )logD(s |s, d(s); θ)]
(4)
(5)
As the agent does not have full observation of the density
distribution LD , we computes partial loss for the current
experience.
Algorithm 1 DE-DQN
1: Initialize replay memory J
2: Initialize counter T = 0
3: Initialize action-value function Q(s, d(s), a; θ) and population density distribution function D(.|s, d(s); θ) with
random weight θ
4: Initialize target network parameters θ− = θ
5: repeat
6:
T ←T +1
7:
Take action at using -greedy policy according to
Q(st , d(st ), a; θ) and observe rt , st+1 and d(st+1 )
8:
Store transition < st , d(st ), at , rt , st+1 , d(st+1 ) > to
the replay memory.
9:
if T mod Iupdate == 0 then
10:
dθ ← 0
Sample
batch
of
transitions
<
11:
s, d(s), a, r, s0 , d(s0 ) >from the replay memory
12:
Accumulate gradients wrt θ : dθ ← dθ + ∇θ Lθ
13:
Update θ based on dθ
14:
if T mod Itarget == 0 then
15:
Update target network parameter, θ− ← θ
16:
if T mod Ireplay == 0 then
17:
Reset replay memory
18: until T > Tmax
Algorithm 1 shows detailed steps of DE-DQN. Network
parameters are updated after every Iupdate steps. Itarget
is the number of fixed steps after which target network
parameter is updated and J is reset after every Ireplay
steps.
4.2
equation 8.
DE-A2C
Similar to A2C algorithm, DE-A2C maintains a policy
output π(a|s, d(s); θp ) and an output for the value function estimate V (s, d(s); θv ). It also maintains a density
prediction output D(s0 |s, d(s); θv ). We want to update
the policy such that the density entropy is maximized,
hence we add the entropy to the advantage term. A small
replay memory is also used which contains episodes generated from π(a|s, d(s); θp ) and replay memory is reset
after every update of θp . The value network loss Lθv
is combination of V-loss LV and D-loss LD as given in
LV = E(e∼U (J ) [(R − V (s, d(s); θv ))2 ]
(6)
LD = −E(e∼U (J ) [d(s0 )log(D(s0 |s, d(s); θv )])
(7)
Lθv = LV + λLD
(8)
(9)
Algorithm 2 shows the steps for DE-A2C.
Algorithm 2 DE-A2C
1: Initialize replay memory
2: Initialize counter T = 0
3: Initialize value function V (s, d(s); θv ) with random weight
θv
4: Initialize policy function π(a|s, d(s); θp ) with random
weight θp
5: repeat
6:
tstart ← T
7:
repeat
Take action at according to policy π(st , d(st ); θp )
8:
and observe rt , st+1 and d(st+1 )
9:
T ←T +1
10:
until (
terminal or T − tstart == k
0
if st is terminal
11:
R=
V (st , d(st ); θv ) otherwise
12:
for i ∈ T − 1, ..., tstart do
13:
R ← ri + γR
14:
add < si , di , ai , R, si+1 , d(si+1 ) > to J
15:
if T mod Iupdate == 0 then
16:
sample batch of experience from J
17:
Accumulate gradients wrt θp : dθp ← dθ +
∇θp logπ(a|s, d(s); θp )(R + βHD − V (s, d(s); θv ))
18:
Accumulate gradients wrt θv : dθv ← dθv +∇θv Lθv
19:
Update θp and θv using dθp and dθv respectively.
20:
Clear replay memory J .
21: until T > Tmax
5
Experiments
To demonstrate the performances of DE-DQN and DEA2C, we simulate a multi-agent taxi domain in grid world.
The grids are associated with a demand arrival rate and
multiple agents roam in the grid world to satisfy these
demands. The revenue of an agent can be affected by
various features of the taxi domain.
• Demand-to-Agent Ratio (DAR): This is the average
number of customers per time step per agent.
• Trip pattern: The average length of trips can be uniform
for all the grids or there can be few grids which always
get longer trips (for ex. airports which are usually
outside the city) whereas few grids get relatively shorter
trips (city center).
• Demand pattern: The demand can be uniformly spread
across all the grids (dispersed demand) or there might
be few grids where high demand is present and few
grids where there is no demand ( concentrated demands)
• Demand arrival rate: The Poisson arrival rate of demand can be either homogeneous (static arrival rate) or
non-homogeneous (dynamic arrival rate)
We perform experiments by varying values of these
features using various dimensions of the grid and
different number of agents. The experiments are done
on two sets of data. The first set is synthetic data and
we control how demand arrival rate, reward and cost is
generated. The second dataset is a one month data from a
real-world taxi fleet from a developed Asian city. From
the real world data set we compute demand between
zones and represent each zone as a grid. Travel time
between zones is also computed from the data set. We
evaluate the performances on two metrics:
(1) Revenue of IL agents present in the domain.
(2) Average revenue of all the ILs present in the domain.
Taxi Simulation Domain: Figure 4 shows an example
grid world with 6 × 6 grids. The numbers displayed in
the grids are the Poisson arrival rate of demand in the
corresponding grid. There are no demand in the grids
with no number in it. Demands are generated with a timeto-live value and the demand expires if it is not served
within time-to-live time periods. Furthermore, to emulate
the real-world taxi fares, the trip fares are generated based
on distance of the trip (distance between the origin and
destination grids) plus a fixed starting fare. At every time
step, it is tried to assign a trip to the agents based on the
agent population density at the grid.
Hyperparameters For DQN algorithms we used Adam
optimizer with a learning rate of 1e-4, whereas for A2C
algorithms we used RMSprop optimizer with learning rate
of 1e-5 for policy network and 1e-4 for value network.
Two hidden layers are used with 128 nodes per layer.
Density entropy regularizer β was set to 1e-2, whereas
weigtage of D-loss λ was set to 1e3. We also used policy
entropy regularizer for A2C algorithms and the regularizer
was set to 1e-3.
6
Experimental results
In this section, we benchmark the performance of our
approaches (DE-DQN and DE-A2C) with respect to tabular Q-learning, DQN/A2C without density distribution
input and finally DQN/A2C with density distribution input. One evaluation period consists of 1000 (1e3) time
steps5 and revenue of all the agents is reset after every
evaluation period. All the graphs plotted in the upcoming
sub-sections provide running average of revenue over 100
evaluation periods (1e5 time steps). Unless specified, the
number of agents employed was 20.
Tabular Q-Learning, Standard DQN and Standard
A2C: Figure 5 shows the comparison between tabular
Q-learning, DQN; with and without agent density input
and A2C;with and without agent density input. We used
medium demand-to-agent ratio with non-uniform trip pattern as explained in section 6. We can see that DQN with
Figure 5: Comparison of tabular Q-learning, standard
DQN and standard A2C .
Figure 4: A taxi grid world with demand arrival rates.
In our experiments we make a realistic assumption that
agents do not take action at every time step and they can
go to any grid from any grid and time taken to travel
between grids is proportional to the shortest distance between the grids. These on-way/on-trip agents are not a
candidate for the trip assignment and they do not contribute to the agent population density distribution computation. Hence D is prediction of agent population density
distribution of active learning agents.
agent density input and A2C with agent density input perform significantly better than the other three algorithms.
Even for other demand we obtained similar results. Therefore, we do not include tabular Q-learning, DQN and
A2C without agent density input in the following results.
Henceforth, DQN refers to DQN with density input and
A2C refers to A2C with density input.
Low DAR (Demand-to-Agent Ratio) uniform trip pattern and dispersed demand: In this case, static demand
5
A time step represents a decision and evaluation point in
the simulator. From a learner perspective, an episode is typically
multiple time steps long.
(a) Models
(b) DQN
(c) DE-DQN
(d) A2C
(e) DE-A2C
Figure 6: Low demand-to-agent ratio.
arrival rate was used. The effective demand-to-agent ratio
was 0.5. Figures 6a(b) and 6 provide the joint and individual normalized rewards obtained by different approaches.
Here are the key observations: (1) DE-DQN and DQN
perform better than A2C and DE-A2C. This can be attributed to the static nature of the domain.
(2) DE-DQN, A2C and DE-A2C all provide a reasonably
fair distribution of revenues for individual revenues, with
DE-DQN providing higher individual revenues.
Medium DAR with concentrated demand:
In this setting, there were few grids with high demand
whereas remaining grids did not have any demand and the
overall demand-to-agent ratio was 0.8. The poisson arrival rate was homogeneous and uniform trip pattern was
used. Here are the key observations: (1) Figure 7a shows
that both DE-A2C performs better than other algorithms,
with DE-DQN providing the second best performance.
(2) DQN, DE-DQN and A2C provide reasonably fair distribution of individual revenues, with DE-A2C providing
slightly uneven distribution of revenues for individual
agents.
Medium DAR with non-uniform trip patterns: In this
setting, we employed a demand-to-agent ratio of 0.8 and
non-uniform trip patterns. Arrival of demand was generated based on homogeneous poisson rates and to generate
a non-uniform trip pattern, we associated each grid cell
with a maximum range for destination grids for trips originating from the grid cell. Here are the key observations:
(1) We observed that as we increase complexity of demand
pattern, the performance of DE-DQN starts improving
with respect to DQN. Graph in figure 8a compares the
performances of all the algorithms.
(2) Figure 8 shows that DE-DQN and A2C provide low
variance across individual revenues.
High DAR with non-uniform trip patterns: We generated high demand-to-agent ratio (1.2) in this setting.
Once again, we observe that in Figues 9a and 9, DE-DQN
provides better joint revenue and less variance across individual agent revenues.
Medium DAR with dynamic demand arrival rate: To
simulate peak and off-peak hours we divided the evaluation period (1e3 time steps) into three parts. The demand for the first and third part is generated based on low
demand-to-agent ratio (0.6) and for the second part it is
generated using high demand-to-agent ratio (1.2).
Figure 10 shows that the performances are similar to what
we have seen for other settings, with DE-DQN providing
higher values while having lower variance across individual agents.
Taxi domain simulated using real-world data set For a
more realistic simulation of the taxi domain, we used realworld data to compute mean demand between two grids.
First, based on the GPS data of taxi-fleet, we divided the
map into 110 zones and represented each zone as a grid
in a 10 × 11 grid world. Since we focus on independent
learners, our learning is very scalable. However, simulating thousands of learning agents at the same time requires
extensive computer resources and with the academic resources available, we could not perform a simulation with
1000 agents. Hence, we computed proportional demand
for 100 agents and simulated for 100 agents. Time steps
taken to travel between two grids is also approximated by
computing average travel time between two zones using
the real-world dataset.
Figures 11a and 11c show that DE-DQN again performs
better than other approaches while having very small
variance across individual revenues. DE-A2C and other
approaches had a significant amount of variance across
individual revenues.
Summary of Results Our two contributions, DE-DQN
and DE-A2C that employ density entropy have significantly improved over the well known DQN and A2C algorithms in all the simulation settings and the real world
taxi data set. In addition, DE-DQN provides revenues
of individual agents which are very similar, thereby representing a fair learning approach from an MARL perspective. In other words, if there is an application that
provides guidance based on DE-DQN then the individual
agents following the advice will all be treated fairly.
(a) Models
(b) DQN
(c) DE-DQN
(d) A2C
(e) DE-A2C
Figure 7: Medium demand-to-agent ratio with concentrated demand pattern.
(a) Models
(b) DQN
(c) DE-DQN
(d) A2C
(e) DE-A2C
Figure 8: Medium demand-to-agent ratio with non-uniform trip pattern.
(a) Models
(b) DQN
(c) DE-DQN
(d) A2C
(e) DE-A2C
(d) A2C
(e) DE-A2C
Figure 9: High demand-to-agent ratio.
(a) Models
(b) DQN
(c) DE-DQN
Figure 10: Dynamic demand arrival rate.
(a) Models
(b) DQN
(c) DE-DQN
(d) A2C
Figure 11: Simulation using real-world data set
(e) DE-A2C
References
Busoniu, L., Babuska, R., and De Schutter, B. (2008).
A comprehensive survey of multiagent reinforcement
learning. IEEE Trans. Systems, Man, and Cybernetics,
Part C, 38(2):156–172.
Claus, C. and Boutilier, C. (1998). The dynamics of reinforcement learning in cooperative multiagent systems.
AAAI/IAAI, 1998:746–752.
Foerster, J., Assael, Y., de Freitas, N., and Whiteson, S.
(2016). Learning to communicate with deep multiagent reinforcement learning. In Advances in Neural
Information Processing Systems, pages 2137–2145.
Haarnoja, T., Tang, H., Abbeel, P., and Levine, S. (2017a).
Reinforcement learning with deep energy-based policies. arXiv preprint arXiv:1702.08165.
Haarnoja, T., Zhou, A., Abbeel, P., and Levine, S. (2017b).
Soft actor-critic: Off-policy maximum entropy deep
reinforcement learning with a stochastic actor.
Hausknecht, M. and Stone, P. (2015). Deep reinforcement
learning in parameterized action space. arXiv preprint
arXiv:1511.04143.
Kumar, R. R. and Varakantham, P. (2017). Exploiting anonymity and homogeneity in factored dec-mdps
through precomputed binomial distributions. In Proceedings of the 16th Conference on Autonomous Agents
and MultiAgent Systems, pages 732–740. International
Foundation for Autonomous Agents and Multiagent
Systems.
Littman, M. L. (1994). Markov games as a framework
for multi-agent reinforcement learning. In Machine
Learning Proceedings 1994, pages 157–163. Elsevier.
Mnih, V., Badia, A. P., Mirza, M., Graves, A., Lillicrap,
T., Harley, T., Silver, D., and Kavukcuoglu, K. (2016).
Asynchronous methods for deep reinforcement learning. In International Conference on Machine Learning,
pages 1928–1937.
Mnih, V., Kavukcuoglu, K., Silver, D., Rusu, A. A., Veness, J., Bellemare, M. G., Graves, A., Riedmiller, M.,
Fidjeland, A. K., Ostrovski, G., et al. (2015). Human-
level control through deep reinforcement learning. Nature, 518(7540):529.
Nair, R., Varakantham, P., Tambe, M., and Yokoo, M.
(2005). Networked distributed pomdps: A synthesis
of distributed constraint optimization and pomdps. In
AAAI, volume 5, pages 133–139.
Nguyen, D. T., Kumar, A., and Lau, H. C. (2017). Policy
gradient with value function approximation for collective multiagent planning. In Advances in Neural
Information Processing Systems, pages 4322–4332.
Perolat, J., Leibo, J. Z., Zambaldi, V., Beattie, C., Tuyls,
K., and Graepel, T. (2017). A multi-agent reinforcement learning model of common-pool resource appropriation. In Advances in Neural Information Processing
Systems, pages 3646–3655.
Schulman, J., Abbeel, P., and Chen, X. (2017). Equivalence between policy gradients and soft q-learning.
arXiv preprint arXiv:1704.06440.
Silver, D., Huang, A., Maddison, C. J., Guez, A., Sifre, L.,
Van Den Driessche, G., Schrittwieser, J., Antonoglou,
I., Panneershelvam, V., Lanctot, M., et al. (2016). Mastering the game of go with deep neural networks and
tree search. nature, 529(7587):484–489.
Silver, D., Schrittwieser, J., Simonyan, K., Antonoglou,
I., Huang, A., Guez, A., Hubert, T., Baker, L., Lai, M.,
Bolton, A., et al. (2017). Mastering the game of go
without human knowledge. Nature, 550(7676):354.
Varakantham, P., Adulyasak, Y., and Jaillet, P. (2014).
Decentralized stochastic planning with anonymity in
interactions. In AAAI, pages 2505–2512.
Varakantham, P., Cheng, S.-F., Gordon, G., and Ahmed,
A. (2012). Decision support for agent populations in
uncertain and congested environments. In AAAI.
Verma, T., Varakantham, P., Kraus, S., and Lau, H. C.
(2017). Augmenting decisions of taxi drivers through
reinforcement learning for improving revenues. In
International Conference on Automated Planning and
Scheduling, pages 409–417.
Watkins, C. J. and Dayan, P. (1992). Q-learning. Machine
learning, 8(3-4):279–292.
| 2cs.AI
|
Performance Analysis on Molecular Dynamics Simulation of Protein Using
GROMACS
A.D.Astuti and A.B. Mutiara
Department of Informatics Engineering, Faculty of Industrial Technology
Gunadarma University
E-mail: [email protected]
Abstracts
Development of computer technology in chemistry, bring many application of chemistry. Not only the
application to visualize the structure of molecule but also to molecular dynamics simulation. One of them is
Gromacs. Gromacs is an example of molecular dynamics application developed by Groningen University. This
application is a non-commercial and able to work in the operating system Linux. The main ability of Gromacs is to
perform molecular dynamics simulation and minimization energy.
In this paper, the author discusses about how to work Gromacs in molecular dynamics simulation of some
protein. In the molecular dynamics simulation, Gromacs does not work alone. Gromacs interact with pymol and
Grace. Pymol is an application to visualize molecule structure and Grace is an application in Linux to display
graphs. Both applications will support analysis of molecular dynamics simulation.
Keywords: molecular dynamics, Gromacs, Linux, pymol, grace, chemical
1. Introduction
1.1. Backgrounds
Computer is necessary for life of
society, especially in chemistry. Now, many
non-commercial application of chemistry is
available in Windows version and also
Linux. The applications are very useful not
only in visualization molecule structure but
also to molecular dynamics simulation.
Molecular dynamics is a simulation
method with computer which allowed
representing interaction molecules of atom
in certain time period. Molecular dynamics
technique is based on Newton law and
classic mechanics law. Gromacs is one of
application which able to do molecular
dynamics simulation based on equation of
Newton law. Gromacs was first introduced
by Groningen University as molecular
dynamics simulation machine.
1.2. Definition Of Problem
This writing is focused at usage of
Gromacs application. In this writing, writer
tell about how to install Gromacs, Gromacs
concepts, file format in Gromacs, Program
in Gromacs, and analysis result of
simulation.
2. Theory
2.1. Protein
Protein is complex organic compound
that has a high molecular weight. Protein is
also a polymer of amino acid that has been
linked to one another with a peptide bond.
Structure of protein divided into three,
namely the structure of primary, secondary,
tertiary and quaternary. Primary structure is
amino acid sequence of a protein linked to it
through a peptide bond. Secondary structure
is a three-dimensional structure of local
range of amino acids in a protein stabilized
by hydrogen bond. Tertiary structure is a
combination
of
different
secondary
structures that produce three-dimensional
form. Tertiary structure is usually a lump.
Some of the protein molecule can interact
physically without covalent bonds to form a
stable oligomer (e.g. dimer, trimer, or
kuartomer) and form a Quaternary structure
(e.g. rubisco and insulin).
2.2. Molecular Dynamics
perception, from starting position, it is
possible to calculate the next position and
velocities of atoms at a small time interval
and force in the new position. This can be
repeated many times, even up to hundreds of
times.
Molecular dynamics procedure can be
described with the flowchart as follows:
Molecular dynamics is a method to
investigate exploring structure of solid,
liquid, and gas. Generally, molecular
dynamics use equation of Newton law and
classical mechanics.
Molecular
dynamics
was
first
introduced by Alder and Wainwright in the
late 1950s, this method is used to study the
interaction hard spheres. From these studies,
they learn about behavior of simple liquids.
In 1964, Rahman did the first simulations
using realistic potential for liquid argon. And
in 1974, Rahman and Stillinger performed
the first molecular dynamics simulations
using a realistic system that is simulation of
liquid water. The first protein simulations
appeared in 1977 with the simulation of the
bovine pancreatic trypsin inhibitor (BPTI) [8].
Figure 2.1 Flowchart of molecular
dynamics [13]
The main purposes of the molecular
dynamics simulation is:
•
Generate trajectory molecules in the
limited time period.
•
Become the bridge between theory and
experiments.
•
Allow the chemist to make simulation
that can’t bo done in the laboratory
From The figure above can be seen the
process of molecular dynamics simulation.
The arrow indicates a path sequence the
process will be done. The main process is
calculating forces, computing motion of
atoms, and showing statistical analysis the
configuration for each atom.
2.3. The Concepts of Molecular Dynamics
3. Discussion
In molecular dynamics, force between
molecules is calculated explicitly and the
motion of is computed with integration
method. This method is used to solve
equation of Newton in the constituents
atomic. The starting condition is the position
and velocities of atoms. Based on Newton’s
3.1. Gromacs Concepts
Gromacs is an application that was first
developed by department of chemistry in
Groningen University. This application is
used to perform molecular dynamics
simulations and energy minimization.
The concept used in Gromacs ia a
periodic boundary condition and group.
Periodic boundary condition is classical way
used in Gromacs to reduce edge effect in
system. The atom will be placed in a box,
surrounded by a copy of the atom.
Gromacs applications can be downloaded in
http://www.gromacs.org. How to install
Gromacs is as follows:
1. Download FFTW in http://www.fftw.org
2. Extract file FFTW
% tar xzf fftw3-3.0.1.tar.gz
% cd fftw3-3.0.1
3. Configuration
% ./configure -prefix=/home/anas/fftw3 --enable-float
4. Compile fftw
% make
5. Installing fftw
% make install
6. After fftw installed then install Gromacs.
Extract Gromacs.
% Tar xzf gromacs-3.3.1.tar.gz
% cd gromacs-3.3.1
Figure 2.2: Periodic boundary condition in
Two Dimensions [7]
In Gromacs there are some model boxes.
That is triclinic, cubic, and octahedron.
The second concept is group. This
concept is used in Gromacs to show an
action. Each group can only have a
maximum number of 256 atoms, where each
atom can only have six different groups.
7. Configuration
% Export CPPFLAGS =I/home/anas/fftw3/include
% export LDFLAGS=L/home/anas/fftw3/lib % Export
LDFLAGS =- L/home/anas/fftw3/lib
%. /configure –
prefix=/home/anas/gromacs %. /
Configure-prefix = / home / Anas /
gromacs
8. Compile and install gromacs
3.2. Install Gromacs
Gromacs applications can run on the
operating system Linux and windows. To
run Gromacs on multiple computer, then the
required MPI (Message Passing Interface)
library for parallel communication.
%make & make install
3.3. Flowchart Of Gromacs
Gromacs need several steps to set up a
file input in the simulation. The steps can be
seen in flowchart below:
4. Energy minimization
The process of adding hydrogen bond or
termination may cause atoms in protein
too close, so that the collision occurred
between the atoms. The collision
between atoms can be removed by
energy minimization. Gromacs use mdp
file for setup parameters. Mdp file
specified number of step and cut-off
distance. Use grompp to generate input
file and mdrun to run energi
minimization. The energy minimization
may take some time, depending on the
CPU [21].
5. Molecular dynamics simulation
Figure 3.1 Flowchart Gromacs [16].
Flowchart above illustrates how to do
molecular dynamics simulation of a protein.
The steps are divided into:
1. Conversion of the pdb file
At this step pdb is converted to gromos
file (gro) with pdb2gmx. Pdbgmx also
created topology file (.top)
2. Generate box
At this step, the editconf will determine
the type of box and the box size that will
be used in the simulation. on Gromacs
there are three types of box, namely
triclinic, cubic, and octahedron.
The process of molecular dynamics
simulation is the same as energy
minimization. Grompp prepare the input
file to run mdrun. Molecular dynamics
simulations also need mdp file for setup
parameters. Most option of mdrun on
molecular dynamics is used in energy
minimization except –x to generate
trajectory file.
6. Analysis
After the simulation has finished, the last
step is to analyze the simulation result
with the following program:
•
Ngmx to perform trajectory
•
G_energy to monitor energy
•
G_rms to calculated RMSD (root
mean square deviation)
3. Solvate protein
The next step is solvate the protein in
box. The program genbox will do it.
Genbox will generate a box defined by
editconf based on the type. Genbox also
determined the type of water model that
will be used and add number of water
molecule for solvate protein the water
model commonly used is SPC (Simple Point
Charge).
3.4. File Format
In Gromacs, there are several types of
file format:
1. Trr: a file format that contains data
trajectory for simulation. It stores
information about the coordinates,
velocities, force, and energy.
2. Edr: a file format that stores information
about energies during the simulation and
energy minimization.
•
Triclinic, a box-shaped triclinic
•
Cubic, a square-shaped box with all
four side equal
3. Pdb: a form of file format used by
Brookhaven protein data bank. This file
contains information about position of
atoms in structure of molecules and
coordinates based on ATOM and
HETATM records.
•
Octahedron, a combination
octahedron and dodecahedron.
4. Xvg: a form of file format that can be
run by Grace. This file is used to perform
data in graphs.
5. Xtc: portable format for trajectory. This
file shows the trajectory data in
Cartesian coordinates.
6. Gro: a file format that provides
information about the molecular
structure in format gromos87. The
information displayed in columns, from
left to right.
7. Tpr: a binary file that is used as input file
in the simulation. This file can not be
read through the normal editor.
8. Mdp: a file format that allows the user to
setup the parameters in simulation or
energy minimization.
of
3.5.3. Grompp
Grompp is a pre-processor program.
Grompp have some ability that is:
•
Reading a molecular topology file
•
Check the validity of file.
•
Expands topology from the molecular
information into the atomic
information.
•
Recognize and read topology file (*.
top), the parameter file (*. tpr) and the
coordinates file (*. gro).
•
Generate *. tpr file as input in the
molecular dynamics and energy of
contraction that will be done by mdrun.
Grompp copy any information that required
on topology file.
3.5.4. Genbox
3.5. Gromacs Programs
Genbox can do 3 things:
3.5.1. Pdb2gmx
•
Generate solvent box
Pdb2gmx is a program that is used to
convert pdb file. Pdb2gmx can do some
things such as reading file pdb, adding
hydrogen to molecule structure, and generate
coordinate file a topologi file.
•
Solvate protein
•
Adding extra molecules on random
position
3.5.2. Editconf
Editconf is used to define box water
that will be used for simulation. This
program not only defines the model, but also
set the relative distance between edge of box
and molecules. There are 3 types of box such
as
Genbox remove atom if distance
between solvent and solute is less then
sum of vanderwalls radii of each atom.
3.5.5. Mdrun
Mdrun is main program for
computing chemistry. Not only
performs
molecular
dynamics
simulation, but it can also perform
Brownian
dynamics,
Langevin
dynamics, and energy minimization.
Mdrun can read tpr as input file and
generate three type of file such as
trajectory file, structure file, and
energy file.
4. Result Of Simulation
4.1. Research Method
The testing carried out on different
types of protein. Each protein has different
structure and number of atom. Testing is
based on flowchart of gromacs. This testing
do two process, the first is energy
minimization and the second is molecular
dynamics simulation. Number of step for
energy minimization is 200 numstep and
molecular dynamics is 500 numstep.
Figure 4.1 Mechanism of Unfolded
State [16]
4.2. Analysis of Simulation
From the testing, that was made on 4
different types of protein that can be seen the
difference form of molecule before and after
simulation.
In
molecular
dynamics
simulation, occur changes mechanisms of
protein structure from folded state to
unfolded state. Its mechanism is as follows:
In the molecular dynamics simulation
above, each protein has a different velocity
simulation.
Table 4.1 Simulation Time Table
Protein
Number
of Atom
Simulasi ( minute: sec)
for 500 iterations
Minute:sec
sec
Alpha-Lactalbulmin
7960
34:07
2047
1gg1-kappa d1.3 fv
(Light Chain)
2779
20:07
1207
RibonuleosideDiphosphate
Reductase 2 Alpha
5447
3:30
210
Lysozyme C
1006
1:02
62
carried out on four different types of protein.
From The results of testing, it can be seen
that each protein has a different long time.
2500
2000
1500
1000
500
0
1006
2779
5447
7960
Figure 4.2 Time Graphic Simulation
At the protein Alpha-Lactalbulmin with
number of atom 7960, long simulation time
is 34 minutes 7 seconds. 1gg1 FV-d1.3
Kappa (light chain) with number of atom
2779, long simulation time is 20 minutes 7
seconds.
Ribonuleoside-Diphosphate
Reductase Alpha 2 with number of atom
5447, long simulation time is 3 minutes 30
seconds. And Lysozyme C with the number
of atom 1006, long simulation time is 1
minute 2 seconds.
From the data above show differences
long simulations of each protein. Length of
time the simulation is depicted with a nonlinier graph.
In addition gromacs also help
understand the mechanisms Folding and
unfolding of protein.
Length of time simulation is not only
influenced by the number of atoms but also
the number of chain and water blocks.
6. Reference
In the case of protein RibonuleosideDiphosphate Reductase Alpha 2, although
the number of atom is greater than the
protein 1gg1 FV-d1.3 Kappa (Light Chain)
but the simulation time is more quickly.
Because the number of blocks and the chain
of water in this protein are lower than the
protein 1gg1 FV-d1.3 Kappa (Light Chain).
5. Conclusion
Development of the world’s computing
allows the chemist to perform molecular
dynamics simulation on hundreds of or
thousands of atoms with computer.
Molecular dynamics simulation is a
technique for investigating structure of
atoms based on the interaction with other
atoms.
This writing introduces Gromacs as one
of the applications that are able to perform
molecular dynamics simulation, especially
for protein. At this writing, the testing is
[1]. Allen, Michael P. Introduction to
Molekuler Dynamics Simulastion.
John Von Neuman Institute for
computing.2004.vol23
[2]. DeLano WL.The PyMOL Molecular
Graphics System on World Wide
Web. 2002. http:// www.pymol.org
[3]. Foster,
Bob.Fisika
Jakarta:Erlangga.2004
SMA.
[4]. Jinzhi Lei. Molecular Dynamics and
Protein Folding. Zhou Peiyuan Center
For Applied Mathematics.2004
[5]. Kurniawan, Aulia. Percobaan VIII:
Asam-Amino dan Protein
[6]. Lindahl, Erik.Parallel Molecular
Dynamics:Gromacs. 2 agustus 2006
[7]. Lindahl, Erik dkk,. Gromacs User
Manual. http://www.gromacs.org
[8]. Moleculer
Dynamics.
http://andrykidd.wordpress.com/2009/05/1
1/molecular-dynamics/
[9]. Witoelar, Aree. Perancangan dan
Analisa Simulasi Dinamika Molekul
Ensemble Mikrokanononikal dan
Kanonikal
dengan
Potensial
Lennard Jones. Laporan tugas
akhir.2002
[10]. Simulasi-Dinamika-MolekulProtein-G-Dalam-Water-Box-Pada1000-K.
http://biotata.wordpress.com/2008/12/31/s
imulasi-dinamika-molekul-protein-gdalam-water-box-pada-1000-k/
[11]. Warmada, I Wayan. Grace: salah
satu program grafik 2-dimensi
berbasis GUI di lingkungan Linux.
Lab. Geokomputasi, Jurusan Teknik
Geologi, FT UGM
[12]. http://118.98.171.140/DISPENDIK_MAL
ANGKAB/
[13]. Http://www.compsoc.man.ac.uk/~luck
y/Democritus/Theory/moldyn1.html
[14]. Http://www.ch.embnet.org/MD_tutorial/p
ages/MD.Part1.html
[15]. Http://www.gizi.net
[16]. Http://www.gromacs.org
[17]. Http://ilmu-kimia.netii.net
[18]. Http://ilmukomputer.org/
| 5cs.CE
|
O’Dorney
RESEARCH
Rings of small rank over a Dedekind domain and
their ideals
arXiv:1508.02777v3 [math.NT] 17 Aug 2015
Evan M O’Dorney
Correspondence:
[email protected]
119 Shelterwood Lane, 94506
Danville, CA, USA
Full list of author information is
available at the end of the article
Abstract
The aim of this paper is to find and prove generalizations of some of the beautiful
integral parametrizations in Bhargava’s theory of higher composition laws to the
case where the base ring Z is replaced by an arbitrary Dedekind domain R.
Specifically, we parametrize quadratic, cubic, and quartic algebras over R as well
as ideal classes in quadratic algebras, getting a description of the multiplication
law on ideals that extends Bhargava’s famous reinterpretation of Gauss
composition of binary quadratic forms. We expect that our results will shed light
on the statistical properties of number field extensions of degrees 2, 3, and 4.
Keywords: Dedekind domain; ring extension; Gauss composition; Bhargavology
AMS Subject Classification: Primary 13F05; 11E20; 11R11; 11R16; secondary
11E16; 13B02; 13A15; 11E76
1 Introduction
The mathematics that we will discuss has its roots in the investigations of classical
number theorists—notably Fermat, Lagrange, Legendre, and Gauss (see [1], Ch. I)—
who were interested in what integers are represented by expressions such as x2 +ky 2 ,
for fixed k. It became increasingly clear that in order to answer one such question,
one had to understand the general behavior of expressions of the form
ax2 + bxy + cy 2 .
These expressions are now called binary quadratic forms. It was Gauss who first
discovered that, once one identifies forms that are related by a coordinate change
x 7→ px + qy, y 7→ rx + sy (where ps − qr = 1), the forms whose discriminant
D = b2 − 4ac has a fixed value and which are primitive, that is, gcd(a, b, c) = 1, can
be naturally given the structure of an abelian group, which has the property that
if forms φ1 , φ2 represent the numbers n1 , n2 , then their product φ1 ∗ φ2 represents
n1 n2 . This group law ∗ is commonly called Gauss composition.
Gauss’s construction of the product of two forms was quite ad hoc. Since Gauss’s
time, mathematicians have discovered various reinterpretations of the composition
law on binary quadratic forms, notably:
• Dirichlet, who discovered an algorithm simplifying the understanding and
computation of the product of two forms, which we will touch on in greater
detail (see Example 5.9).
• Dedekind, who by introducing the now-standard notion of an ideal, transformed Gauss composition into the simple operation of multiplying two ideals
√
in a quadratic ring of the form Z[(D + D)/2];
O’Dorney
Page 2 of 39
• Bhargava, who in 2004 astounded the mathematical community by deriving
Gauss composition from simple operations on a 2 × 2 × 2 cube [2].
In abstraction, Bhargava’s reinterpretation is somewhat intermediate between
Dirichlet’s and Dedekind’s: it shares the integer-based concreteness of Gauss’s original investigations, yet it also corresponds to natural constructions in the realm of
ideals. One of the highlights of Bhargava’s method is that it extends to give group
structures on objects beyond binary quadratic forms, hence the title of his paper
series, “Higher composition laws.” It also sheds light on previously inaccessible conjectures about Gauss composition, such as an estimate for the number of forms of
bounded discriminant whose third power is the identity [3].
A second thread that will be woven into this thesis is the study of finite ring
extensions of Z, often with a view toward finite field extensions of Q. Quadratic rings
(that is, those having a Z-basis with just two elements) are simply and classically
parametrized by a single integer invariant, the discriminant. For cubic rings, Delone
and Faddeev prove a simple lemma (as one of many tools for studying irrationalities
of degree 3 and 4 over Q) parametrizing them by binary cubic forms ([4], pp. 101ff).
A similar classification for quartic and higher rings proved elusive until Bhargava,
using techniques inspired by representation theory, was able to parametrize quartic
and quintic rings together with their cubic and sextic resolvent rings, respectively,
and thereby compute the asymptotic number of quartic and quintic rings and fields
with bounded discriminant [5, 6, 7, 8]. The analytic virtue of Bhargava’s method
is to map algebraic objects such as rings and ideals to lattice points in bounded
regions of Rn , where asymptotic counting is much easier. (Curiously enough, the
ring parametrizations seem to reach a natural barrier at degree 5, in contrast to the
classical theory of solving equations by radicals where degree 4 is the limit.)
Bhargava published these results over the integers Z. Since then, experts have
wondered whether his techniques apply over more general classes of rings; by far
the most ambitious extensions of this sort are Wood’s classifications of quartic
algebras [9] and ideals in certain n-ic algebras [10] over an arbitrary base scheme
S. In this paper, all results are proved over an arbitrary Dedekind domain R. The
use of a Dedekind domain has the advantage of remaining relevant to the original
application (counting number fields and related structures) while introducing some
new generality.
We will focus on two parametrizations that are representative of Bhargava’s algebraic techniques in general. The first is the famous reinterpretation of Gauss
composition in terms of 2 × 2 × 2 boxes. Following [2], call a triple (I1 , I2 , I3 ) of
ideals of a quadratic ring S balanced if I1 I2 I3 ⊆ S and N (I1 )N (I2 )N (I3 ) = 1, and
call two balanced triples equivalent if Ii = γi Ii0 for some scalars γi ∈ S ⊗Z Q having
product 1. (If S is Dedekind, as is the most common application, then the balanced
triples of equivalence classes correspond to triples of ideal classes having product
1.) Then:
Theorem 1.1 ([2], Theorem 11) There is a canonical bijection between
• pairs (S, (I1 , I2 , I3 )) where S is an oriented quadratic ring of nonzero discriminant over Z and (I1 , I2 , I3 ) is an equivalence class of balanced triples of ideals
of S;
O’Dorney
Page 3 of 39
• trilinear maps β : Z2 ⊗ Z2 ⊗ Z2 → Z, up to SL2 Z-changes of coordinates in
each of the three inputs (subject to a certain nondegeneracy condition).
Our parametrization is analogous, with one crucial difference. Whereas over Z, the
only two-dimensional lattice is Z2 , over a Dedekind domain R there are as many as
there are ideal classes, and any such lattice can serve as the R-module structure of a
quadratic algebra or an ideal thereof. Using a definition of balanced and equivalent
essentially identical to Bhargava’s (see Definition 5.1), we prove:
Theorem 1.2 (see Theorem 5.3) Let R be a Dedekind domain. There is a canonical bijection between
• pairs (S, (I1 , I2 , I3 )) where S is an oriented quadratic algebra over R and
(I1 , I2 , I3 ) is an equivalence class of balanced triples of ideals of S;
• quadruples (a, (M1 , M2 , M3 ), θ, β) where a is an ideal class of R, Mi are lattices of rank 2 over R (up to isomorphism), θ : Λ2 M1 ⊗ Λ2 M2 ⊗ Λ2 M3 → a3
is an isomorphism, and β : M1 ⊗ M2 ⊗ M3 → a is a trilinear map whose three
partial duals βi : Mj ⊗ Mk → aMi∗ ({i, j, k} = {1, 2, 3}) have image a full-rank
sublattice.
Under this bijection, we get identifications Λ2 S ∼
= a and Ii ∼
= Mi .
In particular R may have characteristic 2, the frequent factors of 1/2 in Bhargava’s
exposition notwithstanding, and by weakening the nondegeneracy condition, we are
able to include balanced triples in degenerate rings.
The second main result of our paper is the parametrization of quartic rings (with
the quadratic and cubic parametrizations as preliminary cases). A key insight is to
parametrize not merely the quartic rings themselves, but the quartic rings together
with their cubic resolvent rings, a notion arising from the resolvent cubic used in
the classical solution of the quartic by radicals.
Theorem 1.3 ([5], Theorem 1 and Corollary 5) There is a canonical bijection
between
• isomorphism classes of pairs (Q, C) where Q is a quartic ring (over Z) and
C is a cubic resolvent ring of Q;
• quadratic maps φ : Z3 → Z2 , up to linear changes of coordinates on both the
input and the output.
Any quartic ring Q has a cubic resolvent, and if Q is Dedekind, the resolvent is
unique.
Our analogue is as follows:
Theorem 1.4 (see Theorems 8.3 and 8.7 and Corollary 8.6) Let R be a Dedekind
domain. There is a canonical bijection between
• isomorphism classes of pairs (Q, C) where Q is a quartic ring (over Z) and
C is a cubic resolvent ring of Q;
• quadruples (L, M, θ, φ) where L and M are lattices of ranks 3 and 2 over R
respectively, θ : Λ2 M → Λ3 L is an isomorphism, and φ : L → M is a quadratic
map.
O’Dorney
Page 4 of 39
Under this bijection, we get identifications Q/R ∼
= L and C/R ∼
= M.
Any quartic ring Q has a cubic resolvent, and if Q is Dedekind, the resolvent is
unique.
1.1 Outline
The remainder of this paper is structured as follows. In section 2, we set up basic
definitions concerning projective modules over a Dedekind domain. In sections 3 and
4, respectively, we generalize to Dedekind base rings two classical parametrizations,
namely of quadratic algebras over Z and of their ideals. In section 5, we prove
Bhargava’s parametrization of balanced ideal triples (itself a generalization of Gauss
composition) over a Dedekind domain. In section 6, we work out in detail a specific
example—unramified extensions of Zp —that allows us to explore the notion of
balanced ideal triple in depth. In sections 7 and 8, we tackle cubic and quartic
algebras respectively, and in section 9, we discuss results that would be useful when
using the preceding theory to parametrize and count quartic field extensions.
2 Modules and algebras over a Dedekind domain
A Dedekind domain is an integral domain that is Noetherian, integrally closed, and
has the property that every nonzero prime ideal is maximal. The standard examples
of Dedekind domains are the ring of algebraic integers OK in any finite extension
K of Q; in addition, any field and any principal ideal domain (PID), such as the
ring C[x] of polynomials in one variable, is Dedekind. In this section, we summarize
properties of Dedekind domains that we will find useful; for more details, see [11],
pp. 9–18.
The salient properties of Dedekind domains were discovered through efforts to
generalize prime factorization to rings beyond Z; in particular, every nonzero ideal
a in a Dedekind domain R is expressible as a product pa1 1 · · · pann of primes, unique
up to ordering. Our motivation for using Dedekind domains stems from two other
related properties. Recall that a fractional ideal or simply an ideal of R is a finitely
generated nonzero R-submodule of the fraction field K of R, or equivalently, a set
of the form aa where a ⊆ R is a nonzero ideal and a ∈ K × . (The term “ideal” will
from now on mean “(nonzero) fractional ideal”; if we wish to speak of ideals in the
ring-theoretic sense, we will use a phrasing such as “ideal a ⊆ R.”) The first useful
property is that any fractional ideal a ⊆ K has an inverse a−1 such that aa−1 = R.
This allows us to form the group I(R) of nonzero fractional ideals and quotient
by the group K × /R× of principal ideals to obtain the familiar ideal class group,
traditionally denoted Pic R. (For the ring of integers in a number field, the class
group is always finite; for a general Dedekind domain this may fail, e.g. for the ring
C[x, y]/(y 2 − (x − a1 )(x − a2 )(x − a3 )) of functions on a punctured elliptic curve.)
The second property that we will find very useful is that finitely generated modules over a Dedekind domain are classified by a simple theorem generalizing the
classification of finitely generated abelian groups. For our purposes it suffices to
discuss torsion-free modules, which we will call lattices.
Definition 2.1 Let R be a Dedekind domain and K its field of fractions. A lattice
over R is a finitely generated, torsion-free R-module M . If M is a lattice, we will
O’Dorney
Page 5 of 39
denote by the subscript MK its K-span M ⊗R K (except when M is denoted by
a symbol containing a subscript, in which case a superscript will be used). The
dimension of MK over K is called the rank of the lattice M .
A lattice of rank 1 is a nonzero finitely generated submodule of K, i.e. an ideal;
thus isomorphism classes of rank-1 lattices are parametrized by the class group
Pic R. The situation for general lattices is not too different.
Theorem 2.2 (see [11], Lemma 1.5, Theorem 1.6, and the intervening Remark) A
lattice M over R is classified up to isomorphism by two invariants: its rank m and
its top exterior power Λm M . Equivalently, every lattice is a direct sum a1 ⊕ · · · ⊕ am
of nonzero ideals, and two such direct sums a1 ⊕· · ·⊕am , b1 ⊕· · ·⊕bn are isomorphic
if and only if m = n and the products a1 · · · am and b1 · · · bn belong to the same ideal
class.
In this paper we will frequently be performing multilinear operations on lattices.
Using Theorem 2.2, it is easy to show that these operations behave much more
“tamely” than for modules over general rings. Specifically, for two lattices M =
a1 u1 ⊕ · · · ⊕ am um and N = b1 v1 ⊕ · · · ⊕ bn vn , we can form the following lattices:
• the tensor product
M
M ⊗N =
ai bj (ui ⊗ vj );
1≤i≤m
1≤j≤n
• the symmetric powers
M
Symk M =
ai1 · · · aik (ui1 ⊗ · · · ⊗ uik )
1≤i1 ≤···≤ik ≤m
and the exterior powers
Λk M =
M
ai1 · · · aik (ui1 ∧ · · · ∧ uik )
1≤i1 <···<ik ≤m
of ranks n+k−1
and
k
• the dual lattice
n
k
respectively;
M ∗ = Hom(M, R) =
M
∗
a−1
i ui ;
1≤i≤m
• and the space of homomorphisms
Hom(M, N ) ∼
= M∗ ⊗ N =
M
∗
a−1
i bj (ui ⊗ vj ).
1≤i≤m
1≤j≤n
A particular composition of three of these constructions is of especial relevance to
the present thesis:
O’Dorney
Page 6 of 39
Definition 2.3 If M and N are lattices (or, more generally, M is a lattice and N
is any R-module), then a degree-k map φ : M → N is an element of (Symk M ∗ )⊗N .
A map to a lattice N of rank 1 is called a form.
In terms of decompositions M = a1 u1 ⊕ · · · ⊕ am um and N = b1 v1 ⊕ · · · ⊕ bn vn ,
a degree-k map can be written in the form
φ(x1 u1 + · · · + xm um ) =
n
X
X
ai1 ,...,im ,j · xi11 · · · ximm vj ,
j=1 i1 +···+im =k
m
where the coefficients ai1 ,...,im ,j belong to the ideals a1−i1 · · · a−i
m bj needed to make
each term’s value belong to N . For example, over R = Z, a quadratic map from Z2
to Z is a quadratic expression
φ(x, y) = ax2 + bxy + cy 2
in the coordinates x, y ∈ (Z2 )∗ on Z2 . Two caveats about this notion are in order:
• Although such a degree-k map indeed yields a function from M to N (evaluated by replacing every functional in M ∗ appearing in the map by its value
on the given element of M ), it need not be unambiguously determined by this
function if R is finite. For instance, if R = F2 is the field with two elements,
the cubic map from F22 to F2 defined by φ(x, y) = xy(x + y) vanishes on each
of the four elements of F22 , though it is not the zero map.
• Also, one must not confuse (Symk M ∗ ) ⊗ N with the space (Symk M )∗ ⊗ N of
symmetric k-ary multilinear functions from M to N . Although both lattices
have rank n m+k−1
and there is a natural map from one to the other (defined
k
by evaluating a multilinear function on the diagonal), this map is not in
general an isomorphism. For instance, the quadratic forms φ : Z2 → Z arising
from a symmetric bilinear form λ((x1 , y1 ), (x2 , y2 )) = ax1 x2 +b(x1 y2 +x2 y1 )+
cy1 y2 are exactly those of the form φ(x, y) = ax2 + 2bxy + cy 2 , with middle
coefficient even.
The image φ(M ) of a degree-k map φ : M → N is the smallest sublattice N 0 ⊆ N
such that φ is a degree-k map from M to N 0 , i.e. lies in the image of the natural
injection (Symk M ∗ ) ⊗ N 0 ,→ (Symk M ∗ ) ⊗ N . It may be computed as follows: if
φ(x1 u1 + · · · + xm um ) =
X
xi11 · · · ximm · vi1 ,...,im ,
i1 +···+im =k
then φ(M ) is the R-span of all the 1-dimensional sublattices ai11 · · · aimm vi1 ,...,im in
N . (It is not the same as the span of the values of φ as a function on M .)
If L ⊆ M are two lattices of rank n, the index [M : L] is the ideal a such that
a · Λn L = Λn M.
Since Λn L and Λn M are of rank 1, this is well defined.
O’Dorney
Page 7 of 39
2.1 Algebras
An algebra of rank n over R is a lattice S of rank n equipped with a multiplication
operation giving it the structure of a (unital commutative associative) R-algebra.
Since R is integrally closed, the sublattice generated by 1 ∈ S must be primitive
(that is, the lattice it generates is maximal for its dimension, and therefore a direct
summand of S), implying that the quotient S/R is a lattice of rank n − 1 and we
have a noncanonical decomposition
S = R ⊕ S/R.
(1)
We will be concerned with algebras of ranks 2, 3, and 4, which we call quadratic,
cubic, and quartic algebras (or rings) respectively.
2.2 Orientations
When learning about Gauss composition over Z, one must sooner or later come to
a problem that vexed Legendre (see [1], p. 42): If one considers quadratic forms up
to GL2 Z-changes of variables, then a group structure does not emerge because the
conjugate forms ax2 ± bxy + cy 2 , which ought to be inverses, have been identified.
Gauss’s insight was to consider forms only up to “proper equivalence,” i.e. SL2 Z
coordinate changes. This is tantamount to considering quadratic forms not simply
on a rank-2 Z-lattice M , but on a rank-2 Z-lattice equipped with a distinguished
generator of its top exterior power Λ2 M . For general lattices over Dedekind domains,
whose top exterior powers need not belong to the principal ideal class, we make the
following definitions.
Definition 2.4 Let a be a fractional ideal of R. A rank-n lattice M is of type a
if its top exterior power Λn M is isomorphic to a; an orientation on M is then a
choice of isomorphism α : Λn M → a. The possible orientations on any lattice M are
of course in noncanonical bijection with the units R× . The easiest way to specify
an orientation on M is to choose a decomposition M = b1 u1 ⊕ · · · ⊕ bn un , where
the ideals bi are scaled to have product a, and then declare
α(y1 u1 ∧ · · · ∧ yn un ) = y1 · · · yn .
An orientation on a rank-n R-algebra S is the same as an orientation on the lattice
S, or equivalently on the lattice S/R, due to the isomorphism between Λn S and
Λn−1 S/R given by
1 ∧ v1 ∧ · · · ∧ vn−1 7→ ṽ1 ∧ · · · ∧ ṽn−1 .
(Here, and henceforth, we use a tilde to denote the image under the quotient map
by R, so that the customary bar can be reserved for conjugation involutions. This is
opposite to the usual convention where ṽ denotes a lift of v under a quotient map.)
O’Dorney
Page 8 of 39
3 Quadratic algebras
Before proceeding to Bhargava’s results, we lay down as groundwork two parametrizations that, over Z, were known classically. These are the parametrizations of
quadratic algebras and of ideal classes in quadratic algebras. The extension of these
to other base rings has been thought about extensively, with many different kinds
of results produced (see [12] and the references therein). Here, we prove versions
over a Dedekind domain that parallel our cubic and quartic results.
Let S be a quadratic algebra over R. Since S/R has rank 1, the decomposition
(1) simplifies to S = R ⊕ aξ for an (arbitrary) ideal a in the class of Λ2 S and some
formal generator ξ ∈ SK . The algebra is then determined by a and a multiplication
law ξ 2 = tξ − u, which allows us to describe the ring as R[aξ]/(a2 (ξ 2 − tξ + u)), a
subring of K[ξ]/(ξ 2 − tξ + u). Alternatively, we can associate to the ring its norm
map
NS/R : S → R,
x + yξ 7→ x2 + txy + uy 2 .
It is evident that this is just another way of packaging the same data, namely two
numbers t ∈ a−1 and u ∈ a−2 . The norm map is more readily freed from coordinates
than the multiplication table, yielding the following parametrization.
Lemma 3.1 Quadratic algebras over R are in canonical bijection with rank-2 Rlattices M equipped with a distinguished copy of R and a quadratic form φ : M → R
that acts as squaring on the distinguished copy of R.
Proof Given M and φ, the distinguished copy of R must be primitive (otherwise
φ would take values outside R), yielding a decomposition M = R ⊕ aξ. Write φ in
these coordinates as
φ(x + yξ) = x2 + txy + uy 2 ;
then the values t ∈ a−1 and u ∈ a−2 can be used to build a multiplication table
on M having the desired norm form (which is unique, as for any fixed coordinate
system, the norm form determines t and u, which determine the multiplication
table).
If there is a second copy of R on which NS/R restricts to the squaring map, it must
be generated by a unit of S with norm 1, multiplication by which induces an automorphism of the lattice with norm form. Hence we can eliminate the distinguished
copy of R and arrive at the following arguably prettier parametrization:
Theorem 3.2 Quadratic algebras over R are in canonical bijection with rank-2
R-lattices M equipped with a quadratic form φ : M → R attaining the value 1.
For our applications to Gauss composition it will also be helpful to have a
parametrization of oriented quadratic algebras. An orientation α : Λ2 R → a can
be specified by choosing an element ξ with α(1 ∧ ξ) = 1. Since ξ is unique up to
translation by a−1 , the parametrization is exceedingly simple.
O’Dorney
Page 9 of 39
Theorem 3.3 For each ideal a of R, there is a canonical bijection between oriented
quadratic algebras of type a and pairs (t, u), where t ∈ a−1 , u ∈ a−2 , up to the action
of a−1 via
s.(t, u) = (t + 2s, u + st + s2 )
One other fact that will occasionally be useful is that every quadratic algebra has
an involutory automorphism defined by x̄ = Tr x − x or, in a coordinate representation
S = R[aξ]/(a2 (ξ 2 − tξ + u)),
by ξ 7→ t − ξ. (The first of these characterizations shows that the automorphism is
well-defined, the second that it respects the ring structure.)
Example 3.4 When R = Q (or more generally any Dedekind domain in which 2
is a unit), then completing the square shows that oriented quadratic algebras are in
√
bijection with the forms x2 − ky 2 , k ∈ Q, each of which yields an algebra S = Q[ k]
√
oriented by α(1 ∧ k) = 1.
√
If we pass to unoriented extensions, then we identify Q[ k] with its rescalings
p
√
Q[f k] ∼
= Q[ f 2 k], f ∈ Q× . The resulting orbit space Q/(Q× )2 parametrizes
quadratic number fields, plus the two nondomains
√
Q[ 0] = Q[]/(2 )
√
and Q[ 1] ∼
= Q ⊕ Q.
Example 3.5 When R = Z, we can almost complete the square, putting a general
x2 + txy + uy 2 in the form
x2 −
D 2
y
4
or x2 + xy −
D−1 2
y .
4
Here D = t2 − 4u is the discriminant, the standard invariant used in [2] to
parametrize oriented quadratic rings. It takes on all values congruent to 0 or 1 mod
4. It also parametrizes unoriented quadratic rings, since each such ring has just
two orientations which are conjugate under the ring’s conjugation automorphism.
The rings of integers of number fields are then parametrized by the fundamental
discriminants which are not a square multiple of another discriminant, with the
exception of 0 and 1 which parametrize Z[]/2 and Z ⊕ Z respectively.
Example 3.6 For an example where discriminant-based parametrizations are inapplicable, consider the field R = F2 of two elements. Any nonzero quadratic form
attains the value 1, and there are three such, namely
x2 ,
xy,
and x2 + xy + y 2 .
They correspond to the three quadratic algebras over F2 , respectively F2 []/2 ,
F2 ⊕ F2 , and F4 .
O’Dorney
Page 10 of 39
4 Ideal classes of quadratic algebras
We can now parametrize ideal classes of quadratic algebras, in a way that partially
overlaps [12]. To be absolutely unambiguous, we make the following definition for
quadratic algebras that need not be domains:
Definition 4.1 Let S be a quadratic algebra over R. A fractional ideal (or just
an ideal ) of S is a finitely generated S-submodule of SK that spans SK over K.
Two fractional ideals are considered to belong to the same ideal class if one is a
×
scaling of the other by a scalar γ ∈ SK
. (This is clearly an equivalence relation.)
The ideal classes together with the operation induced by ideal multiplication form
the ideal class semigroup, and the invertible ideal classes form the ideal class group
Pic S.
The condition in bold means that, for instance, the submodule R ⊕ {0} ⊆ R ⊕ R is
not a fractional ideal. Of course, any ideal that is invertible automatically satisfies
it.
Theorem 4.2 (cf. [12], Corollary 4.2) For each ideal a of R, there is a bijection
between
• ideal classes of oriented quadratic rings of type a, and
• rank-2 lattices M equipped with a nonzero quadratic map φ : M → a−1 · Λ2 M .
In this bijection, the ideal classes that are invertible correspond exactly to the forms
that are primitive, that is, do not factor through any proper sublattice of a−1 · Λ2 M .
Proof Suppose first that we have a quadratic ring S = R⊕aξ, oriented by α(1∧ξ) =
1, and a fractional ideal I of R. Construct a map φ : I → a−1 · Λ2 I by
ω 7→ ω ∧ ξω.
Here ξω ∈ a−1 I so the wedge product lies in a−1 · Λ2 I, and we get a well-defined
×
quadratic map φ, scaling appropriately when I is scaled by an element of SK
. Note
that φ is nonzero because, after extending scalars to K, the element 1 ∈ IK = SK
is mapped to 1 ∧ ξ 6= 0.
It will be helpful to write this construction in coordinates. Let I" = b1#η1 ⊕ b2 η2 be
a b
, that is,
a decomposition into R-ideals, and let ξ act on I by the matrix
c d
ξη1 = aη1 + cη2
(2)
ξη2 = bη1 + dη2
where a, b, c, d belong to the relevant ideals: a, d ∈ a−1 , b ∈ a−1 b1 b−1
2 , and c ∈
a−1 b−1
b
.
Then
we
get
2
1
φ(xη1 + yη2 ) = (xη1 + yη2 ) ∧ (xξη1 + yξη2 )
= (xη1 + yη2 ) ∧ (axη1 + cxη2 + byη1 + dyη2 )
= (cx2 + (d − a)xy − by 2 )(η1 ∧ η2 ) ∈ a−1 b1 b2 (η1 ∧ η2 ) = a−1 Λ2 I.
O’Dorney
Page 11 of 39
(3)
(Now φ appears clearly as a tensor in Sym2 I ∗ ⊗ a−1 · Λ2 M .)
We now seek to reconstruct the ideal I from its associated quadratic form. Given
an ideal a, a lattice M = b1 η1 ⊕ b2 η2 , and a quadratic map φ(xη1 + yη2 ) = (px2 +
qxy + ry 2 )(η1 ∧ η2 ) to a−1 · Λ2 M , we may choose a = 0, b = −r, c = p, and
d = q to recover an action (2) of ξ on R yielding the form φ. By (3), this action is
unique up to adding a constant to a and d, which simply corresponds to a change
of basis ξ 7→ ξ + a. Next, by the Cayley-Hamilton theorem, the formal expression
ξ 2 −qξ+pr annihilates M , so M is a module over the ring S = R[aξ]/(a2 (ξ 2 −qξ+pr))
corresponding to the quadratic form x2 + qxy + pry 2 . The last step is to embed M
into SK , or equivalently, to identify MK with SK . For this, we divide into cases
based on the kind of ring that SK is, or equivalently the factorization type of the
polynomial f (x) = x2 − qx + pr over K.
• If f is irreducible, then SK is a field, and MK is an SK -vector space of dimension 1, isomorphic to SK .
• If f has two distinct roots, then SK ∼
= K ⊕ K. There are three different SK modules having dimension 2 as K-vector spaces: writing I1 and I2 for the two
copies of K within SK , we can describe them as I1 ⊕ I1 , I2 ⊕ I2 , and I1 ⊕ I2 .
But on the first two, every element of SK acts as a scalar. If MK were one of
these, then the quadratic form φ(ω) = ω ∧ ξω would be identically 0, which
is not allowed. So MK ∼
= I1 ⊕ I2 ∼
= SK .
• Finally, if f has a double root, then SK ≡ K[]/2 . There are two SK -modules
having dimension 2 as a K-vector space: K ⊕ K and SK . On K ⊕ K, SK
acts by scalars and we get a contradiction as before. So MK ∼
= SK .
This shows that there is always at least one embedding of M into SK . To show
there is at most one up to scaling, we need that every automorphism of SK as an
SK -module is given by multiplication by a unit. But this is trivial (the image of 1
determines everything else).
It will be convenient to have as well an explicit reconstruction of an ideal from
its associated quadratic form. First change coordinates on M such that p 6= 0. (If
r 6= 0, swap b1 η1 and b2 η2 ; if p = 0 but q 6= 0, translate η2 7→ η2 + tη1 for any
nonzero t ∈ b1 b−1
2 .) Then the ideal
I = b1 + b2
ξ
p
(4)
of the ring S = R[aξ]/(a2 (ξ 2 − qξ + pr)) corresponding to the norm form x2 + qxy +
pry 2 is readily seen to yield the correct quadratic form.
We now come to the equivalence between invertibility of ideals and primitivity
of forms. Suppose first that φ : M → a−1 · Λ2 M is imprimitive, that is, there is an
ideal a0 strictly containing a such that φ actually arises from a quadratic map φ0 :
M → a0−1 ·Λ2 M . Following through the (first) construction, we see that φ and φ0 give
the same ξ-action on I = M but embed it as a fractional ideal in two different rings,
0 ∼
S = R ⊕ aξ and S 0 = R ⊕ a0 ξ. We naturally have SK ∼
= SK
= K[ξ]/(ξ 2 − qξ + pr),
0
and S is a subring of S . Suppose I had an inverse J as an S-ideal. Then since I is
an S 0 -ideal, the product IJ = S must be an S 0 -ideal, which is a contradiction.
O’Dorney
Page 12 of 39
Conversely, suppose that φ is primitive and I has been constructed using (4).
Consider the conjugate ideal
ξ¯
q−ξ
I¯ = b1 + b2 = b1 + b2
p
p
and form the product
ξ
q−ξ
b1 + b2
b1 + b2
p
p
q
−
ξ
ξ
ξ ξ¯
+ b22 2
= b21 + b1 b2 + b1 b2
p
p
p
1
= (pb21 + qb1 b2 + rb22 + ξb1 b2 ).
p
I I¯ =
The first three terms in the parenthesis are all fractional ideals in K. The condition
that φ maps into a−1 · Λ2 I is exactly that these lie in a−1 b1 b2 , and the condition
of primitivity is that they do not all lie in any smaller ideal, that is, their sum is
a−1 b1 b2 . So
I I¯ =
a−1 b1 b2
b1 b2 −1
(a + Rξ) =
· S.
p
p
(5)
We conclude that
−1 ¯
2 −1 ¯
I −1 = ab−1
I
1 b2 pI = α(Λ I)
is an inverse for I.
Note that our proof of the invertibility-primitivity equivalence shows something
more: that any fractional ideal I of a quadratic algebra S is invertible when considered as an ideal of a certain larger ring S 0 , found by “canceling common factors”
in its associated quadratic form. The following relation is worth noting:
Corollary 4.3 If I is an ideal of a quadratic algebra S and S 0 = End I ⊆ SK is
its ring of endomorphisms, then
I I¯ =
α(Λ2 I)
· S0.
α(Λ2 S 0 )
Proof The ring S 0 is the one occurring in the proof that imprimitivity implies noninvertibility, provided that the ideal a0 is chosen to be as large as possible (i.e. equal
to (pb21 + qb1 b2 + rb22 )−1 ), so that I is actually invertible with respect to S 0 . This
S 0 must be the endomorphism ring End I, or else I would be an ideal of an even
larger quadratic ring. (We here need that End I is finitely generated and hence a
×
quadratic ring. This is obvious, as it is contained in x−1 I for any x ∈ SK
∩ I.)
0
2 0
Viewing α, by restriction, as an orientation on S , we have α(Λ S ) = a0 and the
formula is reduced to that for I −1 above.
O’Dorney
Page 13 of 39
Example 4.4 If R = Z (or more generally any PID), then the situation simplifies
to a = Z and M = Z2 , and we recover a bijection between ideal classes and binary
quadratic forms. But the theorem also requires us, when changing coordinates on M ,
to change coordinates on Λ2 M appropriately; that is, ideal classes are in bijection
with GL2 (Z)-orbits of binary quadratic forms φ : Z2 → Z, not under the natural
action but under the twisted action
"
a
c
# !
1
b
. φ (x, y) =
· φ(ax + cy, bx + dy).
ad − bc
d
(Compare [1], p. 142 and [12], Theorem 1.2.)
For an example not commonly encountered in the literature, take the order S =
Z[5i] in the domain Z[i]. Its ideal classes correspond simply to GL2 (Z)-orbits of
quadratic forms px2 + qxy + ry 2 having discriminant q 2 − 4pr = −100. Using the
standard theory of “reduction” of quadratic forms developed by Lagrange (see [1],
pp. 26ff.), we may limit our search to the bounded domain where |q| ≤ r ≤ p and
find that there are precisely three, with three corresponding ideal classes:
φ1 (x, y) = x2 + 25y 2
2
! S = Z[5i]
2
φ2 (x, y) = 2x + 2xy + 13y ! A = Zh5, 1 + ii
φ3 (x, y) = 5x2 + 5y 2
! B = Z[i].
The first two ideals, which correspond to primitive forms, are invertible (indeed
A · iA = S); the third is not. In fact we can build a multiplication table for the ideal
class semigroup.
·
S
A
B
S
S
A
B
A
A
S
B
B
B
B
B
5 Ideal triples
We turn now to one of Bhargava’s most widely publicized contributions to mathematics, the reinterpretation of Gauss’s 200-year-old composition law on primitive
binary quadratic forms in terms of simple operations on a 2 × 2 × 2 box of integers.
In fact, Bhargava produced something rather more general: a bijection ([2], Theorem 1) that takes all 2 × 2 × 2 boxes satisfying a mild nondegeneracy condition, up
to the action of the group
(
Γ=
)
3
(M1 , M2 , M3 ) ∈ (GL2 Z) :
Y
det Mi = 1 ,
i
to triples of fractional ideals (I1 , I2 , I3 ) in a quadratic ring S that are balanced, that
is, satisfy the two conditions
(a) I1 I2 I3 ⊆ S;
O’Dorney
Page 14 of 39
(b) N (I1 )N (I2 )N (I3 ) = 1. Here N (I) is the norm of the ideal I, defined by the
formula N (I) = [A : I]/[A : S] for any Z-lattice A containing both S and I.
(This should not be confused with the ideal generated by the norms of the
elements of I. Even over Z, the two notions differ: 2 · Z[i] is an ideal of norm
2 in the ring Z[2i], but every element of 2 · Z[i] has norm divisible by 4.)
The ideals Ii are unique up to a scaling by constants γi ∈ SQ× of product 1.
Our task will be to generalize this result to an arbitrary Dedekind domain. First,
the definition of balanced extends straightforwardly, provided that we define the
norm of a fractional ideal I properly, as the index of I in S as an R-lattice. The
resulting notion of balanced is a special case of the definition used in [10]:
Definition 5.1 A triple of fractional ideals I1 , I2 , I3 of an R-algebra S is balanced
if
(a) I1 I2 I3 ⊆ S;
(b) the image of Λ2 I1 ⊗ Λ2 I2 ⊗ Λ2 I3 in (Λ2 SK )⊗3 is precisely (Λ2 S)⊗3 .
The objects that we will use on the other side of the bijection are, as one might
expect, not merely 8-tuples of elements from R, because the class group intrudes.
The appropriate notion is as follows:
Definition 5.2 Let a be an ideal class of R. A Bhargava box of type a over R
consists of the following data:
• three rank-2 lattices M1 , M2 , M3 ;
• an orientation isomorphism θ : Λ2 M1 ⊗ Λ2 M2 ⊗ Λ2 M3 → a3 ;
• a trilinear map β : M1 ⊗ M2 ⊗ M3 → a satisfying the following nondegeneracy
condition: each of the three partial duals βi : Mj ⊗ Mk → aMi∗ ({i, j, k} =
{1, 2, 3}) has image a full-rank sublattice.
If we choose a decomposition of each Mi into a direct sum bi1 ⊕ bi2 of ideals,
Q
then θ becomes an isomorphism from i,j bij to a3 (which we may take to be the
identity), while β is determined by eight coefficients
−1 −1
βijk ∈ b−1
1i b2j b3k a.
Thus we stress that, in spite of all the abstraction, our parameter space indeed still
consists of (equivalence classes of) 2 × 2 × 2 boxes of numbers lying in certain ideals
contained in K.
Theorem 5.3 (cf. [2], Theorem 1; [10], Theorem 1.4) For each ideal a of R, there
is a bijection between
• balanced triples (I1 , I2 , I3 ) of ideals in an oriented quadratic ring S of type a,
×
up to scaling by factors γ1 , γ2 , γ3 ∈ SK
with product 1;
• Bhargava boxes of type a.
Remark Two balanced ideal triples may be inequivalent for the purposes of this
bijection even if corresponding ideals belong to the same class (see Example 5.9(d)).
Consequently a Bhargava box cannot be described as corresponding to a balanced
triple of ideal classes.
O’Dorney
Page 15 of 39
Proof The passage from ideals to the Bhargava box is simple and derived directly
from [2]. Given a balanced triple (I1 , I2 , I3 ) in a quadratic ring S with an orientation
α : Λ2 S → a, construct the trilinear map
β : I1 ⊗ I2 ⊗ I3 → a
x ⊗ y ⊗ z 7→ α(1 ∧ xyz).
This, together with the identification θ coming from condition (b) of Definition 5.1,
furnishes the desired Bhargava box. Since each Ii spans SK , the nondegeneracy is
not hard to check.
We seek to invert this process and reconstruct the ring S, the orientation α,
and the ideals Ii uniquely from the Bhargava box. We begin by reconstructing the
quadratic forms φi : Mi → a−1 ·Λ2 Mi corresponding to the ideals Ii . For this we first
use β to map M1 to Hom(M2 ⊗M3 , a), in other words Hom(M2 , aM3∗ ). We then take
the determinant, which lands us in Hom(Λ2 M2 , Λ2 (aM3∗ )) ∼
= a2 · Λ2 M2∗ ⊗ Λ2 M3∗ ,
which can be identified via −θ (note the sign change) with a−1 Λ2 M1 . We thus get a
quadratic form φ01 : M1 → a−1 Λ2 M1 . We claim that if the Bhargava box arose from
a triple of ideals, then this is the natural form φ1 : x 7→ x∧ξx on I1 . For convenience
we will extend scalars and prove the equality as one of forms on M1K ∼
= SK . To deal
with φ01 , we must analyze
β(x) = (y 7→ (z 7→ α(1 ∧ xyz))) ∈ Hom(M2K , M3K∗ ).
∗
Now whereas M2K is naturally identifiable with SK , to deal with M3K∗ ∼
we
= SK
have to bring in the symmetric pairing α(1 ∧ ••) : SK ⊗K SK → K, which one easily
∗
checks is nondegenerate and thus identifies SK
with SK . So we have transformed
β(x) to the element
β 0 (x) = (y 7→ xy) ∈ HomK (SK , SK ).
We then take the determinant det β 0 (x), which is simply the norm N (x) ∈ K ∼
=
2
2
HomK (Λ SK , Λ SK ). This is to be compared to
φ1 (x) = x ∧ ξx = N (x)(1 ∧ ξ) = α−1 (N (x)).
It then remains to check that we have performed the identifications properly, that
is, that the four isomorphisms
KO o
α
Λ2 (M1K ⊗SK M2K )
∧2 (x⊗y7→α(xy•))
α⊗α
Λ2 M1K ⊗ Λ2 M2K
−θ
/ Λ2 M3K∗
are compatible. In particular we discover that the pairing α(1 ∧ ••) is given in the
basis {1, ξ} by the matrix
"
0
1
1
Tr ξ
#
O’Dorney
Page 16 of 39
of determinant −1, explaining the compensatory minus sign that must be placed
on θ.
Q
Now write Mi = bi1 ηi1 ⊕ bi2 ηi2 where θ : i,j bij → a3 may be assumed to be the
identity map, and express β in these coordinates as
β
X
xijk η1i η2j η3k =
i,j,k
X
aijk xijk .
i,j,k
It will be convenient to create the single-letter abbreviations a = a111 , b = a112 ,
c = a121 , continuing in lexicographic order to h = a222 . Then φ1 sends an element
xη11 + yη12 ∈ M1 to the determinant
"
ax + ey
− det
cx + gy
#
bx + f y
= (bc − ad)x2 + (bg + cf − ah − de)xy + (f g − eh)y 2 .
dx + hy
We claim that φ1 6= 0. If not, the linear maps from M2K to M3K∗ corresponding
to every element of M1K are singular. It is not hard to prove that a linear system
with dimension at most 2 of singular maps from K 2 to K 2 has either a common
kernel vector or images in a common line, and to deduce from this that the partial
dual M1K ⊗ M3K → M2K∗ or M1K ⊗ M2K → M3K∗ , respectively, is not surjective, a
contradiction.
Thus M1 can be equipped with the structure of a fractional ideal of some quadratic
ring, with a ξ-action given by the matrix
"
ah + de
bc − ad
eh − f g
bg + cf
#
(6)
where we have added a scalar matrix such that the trace ah + bg + cf + de, and
indeed the entire characteristic polynomial
F (x) = x2 −(ah+bg+cf +de)x+abgh+acf h+adeh+bcf g+bdeg+cdef −adf g−bceh,
(7)
is symmetric under permuting the roles of M1 , M2 , and M3 . In other words, we have
exhibited a single ring S = R[aξ]/a2 F (ξ) of which M1 , M2 , and M3 are modules,
under the ξ-action (6) and its symmetric cousins
"
ah + cf
be − af
ch − dg
bg + de
#
"
on M2 and
ah + bg
ce − ag
#
bh − df
on M3 .
cf + de
The next step is is the construction of the elements τijk that will serve as the products η1i η2j η3k of the ideal generators. Logically, it begins with a “voilà” (compare
[2], p. 235):
τijk =
−a
¯
− a2ijk aīj̄ k̄ − aijk ξ,
i + j + k odd,
a
a2ijk aīj̄ k̄
i + j + k even.
ījk aij̄k aij k̄
ījk aij̄k aij k̄
+
+ aijk ξ,
O’Dorney
Page 17 of 39
Here ī, j̄, k̄ are shorthand for 3 − i, etc., while ξ¯ denotes the Galois conjugate
Tr(ξ) − ξ. Bhargava apparently derived this formula (in the case R = Z) by solving
the natural system of quadratic equations that the τ ’s must satisfy (τa τd = τb τc and
so on). For our purposes it suffices to note that this formula is well-defined over any
Dedekind domain (in contrast to [2] where there is a denominator of 2) and yields
a trilinear map β̃ : M1 ⊗ M2 ⊗ M3 → S, defined by
β̃
X
xijk η1i η2j η3k =
i,j,k
X
τijk xijk ,
i,j,k
with the property that following with the projection α(1 ∧ •) : S → a gives back β.
We claim that β̃, in addition to being R-trilinear, is S-trilinear under the newfound
S-actions on the Mi . This is a collection of calculations involving the action of ξ on
each factor, for instance
(ah + de)τa + (bc − ad)τe = ξτa
(where we have taken the liberty of labeling the τijk as τa , . . . , τh in the same manner
as the aijk ). This is routine, and all the other edges of the box can be dealt with
symmetrically. So, extending scalars to K, we get a map
β̃ : M1K ⊗SK M2K ⊗SK M3K → SK .
Since each Mi is isomorphic to a fractional ideal, each MiK is isomorphic to SK and
thus so is the left side. Also, it is easy to see that β̃ is surjective or else β would be
degenerate. So once two identifications ι1 : M1 → I1 , ι2 : M2 → I2 are chosen, the
third ι3 : M3 → I3 can be scaled such that β̃(x ⊗ y ⊗ z) = ι1 (x)ι2 (y)ι3 (z) and hence
β(x ⊗ y ⊗ z) = α(1 ∧ ι1 (x)ι2 (y)ι3 (z)) is as desired.
We have now constructed a triple (I1 , I2 , I3 ) of fractional ideals such that the map
α(1 ∧ • • •) : I1 ⊗ I2 ⊗ I3 → K coincides with β. Two verifications remain:
• That I1 I2 I3 ⊆ S. Since I1 I2 I3 is the R-span of the eight τijk , this is evident
from the construction of the τijk .
Q
Q
• That i Λ2 (Ii ) = i Λ2 (S), and more strongly that the diagram
Q
2
i Λ (Mi )
N
i ιi
θ
/
N
i
Λ2 (Ii )
α⊗3
'
K
commutes. This is a verification similar to that which showed the correspondence of the forms φi . Indeed, if we had recovered a triple of ideals that
produced the correct β but the wrong θ, then the φ’s as computed from β and
the two θ’s would have to mismatch.
This concludes the proof that each Bhargava box corresponds to at least one balanced triple. We must also prove that two balanced triples (I1 , I2 , I3 ) and (I10 , I20 , I30 )
yielding the same Bhargava box must be equivalent; but here we are helped greatly
O’Dorney
Page 18 of 39
by the results that we have already proved. Namely, since the forms φi associated
to the ideals match, these ideals must lie in the same oriented quadratic ring S and
×
there must be scalars γi ∈ SK
such that Ii0 = γi Ii . We may normalize such that
γ2 = γ3 = 1. Then, for all x ∈ I1 , y ∈ I2 , z ∈ I3 ,
0 = β(xyz) − β(xyz) = α(1 ∧ xyz) − α(1 ∧ γ1 xyz) = α(1 ∧ (1 − γ1 )xyz).
In other words, we have (1 − γ1 )x ∈ K for every x ∈ I1 I2 I3 . Extending scalars, we
get the same for all x ∈ KI1 I2 I3 = SK which implies 1 − γ = 0.
5.1 Relation with the class group
Just as in the case R = Z, we can restrict to invertible ideals and get a new
description of the class group.
Theorem 5.4 (cf. [2], Theorem 1) Let a be an ideal of R, and let G be the set of
rank-2 lattices M equipped with a primitive quadratic form φ : M → a−1 · Λ2 M , up
to isomorphism. Then the relations
• φ1 ∗ φ2 ∗ φ3 = 1 for all (φ1 , φ2 , φ3 ) arising from a Bhargava box;
• φ = 1 if a−1 · Λ2 M is principal and φ attains a generator of it
give G the structure of a disjoint union of abelian groups. These are isomorphic to
the class groups of all quadratic extensions of R of type a under the bijection of
Theorem 4.2.
Proof It is easy to see that a triple (I1 , I2 , I3 ) of invertible ideals is balanced if and
only if I1 I2 I3 = S. The condition that φ attains a generator of a−1 · Λ2 M simply
says that φ matches the form corresponding to the entire ring S itself in Theorem
3.2. Now the theorem is reduced to the elementary fact that the structure of an
abelian group is determined by the triples of elements that sum to 0, together with
the identification of that 0-element (without which any 3-torsion element could take
its place).
After establishing the corresponding theorem in [2] establishing a group law on
quadratic forms, Bhargava proceeds to Theorem 2, which establishes a group law on
the 2×2×2 cubes themselves, or rather on the subset of those that are “projective,”
i.e. correspond to triples of invertible ideals. This structure is easily replicated in
our situation: it is only necessary to note that the product of two balanced triples
of invertible ideals is balanced. In fact, a stronger result holds.
Lemma 5.5 Let (I1 , I2 , I3 ) and (J1 , J2 , J3 ) be balanced triples of ideals of a
quadratic ring S, with each Ii invertible. Then the ideal triple (I1 J1 , I2 J2 , I3 J3 )
is also balanced.
Proof We clearly have
I1 J1 · I2 J2 · I3 J3 = (I1 I2 I3 )(J1 J2 J3 ) ⊆ S,
O’Dorney
Page 19 of 39
establishing (a) of Definition 5.1. For (b), the key is to use Corollary 4.3 to get a
handle on the exterior squares of the Ii Ji . We have End Ii = S; each Si = End Ji
is a quadratic ring with S ⊆ Si ⊆ SK . Then since
End Ji ⊆ End Ii Ji ⊆ End Ii−1 Ii Ji = End Ji ,
we see that End Ii Ji = Si as well. Then
α(Λ2 Ji )
α(Λ2 (Ii Ji ))
α(Λ2 Ii )α(Λ2 Ji )
Si = Ii Ji ·Ii Ji = Ii Ii ·Ji Ji = α(Λ2 Ii )S·
Si =
Si .
α(Si )
α(Si )
α(Si )
Intersecting with K, we get
α(Λ2 (Ii Ji )) = α(Λ2 Ii )α(Λ2 Ji ).
We can now multiply and get
Y
i
α(Λ2 (Ii Ji )) =
Y
α(Λ2 Ii ) ·
i
so (I1 J1 , I2 J2 , I3 J3 ) is balanced.
Y
α(Λ2 Ji ) = R,
i
Corollary 5.6 (cf. [2], Theorems 2 and 12) The Bhargava boxes which belong to
a fixed ring S (determined by the quadratic form (7)) and which are primitive (in
the sense of having all three associated quadratic forms primitive) naturally form a
group isomorphic to (Pic S)2 .
Corollary 5.7 The Bhargava boxes which belong to a fixed ring S naturally have
an action by (Pic S)2 .
It is natural to think about what happens when the datum θ is removed from the
Bhargava box. As one easily verifies, multiplying θ by a unit u ∈ R× is equivalent
to multiplying the orientation α of S by u−1 while keeping the same ideals Ii .
Accordingly, we have the following corollary, which we have chosen to state with a
representation-theoretic flavor:
Corollary 5.8 Balanced triples of ideals (I1 , I2 , I3 ) of types a1 , a2 , a3 in an (unoriented) quadratic extension S of type a, up to equivalence, are parametrized by
GL(M1 ) × GL(M2 ) × GL(M3 )-orbits of trilinear maps
β : M1 ⊗ M2 ⊗ M3 → a,
where Mi is the module R ⊕ ai , satisfying the nondegeneracy condition of Definition
5.2.
These orbits do not have a group structure. Indeed, the identifications cause a
box and its inverse, under the group law of Corollary 5.6, to become identified.
O’Dorney
Page 20 of 39
Example 5.9 When R = Z (or more generally any PID), we can simplify the
notation of a Bhargava box by taking each Mi = Z2 , so that θ is without loss of
∼
generality the standard orientation Λ2 (Z2 )⊗3 → Z, and β is expressible as a box
e
a
f
b
g
c
h
d
of integers. The three forms φi are then obtained by slicing β into two 2×2 matrices
and taking the determinant of a general linear combination as described in [2],
Section 2.1:
"
#
"
#!
a b
e f
φ1 (x, y) = − det x
+y
.
c d
g h
We can now derive a balanced triple of ideals from any box of eight integers
a, b, . . . , h, subject only to the very mild condition that no two opposite faces should
be linearly dependent. We recapitulate the boxes having the greatest significance
in [2] and in the theory of quadratic forms generally:
(a) The boxes
0
1
0
1
1
1
0
1
and
0
1
D/4
1
1
0
(D + 3)/4
1
(for D even and odd respectively), have as all three of their associated
quadratic forms x2 − (D/4)y 2 and x2 + xy − (D − 1)/4 · y 2 respectively,
the defining form of the ring S of discriminant D. They correspond to the
balanced triple (S, S, S). These are the “identity cubes” of [2], equation (3).
(b) The boxes
−b/2
a
0
a
1
0
(−b + 1)/2
1
and
−c
b/2
1
0
−c
(b + 1)/2
1
0
(for b even and odd respectively), have as two of their associated quadratic
forms the conjugates
ax2 + bxy + cy 2
and ax2 − bxy + cy 2
O’Dorney
Page 21 of 39
and as the third associated form the form x2 −(D/4)y 2 or x2 +xy−(D−3)/4·y 2
defining the ring S of discriminant D = b2 − 4ac. These boxes express the fact
that the triple
¯
(S, I, α(Λ2 I)−1 I)
is always balanced (compare Corollary 4.3). If gcd(a, b, c) = 1, we also get that
I and I¯ represent inverse classes in the class group and that, correspondingly,
ax2 + bxy + cy 2 and ax2 − bxy + cy 2 are inverse under Gauss’s composition
law on binary quadratic forms.
(c) The box
f
0
1
0
−h
g
0
d
has as associated quadratic forms
φ1 (x, y) = −dx2 + hxy + f gy 2
φ2 (x, y) = −gx2 + hxy + df y 2
φ3 (x, y) = −f x2 + hxy + dgy 2 .
As Bhargava notes ([2], p. 249), Dirichlet’s simplification of Gauss’s composition law was essentially to prove that any pair of primitive binary quadratic
forms of the same discriminant can be put in the form (φ1 , φ2 ), so that the
multiplication relation that we derive from this box,
φ1 ∗ φ2 = −f x2 − hxy + dgy 2 (or, equivalently, dgx2 + hxy − f y 2 ),
encapsulates the entire multiplication table for the class group.
(d) For some examples not found in the classical theory of primitive forms, we
consider the non-Dedekind domain S = Z[5i], whose ideal class semigroup
was computed above (Example 4.4). Let us find all balanced triples that may
be formed from the ideals
S = Z[5i],
A = Zh5, 1 + ii,
B = Z[i]
of S. We compute
α(Λ2 S) = Z,
α(Λ2 A) = Z,
α(Λ2 B) =
1
Z.
5
For each triple (I1 , I2 , I3 ) of ideal class representatives, finding all balanced
×
triples of ideals in these classes is equivalent to searching for all γ ∈ SK
O’Dorney
Page 22 of 39
satisfying γ · I1 I2 I3 ⊆ S which have the correct norm
hN (γ)i =
α(Λ2 I
1
2
2
1 ) · α(Λ I2 ) · α(Λ I3 )
(the right side is an ideal of Z, so N (γ) is hereby determined up to sign, and
as we are in a purely imaginary field, N (γ) > 0).
Using the class B zero or two times, we get four balanced triples
(S, S, S),
(S, A, iA),
(S, B, 5B),
and
(A, B, 5B),
each of which yields one Bhargava box. We get no balanced triples involving
the ideal class B just once; indeed, it is not hard to show in general that if
two ideals of a balanced triple are invertible, so is the third.
The most striking case is I1 = I2 = I3 = B, for here there are two multipliers
γ of norm 125 that send B 3 = Z[i] into Z[5i], namely 10 + 5i and 10 − 5i (we
could also multiply these by powers of i, but this does not change the ideal B).
The balanced triples (B, B, (10 + 5i)B) and (B, B, (10 − 5i)B are inequivalent
under scaling, although corresponding ideals belong to the same classes. Thus
we get two inequivalent Bhargava boxes with the same three associated forms,
namely
−1
2
1
2
−1
2
1
2
and
−1
−1
2
.
−2
−2
1
2
1
(e) The triply symmetric boxes
c
b
a
b
c
b
d
c
correspond to balanced triples of ideals that all lie in the same class; those that
are projective—that is, whose associated forms are primitive—correspond to
invertible ideal classes whose third power is the trivial class. This correspondence was used to prove estimates for the average size of the 3-torsion of class
groups in [3]. Our work suggests that similar methods may work for quadratic
extensions of rings besides Z.
6 Another example: p-adic rings
Example 6.1 It is instructive to look at the local rings R = Zp , where for simplicity we assume p ≥ 3. Thanks to the large supply of squares, the corresponding
O’Dorney
Page 23 of 39
field K = Qp has but five (unoriented) quadratic extensions, namely those obtained
by adjoining a square root of 0, 1, p, u, and pu where u is an arbitrary non-square
modulo p. The quadratic ring extensions S of R then break up into five classes
according to the corresponding extension SK of K. We will work out one represen√
tative case, namely the oriented ring extensions Sn = Zp [pn u] corresponding to
√
the unique unramified extension L = K[ u] of degree 2.
For any fractional ideal I of Sn , we can pick an element of I of minimal valuation
(recalling that L possesses a unique extension of the valuation on K) and scale it
√
to be 1. Then Sn ⊆ I ⊆ S0 , since S0 = Zp [ u] is the valuation ring, and it is easy
to see that the only possible ideals are the subrings S0 , S1 , . . . , Sn . In particular Sn
is the only invertible ideal class, and the class group Pic S is trivial.
We now enumerate the balanced triples that can be built out of these ideals. A
balanced triple is formed from two sorts of data: three ideal classes Si , Sj , Sk ; and
a scale factor γ such that γSi Sj Sk ⊆ S and
hN (γ)i =
1
α(Λ2 Si )α(Λ2 Sj )α(Λ2 Sk )
.
Computing
√
α(Λ2 Si ) = α(1 ∧ pi u) = pi−n ,
we get that N (γ) has valuation p3n−i−j−k and in particular (since L is unramified)
i + j + k ≡ n mod 2.
(8)
Write 3n−i−j −k = 2s. Then γ = ps γ 0 where γ 0 ∈ S0× . To avoid needless repetition
√
of arguments, we assume i ≤ j ≤ k, and then γSi Sj Sk = ps γ 0 Si . Let γ 0 = a + b u
where a, b ∈ Zp . Since ps γ 0 Si is clearly contained in S0 , the condition for it to lie in
Sn is that the irrational parts of its generators
√
√
ps γ 0 · 1 = ps a + ps b u and ps γ 0 · pi = pi+s bu + pi+s a u
are divisible by pn , that is,
vp (a) ≥ n − s − i
and vp (b) ≥ n − s.
Since a and b cannot both be divisible by p, we must have n − s − i ≤ 0, which can
also be written as a sort of triangle inequality:
(n − j) + (n − k) ≥ n − i.
(9)
If this holds, then the restrictions on γ 0 are now merely that pn−s |b, that is, γ 0 ∈ St×
where t = max{n − s, 0}. But if γ 0 is multiplied by a unit in Si× , then the corresponding balanced triple is merely changed to an equivalent one. So the balanced
O’Dorney
Page 24 of 39
triples are in bijection with the quotient St× /Si× . Since the index of Si× in S0× is
pi−1 (p + 1) (i ≥ 1), we have that there are precisely
Bijk =
i−t
p
i−1
p
i≥t>0
(p + 1)
1
i>t=0
i=t=0
classes of Bhargava boxes whose associated ideals are of the classes Si , Sj , Sk , or
equivalently, whose associated quadratic forms are
pn−i x2 − upn+i y 2 ,
pn−j x2 − upn+j y 2 ,
pn−k x2 − upn+k y 2 .
For beauty’s sake let us examine one other angle of looking at the balanced triples.
If we extend the notation Si (i ∈ Z) to denote the Zp -module generated by 1 and
√
pi u for every i ∈ Z, then Si is an ideal of the ring Sn exactly when −n ≤ i ≤ n. Of
√
course S−i = p−i u · Si so we get no further ideal classes. But the admissible values
of i, j, and k now range in the stella octangula (Figure 1) formed by reflecting the
graph of (9) over the three coordinate planes, as well as the diagonal planes i = j,
i = k, j = k. Indeed, the triples (i, j, k) such that some scaling of (Si , Sj , Sk ) is
balanced are exactly the points of the lattice defined by (8) lying within the stella
octangula. In such a case, one such balanced triple can be given by
(Si , Sj , ps Sk )
or
√
(Si , Sj , ps uSk )
according as (i, j, k) belongs to one or the other of the two tetrahedra making up
the stella octangula.
7 Cubic algebras
The second main division of our paper has as its goal the parametrization of quartic
algebras. We begin with cubic algebras, for there the parametrization is relatively
simple and will also furnish the desired ring structure on the cubic resolvents of
our quartic rings. The parametrization was done by Delone and Faddeev for cubic
domains over Z, by Gan, Gross, and Savin for cubic rings over Z, and by Deligne over
an arbitrary scheme ([9], p. 1074 and the references therein). Here we simply state
and prove the result over a Dedekind domain, taking advantage of the construction
in [5], section 3.9.
Theorem 7.1 (cf. [13], Theorem 1; [9], Theorem 2.1; [14], Proposition 5.1 and the
references therein) Let R be a Dedekind domain. There is a canonical bijection
between cubic algebras over R and pairs consisting of a rank-2 R-lattice M and a
cubic map φ : M → Λ2 M .
Proof Given the cubic ring C, we let M = C/R so a = Λ2 M ∼
= Λ3 C is an ideal
2
class. Consider the map φ̃ : C → a given by x 7→ 1 ∧ x ∧ x . This is a cubic map, and
if x is translated by an element a ∈ R, the map does not change. Hence it descends
O’Dorney
Page 25 of 39
to a cubic map φ : M → a. We will show that each possible φ corresponds to exactly
one ring C.
Fix a decomposition M = a1 ξ˜1 ⊕ a2 ξ˜2 of M into ideals. Any C can be written as
R ⊕ M = R · 1 ⊕ a1 ξ1 ⊕ a2 ξ2 as an R-module, where the lifts ξ1 and ξ2 are unique
up to adding elements of a−1
and a−1
respectively. Then the remaining structure
1
2
of C can be described by a multiplication table
ξ12 = ` + aξ1 + bξ2
ξ1 ξ2 = m + cξ1 + dξ2
ξ22 = n + eξ1 + f ξ2 .
It should be remarked that this is not literally a multiplication table for C, but
rather for the corresponding K-algebra CK = C ⊗R K, which does literally have
{1, ξ1 , ξ2 } as a K-basis. For C to be closed under this multiplication, the coefficients
−1
must belong to appropriate ideals (` ∈ a−2
1 , a ∈ a1 , etc.).
Note that the basis change ξ1 7→ ξ1 + t1 , ξ2 7→ ξ2 + t2 (ti ∈ a−1
i ) diminishes c and
d by t2 and t1 , respectively (as well as wreaking greater changes on the rest of the
multiplication table). Hence there is a unique choice of the lifts ξ1 and ξ2 such that
c = d = 0.
We now examine the other piece of data that we are given, the cubic map φ
describable in these coordinates as
φ(xξ˜1 + y ξ˜2 )
= 1 ∧ (xξ1 + yξ2 ) ∧ (xξ1 + yξ2 )2
= 1 ∧ (xξ1 + yξ2 ) ∧ ((` + aξ1 + bξ2 )x2 + mxy + (n + eξ1 + f ξ2 )y 2 ))
= (bx3 − ax2 y + f xy 2 − ey 3 )(1 ∧ ξ1 ∧ ξ2 ).
Thus, in our situation, specifying φ is equivalent to specifying the four coefficients a,
b, e, and f . It therefore suffices to prove that, for each quadruple of values a ∈ a−1
1 ,
−2
−1
b ∈ a−2
a
,
e
∈
a
a
,
f
∈
a
,
there
is
a
unique
choice
of
values
`,
m,
n,
completing
2
1 2
1
2
the multiplication table. The only conditions on the multiplication table that we
have not used are the associative laws (ξ12 )ξ2 = ξ1 (ξ1 ξ2 ) and ξ1 (ξ22 ) = (ξ1 ξ2 )ξ2 .
Expanding out these equations reveals the unique solution ` = −ae, m = −be,
n = −bf , which indeed belong to the correct ideals. So from the map φ we have
constructed a unique cubic ring C.
Example 7.2 Here we briefly summarize the most important examples over R =
Z, where the cubic map φ : M → Λ2 M reduces to a binary cubic form φ : Z2 → Z,
up to the twisted action of the group GL2 Z by
"
a
c
# !
1
b
· φ(ax + cy, bx + dy).
.φ (x, y) =
ad
−
bc
d
• The trivial ring Z[1 , 2 ]/(21 , 1 2 , 22 ) corresponds to the zero form 0.
O’Dorney
Page 26 of 39
• Rings which are not domains correspond to reducible forms (e.g. Z⊕Z⊕Z corresponds to xy(x + y)), and rings which have nontrivial nilpotents correspond
to forms with repeated roots.
• A monogenic ring Z[ξ]/(ξ 3 + aξ 2 + bξ + c) corresponds to a form x3 + ax2 y +
bxy 2 + cy 3 with leading coefficient 1. Accordingly a form which does not
represent the value 1 corresponds to a ring that is not monogenic; for instance,
the form 5x3 + 7y 3 (which attains only values ≡ 0, ±2 mod 7) corresponds
√
√
√
√
3
3
3
3
to the subring Z[ 52 · 7, 5 · 72 ] of the field Q[ 52 · 7] = Q[ 5 · 72 ], proving
that this ring (which is easily checked to be the full ring of integers in this
field) is not monogenic.
• If a form φ corresponds to a ring C, then the form n · φ corresponds to
the ring Z + nC whose generators are n times as large. Hence the content
ct(φ) = gcd(a, b, c, d) of a form φ(x, y) = ax3 + bx2 y + cxy 2 + dy 3 equals the
content of the corresponding ring C, which is defined as the largest integer n
such that C ∼
= Z + nC 0 for some cubic ring C 0 . The notion of content (which
is also not hard to define for cubic algebras over general Dedekind domains)
will reappear prominently in our discussion of quartic algebras (see section
8.2).
8 Quartic algebras
Our next task is to generalize Bhargava’s parametrization of quartic rings with a
cubic resolvent in [5], and in particular to formalize the notion of a cubic resolvent.
The concept was first developed as part of the theory of solving equations by radicals, in which it was noted that if a, b, c, and d are the unknown roots of a quartic,
then
ab + cd,
ac + bd,
and ad + bc
satisfy a cubic whose coefficients are explicit polynomials in those of the original
quartic. Likewise, if Q ⊇ Z is a quartic ring embeddable in a number field, the
useful resolvent map
x 7→ (σ1 (x)σ2 (x)+σ3 (x)σ4 (x), σ1 (x)σ3 (x)+σ2 (x)σ4 (x), σ1 (x)σ4 (x)+σ2 (x)σ3 (x))
lands in a cubic subring of C ⊕ C ⊕ C, where σ1 , . . . , σ4 are the four embeddings
Q ,→ C. The question then arises of what the proper notion of a resolvent map is
in case Q is not a domain. In section 2.1 of [5], Bhargava defines from scratch a
workable notion of Galois closure of a ring, providing a rank-24 algebra in which
the resolvent can be defined. Alternatively (section 3.9), Bhargava sketches a way
of axiomatizing the salient properties of a resolvent map. It is the second method
that we develop here.
Definition 8.1 (cf. [9], p. 1069) Let R be a Dedekind domain, and let Q be a
quartic algebra over R. A resolvent for Q consists of a rank-2 R-lattice M , an Rmodule morphism θ : Λ2 M → Λ3 (Q/R), and a quadratic map φ : Q/R → M such
that there is an identity of biquadratic maps
x ∧ y ∧ xy = θ(φ(x) ∧ φ(y))
(10)
O’Dorney
Page 27 of 39
from Q × Q to Λ3 (Q/R).
The resolvent (M, θ, φ) is called minimal if φ has full image, that is, φ(Q/R) = M .
It is called numerical if θ is an isomorphism.
Our minimal resolvent corresponds to the ring Rinv in Bhargava’s treatment ([5],
p. 1337), while our numerical resolvent corresponds to Bhargava’s resolvent. The
numerical resolvent is more suited to analytic applications, while the minimal resolvent has the advantage of being canonical (for nontrivial Q), as we prove below.
Example 8.2 For the prototypical example of a resolvent, take Q = R⊕4 and
C = R⊕3 , and let M = C/R. Let θ identify the standard orientations on these
lattices, and let φ be given by the roots
φ(a, b, c, d) = (ab + cd, ac + bd, ad + bc)
of the classical resolvent of the quartic (x − a)(x − b)(x − c)(x − d). It is easy to
check that this is a resolvent, which is both minimal and numerical. Many more
examples can be derived from this (see Example 8.10).
8.1 Resolvent to ring
Our first result is that the resolvent encapsulates the data of the ring:
Theorem 8.3 (cf. [5], Theorem 1 and Proposition 10; [9], Corollary 1.2) Let Q̃ and
M be R-lattices of ranks 3 and 2 respectively. Let θ : Λ2 M → Λ3 Q̃ be a morphism,
and let φ : Q̃ → M be a quadratic map. Then there is a unique quartic ring Q with
an isomorphism Q/R ∼
= Q̃ such that (M, θ, φ) is a resolvent for Q.
Proof Write Q̃ = a1 ξ˜1 ⊕ a2 ξ˜2 ⊕ a3 ξ˜3 as usual. The ring Q will of course be R ⊕
a1 ξ1 ⊕ a2 ξ2 ⊕ a3 ξ3 as an R-module, with a multiplication table
ξi ξj = c0ij +
3
X
ckij ξk
k=1
−1
k
where c0ij ∈ a−1
and ckij ∈ ai−1 a−1
i aj
j ak . The 18 coefficients cij are subject to the
expansion of the relation (10):
X
i
!
!
X
X
X
X
xi ξ˜i ∧
yj ξ˜j ∧
xi yj ckij ξ˜k = θ φ
xi ξ˜i ∧ φ
yj ξ˜j .
j
i
i,j,k
j
(11)
Write
φ(x1 ξ1 + x2 ξ2 + x3 ξ3 ) =
X
1≤i≤j≤3
µij xi xj
O’Dorney
Page 28 of 39
−1
where µij ∈ a−1
i aj M . Then define
−1 −1 −1 −1
λij
k` = θ(µij ∧ µk` ) ∈ a1 a2 a3 ai aj ak a` .
We can now expand both sides of (11) as polynomials in the x’s and y’s times
ξ˜1 ∧ ξ˜2 ∧ ξ˜3 , getting
x1
x2
x3
y1
y2
y3
P
c1 x i y j
X X ij
Pi,j 2ij
λk` xi xj yk y` ,
i,j cij xi yj =
P
3
i≤j
k≤`
i,j cij xi yj
and equate coefficients of each biquadratic monomial xi xj yk y` . Due to the skewsymmetry of each side, all terms involving x2i yi2 or xi xj yi yj cancel, and the remaining 30 equations group into 15 matched pairs. They are summarized as follows,
where (i, j, k) denotes any permutation of (1, 2, 3) and = ±1 its sign:
cjii = λii
ik
ckij = λjj
ii
(12)
cjij − ckik = λjk
ii
ciii − cjij − ckik = λij
ik .
At first glance it may seem that one can add a constant a to cjij and ckij , while
adding 2a to ciii , to derive a three-parameter family of solutions from a single one;
but this is merely the transformation induced by the change of lift ξi 7→ ξi + a for
ξ˜i . So there is essentially only one solution. (It could be normalized by taking e.g.
c112 = c223 = c331 = 0, although we do not use this normalization here, preferring to
save time later by keeping the indices 1, 2, and 3 in complete symmetry.)
The constant terms c0ij of the multiplication table are as yet undetermined. They
must be deduced from the associative law. There are several ways to compute each
c0ij , and to prove that they agree, along with all the other relations implied by
the associative law, is the final step in the construction of the quartic ring Q. Our
key tool is the Plücker relation relating the wedge products of four vectors in a
2-dimensional space:
(a ∧ b)(c ∧ d) + (a ∧ c)(d ∧ b) + (a ∧ d)(b ∧ c) = 0,
or, as we will use it,
0
0
0
0
0
0
cc
aa dd
aa bb
λaa
bb0 λdd0 + λcc0 λbb0 + λdd0 λcc0 = 0.
To give succinct names to these relations among the λ’s, note that aa0 , . . . , dd0 are
four of the six unordered pairs that can be formed from the symbols 1, 2, and 3,
and the relation is nontrivial only when these four pairs are distinct. Consequently
we denote it by Pl(ee0 , ff 0 ), where ee0 and ff 0 are the two pairs that do not appear
in it. Then Pl(ee0 , ff 0 ) as a polynomial in the λ’s is unique up to sign, and we will
never have occasion to fix a sign convention.
O’Dorney
Page 29 of 39
We are now ready to derive the associative law from the Plücker relations. Of
course this is a task that could be left to a computer, but since we will soon be
deriving the Plücker relations from the associative law, we find it advisable to
present the process at least in summary form. Here it is:
[(ξi ξi )ξj − (ξi ξj )ξi ]k = Pl(jk, kk)
[(ξi ξj )ξk − (ξi ξk )ξj ]i = Pl(ij, ik)
[(ξi ξj )ξi − (ξi ξi )ξj ]i
[(ξi ξi )ξj − (ξi ξj )ξi ]j
Pl(ij,kk)
[(ξi ξj )ξk − (ξj ξk )ξi ]k (13)
Pl(ik,jk)
Pl(jj,kk)
[(ξi ξi )ξk − (ξi ξk )ξi ]j
[(ξi ξj )ξj − (ξj ξj )ξi ]j
Pl(ik,jk)
Pl(ij,kk)
[(ξi ξj )ξk − (ξj ξk )ξi ]k
And here is the explanation:
• The notation [ω]i denotes the coefficient of ξi when ω is expressed in terms of
the basis {1, ξ1 , ξ2 , ξ3 }.
• Each of the first two equations is a direct calculation. For instance:
[(ξi ξi )ξj − (ξi ξj )ξi ]k
= [(c0ii + ciii ξi + cjii ξj + ckii ξk )ξj − (c0ij + ciij ξi + cjij ξj + ckij ξk )ξi ]k
= ciii ckij + cjii ckjj + ckii ckjk − ciij ckii − cjij ckij − ckij ckik
= (ciii − cjij − ckik )ckij + ckii (ckjk − ciij ) + cjii ckjj
jj
ii ik
ii jj
= (λij
ik λii − λij λjj + λik λij )
= Pl(jk, kk).
• The two lower diagrams show the instances of the associative law that produce
a summand of c0ii or c0ij , respectively. Each node in the diagrams yields a
formula for c0ii or c0ij (having no denominator, and consequently belonging
−1
to the correct ideal a−2
resp. a−1
i
i aj ); and where two nodes are joined by a
line, the difference between the two corresponding formulas is expressible as
a Plücker relation.
We have now proved all of the associative law except the constant terms; that is, we
now have that (xy)z − x(yz) ∈ R for all x, y, z ∈ Q. Attacking the constant terms
in the same manner as above leads to considerably heavier computations, which
could be performed by computer (compare [5], top of p. 1343). Alternatively, we
may use the following trick. Let i, j, k ∈ {1, 2, 3} be any indices, and let h ∈ {1, 2, 3}
be an index distinct from k. Then using the already-proved ξh -component of the
associative law,
ξi (ξj ξk ) − ξj (ξi ξk ) = [ξh (ξi (ξj ξk )) − ξh (ξj (ξi ξk ))]h
= [(ξh ξi )(ξj ξk ) − (ξh ξj )(ξi ξk )]h
= [((ξh ξi )ξj )ξk − ((ξh ξj )ξi )ξk ]h .
This last is necessarily zero, since it consists of the number (ξh ξi )ξj − (ξh ξj )ξi ∈ R
multiplied by ξk , and thus has no ξh -component.
O’Dorney
Page 30 of 39
8.2 Ring to resolvent
Conversely, we will now study all possible resolvents of a given quartic ring Q.
There is one case in which this problem takes a striking turn: the trivial ring
P
Q = R[a1 1 , a2 2 , a3 3 ]/ i,j (ai aj i j ) where all entries of the multiplication table are zero. Here φ can be an arbitrary map to a 1-dimensional sublattice of M , or
alternatively M and φ can be chosen arbitrarily while θ = 0. For all other quartic
rings, the family of resolvents is much smaller, as we will now prove.
Theorem 8.4 (cf. [5], Corollary 18)
Let Q be a nontrivial quartic R-algebra. Then
(a) Q has a unique minimal resolvent (M0 , θ0 , φ0 );
(b) we have θ0 (Λ2 M0 ) = c · Λ3 (Q/R), where c is the ideal (called the content of
Q) characterized by the following property: For each ideal a ⊆ R, there exists
a quartic R-algebra Q0 such that Q ∼
= R + aQ0 if and only if a|c;
(c) all other resolvents (M, θ, φ), up to isomorphism, are found by extending θ0
linearly to Λ2 M , where M is a lattice with [M : M0 ] | c, and taking φ = φ0 ;
(d) the numerical resolvents arise by taking [M : M0 ] = c in the preceding.
Proof Write Q = R ⊕ a1 ξ1 ⊕ a2 ξ2 ⊕ a3 ξ3 . The multiplication table can be encoded
in a family of ckij ’s, from which the fifteen values λij
k` are determined through (12).
ij
These λk` satisfy the fifteen Plücker relations by (13). It then remains to construct
−1
the target module M , the map θ, and the vectors µij ∈ a−1
i aj M such that their
pairwise exterior products µij ∧ µk` have, via θ, the specified value λij
k` .
The six µij are in complete symmetry at this point, and it will be convenient
to denote µij by µx , where x runs over {11, 12, 13, 22, 23, 33} or, if you prefer,
x
{1, 2, 3, 4, 5, 6}. Likewise we write each λij
k` as λy or simply λxy .
We first tackle the problem over K. Let V be an abstract K-vector space of dimension 2. We construct vectors µ1 , . . . , µn whose exterior products are proportional to
the λ’s as follows. Some λxy is nonzero, without loss of generality λ12 . Let (µ1 , µ2 )
be a basis of V . Then, for 3 ≤ x ≤ 6, take
µx =
−λ2x µ1 + λ1x µ2
λ12
to give the products µ1 ∧ µx and µ2 ∧ µx the desired values. The λxy with 3 ≤ x <
y ≤ 6 have not been used, but their values were forced by the Plücker relations
anyway, so we have a system of µx such that
µx ∧ µy =
λxy
· µ1 ∧ µ2 .
λ12
Moreover, these are the only µx ∈ V with this property, up to GL(V )-transformations.
Now define a quadratic map φ0 : Q/R → V by
φ0 (x1 ξ1 + x2 ξ2 + x3 ξ3 ) =
X
i≤j
µij xi xj
O’Dorney
Page 31 of 39
and a linear map θ0 : Λ2 V → Λ3 (Q/R) ⊗R K by
θ0 (µ1 ∧ µ2 ) = λ12 (ξ1 ∧ ξ2 ∧ ξ3 ).
We have that (V, θ0 , φ0 ⊗ K) is the unique resolvent of the quartic K-algebra Q/K.
Resolvents for Q are now in bijection with lattices M ⊆ V such that
and θ0 (Λ2 M ) ⊆ Λ3 (Q/R).
M ⊇ φ0 (Q/R)
(14)
There is now clearly at most one minimal resolvent, gotten by taking M to be the
image M0 = φ(Q/R). We have
θ0 (Λ2 M0 ) = θ0
X
ai aj ak a` · µij ∧ µk`
i,j,k,`
=
X
ξ1
λij
k` ai aj ak a`
∧ ξ2 ∧ ξ3 = cΛ3 (Q/R),
i,j,k,`
where
X
c=
−1 −1 −1
λij
k` ai aj ak a` a1 a2 a3 .
i,j,k,`
−1 −1 −1 −1
The ideal in which λij
k` is constrained to live is a1 a2 a3 ai aj ak a` ; so c ⊆ R and
there is a unique minimal resolvent, proving (a).
If a ⊇ c for some a ⊆ R, we can replace each of the three ai with aai without changing the validity of the λ-system. This means there is an extension ring
Q0 = R ⊕ aa1 ξ1 ⊕ aa2 ξ2 ⊕ aa3 ξ3 with the same multiplication table as Q, and
we see that Q0 = R + aQ. Conversely, given such a Q0 , we write its multiplication table with respect to the basis Q0 /R = aa1 ξ1 ⊕ aa2 ξ2 ⊕ aa3 ξ3 and get that
−1 −1 −1
−1
λij
a1 a2 a3 a−1
i aj ak a` , so c ⊆ a. This proves (b).
k` ∈ a
Finally, the relation θ0 (Λ2 M0 ) = cΛ3 (Q/R) allows us to rewrite (14) as
M ⊇ M0
and
Λ2 M ⊆ cΛ2 M0 .
Now (c) is obvious. A numerical resolvent occurs when θ0 (Λ2 M ) = Λ3 (Q/R), so
(d) is obvious as well.
Bhargava proved ([5], Corollary 4) that the number of (numerical) resolvents of a
quartic ring over Z is the sum of the divisors of its content. Likewise, we now have:
Corollary 8.5 If c 6= 0, then the numerical resolvents of Q are in noncanonical
bijection with the disjoint union
a
R⊇a⊇c
R/a.
O’Dorney
Page 32 of 39
Proof Here we simply have to count the superlattices M of index c over a fixed
lattice M0 . The classical argument over Z extends rather readily; for completeness,
we give the proof.
Note that we must have M ⊆ c−1 M0 , since M ∧ M0 ⊆ M ∧ M = c−1 Λ2 M0 . Pick
a decomposition c−1 M0 ∼
= d1 ⊕ d2 . Then consider the map π : M → d1 that is the
restriction of projection to the first factor. We have ker π = {0}×ad2 and im π = bd1
for some ideals a, b subject to the familiar behavior of top exterior powers in exact
sequences:
c−1 Λ2 M0 = Λ2 M = ad2 ∧ bd1 = abc−2 Λ2 M0 ,
that is, ab = c. Now if a and b are fixed, the lattice M is determined by a picking
a coset in d2 /ad2 to be the preimage of each point b ∈ im π; this is determined by
an R-module map
bd1 → d2 /ad2
or, since cd1 is necessarily in the kernel,
bd1 /cd1 → d2 /ad2 .
We can identify both the domain and the target of this map with R/a via the standard result that if a and b are ideals in a Dedekind domain R, then a/ab ∼
= R/b.
(Proof: Use the Chinese Remainder Theorem to find a ∈ a that has minimal
valuation with respect to each of the primes dividing b. Then a generates a/ab,
and a 7→ 1 is the desired isomorphism.) Then the desired parameter space is
HomR (R/a, R/a) ∼
= R/a. Letting a vary yields the claimed bijection.
In particular, we have the following.
Corollary 8.6 (cf. [5], Corollary 5) Every quartic algebra over a Dedekind domain
possesses at least one numerical resolvent.
8.3 The cubic ring structure of the resolvent
In contrast to the classical presentation, the resolvent maps we have constructed
take their values in modules, without any explicit connection to a cubic ring. In
fact, there is the structure of a cubic ring already latent in a resolvent:
Theorem 8.7 To any quartic ring Q and resolvent (M, θ, φ) thereof, one can
canonically associate a cubic ring C with an identification C/R ∼
= M.
Remark As stated, this theorem has no content, as one can take the trivial ring
structure on R ⊕ M . However, we will produce a ring structure generalizing the
classical notion of cubic resolvent. This C may be called a cubic resolvent of Q, the
maps θ and φ being suppressed.
O’Dorney
Page 33 of 39
Proof We use the following trick of multilinear algebra (compare [9], p. 1076). First
pick a decomposition Q/R = a1 ξ˜1 ⊕ a2 ξ˜2 ⊕ a3 ξ˜3 . Writing
φ(x1 ξ˜1 + x2 ξ˜2 + x3 ξ˜3 ) =
X
xi xj µij
−1
(µij ∈ a−1
i aj M ),
i≤j
consider the determinant
µ11
∆ = 4 det 12 µ12
1
2 µ13
1
2 µ12
µ22
1
2 µ23
1
2 µ13
1
2 µ23
µ33
= 4µ11 µ22 µ33 + µ12 µ13 µ23 − µ11 µ223 − µ22 µ213 − µ33 µ212
3
−2 −2
∈ a−2
1 a2 a3 Sym M
(the two expressions are equal except when char K = 2, in which case the first
−2 −2
2
⊗−2
becomes purely motivational). Next, θ allows us to map a−2
.
1 a2 a3 to (Λ M )
The Λ2 M -valued pairing ∧ on M gives an identification of M with Λ2 M ⊗ M ∗ , so
we can transform
(Λ2 M )⊗−2 ⊗ Sym3 M ∼
= (Λ2 M )⊗−2 ⊗ Sym3 ((Λ2 M ) ⊗ M ∗ )
∼
= (Λ2 M )⊗−2 ⊗ (Λ2 M )⊗3 ⊗ Sym3 (M ∗ )
∼
= (Λ2 M ) ⊗ Sym3 (M ∗ ).
Thus ∆ yields a cubic map δ : M → Λ2 M , which by Theorem 7.1 is equivalent
to a cubic ring C with an identification C/R ∼
= M . That δ is independent of the
˜
˜
˜
chosen basis (ξ1 , ξ2 , ξ3 ) is a polynomial identity that follows from properties of the
determinant, at least when char K 6= 2.
Two theorems concerning this cubic ring structure we will state without proof,
since they are mere polynomial identities already implied by Bhargava’s work over
Z. The first may be used as an alternative to Theorem 7.1 to determine the multiplicative structure on C; as Bhargava notes, it works in all cases over Z except
when Q has nilpotents.
Theorem 8.8 (cf. [5], equation (30)) Let Q be a quartic ring, and let C be
the cubic ring whose structure is determined by the resolvent map data θ :
Λ2 (C/R) → Λ3 (Q/R) and φ : Q/R → C/R. For any element x ∈ Q and any lift
y ∈ C of the element φ(x) ∈ C/R, we have the equality
x ∧ x2 ∧ x3 = θ(y ∧ y 2 ).
We end this section with a theorem concerning discriminants, which until now
have been conspicuously absent from our discussion, in direct contrast to Bhargava’s presentation. Recall that the discriminant of a Z-algebra Q with a Z-basis
O’Dorney
Page 34 of 39
(ξ1 , . . . , ξn ) is defined as the determinant of the matrix [Tr(ξi ξj )]i,j . In like manner,
define the discriminant of a rank-n R-algebra Q to be the map
disc(Q) : x1 ∧ · · · ∧ xn 7→ det[Tr(xi xj )]i,j .
It is quadratic and thus can be viewed as an element of (Λn Q∗ )⊗2 , a rank-1 lattice
that is not in general isomorphic to R. The discriminants of a quartic ring and its
resolvents are “equal” in precisely the way one might hope:
Theorem 8.9 (cf. [5], Proposition 13)
Let Q, C, θ be as above. The morphism
(θ∗ )⊗2 : (Λ3 (Q/R)∗ )⊗2 →(Λ2 (C/R)∗ )⊗2
carries disc Q to disc C.
Example 8.10 Once again, we recapitulate the situation over Z. Here, once bases
Q/R = Zξ1 ⊕ Zξ2 ⊕ Zξ3 and C/R = Zη1 ⊕ Zη2 have been fixed so that θ is given
simply by η1 ∧ η2 7→ ξ1 ∧ ξ2 ∧ ξ3 , the remaining datum φ of a numerical resolvent
can be written as a pair of ternary quadratic forms, or, even more pictorially, as a
pair of symmetric matrices
a11
(A, B) = 12 a12
1
2 a13
1
2 a12
a22
1
2 a23
1
b11
2 a13
1
1
,
2 a23 2 b12
1
a33
2 b13
1
2 b12
b22
1
2 b23
1
2 b13
1
.
2 b23
b33
where aij , bij ∈ Z. The associated cubic ring is found by applying Theorem 7.1 to
the form 4 det(Ax + By). Some salient examples follow:
• First note that there is a resolvent map of C-algebras from Q0 = C⊕4 to
C0 = C⊕3 given by the roots of the equation-solver’s resolvent
(x, y, z, w) 7→ (xy + zw, xz + yw, xw + yz)
or, more accurately, by its reduction modulo C
φ0 : (x, y, z, 0) 7→ (xy − yz, xz − yz, 0),
supplemented of course by the standard identification
θ0 : Λ2 (C0 /C) → Λ3 (Q0 /C).
Accordingly, if we have a quartic Z-algebra Q ⊆ Q0 and a cubic Z-algebra C ⊆
C0 on which the restrictions of φ0 and θ0 are well-defined, then it automatically
follows that C/Z is a resolvent for Q with attached cubic ring structure C.
• As an example, consider the ring
Q = Z + p(Z ⊕ Z ⊕ Z ⊕ Z) = {(a, b, c, d) ∈ Z⊕4 : a ≡ b ≡ c ≡ d mod p}
O’Dorney
Page 35 of 39
of content p, for each prime p. The minimal resolvent of Q comes out to be
φ0 (Q/Z) = C 0 /Z, where
C 0 = Z + p2 · Z⊕3 .
But C 0 is not a numerical resolvent of Q: it has index p4 in Z⊕3 , while Q has
index p3 in Z⊕4 , so the restriction of θ0 cannot possibly be an isomorphism.
We must enlarge C 0 by a factor of p. Note that any subgroup C such that
Z + p2 · Z⊕3 ⊆ C ⊆ Z + p · Z⊕3
is a ring, since the product of two elements in p · Z⊕3 lies in p2 · Z⊕3 . So any
ring of the form
C = Z + p2 · Z⊕3 + hap, bp, 0i
is a numerical resolvent of Q. Letting [a : b] run over P1 (Z/pZ) yields the p + 1
numerical resolvents predicted by Theorem 8.4.
• Note that some of these resolvents are isomorphic under the automorphism
group of Q, which is simply S4 acting by permuting the coordinates. One
verifies that S4 acts through its quotient S3 , which in turn permutes the
three distinguished points 0, 1, ∞ on P1 (Z/pZ). Accordingly, if we are using
Theorem 8.3 to count quartic rings, the ring Q will appear not p + 1 times
but dp/6e + 1 times (1 time if p = 2 or p = 3). This is no contradiction with
Theorem 8.4, which gives the number of resolvents as maps out of the given
ring Q.
9 Maximality
In order to convert his parametrization of quartic rings into one of quartic fields,
Bhargava needed a condition for a ring to be maximal, i.e. to be the full ring
of integers in a field. In like manner we discuss how to tell if a quartic ring Q
over a Dedekind domain R is maximal in its fraction ring QK using conditions on
a numerical resolvent. The first statement to make is that maximality is a local
condition, i.e. can be checked at each prime ideal.
Proposition 9.1 Let Q be a ring of finite rank n over R. Q is maximal if and
only if Qp = Q ⊗R Rp is maximal over Rp for all (nonzero) primes p ⊆ R.
Remark Here, Rp denotes the localization
Rp =
na
b
o
∈ K : a ∈ R, b ∈ R \ p
(not its completion as with the symbol Zp ).
Proof When Q is a domain, one can use the facts that Q is maximal if and only
if it is normal (integrally closed in its fraction field) and that normality is a local
property. A direct proof is also not difficult.
O’Dorney
Page 36 of 39
Suppose that Q is not maximal, so that there is a larger ring Q0 with QK =
The nonzero R-module Q0 /Q is pure torsion, so there is a prime p such that
(Q /Q)p = Q0p /Qp is nonzero, i.e. Qp embeds into the larger ring Q0p .
Suppose now that for some p, Qp embeds into a larger ring T . We construct an
extension ring Q0 of Q by the formula
Q0K .
0
Q0 = Q[p−1 ] ∩ T.
It is obvious that Q0 is a ring containing Q; it is not so obvious that it is a rank-n
ring, in other words, that it is finitely generated as an R-module. Let X be the
R-lattice generated by any K-basis x1 , . . . , xn of QK . Since Q and T are finitely
generated R- and Rp -modules respectively, we may divide the xi by sufficiently
divisible elements of R to assume Q ⊆ X and T ⊆ Rp X. Then
Q0 ⊆ X[p−1 ] ∩ Rp X.
Note that
(
)
X
Rp X =
ai xi : vp (ai ) ≥ 0
i
(
−1
X[p
)
X
]=
ai xi : vq (ai ) ≥ 0
∀q 6= p
i
(
X[p−1 ] ∩ Rp X =
)
X
ai xi : vq (ai ) ≥ 0
∀q
= X,
i
whence Q0 ⊆ X is finitely generated.
Finally we must show that Q0 6= Q. This is obvious by localization:
Q0p = (Q[p−1 ])p ∩ Tp = QK ∩ T = T 6= Qp .
The local rings Rp are DVR’s, and in particular are PID’s, so we can visualize a
localized numerical resolvent (Qp , Mp , θ, φ) in a simple way: Pick bases Qp /Rp =
Rp hξ˜1 , ξ˜2 , ξ˜3 i and Mp = Rp hη1 , η2 i such that θ(η1 ∧ η2 ) = ξ˜1 ∧ ξ˜2 ∧ ξ˜3 , and write φ
as a pair of matrices
a11
1
(A, B) = 2 a12
1
2 a13
1
2 a12
a22
1
2 a23
1
b11
2 a13
1
1
,
2 a23 2 b12
1
a33
2 b13
1
2 b12
b22
1
2 b23
1
2 b13
1
2 b23
b33
where 1/2 is a purely formal symbol and aij , bij ∈ R are the coefficients of the
resolvent map
φ(x1 ξ˜1 + x2 ξ˜2 + x3 ξ˜3 ) =
X
(aij η1 + bij η2 )xi xj .
1≤i<j≤3
O’Dorney
Page 37 of 39
We will characterize maximality of Qp in terms of the aij and bij . The first simplification is applicable to rings of any rank.
Lemma 9.2 Let R be a DVR with maximal ideal p, and let Q be an R-algebra of
rank n. If Q is not maximal, then there exists k ≥ 1 and a basis x1 , x2 , . . . , xn = 1
of Q such that
Q0 = R p−1 x1 , . . . , p−1 xk , xk+1 , . . . , xn
is a ring.
Proof Let Q1 ) Q be a larger algebra. Since Q1 is a finitely generated submodule
S
of QK = i≥0 p−i Q, it is contained in some p−r Q. Pick r such that
Q1 ⊆ p−r Q but Q1 * p−r+1 Q.
Then Q0 = Q + pr−1 Q1 is a rank-n algebra such that
Q ( Q0 ⊆ p−1 Q.
Choose a basis x̃1 , . . . , x̃k for the R/pR-vector space pQ0 /pQ, and complete it to
a basis x̃1 , . . . , x̃n for Q/pQ. Since 1 ∈
/ pQ0 , we can arrange for x̃n = 1. Then by
Nakayama’s lemma, any lifts x1 , . . . , xn generate Q, and
p−1 x1 , . . . , p−1 xk , xk+1 , . . . , xn
generate Q0 .
Theorem 9.3 Let Q be a quartic algebra over a DVR R with maximal ideal p,
and let φ : Q/R → M , θ : Λ3 (Q/R) → Λ2 M be a resolvent. Then Q is non-maximal
if and only if, under some choice of bases, the matrices (A, B) representing φ satisfy
one of the following conditions:
(a)
(b)
(c)
(d)
p2 divides a11 , and p divides a12 , a13 , and b11 .
p divides a11 , a12 , a22 , b11 , b12 , and b22 .
p2 divides a11 , a12 , and a22 , and p divides a13 and a23 .
p divides all aij .
Proof The basic strategy is to find a suitable extension of the resolvent map to the
ring Q0 in Lemma 9.2, examining the cases where k is 1, 2, and 3.
First assume that Q has content 1 (by which we mean that the content ideal ct(Q)
is the whole of R). Then k is 1 or 2 and Q0 also has content 1. Both Q and Q0 have
unique (minimal and numerical) resolvents (M, θ, φ) and (M 0 , θ0 , φ0 ), where (since
QK = Q0K ) we have M ⊆ M 0 ⊆ MK , and θ and φ are the restrictions of θ0 and φ0 .
Also, since Q has index pk in Q0 , M has index pk in M 0 .
O’Dorney
Page 38 of 39
If k = 1, then we can arrange our coordinates such that
Q/R = hξ˜1 , ξ˜2 , ξ˜3 i, Q0 /R = hπ −1 ξ˜1 , ξ˜2 , ξ˜3 i
M = hη1 , η2 i, M 0 = hη1 , πη2 i.
Now since φ0 : Q0 /R → M 0 is the extension of φ, its corresponding matrix (A0 , B 0 )
is given by a straightforward change of basis:
π −2 a11
1 −1
0
0
(A , B ) = 2 π a12
1 −1
a13
2π
1 −1
a12
2π
a22
1
2 a23
1 −1
π −1 b11
a13
2π
1
1
,
2 a23 2 b12
1
a33
2 b13
1
2 b12
πb22
1
2 πb23
1
2 b13
1
2 πb23
πb33
The entries of this matrix (sans 1/2’s) must belong to R, giving the divisibilities
listed in case (a) above.
If k = 2, then the proof works similarly, except that M 0 takes one of the two forms
hπη1 , πη2 i and η1 , π 2 η2 . We leave it to the reader to write out the corresponding
matrices (A0 , B 0 ) and conclude cases (b) and (c) above, respectively.
We are left with the case that ct(Q) 6= 1, that is, there is a quartic ring Q0 with
Q = R + πQ0 . (A priori we might only have a ring Q00 with Q = R + π k Q00 , k ≥ 1;
but then Q0 = R + π k−1 has the aforementioned property.) Then we may select
bases for Q and Q0 in the form of Lemma 9.2, with k = 3. Since the resolvent is
no longer unique, we must take care in choosing the new target module M 0 of the
resolvent φ0 . Since φ is quadratic and Q0 /R = π −1 (Q/R), a natural candidate is
M 0 = π −2 M , but unfortunately this is too large: we have [M 0 : M ] = p4 but [Q0 /R :
Q/R] = p3 , so θ0 cannot possibly be an isomorphism. However, since ct(Q) 6= 1, we
have φ(Q/R) ( M , so picking a sublattice L ( M of index p containing φ(Q/R), we
get that M 0 = p−2 L yields a workable resolvent. Note that p−2 M ( M 0 ( p−1 M ,
so we can take a basis such that
M = hη1 , η2 i and M 0 = hπ −1 η1 , π −2 η2 i.
We then get
π −1 a11
1 −1
0
0
(A , B ) = 2 π a12
1 −1
a13
2π
yielding condition (d).
1 −1
a12
2π
π −1 a22
1 −1
a23
2π
1 −1
a13
b11
2π
1
1 −1
,
π
a
23
2
2 b12
1
−1
π a33
2 b13
1
2 b12
b22
1
2 b23
1
2 b13
1
,
2 b23
b33
10 Conclusion
We have found the Dedekind domain to be a suitable base ring for generalizing the
integral parametrizations of algebras and their ideals by Bhargava and his forebears.
In each case, ideal decompositions a1 ⊕ · · · ⊕ an fill the role of Z-bases, and elements
of appropriate fractional ideals take the place of integers in the parameter spaces.
We have also shown that the notion of “balanced,” introduced by Bhargava to
describe the ideal triples parametrized by general nondegenerate 2 × 2 × 2 cubes,
O’Dorney
Page 39 of 39
has some beautiful properties and is worthy of further study. We expect that the
methods herein will extend to replicate the other parametrizations in Bhargava’s
“Higher Composition Laws” series and may shed light on the analytic properties of
number fields and orders of low degree over base fields other than Q.
Competing interests
I have no competing interests.
Acknowledgements
A previous version of this paper served as my senior thesis at Harvard College. I thank my thesis advisor, Benedict
Gross, for many helpful discussions and comments. I thank Melanie Wood for clarifications on the relationships
between my work and hers. I thank Arul Shankar for useful discussions, especially for informing me that he and
Wood had been interested in the question answered by Corollary 8.6. I thank Brian Conrad for the suggestion that I
work with Prof. Gross. Finally, I thank Ken Ono for suggesting RMS as a publication venue.
References
1. Cox, D.A.: Primes of the Form x2 + ny 2 : Fermat, Class Field Theory, and Complex Multiplication, 2nd edn.
Pure and Applied Mathematics (Hoboken), p. 356. John Wiley & Sons, Inc., Hoboken, NJ (2013).
doi:10.1002/9781118400722. http://dx.doi.org/10.1002/9781118400722
2. Bhargava, M.: Higher composition laws. I. A new view on Gauss composition, and quadratic generalizations.
Ann. of Math. (2) 159(1), 217–250 (2004). doi:10.4007/annals.2004.159.217
3. Bhargava, M., Varma, I.: The mean number of 3-torsion elements in the class groups and ideal groups of
quadratic orders. Unpublished (2014). http://arxiv.org/abs/1401.5875v1
4. Delone, B.N., Faddeev, D.K.: The Theory of Irrationalities of the Third Degree. Translations of Mathematical
Monographs, Vol. 10, p. 509. American Mathematical Society, Providence, R.I. (1964)
5. Bhargava, M.: Higher composition laws. III. The parametrization of quartic rings. Ann. of Math. (2) 159(3),
1329–1360 (2004). doi:10.4007/annals.2004.159.1329
6. Bhargava, M.: The density of discriminants of quartic rings and fields. Ann. of Math. (2) 162(2), 1031–1063
(2005). doi:10.4007/annals.2005.162.1031
7. Bhargava, M.: Higher composition laws. IV. The parametrization of quintic rings. Ann. of Math. (2) 167(1),
53–94 (2008). doi:10.4007/annals.2008.167.53
8. Bhargava, M.: The density of discriminants of quintic rings and fields. Ann. of Math. (2) 172(3), 1559–1591
(2010). doi:10.4007/annals.2010.172.1559
9. Wood, M.M.: Parametrizing quartic algebras over an arbitrary base. Algebra Number Theory 5(8), 1069–1094
(2011). doi:10.2140/ant.2011.5.1069
10. Wood, M.M.: Parametrization of ideal classes in rings associated to binary forms. J. reine angew. Math. 689,
169–199 (2014). doi:10.1515/crelle-2012-0058
11. Milnor, J.: Introduction to Algebraic K-theory, p. 184. Princeton University Press, Princeton, N.J.; University
of Tokyo Press, Tokyo (1971). Annals of Mathematics Studies, No. 72
12. Wood, M.M.: Gauss composition over an arbitrary base. Adv. Math. 226(2), 1756–1771 (2011).
doi:10.1016/j.aim.2010.08.018
13. Bhargava, M.: Higher composition laws. II. On cubic analogues of Gauss composition. Ann. of Math. (2)
159(2), 865–886 (2004). doi:10.4007/annals.2004.159.865
14. Poonen, B.: The moduli space of commutative algebras of finite rank. J. Eur. Math. Soc. (JEMS) 10(3),
817–836 (2008). doi:10.4171/JEMS/131
Figures
√
Figure 1 Stella octangula showing the range of ideal triples in Zp [pn u] that are balanced
| 0math.AC
|
Mysteries of Visual Experience
Jerome Feldman
DRAFT 3/14/18
‘The most beautiful and profound experience is the feeling of mystery. It underlies religion as
well as all deeper aspirations in art and science.’ Einstein
Introduction
Science is a crowning glory of the human spirit and its applications remain our best hope for
social progress. However, there are limitations to existing science and perhaps to any science.
The general mind-body problem is known to be currently intractable and mysterious (8). This is
one of many deep problems that are generally agreed to be beyond the present purview of
Science, including many quantum phenomena, etc. However, all of these famous unsolved
problems are either remote from everyday experience (entanglement, dark matter) or are hard
to even define sharply (phenomenology, consciousness, etc.).
In this note, we will consider some computational problems in vision that arise every time that
we open our eyes and yet are demonstrably inconsistent with current theories of neural
computation. The focus will be on two famous related phenomena, known as the neural
binding problem and the experience of a detailed stable visual world. I, among many others,
have struggled with these issues for more than fifty years (1, 2, 3). Somewhat paradoxically,
the continuing progress in scientific methods and knowledge reveals that these are both
unsolvable within existing neuroscience. By considering some basic facts about how the brain
processes image input, we will show that, under the standard theory, there are not nearly
enough brain neurons to compute what we experience as vision. Inconsistencies like the ones
shown here have had a profound effect on paradigm change in the sciences. More directly, the
discussions below suggest possible new theories and experiments.
Demonstrations
The visual system can only capture fine detail in a small ( ~1 degree) part of the visual field;
this is about the size of your thumbnail at arm’s length. “The experience of a detailed full-field
stable visual world” refers to our subjective perception of a large high-resolution scene. First,
consider Figure 1. Your vision is best in the center of gaze and the small letters in the center of
the figure are easy to read when you look directly at them, but not when you look to the side.
The letters further from the center are progressively larger and this describes how much
coarser your vision becomes with eccentricity.
Figure 1. Size for Equal Visibility with Eccentricity
You can experience this directly using the line of text in Figure 2. Cover or close one eye and
focus on the + in the center from a distance of about 12 inches. While holding focus, try to
name the letters to the left. You should be able to do much better with the progressively larger
letters to the right of the +. In ordinary viewing, there is no problem because we change our
gaze several times a second.
U
Q
C
G
O + C
O
U
QG
Figure 2. Demonstration of Visibility with Eccentricity
More generally, representing more information requires more hardware, which is why new
phones are marketed as having cameras with more megapixels. This is also true for the
neurons in the brain and this fact will play a major role in the discussion. There is a great deal
known about how the brain processes visual information, largely because other mammals,
particularly primates, have quite similar visual systems. We will focus on primary visual cortex
or V1. Looking ahead, Figure 4B shows a flattened and projected view of the human brain with
V1 on the far left.
Unsurprisingly, the brain realizes its high central resolution using many, densely packed,
neurons. The central portion of the retina in the eye is the fovea and the downstream target of
these foveal neurons in V1 of the brain is called the foveal projection.
Figure 3. Tootell, et al. Experiment (4)
An important aspect of this architecture can be seen in Figure 3. The upper part of the figure
depicts an oscillating radial stimulus, also with more detail in the center, which was presented
to a primate subject. The lower half of the figure shows the parts of visual cortex that
responded strongly to the input. As you can see, by far the most activity is the foveal projection
on the far left, corresponding to the detailed image in the center of the input stimulus (red
arrow). So, vision is most accurate in a small central area of the visual field and this is
achieved by densely packed neurons in the corresponding areas of the brain (4).
However, our visual experience is not at all like this. We experience the world as fully detailed
and there is currently no scientific explanation of this. There is more - we normally move
(saccade) our gaze to new places in the scene about 3 or 4 times per second. These
saccades help us see and act effectively and are not random. Again, our experience does not
normally include any awareness of the saccades or the radically different visual inputs that
they entail. Taken together these unknown links between brain and experience are known as
“the experience of a detailed stable visual world” and this is generally accepted, if not
understood.
There is extensive continuing research on various aspects of visual stability (6, 7, 8, 9, 10, 11).
None of this work attempts to provide a complete solution and it is usually explicit that deep
mysteries remain. Reference 9 is an excellent survey of behavioral findings and reference 11
has current neuroscience results.
We are attempting here to establish a much stronger statement. These stable world
phenomena and a number of others are inconsistent with standard theories of neural
processing (20). The demonstrations below involve combining findings from several distinct
areas of investigation, as an instance of Unified Cognitive Science (12). Before digging in to
the computational details, we consider some consequences of establishing that there is
presently no scientific explanation of such visual experiences.
Why Inconsistency is important
It may seem surprising that we can exhibit such strong results without directly considering the
relation between subjective (1st person) and objective (3rd person) experience, which is one
of the core mysteries of the mind. For at least the cases presented, there is NO theory of
the 1st person experience that is consistent with the known theory, structure, and behavior
of the brain. This also challenges several proposed mind/brain relations as
epiphenomenalism or the notion that the 1st/3rd person link is a brute fact of nature that
cannot be further analyzed. These would not yield inconsistency.
In addition, throughout the history of science, crucial instances of inconsistency have led to
profound reconsiderations and discoveries. One of the best-known cases is the fact that
Rutherford’s planetary model of the atom entailed that electrons rotating around the atomic
nucleus would radiate energy and eventually crash into it. This was one of a number of deep
inconsistencies leading to the development of quantum theory.
A recent important inconsistency in Cognitive Science is the “Word Superiority Effect” (34). A
wide range of experiments established that people were faster and more accurate in
recognizing the letter A in context, e.g., CAT, than the same letter alone. These results conflict
with the naïve assumption that more input should require more processing. This was one of
the inconsistencies resulting in the paradigm shift to massively parallel (connectionist) models
of brain function.
If there really are fundamental inconsistencies between visual experience (the mind) and the
neural theory of the brain, this is a major challenge to the (currently dominant) theories that the
mind is constituted entirely from the activity of the brain. As usual, Dennett is unequivocal: “Our
minds are just what our brains non-miraculously do “(30, Preface). Not only philosophers are
so dogmatic. Stanislas Dehaene, a leading experimentalist, says: “If you had any lingering
doubts that your mental life arises entirely from the activity of the brain, these examples should
lift them” (37, p.153). No one has suggested how this postulated mind/brain interaction would
work, and we will show here that the examples above cannot be explained within existing
theories. There is always the possibility of a conceptual breakthrough, but it would entail
abandoning some of our core beliefs about (at least) neural computation.
There is a plausible functional story for the stable world experience and the related binding
problem to be discussed below. First of all, we do have an integrated (top-down) sense of the
space around us that we cannot currently see, based on memory and other sense data –
primarily hearing and smell. In addition, since we are heavily visual, it is adaptive to use vision
as broadly as possible. In fact, it would be extremely difficult to act in the world using only the
bulls-eye images from Figure 1 and separated information on size, color, etc. The mind
(somehow) encodes a more accurate version of the world than can be directly captured by our
limited neural hardware.
We should not be surprised that our subjective experience sometimes deviates from the
information captured and processed by the visual system. Our senses and the nervous system
in general evolved to help our bodies function effectively in a physical and social world that we
cannot directly observe (36). Given that such mental experiences are evolutionarily
fundamental, what can we know about their physical realization? There is an impressive body
of work suggesting how aspects of subjective experience, closely related to the discussion
here, seem to be needed for animals to deal with external space and to combine various
sensory inputs and goals. At least some aspects of these experiences may well be found in
cephalopods (38) and insects (36).
This ecological requirement also reveals a deep problem in the use of the term “illusion”. The
word is sometimes used to describe a perception that is inconsistent with external reality and
sometimes to describe an experience that is inconsistent with the neural representation even
when the subjective experience is more like external reality. To further confuse the issue,
“illusion” is also used metaphorically, as in the postulated “illusion of Free Will” (31). Everyone
agrees that we all act as if we had Free Will, even determinists who deny that they have this
power. There does seem to be an agreed definition of “illusion” that supports its use in a
serious discussion of the mind.
Computational Limitations
We will now prove that some everyday visual experiences cannot be explained within existing
neuroscience. The basic form of the argument will be computational. There is no way that
brain neurons, as we know them, could represent or compute the substrate of our visual
experience. The constraint of explaining visual experience also rules out many proposed and
speculative theories of neural computation in the human brain, as discussed below. To explore
the details, we turn next to Figure 4 A, B.
Figure 4 Flat map projection of the Human brain (5)
Figure 4A is a standard flattened projection of one hemisphere of the human brain with the
various areas colored. The numbers refer to the traditional Brodmann classification of brain
regions from their anatomical details. Modern methods (27, 35) have further refined this picture
and elaborated the basic functions computed in these different areas. Figure 4B provides more
detail on this functional separation in the visual system, which is at the core of the neural
binding problem, one of our mysteries.
The visual area V1, our main concern for the stable world experience and the subject of Figure
3, is shown as the yellow area on the left of Figure 4A (as area 17) and as the magenta area in
Figure 4B. Notice that V1 is the largest of the visual areas; this will be important for our
discussion.
There are two additional lessons to be gleaned from Figure 4 above. First, 4A shows that the
functionality of the cerebral cortex is basically known (5, 27, 35) – there is no large available
space for neural computation of currently mysterious phenomena. In addition, various aspects
of our visual experience are primarily computed in distinct and often distant interacting circuits.
For example, in Figure 4B color calculation is based in the bright green area V4v and motion
calculation involves several areas: V3, V3A, MT, etc. In spite of this extreme separation of
function, we experience the world as an integrated image with objects that combine all visual
properties and even associate these with other senses like sound when appropriate. The
mystery of how this happens is called the “hard binding problem” (3).
There are two immediate challenges to address in “the experience of the stable visual world”:
apparent stability over saccades and the detailed perception of the full visual field. One popular
idea is to suppose that the perceived full field is pieced together as a mosaic of “bull’s-eye”
views (Figure 3) from many saccades. There are two serious flaws in this story, one temporal
and one spatial, as an explanation of the experience. We only make about 3~4 saccades per
second – this is too slow for stable vision (movies are ~ 20 frames per second). In addition, 3
or 4 such images would not yield nearly enough detailed information to build a detailed full field
view.
In addition, it would require a huge area of visual neurons to encode the detailed full field view
that we subjectively perceive. We can give a quantitative estimate of what is involved. There
are a number of alternative calculations, but they all confirm the basic point that fine resolution
over a large visual field would require brain area several times larger than V1 (Figure 4).
Stan Klein, who has looked extensively at this issue, suggests the following analysis focusing
on the retinal ganglion cells –RGC. The key equations from (14) are:
Thr(Ecc) = Thr(fovea)*(1 + Ecc/E2) or
Sep(Ecc) = Sep(fovea)*(1 + Ecc/E2)
where Thr (or Sep) is threshold (or separation) in minutes.
and Ecc is eccentricity in deg
and E2 is the eccentricity at which Thr or Sep double.
E2 is the number of degrees of eccentricity at which the spacing of V1 neurons or
ganglion cells double. Levi et al. (14) found E2=0.7 deg for cortical cells and is about 1.0
deg for ganglion cells. That is, for ganglion cells the spacing would be s = 0.5 (Ecc + 1)
min so at Ecc=0 the spacing is about 0.5 min and at 20 deg it is about 10 min, 20 times
as much. This calculation suggests that it might require 20 times as much V1 area to
capture the precision of the fovea out to 20 deg of visual angle.
From a slightly different perspective, the cortical magnification factor says that the resolution at
20 degrees eccentricity is 20 times worse than at the foveal projection. This is because of
retinal under-sampling in the periphery; the detailed information is only captured at the fovea of
the retina (13). Also, the dense neural circuits in the V1 foveal projection has about 200,000
cells per square mm, while at 20 degrees out it is more like 4,000 cells per square mm (15).
This is a factor of 50:1 denser in the V1 foveal projection than in the periphery. The V1 foveal
projection occupies about a quarter of region on the left in Figure 4. For the brain to encode
our detailed perception out to 20 degrees would require an area roughly 12 times the size of
V1. There is no way that an area nearly this large could fit into Figure 4. The remarkable recent
advances (27, 35) describing a much more detailed parcellation of human cerebral cortex
provides even stronger evidence against unknown visual areas.
We can also consider the evidence from the hundreds of full-brain scanning experiments that
are exploring which brain locations are active for various vision tasks (16, 17, 18, 35). This
precludes the possibility that a network large enough to capture a detailed image could remain
undetected.
In summary, as long as we believe that more detail requires more neurons, there is no place
in the brain that could encode a basis for the detailed large field image that we experience.
This analysis disproves more than the idea of unknown brain circuitry that underlies our stable
world experience. It also refutes any plausible substrate for other proposals such as complete
“remapping” which suggest that all of the information from one saccade is (somehow) mapped
to the input coming from the next saccade (7, p.557).
The binding problem (3, 41) is a closely related mystery of vision that we can consider, also
based on Figure 4. Although the full computational story is more complex, it is the case that
different visual features are largely computed in separate brain areas. However, we experience
the world as coherent entities combining various properties such as size, shape, color, texture,
motion, etc. (39). Again, there is no place in the brain that could encode a detailed substrate
for what we effortlessly perceive. This also suggests that our subjective perception (somehow)
integrates activity from different brain circuits. Various forms of the binding problem are also
the subject of ongoing research (3, 19)
A Touchstone for alternative brain theories
The discussion above is based on the standard theory (20) that information processing in the
brain is based on complex networks of neurons that communicate over long distances mainly
by electrical spikes and learn mainly through changes in the connections (synapses) between
neurons. This theory also includes a wide range of other chemical and developmental factors,
but none that would affect the basic results above.
However, there are a number of alternative proposals that deny the centrality of standard
neural computation and several of these are being actively discussed (21, 22, 23); two good
sources for a wide range of alternative models are the Journal of Consciousness Studies and
http://consciousness.arizona.edu. One reason for this interest in alternative theories is that
everyone agrees that the current standard theory does not support a reductionist explanation
of historic mind-brain problems like subjective experience and consciousness. The standard
theory continues to yield scientific and clinical progress, so any new proposal should be
consistent with it.
Alternative ideas on the basis for brain information processing include quantum effects (28)
and central roles for the glia, for the neuropil, or for microtubules. All of the suggestions for
some sub-neural substrate for perception suffer from the same problem – the only known
mechanism for the requisite fast long-distance communication in the brain is neural spikes.
More general architectural suggestions include global workspace model (40) and the Tononi
information model (21). Many proposals suggest some unspecified mass action of neural
assemblies, following a long tradition (23). Cohen et al. (26) show how known results on
summary statistics and peripheral vision explain some of people’s ability to get the “gist” of a
scene without capturing all of the detail of subjective perception. After extensive analysis and
modeling of peripheral vision and what she calls "the awareness puzzle", Rosenholtz (42)
concludes that "Perception is inherently something of an illusion".
Edwards (25) suggests another approach – unified perception (and consciousness) is based
on wave patterns in the membranes of individual cells. All of these ideas presuppose that
there is some substrate (NCC) for subjective experience in the brain, but there are also more
radical theories like that of Alva Noe (22). He claims to explain how "we enjoy an experience of
worldly detail that is not present in our brains". Starting from a standard argument that utilities
are the basis for perception, Hoffman (33) suggests that: “Your apple and my apple are
distinct, just as your headache is distinct from my headache. Something in the objective world
triggers us both to perceive an apple, but whatever that thing might be in the objective world, it
is almost certainly nonspatial, nontemporal, and in no way resembles an apple”
Since the deep mind-brain phenomena of most common interest are not well defined, it has
not been straightforward to evaluate any of these suggested alternatives to the standard model
of neural computation. The findings described above could yield concrete touchstone
problems for proposed theories of representation, computation, and communication in the
brain. Both the binding problem and the experience of a detailed stable visual scene are
ubiquitous in daily life, are functionally necessary, and have clear informational requirements.
We could ask proponents of speculative brain models how their theory could account for these
two concrete phenomena. That is, assume your theory is true and show how it helps explain
these (or other) touchstone problems. I have done this informally with several leading
proponents of alternative models and have never heard even a vague claim of adequacy.
The general acceptance of some such touchstone tasks could sharpen the discussion of
information processing in the brain. Of course, the deep mind-brain problem remains a
mystery, but we should expect proposed models of neural computation to address some of the
concrete touchstone problems, like those discussed here.
Experiments
We have shown that existing neuroscience cannot address all the basic questions of
subjective experience. Of course, very productive communities are working on many aspects
of cognitive and perceptual neuroscience. There is a wide range of motivations for these
efforts, but these do not usually include trying to elucidate remaining mysteries, such as the
ones discussed here. There are risks involved in attacking difficult problems and relatively few
such efforts in the current stressful research environment.
Nevertheless, there is some research that is making progress on demystifying some of the
mysteries of subjective experience. In the Fall of 2017, a UC Berkeley interdisciplinary
seminar course explored “Science and Subjectivity “ http://rctn.org/wiki/VS298:_Subjectivity .
This web site for the course contains references and video lecture recordings for a wide range
of research that pushes on the boundary between routine science and remaining mysteries.
Week 3 contains lecture and discussion on the material in this article. The web site also
includes presentations and discussion by Michael Cohen, Jerry Feldman, Rich Ivry, Stan Klein,
Bob Knight, Christof Koch, Ken Nakayama, Brian Odegaard, Bruno Olshausen, Terry Regier,
Shin Shimojo, and Peter Tse. If there is a scientific explanation of these mysteries, it will need
to be an evolutionary story, so it should be fruitful to focus on a wide range of animals (36, 38)
Conclusions
There is general agreement that there are mysteries about the world and our place in it that
are not yet understood. Even radical materialists will concede that there are questions (e.g.
free will) that might never have scientific solutions. Nevertheless, it is not widely understood
that, every time we open our eyes, we experience phenomena that cannot be explained with
existing neuroscience and possibly not with any science.
As thinkers, we have no choice but to acknowledge that we do not know and may never know
the answers to many deep questions about the world and ourselves (24). There are two basic
ways to learn about the physical and social world: investigation and stories. Science is a
uniquely powerful tool of investigation, but is limited in scope at least at present. Of course,
there remains a vast amount that can and should be explored and exploited scientifically.
Stories can provide insights that are not directly testable, and this is certainly also important in
science. The stories in art, mythology, religion, etc. have been and will remain powerful
sources of guidance about how to live.
Initial attempts to convey the ideas in this note have not been very successful. I find that
scientists have a strong negative reaction to my simple demonstrations. On the other hand,
philosophers and humanists welcome any attack on reductionism. However, it seems like both
responses are mainly territorial. It does not appear to be too much of a stretch to view the
(Eastern or Western) religious practitioners as another special interest group. It is certainly true
that all these groups have emotional/spiritual as well as financial/power stakes in the big
questions, but there does not seem to be much support for the agnostic mysterian position "we
simply don't know".
Everyone is entitled to his or her own (religious or other) beliefs, but there is nothing in our
current ignorance that privileges one faith over all others. Belief in the inevitability of complete
scientific answers (8, 21, 30) is one such faith. There are beliefs (e.g. about the age of the
Earth) that contradict established scientific knowledge and cannot be taken seriously.
Somewhat surprisingly, there seems to be little support in cognitive and neuro science for "we
simply don't know". This is despite the fact "we simply don't know and may never know" is the
accepted response in physics for some fundamental questions. What has been most surprising
is how many people prefer believing there must be an (inscrutable) reductionist answer rather
than accepting the agnostic stance. Even philosophers, who consider the mind/brain problem
as a possible feature of nature, try to prove their contention rather than leave it as one
possibility (8). This all might be related to recent findings suggesting an innate human drive to
find answers for unanswerable questions (32).
Nevertheless, in the face of all that is unknown, we (following the physicists) would do well to
appreciate both what is scientifically known and also the mysteries that remain. Ideally, results
like those above will encourage theory and experiment on questions at the boundaries
between the known and unknown.
Acknowledgement
This work was supported in part by the Office of Naval Research under Grant N000141110416
and by a grant from Google.
References
1. Four frames suffice: A provisional model of vision and space. Jerome A. Feldman
THE BEHAVIORAL AND BRAIN SCIENCES (1985) Volume 8 / Issue 02 / July 1985, pp 265- 289
2. Integration of form across saccadic eye movements. Hayhoe, M.; Lachter, J.; Feldman, J. Perception,
Vol. 20, No. 3, 01.12.1991, p. 393-402.
3. The neural binding problem(s), Jerome Feldman Cognitive Neurodynamics. February 2013, Volume
7, Issue 1, pp 1-11
4. Functional anatomy of macaque striate cortex. Tootell RB, Silverman MS, Hamilton SL, Switkes E,
De Valois RL., Spatial frequency. J Neurosci. 1988 May; 8(5):1610-24.
5. A Population-Average, Landmark- and Surface-based (PALS) atlas of human cerebral cortex. Van
Essen DC1. Neuroimage 2005 Nov 15;28(3):635-62.
6. “Visual Stability” Proc. Trans Royal Society B February 2011, David Melcher (ed.)
Volume: 366 Issue: 1564 DOI: 10.1098/rstb.2010.0277
http://rstb.royalsocietypublishing.org/content/366/1564/468
7. Computational models of spatial updating in perisaccadic perception. Hamker F. H., Zirnsak M.,
Ziesche A, Lappe M. 2011. Phil. Trans. R. Soc. B 366, 554–571. doi:10.1098/rstb.2010.0229
(doi:10.1098/rstb.2010.0229)
8. The Hard Problem of Consciousness. Weisberg, J. Internet Encyclopedia of Philosophy.
http://www.iep.utm.edu/hard-con/
9. Transsaccadic processing: stability, integration, and the potential role of remapping. Higgins E,
Rayner K., Atten Percept Psychophys (2015) 77:3–27
10. Brain circuits underlying visual stability across eye movements-converging evidence for a
neuro-computational model of area LIP. Ziesche A, Hamker FH. (2014) Front Comput Neurosci
8:25.
11. Saccadic Corollary Discharge Underlies Stable Visual Perception. James Cavanaugh,
Rebecca A. Berman, Wilsaan M. Joiner, Robert H. Wurtz. Journal of Neuroscience, 6 January
2016, 36(1): 31-42; doi: 10.1523/JNEUROSCI.2054-15.2016
12. Cognitive Science should be unified: comment on Griffiths et al. and McClelland et al Feldman
JA. Trends Cogn Sci. 2010 Aug;14(8):341. doi: 10.1016/j.tics.2010.05.008. Epub 2010 Jun 17.
13. Cortical magnification within human primary visual cortex correlates with acuity thresholds.
Duncan RO1, Boynton GM. Neuron. 2003 May 22;38(4):659-71.
14. Vernier acuity, crowding and cortical magnification. Levi DM, Klein SA, Aitsebaomo AP
(1985) Vision Res. 25(7):963-77.
15. Modeling magnification and anisotropy in the primate foveal confluence. Schira MM1, Tyler
CW, Spehar B, Breakspear, M.PLoS Comput Biol. 2010 Jan 29;6(1):e1000651. doi:
10.1371/journal.pcbi.1000651.
16. Borders of multiple visual areas in humans revealed by functional magnetic resonance
imaging. Sereno MI, Dale AM, Reppas JB, Kwong KK, Belliveau JW, Brady TJ, Rosen BR,
Tootell RB. Science. 1995 May 12;268(5212):889-93.
17. The global landscape of cognition: hierarchical aggregation as an organizational principle of
human cortical networks and functions. Taylor P1,2, Hobbs JN1, Burroni J1 SiegelmannHT1,2.2015
Dec 16;5:18112. doi: 10.1038/srep18112.
18. The economy of brain network organization. Bullmore E1, Sporns O. Nat Rev Neurosci 2012 Apr
13;13(5):336-49. doi: 10.1038/nrn3214.
19. Feature- and Face-Exchange illusions: new insights and applications for the study of the
binding problem. Arthur G. Shapiro1, Gideon P. Caplovitz2 and Erica L. Dixon1. Front. Hum.
Neurosci., 16 October 2014 | http://dx.doi.org/10.3389/fnhum.2014.00804
20. Sense and the single neuron: Probing the physiology of perception.
Parker, AJ and Newsome, WT (1998). Annu. Rev. Neurosci. 21: 227-77.
21. Consciousness: Confessions of a Romantic Reductionist, C. Koch. The MIT Press, (2012),
ISBN 978-0-262-01749-7
22. Out of Our Heads: Why You Are Not Your Brain, and Other Lessons from the Biology of
Consciousness , Alva Noë Hill and Wang 2009
ISBN-13: 978-0809016488
23. From the Neuron Doctrine to Neural Networks. Rafael Yuste, Nature Reviews Neuroscience .
v16, August 2015, pp487-496.
24. Science and the Indian Tradition: When Einstein Met Tagore (India in the Modern World).
David L. Gosling. Routledge; (2007) ISBN-13: 978-0415481342
25. Is Consciousness Only A Property Of Individual Cells? Jonathan CW Edwards
Journal of Consciousness Studies, Volume 12, No.4-5, pp60-76
26. What is the bandwidth of perceptual experience? Cohen et al. Trends in Cognitive Sciences, 2016
DOI: 10.1016/j.tics.2016.03.006
27. . A Multi-modal Parcellation of Human Cerebral Cortex. Glasser, M.F. et al Nature DOI:
10.1038/nature18933
28. Consciousness in the universe: A review of the ‘Orch OR’ theory Hameroff,S., Penrose, R.
Physics of Life Reviews, Volume 11, Issue 1, March 2014, Pages 39-78
29. No-Report Paradigms: Extracting the True Neural Correlates of Consciousness. Tsuchiya,
Naotsugu et al. , Trends in Cognitive Sciences , Volume 19 , Issue 12 , 757 – 770. DOI:
http://dx.doi.org/10.1016/j.tics.2015.10.002
30. Freedom Evolves, Dennett, D.C., Viking Press 2003 ISBN 0-670-03186-0
31. WHO 'S IN CHARGE? Free Will and the Science of the Brain. Michael S.
Gazzaniga. HarperCollins, 2011 ISBN: 978-0-06-190610-7
32. Religion Explained: The Evolutionary Origins of Religious Thought, Pascal Boyer
Basic Books, 2002, ISBN 0-465-00696-5.
33. Public Objects and Private Qualia, Donald Hoffman, in Handbook of Experimental
Phenomenology, L. Albertazzi (Ed) , 2013, Wiley, ISBN 978-1-119-95468.
34. Word Superiority Effect. https://en.wikipedia.org/wiki/Word_superiority_effect
35. The ventral visual pathway: an expanded neural framework for the processing of object
quality. Kravitz DJ1, Saleem KS, Baker CI, Ungerleider LG, Mishkin M.
Trends Cogn Sci. 2013 Jan; 17(1):26-49. doi: 10.1016/j.tics.2012.10.011.
36. What insects can tell us about the origins of consciousness
Andrew B. Barrona and Colin Kleinb
4900–4908 | PNAS | May 3, 2016 | vol. 113 | no. 18
37. Consciousness and the Brain, Dehaene, S. Viking, 2014.
38. Other Minds : The Octopus, the Sea, and the Deep Origins of Consciousness, Godfrey-Smith,
P., 2016, Farrar, Straus, and Giroux
39. Visual stability based on remapping of attention pointers, Cavanagh, P., A. R. Hunt, A. Afraz
and M. Rolfs. Trends in Cognitive Sciences Vol.14 No.4, 147-153
40. Global Workspace Theory https://en.wikipedia.org/wiki/Global_workspace_theory
41. The Binding Problem, Roskies, A. Neuron, ISSN: 0896-6273, Vol: 24, Issue: 1, Page: 7-9
1999
42. What modern vision science reveals about the awareness puzzle: Summary-statistic encoding
plus decision limits underlie the richness of visual perception and its quirky failures Rosenholtz,
R. 2017 arXiv:1706.02764
| 2cs.AI
|
arXiv:1609.07135v2 [math.ST] 28 Nov 2017
Convergence of Regression-Adjusted Approximate Bayesian
Computation
B Y W ENTAO L I
School of Mathematics, Statistics and Physics, Newcastle University, Newcastle upon Tyne NE1
7RU, U.K.
[email protected]
PAUL F EARNHEAD
Department of Mathematics and Statistics, Lancaster University, Lancaster LA1 4YF, U.K.
[email protected]
AND
S UMMARY
We present asymptotic results for the regression-adjusted version of approximate Bayesian
computation introduced by Beaumont et al. (2002). We show that for an appropriate choice of
the bandwidth, regression adjustment will lead to a posterior that, asymptotically, correctly quantifies uncertainty. Furthermore, for such a choice of bandwidth we can implement an importance
sampling algorithm to sample from the posterior whose acceptance probability tends to unity
as the data sample size increases. This compares favourably to results for standard approximate
Bayesian computation, where the only way to obtain a posterior that correctly quantifies uncertainty is to choose a much smaller bandwidth; one for which the acceptance probability tends to
zero and hence for which Monte Carlo error will dominate.
Keywords: Approximate Bayesian computation; Importance sampling; Local-linear regression; Partial information.
1. I NTRODUCTION
Modern statistical applications increasingly require the fitting of complex statistical models,
which are often intractable in the sense that it is impossible to evaluate the likelihood function.
This excludes standard implementation of likelihood-based methods, such as maximum likelihood estimation or Bayesian analysis. To overcome this there has been substantial interest in
likelihood-free or simulation-based methods, which replace calculating the likelihood by simulation of pseudo datasets from the model. Inference can then be performed by comparing these
pseudo datasets, simulated for a range of different parameter values, to the actual data.
Examples of such likelihood-free methods include simulated methods of moments (Duffie &
Singleton, 1993), indirect inference (Gouriéroux & Ronchetti, 1993; Heggland & Frigessi, 2004),
synthetic likelihood (Wood, 2010) and approximate Bayesian computation (Beaumont et al.,
2002). Of these, approximate Bayesian computation methods are arguably the most common
methods for Bayesian inference, and have been popular in population genetics (e.g., Beaumont
et al., 2002; Cornuet et al., 2008), ecology (e.g., Beaumont, 2010) and systems biology (e.g.,
Toni et al., 2009); more recently they have seen increased use in other application areas, such as
econometrics (Calvet & Czellar, 2015) and epidemiology (Drovandi & Pettitt, 2011).
1
2
The idea of approximate Bayesian computation is to first summarize the data using lowdimensional summary statistics, such as sample means or autocovariances or suitable quantiles
of the data. The posterior density given the summary statistics is then approximated as follows.
Assume the data are Yobs = (yobs,1 , . . . , yobs,n ) and modelled as a draw from a parametric model
with parameter θ ∈ Rp . Let K(x) be a positive kernel, where maxx K(x) = 1, and ε > 0 is the
bandwidth. For a given d-dimensional summary statistic s(Y ), our model will define a density
fn (s | θ). We then define a joint density, πε (θ, s | sobs ), for (θ, s) as
´
π(θ)fn (s | θ)K{ε−1 (s − sobs )}
,
−1
Rp ×Rd π(θ)fn (s | θ)K{ε (s − sobs )} dθds
where sobs = s(Yobs ). Our approximation to the posterior density is the marginal density
ˆ
πε (θ | sobs ) = πε (θ, s | sobs ) ds,
(1)
(2)
which we call the approximate Bayesian computation posterior density. For brevity we will often
shorten this to posterior density in the following. We will always call the actual posterior given
the summary the true posterior.
The idea of approximate Bayesian computation is that we can sample from πε (θ | sobs ) without needing to evaluate the likelihood function or fn (s | θ). The simplest approach is via rejection sampling (Beaumont et al., 2002), which proceeds by simulating a parameter value and
an associated summary statistic from π(θ)fn (s | θ). This pair is then accepted with probability
K{ε−1 (s − sobs )}. The accepted pairs will be drawn from (1), and the accepted parameter values will be drawn from the posterior (2). Implementing this rejection sampler requires only the
ability to simulate pseudo data sets from the model, and then to be able to calculate the summary
statistics for those data sets.
Alternative algorithms for simulating from the posterior include adaptive or sequential importance sampling (Beaumont et al., 2009; Bonassi & West, 2015; Lenormand et al., 2013; Filippi
et al., 2013) and Markov chain Monte Carlo approaches (Marjoram et al., 2003; Wegmann et al.,
2009). These aim to propose parameter values in areas of high posterior probability, and thus can
be substantially more efficient than rejection sampling. However, the computational efficiency of
all these methods is limited by the probability of acceptance for data simulated with a parameter
value that has high posterior probability.
This paper is concerned with the asymptotic properties of approximate Bayesian computation. It builds upon Li & Fearnhead (2018) and Frazier et al. (2016), who present results on
the asymptotic behaviour of the posterior distribution and the posterior mean of approximate
Bayesian computation as the amount of data, n, increases. Their results highlight the tension
in approximate Bayesian computation between choices of the summary statistics and bandwidth
that will lead to more accurate inferences, against choices that will reduce the computational cost
or Monte Carlo error of algorithms for sampling from the posterior.
An informal summary of some of these results is as follows. Assume a fixed dimensional
summary statistic and that the true posterior variance given this summary decreases like 1/n
as n increases. The theoretical results compare the posterior, or posterior mean, of approximate
Bayesian computation, to the true posterior, or true posterior mean, given the summary of the
data. The accuracy of using approximate Bayesian computation is governed by the choice of
bandwidth, and this choice should depend on n. Li & Fearnhead (2018) shows that the optimal
choice of this bandwidth will be O(n−1/2 ). With this choice, estimates based on the posterior
mean of approximate Bayesian computation can, asymptotically, be as accurate as estimates
based on the true posterior mean given the summary. Furthermore the Monte Carlo error of
3
an importance sampling algorithm with a good proposal distribution will only inflate the mean
square error of the estimator by a constant factor of the form 1 + O(1/N ), where N is the number
of pseudo data sets. These results are similar to the asymptotic results for indirect inference,
where error for a Monte Carlo sample of size N also inflates the overall mean square error of
estimators by a factor 1 + O(1/N ) (Gouriéroux & Ronchetti, 1993). By comparison choosing
a bandwidth which is o(n−1/2 ) will lead to an acceptance probability that tends to zero as n →
∞, and the Monte Carlo error of approximate Bayesian computation will blow up. Choosing a
bandwidth that decays more slowly than O(n−1/2 ) will also lead to a regime where the Monte
Carlo error dominates, and can lead to a non-negligible bias in the posterior mean that inflates
the error.
While the above results for a bandwidth that is O(n−1/2 ) are positive in terms of point estimates, they are negative in terms of the calibration of the posterior. With such a bandwidth
the posterior density of approximate Bayesian computation always over-inflates the parameter
uncertainty: see Proposition 1 below and Theorem 2 of Frazier et al. (2016).
The aim of this paper is to show that a variant of approximate Bayesian computation can
yield inference that is both accurate in terms of point estimation, with its posterior mean having the same frequentist asymptotic variance as the true posterior mean given the summaries,
and calibrated, in the sense that its posterior variance equals this asymptotic variance, when
the bandwidth converges to zero at a rate slower than O(n−1/2 ). This means that the acceptance
probability of a good approximate Bayesian computation algorithm will tend to unity as n → ∞.
2. N OTATION AND S ET- UP
We denote the data by Yobs = (yobs,1 , . . . , yobs,n ), where n is the sample size, and each observation, yobs,i , can be of arbitrary dimension. Assume the data are modelled as a draw from
a parametric density, fn (y | θ), and consider asymptotics as n → ∞. This density depends on
an unknown parameter θ ∈ Rp . Let B p be the Borel sigma-field on Rp . We will let θ0 denote
the true parameter value, and π(θ) the prior distribution for the parameter. Denote the support of
π(θ) by P. Assume that a fixed-dimensional summary statistic sn (Y ) is chosen and its density
under our model is fn (s | θ). The shorthand Sn is used to denote the random variable with density fn (s | θ). Often we will simplify notation and write s and S for sn and Sn respectively. Let
N (x; µ, Σ) be the normal density at x with mean µ and variance Σ. Let Ac be the complement
of a set A with respect to the whole space. For a series xn we write xn = Θ(an ) if there exist
constants m and M such that 0 < m < |xn /an | < M < ∞ as n → ∞. For a real function g(x),
denote its gradient function at x = x0 by Dx g(x0 ). To simplify notation, Dθ is written as D.
Hereafter ε is considered to depend on n, so the notation εn is used.
The conditions of the theoretical results are stated below.
Condition 1. There exists some δ0 > 0, such that P0 = {θ : |θ − θ0 | < δ0 } ⊂ P, π(θ) ∈
C 2 (P0 ) and π(θ0 ) > 0.
´
´ Ql
Condition 2. The kernel satisfies (i) vK(v) dv = 0; (ii)
k=1 vik K(v) dv < ∞ for any
coordinates (vi1 , . . . , vil ) of v and l ≤ p + 6; (iii) K(v) ∝ K(kvk2Λ ) where kvk2Λ = v T Λv
and Λ is a positive-definite matrix, and K(v) is a decreasing function of kvkΛ ; (iv) K(v) =
α
O(e−c1 kvk 1 ) for some α1 > 0 and c1 > 0 as kvk → ∞.
Condition 3. There exists a sequence an , satisfying an → ∞ as n → ∞, a d-dimensional vector s(θ) and a d × d matrix A(θ), such that for all θ ∈ P0 ,
an {Sn − s(θ)} → N {0, A(θ)}, n → ∞,
4
in distribution. We also assume that sobs → s(θ0 ) in probability. Furthermore, (i) s(θ) and
A(θ) ∈ C 1 (P0 ), and A(θ) is positive definite for any θ; (ii) for any δ > 0 there exists
δ 0 > 0 such that ks(θ) − s(θ0 )k > δ 0 for all θ satisfying kθ − θ0 k > δ; and (iii) I(θ) =
Ds(θ)T A−1 (θ)Ds(θ) has full rank at θ = θ0 .
Let fen (s | θ) = N {s; s(θ), A(θ)/a2n } be the density of the normal approximation to S and
introduce the standardized random variable Wn (s) = an A(θ)−1/2 {S − s(θ)}. We further let
fWn (w | θ) and f˜Wn (w | θ) be the densities for Wn under the true model for S and under our
normal approximation to the model for S.
2/5
Condition 4. There exists αn satisfying αn /an → ∞ and a density rmax (w)
satisfying Condition 2 (ii)–(iii) where K(v) is replaced with rmax (w), such that
supθ∈P0 αn fWn (w | θ) − feWn (w | θ) ≤ c3 rmax (w) for some positive constant c3 .
Condition 5. The following statements hold: (i) rmax (w) satisfies Condition 2 (iv); and (ii)
α
supθ∈Pc0 fWn (w | θ) = O(e−c2 kwk 2 ) as kwk → ∞ for some positive constants c2 and α2 , and
A(θ) is bounded in P.
Conditions 1–5 are from Li & Fearnhead (2018). Condition 2 is a requirement for the kernel function and is satisfied by all commonly used kernels, such as any kernel with compact
support or the Gaussian kernel. Condition 3 assumes a central limit theorem for the summary
statistic with rate an , and, roughly speaking, requires the summary statistic to accumulate information when n. This is a natural assumption, since many common summary statistics are sample
moments, proportions, quantiles and autocorrelations, for which a central limit theorem would
apply. It is also possible to verify the asymptotic normality of auxiliary model-based or composite likelihood-based summary statistics (Drovandi et al., 2015; Ruli et al., 2016) by referring to
the rich literature on asymptotic properties of quasi maximum-likelihood estimators (Varin et al.,
2011) or quasi-posterior estimators (Chernozhukov & Hong, 2003). This assumption does not
cover ancillary statistics, using the full data as a summary statistic, or statistics based on distances, such as an asymptotically chi-square distributed test statistic. Condition 4 assumes that,
in a neighborhood of θ0 , fn (s | θ) deviates from the leading term of its Edgeworth expansion
−2/5
by a rate an . This is weaker than the standard requirement, o(a−1
n ), for the remainder from
Edgeworth expansion. It also assumes that the deviation is uniform, which is not difficult to satisfy in a compact neighborhood. Condition 5 further assumes that fn (s | θ) has exponentially
decreasing tails with rate uniform in the support of π(θ). This implies that posterior moments
from approximate Bayesian computation are dominated by integrals in the neighborhood of θ0
and have leading terms with concise expressions. With Condition 5 weakened, the requirement
of εn for the proper convergence to hold might depend on the specific tail behavior of fn (s | θ).
Additionally, for the results regarding regression adjustment the following moments of the
summary statistic are required to exist.
´
´
Condition 6. The first two moments, Rd sfn (s | θ) ds and Rd ssT fn (s | θ) ds, exist.
3.
A SYMPTOTICS OF APPROXIMATE BAYESIAN COMPUTATION
3·1. Posterior
First we consider the convergence of the posterior distribution of approximate Bayesian computation, denoted by Πε (θ ∈ A | sobs ) for A ∈ B p , as n → ∞. The distribution function is a
random function with the randomness due to sobs . We present two convergence results. One is
5
the convergence of the posterior distribution function of a properly scaled and centered version
of θ, see Proposition 1. The other is the convergence of the posterior mean, a result which comes
from Li & Fearnhead (2018) but, for convenience, is repeated as Proposition 2.
The following proposition gives three different limiting forms for Πε (θ ∈ A | sobs ), corresponding to different rates for how the bandwidth decreases relative to the rate of the central limit
theorem in Condition 3. We summarize these competing rates by defining cε = limn→∞ an εn .
P ROPOSITION 1. Assume Conditions 1–5. Let θε denote the posterior mean of approximate
−3/5
Bayesian computation. As n → ∞, if εn = o(an ) then the following convergence holds, depending on the value of cε .
(i) If cε = 0 then
ˆ
ψ(t) dt → 0,
sup Πε {an (θ − θε ) ∈ A | sobs } −
A∈B p
A
in probability, where ψ(t) = N {t; 0, I(θ0 )−1 }.
(ii) If cε ∈ (0, ∞) then for any A ∈ B p ,
ˆ
Πε {an (θ − θε ) ∈ A | sobs } →
ψ(t) dt,
A
in distribution, where
ˆ
ψ(t) ∝
N [t; cε β0 {v − EG (v)}, I(θ0 )−1 ]G(v) dv, β0 = I(θ0 )−1 Ds(θ0 )T A(θ0 )−1 ,
Rd
and G(v) is a random density of v, with mean EG (v), which depends on cε and Z ∼ N (0, Id ).
(iii) If cε = ∞ then
ˆ
−1
sup Πε {εn (θ − θε ) ∈ A | sobs } −
ψ(t) dt → 0,
A∈B p
A
in probability, where ψ(t) ∝ K{Ds(θ0 )t}.
For a similar result, under different assumptions, see Theorem 2 of Frazier et al. (2016). See also
Soubeyrand & Haon-Lasportes (2015) for related convergence results for the true posterior given
the summaries for some specific choices of summary statistics.
The explicit form of G(v) is stated in the Supplementary Material. When we have the same
number of summary statistics and parameters, d = p, the limiting distribution simplifies to
ˆ
ψ(t) ∝
N {Ds(θ0 )t; cε v, A(θ0 )}K(v) dv.
Rd
The more complicated form in Proposition 1 (ii) above arises from the need to project the summary statistics onto the parameter space. The limiting distribution may depend on the value of the
summary statistic, sobs , in the space orthogonal to Ds(θ0 )T A(θ0 )−1/2 . Hence the limit depends
on a random quantity, Z, which can be interpreted as the noise in sobs .
The main difference between the three convergence results is the form of the limiting density
ψ(t) for the scaled random variable an,ε (θ − θε ), where an,ε = an 1cε <∞ + ε−1
n 1cε =∞ . For case
(i) the bandwidth is sufficiently small that the approximation in approximate Bayesian computation due to accepting summaries close to the observed summary is asymptotically negligible. The
asymptotic posterior distribution is Gaussian, and equals the limit of the true posterior for θ given
the summary. For case (iii) the bandwidth is sufficiently big that this approximation dominates
6
and the asymptotic posterior distribution of approximate Bayesian computation is determined by
the kernel. For case (ii) the approximation is of the same order as the uncertainty in θ, which
leads to an asymptotic posterior distribution that is a convolution of a Gaussian distribution and
the kernel. Since the limit distributions of cases (i) and (iii) are non-random in the space L1 (Rp ),
the weak convergence is strengthened to convergence in probability in L1 (Rp ). See the proof in
Appendix A.
P ROPOSITION 2. (Theorem 3.1 of Li & Fearnhead, 2018) Assume conditions of Proposition
−3/5
−1
1. As n → ∞, if εn = o(an ), an (θε − θ0 ) → N {0, IABC
(θ0 )} in distribution. If εn = o(a−1
n )
or d = p or the covariance matrix of the kernel is proportional to A(θ0 ) then IABC (θ0 ) = I(θ0 ).
For other cases, I(θ0 ) − IABC (θ0 ) is semi-positive definite.
Proposition 2 helps us to compare the frequentist variability in the posterior mean of approximate Bayesian computation with the asymptotic posterior distribution given in Proposition 1.
If εn = o(a−1
n ) then the posterior distribution is asymptotically normal with variance matrix
−2
−1
an I(θ0 ) , and the posterior mean is also asymptotically normal with the same variance matrix. These results are identical to those we would get for the true posterior and posterior mean
given the summary.
For an εn which is the same order as a−1
n , the uncertainty in approximate Bayesian compu−1
tation has rate an . However the limiting posterior distribution, which is a convolution of the
true limiting posterior given the summary with the kernel, will overestimate the uncertainty by a
constant factor. If εn decreases slower than a−1
n , the posterior contracts at a rate εn , and thus will
over-estimate the actual uncertainty by a factor that diverges as n → 0.
In summary, it is much easier to get approximate Bayesian computation to accurately estimate
−3/5
the posterior mean. This is possible with εn as large as o(an ) if the dimension of the summary
statistic equals that of the parameter. However, accurately estimating the posterior variance, or
getting the posterior to accurately reflect the uncertainty in the parameter, is much harder. As
commented in Section 1, this is only possible for values of εn for which the acceptance probability in a standard algorithm will go to zero as n increases. In this case the Monte Carlo sample size,
and hence the computational cost, of approximate Bayesian computation will have to increase
substantially with n.
As one application of our theoretical results, consider observations that are independent and
identically distributed from a parametric density f (· | θ). One approach to construct the summary
statistics is to use the score vector of some tractable approximating auxiliary model evaluated at
the maximum auxiliary likelihood estimator (Drovandi et al., 2015). Ruli et al. (2016) constructs
an auxiliary
Q model from a composite likelihood, so the auxiliary likelihood for a single observation is i∈I f (y ∈ Ai | θ) where {Ai : i ∈ I } is a set of marginal or conditional events for y.
Denote the auxiliary score vector for a single observation by clθ (· | θ) and the maximum auxiliary likelihood estimator for our data set by θbcl . Then the summary statistic, s, for any pseudo
P
data set {y1 , . . . , yn } is nj=1 clθ (yj | θbcl )/n.
For y ∼ f (· | θ), assume the first two moments of clθ (y | θ0 ) exist and clθ (y | θ) is differentiable at θ. Let H(θ) = Eθ {∂clθ (y | θ0 )/∂θ} and J(θ) = varθ {clθ (y | θ0 )}. Then if θbcl is consistent for θ0 , Condition 3 is satisfied with
n1/2 [S − Eθ {clθ (Y | θ0 )}] → N {0, J(θ)}, n → ∞,
in distribution, and with I(θ0 ) = H(θ0 )T J(θ0 )−1 H(θ0 ).
Our results show that the posterior mean of approximate Bayesian computation, using εn =
O(n−1/2 ), will have asymptotic variance I(θ0 )−1 /n. This is identical to the asymptotic variance
7
of the maximum composite likelihood estimator (Varin et al., 2011). Furthermore, the posterior
variance will overestimate this just by a constant factor. As we show below, using the regression
correction of Beaumont et al. (2002) will correct this overestimation and produce a posterior that
correctly quantifies the uncertainty in our estimates.
An alternative approach to construct an approximate posterior using composite likelihood is
to use the product of the prior and the composite likelihood. In general, this leads to a poorly
calibrated posterior density which substantially underestimates uncertainty (Ribatet et al., 2012).
Adjustment of the composite likelihood is needed to obtain calibration, but this involves estimation of the curvature and the variance of the composite score (Pauli et al., 2011). Empirical
evidence that approximate Bayesian computation more accurately quantifies uncertainty than
alternative composite-based posteriors is given in Ruli et al. (2016).
3·2. Regression Adjusted Approximate Bayesian Computation
The regression adjustment of Beaumont et al. (2002) involves post-processing the output of
approximate Bayesian computation to try to improve the resulting approximation to the true posterior. Below we will denote a sample from the posterior of approximate Bayesian computation
by {(θi , si )}i=1,...,N . Under the regression adjustment, we obtain a new posterior sample by using {θi − βbε (si − sobs )}i=1,...,N where βbε is the least square estimate of the coefficient matrix
in the linear model
θi = α + β(si − sobs ) + ei ,
i = 1, . . . , N,
where ei are independent identically distributed errors.
We can view the adjusted sample as follows. Define a constant, αε , and a vector βε as
(αε , βε ) = arg min Eε [kθ − α − β(s − sobs )k2 | sobs ],
α,β
where expectation is with respect the joint posterior distribution of (θ, s) given by approximate
Bayesian computation. Then the ideal adjusted posterior is the distribution of θ∗ = θ − βε (s −
sobs ) where (θ, s) ∼ πε (θ, s). The density of θ∗ is
ˆ
πε∗ (θ∗ | sobs ) =
πε {θ∗ + βε (s − sobs ), s | sobs } ds
Rd
and the sample we get from regression-adjusted approximate Bayesian computation is a draw
from πε∗ (θ∗ | sobs ) but with βε replaced by its estimator.
The variance of πε∗ (θ∗ | sobs ) is strictly smaller than that of πε (θ | sobs ) provided s is correlated with θ. The following results, which are analogous to Propositions 1 and 2, show that this
reduction in variation is by the correct amount to make the resulting adjusted posterior correctly
quantify the posterior uncertainty.
T HEOREM 1. Assume Conditions 1–6. Denote the mean of πε∗ (θ∗ | sobs ) by θε∗ . As n → ∞, if
−3/5
εn = o(an ),
ˆ
∗
∗
sup Πε {an (θ − θε ) ∈ A | sobs } −
N {t; 0, I(θ0 )−1 } dt → 0,
A∈B p
A
in probability, and an (θε∗ − θ0 ) → N {0, I(θ0 )−1 } in distribution. Moreover, if βε is replaced by
βeε satisfying an εn (βeε − βε ) = op (1), the above results still hold.
The limit of the regression adjusted posterior distribution is the true posterior given the summary
−3/5
provided εn is o(an ). This is a slower rate than that at which the posterior contracts, which,
8
as we will show in the next section, has important consequences in terms of the computational
efficiency of approximate Bayesian computation. The regression adjustment corrects both the
additional noise of the posterior mean when d > p and the overestimated uncertainty of the
posterior. This correction comes from the removal of the first order bias caused by ε. Blum (2010)
shows that the regression adjustment reduces the bias of approximate Bayesian computation
when E(θ | s) is linear and the residuals θ − E(θ | s) are homoscedastic. Our results do not
require these assumptions, and suggest that the regression adjustment should be applied routinely
with approximate Bayesian computation provided the coefficients βε can be estimated accurately.
With the simulated sample, βε is estimated by βbε . The accuracy of βbε can be seen by the
following decomposition,
βbε = covN (s, θ)varN (s)−1
s − sε
s − sε −1
1
∗
∗
= βε +
covN
, an (θ − θε ) varN
,
an εn
εn
εn
where covN and varN are the sample covariance and variance matrices, and s is the sample
mean. Since cov(s, θ∗ ) = 0 and the distributions of s − sε and θ∗ − θε∗ contract at rates εn
−1 −1/2 }
b
and a−1
n respectively, the error βε − βε can be shown to have the rate Op {(an εn ) N
as n → ∞ and N → ∞. We omit the proof, since it is tedious and similar to the proof of the
asymptotic expansion of βε in Lemma 4. Thus, if N increases to infinity with n, βbε − βε will be
op {(an εn )−1 } and the convergence of Theorem 1 will hold instead.
Alternatively we can get an idea of the additional error for large N from the following proposition.
P ROPOSITION 3. Assume Conditions 1–6. Consider θ∗ = θ − βbε (s − sobs ). As n → ∞, if
−3/5
εn = o(an ) and N is large enough, for any A ∈ B p ,
ˆ
∗
∗
Πε {an (θ − θε ) ∈ A | sobs } →
ψ(t) dt,
A
in distribution, where
ˆ
h
N t;
ψ(t) ∝
Rd
when cε < ∞,
ˆ
ψ(t) ∝
n
N t;
Rp
i
η
−1
{v
−
E
(v)},
I(θ
)
G(v) dv,
0
G
N 1/2
o
η
0
−1
Ds(θ
)t
,
I(θ
)
K{Ds(θ0 )t0 } dt0 ,
0
0
N 1/2
when cε = ∞, and η = Op (1).
The limiting distribution here can be viewed as the convolution of the limiting distribution obtained when the optimal coefficients are used and that of a random variable, which relates to the
error in our estimate of βε , and that is Op (N −1/2 ).
3·3. Acceptance Rates when ε is Negligible
Finally we present results for the acceptance probability of approximate Bayesian computation, the quantity that is central to the computational cost of importance sampling or Markov
chain Monte Carlo-based algorithms. We consider a set-up where we propose the parameter
value from a location-scale family. That is, we can write the proposal density as the density of a
random variable, σn X + µn , where X ∼ q(·), E(X) = 0 and σn and µn are constants that can
9
depend on n. The average acceptance probability pacc,q would then be
ˆ
qn (θ)fn (s | θ)K{ε−1
n (s − sobs )} dsdθ,
P×Rd
where qn (θ) is the density of σn X + µn . This covers the proposal distribution in fundamental
sampling algorithms, including the random-walk Metropolis algorithm and importance sampling
with unimodal proposal distribution, and serves as the building block for many advanced algorithms where the proposal distribution is a mixture of distributions from location-scale families,
such as iterative importance sampling-type algorithms.
We further assume that σn (µn − θ0 ) = Op (1), which means θ0 is in the coverage of qn (θ).
This is a natural requirement for any good proposal distribution. The prior distribution and θ0 as a
point mass are included in this proposal family. This condition would also apply to many Markov
chain Monte Carlo implementations of approximate Bayesian computation after convergence.
−1
As above, define an,ε = an 1cε <∞ + ε−1
n 1cε =∞ to be the smaller of an and εn . Asymptotic
−1
results for pacc,q when σn has the same rate as an,ε are given in Li & Fearnhead (2018). Here we
extend those results to other regimes.
−1/2
T HEOREM 2. Assume the conditions of Proposition 1. As n → ∞, if εn = o(an ): (i) if
−1
cε = 0 or σn /a−1
n,ε → ∞, then pacc,q → 0 in probability; (ii) if cε ∈ (0, ∞) and σn /an,ε →
−1
r1 ∈ [0, ∞), or cε = ∞ and σn /an,ε → r1 ∈ (0, ∞), then pacc,q = Θp (1); (iii) if cε = ∞ and
σn /a−1
n,ε → 0, then pacc,q → 1 in probability.
The proof of Theorem 2 can be found in the Supplementary Material. The underlying intuition
is as follows. For the summary statistic, s, sampled with parameter value θ, the acceptance probability depends on
s − sobs
1
= [{s − s(θ)} + {s(θ) − s(θ0 )} + {s(θ0 ) − sobs }],
εn
εn
(3)
where s(θ) is the limit of s in Condition 3. The distance between s and sobs is at least Op (a−1
n ),
−1
−1
since the first and third bracketed terms are Op (an ). If εn = o(an ) then, regardless of the value
of θ, (3) will blow up as n → ∞ and hence pacc,q goes to 0. If εn decreases with a rate slower
than a−1
n , (3) will go to zero providing we have a proposal which ensures that the middle term is
op (εn ), and hence pacc,q goes to unity.
Theorem 1 shows that, without the regression adjustment, approximate Bayesian computation
requires εn to be o(a−1
n ) if its posterior is to converge to the true posterior given the summary. In
this case Theorem 2 shows that the acceptance rate will degenerate to zero as n → ∞ regardless
of the choice of q(·). On the other hand, with the regression adjustment, we can choose εn =
−3/5
o(an ) and still have convergence to the true posterior given the summary. For such a choice,
if our proposal density satisfies σn = o(εn ), the acceptance rate will go to unity as n → ∞.
4. N UMERICAL E XAMPLE
Here we illustrate the gain of computational efficiency from using the regression adjustment on
the g-and-k distribution, a popular model for testing approximate Bayesian computation methods
(e.g., Fearnhead & Prangle, 2012; Marin et al., 2014). The data are independent and identically
distributed from a distribution defined by its quantile function,
1 − exp{−γz(x)}
−1
F (x; α, β, γ, κ) =α + β 1 + 0.8
{1 + z(x)2 }κ z(x), x ∈ [0, 1],
1 + exp{−γz(x)}
10
where α and β are location and scale parameters, γ and κ are related to the skewness and kurtosis
of the distribution, and z(x) is the corresponding quantile of a standard normal distribution. No
closed form is available for the density but simulating from the model is straightforward by
transforming realisations from the standard normal distribution.
In the following we assume the parameter vector (α, β, γ, κ) has a uniform prior in [0, 10]4
and multiple datasets are generated from the model with (α, β, γ, κ) = (3, 1, 2, 0.5). To illustrate
the asymptotic behaviour of approximate Bayesian computation, 50 data sets are generated for
each of a set of values of n ranging from 500 to 10, 000. Consider estimating the posterior
means, denoted by µ = (µ1 , . . . , µ4 ), and standard deviations, denoted by σ = (σ1 , . . . , σ4 ), of
the parameters. The summary statistic is a set of evenly spaced quantiles of dimension 19.
The bandwidth is chosen via fixing the proportion of the Monte Carlo sample to be accepted,
and the accepted proportions needed to achieve certain approximation accuracy for estimates
with and without the adjustment are compared. A higher proportion means more simulated parameter values can be kept for inference. The accuracy is measured by the average relative errors
of estimating µ or σ,
4
REµ =
µk − µ k |
1 X |b
,
4
µk
k=1
4
REσ =
1 X |b
σk − σk |
,
4
σk
k=1
for estimators µ
b = (b
µ1 , . . . , µ
b4 ) and σ
b = (b
σ1 , . . . , σ
b4 ). The proposal distribution is normal, with
the covariance matrix selected to inflate the posterior covariance matrix by a constant factor c2
and the mean vector selected to differ from the posterior mean by half of the posterior standard
deviation, which avoids the case that the posterior mean can be estimated trivially. We consider a
series of increasing c in order to investigate the impact of the proposal distribution getting worse.
Figure 1 shows that the required acceptance rate for the regression adjusted estimates is higher
than that for the unadjusted estimates in almost all cases. For estimating the posterior mean, the
improvement is small. For estimating the posterior standard deviations, the improvement is much
larger. To achieve each level of accuracy, the acceptance rates of the unadjusted estimates are
all close to zero. Those of the regression-adjusted estimates are higher by up to two orders of
magnitude, so the Monte Carlo sample size needed to achieve the same accuracy can be reduced
correspondingly.
5. D ISCUSSION
One way to implement approximate Bayesian computation so that the acceptance probability
tends to unity as n increases is to use importance sampling with a suitable proposal from a
location-scale family. The key difficulty with finding a suitable proposal is to ensure that the
location parameter is close to the true parameter, where close means the distance is O(εn ). This
can be achieved by having a preliminary analysis of the data, and using the point estimate of the
parameter from this preliminary analysis as the location parameter (Beaumont et al., 2009; Li &
Fearnhead, 2018).
ACKNOWLEDGMENT
This work was funded by the Engineering and Physical Sciences Research Council, under the
i-like programme grant.
11
0.8
0.6
0.4
0.0
0.2
Acceptance rate
0.8
0.6
0.4
0.2
0.0
Acceptance rate
1.0
(b)
1.0
(a)
2.0
2.5
3.0
3.5
4.0
4.5
2.0
2.5
3.0
c
4.0
4.5
3.5
4.0
4.5
c
0.8
0.6
0.4
0.2
0.0
0.0
0.2
0.4
0.6
Acceptance rate
0.8
1.0
(d)
1.0
(c)
Acceptance rate
3.5
2.0
2.5
3.0
3.5
c
4.0
4.5
2.0
2.5
3.0
c
Fig. 1: Acceptance rates required for different degrees of accuracy of approximate Bayesian
computation and different variances of the proposal distribution (which are proportional to c). In
each plot we show results for standard (grey-line) and regression adjusted (black-line) approximate Bayesian computation and for different values of n: n = 500 (dotted), n = 3, 000 (dashed)
and n = 10, 000 (solid). The averages over 50 data sets (thick) and their 95% confidence intervals (thin) are reported. Results are for a relative error of 0.08 and 0.05 in the posterior mean, in
(a) and (b) respectively, and for a relative error of 0.2 and 0.1 in the posterior standard deviation,
in (c) and (d) respectively.
S UPPLEMENTARY M ATERIAL
Proofs of lemmas and Theorem 2 are included in the online supplementary material.
12
A PPENDIX
Proof of Result from Section 3·1
Throughout the data are considered to be random. For any integer l > 0 and a set A ⊂ Rl ,
we use the convention that cA + x denotes the set {ct + x : t ∈ A} for c ∈ R and x ´∈ Rl . For a
non-negative function h(x), integrable in Rl , denote the normalised function h(x)/ Rl h(x) dx
by h(x)(norm) . For a vector x, denote a general polynomial of elements of x with degree up to l by
Pl (x). For any fixed δ < δ0 , let Bδ be the neighborhood {θ : kθ − θ0 k < δ}. Let πδ (θ) be π(θ)
truncated in Bδ . Recall that fen (s | θ) denotes the normal density with mean s(θ) and covariance
matrix A(θ)/a2n . Let t(θ) = an,ε (θ − θ0 ) and v(s) = ε−1
n (s − sobs ), rescaled versions θ and s.
For any A ∈ B p , let t(A) be the set {φ : φ = t(θ) for some θ ∈ A}.
e ε (θ ∈ A | sobs ) to be the normal counterpart of Πε (θ ∈ A | sobs ) with truncated prior,
Define Π
obtained by replacing π(θ) and fn (s | θ) in Πε by πδ (θ) and fen (s | θ). So let
π
eε (θ, s | sobs ) = ´
´
Bδ
πδ (θ)fen (s | θ)K{ε−1
n (s − sobs )}
,
−1
e
d πδ (θ)fn (s | θ)K{εn (s − sobs )} dθds
R
´
e ε (θ ∈ A | sobs ) be the distribution function with denπ
eε (θ | sobs ) = Rd π
eε (θ, s | sobs ) ds and Π
e ε by θeε . Let Wobs = an A(θ0 )−1/2 {sobs − s(θ0 )} and
sity π
eε (θ | sobs ). Denote the mean of Π
−1
T
−1
β0 = I(θ0 ) Ds(θ0 ) A(θ0 ) . By Condition 3, Wobs → Z in distribution as n → ∞, where
Z ∼ N (0, Id ).
e ε is an incorrect model for
Since the approximate Bayesian computation likelihood within Π
sobs , standard posterior convergence results do not apply. However, if we condition on the value
of the summary, s, then the distribution of θ is just the true posterior given s. Thus we can express
the posterior from approximate Bayesian computation as a continuous mixture of these true
−1
−1 e
posteriors. Let π
eε,tv (t, v) = a−d
n,ε πδ (θ0 + an,ε t)fn (sobs + εn v | θ0 + an,ε t)K(v). For any A ∈
e ε as,
B p , we rewrite Π
ˆ ˆ
e ε (θ ∈ A | sobs ) =
e ∈ A | sobs + εn v)e
Π
Π(θ
πε,tv (t, v)(norm) dtdv,
(4)
Rd
t(Bδ )
e ∈ A | s) is the posterior distribution with prior πδ (θ) and likelihood fen (s | θ).
where Π(θ
e ∈ A | sobs + εn v)
Using results from Kleijn & van der Vaart (2012), the leading term of Π(θ
can be obtained and is stated in the following lemma.
d
L EMMA 1. Assume Conditions 3 and 4. If εn = O(a−1
n ), for any fixed v ∈ R and small
enough δ,
ˆ
e
N [t; β0 {A(θ0 )1/2 Wobs + cε v}, I(θ0 )−1 ] dt → 0,
sup Π{an (θ − θ0 ) ∈ A | sobs + εn v} −
A∈B p
A
in probability as n → ∞.
This leading term is Gaussian, but with a mean that depends on v. Thus asymptotically, the
posterior of approximate Bayesian computation is the distribution
´ of the sum of a Gaussian
random variable and β0 cε V , where V has density proportional to π
eε,tv (t, v) dt.
To make this argument rigorous, and to find the distribution of this sum of random variables we
need to introduce several functions that relate to the limit of π
eε,tv (t0 , v). For a rank-p d × p matrix
A, a rank-d d × d matrix B and a d-dimensional vector c, define g(v; A, B, c) = exp[−(c +
13
Bv)T {I − A(AT A)−1 AT }(c + Bv)/2]/(2π)(d−p)/2 . Let
(
N nDs(θ0 )t; an εn v + A(θ0 )1/2 Wobs , A(θ0 ) K(v),
o
gn (t, v) =
N Ds(θ0 )t; v + an1εn A(θ0 )1/2 Wobs , a21ε2 A(θ0 ) K(v),
n n
cε < ∞,
cε = ∞,
Gn (v) be g{v; A(θ0 )−1/2 Ds(θ0 ), an εn A(θ0 )−1/2 , Wobs }K(v), and EGn (·) be´ the expectation
under the density Gn (v)(norm) . In both cases it is straightforward to show that Rp gn (t, v) dt =
|A(θ0 )|−1/2 Gn (v). Additionally, for the case cε = ∞, define v 0 (v, t) = A(θ0 )1/2 Wobs +
an εn v − an εn Ds(θ0 )t and
1 0
1
gn0 (t, v 0 ) = N {v 0 ; 0, A(θ0 )}K Ds(θ0 )t +
v −
A(θ0 )1/2 Wobs .
an εn
an εn
Then with the transformation v 0 = v 0 (v, t), gn (t, v)dv = gn0 (t, v 0 )dv 0 . Let
(
N {Ds(θ0 )t; cε v + A(θ0 )1/2 Z, A(θ0 )}K(v), cε < ∞,
g(t, v) =
K{Ds(θ0 )t}N {v; 0, A(θ0 )},
cε = ∞,
−1/2 , Z}K(v) and E (·) be the expectation under the
G(v) be g{v; A(θ0 )−1/2 Ds(θ0 ), cε A(θ
G
´ 0)
(norm)
−1/2 G(v).
density G(v)
.
When
c
<
∞,
g(t,
v)
dt
=
|A(θ
)|
ε
0
Rp
´ ´
Expansions of Rd t(Bδ ) π
eε,tv (t, v)dtdv are given in the following lemma.
−1/2
Conditions
1–3.
If
εn´ = ´o(an ),
then
´ L´EMMA 2. Assume
πε,tv (t, v) − π(θ0 )gn (t, v)| dtdv → 0 in probability and Rd t(Bδ ) gn (t, v) dtdv =
Rd t(Bδ ) |e
´ ´
Θp (1), as n → ∞. Furthermore, for l ≤ 6, Rd t(Bδ ) Pl (v)gn (t, v) dtdv converges
´
−1/2
to
in distribution when cε < ∞ and converges to
Rd Pl (v)G(v) dv
´ |A(θ0 )|
P
{Ds(θ
)t}K{Ds(θ
)t}
dt
in
probability
when cε = ∞, as n → ∞.
p
0
0
l
R
e ε are asymptotically the same and gives an expansion
The following lemma states that Πε and Π
e
of θε .
−1/2
L EMMA 3. Assume Conditions 1–4. If εn = o(an ), then
e ε (θ ∈ B c | sobs ) are op (1);
(a) for any δ < δ0 , Πε (θ ∈ Bδc | sobs ) and Π
δ
e ε (θ ∈ A ∩ Bδ | sobs ) =
(b) there exists a δ < δ0 such that supA∈Bp Πε (θ ∈ A ∩ Bδ | sobs ) − Π
op (1);
(c) if, in addition, Condition 5 holds, then an,ε (θε − θeε ) = op (1), and θeε = θ0 +
1/2 W
−1
a−1
obs + εn β0 EGn (v) + rn,1 where the remainder rn,1 = op (an ).
n β0 A(θ0 )
Proof of Proposition 1. Lemma 10 in the Supplementary Material shows that Πε {an,ε (θ −
e ε {an,ε (θ − θeε ) ∈ A | sobs } have the same limit, in distribution when cε ∈
θε ) ∈ A | sobs } and Π
(0, ∞) and in total variation form when cε = 0 or ∞. Therefore it is sufficient to only consider
e ε of the properly scaled and centered θ.
the convergence of Π
e ε {an (θ − θeε ) ∈ A | sobs } equals
When an εn → cε < ∞, according to (4), Π
ˆ ˆ
e n (θ − θ0 ) ∈ A + an (θeε − θ0 ) | sobs + εn v}e
Π{a
πε,tv (t0 , v)(norm) dt0 dv.
Rd
t(Bδ )
14
By Lemma 1 and Lemma 3(c), we have
ˆ
N {t; µn (v), I(θ0 )−1 } dt = op (1),
e n (θ − θ0 ) ∈ A + an (θeε − θ0 ) | sobs + εn v} −
sup Π{a
A∈B p
A
where µn (v) = β0 {cε v − an εn EGn (v)} − an rn,1 . Then with Lemma 2, the leading term of
e ε {an (θ − θeε ) ∈ A | sobs } equals
Π
ˆ ˆ
ˆ
e
e
sup Πε {an (θ − θε ) ∈ A | sobs } −
N {t; µn (v), I(θ0 )−1 }gn (t0 , v)(norm) dtdt0 dv = op (1).
A∈B p
Rd
t(Bδ )
A
(5)
The numerator of the leading term of (5) is in the form
ˆ ˆ
ˆ
N {t; cε β0 v + x3 , I(θ0 )−1 }N {Ds(θ0 )t0 ; x1 v + x2 , A(θ0 )}K(v) dtdt0 dv,
Rd
t(Bδ )
A
where x1 ∈ R, x2 ∈ Rd and x3 ∈ Rp . This is continuous by Lemma 9 in the Supplementary
Material. Then since EGn (v) → EG (v) in distribution as n → ∞ by Lemma 2, we have
ˆ ˆ
ˆ
N {t; µn (v), I(θ0 )−1 }gn (t0 , v) dtdt0 dv
Rd t(Bδ ) A
ˆ ˆ ˆ
→
N [t; cε β0 {v − EG (v)}, I(θ0 )−1 ]g(t0 , v) dtdt0 dv,
Rd
Rp
A
in distribution as n → ∞. Putting the above results together, it holds that
ˆ ˆ
e ε {an (θ − θeε ) ∈ A | sobs } →
Π
N [t; cε β0 {v − EG (v)}, I(θ0 )−1 ]G(v)(norm) dvdt,
A
Rp
in distribution, and statement (ii) of the proposition holds.
When cε = 0, since µn (v) does not depend on v, (5) becomes
ˆ
e
e
N {t; −an εn β0 EGn (v) − an rn,1 , I(θ0 )−1 } dt = op (1),
sup Πε {an (θ − θε ) ∈ A | sobs } −
A∈B p
A
and by the continuous mapping theorem (van der Vaart, 2000),
ˆ
N {t; −an εn β0 EGn (v) − an rn,1 , I(θ0 )−1 } − N {t; 0, I(θ0 )−1 } dt = op (1).
Rp
´
e ε {an (θ − θeε ) ∈ A | sobs } − N {t; 0, I(θ0 )−1 } dt = op (1), and stateTherefore supA∈Bp Π
A
ment (i) of the proposition holds.
When cε = ∞, Lemma 1 cannot be applied to the posterior distribution within (4) directly.
e ε {θ ∈ A | sobs } equals,
With transformation v 00 = an εn v, Π
ˆ ˆ
−1 00 (norm) 0 00
e ∈ A | sobs + a−1 v 00 )e
Π(θ
πε,tv (t0 , a−1
dt dv ,
n
n εn v )
Rd
t(Bδ )
e ε {ε−1 (θ − θeε ) ∈ A | sobs } equals
which implies that Π
n
ˆ ˆ
−1 00 (norm)
e n (θ − θ0 ) ∈ an εn A + an (θeε − θ0 ) | sobs + a−1 v 00 }e
Π{a
πε,tv (t0 , a−1
dt0 dv 00 .
n
n εn v )
Rd
t(Bδ )
15
Then Lemma 1 can be applied. Using Lemma 2 and transforming v 00 back to v we have
e ε {ε−1 (θ − θeε ) ∈ A | sobs }
sup Π
n
A∈B p
ˆ
ˆ
ˆ
(an εn )p N {an εn t; µ0n (v), I(θ0 )−1 }gn (t0 , v)(norm) dtdt0 dv = op (1),
−
Rd
t(Bδ )
(6)
A
where µ0n (v) = β0 {A(θ0 )1/2 Wobs + an εn v} − an (θeε − θ0 ).
Let t00 (t, t0 ) = an εn (t − t0 ) + an (θeε − θ0 ) and t00 (A, Bδ ) be the set {t00 (t, t0 ) : t ∈ A, t0 ∈
t(Bδ )}. With transformations v 0 = v 0 (v, t0 ) and t00 = t00 (t, t0 ), since β0 Ds(θ0 ) = Ip , we have
ˆ ˆ
ˆ
(an εn )p N {an εn t; µ0n (v), I(θ0 )−1 }gn (t0 , v) dtdt0 dv
d
R
t(B ) A
ˆ ˆδ
ˆ
(an εn )p N {an εn (t − t0 ); β0 v 0 − an (θeε − θ0 ), I(θ0 )−1 }gn0 (t0 , v 0 ) dtdt0 dv 0
=
Rd t(Bδ ) A
ˆ
ˆ ˆ
1
00
0
−1 0
00
0
e
e
=
N {t ; β0 v − an (θε − θ0 ), I(θ0 ) }gn t −
{t − an (θε − θ0 )}, v dtdt00 dv 0 .
a n εn
Rd t00 (A,Bδ ) A
The idea now is that as n → ∞, an εn → ∞, so the gn0 term in the integral will tend to gn0 (t, v 0 ).
Then by integrating first with respect to t00 and then with respect to v, we get the required result.
To make this argument rigorous, consider the following function,
ˆ ˆ
ˆ
N {t00 ; β0 v 0 , I(θ0 )−1 }N {v 0 ; 0, A(θ0 )}
Rd
t00 (A,Bδ )
A
× K{Ds(θ0 )t + x1 v 0 − x2 t00 + x3 } − K{Ds(θ0 )t} dtdt00 dv 0 ,
where x1 ∈ R, x2 ∈ R and x3 ∈ Rd . This is continuous by Lemma 9 in the Supplementary Material, so by the continuous mapping theorem,
ˆ
ˆ ˆ
ˆ
1 00 0
00
0
−1 0
00 0
N {t ; β0 v , I(θ0 ) }gn t −
sup
t , v dtdt dv −
K{Ds(θ0 )t} dt = op (1).
an εn
A∈B p
A
Rd t00 (A,Bδ ) A
Then using Lemma 2,
ˆ
e ε {ε−1 (θ − θeε ) ∈ A | sobs } −
sup Π
n
A∈B p
ˆ
K{Ds(θ0 )t} dt/
A
K{Ds(θ0 )t} dt = op (1).
Rp
Therefore statement (iii) of the proposition holds.
Proof of Result from Section 3·2
The intuition behind this result is that, as shown above, the joint posterior of (θ, s) under
approximate Bayesian computation can be viewed as a marginal distribution for s times a conditional for θ given s. The latter is just the true posterior for θ given s, and this posterior converges
to a Gaussian limit that depends on s only through its mean. Regression adjustment works because it corrects for the dependence of this mean on s, so if we work with the regression adjusted
parameter θ∗ then the conditional distribution for θ∗ given s will tend to a Gaussian limit whose
mean is the same for all s.
The following lemma gives an expansion of the optimal linear coefficient matrix βε . The order
of the remainder leads to successful removal of the first order bias in the posterior distribution of
approximate Bayesian computation.
16
−3/5
L EMMA 4. Assume Conditions 1–6. Then if εn = o(an
), an εn (βε − β0 ) = op (1).
The following lemma, similar to Lemma 3, says that the approximate Bayesian computation
e ε . Recall that θ∗ is the mean of π ∗ (θ∗ |
posterior distribution of θ∗ is asymptotically the same as Π
ε
ε
´
∗
∗
∗
sobs ). Let π
eε (θ | sobs ) = Rd π
eε {θ + βε (s − sobs ), s | sobs } ds and θeε∗ be the mean of π
eε∗ (θ∗ |
sobs ).
−3/5
L EMMA 5. Assume Conditions 1–6. If εn = o(an ), then
e ε (θ∗ ∈ B c | sobs ) are op (1);
(a) for any δ < δ0 , Πε (θ∗ ∈ Bδc | sobs ) and Π
δ
∗
e ε (θ∗ ∈ A ∩ Bδ | sobs ) =
(b) there exists δ < δ0 such that supA∈Bp Πε (θ ∈ A ∩ Bδ | sobs ) − Π
op (1);
1/2 W
(c) an (θε∗ − θeε∗ ) = op (1), and θeε∗ = θ0 + a−1
obs + εn (β0 − βε )EGn (v) + rn,2
n β0 A(θ0 )
−1
where the remainder rn,2 = op (an ).
Proof of Theorem 1. Similar to the proof of Proposition 1, it is sufficient to only consider the
e ε of the properly scaled and centered θ∗ . Similar to (4),
convergence of Π
(´ ´
e ∈ A + εn βε v | sobs + εn v)e
Π(θ
πε,tv (t0 , v)(norm) dt0 dv,
e ε (θ∗ ∈ A | sobs ) = ´Rd ´t(Bδ )
Π
−1 π
0 −1 −1 (norm) dt0 dv,
e
ε,tv (t , an εn v)
Rd t(Bδ ) Π(θ ∈ A + εn βε v | sobs + an v)e
cε < ∞,
cε = ∞.
Similar to (5), by Lemma 1 and Lemma 5(c), we have
ˆ
e ε {an (θ∗ − θeε∗ ) ∈ A | sobs } −
sup Π
A∈B p
Rd
ˆ
ˆ
N {t; µ∗n (v), I(θ0 )−1 }gn (t0 , v)(norm) dtdt0 dv = op (1),
t(Bδ )
A
(7)
where
µ∗n (v) = {an εn (β0 − βε ) + (cε − an εn )β0 1cε <∞ }{v − EGn (v)} + an rn,2 .
Since
an εn (βε − β0 ) = op (1), by Lemma 9 in the Supplementary Material and the continuous
mapping theorem,
ˆ ˆ
ˆ
N {t; µ∗n (v), I(θ0 )−1 } − N {t; 0, I(θ0 )−1 } gn (t0 , v) dtdt0 dv = op (1).
Rd
t(Bδ )
Rp
Then we have
ˆ
e ε {an (θ∗ − θe∗ ) ∈ A | sobs } −
sup Π
ε
A∈B p
N {t; 0, I(θ0 )−1 } dt = op (1),
A
and the first convergence in the theorem holds.
The second convergence in the theorem holds by Lemma 5(c).
0
Since the only requirement for βε in the above is an εn (βε − βε ) = op (1), the above arguments
will hold if βε is replaced by a p × d matrix βbε satisfying an εn (βbε − βε ) = op (1).
Proof of Proposition 3. Consider θ∗ where βε is replaced by βbε . Let ηn = N 1/2 an εn (βbε −
βε ). Since βbε − βε = Op {(an εn )−1 N −1/2 } as n → ∞, ηn = Op (1) as n → ∞ and let its limit
be η. In this case, if we replace µ∗n (v) in (7) with µ∗n (v) + N −1/2 ηn {v − EGn (v)}, denoted by
µ
b∗n (v), the equation still holds. Denote this equation by (70 ). Limits of the leading term in (70 )
can be obtained by arguments similar as those for (5).
17
When cε < ∞, since for fixed v, µ
b∗n (v) converges to N −1/2 η{v − EG (v)} in distribution, by
following the same line we have
ˆ ˆ
∗
∗
e
e
N [t; N −1/2 η{v − EG (v)}, I(θ0 )−1 ]G(v)(norm) dvdt,
Πε {an (θ − θε ) ∈ A | sobs } →
A
Rp
in distribution as n → ∞.
cε = ∞, by ´Lemma 2 we have EGn (v) → 0 in probability, and
´ When
´
0
0
g
Rd t(Bδ ) n (t , v) dt dv → Rp K{Ds(θ0 )t} dt in probability. Then with transformation
v 0 = v 0 (v, t0 ), for fixed v,
1
1 0
1/2
∗
−1/2
0
v −
A(θ0 ) Wobs − EGn (v)
µ
bn (v) = {an εn (β0 − βε ) + N
ηn } Ds(θ0 )t +
an εn
an εn
→ N −1/2 ηDs(θ0 )t0 ,
in distribution as n → ∞. Recall that gn (t0 , v) dv = gn0 (t0 , v 0 ) dv 0 . Then by Lemma 9 in the Supplementary Material and the continuous mapping theorem,
ˆ ˆ
ˆ
N {t; µ
b∗n (v), I(θ0 )−1 }gn0 (t0 , v 0 ) dtdt0 dv
d
R
t(B ) A
ˆ ˆ δ ˆ
N {t; N −1/2 ηDs(θ0 )t0 , I(θ0 )−1 }K{Ds(θ0 )t0 } dtdt0 dv,
→
Rd
t(Bδ )
A
in distribution as n → ∞. Therefore by (70 ) and the above convergence results,
ˆ ˆ
e ε {an (θ∗ − θeε∗ ) ∈ A | sobs } →
Π
N {t; N −1/2 ηDs(θ0 )t0 , I(θ0 )−1 }K{Ds(θ0 )t0 }(norm) dt0 dt,
A
in distribution as n → ∞.
Rp
S UPPLEMENTARY M ATERIAL
Notations and Set-up
First
and conventions´ are given.
For two sets A and B, the sum of inte´ some limit notations
´
´
grals A f (x) dx + B f (x) dx is written as ( A + B )f (x) dx. For a constant d × p matrix A, let
the minimum and maximum eigenvalues of AT A be λ2min (A) and λ2max (A) where λmin (A) and
λmax (A) are non-negative. Obviously, for any p-dimension vector x, λmin (A)kxk ≤ kAxk ≤
λmax (A)kxk. For two matrices A and B, we say A is bounded by B or A ≤ B if λmax (A) ≤
λmin (B). For a set of matrices {Ai : i ∈ I} for some index set I, we say it is bounded if
λmax (Ai ) are uniformly bounded in i. Denote the identity matrix with dimension d by Id . Notations from the main text will also be used.
The following basic asymptotic results (Serfling, 2009) will be used throughout.
L EMMA 6. (i) For a series of random variables Zn , if Zn → Z in distribution as n → ∞,
Zn = Op (1). (ii) (Continuous mapping) For a series of continuous function gn (x), if gn (x) =
O(1) almost everywhere, then gn (Zn ) = Op (1), and this also holds if O(1) and Op (1) are replaced by Θ(1) and Θp (1).
Some notations regarding the posterior distribution of approximate Bayesian computation are
given. For A ⊂ Rp and a scalar function h(θ, s), let
ˆ ˆ
−d
πA (h) =
h(θ, s)π(θ)fn (s | θ)K{ε−1
n (s − sobs )}εn dsdθ,
A
Rd
18
and
ˆ ˆ
π
eA (h) =
A
Rd
−d
h(θ, s)πδ (θ)fen (s | θ)K{ε−1
n (s − sobs )}εn dsdθ.
e ε (θ ∈ A | sobs ) =
Then Πε (θ ∈ A | sobs ) = πA (1)/πP (1) and its normal counterpart Π
π
eA (1)/e
πP (1).
The following results from Li & Fearnhead (2018) will be used throughout.
L EMMA 7. Assume Conditions 1–4. Then as n → ∞,
(i) if Condition 5 also holds then, for any δ < δ0 , πBδc (1) and π
eBδc (1) are op (1), and
αδ
Op (e−an,ε cδ ) for some positive constants cδ and αδ depending on δ;
eA (1)| /e
πBδ (1) = Op (αn−1 );
eBδ (1){1 + Op (αn−1 )} and supA⊂Bδ |πA (1) − π
(ii) πBδ (1) = π
−1/2
eP (1) and πP (1) are
(iii) if εn = o(an ), π
eBδ (1) and πBδ (1) are Θp (ad−p
n,ε ), and thus π
d−p
Θp (an,ε );
−1/2
−3/5
(iv) if εn = o(an ) and Condition 5 holds, θε = θeε + op (a−1
), θε = θeε +
n,ε ). If εn = o(an
op (a−1
n ).
Proof. (i) is from Li & Fearnhead (2018, Lemma 3) and a trivial modification of its proof
when Condition 5 does no hold; (ii) is from Li & Fearnhead (2018, equation 13 of supplements);
(iii) is from Li & Fearnhead (2018, Lemma 5 and equation 13 of supplements); and (iv) is from
Li & Fearnhead (2018, Lemma 3 and Lemma 6).
Proof for Results in Section 3·1
e ∈ A | sobs + εn v) is the posterior
Proof of Lemma 1. For any fixed v ∈ Rd , recall that Π(θ
distribution given sobs + εn v with prior πδ (θ) and the misspecified model fen (· | θ). By Kleijn &
van der Vaart (2012), if there exist ∆n,θ0 and Vθ0 such that,
(KV1) for any compact set K ⊂ t(Bδ ),
sup log
t∈K
fen (sobs + εn v | θ0 + a−1
1
n t)
− tT Vθ0 ∆n,θ0 + tT Vθ0 t → 0,
2
fen (sobs + εn v | θ0 )
in probability as n → ∞, and
e n kθ − θ0 k > Mn | sobs + εn v)} → 0 as n → ∞ for any sequence of constants
(KV2) E{Π(a
Mn → ∞,
then
ˆ
e n (θ − θ0 ) ∈ A | sobs + εn v} −
sup Π{a
A∈B p
A
N (t; ∆n,θ0 , Vθ−1
) dt → 0,
0
in probability as n → ∞.
For (KV1), by the definition of fen (s | θ),
log
−2
−1
fen (sobs + εn v | θ0 + a−1
N {sobs + εn v; s(θ0 + a−1
n t)
n t), an A(θ0 + an t)}
= log
.
N {sobs + εn v; s(θ0 ), a−2
fen (sobs + εn v | θ0 )
n A(θ0 )}
As xT Ax − y T By = xT (A − B)x + (x − y)T B(x + y), for vectors x and y and matrices A
and B, by applying a Taylor expansion on s(θ0 + xt) and A(θ0 + xt) around x = 0, the right
19
hand side of above equation equals
a−1
n
T
−1
{Ds(θ0 + e(1)
t)t}
A(θ
)
ζ
(v,
t)
−
ζn (v, t)T
0
n
n
2
oT
a−1 n
+ n
D log A(θ0 + e(3)
t,
n t)
2
( p
X
)
Dθi A−1 (θ0 + e(2)
n t)ti
ζn (v, t)
i=1
(1)
(j)
where ζn (v, t) = A(θ0 )1/2 Wobs + an εn v − 12 Ds(θ0 + en t)t and for j = 1, 2, 3, en is a func(j)
tion of t satisfying |en | ≤ a−1
n which is from the remainder of the Taylor expansions. Since
Ds(θ), DA−1 (θ) and D log |A(θ)| are bounded in Bδ when δ is small enough,
sup log
t∈K
fen (sobs + εn v | θ0 + a−1
1
n t)
− tT I(θ0 )β0 {A(θ0 )1/2 Wobs + cε v} + tT I(θ0 )t → 0,
2
fen (sobs + εn v | θ0 )
in probability as n → ∞, for any compact set K. Therefore (KV1) holds with ∆n,θ0 =
β0 {A(θ0 )1/2 Wobs + cε v} and Vθ0 = I(θ0 ).
For (KV2), let rn (s | θ0 ) = αn {fn (s | θ0 ) − fen (s | θ0 )}. Since rn (s | θ0 ) is bounded by a
function integrable in Rd by Condition 4,
ˆ
e
e n kθ − θ0 k > Mn | s + εn v)fen (s | θ0 ) ds
E{Π(an kθ − θ0 k > Mn | sobs + εn v)} −
Π(a
d
R
ˆ
−1
≤αn
|rn (s | θ0 )| ds = o(1).
Rd
Then it is sufficient for the expectation under fen (s | θ0 ) to be o(1). For any constant M > 0,
with the transformation v̄ = an {s − s(θ0 )},
ˆ
e n kθ − θ0 k > Mn | s + εn v)fen (s | θ0 ) ds
Π(a
d
R
´
ˆ
ˆ
e(t, v̄ | v) dt
ktk>Mn π
´
N {v̄; 0, A(θ0 )} dv̄ +
N {v̄; 0, A(θ0 )} dv̄,
≤
e(t, v̄ | v) dt
kv̄k>M
kv̄k≤M
t(Bδ ) π
−1
−1
e
where π
e(t, v̄ | v) = πδ (θ0 + a−1
n t)fn {s(θ0 ) + an v̄ + εn v | θ0 + an t}. For the first term in the
above upper bound, it is bounded ´by a series which does not depend on M and is o(1) as Mn →
∞, as shown below. Obviously t(Bδ ) π
e(t, v̄ | v) dt can be lower bounded for some constant
mδ > 0. Choose δ small enough such that Ds(θ) and A(θ)1/2 are bounded for θ ∈ Bδ . Let λmin
and λmax be their common bounds. When kv̄k < M and Mn is large enough,
supθ∈Bδ kDs(θ)tk
{t : ktk > Mn } ⊂ t :
≥ kan εn v + v̄k .
(8)
2
Then since for any v̄ satisfying kv̄k < M , by a Taylor expansion,
−1
d
(1)
−1
fen {s(θ0 ) + a−1
n v̄ + εn v | θ0 + an t} = an N {Ds(θ0 + en t)t; v̄ + an εn v, A(θ0 + an t)},
π
e(t, v̄ | v) ≤ cN (λ−1
max λmin ktk/2; 0, 1), where c is some positive constant, for t in the right hand
side of (8). Then
´
ˆ
ˆ
e(t, v̄ | v) dt
ktk>Mn π
−1
´
N (λ−1
N {v̄; 0, A(θ0 )} dv̄ ≤ mδ c
max λmin ktk/2; 0, 1) dt,
π
e
(t,
v̄
|
v)
dt
kv̄k≤M
ktk>Mn
t(Bδ )
20
the right hand side of which is o(1) when Mn → ∞. Meanwhile by letting M → ∞, it can be
seen that the expectation under fen (s | θ0 ) is o(1). Therefore (KV2) holds and the lemma holds.
´
The following lemma is used for equations Rp gn (t, v) dt = |A(θ0 )|−1/2 Gn (v) and
´
−1/2 G(v).
Rp g(t, v) dt = |A(θ0 )|
L EMMA 8. For a rank-p d × p matrix A, a rank-d d × d matrix B and a d-dimension vector
c,
N (At; Bv + c, Id ) = N t; (AT A)−1 AT (c + Bv), (AT A)−1 g(v; A, B, c),
(9)
where P = AT A, and
g(v; A, B, c) =
1
(2π)(d−p)/2
1
T
T
−1 T
exp − (c + Bv) (I − A(A A) A )(c + Bv) .
2
Proof. This can be verified easily by matrix algebra.
The following lemma regarding the continuity of a certain form of integral will be helpful
when applying the continuous mapping theorem.
L EMMA 9. Let l1 , l10 , l2 , l20 and l3 be positive integers satisfying l10 ≤ l1 and l20 ≤ l2 . Let A and
B be l1 × l10 and l2 × l20 matrices, respectively, satisfying that AT A and B T B are positive definite. Let g1 (·), g2 (·) and g3 (·) be functions in Rl1 , Rl2 and Rl3 , respectively, that are integrable
and continuous almost everywhere. Assume:
(i) gj (·) is bounded in Rlj for j = 1, 2;
(ii) gj (w) depends on w only through kwk and is a decreasing function of kwk, for j = 1, 2;
and
´ Ql10 +l20 +l
(iii) there exists a non-negative integer l such that Rl3 k=1
wik g3 (w) dw < ∞ for any
coordinates (wi1 , . . . , wil0 +l0 +l ) of w.
1 2
Then the function,
ˆ ˆ ˆ
Pl (w1 , w2 , w3 ) |g1 (Aw1 + x1 w2 + x2 w3 + x3 ) − g1 (Aw1 )| g2 (Bw2 + x4 w3 + x5 )g3 (w3 ) dw3 dw2 dw1 ,
0
where x1 ∈ Rl1 ×l2 , x2 ∈ Rl1 ×l3 , x4 ∈ Rl2 ×l3 , x3 ∈ Rl1 and x5 ∈ Rl2 , is continuous almost everywhere.
Proof. Let mA and mB be the lower bound of A and B respectively. For any
0
(x01, . . . , x05 ) ∈ Rl1 ×l2 × Rl1 ×l3 × Rl2 ×l3 × Rl1 × Rl2 such that the integrand in the target
integral is continuous, consider any sequence (xn1 , . . . , xn5 ) converging to (x01, . . . , x05 ).
It is sufficient to show the convergence of the target function at (xn1 , . . . , xn5 ). Let
VA = {w1 : kAw1 k/2 ≥ sup(xn1 ,xn2 ,xn3 ) kxn1 w2 + xn2 w3 + xn3 k}, VB = {w2 : kBw2 k/2 ≥
sup(xn4 ,xn5 ) kxn4 w3 + xn5 k}, UA = {w1 : kw1 k ≤ 4m−1
A (kx01 w2 k + kx02 w3 k + kx03 k)} and
−1
UB = {w2 : kw2 k ≤ 4mB (kx04 w3 k + kx05 k)}. We have VAc ⊂ UA and VBc ⊂ UB . Then according to the following upper bounds and condition (iii),
|g1 (Aw1 + xn1 w2 + xn2 w3 + xn3 ) − g1 (Aw1 )| ≤ g1 (Aw1 + xn1 w2 + xn2 w3 + xn3 ) + g1 (Aw1 ),
g1 (Aw1 + xn1 w2 + xn2 w3 + xn3 ) ≤ ḡ1 (mA kw1 k/2)1{w1 ∈VA } + sup g1 (w)1{w1 ∈UA } ,
w∈Rl1
g2 (Bw2 + x4 w3 + x5 ) ≤ ḡ2 (mB kw2 k/2)1{w2 ∈VB } + sup g2 (w)1{w2 ∈UB } ,
w∈Rl2
21
where g1 (w) = ḡ1 (kwk) and g2 (w) = ḡ2 (kwk), by applying the dominated convergence theorem, the target function at (xn1, . . . , xn5 ) converges to its value at (x01, . . . , x05 ).
Proof of Lemma 2. The first part holds according to Lemma 5 of Li & Fearnhead (2018). For
the second part, when cε = ∞, by the transformation v 0 = v 0 (v, t),
ˆ
ˆ
ˆ
ˆ
Pl Ds(θ0 )t +
Pl (v)gn (t, v) dtdv =
Rd
Rd
t(Bδ )
t(Bδ )
1 0
1
v −
A(θ0 )1/2 Wobs gn0 (t, v 0 ) dtdv 0 .
a n εn
a n εn
By applying Lemma 9 and the continuous
´ ´mapping theorem in Lemma 6 to the right hand
side of the above when cε = ∞, and to Rd t(Bδ ) Pl (v)gn (t, v) dtdv when cε < ∞, and using
´
−1/2 G(v), the lemma holds.
Rp g(t, v) dt = |A(θ0 )|
Proof of Lemma 3. (a), (b) and the first part of (c) hold immediately by Lemma 7. The second
part of (c) is stated in the proof of Theorem 1 of Li & Fearnhead (2018).
L EMMA 10. Assume conditions 1–5.
e ε {an (θ − θeε ) ∈ A | sobs } have the
(i) If cε ∈ (0, ∞) then Πε {an (θ − θε ) ∈ A | sobs } and Π
same limit in distribution.
(ii) If cε = 0 or cε = 0∞ then
e ε {an,ε (θ − θeε ) ∈ A | sobs } = op (1).
supA∈Bp Πε {an,ε (θ − θε ) ∈ A | sobs } − Π
(iii) If Condition 6 holds then
e ε {an (θ∗ − θeε∗ ) ∈ A | sobs } = op (1).
supA∈Bp Πε {an (θ∗ − θε∗ ) ∈ A | sobs } − Π
Proof. Let λn = an,ε (θε − θeε ), and by Lemma 3(c), λn = op (1). When cε ∈ (0, ∞), for any
A ∈ B p , decompose Πε {an (θ − θε ) ∈ A | sobs } into the following three terms,
h
i
e ε {an (θ − θε ) ∈ A | sobs }
Πε {an (θ − θε ) ∈ A | sobs } − Π
h
i
e ε {an (θ − θeε ) ∈ A + λn | sobs } − Π
e ε {an (θ − θeε ) ∈ A | sobs }
+ Π
e ε {an (θ − θeε ) ∈ A | sobs }.
+Π
For (i) to hold, it is sufficient that the first two terms in the above are op (1). The first term is
e ε {an (θ − θeε ) ∈
op (1) by Lemma 3. For the second term to be op (1), given the leading term of Π
A | sobs } stated in the proof of Proposition 1 in the main text, it is sufficient that
ˆ
v∈Rd
ˆ
−
sup
A+λn
N {t; µn (v), I(θ0 )−1 } dt = op (1).
A
´
´
This holds by noting that the left hand side of the above is bounded by ( A+λn − A )c dt for
some constant c and this upper bound is op (1) since λn = op (1). Therefore (i) holds.
22
e ε {an,ε (θ − θeε ) ∈ A | sobs }
When cε = 0 or ∞, supA∈Bp Πε {an,ε (θ − θε ) ∈ A | sobs } − Π
is bounded by
e ε {an,ε (θ − θε ) ∈ A | sobs }
supA∈Bp Πε {an,ε (θ − θε ) ∈ A | sobs } − Π
ˆ
e
e
ψ(t) dt
+supA∈Bp Πε {an,ε (θ − θε ) ∈ A + λn | sobs } −
A+λn
ˆ
e ε {an,ε (θ − θeε ) ∈ A | sobs } −
+supA∈Bp Π
ψ(t) dt
A
ˆ
ˆ
ψ(t) dt .
+supA∈Bp
ψ(t) dt −
(10)
A
A+λn
With similar arguments as before, the first three
´ terms are op (1). For the fourth term, by transforming t to t + λn , it is upper bounded by Rp |ψ(t − λn ) − ψ(t)| dt which is op (1) by the
continuous mapping theorem. Therefore (ii) holds.
For (iii), the left hand side of the equation has the decomposed upper bound similar to (10),
with θ, θε , θeε and ψ(t) replaced by θ∗ , θε∗ , θeε∗ and N {t; 0, I(θ0 )−1 }. Then by Lemma 5, using
the leading term of Πε {an (θ∗ − θε∗ ) ∈ A | sobs } stated in the proof of Theorem 1, and similar
arguments to those used for the fourth term of (10), it can be seen that this upper bound is op (1).
Therefore (iii) holds.
Proof for Results in Section 3·2
To prove Lemmas 4 and 5, some notation regarding the regression adjusted approximate
Bayesian computation posterior, similar to those defined previously, are needed. Consider transp
p
d
formations t´= t(θ)
´ and v = v(s). For A ⊂ R and the scalar function h(t, v) in R × R , let
π
eA,tv (h) = t(A) Rd h(t, v)e
πε,tv (t, v) dvdt.
Proof of Lemma 4. Since βε = covε (θ, s)varε (s)−1 , to evaluate the covariance matrices, we
need to evaluate πRp {(θ − θ0 )k1 (s − sobs )k2 }/πRp (1) for (k1 , k2 ) = (0, 0), (1, 0), (1, 1), (0, 1)
and (0, 2).
First of all, we show that πBδc {(θ − θ0 )k1 (s − sobs )k2 } is ignorable for any δ < δ0 by showing
αδ
that it is Op (e−an,ε cδ ) for some positive constants cδ and αδ . By dividing Rd into {v : kεn vk ≤
δ 0 /3} and its complement,
ˆ
(s − sobs ) fn (s | θ)K
sup
θ∈Bδc
k2
Rd
θ∈Bδc
+
ε−d
n ds
ˆ
(
≤ sup
s − sobs
εn
sup
ks−sobs k≤δ 0 /3
(s − sobs )k2 K
fn (s | θ)
0
−d
K{λmin (Λ)ε−1
n δ /3}εn
ˆ
Rd
s − sobs
εn
(s − sobs )k2 fn (s | θ) ds.
)
ε−d
n ds
(11)
Rd
By Condition 2(ii), Condition 6 and following the arguments in the proof of Lemma 3 of Li &
αδ
Fearnhead (2018), the right hand side of (11) is Op (e−an,ε cδ ), which is sufficient for πBδc {(θ −
αδ
θ0 )k1 (s − sobs )k2 } to be Op (e−an,ε cδ ).
23
For the integration over Bδ , by Lemma 7 (ii),
π
eBδ ,tv (tk1 v k2 )
πBδ {(θ − θ0 )k1 (s − sobs )k2 }
−k1 k2
= an,ε εn
+
πBδ (1)
π
eBδ ,tv (1)
´
´ k k
)
−1 t)K(v) dvdt
1 v 2 π(θ + a−1 t)r (s
t
+
ε
v
|
θ
+
a
0
n
n
0
obs
n,ε
n,ε
t(B
)
δ
{1 + Op (αn−1 )}
αn−1
π
eBδ ,tv (1)
where rn (s | θ) is the scaled remainder αn {fn (s | θ) − fen (s | θ)}. In the above, the second term
in the first brackets is Op (αn−1 ) by the proof of Lemma 6 of Li & Fearnhead (2018). Then
π
eBδ ,tv (tk1 v k2 )
πBδ {(θ − θ0 )k1 (s − sobs )k2 }
−k1 k2
−1
= an,ε εn
+ Op (αn ) ,
πBδ (1)
π
eBδ ,tv (1)
and the moments π
eBδ ,tv (tk1 v k2 )/e
πBδ ,tv (1) need to be evaluated. Theorem 1 of Li & Fearnhead
(2018) gives the value of π
eBδ ,tv (t)/e
πBδ ,tv (1), and this is obtained by substituting the leading
term of π
eε,tv (t, v), that is π(θ0 )gn (t, v) as stated in Lemma 2, into the integrands. The other
moments can be evaluated similarly, and give
−1
bn β0 {A(θ0 )1/2 Wobs + an εn EGn (v)},
(k1 , k2 ) = (1, 0),
k
k
1/2 W
T )}, (k , k ) = (1, 1),
π
eBδ ,tv (t 1 v 2 )
b−1
β
{A(θ
)
E
(v]
+
a
ε
E
(vv
0
0
n n Gn
1 2
obs Gn
n
=
π
eBδ ,tv (1)
E
(v),
(k
1 , k2 ) = (0, 1),
Gn
T
EGn (vv ),
(k1 , k2 ) = (0, 2),
2 4
+ Op (a−1
n,ε ) + Op (an εn ),
(12)
where bn = 1 when cε < ∞, and an εn when cε = ∞. By Lemma 2, EGn (vv T ) = Θp (1). Since
−2/5
−2/5
αn−1 = o(an ), covε (θ, s) =ε2n β0 varGn (v) + op (an ε2n ) and varε (s) = ε2n varGn (v){1 +
−2/5
op (an )}. Thus
βε = β0 + op (a−2/5
),
n
and the lemma holds.
´ ´
(13)
−d
For A ⊂ Rp and B ⊂ Rd , let π(A, B) = A B π(θ)fn (s | θ)K{ε−1
n (s − sobs )}εn dsdθ and
´ ´
−d
π
e(A, B) = A B π(θ)fen (s | θ)K{ε−1
n (s − sobs )}εn dsdθ. Denote the marginal mean values
of s for πε (θ, s | sobs ) and π
eε (θ, s | sobs ) by sε and seε respectively.
Proof of Lemma 5. For
(a),
write
Πε (θ∗ ∈ Bδc | sobs )
as
π[Rp , {s : θ∗ (θ, s) ∈
d−p
p
d
By Lemma 7, π(R , R ) = πP (1) = Θp (an,ε ). By the triangle inequality,
Bδc }]/π(Rp , Rd ).
c
π[Rp , {s : θ∗ (θ, s) ∈ Bδc }] ≤ π(Bδ/2
, Rd ) + π[Bδ/2 , {s : kβε (s − sobs )k ≥ δ/2}],
(14)
and it is sufficient that the right hand side of the above inequality is op (1). Since its first term is
c (1), by Lemma 7 the first term is op (1).
πBδ/2
−7/5
−7/5
When εn = Ω(an ) or Θ(an ), by (13), βε − β0 = op (1) and so βε is bounded in probability. For any constant βsup > 0 and β ∈ Rp×d satisfying β ≤ βsup ,
δ
π[Bδ/2 , {s : kβ(s − sobs )k ≥ δ/2}] ≤ K ε−1
ε−d
n ,
2βsup
and by Condition 2(iv), the second term in (14) is op (1).
24
−7/5
When εn = o(an ), βε is unbounded and the above argument does not apply. Let δ1 be a
constant less than δ0 such that inf θ∈Bδ1 /2 λmin {A(θ)−1/2 } ≥ m and inf θ∈Bδ1 /2 λmin {Ds(θ)} ≥
m for some positive constant m. In this case, it is sufficient to consider δ < δ1 . By Condition 4,
rn (s | θ) ≤ adn |A(θ)|1/2 rmax [an A(θ)−1/2 {s − s(θ)}].
Using the transformation t = t(θ) and v = v(s), fn (s | θ) = fen (s | θ) + αn−1 rn (s | θ) and applying the Taylor expansion of s(θ0 + xt) around x = 0,
π[Bδ/2 , {s : kβε (s − sobs )k ≥ δ/2}] ≤
ˆ
ˆ
−1/2
1/2
c
N [A(θ0 + a−1
{Ds(θ0 + e(1)
Wobs − an εn v}; 0, Id ]K(v) dvdt
n t)
n t)t − A(θ0 )
t(Bδ/2 )
ˆ
kβε εn vk≥δ/2
ˆ
+c
t(Bδ/2 )
kβε εn vk≥δ/2
−1/2
1/2
rmax [A(θ0 + a−1
{Ds(θ0 + e(1)
Wobs − an εn v}]K(v) dvdt,
n t)
n t)t − A(θ0 )
for some positive constant c. To show that the right hand side of the above inequality is op (1),
consider a function g4 (·) in Rd satisfying that g4 (v) can be written as g 4 (kvk) and g 4 (·) is
−1/2 , C (t) = Ds(θ + ξ ) and c = A(θ )1/2 W
decreasing. Let An (t) = A(θ0 + a−1
n
0
1
0
obs . For
n t)
p
c
each n divide R into Vn = {t : kCn (t)tk/2 ≥ kc + an εn vk} and Vn . In Vn , kAn (t){Cn (t)t −
c − an εn v}k ≥ m2 ktk/2 and in V c , ktk ≤ 2m−1 kc + an εn vk. Then
ˆ
ˆ
g4 [An (t){Cn (t)t − c − an εn v}]K(v) dvdt
t(Bδ/2 )
ˆ
kβε εn vk≥δ/2
(ˆ
≤
kβε εn vk≥δ/2
where
´
c
Vn
ˆ
2
Rp
g 4 (m ktk/2) dt + sup g4 (v)
v∈Rp
)
1 dt K(v) dv,
c
Vn
1 dt is the volume of Vnc in Rp . Then since βε εn = op (1), an εn = op (1) and
´
Vnc
1 dt
vkp , the right hand side of the above inequality is o
is proportional to kc + an εn
p (1). This implies
π(Bδ/2 , {s : kβε (s − sobs )k ≥ δ/2}) = op (1).
e ε (θ∗ ∈ B c | sobs ), since the supTherefore in both cases Πε (θ∗ ∈ Bδc | sobs ) = op (1). For Π
δ
e ε (θ∗ ∈ B c | sobs ) = 0.
port of its prior is Bδ , there is no probability mass outside Bδ , i.e. Π
δ
Therefore (a) holds.
For (b),
e ε (θ∗ ∈ Aθ ∩ Bδ | sobs )
supA∈Bp Πε (θ∗ ∈ Aθ ∩ Bδ | sobs ) − Π
supA∈Bp |π(Rp , {s : θ∗ (θ, s) ∈ Aθ ∩ Bδ }) − π
e(Rp , {s : θ∗ (θ, s) ∈ Aθ ∩ Bδ })|
+ op (1)
π
eBδ (1)
´ ´
−d
π(θ)|rn (s | θ)|K{ε−1
n (s − sobs )}εn dsdθ
−1 Bδ Rd
≤αn
+ op (1).
π
eBδ (1)
=
Then by the proof of Lemma 6 of Li & Fearnhead (2018), (b) holds.
For (c), to begin with, an (θε∗ − θeε∗ ) = an (θε − θeε ) − an βε (sε − seε ). By Lemma 7, an (θε −
θeε ) = op (1). For an βε (sε − seε ), similar to the arguments of the proof of Lemma 4,
π
eBδ,tv (v)
π
eB (v)
−1
sε − sobs = εn
+ Op (αn ) {1 + Op (αn−1 )}, seε − sobs = εn δ,tv
{1 + Op (αn−1 )}.
π
eBδ,tv (1)
π
eBδ,tv (1)
25
−3/5
Then an βε (sε − seε ) = Op (αn−1 an εn ) which is op (1) if εn = o(an ). Therefore the first part
of (c) holds. Since θeε∗ = θeε − βε (e
sε − sobs ), by the expansion of θeε in Lemma 3(c), the above
expansion of seε − sobs and (12), the second part of (c) holds.
Proof for Results in Section 3·3
Proof of Theorem 2. The integrand of pacc,q is similar to that of πRp (1). The expansion of
πRp (1) is given in Lemma 7(ii), and following the same reasoning, pacc,q can be expanded as
´ ´
εdn Bδ Rd qn (θ)fe(sobs + εn v | θ)K(v) dvdθ{1 + op (1)}. With transformation t = t(θ), plugging the expression of qn (θ) and π
eε,tv (t, v) gives that
ˆ
π
eε,tv (t, v)
−1
(rn,ε )−p q(rn,ε
t − cµ )
pacc,q = (an,ε εn )d
dvdt{1 + op (1)},
πδ (θ0 + a−1
t(Bδ )
n,ε t)
where rn,ε = σn /a−1
n,ε and cµ,n = σn (µn − θ0 ). By the assumption of µn , denote the limit of
cµ,n by cµ . Then by Lemma 2, pacc,q can be expanded as
ˆ
−1
pacc,q = (an,ε εn )d
(rn,ε )−p q(rn,ε
t − cµ,n )gn (t, v) dvdt{1 + op (1)}.
(15)
t(Bδ )×Rd
Denote the leading term of the above by Qn,ε .
For (1), when cε = 0, since supt∈Rp gn (t, v) ≤ c1 K(v) for some positive constant c1 , Qn,ε
is upper bounded by (an εn )d c1 almost surely. Therefore pacc,q → 0 almost surely as n → ∞.
When rn,ε → ∞, since q(·) is bounded
in Rp by some positive constant c2 , Qn,ε is upper
´
−p
d
bounded by (rn,ε ) c2 (an,ε εn ) Rp ×Rd gn (t, v) dvdt. Therefore pacc,q → 0 in probability as
´
n → ∞ since Rp ×Rd gn (t, v) dvdt = Θp (1) by Lemma 2.
−1 t(θ) − c
For (2), let t̃(θ) = rn,ε
µ,n and t̃(A) be the set {φ : φ = t̃(θ) for some θ ∈ A}. Since
−1
t̃ = σn (θ − θ0 ) − cµ,n and σn−1 → ∞, t̃(Bδ ) converges to Rp in probability as n → ∞. With
the transformation t̃ = t̃(θ),
(
´
(an εn )d t̃(Bδ )×Rd q(t̃)gn {rn,ε (t̃ + cµ,n ), v} dt̃dv, cε < ∞,
Qn,ε = ´
0
0
0
cε = ∞.
t̃(Bδ )×Rd q(t̃)gn {rn,ε (t̃ + cµ,n ), v } dt̃dv ,
By Lemma 9 and the continuous mapping theorem,
( ´
cd p d q(t̃)g{r1 (t̃ + cµ ), v} dt̃dv,
Qn,ε → ´ε R ×R
Rp ×Rd q(t̃)g{r1 (t̃ + cµ ), v} dt̃dv,
cε < ∞,
cε = ∞,
in distribution as n → ∞. Since the limits above are Θp (1), pacc,q = Θp (1).
´ For (3), when cε = ∞ and r1 = 0, in the above, the limit of Qn,ε in distribution is
Rp ×Rd q(t̃)g(0, v) dt̃dv = 1. Therefore pacc,q converges to 1 in probability as n → ∞.
R EFERENCES
B EAUMONT, M. A. (2010). Approximate Bayesian computation in evolution and ecology. Annual Review of Ecology,
Evolution, and Systematics 41, 379–406.
B EAUMONT, M. A., C ORNUET, J.-M., M ARIN , J.-M. & ROBERT, C. P. (2009). Adaptive approximate Bayesian
computation. Biometrika 96, 983–990.
B EAUMONT, M. A., Z HANG , W. & BALDING , D. J. (2002). Approximate Bayesian computation in population
genetics. Genetics 162, 2025–2035.
B LUM , M. G. (2010). Approximate Bayesian computation: a nonparametric perspective. Journal of the American
Statistical Association 105, 1178–1187.
26
B ONASSI , F. V. & W EST, M. (2015). Sequential Monte Carlo with adaptive weights for approximate Bayesian
computation. Bayesian Analysis 10, 171–187.
C ALVET, L. E. & C ZELLAR , V. (2015). Accurate methods for approximate Bayesian computation filtering. Journal
of Financial Econometrics 13, 798–838.
C HERNOZHUKOV, V. & H ONG , H. (2003). An MCMC approach to classical estimation. Journal of Econometrics
115, 293–346.
C ORNUET, J.-M., S ANTOS , F., B EAUMONT, M. A., ROBERT, C. P., M ARIN , J.-M., BALDING , D. J., G UILLE MAUD , T. & E STOUP, A. (2008). Inferring population history with DIY ABC: a user-friendly approach to approximate Bayesian computation. Bioinformatics 24, 2713–2719.
D ROVANDI , C. C. & P ETTITT, A. N. (2011). Estimation of parameters for macroparasite population evolution using
approximate Bayesian computation. Biometrics 67, 225–233.
D ROVANDI , C. C., P ETTITT, A. N. & L EE , A. (2015). Bayesian indirect inference using a parametric auxiliary
model. Statistical Science 30, 72–95.
D UFFIE , D. & S INGLETON , K. J. (1993). Simulated moments estimation of Markov models of asset prices. Econometrica 61, 929–952.
F EARNHEAD , P. & P RANGLE , D. (2012). Constructing summary statistics for approximate Bayesian computation:
semi-automatic approximate Bayesian computation (with Discussion). Journal of the Royal Statistical Society:
Series B (Statistical Methodology) 74, 419–474.
F ILIPPI , S., BARNES , C. P., C ORNEBISE , J. & S TUMPF, M. P. (2013). On optimality of kernels for approximate
Bayesian computation using sequential Monte Carlo. Statistical Applications in Genetics and Molecular Biology
12, 87–107.
F RAZIER , D. T., M ARTIN , G. M., ROBERT , C. P. & ROUSSEAU , J. (2016). Asymptotic Properties of Approximate
Bayesian Computation. arXiv.1607.06903 .
G OURI ÉROUX , C. & RONCHETTI , E. (1993). Indirect inference. Journal of Applied Econometrics 8, s85–s118.
H EGGLAND , K. & F RIGESSI , A. (2004). Estimating functions in indirect inference. Journal of the Royal Statistical
Society, Series B (Statistical Methodology) 66, 447–462.
K LEIJN , B. & VAN DER VAART, A. (2012). The Bernstein-von-Mises theorem under misspecification. Electronic
Journal of Statistics 6, 354–381.
L ENORMAND , M., JABOT, F. & D EFFUANT, G. (2013). Adaptive approximate Bayesian computation for complex
models. Computational Statistics 28, 2777–2796.
L I , W. & F EARNHEAD , P. (2018). On the asymptotic efficiency of approximate Bayesian computation estimators.
Biometrika , to appear.
M ARIN , J.-M., P ILLAI , N. S., ROBERT, C. P. & ROUSSEAU , J. (2014). Relevant statistics for Bayesian model
choice. Journal of the Royal Statistical Society: Series B (Statistical Methodology) 76, 833–859.
M ARJORAM , P., M OLITOR , J., P LAGNOL , V. & TAVARE , S. (2003). Markov chain Monte Carlo without likelihoods.
Proceedings of the National Academy of Sciences 100, 15324–15328.
PAULI , F., R ACUGNO , W. & V ENTURA , L. (2011). Bayesian composite marginal likelihoods. Statistica Sinica 21,
149–164.
R IBATET, M., C OOLEY, D. & DAVISON , A. C. (2012). Bayesian inference from composite likelihoods, with an
application to spatial extremes. Statistica Sinica 22, 813–845.
RULI , E., S ARTORI , N. & V ENTURA , L. (2016). Approximate Bayesian computation with composite score functions. Statistics and Computing 26, 679–692.
S ERFLING , R. J. (2009). Approximation theorems of mathematical statistics, vol. 162. John Wiley & Sons.
S OUBEYRAND , S. & H AON -L ASPORTES , E. (2015). Weak convergence of posteriors conditional on maximum
pseudo-likelihood estimates and implications in ABC. Statistics & Probability Letters 107, 84–92.
T ONI , T., W ELCH , D., S TRELKOWA , N., I PSEN , A. & S TUMPF, M. P. (2009). Approximate Bayesian computation
scheme for parameter inference and model selection in dynamical systems. Journal of the Royal Society Interface
6, 187–202.
VAN DER VAART, A. W. (2000). Asymptotic Statistics. Cambridge University Press, Cambridge.
VARIN , C., R EID , N. & F IRTH , D. (2011). An overview of composite likelihood methods. Statistica Sinica 21, 5–42.
W EGMANN , D., L EUENBERGER , C. & E XCOFFIER , L. (2009). Efficient approximate Bayesian computation coupled
with Markov chain Monte Carlo without likelihood. Genetics 182, 1207–1218.
W OOD , S. N. (2010). Statistical inference for noisy nonlinear ecological dynamic systems. Nature 466, 1102–1104.
| 10math.ST
|
arXiv:1609.08395v2 [stat.ME] 3 Feb 2017
Appraisal of data-driven and mechanistic
emulators of nonlinear hydrodynamic urban
drainage simulators
Juan Pablo Carbajal1 , João Paulo Leitão1 , Carlo Albert1 , and Jörg
Rieckermann1
1
Swiss Federal Institute of Aquatic Science and Technology,
Eawag, Überlandstrasse 133, 8600 Dübendorf, Switzerland
February 6, 2017
Abstract
Many model based scientific and engineering methodologies, such as system identification, sensitivity analysis, optimization and control, require a
large number of model evaluations. In particular, model based real-time control of urban water infrastructures and online flood alarm systems require
fast prediction of the network response at different actuation and/or parameter values. General purpose urban drainage simulators are too slow for this
application. Fast surrogate models, so-called emulators, provide a solution
to this efficiency demand. Emulators are attractive, because they sacrifice
unneeded accuracy in favor of speed. However, they have to be fine-tuned to
predict the system behavior satisfactorily. Also, some emulators fail to extrapolate the system behavior beyond the training set. Although, there are
many strategies for developing emulators, up until now the selection of the
emulation strategy remains subjective. In this paper, we therefore compare
the performance of two families of emulators for open channel flows in the
context of urban drainage simulators. We compare emulators that explicitly use knowledge of the simulator’s equations, i.e. mechanistic emulators
based on Gaussian Processes, with purely data-driven emulators using matrix factorization. Our results suggest that in many urban applications, naive
data-driven emulation outperforms mechanistic emulation. Nevertheless, we
discuss scenarios in which we think that mechanistic emulation might be favorable for i) extrapolation in time and ii) dealing with sparse and unevenly
sampled data. We also provide many references to advances in the field of
Machine Learning that have not yet permeated into the Bayesian environmental science community.
1
Introduction
For many real-world systems with a nonlinear response, model based tasks
such as sensitivity analysis, learning model parameters from data (i.e. system identification or model calibration), and real-time control, are hampered
by the long runtime of the employed numerical simulators. Even if runtimes
1
are short, these methods require a large number of model runs, which can
take a prohibitive long time. One way of speeding up these tasks is to build
fast surrogate models, so called emulators, to replace the computationally expensive simulators. An emulator is a numerical model that is tailored to approximate the results of a computationally expensive simulator with a huge
reduction in the time needed to run a simulation [O’Hagan, 2006], i.e. it is
a metamodel. These ideas also belong to the technique of Reduced-Order
Models (ROM), specially for models based on Partial Differential Equations
(PDE) [Baur et al., 2014, Quarteroni et al., 2016], and emulation as described
below.
To ground ideas, imagine that the flow at the outlet of a drainage network
is limited using a flow limiting gate or by activating water storage systems
(Fig. 1). The position of the gate and the activation of storage is controlled using a model predictive controller [Xi et al., 2013]. Such a scenario is relevant
in performance optimization of water treatment plants [Fu et al., 2008]. The
signals used to control the flows could be the current intensity and duration
of rain events from several rain gauges within the catchment. The controller
needs to estimate an optimal course of action by predicting the flows induced
by the rain and many possible actuations. This optimization generally requires thousands of model runs, which can take a prohibitive long time when
running a physically detailed simulator of the sewer network, such as a EPA
Storm Water Management Model (SWMM) model [Rossman, 2010]. However, the simulator is just used to estimate the relation between the rain,
the actuation, and the flow. The full details of the simulator might not be
required to obtain an accurate estimation of this relation. Feedback control
might further reduce the required accuracy of the estimated relation.
Emulation and interpolation are equivalent problems. An emulator is
built using the best available simulator to sample the space of actuations
and/or parameters (henceforth the latter will include actuations). The training data is then used to build an interpolation function which should predict
values at unseen parameters with an acceptable degree of accuracy, which is
case dependent. That is, we reconstruct an unknown function F : R|γ|+1 → R,
that takes a parameter vector of size |γ| and a time instant, and generates
the value of the magnitude of interest. When this function is evaluated at the
inputs used for training, the results are the same as the training outputs1 ,
i.e. this is the meaning of interpolation of the training data adopted herein.
Stated in this way, no distinction is needed between the parameters and the
time components in the input. However, knowing that the data is generated
by a dynamical system, we separate time from the other parameter components. Thus, we can find one interpolant in time and one in parameter space,
which might be coupled to each other. This parameter-time coupling emerges
naturally in mechanistic emulation, as will be shown in Sec. 2.2.
When the simulator is based on differential equations, the link between
Gaussian Processes (GP) and linear stochastic differential equations (SDE) [Poggio and Girosi, 1990, Steinke and Schölkopf, 2008, Albert, 2012, Särkkä et al.,
2013, González et al., 2014, Solin, 2014], permits the creation of GP based
emulators that include knowledge about the simulator dynamics; these are
called mechanistic emulators (MEMs). Conceptually, mechanistic emulation
seeks a function that interpolates the training data whithin a class of functions defined by an SDE. The importance of GPs for MEMs stems from the
fact that they are the formal solution of this SDE. Hence when the simulator is linear the emulator gives exact results; while for nonlinear simula1 Herein considered noiseless since they are generated by a deterministic simulator.
2
Figure 1: An imaginary drainage network with flow limiting gate and/or water storage
systems. The interesting singal is the level/flow at the outlet of the network, marked with
a circle. Isometric tiles from www.kenney.nl.
3
tors, the MEM will provide only an approximation. Increasing the accuracy
of this approximation and the efficiency of the methods are two fundamental
challenges in GP based emulation [O’Hagan, 2006, Rasmussen and Williams,
2006, Ch. 8].
Reichert et al. [2011] enumerated four overlapping approaches for developing emulators of dynamic simulators:
i) Gaussian Processes
ii) Basis function decompositions
iii) State space transition function approximation
iv) Stochastic linear model conditioned on data using Kalman smoothing.
In particular approaches i) and iv) are two different implementations of the
same problem [Steinke and Schölkopf, 2008]. Roughly speaking the Kalman
smoothing algorithm used in iv) is an iterative implementation of the conditioning of the GP in i). The iteration in iv) avoids the ill-conditioned covariance matrices [Hansen, 1998] involved in GP when sampling rates are
high [Steinke and Schölkopf, 2008, Reichert et al., 2011] and it is faster than
direct matrix inversion in a serial implementation. The GP approach i) is better suited for parallelization, speedups and energy saving via approximated
computing [Angerer et al., 2015].
Approaches i) (or iv)) and ii) are similar with respect to their implementation. That is, approach ii) can be implemented using GP regression [Rasmussen and Williams, 2006, sec. 2.7]. Therefore, the essential difference
between i) and ii) is that the former explicitly introduces mechanistic knowledge. It will be shown here that approach i) is currently constrained to
linear mechanistic knowledge, while popular methods based on maximum
entropy [Victor and Johannesma, 1986, Christakos, 1998, Harte, 2011] can
handle nonlinear knowledge. The difference between GP based mechanistic
emulation and maximum entropy methods is that in the latter, the mechanistic knowledge is added as constraints on the moments of the predictive
or posterior distribution, while in the former its is added as the dynamics of
the prior model. Adding constraints to predictive distributions require expert
knowledge available at the level of the emerging behavior of the simulator,
while adding dynamic information requires knowledge about the constitutive
elements parts of the simulator. The latter is likely to be readily available
from the development of the simulator itself.
Herein we compare the performance of GP emulators built using approaches i),
which we call mechanistic emulation, and ii) which we call data-driven emulation. The basis function that will be used for data-driven emulation will be
derived solely from the data using matrix factorization, i.e. they will not explicitly include mechanistic knowledge. In this article we use singular value
decomposition (SVD) and nonnegative matrix factorization (NMF) to extract
these bases (Sec. 2.1), but more general basis extraction methods like Proper
Orthogonal Decomposition (POD) could be used [Hesthaven et al., 2016]. We
compare results in an academic emulation problem to highlight the differences between the approaches (Sec. 3.1-3.2). We also provide emulation examples pertinent to the fields of hydrology and urban water management
(Sec. 3.3-3.4). In all of these, data-driven emulation outperforms mechanistic
emulation. The objective of this comparison is to provide intuition about the
suitability of each approach, which is not available to date to the best of our
knowledge, to highlight the need of enhancements of our emulators, and to
motivate research questions in the field of emulation. This is relevant, because, as described above, many applications in the field of urban drainage
4
and flood predictions to date are hampered by slow models. To a lesser degree, this is one of the few NMF applications in hydrology [Alexandrov and
Vesselinov, 2014].
2
Methods and Materials
In the subsequent sections we firstly describe the two emulation approaches
used herein (Sec. 2.1-2.2). Aiming at a wide readership, mathematical detail and rigor are kept at a minimum required level. References are provided
for the interested reader. Secondly, we describe the datasets used for training
and testing the emulators (Sec. 2.3). These include models of two small catchments in Switzerland, that we use to thoroughly evaluate the performance of
the emulators.
We use the word data to refer to the input and output pairs provided by
the simulator being emulated, e.g. in the case of a hydrodynamic simulator, inputs could be time and physical parameters of a sewer network, and
outputs water levels or flows.
2.1
Data-driven emulators
In this approach we make the following assumptions about the simulation
data used to build the emulator:
a) The data contains the most significant dynamic features of the system
response and these can be used as a time varying basis to reproduce the
data.
b) Unseen system responses are well approximated by a linear combination of the features in a), i.e. there exist a solution manifold that can be
well approximated with low dimensional sets [Quarteroni et al., 2016,
Hesthaven et al., 2016].
c) There exists a "smooth" mapping between inputs and the coefficients of
the linear combinations of features.
With these assumptions in mind we define the approximation strategy:
y(t, γ) '
q
X
β i (γ)φ i (t),
(1)
i =1
¢
β i (γ) ∼ GP m i (γ), K i (γ, γ0 )
¡
(2)
where y(t, γ) is the output of the simulator at time t and parameters γ, β i
is a mapping between©theseªparameters and the components of the output in
the basis function set φ i (t) . Following Rasmussen and Williams [2006, Sec.
2.7] this could be generalized to a full GP regression problem. However, as
stated here the problem is simpler and it is justified by the performance it
provides in the examples showcased in Sec. 3.
The procedure to build a data-driven emulator follows:
©
ª
©
ªn
i. Extract the first q ≤ n trn features φ i (t) using the training set yi (t, γ i ) i=trn1 .
This gives a q × n trn matrix B of coefficients (q coefficients for each simulation used for training) and the basis evaluated at the observed time
points Φ i j = φ j (t i ), i = 1, . . . , N, j = 1, . . . , q.
ii. Interpolate the B coefficients from step i. using a GP to obtain a function of the inputs B = f (γ).
5
iii. Evaluate f (γ) on the parameters in test set, use ©eq. (1) toª predict outn
puts, and compare them with the output test set yi (t, γ i ) i=tst1 .
©
ª
The features φ i (t) are extracted from the training data itself via matrix
factorization, which allows us to impose some general constraints on the features, e.g. nonnegativity. Herein we use the singular value decomposition
(SVD) and nonnegative matrix factorization (NMF), which are explained in
later pragraphs.
These methods provide the basis evaluated only at the observed time
points, Φ, and to predict at unobserved times we linearly interpolate them
over time. The implications of this interpolation will be discussed in Sec. 4.
This approach decouples the interpolation in time with the interpolation in
parameter space.
SVD is a robust factorization to calculate the eigenvectors of the covariance of the data matrix, i.e. the principal components. Given the matrix Y ∈
R N×n , SVD calculates the orthogonal matrices Φ ∈ R N×n and W ∈ Rn×n , and
n×n with only Σ 6= 0.
the element-wise nonnegative diagonal matrix Σ ∈ R+
ii
These matrices fulfill the relation
Y = ΦΣW > .
(3)
Using this factorization to calculate the covariance of the data matrix gives
Y Y > = ΦΣΣ> Φ> .
(4)
Showing that Φ are eigenvectors of the covariance matrix, i.e the principal
components of the data. A decomposition of Y in the form of eq. (1) is obtained
by defining B as the follows:
B = ΣW > ,
(5)
Y = ΦB.
(6)
The quality of approximation of the data degrades graciously with decreasing number of principal components. Hence, only the first q < n trn principal
components are used in general. This reduces the size of the representation
of the training data. In the context of ROM and PDE, this decomposion is
also know as Proper Orthogonal Decomposition (POD).
NMF provides an approximate minimum norm positive decomposition of
the data [Kim and Park, 2008]2 . Formally it solves the following problem:
Problem 1 (NMF). Given the matrix Y ∈ R N×n and q ∈ N with q ≤ n, find
N×q
q×n
matrices Φ ∈ R+ and B ∈ R+ such that they minimize
kY − ΦBk2 + akΦk2 + bkBk2 .
(7)
Where k · k is the Frobenius matrix norm and R+ is the set of nonnegative real
numbers.
Intuitively, NMF works as SVD but constraining the principal components
and the mixing coefficients to be nonnegative. The decomposition controls
the norm of the basis and its coefficients using two regularization terms
parametrized with weights a and b, which are manually tuned. The nonnegative basis provided by NMF might be readily interpreted in physical
terms in hydrological applications, yet the method is not widespread in the
community.
2 function nmf_bpas of GNU Octave’s linear-algebra package
linear-algebra/.
6
http://octave.sourceforge.net/
2.2
GP based mechanistic emulator (MEM)
The predictive mean of a GP in x conditioned on data observed at x0 , has the
following structure
y(x) = K (x, x0 )α + m (x),
¡
¢−1 ¡
¢
α = K (x0 , x0 ) + κ I
y(x0 ) − m (x0 ) .
(8)
(9)
where K and m stand for the covariance and the mean function of the prior
GP, respectively. The weights vector α is learned from the data at the conditioning step, requiring the inversion of the matrix obtained by evaluating
the covariance function at the observed inputs, shown in eq. (9). The regularization parameter κ encodes our trust on the prior knowledge and the error,
if any, of the observations y(x0 )3 .
A MEM is the GP in time and simulator parameters associated with an
input-driven linear stochastic ordinary differential equation (SODE) with a
multidimensional state space. Each component of the state space is defined
by an observed simulator’s parameter vector (γ i ). Extra components are reserved for prediction at unseen simulator’s parameter vectors4 .
The process of building a MEM requires the definition of
i. A linear prior model.
ii. The covariance and mean functions of the GP.
iii. A mapping from the parameters of the simulator to the parameters of
the GP.
In the following sections we obtain the mathematical expression of the covariance and mean functions of a first order linear time invariant (LTI) SODE,
and explain the construction of the mapping between parameter spaces. LTI
systems often arise, for example, from a finite element modeling of partial
differential equations.
For a rigorous and more general development, that include time varying
parameters, see Albert [2012]. The development for periodic difference equations was presented in Steinke and Schölkopf [2008] and extended to a more
general setting in González et al. [2014].
A LTI SODE in the vector-valued function
s(t) : R+ → R M ,
(10)
with initial condition s(0) = s 0 ∼ N ( s̄ 0 , Σ0 ), is defined by the equation
ds
(t) = A s(t) + u(t) + ξ(t),
dt
(11)
where
A ∈ R¢M × M , u(t) is a deterministic exogenous actuation, and ξ(t) ∼
¡
N 0, Σξ (t, t0 ) is a Gaussian noise term with covariance function
Σξ (t, t0 ) = Σδ(t − t0 ) Σ ∈ R M × M .
(12)
The general solution of this equation is
s(t) = eA t s 0 +
Z t
0
eA( t−τ) (u(τ) + ξ(τ)) dτ.
(13)
3 In the MEMs used herein, to obtain interpolation of the training data, we set the regularization
parameter to the machine epsilon.
4 typically only one component is reserved for this, but more could be used in a parallel setting.
7
where the first term is the solution of the homogenous ODE, i.e. with u(t)
and ξ both zero. The second term is the response of the ODE to the noisy
actuation.
As mentioned above, this system depends on the simulator’s parameters.
In general this means A(γ), Σξ (γ, γ0 ), u(t, γ), and potentially s 0 (γ).
2.2.1
Covariance function
We calculate the covariance function of the trajectories in eq. (13) using the
formula
h
i
K (t, r) = E (s(t) − E[s(t)]) (s(r) − E[s(r)])> ,
(14)
where s> indicates transposition and E is the ensemble average over initial
conditions and noise realizations.
The ensemble average of the solutions, E[s(t)], is solely determined by the
average of the homogeneous part (depending only on the initial condition)
and the deterministic actuation u, because the contribution of the noise term
ξ vanishes due to its zero mean value:
Z t
E[s(t)] = eA t s̄ 0 +
eA( t−τ) u(τ)dτ.
(15)
0
That is, the mean function is the solution to the deterministic (noise-free)
inhomogeneous ODE.
From eqs. (13) and (15) we obtain the factors in the expectation in eq. (14),
s(t) − E[s(t)] = eA t (s − s̄ 0 ) +
Z t
0
eA( t−τ) ξ(τ)dτ.
(16)
Inserting this in the expression for the covariance function, eq. (14), we obtain four terms. The first term is the covariance of the initial conditions. The
second term is a product of the integral of the noise term. The last two terms
are products of the initial conditions and the noise term; these terms will
vanish due to the independence of the initial condition and the noise term,
and due to the zero mean of the latter. Finally, we obtain:
>
K (t, r) = eA t Σ0 eA r +
Z tZ r
0
0
>
e A t Σ0 e A r +
>
eA( t−τ) Σδ(τ − ρ )eA (r−ρ ) dρ dτ =
Z min( t,r)
0
(17)
>
eA( t−µ) Σ eA (r−µ) dµ.
The second term can be recognized as the property of the covariance under
a linear transformation:
s = Gv
Σs = G (G Σv )> ,
(18)
where the matrix product should be interpreted as the application of the
integral
Z ∞
(Av)(t) =
A(t, µ)v(µ)dµ,
(19)
0
Z ∞
(AB)(t, r) =
A(t, µ)B(µ, r)dµ.
(20)
0
In our case G stands for the Green’s function of the linear operator
d
− A,
dt
8
(21)
which is
G(t, r) = H(t − r)eA( t−r) ,
(22)
with H the Heaviside or Step function. Its transpose (adjoint) is
>
G† (t, r) = H(r − t)eA (r− t) .
(23)
giving
³ ¡
¢† ´
G G Σξ (t, r) =
µZ ∞
¶†
Z ∞
G(t, µ)
G(µ, τ)Σδ(τ − r)dτ dµ =
0
0
Z ∞
G(t, µ)Σ G† (µ, r)dµ =
0
Z ∞
>
H(t − µ)H(r − µ)eA( t−µ) Σ eA (r−µ) dµ =
(24)
0
Z min( t,r)
0
>
eA( t−µ) Σ eA (r−µ) dµ
This implies that if the differential operator has a known Green’s function, then the covariance function of the GP can be calculated by transforming the covariance function Σ of the noisy input ξ. A more general and formal
treatment of this process is described in Kimeldorf and Wahba [1970] and the
relation between differential operators and kernels is summarized in Steinke
and Schölkopf [2008]. This covariance function computes the statistical interactions between the components of the LTI SODE. In other words, it provides the coupling of components of what is know as multi-output GP in the
machine learning community and cokriging in geostatistics [Rasmussen and
Williams, 2006, Sec. 9.1]. In Fricker et al. [2013] different structures of the
coupling between output components were studied, MEMs automatically derive the coupling structure from the available prior knowledge.
2.2.2
Linear prior
To determine the elements in the system matrix A in (11), we select a linear
model for each output in the training data corresponding to a simulator’s
parameter vector, which we call the linear proxy:
L i : R+ × R q → R d ,
(25)
t, θ i 7→ z(t, θ i ).
(26)
The q dimensional parameter vector θ i of the proxy depends on the simulator’s parameters used for the ith simulation, i.e. θ i (γ i ). The proxy’s output
dimension d is equal to dimension of each output in the training data, usually d = 1. The concatenated set of proxies defines the linear prior of the
MEM.
Herein, the proxies will be m dimensional linear time invariant (LTI)
ODEs, i.e. in state space form
ds
(t) = A(θ )s(t) + u(t, θ )
dt
A ∈ R m× m , u ∈ R m
C∈R
z(t) = Cs(t)
d ×m
(27)
(28)
Here all proxies have the same dimension m. Although this is not required
by the method, it is the simplest structure of MEMs [Albert, 2012]. Nevertheless, proxies with different dimensions might be better suited for dynamical systems with bifurcations, e.g. training data containing a mixture of
9
oscillating and converging time series, due to the presence of a Supercritical
Andronov-Hopf bifurcation [Kuznetsov, 2006] in the simulator.
The emulator’s linear prior is constructed by aggregating the proxies and
by coupling them with a noise term with a covariance that depends on the
simulator’s parameters, i.e
dS
(t) = A(Θ)S(t) + U(t, Θ) + ξ(t, Γ),
dt
Z(t) = C (Θ)S(t),
A∈R
mn×mn
, U, ξ ∈ R
mn×1
C ∈R
(29)
(30)
d×mn
.
Where Θ = θ i and Γ = γ i contain the corresponding n parameter vectors.
The matrix A is block diagonal, C is a horizontal concatenation, and U a
vertical concatenation:
©
ª
©
ª
A(θ1 )
A(Θ) =
..
u(t, θ1 )
..
,
.
u(t, θn )
U(t, Θ) =
.
A(θn )
,
C (Θ) = C(θ1 )
£
2.2.3
...
(31)
¤
C(θn ) .
Parameter mapping
To evaluate the matrices in eq. (31) we need a mapping from simulator’s
parameters γ to proxy’s parameters θ , , i.e. Γ 7→ Θ. It can be an ad-hoc
function derived from knowledge about the simulator, as was done in [Albert,
2012, Machac et al., 2016a,b] or it can be learned directly from the data. The
latter is especially useful if proxies with different dimensions are combined
to form the linear prior of the emulator.
A proxy’s parameter θ i can be learned from the data via optimization,
e.g. least squares fit of the data yi (T, γ i ) using z(T, θ i ). Alternatively, Θ
can be left as hyperparameters in the GP and estimated by maximizing the
likelihood. In any case, the obtained pairs (γ i , θ i ) are then used to learn a
mapping between the simulator’s and emulator’s parameter spaces.
2.2.4
Warped MEM
It is possible to add some nonlinear knowledge to a mechanistic emulator
when the simulator’s equations can be approximated with a Wiener model,
i.e. a time independent nonlinear function applied to the states of a linear
dynamical system. To do this we use Warped GPs [Snelson et al., 2003].
This modification does not affect the structure of the emulator, only the data
on which it is trained. In addition to the linear dynamical system parameters defining the prior, the parameters of the nonlinear function need to be
learned as well unless this mapping is explicitly given, e.g. from the linearization of a nonlinear ODE via a change of variables as in the Bernoulli
ODE [Hairer et al., 1993].
10
2.3
Datasets description
Simulated data used to build emulators are provided in a set of scalar signals
yi (t j©, γªi ) with i = 1, . . . , n, all of them sampled at the same time points, i.e.
T = t j , j = 1, . . . , N. For all emulators reported here, the time series in the
datasets were subsampled as much as possible, without deteriorating their
relevant dynamic features, e.g. oscillations and/or peaks. In all cases, the
datasets are randomly separated in a training set of size n trn and a test set
of size n tst , with n trn + n tst = n. Table 1 summarizes the properties of the data
used.
Dataset
# parameters, |γ|
Time samples, N (used/total)
Training set, n trn
Test set, n tst
Nonlinear DS I & II
1
6/40
10
190
Wartegg
2
52/2880
200
700
Adliswil
8
193/601
128
128
Table 1: Summary of datasets used herein.
2.3.1
Nonlinear dynamical system dataset I & II
To illustrate the virtues of MEMs, we first consider a didactical example using data generated by the model
dx
= a(x0 )x + b(x0 ),
dt
x(0) = x0 ,
2
(32)
a(x) = −a 0 e−a1 ( x−sign ( x)) ,
(33)
b(x) = b 0 tanh (x).
(34)
The parameters values are a 0 = 12.616, a 1 = 5, b 0 = 2.
The time evolution of this contrived system is linear. The parameters
defining the evolution depend nonlinearly on the initial condition, i.e. the parameters of the linear system are nonlinear functions of the initial condition.
Therefore an emulator of this system takes time and the initial condition
(|γ| = 1) as inputs. The behavior of this system meets the above assumptions
underlying a MEM with a linear time-invariant prior. Thus an emulator
without coupling noise solves this system exactly.
The first dataset consists of simulated time series with 40 output observations for 200 initial conditions x0 ∈ [−1, 1].
The second dataset is built by mixing the trajectories of the dynamical
system in eq. (32), specifically:
Z
x̂(t, x0 ) = x(t, x0 + α) N (x0 , σ2 )dα,
(35)
α
α
where σ = 0.5. Although the nonlinearities in the dynamical system still
depend only on the initial condition, the smoothing couples neighboring trajectories.
For the mechanistic emulation we will use a 1 dimensional linear proxy:
ds
(t) = θ1 (s 0 )s(t) + θ2 (s 0 ),
dt
11
(36)
and use the knowledge from the first simulator to set s 0 = x0 , θ1 (s 0 ) = a(s 0 ),
and θ2 (s 0 ) = b(s 0 ). Since each proxy is the solution of the system in eq. (32),
no coupling of the components of the MEM is needed in the first case, i.e.
Σ = I. For the second simulator we will couple the components using a 1
dimensional Matérn covariance function and the parameters mapping will
be learned from the data.
2.3.2
Wartegg catchment dataset
This dataset was generated from a SWMM model of a 2.64 km2 urban catchment located in the city of Lucerne in the canton of Lucerne, Switzerland.
This model has been calibrated satisfactorily to observed rainfall-runoff and
used for hydrological studies of the site [Tokarczyk et al., 2015, detailed
model description provided therein].
The dataset consists of 900 time series with 2880 data points, simulating
24 h of water levels in an open outlet during different rain events. To drive
the system into a highly nonlinear behavior we synthetically generated rain
events covering a wide range of return periods. These events were generated
following a block rain model [Gujer, 2007, Ch. 13.2] parametrized by intensity (I) and duration (d), i.e. γ = (I, d) and |γ| = 2. The intensity of the event
spans 30 values in the range I ∈ [10, 100] mm h−1 , with 30 different durations
(d ∈ [10, 240] min) for each intensity.
For the mechanistic emulation we will use a 1 dimensional linear proxy
for the water level:
dh
(t) = θ1 (γ)h(t) + θ2 (γ)R(t, γ)
dt
(37)
where R(t, γ) is the rain event used in the simulation. The values of θ1 (γ)
and θ2 (γ) are obtained by a least squares fit of the data.
Due to the low performance achieved by standard MEMs in this dataset,
the actual MEM presented in Sec. 3.3 uses a Wiener model as proxy. This
is done using Warped GPs (Sec. 2.2.4), with a nonlinearity given by ĥ(t) =
a(γ) tanh(b(γ)h(t) + c(γ)), where the parameters a, b and c are learned from
the data.
2.3.3
Adliswil catchment dataset
This dataset was generated from a SWMM model of a 1.63 km2 urban catchment located in the city of Adliswil in the canton of Zurich, Switzerland. The
dataset was used in Machac et al. [2016a](detailed model description provided therein) to create an emulator which was then used to speed-up the
calibration (identification) of the parameters in the simulator.
The dataset consist of 256 time series with 601 data points, all of them
corresponding to a single rain event, but with different 8 dimensional input parameter vectors (|γ| = 8). The time series are simulations of inflow to
the local WWTP, and the parameters describe the physical properties of the
sewer network.
For the mechanistic emulation we will use the same linear proxy as in Machac
et al. [2016a], a 1 dimensional ODE for the discharge:
dQ
(t) = θ1 (γ)Q(t) + θ2 (γ)R(t)
dt
(38)
where R(t) is the measured rain event.
Two MEMs will be built, the first uses the values of θ1 (γ) and θ2 (γ) using
the relation from Machac et al. [2016a], and the second will obtain them from
a least squares fit of the data.
12
2.4
Performance assessment
To asses the quality of an emulator we compute the following emulation errors on the data reserved for testing:
i. Maximum absolute error (MAE)
¯
¯
e MAE (γ j ) = max ¯ ŷ(t i , γ j ) − y(t i , γ j )¯
i
(39)
where ŷ(t, γ) and y(t, γ) are the emulated and simulated responses, respectively.
ii. Root mean square error (RMSE)
v
u
N ¡
u1 X
¢2
e RMSE (γ j ) = t
ŷ(t i , γ j ) − y(t i , γ j )
N i=1
(40)
Error e MAE measures the error in reproducing extreme values and/or peaks
in the simulated signals, while error e RMSE measures an overall quality of
the emulation.
3
3.1
Results
Nonlinear system dataset
This dataset is used to highlight the value of the mechanistic over datadriven emulation. It is suited for illustration purposes, since the surface
to be reconstructed can be plotted (|γ| = 1).
Fig. 2 shows the response of the system described in eqs. (32)-(34) as a
surface R2 → R. Fig. 2a illustrates the weakness of the SVD emulator, which
does not exploit the simulator’s parameter dependence. Moreover predictions
at unseen time points are provided by linear interpolation of the SVD basis.
To build the MEM we used the exact simulator’s parameter dependence. Although training data is sparse in the time direction, since the MEM encodes
the right time evolution, the reconstruction quality is high, as can be seen
in Fig. 2b. Although the SVD emulator could be improved by using an exponential basis for time interpolation [Franz and Gehler, 2006], i.e. the one
provided by the covariance function of the MEM, the recovered parameter
dependence will still be poor due to the low sampling of the parameter space.
This example shows that mechanistic emulation is ideal for situations
where there is good prior knowledge and the training data is sparse. This is
even more striking when data corresponding to different simulator parameters is sampled at different times, e.g. with adaptive stepsize simulators. In
this case mechanistic emulation can be applied directly, while SVD emulation
becomes complicated as a matrix completion problem needs to be solved before factorization can be applied [see Oh, 2010, for an SVD relevant analysis].
In a similar fashion the Kalman smoothing algorithm described in Reichert
et al. [2011] also requires a first step in which all the data is interpolated into
the same temporal grid, e.g. via interpolation.
3.2
Nonlinear system dataset II
Since the structure of the proxy of a MEM does not change once its dimension
m is set, we can optimize the proxy’s parameters to reduce epistemic biases.
The example shown in Fig. 3 illustrates the effect of mismatches between
13
(a) SVD
(b) MEM
Figure 2: Nonlinear system emulation of didactical model. The colored surface shows the
behaviour of the simulator output. Red dots show the training data. The emulated surface
is shown with a black wireframe. In this contrived scenario a MEM (b) outperforms an
SVD emulator (a). The failure of SVD is mainly due to the linear interpolation in the time
direction.
14
the dynamical system and the proxy, i.e. epistemic bias, and how it can be
mitigated. In Fig. 3a we show the performance of a MEM built with the same
proxy as in Fig. 2b, but used to emulate the nonlinear dynamical system
described at the end of Sec. 2.3.1. Comparing with Fig. 2b, we see that in the
regions where there is no observed data, the emulation is biased. A MEM
with proxies fitted to the data is shown in Fig. 3b. In this case the epistemic
bias is considerably reduced although we did not used mechanistic knowledge
to improve the parameters mapping.
Hence, if the mapping between the simulator parameters and the linear proxy’s parameters cannot be exactly determined from the mechanistic
knowledge, it is better to fit the proxy’s parameters to the data instead of
using and ad-hoc calculation based on on one’s best guess or expert opinion.
The latter can be improved a posteriori by studying the parameters mapping
emerging from the fit.
3.3
Wartegg catchment dataset
Results of these simulations can be seen in Fig. 4. For rains shorter than a
certain duration (about 20 min for the intensity used in the plot, 41 mm h−1 )
the water level response shows the typical wave of runoff in an open channel.
After some critical duration, which corresponds to the catchment’s time of
concentration, the water level becomes constant and remains fixed for the
duration of the rain, defining the triangular region marked in the plot. After
the rain, the water level goes back to a lower fixed level and remains there
for a period of time which is a nonlinear function of the rain duration, e.g.
between 4-6 h for a 4 h event. This shows the nonlinear nature of the storage
involved in the effective discharge of the network. Finally there is a slow
decay in the level fueled by the residual water in the network, the rate of
this decay also depends nonlinearly on the rain’s duration.
Fig. 5 shows the distribution of the test error of a MEM5 and a NMF
emulator with 7 components. Table 2 summarizes the mean of the error distributions. The NMF emulator outperforms the mechanistic emulator. In
previous trials, an SVD emulator was also built and provided results comparable with NMF (not shown here), however it produced negative predictions
just before the steep increase of the water level at the beginning of the rain
event.
Emulator
NMF(1 × 104 )
MEM(1 × 102 )
MAE (m, %)
3.2 × 10−2 , 7.7
22.6 × 10−2 , 53.7
RMSE (m, %)
0.94 × 10−2 , 4.1
4.4 × 10−2 , 17.4
Table 2: Mean emulation errors corresponding to the Wartegg catchment dataset. The
value in parenthesis is the simulation speed-up factor obtained with respect to the original
simulator, e.g. if SWMM simulation takes 3 s, MNF emulator takes 0.3 ms.
Fig. 6 shows the quality of the NMF emulation for three different rain
intensities.
3.4
Adliswil catchment dataset
In [Machac et al., 2016a] a SWMM model of the Adliswil catchment was emulated using a MEM with a prior derived from a simplified version of the
5 Warped MEM, see Sec. 2.3.2. MEMs with linear proxies were unable to reduce average RMSE
below 25%.
15
(a) MEM
(b) MEM fitted proxy
Figure 3: Nonlinear system emulation II. The colored surface shows the surface to reconstruct. In this second contrived scenario the MEM (b) performs the same as the SVD
emulator (a). Red dots show the training data. The emulated surface is shown with a
black wireframe.
16
Figure 4: Simulator output for a fixed intensity (41 mm h−1 ) and varying duration. The
black bold lines label different runoff regimes: free-surface flows, runoff with activated
storage and emptying of storage in the catchment.
Figure 5: Test error distribution of the NMF emulator. The violin plots show the distribution of the logarithm of the error for the maximum absolute error (MAE) and the root
mean square error (RMSE). Light colored plots corresponds to the NMF emulator, solid
colored plots to the MEM. The mean(median) error is indicated with filled(empty) circles.
See Table 2 for their numerical values.
17
Figure 6: NMF emulation quality. The colored surface shows the simulation outputs for
three different rain intensities. The NMF emulated surface is shown with a black wireframe.
18
simulator’s equations, with the aim of running a system identification task
from a single rain event.
Figure 7 shows the distribution of the test error of a MEM and a SVD
emulator with 6 components. Both errors are calculated on the same test set.
Figure 7: Test error distribution of the MEM from Machac et al. [2016a] and a SVD emulator. The violin plots show the error distribution for the mean maximum absolute error
(MAE) and the root mean square error (RMSE). Light colored plots corresponds to the
SVD emulator, solid colored plots to the MEM. The mean(median) error is indicated with
filled(empty) circles. See Table 3 for their numerical values.
Table 3 summarizes the mean of the error distributions. In this example,
the SVD emulator also performs better than its mechanistic counter part.
Although the time interpolation of SVD does not respect the dynamics of
the system, the density of data is enough to provide a good estimation. The
simplicity of the SVD emulator, when compared with the mechanistic one,
makes this approach much more compelling for this application.
4
Discussion
The results presented in the previous sections seem to suggest that MEMs
are not useful for emulating complicated hydrological or hydrodynamic simulators and that they remain as an academic curiosity. However MEMs still
have many properties that can be exploited for better and faster emulation,
which should not be ignored only due to the early state of the method. These
known advantages include the suitability for parallelization and, speedups
and energy saving via approximated computing [Angerer et al., 2015].
19
Emulator
SVD(5 × 104 )
MEM(1 × 103 )
MEM-fit (1 × 103 )
MAE (l s−1 , %)
18.3, 6.2
23.2, 7.9
20.2, 6.9
RMSE (l s−1 , %)
3.19, 2.6
4.94, 4.0
3.42, 2.8
Table 3: Mean emulation errors corresponding to the Adliswil catchment dataset. MEM
refers to an emulator in Machac et al. [2016a], while MEM-fit to an emulator with the
same proxy structure but parameters fitted to the data. The value in parenthesis is the
simulation speed-up factor obtained with respect to the original simulator, e.g. if SWMM
simulation takes 3 s, SVD emulator takes 60 µs.
Table 4 summarizes the steps involved in the two approaches presented
here. There we indicate the relation between the method and the characteristics of the dataset. On one side, although data-driven emulators are computationally and conceptually simpler than MEMs, they are more sensitive to
the sparseness of the data. On the other side, MEM’s performance is limited
by the linearity of the prior which might fail to express our knowledge about
the nonlinear simulator. If good prior knowledge is available, the mechanistic emulation can incorporate correct dependencies, which could be exploited
to reduce the amount of data needed to achieve a desired performance.
Steps 1 and 2 of mechanistic emulation are the most sensitive to the mismatch between prior and simulator. To mitigate this, we keep the model
structure provided by the prior and learn the parameter values from the
data, thus providing the best linear proxy for the dataset (Sec. 3.2). This
generally provides sharper error distributions than using the parameter values obtained directly from the prior [Albert, 2012]. Note that mitigating this
simulator-prior mismatch is not a question of data quantity, since more data
will override the prior and all mechanistic insights it provided, thus rendering mechanistic knowledge unnecessary [Steinke and Schölkopf, 2008]. More
data would also increase the memory and computational resources needed
by the emulator. Increasing the density of time samples will also reduce the
condition number of the covariance matrices and the inversion problem at
the training phase will be ill-posed, unless iterative condition methods are
used [Reichert et al., 2011].
In step 2 of a data-driven emulator we need to factorize the data. If the
data is very sparse the generalization quality of the factorization is expected
to be poor. For data that is sampled at different temporal grids the situation becomes even more delicate since data preprocessing is required to build
up a grid, e.g. via interpolation or matrix completion. Matrix factorization
also provide features only at the observed inputs, therefore an interpolation method is required when emulating unseen time points at step 5. The
Kalman smoothing implementation of the mechanistic emulation used in Reichert et al. [2011] will be similarly affected. Optimizing this interpolation
can be as hard as using a MEM directly (Sec. 3.1).
Equation (15) shows that the mean function of the prior GP is given by
the solution to the noise-free linear ODE obtained by removing the noisy
term of the SDE (11). This suggests a simple improvement of the emulator
in which the mean function is replaced with a better approximator of the
data. This is the underlying idea behind the work of González et al. [2014],
in which the actuation affecting the mean of the GP is replaced by a signal
generated by the nonlinear part of the model applied to a surrogate trajectory. In that work however, the surrogate trajectory, e.g. built with matrix
factorization, does not encode mechanistic knowledge explicitly. This knowl-
20
Mechanistic emulation
Step
Data-driven emulation
1
Define prior
–
2
Obtain emulator parameters
Define/Build parameters
mapping
Conditioning
Factorize the data
3
4
5 (Emulation)
Matrix · vector
Build parameters mapping
–
Matrix · vector +
time interpolation
Table 4: Steps involved in the two emulation approaches described in this article. Datadriven approaches are simpler than mechanistic ones. Step 2 and 5 of data-driven approaches suffer if data is sparse or unevenly sampled. Steps 1 and 2 of the mechanistic
approach suffer from the lack of expressiveness of linear priors.
edge could be introduced via the analytical solution of a nonlinear differential equation, such as the nonlinear Bernoulli ODE, or analytical approximations of more general nonlinear differential equations [Adomian, 1991].
These enhancements would only affect the mean function of the predictive
GP, improving extrapolation quality and thus allowing for more sparse training sets. However, the estimation of uncertainties remains limited by the
covariance function associated with the linear prior. This can be improved by
including the mean function parameters in the conditioning step [Rasmussen
and Williams, 2006, sec. 2.7].
All these observations are derived from more general results on the reducibility and emulation readinness of general simulators and not only valid
for the especific simulators we used here. This is specially true for the datadriven approach, see for example Ch. 5 of Quarteroni et al. [2016].
5
Conclusions
We provided a comparison of mechanistic and data-driven emulation in several examples pertinent to the field of hydrology and urban water management. In all of these, data-driven emulation outperforms mechanistic emulation. The current state of MEMs makes them advantageous to fully datadriven emulators, when the training data is sparse and unevenly sampled.
This is the case when many simulation runs with high temporal resolution
are prohibitively expensive, or when adaptive stepsize simulators are used.
If the only objective of emulation is to obtain a fast tool to replace a simulator, there seem to be no advantage in using mechanistic knowledge besides
the case of sparse and unevenly sampled data mentioned before. The gain
obtained from enhancements of MEMs discussed here, such as Wiener model
proxies, Nonlinear mean functions, and hybrid mechanistic/data-driven emulators should be quantified in relation to the test error of an inexpensive
data-driven emulator.
Acknowledgements
The authors would like to thank Prof. Peter Reichert for his support during
the development of this article. We thank Dr. David Machac for his emulation results used in Figure 7. We thank Dr. Frank Blumensaat for shar-
21
ing with us the SWMM model file of the Wartegg catchment resulting from
many data collection campaings. We thank the developers of GNU Octave,
Sage and Inkscape for their excellent software tools, which were used for this
article. We thank the reviewers for their help improving this manuscript.
Funding The research leading to these results has received funding from
the European Union’s Horizon 2020 research and innovation programme under grant agreement No 641931 (Centaur).
Author contributions JPC developed the software, carried out simulations, data analysis. JPC & JR wrote this manuscript. JPL adapted
SWMM model files for the simulations and helped interpreting the results.
The work was done under the active supervision of CA & JR. All authors
copy-edited this manuscript.
References
Anthony O’Hagan. Bayesian analysis of computer code outputs: A tutorial.
Reliability Engineering & System Safety, 91(10-11):1290–1300, 2006. doi:
10.1016/j.ress.2005.11.025.
Ulrike Baur, Peter Benner, and Lihong Feng. Model order reduction for linear and nonlinear systems: a system-theoretic perspective. Archives of
Computational Methods in Engineering, 21(4):331–358, 2014.
Alfio Quarteroni, Andrea Manzoni, and Federico Negri. Reduced Basis Methods for Partial Differential Equations, volume 92 of UNITEXT. Springer
International Publishing, Cham, 2016. ISBN 978-3-319-15430-5. doi:
10.1007/978-3-319-15431-2.
Yu-Geng Xi, De-Wei Li, and Shu Lin. Model Predictive Control — Status
and Challenges. Acta Automatica Sinica, 39(3):222–236, mar 2013. ISSN
18741029. doi: 10.1016/S1874-1029(13)60024-5.
Guangtao Fu, Soon-Thiam Khu, and David Butler. Multiobjective optimisation of urban wastewater systems using parego: a comparison with nsga
ii. In 11th International Conference on Urban Drainage, 11 ICUD, Edinburgh, Scotland, 2008.
L.A. Rossman. Storm Water Management Model User’s Manual Version 5.0.
Technical Report EPA/600/R-05/040, National Risk Management Research
Laboratory, Office of Research and Development, U.S. Environmental Protection Agency, 2010.
Tomaso Poggio and F. Girosi. Networks for approximation and learning.
Proceedings of the IEEE, 78(9):1481–1497, 1990. ISSN 00189219. doi:
10.1109/5.58326.
Florian Steinke and Bernhard Schölkopf. Kernels, regularization and differential equations. Pattern Recognition, 41(11):3271–3286, 2008. ISSN
00313203. doi: 10.1016/j.patcog.2008.06.011.
Carlo Albert. A mechanistic dynamic emulator. Nonlinear Analysis: Real
World Applications, 13(6):2747–2754, 2012.
22
Simo Särkkä, Arno Solin, and Jouni Hartikainen. Spatiotemporal Learning
via Infinite-Dimensional Bayesian Filtering and Smoothing: A Look at
Gaussian Process Regression Through Kalman Filtering. IEEE Signal
Processing Magazine, 30(4):51–61, jul 2013. ISSN 1053-5888. doi: 10.
1109/MSP.2013.2246292.
Javier González, Ivan Vujačić, and Ernst Wit. Reproducing kernel Hilbert
space based estimation of systems of ordinary differential equations. Pattern Recognition Letters, 45:26–32, 2014.
Arno Solin. Explicit Link Between Periodic Covariance Functions and State
Space Models. Proc. of the Seventeenth Int. Conf. on Artificial Intelligence
and Statistics, 33:904–912, 2014.
C E Rasmussen and C K I Williams. Gaussian Processes for Machine Learning. Adaptive Computation And Machine Learning. MIT Press, 2006.
P. Reichert, G. White, M.J. Bayarri, and E.B. Pitman. Mechanism-based emulation of dynamic simulation models: Concept and application in hydrology. Computational Statistics & Data Analysis, 55(4):1638–1655, 2011.
doi: 10.1016/j.csda.2010.10.011.
Per Christian Hansen. Rank-Deficient and Discrete Ill-Posed Problems. Society for Industrial and Applied Mathematics, jan 1998. ISBN 978-0-89871403-6. doi: 10.1137/1.9780898719697.
C.M. Angerer, R. Polig, D. Zegarac, H. Giefers, C. Hagleitner, C. Bekas, and
A. Curioni. A fast, hybrid, power-efficient high-precision solver for large
linear systems based on low-precision hardware. Sustainable Computing:
Informatics and Systems, 2015. ISSN 2210-5379. doi: 10.1016/j.suscom.
2015.10.001.
J D Victor and P Johannesma. Maximum-entropy approximations of stochastic nonlinear transductions: an extension of the Wiener theory. Biological
cybernetics, 54(4-5):289–300, 1986. ISSN 0340-1200.
George Christakos. Spatiotemporal information systems in soil and environmental sciences. Geoderma, 85(2-3):141–179, 1998. ISSN 00167061. doi:
10.1016/S0016-7061(98)00018-4.
J. Harte. Maximum Entropy and Ecology: A Theory of Abundance, Distribution, and Energetics. Oxford Series in Ecology and Evolution. OUP Oxford,
2011. ISBN 9780191621161.
Jan S. Hesthaven, Gianluigi Rozza, and Benjamin Stamm. Reduced Basis
Methods, pages 27–43. Springer International Publishing, Cham, 2016.
ISBN 978-3-319-22470-1. doi: 10.1007/978-3-319-22470-1_3.
Boian S. Alexandrov and Velimir V. Vesselinov. Blind source separation for
groundwater pressure analysis based on nonnegative matrix factorization.
Water Resources Research, 50(9):7332–7347, 2014. ISSN 1944-7973. doi:
10.1002/2013WR015037.
Jingu Kim and Haesun Park. Toward faster nonnegative matrix factorization: A new algorithm and comparisons. In Proceedings of the 2008 Eighth
IEEE International Conference on Data Mining, ICDM ’08, pages 353–362,
Washington, DC, USA, 2008. IEEE Computer Society. ISBN 978-0-76953502-9. doi: 10.1109/ICDM.2008.149.
23
George S. Kimeldorf and Grace Wahba. A Correspondence Between Bayesian
Estimation on Stochastic Processes and Smoothing by Splines. The Annals
of Mathematical Statistics, 41(2):495–502, apr 1970. ISSN 0003-4851. doi:
10.1214/aoms/1177697089.
Thomas E Fricker, Jeremy E Oakley, and Nathan M Urban. Multivariate
Gaussian Process Emulators With Nonseparable Covariance Structures.
Technometrics, 55(1):47–56, feb 2013.
Y. A. Kuznetsov. Andronov-Hopf bifurcation. Scholarpedia, 1(10):1858, 2006.
revision #90964.
David Machac, Peter Reichert, Jörg Rieckermann, and Carlo Albert. Fast
mechanism-based emulator of a slow urban hydrodynamic drainage simulator. Environmental Modelling & Software, 78:54–67, 2016a. doi:
10.1016/j.envsoft.2015.12.007.
David Machac, Peter Reichert, and Carlo Albert. Emulation of dynamic simulators with application to hydrology. Journal of Computational Physics,
313:352–366, May 2016b.
Edward Snelson, Carl Edward Rasmussen, and Zoubin Ghahramani. Warped
gaussian processes. In In Advances in Neural Information Processing Systems (NIPS, page 2003. MIT Press, 2003.
E. Hairer, S. P. Nørsett, and G. Wanner. Solving Ordinary Differential Equations I (2Nd Revised. Ed.): Nonstiff Problems. Springer-Verlag New York,
Inc., New York, NY, USA, 1993. ISBN 0-387-56670-8.
P. Tokarczyk, J. P. Leitao, J. Rieckermann, K. Schindler, and F. Blumensaat.
High-quality observation of surface imperviousness for urban runoff modelling using uav imagery. Hydrology and Earth System Sciences, 19(10):
4215–4228, 2015. doi: 10.5194/hess-19-4215-2015.
Willi Gujer. Siedlungswasserwirtschaft. Springer, Berlin, 3. edition, 2007.
Matthias O Franz and Peter V Gehler. How to choose the covariance for
gaussian process regression independently of the basis. In Proc. Gaussian
Processes in Practice Workshop, 2006.
Sewoong Oh. Matrix completion: Fundamental limits and efficient algorithms. PhD thesis, Stanford University, 2010.
G Adomian. A review of the decomposition method and some recent results
for nonlinear equations. Computers & Mathematics with Applications, 21
(5):101–127, 1991. ISSN 08981221. doi: 10.1016/0898-1221(91)90220-X.
Octave community. GNU Octave 4.0.2, 2016. URL www.gnu.org/software/
octave/. Last accessed Sept. 1, 2016.
The Sage Development Team. Sage Mathematics Software (Version 7.2),
2016. URL http://www.sagemath.org. Last accessed Sept. 1, 2016.
Inkscape community. Inkscape 0.91, 2016. URL http://www.inkscape.
org/. Last accessed Sept. 1, 2016.
24
| 5cs.CE
|
SUBMITTED TO IEEE TRANSACTIONS ON SIGNAL PROCESSING, MAY 22, 2017
1
Beam Design and User Scheduling for Non-Orthogonal
Multiple Access with Multiple Antennas Based on
Pareto-Optimality
arXiv:1705.06959v1 [cs.IT] 19 May 2017
Junyeong Seo, Student Member, IEEE, Youngchul Sung† , Senior Member, IEEE
Abstract
In this paper, an efficient transmit beam design and user scheduling method is proposed for multi-user
(MU) multiple-input single-output (MISO) non-orthogonal multiple access (NOMA) downlink, based on
Pareto-optimality. The proposed beam design and user scheduling method groups simultaneously-served
users into multiple clusters with practical two users in each cluster, and then applies spatical zeroforcing (ZF) across clusters to control inter-cluster interference (ICI) and Pareto-optimal beam design
with successive interference cancellation (SIC) to two users in each cluster to remove interference to
strong users and leverage signal-to-interference-plus-noise ratios (SINRs) of interference-experiencing
weak users. The proposed method has flexibility to control the rates of strong and weak users and
numerical results show that the proposed method yields good performance.
Index Terms
Non-orthogonal multiple access, multi-user MIMO, scheduling, Pareto-optimal design, SIC
I. I NTRODUCTION
NOMA is a promising technology for 5G wireless networks to increase the spectral efficiency [1].
Unlike conventional orthogonal multiple access (OMA) which serves multiple users based on time,
frequency and/or spatial domains, NOMA exploits the power domain that results from unequal channel
conditions under which users with strong channels are basically limited by degree-of-freedom (DoF) such
as bandwidth not by noise but users with weak channels are limited by additive noise [2, P. 239]. In
†
Corresponding author
The authors are with Dept. of Electrical Engineering, KAIST, Daejeon 305-701, South Korea. E-mail:[email protected],
[email protected].
May 22, 2017
DRAFT
SUBMITTED TO IEEE TRANSACTIONS ON SIGNAL PROCESSING, MAY 22, 2017
2
NOMA with such channel conditions, the base station (BS) uses superposition coding and allocates less
power to strong-channel users and more power to weak-channel users. Here, less power to strong users
is not so detrimental since strong users are in the DoF-limited regime, but more power to weak users
leverages received SINRs of weak users. The strong interference caused from more power assigned to
weak users through good channels to strong users is eliminated by SIC to maintain high quality channels
for strong users.
Initially, NOMA with a single antenna in both the BS and users was studied [1], [3]–[8]. Recently,
there have been efforts to extend NOMA to multiple-antenna systems. Unlike conventional MU multipleantenna downlink systems which serve as many users as the number of antennas, more users can be
served in multiple-antenna NOMA systems. Although the possibility that multiple-antenna NOMA can
outperform conventional multiple-antenna OMA was shown [9], [10], many important problems need to
be investigated further for multiple-antenna NOMA. In multiple-antenna NOMA systems, typically user
grouping is done first by forming clusters as many as the number of transmit antennas and assigning
multiple users to each cluster, and then multiple users in each cluster share the spatial dimension and are
served in the power domain. Since the performance of multiple-antenna NOMA significantly depends
on the channel conditions of users across clusters and within each cluster, effective scheduling and
user grouping methods should be devised in order to achieve both MU diversity and the NOMA gain
from unequal channel conditions. In addition, the problem of optimal beam design and power allocation
compatible to user scheduling should be solved to maximize the performance.
A. Related Works
There have been several studies on multiple-antenna NOMA for cellular downlink especially for MUMISO downlink which is the main focus of this paper. In [11], the downlink beam design for sum-rate
maximization was considered for one given cluster based on minorization-maximization. In [12]–[14],
user scheduling and clustering is considered with the assumption that two users are assigned to each
cluster. In [12], highly correlated users are chosen as candidates to be clustered, and two users having
the largest channel gain difference are assigned to the same cluster. In [13], strong users are selected
by the semi-orthogonal user selection (SUS) algorithm [15], and then weak users are selected using the
matching user selection algorithm by considering inter-cluster interference. In [14], a fairness-oriented
user selection algorithms was proposed by selecting two paired users based on their NOMA data rate. In
all the works of [12]–[14], the beam design problem for MU-MISO NOMA was simplified by designing
zero-forcing (ZF) beams based on strong users’ channels and allocating the same beam to the weak user
May 22, 2017
DRAFT
SUBMITTED TO IEEE TRANSACTIONS ON SIGNAL PROCESSING, MAY 22, 2017
3
as the beam of the strong user in each cluster. There also exists some study on multiple-input multipleoutput (MIMO) NOMA. For example, in [16] the impact of user paring is analyzed with fixed power
allocation under the assumption that inter-cluster interference is removed by multiple receive antennas.
Some part of this work was included in [17].
B. Contributions
In this paper, we consider MU-MISO NOMA downlink with practical two users in each cluster and
solve the aforementioned problem for MU-MISO NOMA downlink. The contributions of this paper are
summarized in the below:
• First, we solved the Pareto-optimal beam design and power allocation problem for two-user MISO
broadcast channels (BCs) in which superposition coding is used at the transmitter and the interference
at the strong user is eliminated by SIC while the interference at the weak user is treated as noise. This
work is the basis for successive development in this paper and is valuable as an independent item.
• We proposed an effective user scheduling, beam design and power allocation method for MU-
MISO NOMA downlink based on the above two-user Pareto-optimal design result by exploiting both the
spatial domain provided by multiple transmit antennas and the power domain provided by SIC. The key
advantages of the proposed method compared to the previous methods are that 1) the rates of strong users
and weak users can be controlled arbitrarily under Pareto-optimality, which provides great operational
flexibility to NOMA networks, and 2) beam design of the proposed method is generalized to include
multi-dimensional subspace if available and to yield performance improvement, whereas the same onedimensional beam is always used by both strong and weak users in the same cluster in the previous
methods [12]–[14].
Notations: Vectors and matrices are written in boldface with matrices in capitals. All vectors are
column vectors. For a matrix A, A∗ , AH and AT indicate the complex conjugate, conjugate transpose,
and transpose of A, respectively, and L(A) and L⊥ (A) denotes the linear space spanned by the columns
of A and its orthogonal complement, respectively. ΠA and Π⊥
A are the projection matrices to L(A) and
L⊥ (A), respectively. ||x|| represents the 2-norm of vector x. I denotes the identity matrix. y ∼ CN (µ, Σ)
mean that random vector y is circularly-symmetric complex Gaussian distributed with mean vector µ
and covariance matrix Σ.
May 22, 2017
DRAFT
SUBMITTED TO IEEE TRANSACTIONS ON SIGNAL PROCESSING, MAY 22, 2017
4
II. S YSTEM M ODEL
We consider a single-cell MU-MISO NOMA downlink system with a BS equipped with Nt transmit
antennas and K single-antenna users. We assume that the K users in the cell are divided into the set
K1 of K/2 strong-channel users and the set K2 of K/2 weak-channel users. We assume that out of the
K users in the cell, 2Kc users are selected and simultaneously served for each scheduling interval with
Kc ≤ Nt (thus 2Nt users can be served simultaneously) and this simultaneous service to 2Kc users is
done by forming Kc clusters with two paired users in each cluster composed of one from the strong
user set K1 and the other from the weak user set K2 . We assume that the BS uses linear precoding and
NOMA is applied to two paired users in each cluster. Under these assumptions, the transmit signal of
the BS for one scheduling interval is given by
q
Kc q
X
(k) (k) (k)
(k) (k) (k)
x =
p1 w̃1 s1 + p2 w̃2 s2
,
(1)
k=1
where
(k)
si
(k)
is the transmit symbol for user i in cluster k from CN (0, 1), w̃i
is the Nt × 1 beamforming
vector for user i in cluster k out of the feasible beamforming vector set W := {w̃ | kw̃k2 ≤ 1}, and
(k)
pi
is the power assigned to user i in cluster k. The total BS transmit power PT is equally divided into
PT /Kc = P for each cluster. Then, the received signals of the two users in cluster k are given by
q
q
(k) (k) (k)
(k) (k) (k)
(k)
(k)H
p1 w̃1 s1 + p2 w̃2 s2
y1 = h̃1
(k)H
+ h̃1
(2)
q
Kc q
X
(k ′ ) (k ′ ) (k ′ )
(k ′ ) (k ′ ) (k ′ )
(k)
+ w1 ,
p1 w̃1 s1 + p2 w̃2 s2
k ′ 6=k
(k)
y2
+
=
(k)H
h̃2
(k)H
h̃2
q
q
(k) (k) (j)
(k) (k) (k)
p1 w̃1 s1 + p2 w̃2 s2
(3)
q
Kc q
X
(k ′ ) (k ′ ) (k ′ )
(k ′ ) (k ′ ) (k ′ )
(k)
p1 w̃1 s1 + p2 w̃2 s2
+ w2 ,
k ′ 6=k
(k)
where h̃i
denotes the actual Nt × 1 (conjugated) channel vector between the BS and user i in cluster
(k)
k, and wi
is the zero-mean additive white Gaussian noise (AWGN) at user i in cluster k from
(k)
CN (0, [ǫi ]2 ).
In the MU-MISO-NOMA system, we have both the spatial domain and the power domain. We consider
the design approach in which two users in each cluster are served in the power domain with SIC while
multiple clusters are served based on the spatial domain. Note that the last two terms in each of the
right-hand sides (RHSs) of (2) and (3) are the ICI and AWGN. In order to control ICI, we apply spatial
ZF across clusters. However, due to lack of spatial dimensions, we cannot remove ICI completely for all
May 22, 2017
DRAFT
SUBMITTED TO IEEE TRANSACTIONS ON SIGNAL PROCESSING, MAY 22, 2017
5
users. Hence, we remove ICI for the strong users with spatial ZF to keep the strong users not interference(k)
limited. With this approach, the beam vector w̃i
(k)
w̃i
can be expressed as
(k)
wi , i = 1, 2,
= Π⊥
H̃
(4)
k
(k)
for some vector wi , where
(1)
(2)
(k−1)
H̃k := [h̃1 , h̃1 , · · · , h̃1
(k+1)
, h̃1
(Kc )
, · · · , h̃1
].
(5)
Once the ICI is controlled and given, the model (2) - (3) is a two-user MISO BC. Thus, our approach
to the overall design is to first investigate the optimal beam design and power allocation for a two-user
MISO BC with SIC at the strong user’s receiver in Section III, to derive certain performance properties
relevant to selection of two users in a cluster in Section IV, and then to develop an overall user selection
and beam design method for all clusters with controlling ICI in Section V.
III. T WO - USER MISO
BROADCAST CHANNEL WITH
SIC: PARETO - OPTIMAL
DESIGN
In this section, we focus on optimal beam vector design and power allocation for a two-user MISO BC
with SIC at the strong user’s receiver from the perspective of Pareto-optimality. With the cluster index
(k) omitted, the two-user model (2) - (3) for cluster k is given by
√
√
y i = hH
i ( pi w i s i + pj w j s j ) + n i
i, j ∈ {1, 2}, j 6= i,
(6)
where p1 + p2 ≤ P with the total power P allocated to the cluster; ni ∼ CN (0, σi2 ) is the sum of ICI
(k)
h̃ , i = 1, 2
and AWGN; and hi is the effective channel for user i (in cluster k) given by hi = Π⊥
H̃ i
k
H
H
⊥ H
H ⊥
from (2), (3) and (4) since h̃H
i w̃i = h̃i ΠH̃ wi = h̃i [ΠH̃ ] wi = hi wi . The feasible set for wi is
k
k
given by W = {w |
kwk2
≤ 1} since the Pareto-optimal beam wi under the model (6) lies in the linear
(k)
h̃
space spanned by h1 = Π⊥
H̃ 1
k
(k)
h̃
and h2 = Π⊥
H̃ 2
k
(k)
(k)
(k)
wi k = kw̃i k
[18], and hence kwi k = kΠ⊥
H̃
k
for Pareto-optimal beams.
Under the NOMA framework, we assume that user 1 is the strong user and user 2 is the weak user,
i.e., kh1 k2 /σ12 > kh2 k2 /σ22 and that user 1 decodes the interference from user 2 and subtracts it before
decoding its own data while user 2 treats the interference as noise. With this assumption, the rates of the
two users are given by
s1 (w1 , p1 )
R1 (w1 , p1 ) = log2 1 +
σ12
R2 (w1 , w2 , p1 , p2 )
= log2 1 + min
May 22, 2017
s2 (w2 , p2 )
r1 (w2 , p2 )
,
2
s1 (w1 , p1 ) + σ1 r2 (w1 , p1 ) + σ22
(7)
,
DRAFT
SUBMITTED TO IEEE TRANSACTIONS ON SIGNAL PROCESSING, MAY 22, 2017
6
where the signal power and the interference power are respectively given by
2
si (wi , pi ) := pi |hH
i wi |
2
and ri (wj , pj ) := pj |hH
i wj | .
(8)
Note in (7) that for the rate of user 1, the interference from user 2 is not incorporated due to SIC and
the rate of user 2 is bounded by not only the SINR of user 2 but also the required ’SINR’ for user 1
to decode the message of user 2 for SIC before decoding its own data. Then, for the given (effective)
channel vectors (h1 , h2 ), the achievable rate region R of the two-user MISO-NOMA BC is defined as
the union of the rate-tuples that can be achieved by all feasible beam vectors and power allocation:
R :=
[
(R1 (w1 , p1 ), R2 (w1 , w2 , p1 , p2 )).
(9)
2
(w1 ,w2 )∈W
p1 ,p2 : p1 ,p2 ≥0,
p1 +p2 =P
The Pareto boundary of the rate region R is the outer boundary of R for which the rate of any one
user cannot be increased without decreasing the rate of the other user and Pareto-optimality has been
used widely as a general optimal beam design criterion for MU-MISO networks with linear precoding
[20]. A pair of beam vectors (w1 , w2 ) not achieving a Pareto-boundary point is not optimal since both
users’ rates can be increased by a better designed beam pair. Note that the sum-rate optimal point is
the point on the Pareto-boundary where the Pareto-boundary and the minus 45o degree line touch in the
(R1 , R2 ) plane, and the Pareto-optimality provides a general optimality criterion because we can change
the rate operating point arbitrarily and optimally. It is known that the Pareto-boundary can be found by
maximizing R2 for each given feasible R1∗ [20], i.e.,
max
(w1 ,w2 )∈W 2
p1 ,p2 : p1 ,p2 ≥0, p1 +p2 =P
subject to
R2 (w1 , w2 , p1 , p2 )
R1 (w1 , pi ) = R1∗ .
(10)
By exploiting the relationship between the rates and the SINRs in (7), the problem (10) can be rewritten
in terms of SINR as
max
(w1 ,w2 )∈W 2
p1 ,p2 : p1 ,p2 ≥0,
p1 +p2 =P
subject to
γ2 := min
s2 (w2 , p2 )
r1 (w2 , p2 )
,
2
s1 (w1 , p1 ) + σ1 r2 (w1 , p1 ) + σ22
s1 (w1 , p1 )
= γ1∗ ,
σ12
(11)
where γ1∗ is a given feasible target SINR for user 1. An efficient solution to the problem (11) exploits an
efficient parameterization of the beam vectors w1 and w2 . Note that the number of design variables in
w1 and w2 is 2Nt complex numbers. However, one can realize that it is sufficient that both beam vectors
May 22, 2017
DRAFT
SUBMITTED TO IEEE TRANSACTIONS ON SIGNAL PROCESSING, MAY 22, 2017
7
are linear combinations of h1 and h2 (equivalently, Πh2 h1 and Π⊥
h2 h1 ). A component in the beam vector
not in the span of h1 and h2 does not affect either the signal power or the interference power and thus
does not affect either R1 or R2 [19]. Thus, it is known from [18] that the Pareto-optimal beam vectors
for the problem (11) can be parameterized as [18], [21]
Π⊥
Πh2 h1
h2 h1
+ β1 ⊥
,
kΠh2 h1 k
kΠh2 h1 k
q
Π⊥
Πh1 h2
h1 h2
,
w2 (α2 ) = α2
+ 1 − α22 ⊥
kΠh1 h2 k
kΠh1 h2 k
w1 (α1 , β1 ) = α1
(12)
(13)
where (α1 , β1 ) ∈ F := {(α, β), α, β ≥ 0, α2 + β 2 ≤ 1} and α2 ∈ [0, 1]. Unlike the conventional
parametrization without SIC in which both users use full power [20], [22], in the parameterization (12)
- (13) user 1 may not use full power whereas user 2 uses full power. This is because full power use of
user 2 helps both SIC at user 1 and its own SINR at user 2, but full power use of user 1 is beneficial for
its own rate but detrimental to user 2’s rate since user 2 treats interference as noise. Substituting (12) (13) into (8), we have
2
h
k
s1 (w1 ) = p1 α1 kΠh2 h1 k + β1 kΠ⊥
h2 1
√
√
= p1 kh1 k2 ( θα1 + 1 − θβ1 )2
|hH h1 |2
p1 α21 2
kΠh2 h1 k2
= p1 kh2 k2 α21
q
√
√
s2 (w2 ) = p2 kh2 k2 ( θα2 + 1 − θ 1 − α22 )2
r2 (w1 ) =
r1 (w2 ) = p2 α22
2
|hH
2 h1 |
= p2 kh1 k2 α22 ,
kΠh1 h2 k2
(14)
(15)
(16)
(17)
where the angle parameter θ between two effective channel vectors h1 and h2 is defined as
θ :=
2
|hH
1 h2 |
kh1 k2 kh2 k2
∈ [0, 1].
(18)
Substituting (14) - (17) into the problem (11) and taking square-root operation yield
max
(α1 ,β1 )∈F
α2 ∈[0,1]
0≤p1 ≤P
subject to
γ2 = min
√
(√
P − p1 kh1 kα2
p
,
σ12 (1 + γ1∗ )
)
p
√
√
√
P − p1 kh2 k( θα2 + 1 − θ 1 − α22 )
p
p1 kh2 k2 α21 + σ22
q
√
√
p1 kh1 k( θα1 + 1 − θβ1 ) = γ1∗ σ12 .
(19)
(20)
For later use, we define the following channel quality factor λi and the normalized target SINR value
for user 1, Γ:
λi :=
May 22, 2017
||hi ||2
, i = 1, 2, and Γ := γ1∗ /λ1 .
σi2
(21)
DRAFT
SUBMITTED TO IEEE TRANSACTIONS ON SIGNAL PROCESSING, MAY 22, 2017
8
Here, λi indicates the signal-to-noise ratio (SNR) quality of user i’s channel, whereas θ in (18) is a
measure of the angle between the two users’ channels. Note that the actual target SINR for user 1 γ1∗
is given by γ1∗ = Γλ1 and the feasible range for Γ is Γ ∈ [0, P ], where the maximum P occurs when
2
2
w1 = h1 /||h1 || and p1 = P since γ1 = s1 (w1 , p1 )/σ12 = p1 |hH
1 w1 | /σ1 .
The optimization problem (19) - (20) with fixed power allocation p1 = p2 = 1 was solved in [21]
under the framework of a two-user MISO interference channel. In the MISO interference channel case,
two transmitters in the network neither cooperate nor share transmit power and hence the two transmit
power values p1 and p2 are fixed. On the other hand, in the MISO-BC case the two power values p1
and p2 can be designed at the BS under the constraints p1 , p2 ≥ 0 and p1 + p2 = P to maximize the
performance. Since our solution to the two-user MISO-NOMA-BC case is based on the result from [21],
we briefly introduce the relevant result in [21] for further development in later sections.
A. Background: The fixed power allocation case [21]
In this subsection, we fix p1 = p2 = 1 and follow [21]. First, note that α1 appears only in the constraint
(20) and the denominator in the second term in the RHS of (19). Thus, optimal α1 can be found by
solving the following problem [21]:
min
(α1 ,β1 )∈F
subject to
α1
(22)
q
√
√
kh1 k( θα1 + 1 − θβ1 ) = γ1∗ σ12 ,
(23)
This is because the second term in the RHS of (19) decreases monotonically with respect to α1 and
hence maximizing the second term in the RHS of (19) is equivalent to minimizing α1 . The problem (22)
- (23) can easily be solved based on the relationship between a line segment (23) and the unit-radius ball
F and the solution is given by [21]
0
α∗1 =
p
√
θΓ − (1 − θ)(1 − Γ)
if
Γ≤1−θ
if
Γ > 1 − θ,
(24)
where Γ is defined in (21) and Γ ∈ [0, 1] for p1 = 1. With the optimal α∗1 in (24), the corresponding
optimal β1∗ can be found by the constraint (20), and substituting the optimal α∗1 into the problem (19) (20) yields [21]
kh1 k
,
σ12 (1+γ1∗ )
where a := √
May 22, 2017
q
2
max γ2 = min aα2 , bα2 + c 1 − α2
b :=
α2 ∈[0,1]
√
√ kh22 k ∗ θ2 2 ,
kh2 k (α1 ) +σ2
(25)
√
kh2 k 1−θ
.
kh2 k2 (α∗1 )2 +σ22
and c := √
DRAFT
SUBMITTED TO IEEE TRANSACTIONS ON SIGNAL PROCESSING, MAY 22, 2017
bα2 + c
p
1 − α22
9
aα2
case 3
aα2
case 2
aα2
case 1
α′2
1
α2
p
Fig. 1: aα2 and bα2 + c 1 − α22 (figure adapted from Fig. 1 in [21])
Note that the graph (α2 , aα2 ) of the first term aα2 in the minimum in (25) is a straight line and the graph
p
p
(α2 , bα2 +c 1 − α22 ) of the second term bα2 +c 1 − α22 in the minimum in (25) is a straight line plus a
p
√
quarter circle, as shown in Fig. 1. Note also that bα2 + c 1 − α22 is maximized at α′2 = b/ b2 + c2 with
p
p
√
maximum b2 + c2 , and the intersection of aα2 and bα2 + c 1 − α22 occurs at α′′2 = c/ c2 + (a − b)2 .
There exist three different cases for the solution to (25) depending on the relationship between the two
p
graphs, as shown in Fig. 1. In the first case of a ≤ b, aα2 is below bα2 + c 1 − α22 , the minimum of
p
the two is aα2 , and thus optimal α∗2 is 1. In the second case that aα2 and bα2 + c 1 − α22 intersect
p
between α′2 and 1, i.e., α′2 ≤ α′′2 , the solution to (25) occurs at α∗2 = α′′2 = c/ c2 + (a − b)2 . Finally,
p
in the third case that aα2 and bα2 + c 1 − α22 intersect between 0 and α′2 , i.e., α′2 > α′′2 , the solution
√
to (25) occurs at α∗2 = α′2 = b/ b2 + c2 . Since the condition α′2 ≤ α′′2 can be rewritten as [21]
√
b2
b
c
≤p
⇐⇒ a ≤ b + c2 /b,
2
2
+c
c + (a − b)2
the optimal solution α∗2 to the problem (25) is summarized as [21]
1
if a ≤ b (case 1),
√2 c
if b < a ≤ b + c2 /b (case 2),
α∗2 =
c +(a−b)2
√
√ b
θ
if a > b + c2 /b (case 3),
=
2
2
b +c
and the corresponding optimal value γ2∗ is given by [21]
∗(1)
kh1 k2
2
γ2 = a = σ12 (1+γ1∗ ) ,
2
∗(2)
1k
∗ 2
γ2∗ =
γ2 = a2 (α∗2 )2 = σ2kh
∗ (α2 ) ,
1 (1+γ1 )
kh2 k2
γ ∗(3) = b2 + c2 =
,
2
May 22, 2017
kh2 k2 (α∗1 )2 +σ22
(26)
(27)
case 1,
case 2,
(28)
case 3.
DRAFT
SUBMITTED TO IEEE TRANSACTIONS ON SIGNAL PROCESSING, MAY 22, 2017
10
B. Pareto-optimal design in two-user MISO BC with SIC with power allocation
Now consider the actual problem (19) - (20) of Pareto-optimal beam design and power allocation
for the two-user MISO-NOMA BC. We obtain the solution to this problem by exploiting the result in
Section III-A. Note that once the power allocation values p1 and p2 are fixed, the corresponding optimal
solution can be obtained from the result in Section III-A. Therefore, we represent the optimal solution as
a function of power allocation and then optimize the power allocation. For given p1 ∈ [0, P ], the problem
(22) - (23) changes to
min
α1
subject to
√
(α1 ,β1 )∈F
(29)
q
√
√
p1 kh1 k( θα1 + 1 − θβ1 ) = γ1∗ σ12 ,
and the corresponding solution is given by α∗1 (p1 ) =
0
p
p
θΓ/p − (1 − θ)(1 − Γ/p )
1
1
if
Γ ≤ p1 (1 − θ),
if
Γ > p1 (1 − θ).
(30)
Furthermore, the coefficients a, b, and c defined in (25) are changed to
p
kh1 k
P − p1 p 2
,
σ1 (1 + γ1∗ )
√
p
kh2 k θ
,
P − p1 p
b(p1 ) :=
p1 kh2 k2 (α∗1 (p1 ))2 + σ22
√
p
kh2 k 1 − θ
c(p1 ) :=
P − p1 p
.
p1 kh2 k2 (α∗1 (p1 ))2 + σ22
a(p1 ) :=
(31)
(32)
(33)
Then, the optimal solution to (19) - (20) can be represented as a function of p1 :
1
if p1 ∈ P1 ,
c(p1 )
√2
if p1 ∈ P2 ,
α∗2 (p1 ) =
c (p1 )+[a(p1 )−b(p1 )]2
√
√ 2 b(p1 ) 2
if p1 ∈ P3 ,
= θ
(34)
{p1 |a(p1 ) > b(p1 ) + c2 (p1 )/b(p1 )}, and the corresponding SINR for
2
∗(1)
1k
γ2 (p1 ) = (P − p1 ) σ2kh
∗
(1+γ
1
1)
∗(2)
kh1 k2
γ2 (p1 ) = (P − p1 ) σ2 (1+γ ∗ ) [α∗2 (p1 )]2
1
1
kh2 k2
γ ∗(3) (p ) = (P − p )
∗
2
(35)
b (p1 )+c (p1 )
where P1 := {p1 |a(p1 ) ≤ b(p1 )}, P2 := {p1 |b(p1 ) < a(p1 ) ≤ b(p1 ) + c2 (p1 )/b(p1 )}, and P3 :=
2
1
1 kh2 k2 p1 [α (p1 )]2 +σ
1
2
user 2 γ2∗ (p1 ) is given by γ2∗ (p1 ) =
if p1 ∈ P1 ,
if p1 ∈ P2 ,
if p1 ∈ P3 .
Finally, the original problem (19) - (20) reduces to
max γ2∗ (p1 ),
0≤p1 ≤P
May 22, 2017
(36)
DRAFT
SUBMITTED TO IEEE TRANSACTIONS ON SIGNAL PROCESSING, MAY 22, 2017
∗(i)
where γ2∗ (p1 ) is given by (35). Note that if we knew which γ2
11
in (35) to use for optimization by
directly computing a(p1 ), b(p1 ), c(p1 ) and their relationship, it would be easy to solve the problem (36).
∗(i)
However, the parameters a(p1 ), b(p1 ) and c(p1 ) to determine γ2
to use are functions of the design
variable p1 . Nevertheless, this is possible and the result is given in the following proposition.
Proposition 1: For given h1 , h2 , σ12 , σ22 , P and γ1∗ , we have the following regarding the optimal solution
√
√ √
1
1√
,
popt
to
the
problem
(36).
If
θΓ
<
τ
or
if
θΓ
≥
τ
≥
0
and
P
≥
Γ
+
θΓ
−
τ
)
θΓ
+
(
1
1−θ
λ2 τ
opt
−1 λ−1 + Γ − λ−1 , and Γ and λ are defined in
then popt
i
1 ∈ P2 . Otherwise, p1 ∈ P3 . Here, τ := θ
1
2
(21).
Proof:
See Appendix.
Due to Proposition 1 we know which of the three cases in (35) is applicable to the given combination
opt
of h1 , h2 , σ12 , σ22 , P , and γ1∗ . Once the set Pi to which popt
1 belongs is determined, optimal p1 can be
∗(i)
found by maximizing the corresponding γ2 (p1 ) in (35) with respect to p1 . A closed-form solution from
solving
dγ2∗(i) (p1 )
dp1
= 0 seems complicated but the solution can easily be found by a numerical method. The
proposed algorithm to design Pareto-optimal beam vectors and power allocation is summarized in Table
I. The Pareto-boundary of a two-user MISO-NOMA BC can be computed by sweeping R1∗ = log(1 + γ1∗ )
and computing the corresponding maximum R2∗ = log(1 + γ2∗ ). An example is shown in Fig. 2. It is seen
that power allocation significantly enlarges the achievable rate region over the fixed-power beam-only
design and optimal power allocation is crucial for MISO-NOMA BC.
3
Pareto-boundary with power allocation
Pareto-boundary with P1 =0.5 , P 2 = 1.5
Pareto-boundary with P =1.0 , P = 1.0
2.5
1
2
Pareto-boundary with P =1.5 , P = 0.5
1
2
R2
2
1.5
1
0.5
0
0
1
2
3
4
5
6
R1
Fig. 2: Pareto-boundary: fixed power versus power allocation (kh1 k2 /σ12 = 20, kh2 k2 /σ22 = 3, θ = 0.5
and P = 2)
May 22, 2017
DRAFT
SUBMITTED TO IEEE TRANSACTIONS ON SIGNAL PROCESSING, MAY 22, 2017
12
TABLE I
Pareto-optimal design for 2-user MISO-BC with SIC
√
√
[ p1 w1 , p2 w2 ] = D(h1 , h2 , σ12 , σ22 , γ1∗ , P )
Input: channel vectors h1 , h2 , noise power σ12 , σ22 , target SINR of user 1 γ1∗ , and cluster total power P .
|hH h2 |2
−1
∗
−1
λ−1
Initialization: λ1 = kh1 k2 /σ12 , λ2 = kh2 k2 /σ22 , θ = kh1 k12 kh
2 , Γ = γ1 /λ1 , and τ = θ
1 + Γ − λ2
2k
if θΓ < τ
∗(2)
obtain popt
maximizing γ2
1
elseif τ ≥ 0 and
P ≥Γ+
1
(
1−θ
√
θΓ −
√
τ)
√
θΓ +
1√
λ2 τ
∗(2)
obtain popt
maximizing γ2
1
else
∗(3)
obtain popt
maximizing γ2
1
endif
Obtain α∗1 , β1∗ and α∗2 using (30), (20) and (34) with p1 = popt
1 , and obtain w1 and w2 from (12) and (13) with
α∗1 , β1∗ and α∗2 .
q
q
Output: popt
P − popt
w
and
1
1
1 w2
IV. T WO - USER MISO
BROADCAST CHANNEL WITH
SIC: P ERFORMANCE S TUDY
In the previous section, we developed a Pareto-optimal beam design and power allocation algorithm
for given channel vectors h1 and h2 . The performance of the Pareto-optimal design is a function of the
two (effective) channel vectors h1 and h2 . In the conventional ZF downlink beamforming with no SIC at
the receivers, two users with orthogonal channel vectors are preferred since non-orthogonality between
the two channel vectors reduces the effective SINR of ZF beamforming [15]. However, in the considered
MISO-NOMA framework in which user 1 intends to decode the interference from user 2 and subtracts
it before decoding its own data whereas user 2 treats the interference from user 1 as noise, orthogonality
between h1 and h2 , i.e., θ ≈ 0, and corresponding orthogonal beam vectors w1 and w2 (see (12) and
(13) with h1 ⊥ h2 ) do not necessarily imply high performance. Intuitively, if θ is small, user 2 receives
less interference from user 1, but user 1 has difficulty in decoding the message of user 2 for SIC under
the NOMA framework. In this section, we investigate more on the two-user MISO-NOMA BC before
proceeding to overall user scheduling in the next section.
To gain some insight into good channel conditions for two-user MISO-NOMA BCs, let us first consider
the fixed power allocation case with p1 = p2 = 1 as described in Section III-A and investigate the impact
May 22, 2017
DRAFT
SUBMITTED TO IEEE TRANSACTIONS ON SIGNAL PROCESSING, MAY 22, 2017
13
of the angle θ between the two channel vectors when the magnitudes are given. For given ||h1 ||, ||h2 ||
and γ1∗ , the SINR of user 2 γ2∗ in (28) can be rewritten as a function of θ as
∗(1)
λ1
for case 1,
γ2 (= 1+Γλ1 )
∗
∗(2)
λ1
γ2 (θ) =
[α∗2 (θ)]2 )
for case 2,
γ2 (θ) (= 1+Γλ
1
∗(3)
λ2
γ (θ) (=
)
for case 3,
2
where
α∗1 (θ) =
and
(37)
λ2 [α∗1 (θ)]2 +1
0
√
p
θΓ − (1 − θ)(1 − Γ)
1
√ 2 c(θ)
α∗2 (θ) =
c (θ)+(a−b(θ))2
√
θ
if
Γ≤1−θ
if
Γ>1−θ
(38)
for case 1
for case 2
(39)
for case 3.
Regarding optimal θ that maximizes γ2∗ (θ) in (37), we have the following proposition:
Proposition 2: Let λ1 , λ2 and Γ be given. If Γ ∈ [Γ1 , Γ2 ], where
1
−1
Γ1 =
1 + λ−1
−
2 − λ1
2
1
−1
1 + λ−1
+
Γ2 =
2 − λ1
2
q
1
−1 2
−1
−1
(1 + λ−1
1 + λ2 ) − 4λ2 (1 + λ2 )
2
q
1
−1 2
−1
−1
(1 + λ−1
1 + λ2 ) − 4λ2 (1 + λ2 ),
2
(40)
then optimal θ that maximizes γ2∗ (θ) in (37) is given by the region
(
θ|θ0 ≤ θ ≤
z1 z2 + 2Γ(1 − Γ) +
p
4Γ(1 − Γ)[Γ(1 − Γ) + z1 z2 − z22 ]
2
z1 + 4Γ(1 − Γ)
−1
where z1 = λ−1
1 + 1 − Γ, z2 = λ2 + 1 − Γ, and
λ1 1 ,
λ2 1+Γλ1
√
θ0 =
z1 z2 +2Γ(1−Γ)− 4Γ(1−Γ)[Γ(1−Γ)+z1 z2 −z22 ] ,
z12 +4Γ(1−Γ)
if
λ1
1
λ2 1+Γλ1
)
≤ 1 − Γ,
(41)
(42)
otherwise.
If Γ ∈
/ [Γ1 , Γ2 ], optimal θ is given by the region
Proof:
λ2
λ1 (1 + Γλ1 )
(2)
{θ | ∂γ2∂θ(θ) =
{θ |
≤ θ ≤ 1 − Γ}
if Γ ≤
or
0}
if Γ >
−1
λ−1
2 −λ1
1+λ−1
2
−1
λ−1
2 −λ1
1+λ−1
2
and Γ ∈
/ [Γ1 , Γ2 ],
(43)
and Γ ∈
/ [Γ1 , Γ2 ].
See Appendix.
From Proposition 2 we obtain a more insightful corollary as follows:
May 22, 2017
DRAFT
SUBMITTED TO IEEE TRANSACTIONS ON SIGNAL PROCESSING, MAY 22, 2017
14
Corollary 1: Let λ1 , λ2 and Γ be given. When λ1 = λ2 , optimal θ for the 2-user MISO BC with SIC
is given by the set {θ | θ0 ≤ θ ≤ 1} with θ0 reduced to
1
if
1+Γλ1
θ0 =
2
2 z1
if
z +4Γ(1−Γ)
1
Proof:
1
1+Γλ1
1
1+Γλ1
≤1−Γ
.
(44)
>1−Γ
See Appendix.
Corollary 1 states that in two-user MISO BCs with SIC with the same channel magnitudes λ1 = λ2 and
the same power p1 = p2 = 1, two aligned channel vectors are preferred to two orthogonal channels and
channel alignment beyond a certain angle is all optimal.
Although Proposition 2 and Corollary 1 provide some insight into good channel conditions in the
SIC BC case, the assumptions for Proposition 2 and Corollary 1 are not valid in the actual NOMA
situation in which power allocation is applied. Unfortunately, the optimal power popt
1 was not obtained
in closed form in the previous section and this puts difficulty on analysis of the impact of channel
angle on the performance. Hence, in the actual case, to enable analysis we derive the SINR γ2∗ for user
2 as a function of θ by assuming the simple power allocation method that assigns minimum power
p1,min (= γ1∗ /λ1 = Γ) to achieve the target SINR γ1∗ to user 1 and assigns the rest of power P to user
2. The simple power allocation strategy is based on the assumption that user 1 has a strong channel and
is limited by channel’s DoF such as bandwidth, whereas user 2 with a weak channel is limited by noise
and needs to receive more power. For this simple power allocation method, the optimal γ2∗ is obtained
by substituting p1 = p1,min = Γ into (35) and given after some manipulation in closed form as
γ2∗ =
P −Γ
1
−1 +1
Γ λ−1
1 Γ
"
1
P −Γ
,
−1
Γ θ+λ−1
2 Γ
1+
θ
1−θ
r
−1 θ −1
1+λ−1
2 Γ
−1
1+λ−1
1 Γ
2 #−1
−1
,
if θ ≤ θ1
(45)
if θ > θ1 ,
q
−1 −1
−2 −2
−1 −1
1
where θ1 := 2 −λ2 Γ + λ2 Γ + 4(λ1 Γ + 1) .
Examples of γ2∗ in (45) as a function of θ are shown in Fig. 3 together with the optimal γ2∗ obtained
by running the algorithm in Table I. It is seen that the γ2∗ behavior depends on the relative magnitude of
λ1 and λ2 through the two performance limiting factors: the SIC processing at user 1 and the SINR of
user 2, as seen in (11). In the case of λ1 = λ2 ≫ 0, the performance of user 2 is not limited by noise at
user 2 but is limited by signal-to-interference ratio (SIR). Thus, in this case it is preferred that channel
vectors are aligned and more power is allocated to user 2 under the constraint that the required SINR
for user 1 is satisfied. By doing so, SIC at user 1 is easy and SIR at user 2 is high. This behavior is
May 22, 2017
DRAFT
SUBMITTED TO IEEE TRANSACTIONS ON SIGNAL PROCESSING, MAY 22, 2017
3.9
4
3.8
3.5
15
1
0.8
γ*2
γ*2
γ*2
0.6
3.7
3
0.4
2.5
3.6
0.2
3.5
0
0.2
0.4
0.6
The optimal power allocation
The simple power allocation
The optimal power allocation
The simple power allocation
The optimal power allocation
The simple power allocation
0.8
1
2
0
0
0.2
0.4
0.6
0.8
1
0
0.2
0.4
0.6
θ
θ
θ
(a)
(b)
(c)
0.8
1
Fig. 3: γ2∗ in (45) as a function of θ : (a) λ1 = 10, λ2 = 10, Γ = 2, P = 10 , (b) λ1 = 10, λ2 = 1, Γ = 2,
P = 10, and (c) λ1 = 10, λ2 = 0.1, Γ = 2, P = 10.
evident in Fig. 3(a). It is seen that the optimal power control and the simple power allocation strategy
yield similar performance in Fig. 3(a). (The behavior for λ1 = λ2 with power control seems similar to
that stated in Corollary 1.) However, in the medium asymmetric case of λ1 > λ2 as in Fig. 3(b), there
is a trade-off between the two performance limiting factors. When two channels are orthogonal, SIC at
user 1 is difficult. On the other hand, when two channels are aligned, interference from user 1 to user 2
at user 2 is high. Hence, the performance is good when the two user channels are neither too orthogonal
nor too aligned. This behavior is evident in Fig. 3(b). Note that in this case, there is a large gap between
the optimal power control and the simple power allocation.
In addition to the above simple power allocation result, we have another result exploiting the fact
λ1 ≫ λ2 in actual NOMA, given by the following proposition:
→
Proposition 3: For given λ1 and γ1∗ , if θ 6= 0, as λ2 → 0, the optimal power coefficient popt
1
1
p1,min = Γ; the corresponding γ2∗ converges to γ2∗ = P Γ−Γ θ+λ−1
; and the beam vectors converge to
−1
2 Γ
√
√
√
√
p1 w1 = Γ khh11 k and p2 w2 = P − Γ khh22 k . That is, both users use matched-filtering beams.
Proof:
See Appendix.
Note that γ2∗ in Proposition 3 coincides with the second formula in (45). This is because θ1 in (45)
converges to 0+ as λ2 → 0 for given λ1 and Γ, and the second formula in (45) is valid in this case. By
Proposition 3, if λ2 is sufficiently small compared to λ1 , matched filtering beams for both users with
minimum power to user 1 satisfying the target SINR are optimal regardless of the angle between the two
channel vectors. This is because if λ1 ≫ λ2 , the limitation for γ2∗ results from the SINR of user 2 at user
2. Hence, maximum power should be delivered to user 2 with matched filtering beam w2 by assigning
May 22, 2017
DRAFT
SUBMITTED TO IEEE TRANSACTIONS ON SIGNAL PROCESSING, MAY 22, 2017
16
(2)
(2)
h̃1
h̃1
(3)
h̃1
(1)
h̃1
(2)
(1)
h̃2
(1)
h̃2
Π⊥ (2)
[h̃1
(2)
(3) h̃1
,h̃1 ]
(1)
Π⊥ (2) (3) h̃1
[h̃
,h̃
]
1
1
(2)
(a)
L⊥ (h̃1 )
(1)
h̃1
(2)
Π⊥(2) h̃1
(1)
Π⊥(2) h̃1
h̃1
h̃
(1)
w1
1
(1)
w2
(3)
L⊥ ([h̃1 , h̃1 ])
(b)
Fig. 4: Beam design in the example of Nt = 3: (a) Kc = Nt and (b) Kc = Nt − 1
minimum power to user 1 with matched filtering beam w1 . This behavior is evident in Fig. 3(c). It is
seen in Fig. 3(c) that the simple power allocation method almost achieves the optimal performance for
all θ .
V. T HE P ROPOSED S CHEDULING M ETHOD
FOR
K -U SER MISO-NOMA D OWNLINK
Now, we propose our overall user scheduling/pairing and beam design method for the K -user MISONOMA downlink with Nt BS antennas based on the results in the previous sections. In MISO-NOMA
downlink scheduling and beam design, two major aspects should be taken into account simultaneously
to guarantee good system performance: One is controlling ICI to reduce interference from other clusters
and the other is pairing and beam design for the paired users in each cluster for maximum performance.
Recall that the gain of NOMA lies in the case that strong users are in the DoF(such as bandwidth)-limited
regime and weak users are limited by noise [2, P. 239]. In MU-MISO NOMA, the beneficial situation
for NOMA should be maintained, i.e., the high channel quality for strong users should be maintained
by SIC and proper interference control, and low SINRs of weak users should be leveraged by assigning
more power to weak users. To be consistent with this design principle, ICI should be eliminated for
strong users by proper measures. With these considerations, we propose the following user scheduling,
pairing and beam design method for K -user MISO-NOMA downlink composed of two steps under the
assumption that all channel vector information is available at the BS and the thermal noise variance is
known.
Algorithm 1: Overall User Scheduling and Beam Design
May 22, 2017
DRAFT
SUBMITTED TO IEEE TRANSACTIONS ON SIGNAL PROCESSING, MAY 22, 2017
17
Step 1: In the first step, we run the semi-orthogonal user selection (SUS) algorithm [15] targeting
selection of Nt users from the strong user set K1 . Then, the SUS algorithm returns Kc (≤ Nt ) users
with roughly orthogonal channel vectors out of the K/2 users in K1 . (Depending on the size |K1 | and
the semi-orthogonality parameter, the SUS algorithm may return users less than Nt especially for large
Nt although we target selecting Nt users [15].) We set these Kc users returned by the SUS algorithm
as the Kc strong users in Kc clusters (one user for each cluster). Let their actual channel vectors be
(1)
(Kc )
h̃1 , · · · , h̃1
.
Step 2: Weak user selection and overall beam design
Initialization: Γ is given.
K2 = {1, . . . , K/2} (the original weak user set),
(46)
S1 : the set of selected strong users from step 1,
(47)
S2 ← φ (the set of selected weak users),
(1)
⊥ h̃(Kc )
Π
h̃
Π⊥
1
H̃Kc
H̃1 1
c =
,
W
,··· ,
(Kc )
(1)
⊥
||ΠH̃ h̃1 ||
||Π⊥
h̃
||
1
H̃
(48)
1
f1 = [ ]
W
k = 1.
(49)
Kc
f 2 = [ ],
and W
(50)
(51)
Iteration:
while k ≤ Kc do
S.1: For each user u ∈ K2 , estimate ICI plus AWGN:
σ̂u2 =
X
l<k
f 1 (l)|2 + |g̃uH W
f 2 (l)|2 ) +
(|g̃uH W
X
l>k
c 2 + ǫ2u ,
P |g̃uH W(l)|
(52)
c
f 1 (l) and W
f 2 (l) are the l-th columns of W,
c W
f 1 and W
f 2 respectively, and g̃u is
where W(l),
W
the actual channel vector of user u in K2 . With obtained σ̂u2 and given Γ, compute the maximum
(k)
SINR γ2∗ (u) of user u when user u is paired with the channel h̃1
described in Section III-B or Section IV by setting λ1 =
2
θ=
May 22, 2017
g̃ )
h̃(k) )H (Π⊥
(Π⊥
H̃k u
H̃k 1
(k) 2
⊥
g̃
k2
h̃
k
kΠ
kΠ⊥
H̃k u
H̃k 1
of user 1 of cluster k, as
h̃(k) k2
kΠ⊥
H̃k 1
σ12
, λ2 =
g̃u k2
kΠ⊥
H̃
k
σ̂u2
, and
.
DRAFT
SUBMITTED TO IEEE TRANSACTIONS ON SIGNAL PROCESSING, MAY 22, 2017
18
S.2: Select the weak user of cluster k as follows:
u∗ = arg max γ2∗ (u)
(53)
S2 ← S2 ∪ {u∗ }
(54)
u∈K2
(k)
h̃2 = g̃u∗
(55)
√
(k)
(k)
(k) √
(k)
h̃ , σ12 , σ̂u2 ∗ , λ1 Γ, P ) by using the twoand design [ p1 w̃1 , p2 w̃2 ] = D(Π⊥
h̃ , Π⊥
H̃ 2
H̃ 1
k
k
user Pareto-optimal design algorithm in Table. I.
S.3: Store the designed beams, remove u∗ in K2 , and repeat until k = Kc :
f 1 ← [W
f 1 , √p1 w̃(k) ], W
f 2 ← [W
f 2 , √p2 w̃(k) ]
W
1
2
K2 ← K2 \ {u∗ }
k ←k+1
end while
Remark 1: Note that the computation of γ2∗ (u) and the Pareto-optimal beam design for two users in
each cluster in steps S.1 and S.2 in the while loop of Step 2 of Algorithm 1 is based on the projected
(k)
(k)
h̃ lie in L⊥ (H̃k ). Thus,
h̃ and Π⊥
effective channels. Note that the projected effective channels Π⊥
H̃ 2
H̃ 1
k
k
(k)
the corresponding Pareto-optimal beams w1
(k)
beams (see (12) and (13)) [19], and hence wi
(k)
and w2
lie in L⊥ (H̃k ) by the property of Pareto-optimal
(k)
wi
= Π⊥
H̃
k
(k)
= w̃i , i = 1, 2 for (4). Hence, there exists
no ICI to all strong users with the proposed beam design.
(k)
h̃
Remark 2: If Kc = Nt , then H̃k has nullity of one, and Π⊥
H̃ 1
k
(k)
h̃ are aligned, as shown
and Π⊥
H̃ 2
k
in Fig. 4(a). In this case, only Pareto-optimal power control is applied for each cluster by the proposed
design method. (Note that the algorithm in Table I is still applicable in case of two aligned input channel
vectors.) On the other hand, if the number Kc of the returned users by the SUS algorithm in Step 1 is
less than Nt (which is often true for large Nt with small K [15]), then H̃k has nullity larger than or
(k)
h̃
equal to two. In this case, the projected effective channels Π⊥
H̃ 1
k
(k)
h̃
and Π⊥
H̃ 2
span a 2-dimensional
k
(2-D) space and the full 2-D Pareto-optimal beam design is applicable for each cluster, as shown in Fig.
4(b). This is another advantage of the proposed method over the previous methods [12]–[14] based on
simple spatial ZF beam design ignoring the case of Kc < Nt .
Remark 3: In the step (52) of computation of ICI and AWGN for each candidate weak user for cluster k,
√
Π⊥ h̃1(k+1)
already designed beam vectors are used up to cluster k−1 and the beam estimates P ⊥H̃1 (k+1) , · · · ,
√
P
Π⊥
H̃
Kc
||Π⊥
H̃
May 22, 2017
Kc
c)
h̃(K
1
c)
h̃(K
||
1
||ΠH̃
k+1
h̃1
||
are used for undesigned clusters k + 1, · · · , Kc .
DRAFT
SUBMITTED TO IEEE TRANSACTIONS ON SIGNAL PROCESSING, MAY 22, 2017
19
(k)
Remark 4: Note that there is length reduction from the actual channel h̃1
(k)
ΠH̃k h̃1
to the effective channel
of each strong user. This reduction is the typical effective gain loss associated ZF, but the loss
(1)
(Kc )
is not significant because the strong channels h̃1 , · · · , h̃1
are semi-orthogonal by the SUS algorithm
[15]. Only the weak users experience ICI whereas ICI to the strong users is completely removed in the
proposed method to be consistent with the NOMA design principle. However, the weak users are selected
by considering all the factors, i.e., the ICI, projection onto L⊥ (H̃k ) and the friendliness with the strong
users to yield good performance.
VI. N UMERICAL
RESULTS
In this section, we provide some numerical results to evaluate the performance of the proposed
scheduling, beam design and power allocation method described in Section V for MU-MISO-NOMA
downlink.
First, we evaluated the gain of the proposed method over conventional SUS-based MU-MISO scheduling [15] and the results are shown in Figs. 5 and 6. The simulation setup for Figs. 5 and 6 is as follows.
The AWGN variance was one for all users. The numbers of transmit antennas were two and four for Fig.
5 and Fig. 6, respectively. Each element of each channel vector in the strong user set K1 with K/2 users
2 ) with σ 2 = 1 and each element of each
was randomly and independently generated from CN (0, σh,1
h,1
channel vector in the weak user set K2 with K/2 users was randomly and independently generated from
2 ) with σ 2 = 0.01. (Hence, we have λ /λ = 100 = 20 dB.) For the conventional SUS-based
CN (0, σh,2
1
2
h,2
MU-MISO scheduling we considered two scheduling intervals. At the first interval, user scheduling out
of K1 was performed by running the SUS algorithm for MU-MISO with Nt transmit antennas and the
scheduled users were served by ZF downlink beamforming [15]. At the second interval, user scheduling
out of K2 was performed by running the SUS algorithm for MU-MISO with Nt transmit antennas and the
scheduled users were served by ZF downlink beamforming. The average sum rates for K1 and K2 were
obtained by averaging the rates of 1000 independent channel realizations. For the overall sum rate of the
conventional SUS method, the two rates of K1 and K2 were averaged. For the proposed NOMA method,
the same 1000 channel realizations used for the conventional method were used but the proposed NOMA
scheduling was performed over the overall user set K1 ∪ K2 in a single scheduling interval. For the SUS
algorithm applied separately to K1 and K2 and to Step 1 of the proposed method, the semi-orthogonality
parameter δ should be chosen [15] and we used optimal δ for each K/2 provided from Fig. 2 of [15].
In addition, for the proposed method, Γ should be chosen and we set Γ appropriately to balance the
rates from the two groups K1 and K2 . It is seen in Figs. 5 and 6 that the proposed MU-MISO NOMA
May 22, 2017
DRAFT
SUBMITTED TO IEEE TRANSACTIONS ON SIGNAL PROCESSING, MAY 22, 2017
18
18
The proposed alogirhtm with NOMA, K=10000
SUS algorithm with linear precoding, K=10000
The proposed alogirhtm with NOMA, K=2000
SUS algorithm with linear precoding, K=2000
The proposed alogirhtm with NOMA, K=200
SUS algorithm with linear precoding, K=200
14
12
10
8
6
14
12
10
users scheduled from K1
8
6
4
4
2
2
0
5
10
The proposed alogirhtm with NOMA, K=10000
SUS algorithm with linear precoding, K=10000
The proposed alogirhtm with NOMA, K=2000
SUS algorithm with linear precoding, K=2000
The proposed alogirhtm with NOMA, K=200
SUS algorithm with linear precoding, K=200
16
Sum rate [bits / channel use]
Sum rate [bits / channel use]
16
0
20
15
0
20
users scheduled from K2
0
5
PT (dB)
10
15
20
PT (dB)
(a)
(b)
Fig. 5: Sum rate (Nt = 2) : (a) total sum rate and (b) separate sum rates from K1 and from K2
30
30
The proposed alogirhtm with NOMA, K=10000
SUS algorithm with linear precoding, K=10000
The proposed alogirhtm with NOMA, K=2000
SUS algorithm with linear precoding, K=2000
The proposed alogirhtm with NOMA, K=200
SUS algorithm with linear precoding, K=200
25
Sum rate [bits / channel use]
Sum rate [bits / channel use]
25
20
15
10
20
users scheduled from K1
15
10
users scheduled from K2
5
5
0
The proposed alogirhtm with NOMA, K=10000
SUS algorithm with linear precoding, K=10000
The proposed alogirhtm with NOMA, K=2000
SUS algorithm with linear precoding, K=2000
The proposed alogirhtm with NOMA, K=200
SUS algorithm with linear precoding, K=200
0
5
10
15
PT (dB)
(a)
20
0
0
5
10
15
20
PT (dB)
(b)
Fig. 6: Sum rate (Nt = 4) : (a) total sum rate and (b) separate sum rates from K1 and from K2
method outperforms the conventional MU-MISO downlink based on the SUS user scheduling. Note that
the sum rates for both groups K1 and K2 are better than the conventional scheme. It is also seen that
the performance improvement by NOMA reduces as Nt increases from two to four, but there exists
non-trivial gain for NOMA for large K .
Next, we compared the proposed algorithm with an existing algorithm proposed for MU-MISO NOMA
May 22, 2017
DRAFT
SUBMITTED TO IEEE TRANSACTIONS ON SIGNAL PROCESSING, MAY 22, 2017
21
45
The propoposed algorithm
NOMA-FOUS algorithm
Sum rate [bits / channel use]
40
35
Nt = 8
30
Nt = 4
25
20
Nt = 2
15
10
40
60
80
100
120
140
160
Number of users (K)
Fig. 7: Sum rate (Nt = 2, 4, 8, K = 2000 and PT = 15dB)
downlink. For the comparison baseline we considered the NOMA-FOUS algorithm in [14] of which
superiority over other methods [12], [13] is shown in [14]. Since the simulation setting is different from
that in [14], we slightly modified the NOMA-FOUS algorithm so that the strong user is selected from
K1 and the weak user is selected from K2 , although the original NOMA-FOUS algorithm considers only
2 = 1 and σ 2 = 0.04, and set Γ to make the sum rate of the
one set of users. For comparison, we set σh,1
h,2
weak users of the proposed algorithm larger than the sum rate of the weak users of the NOMA-FOUS
algorithm. Fig. 7 shows the sum rate performance of the two algorithms. It is seen that the proposed
algorithm outperforms the NOMA-FOUS algorithm.
The key feature of our Pareto-optimality-based design is that we have control over the rate operating
point. Hence, we finally investigated the rate balancing property between the two groups K1 and K2
by controlling the strong-user-target-SINR parameter Γ defined in (21) (larger Γ means larger rates for
strong users), and the result is shown in Fig. 8. The simulation parameters are the same as those for
Fig. 6. For reference, the rates of K1 and K2 separately obtained by the conventional MU-MISO SUS
algorithm are shown. It is seen that by abandoning the improvement for weak users but maintaining the
weak-user performance at the level of the conventional SUS method, significant rate gain can be attained
for strong users.
May 22, 2017
DRAFT
SUBMITTED TO IEEE TRANSACTIONS ON SIGNAL PROCESSING, MAY 22, 2017
22
25
Sum rate [bits / channel use]
20
15
The proposed algorithm : strong users
The proposed algorithm : weak users
SUS algorithm : strong users
SUS algorithm : weak users
10
5
0
1
1.5
2
2.5
3
3.5
4
Γ
Fig. 8: Sum rate versus Γ (Nt = 4, K = 2000 and PT = 20 dB)
VII. C ONCLUSION
In this paper, we have considered the problem of transmit beam design and user scheduling for MUMISO NOMA downlink and proposed an effective beam design and user scheduling method based
on Pareto-optimality by exploiting both the spatial and power domains available in MU-MISO NOMA
downlink. The proposed method with the ability of rate control between strong and weak users provides
great flexibility to NOMA network operation.
A PPENDIX
Proof of Proposition 1:
The set Pi to which popt
belongs is dependent on the relationship among
1
a(p1 ), b(p1 ) and d(p1 ) := b(p1 ) + c2 (p1 )/b(p1 ), given in terms of Γ, θ and λi by
s
r
p
kh1 k2
λ1
a(p1 ) = P − p1
= (P − p1 )
2
∗
1 + Γλ1
σ1 (1 + γ1 )
s
p
kh2 k2 θ
b(p1 ) = P − p1
kh2 k2 p1 [α∗1 (p1 )]2 + σ22
s
λ2 θ
= (P − p1 )
λ2 p1 [α∗1 (p1 )]2 + 1
s
p
kh2 k2 /θ
d(p1 ) = P − p1
kh2 k2 p1 [α21 (p1 )]2 + σ22
s
λ2 /θ
= (P − p1 )
.
λ2 p1 [α∗1 (p1 )]2 + 1
May 22, 2017
(56)
(57)
(58)
DRAFT
SUBMITTED TO IEEE TRANSACTIONS ON SIGNAL PROCESSING, MAY 22, 2017
23
The three sets P1 , P2 and P3 can be rewritten by squaring a(p1 ), b(p1 ) and d(p1 ) and dropping the
¯ 1 )}, and P3 = {p1 |ā >
common factor (P − p1 ) as P1 = {p1 |ā ≤ b̄(p1 )}, P2 = {p1 |b̄(p1 ) < ā ≤ d(p
¯ 1 )}, where
d(p
λ1
λ2 θ
, b̄(p1 ) =
, and
∗
1 + Γλ1
λ2 p1 [α1 (p1 )]2 + 1
λ2 /θ
¯ 1) =
d(p
.
λ2 p1 [α∗1 (p1 )]2 + 1
ā =
(59)
(60)
First, we show popt
/ P1 . Let p1,min denote the minimum p1 to achieve γ1∗ with w1 = h1 /||h1 ||. Then,
1 ∈
p1,min = γ1∗ /λ1 = Γ. Hence, the second condition in (30), i.e., Γ > p1,min (1 − θ) or Γ = p1,min (1 − θ)
√
is satisfied since 0 ≤ θ ≤ 1, and α∗1 (p1,min ) = θ from (30). Hence, we have
ā =
b̄(p1,min ) =
By the NOMA condition λ1 > λ2 , we have
1
λ1
λ1
=
1 + Γλ1
λ2 θ
=
λ2 Γθ + 1
<
1
θλ2
1
λ1
1
+Γ
1
θλ2
(61)
1
.
+Γ
(62)
since 0 ≤ θ ≤ 1 and thus ā > b̄(p1,min ). In case
of Γ = p1,min (1 − θ), we have θ = 0 and thus b̄(p1,min ) = 0 and ā > b̄(p1,min ). Hence, p1,min ∈
/ P1 .
Note that ā is constant over p1 . It can be shown from (30) that the term p1 [α∗1 (p1 )]2 in the denominator
of b̄(p1 ) in (59) is monotone decreasing with respect to p1 , and hence b̄(p1 ) is monotone increasing with
respect to p1 . If ā > b̄(p1 ) for all p1 , P1 is empty. Otherwise, there exists p1 , denoted as p1,a , such that
ā = b̄(p1 ), as p1 increases, given by
p1,a
= {p1 |ā = b̄(p1 )}
λ2 θ
λ1
=
}
1 + Γλ1
λ2 p1 [α∗1 (p1 )]2 + 1
2
q
√
1
−1
= Γ+
.
θΓ − θΓ + λ−1
θ
−
λ
1
2
1−θ
= {p1 |
∗(2)
At p1 = p1,a , we have γ2
∗(1)
= γ2
(63)
from (35) since α∗2 (p1 ) = 1 at the boundary of P1 (p1 ≥ p1,a
∂γ2∗(2) (p1 )
= −1
∂p1
c1 ,
p1 →p−
1,a
∗(2)
P2 such that γ2 (p1 ) >
side) and P2 (p1 < p1,a side), i.e., ā = b̄(p1 ). Furthermore, it can be shown that
where c1 is a non-negative constant with respect to p1 . Hence, there exists p1 ∈
∗(2)
γ2
∗(1)
(p1,a ) = γ2
∗(1)
(p1,a ). Since γ2
is a monotone decreasing function of p1 as seen in (35), optimal
γ2∗ does not occur in P1 , i.e., popt
/ P1 .
1 ∈
¯ 1)
Next, we check the condition that P3 is empty. Since the term p1 [α∗1 (p1 )]2 in the denominator of d(p
¯ 1 ) is monotone increasing with respect
in (60) is monotone decreasing with respect to p1 , and thus d(p
√
¯ 1,min ), then P3 is empty. Since α∗ (p1,min ) = θ from (30) and p1,min = Γ,
to p1 . Therefore, if ā < d(p
1
May 22, 2017
DRAFT
SUBMITTED TO IEEE TRANSACTIONS ON SIGNAL PROCESSING, MAY 22, 2017
24
the condition is rewritten from (59) and (60) as
λ1
λ2 /θ
<
1 + Γλ1
λ2 Γθ + 1
1 1
1
⇔ θΓ <
+Γ −
=: τ.
θ λ1
λ2
¯ 1,min ) ⇔
ā < d(p
(64)
(65)
opt
In this case, P3 = ∅ and popt
/ P1 .
1 ∈ P2 since p1 ∈
Now assume θΓ ≥ τ . Then, P3 is not empty. Furthermore, we have a sufficient condition for ∀ p1 ∈ P3
as follows:
¯ 1 ) < ā,
d(p
λ1
∀p1 ⇐ λ2 /θ <
1 + Γλ1
1 1
1
⇔
+Γ −
<0
θ α1
λ2
(66)
(67)
⇔ τ < 0,
(68)
¯ 1 ) (see (60)). In this case, popt ∈ P3 .
because λ2 /θ is an upper bound of d(p
1
¯ 1 ), given by
Finally, if θΓ ≥ τ and τ ≥ 0, compute p1 , denoted by p1,b , such that ā = d(p
¯ 1 )}
p1,b = {p1 |ā = d(p
(69)
λ2 /θ
λ1
=
}
1 + Γλ1
λ2 p1 [α∗1 (p1 )]2 + 1
√ 2
1 √
θΓ − τ .
= Γ+
1−θ
= {p1 |
If
(70)
(71)
P < p1,b ,
(72)
¯ 1 ) for p1 ≤ P since d(p
¯ 1 ) is a monotone increasing function of p1 . Hence, in this case,
then ā > d(p
∀p1 ∈ P3 and popt
1 ∈ P3 . On the other hand, if p1,b ≤ P , we have both nonempty P2 = {p1 ≥ p1,b } and
∗(2)
P3 = {p1 < p1,b }. In this case, we compute the derivatives of γ2
∗(3)
and γ2
at point p1,b , which are
given by
∗(2)
∂γ2
∂p1
p1 =p+
1,b
∗(3)
∂γ2
∂p1
p1 =p−
1,b
√
√ √
√
1−θ
1−θ
P − λ2 τ √
= c2 λ2 τ √
√
√ · Γ + λ2 τ · θΓ + 1
θΓ − τ
θΓ − τ
√
√ √
√
1−θ
1−θ
P − λ2 τ √
= c3 λ2 τ √
√
√ · Γ + λ2 τ · θΓ + 1 ,
θΓ − τ
θΓ − τ
(73)
(74)
where c2 and c3 are non-negative constants. The two derivatives have the same sign. If the two derivatives
are positive, then γ2∗ increases as p1 crosses p1,b from the left to the right and hence popt
1 ∈ P2 . Otherwise,
May 22, 2017
DRAFT
SUBMITTED TO IEEE TRANSACTIONS ON SIGNAL PROCESSING, MAY 22, 2017
25
γ2∗ increases as p1 crosses p1,b from the right to the left and hence popt
1 ∈ P3 . Equivalently, we have
√ √
1 √
1
( θΓ − τ )( θΓ + √ )
(75)
1−θ
λ2 τ
√ √
1
1 √
(
(76)
θΓ
−
τ )( θΓ + √ ).
popt
∈
P
if
P
<
Γ
+
3
1
1−θ
λ2 τ
√
√
√ 2
√ √
1
1
θΓ − τ < Γ + 1−θ
Since p1,b = Γ + 1−θ
( θΓ− τ )( θΓ+ λ21√τ ), the set {P < p1,b } mentioned
√
√ √
1
in (72) is a subset of the set {P < Γ + 1−θ
( θΓ − τ )( θΓ + λ21√τ )}. Thus, the case of P < p1,b
popt
1 ∈ P2 if P ≥ Γ +
is covered by (76). The only two cases for popt
∈ P2 are [θΓ < τ ] or [θΓ ≥ τ ≥ 0 and P ≥
1
√
√ √
1
1√
Γ + 1−θ ( θΓ − τ )( θΓ + λ2 τ )]. Hence, the claim follows.
To prove Proposition 2, we introduce the following lemma.
Lemma 1: Define
N1 := {θ | a ≤ b(θ)}
(77)
N2 := {θ | b(θ) < a ≤ b(θ) + c2 (θ)/b(θ)}
(78)
N3 := {θ | a > b(θ) + c2 (θ)/b(θ)},
(79)
where a, b(θ) and c(θ) are defined just below (25). Then, for given λ1 , λ2 and Γ, every θ in N1 achieves
the same optimal γ2∗ (θ) in (37), if N1 is not empty.
Proof:
fact that
∗(2)
γ2
(θ)
∗(1)
Let us assume that N1 is not empty. For every θ ∈ N1 , γ2∗ (θ) = γ2
∗(1)
λ1
γ2 = 1+λ
1Γ
∗(1)
< γ2 for all
and
∗(2)
γ2 (θ)
=
λ1
∗
2
1+λ1 Γ [α2 (θ)] ,
==
λ1
1+λ1 Γ .
From the
and 0 ≤ α∗2 (θ) < 1 for θ ∈ N2 , it is obvious that
θ ∈ N2 . Hence, γ2∗ (θ) for θ ∈ N2 is less than γ2∗ (θ) for θ ∈ N1 . Furthermore,
∗(3)
for any θ ∈ N3 , we have γ2
(a)
(θ) =
λ2
λ2 [α∗1 (θ)]2 +1
(b)
≤
(c)
λ2 /θ
λ2 [α∗1 (θ)]2 +1 =
(d)
(e)
∗(1)
[b(θ) + c2 (θ)/b(θ)]2 < a2 = γ2
.
Here, step (a) is by (28), step (b) holds because θ ∈ [0, 1], step (c) is by direction computation based on
b(θ) and c(θ), step (d) holds because θ ∈ N3 , and step (e) is by (28). Consequently, we have the claim.
Proof of Proposition 2: The necessary and sufficient condition for N1 defined in (77) being non-empty
is given by
a2 ≤ max b2 (θ),
0≤θ≤1
(80)
where
a2 =
λ1
λ2 θ
λ2 (1 − θ)
, b2 (θ) =
c2 (θ) =
.
∗
2
1 + Γλ1
λ2 [α1 (θ)] + 1
λ2 [α∗1 (θ)]2 + 1
Since b(θ) is maximized at θ =
max0≤θ≤1 b2 (θ) = λ2 (1 +
May 22, 2017
λ2 Γ
λ2 +1 ),
[λ2 (1−Γ)+1]2
λ22 Γ(1−Γ)+[λ2 (1−Γ)+1]2
(81)
and the corresponding maximum value is
the condition (80) becomes
DRAFT
SUBMITTED TO IEEE TRANSACTIONS ON SIGNAL PROCESSING, MAY 22, 2017
26
λ1
λ2 Γ
≤ λ2 (1 +
)
1 + λ1 Γ
λ2 + 1
1q
1
−1 2
−1
−1
−1
−1
(1 + λ−1
1 + λ2 − λ1 −
⇔ Γ1 :=
1 + λ2 ) − 4λ2 (1 + λ2 ) ≤ Γ
2
2
1q
1
−1 2
−1
−1
−1
−1
≤
(1 + λ−1
1 + λ2 − λ1 +
1 + λ2 ) − 4λ2 (1 + λ2 ) =: Γ2 .
2
2
In the case of non-empty N1 , by substituting α∗1 (θ) in (24) or (85) into b2 (θ), b2 (θ) is given by
λ2 θ
if θ ≤ 1 − Γ
(82)
b2 (θ) =
λ
θ
√ 2
√
if
θ
>
1
−
Γ
2
λ2 [ θΓ−
(1−θ)(1−Γ)] +1
When θ ≤ 1 − Γ, b2 (θ) is linear and it can be shown that b2 (θ) is quasi-concave function when θ > 1 − Γ
∗.
If a2 > λ2 (1 − Γ), there doesn’t exists θ satisfying a2 ≤ λ2 θ (for θ ≤ 1 − Γ) and hence the set
N1 = {θ | a2 ≤ b2 (θ)} is given by
p
z1 z2 + 2Γ(1 − Γ) − 4Γ(1 − Γ)[Γ(1 − Γ) + z1 z2 − z22 ]
θ|
z12 + 4Γ(1 − Γ)
p
z1 z2 + 2Γ(1 − Γ) + 4Γ(1 − Γ)[Γ(1 − Γ) + z1 z2 − z22 ]
≤θ≤
z12 + 4Γ(1 − Γ)
(83)
Otherwise, the minimum of θ satisfying a2 ≤ b2 (θ) is the point such that a2 = λ2 θ and N1 becomes
(
)
p
λ1
1
z1 z2 + 2Γ(1 − Γ) + 4Γ(1 − Γ)[Γ(1 − Γ) + z1 z2 − z22 ]
,
θ|
≤θ≤
λ2 1 + λ1 Γ
z12 + 4Γ(1 − Γ)
−1
where z1 = λ−1
1 +1−Γ and z2 = λ2 +1−Γ. ((83) is obtained by solving
λ1
1+Γλ1
≤
√ λ2 θ
√
λ2 [ θΓ− (1−θ)(1−Γ)]2 +1
reducing to a quadratic inequality). In the case of non-empty N1 , by Lemma 1, N1 is optimal and we
obtain (41).
Next, consider the case that N1 is empty. At θ = 1, we have a(1) =
q
1
Γ+ λ1
1
>
q
1
Γ+ λ1
= b(1) +
2
c2 (1)/b(1) by the NOMA assumption λ1 > λ2 and hence θ = 1 ∈ N3 by the definition of N3 in (79).
We also have
lim b(θ) + c2 (θ)/b(θ) = lim
θ→0
∗
θ→0
s
λ2 θ −1
= ∞,
λ2 [α∗1 (θ)]2 + 1
When θ > 1 − Γ, b2 (θ) can be written as f 2 (θ)/g(θ), where f (θ) =
√
(84)
p
√
λ2 θ and g(θ) = λ2 [ θΓ − (1 − θ)(1 − Γ)]2 + 1.
Since f (θ) is the concave function and g(θ) is the convex function (it can be proved easily by taking secondary derivative), we
can conclude that f 2 (θ)/g(θ) is quasi concave [23].
May 22, 2017
DRAFT
SUBMITTED TO IEEE TRANSACTIONS ON SIGNAL PROCESSING, MAY 22, 2017
27
√
which can easily be seen from α∗1 (0) = 1 − Γ. Thus, θ = 0 ∈ N2 . Furthermore, b(θ) + c2 (θ)/b(θ) =
q
λ2 θ −1
λ2 [α∗ (θ)]2 +1 is a monotone decreasing function of θ since
1
α∗1 (θ) =
0
√θΓ − p(1 − θ)(1 − Γ)
if
θ ≤ θI := 1 − Γ
if
θ > θI
(85)
is a monotone increasing function of θ . Hence, there exists θa such that a(θa ) = b(θa ) + c2 (θa )/b(θa )
to yield N2 = {θ|θ ≤ θa } and N3 = {θ|θ > θa }.
Now recall that
∗(1)
γ2
=
λ1
λ2
λ1
∗(2)
∗(3)
, γ2 (θ) =
[α∗2 (θ)]2 , and γ2 (θ) =
.
∗
1 + λ1 Γ
1 + λ1 Γ
λ2 [α1 (θ)]2 + 1
(86)
If θa ≤ θI , then the optimal θ set for maximizing γ2∗ is given by {θ|θa ≤ θ ≤ θI }. This is because
∗(2)
γ2
∗(3)
(θa ) = γ2
∗(3)
(θa ), because γ2
(θ) is monotone decreasing with respect to θ as seen in (86) since
∗(2)
α∗1 (θ) is a monotone increasing function of θ , and because γ2
(θ) is monotone increasing with respect
to θ for θ ≤ θa since α∗2 (θ) is a monotone increasing function of θ for θ ≤ min{θa , θI } = θa (this can
be shown by substituting α∗1 = 0 for θ ≤ θI into α∗2 (θ) and taking derivative of α∗2 (θ) with respect to θ
and showing the derivative is positive for θ ≤ θa ). Hence, in this case the optimal γ2∗ occurs at θa but
∗(3)
for all θ in {θ|θa ≤ θ ≤ θI }, α∗1 (θ) = 0 and the corresponding optimal γ2∗ = γ2
= λ2 from (86). In
this case, from the assumption θa ≤ θI , θa is computed based on (81) with α∗1 (θ) = 0 as
θa = θ s.t. a = b(θ) + c2 (θ)/b(θ)
= θ s.t.
=
λ1
λ2
=
1 + λ1 Γ
θ
(87)
(88)
λ2
(1 + λ1 Γ)
λ1
(89)
and the condition θa ≤ θI reduces to
λ2
λ2 −1 − λ1 −1
.
(1 + λ1 Γ) ≤ 1 − Γ ⇐⇒ Γ ≤
λ1
1 + λ2 −1
On the other hand, if θa > θI , i.e., Γ >
∗(2)
γ2
λ2 −1 −λ1 −1
,
1+λ2 −1
(90)
then optimal θ exists between θI and θa because
∗(3)
is an increasing function for θ < min{θa , θI } = θI and γ3
is a decreasing function for θ > θa .
Since optimal θ lies in N2 in this case, it is obtained by solving
∗(2)
∂γ2 (θ)
= 0.
∂θ
Therefore, the claim follows.
Proof of Corollary 1:
(91)
With the assumption of λ1 = λ2 , we have Γ1 = 0 and Γ2 = 1 from
(40) and hence the condition Γ ∈ [Γ1 , Γ2 ] reduces to Γ ∈ [0, 1] which is always valid for p1 =
May 22, 2017
DRAFT
SUBMITTED TO IEEE TRANSACTIONS ON SIGNAL PROCESSING, MAY 22, 2017
28
p2 = 1 (see the definition of Γ in (21)). Furthermore, with the assumption, we have z1 = z2 and
p
4Γ(1 − Γ)[Γ(1 − Γ) + z1 z2 − z22 ] in (41) is given by 2Γ(1 − Γ). From (41), the optimal θ set is given
by {θ | θ0 ≤ θ ≤ 1}, where
θ0 =
1
1+Γλ1
z12
z12 +4Γ(1−Γ)
if
if
1
1+Γλ1
1
1+Γλ1
≤1−Γ
(92)
>1−Γ
Proof of Proposition 3: As λ2 → 0. the threshold τ in Proposition 1 converges to −∞ and thus neither
opt
of the two conditions for popt
1 ∈ P2 in Proposition 1 is satisfied. Hence, by Proposition 1, p1 ∈ P3 .
∗(3)
opt
Since popt
(p1 ) in (35) and is given by
1 ∈ P3 , p1 can be obtained in closed form by maximizing γ2
q
−2
ψ12 − ψ1 ψ22 + 2λ−1
2 ψ1 + λ2
opt
p̄1 = −P + 2Γ +
(93)
2θ(1 − θ)Γ
where ψ1 := θΓ + (1 − θ)(P − Γ) + λ−1
2 and ψ2 := θΓ − (1 − θ)(P − Γ). Using L’Hospital’s rule, we
√
opt
can show that limλ2 →0 p̄1 = Γ(= p1,min ). With p1 = Γ, we have α∗1 = θ from (30) and consequently
√
√
β1∗ = 1 − θ from the the constraint eq. in (29), and α∗2 = θ from (34), and by substituting these
√ h
√
∗(3)
1
values into γ2 (p1 ) in (35) and (12) and (13), we have γ2∗ = P Γ−Γ θ+λ−1
,
p
w
=
Γ kh11 k and
1
1
−1
2 Γ
√
√
p2 w2 = P − Γ khh22 k .
R EFERENCES
[1] Y. Saito, Y. Kishiyama, A. Benjebbour, T. Nakamura, A. Li, and K. Higuchi, “Non-orthogonal multiple access (NOMA)
for cellular future radio access,” in Proc. IEEE VTC, pp. 15, Jun. 2013.
[2] D. Tse and P. Viswanath, Fundamentals of Wireless Communication. Cambridge University Press, 2005.
[3] Z. Ding, Z. Yang, P. Fan, and H. V. Poor, “On the performance of non-orthogonal multiple access in 5G systems with
randomly deployed users,” IEEE Signal Process. Lett., vol. 21, pp. 15011505, Jul. 2014.
[4] S. Timotheou and I. Krikidis, “Fairness for non-orthogonal multiple access in 5G systems,” it IEEE Signal Process. Lett.,
vol. 22, pp. 16471651, Mar. 2015.
[5] F. Liu, P. Mahonen, and M. Petrova, “Proportional fairness-based user pairing and power allocation for non-orthogonal
multiple access,” in Proc. IEEE PIMRC, pp. 11271131, Aug. 2015.
[6] J. Choi, “Non-orthogonal multiple access in downlink coordinated two-point systems,” IEEE Commun. Lett., vol. 18, pp.
313316, Jan. 2014.
[7] M. Al-Imari, P. Xiao, M. A. Imran, and R. Tafazolli, “Uplink non-orthogonal multiple access for 5G wireless networks,” in
Proc. IEEE ISWCS, pp. 781785, 2014.
[8] J. So and Y. Sung, “Improving non-orthogonal multiple access by forming relaying broadcast channels,” EEE Commun.
Lett., vol. 20, pp. 18161819, Jul. 2016.
[9] Y. Lan, A. Benjebboiu, X. Chen, A. Li, and H. Jiang, “Considerations on downlink non-orthogonal multiple access (NOMA)
combined with closed-loop SU-MIMO,” in Proc. IEEE ICSPC, pp. 15, 2014.
May 22, 2017
DRAFT
SUBMITTED TO IEEE TRANSACTIONS ON SIGNAL PROCESSING, MAY 22, 2017
29
[10] X. Chen, A. Benjebbour, Y. Lan, A. Li, and H. Jiang, “Impact of rank optimization on downlink non-orthogonal multiple
access (NOMA) with SU-MIMO,” in Proc. IEEE ICCS, pp. 233237, 2014.
[11] M. F. Hanif, Z. Ding, T. Ratnarajah, and G. K. Karagiannidis, “A minorization-maximization method for optimizing sum
rate in the downlink of non-orthogonal multiple access systems,” IEEE Trans. Signal Process., vol. 64, no. 1, pp. 7688, 2016.
[12] B. Kim, S. Lim, H. Kim, S. Suh, J. Kwun, S. Choi, C. Lee, S. Lee, and D. Hong, “Non-orthogonal multiple access in a
downlink multiuser beamforming system,” in Proc. MILCOM, pp. 12781283, 2013.
[13] S. Liu, C. Zhang, and G. Lyu, “User selection and power schedule for downlink non-orthogonal multiple access (NOMA)
system,” in Proc. IEEE ICCW, pp. 25612565, 2015.
[14] A. Sayed-Ahmed and M. Elsabrouty, “User selection and power allocation for guaranteed SIC detection in downlink
beamforming Non-Orthogonal Multiple Access,” in IEEE Wireless Days, 2017, pp. 188193, 2017.
[15] T. Yoo and A. Goldsmith, “On the optimality of multiantenna broadcast scheduling using zero-forcing beamforming,” IEEE
J. Sel. Areas in Commun., vol. 24, pp. 528541, Mar. 2006.
[16] Z. Ding, F. Adachi, and H. V. Poor, “The application of MIMO to non-orthogonal multiple access,” IEEE Trans. Wireless
Commun., vol. 15, pp. 537552, Sept. 2016.
[17] J. Seo and Y. Sung, “A new transceiver architecture for multi-user mimo communication based on mixture of linear and
non-linear reception,” in Proc. SPAWC, (Sapporo, Japan), Jun. 2017.
[18] K. Ho, D. Gesbert, E. Jorswieck, and R. Mochaourab, “Beamforming on the MISO interference channel with multi-user
decoding capability,” arXiv preprint arXiv:1107.0416, 2011.
[19] E. A. Jorswieck, E. G. Larsson, and D. Danev, “Complete characterization of the Pareto boundary for the MISO interference
channel,” IEEE Trans. Signal Process., vol. 56, pp. 52925296, Jul. 2008.
[20] E. A. Jorswieck and E. G. Larsson, “Linear precoding in multiple antenna broadcast channels: Efficient computation of
the achievable rate region,” in Proc. WSA, pp. 2128, Feb. 2008.
[21] J. Lindblom, E. Karipidis, and E. G. Larsson, “Efficient computation of pareto optimal beamforming vectors for the MISO
interference channel with successive interference cancellation,” IEEE Trans. Signal Process., vol. 61, pp. 47824795, Jul. 2013.
[22] J. Lindblom, E. Karipidis, and E. G. Larsson, “Closed-form parameterization of the Pareto boundary for the two-user
MISO interference channel,” in Proc. IEEE ICASSP, pp. 33723375, 2011.
[23] C. Bector, “Programming problems with convex fractional functions,” Operations Research, vol. 16, pp. 383391, Apr.
1968.
May 22, 2017
DRAFT
| 7cs.IT
|
arXiv:1509.00906v3 [math.GT] 13 Sep 2016
SPHERICAL SPACE FORMS REVISITED
DANIEL ALLCOCK
Abstract. We give a simplified proof of J. A. Wolf’s classification
of finite groups that can act freely and isometrically on a round
sphere of some dimension. We slightly improve the classification
by removing some non-obvious redundancy. The groups are the
same as the Frobenius complements of finite group theory.
In chapters 4–7 of his famous Spaces of Constant Curvature [7], J. A.
Wolf classified the spherical space forms: connected Riemannian manifolds locally isometric to the n-sphere S n . By passing to the action of
the fundamental group on the universal covering space, this is equivalent to classifying the possible free isometric actions of finite groups
on S n . Then, by embedding S n in Euclidean space, this is equivalent
to classifying the real representations of finite groups that are “free”
in the sense that no element except the identity fixes any vector except 0. This allowed Wolf to use the theory of finite groups and their
representations.
Our first goal is to give a simplified proof of Wolf’s classification of
the finite groups G that can act freely and isometrically on spheres.
Wolf’s main result here was the list of presentations in theorems 6.1.11
and 6.3.1 of [7]. Our approach to Wolf’s theorem leads to the most
interesting example, the binary icosahedral group, with very little case
analysis and no character theory. (The trick consists of the equalities
(3.2) and (3.3) in the proof of lemma 3.11. These rely on an elementary
property of the binary tetrahedral group, stated in lemma 3.10.)
Our second goal is to remove the redundancy from Wolf’s list; this
modest improvement appears to be new. Some groups appear repeatedly on Wolf’s list because different presentations can define isomorphic
groups. See example 5.1 for some non-obvious isomorphisms. It would
not be hard to just work out the isomorphisms among the groups defined by Wolf’s presentations. But it is more natural to reformulate
the classification in terms of intrinsically defined subgroups. Namely,
Date: 9 September 2016.
1991 Mathematics Subject Classification. 20B10(57S17, 57S25).
Key words and phrases. spherical space form, Frobenius complement.
Supported by NSF grant DMS-1101566.
1
2
DANIEL ALLCOCK
a finite group G acts freely and isometrically on a sphere if and only if
it has one of 6 possible “structures”, in which case it has a unique such
“structure” up to conjugation. See theorems 1.1 and 1.2. In fact we
parameterize the possible G without redundancy, in terms of a fairly
simple set of invariants. Namely: a type I–VI, two numbers |G| and a,
and a subgroup of the unit group of the ring Z/a. In a special case one
must also specify a second such subgroup. See section 5 for details.
The full classification of spherical space forms requires not just the
list of possible groups, but also their irreducible free actions on real
vector spaces, and how their outer automorphism groups permute these
representations. See [7, Thm 5.1.2] for why this is the right data to
tabulate and [7, Ch. 7] for the actual data for each group. We expect
that this data could be described cleanly in terms of our descriptions
of the groups, but have not worked out the details. It would remain
lengthy, because of many cases and subcases to consider.
For many authors the phrase “spherical space form” means a quotient of a sphere by a free action of a finite group of homeomorphisms
or diffeomorphisms, rather than isometries. In this paper we consider
only isometric actions on round spheres. See [6] for the rich topology
and group theory involved in the more general theory.
Expecting topologists and geometers rather than group theorists as
readers, we have made the paper self-contained, with three exceptions.
First, we omit proofs of Burnside’s transfer theorem and the SchurZassenhaus theorem. Second, we use the fact that SL2 (F5 ) is the unique
perfect central extension of the alternating group A5 by Z/2, giving a
citation when needed. Third, we use Aut SL2 (F5 ) = PGL2 (F5 ) ∼
= S5 ,
which is just an exercise.
Finite group theorists study the same groups Wolf did, from a different perspective. We will sketch the connection briefly because our
descriptions of the groups may have some value in this context. A
finite group G is called a Frobenius complement if it acts “freely” on
some finite group H, meaning that no element of G except 1 fixes any
element of H except 1. To our knowledge, the structure of Frobenius
complements (in terms of presentations) is due to Zassenhaus [8]. Unfortunately his paper contains an error, and the first correct proof is
due to Passman [5, Theorems 18.2 and 18.6]. See also Zassenhaus’ later
paper [9]. If G is a Frobenius complement, then after a preliminary reduction one can show that H may be taken to be a vector space over
a finite field Fp , where p is a prime not dividing |G|. Our arguments
apply with few or no changes; see remark 3.12 and also [4], especially
Prop. 2.1.
SPHERICAL SPACE FORMS REVISITED
3
We will continue to abuse language by speaking of free actions on
vector spaces when really we mean that the action is free away from 0.
We will use the standard notation G′ for the commutator subgroup
of a group G, and O(G) for the unique maximal-under-inclusion odd
normal subgroup when G is finite.
We will also use ATLAS notation for group structures [1]. That is,
if a group G has a normal subgroup A, the quotient by which is B,
then we may say “G has structure A.B”. We sometimes write this
as G ∼ A.B. This usually does not completely describe G, because
several nonisomorphic groups may have “structure A.B”. Nevertheless
it is a helpful shorthand, especially if A is characteristic. If the group
extension splits then we may write A : B instead, and if it doesn’t then
we may write A · B. See theorem 1.1 for a some examples. When we
write A : B, we will regard B as a subgroup of G rather than just a
quotient. (In all our uses of this notation, the complements to A turn
out to be conjugate, so there is no real ambiguity in choosing one of
them.)
I am very grateful to the referee for catching a serious error in an
earlier version of this paper.
1. The groups
It is well-known that the groups of orientation-preserving isometries
of the tetrahedron, octahedron (or cube) and icosahedron (or dodecahedron) are subgroups of SO(3) isomorphic to A4 , S4 and A5 . The
preimages of these groups in the double cover of SO(3) are called the
binary tetrahedral, binary octahedral and binary icosahedral groups.
They have structures 2.A4 , 2.S4 and 2.A5 , where we are using another
ATLAS convention: indicating a cyclic group of order n by simply
writing n; here n is 2. These are the only groups with these structures
that we will encounter in this paper. So we abbreviate them (again
following the ATLAS) to 2A4 , 2S4 and 2A5 , and specify that this notation refers to the binary polyhedral groups, rather than some other
groups with structure 2.A4 , 2.S4 or 2.A5 . Alternate descriptions of the
binary tetrahedral and binary icosahedral groups are 2A4 ∼
= SL2 (3) and
2A5 ∼
= SL2 (5).
It is also well-known that the double cover of SO(3) may be identified
with the unit sphere H∗ in Hamilton’s quaternions H. A finite subgroup
of H∗ obviously acts by left multiplication on H∗ . So 2A4 , 2S4 and 2A5
act freely on the unit sphere S 3 .
Similarly, SO(3) contains dihedral subgroups, and their preimages
in H∗ are called binary dihedral. If we start with the dihedral group
4
DANIEL ALLCOCK
of order 2n, then the corresponding binary dihedral group of order 4n
can be presented by
x, y x2n = 1, yxy −1 = x−1 , y 2 = xn .
This group may be identified with a subgroup of H∗ by taking
(1.1)
x 7→ (any primitive 2nth root of unity in R ⊕ Ri)
y 7→ j.
Left multiplication by these elements of H gives a free action on S 3 .
(Replacing the root of unity by its inverse gives an equivalent representation.) Restricting to the case n = 2m−2 , m ≥ 3, one obtains the
quaternion group Q2m of order 2m . Some authors call this a generalized
quaternion group, with “quaternion group” reserved for Q8 .
Now we can state our version of Wolf’s theorems 6.1.11 and 6.3.1,
supplemented by a uniqueness theorem. An n-element of a group means
an element of order n.
∗
Theorem 1.1 (Groups that act freely and isometrically on spheres).
Suppose G is a finite group that acts freely and isometrically on a sphere
of some dimension. Then it has one of the following six structures,
where A and B are cyclic groups whose orders are odd and coprime,
every nontrivial Sylow subgroup of B acts nontrivially on A, and every
prime-order element of B acts trivially on A.
(I) A : B × (a cyclic 2-group T ) , where if T 6= 1 then its involution fixes A pointwise.
(II) A : B × (a quaternionic group T ) .
(III) (Q8 × A) : (Θ × B), where Θ is a cyclic 3-group which acts
nontrivially on Q8 and whose 3-elements centralize A, and |A|
and |B| are prime to 3.
(IV) (Q8 ×A) : (Θ×B) ·2, where Θ, |A| and |B| are as in (III), and
the quotient Z/2 is the image of a subgroup Φ of G, isomorphic
to Z/4, whose 4-elements act by an outer automorphism on Q8 ,
by inversion on Θ and trivially on B.
(V) 2A5 × (A : B) where
|A| and |B| are prime to 15.
(VI) 2A5 × (A : B) · 2, where |A| and |B| are prime to 15, and the
quotient Z/2 is the image of a subgroup Φ of G, isomorphic to
Z/4, whose 4-elements act by an outer automorphism on 2A5
and trivially on B.
Conversely, any group with one of these structures acts freely and isometrically on a sphere of some dimension.
These groups are parameterized in terms of simple invariants in theorem 5.3. A binary dihedral group has type I or II, 2A4 has type III,
2S4 has type IV, and 2A5 has type V.
SPHERICAL SPACE FORMS REVISITED
5
Theorem 1.2 (Uniqueness of structure). The structure in theorem 1.1
is unique, in the following sense:
(1) Groups of different types I–VI cannot be isomorphic.
(2) Suppose G has one of the types I–VI, with respect to some subgroups A, B (and whichever of T , Q8 , Θ, Φ and 2A5 are relevant), and also with respect to some subgroups A∗ , B ∗ (and T ∗ ,
Q∗8 , Θ∗ , Φ∗ and 2A∗5 , when relevant). Then some element of G
conjugates every unstarred group to the corresponding starred
group. In particular, A∗ = A (and Q∗8 = Q8 and 2A∗5 = 2A5 ,
when relevant).
Remark 1.3 (Correspondence with Wolf’s types). Our types correspond
in the obvious way to Wolf’s in theorems 6.1.11 and 6.3.1 of [7]. However, his generator A might not generate our subgroup A and his generator B might not even lie in our subgroup B.
Remark 1.4 (Implied relations). Some useful information is implicit.
For example, B acts trivially on Q8 for types III and IV, because Q8
has no automorphisms of odd order > 3. Also, Θ must act trivially on
A for type IV, because A has abelian automorphism group and Θ ≤ G′ .
In light of these remarks,
one could rewrite G’s structure for type IV
as (Q8 : Θ) × (A : B) · 2. This would be more informative, but hide
the relationship to type III.
In all cases, G has at most one involution. This is obvious except
for type II. Then, T ’s central involution lies in T ′ , which centralizes A
because Aut A is abelian.
At this point we will prove the easy parts of the theorems, namely
that the listed groups do act freely on spheres, and that groups of
different types cannot be isomorphic. The proof that every group acting
freely on a sphere has structure as in theorem 1.1 appears in sections 3–
4, and theorem 1.2’s uniqueness statement is a byproduct of the proof.
Proof of “Conversely. . .” in theorem 1.1. Define H as the normal subgroup of G that is generated by the elements of prime order. We claim:
if H has a free action on a real vector space V , then G acts freely on its
representation W induced from V . To see this, recall that as a vector
space, W is a direct sum of copies of V , indexed by G/H. And H’s
actions on these copies of V are isomorphic to the representations got
by precomposing H → GL(V ) by automorphisms H → H arising from
conjugation in G. In particular, H acts freely on W . We claim that
G also acts freely on W . Otherwise, some prime-order element of G
would have a fixed point. But it would also lie in H, which acts freely.
6
DANIEL ALLCOCK
Now it suffices to determine H and show that it always has a free
action. For types I–II, H is a cyclic group, and for types V–VI it is
2A5 ×(cyclic group of order prime to 30). For types III–IV, H is either
cyclic or 2A4 ×(cyclic group of order prime to 6), according to whether
|Θ| > 3 or |Θ| = 3. These claims are all easy, using the facts that G’s
involution is central (if one exists) and the prime-order elements of B
and (if relevant) Θ act trivially on A.
Cyclic groups obviously admit free actions. For a product of 2A4 or
2A5 by a cyclic group of coprime order, we identify each factor with a
subgroup of H∗ and make 2A4 or 2A5 act on H by left multiplication and
the cyclic group act by right multiplication. If there were a nonidentity
element of this group with a nonzero fixed vector, then there would be
one having prime order, hence lying in one of the factors. But this is
impossible since each factor acts freely.
Proof of theorem 1.2(1). Suppose G has one of the types I–VI. Then
the subgroup H generated by A, B and the index 3 subgroup of Θ (for
types III–IV) is normal in G and has odd order. The quotient G/H
is a cyclic 2-group, a quaternionic group, 2A4 , 2A4 · 2, 2A5 or 2A5 · 2
respectively. None of these has an odd normal subgroup larger than
{1}. Therefore H is all of O(G), and the isomorphism class of G/O(G)
distinguishes the types.
2. Preparation
In this section we suppose G is a finite group. We will establish general
properties of G under hypotheses related to G having a free action on
a sphere. The results before lemma 2.8 are standard, and included for
completeness. Lemma 2.8 is a refinement of a standard result.
Lemma 2.1 (Unique involution). Suppose G has a free action on a
sphere. Then it has at most one involution.
Proof. Choose a free (hence faithful) action of G on a real vector
space V . An involution has eigenvalues ±1, but +1 cannot appear by
freeness. So there can be only one involution, acting by negation.
Lemma 2.2. Suppose G has a free action on a sphere. Then every
abelian subgroup is cyclic, and so is every subgroup of order pq, where
p and q are primes.
Proof. Fix a free action of G on a real vector space V , and let VC be its
complexification. G also acts freely on VC . Otherwise, some nontrivial
element has a nonzero fixed vector, hence has the real number 1 as an
eigenvalue, hence fixes a nonzero real vector.
SPHERICAL SPACE FORMS REVISITED
7
Now suppose A ≤ G is abelian, and decompose VC under A as a
sum of 1-dimensional representations. By freeness, each of these is
faithful. So A is a subgroup of the multiplicative group C − {0}, hence
cyclic, proving the first claim. Since any group of prime-squared order
is abelian, this also proves the p = q case of the second claim.
So suppose p < q are primes and consider a subgroup of G with
order pq; by discarding the rest of G we may suppose without loss that
this subgroup is all of G. Write P resp. Q for a Sylow p-subgroup resp.
q-subgroup. By Sylow’s theorem, P normalizes Q. If it acts trivially
on Q then G is abelian, so suppose P acts nontrivially on Q.
For purposes of this proof, a character of Q means a homomorphism
Q → C∗ . It is standard that any complex representation of Q is the
direct sum of Q’s character spaces, meaning the subspaces on which Q
acts by its various characters. Fix a character χ of Q whose character
space contains a nonzero vector v ∈ VC ; χ is faithful since Q acts freely
on VC . If g ∈ P then g(v) lies in the character space for the character
∗
−1
χ ◦ i−1
means conjugation by g. Since
g : Q → C , where ig : x 7→ gxg
−1
χ is faithful, and P acts faithfully on Q, the various
P characters χ ◦ ig
are all distinct. Therefore the terms in the sum g∈P g(v) are linearly
independent, so the sum is nonzero. But this contradicts freeness since
the sum is obviously P -invariant.
Lemma 2.3 (Sylow subgroups). Suppose all of G’s abelian subgroups
are cyclic. Then its odd Sylow subgroups are cyclic, and its Sylow 2subgroups are cyclic or quaternionic.
Proof. It suffices to treat the case of G a p-group, say of order pn . We
proceed by induction on n, with the cases n ≤ 2 being trivial. So
suppose n > 2.
First we treat the special case that G contains a cyclic group X of
index p. If G acts trivially on X then G is abelian, hence cyclic. So
we may assume that G/X is identified with a subgroup of order p in
Aut X. Recall that Aut X is cyclic of order (p − 1)pn−2 if p is odd, and
Z/2 times a cyclic group of order 2n−3 if p = 2. This shows that some
y ∈ G − X acts on X by the λth power map, where
(
pn−2 + 1
if p is odd
λ=
n−2
−1 or 2
± 1 if p = 2,
with the possibilities 2n−2 ±1 considered only if n > 3. Write X0 for the
subgroup of X centralized by y. Now, hX0 , yi is abelian, hence cyclic.
The index of its subgroup X0 is p, because y p lies in X and centralizes
y. Since y ∈
/ X0 , y generates hX0 , yi. We write pt for the index of X0
8
DANIEL ALLCOCK
in X, which can be worked out from y’s action on X. Namely,
(
2n−2 if p = 2, and λ = −1 or 2n−2 − 1
pt =
p
otherwise
t
We choose a generator x for X such that y p = x−p .
Since xy and y have the same centralizer in X, the same argument
shows that (xy)p also generates X0 . Now,
(xy)p = x(yxy −1)(y 2xy −2 ) · · · (y p−1xy 1−p )y p
2
p−1
= x · xλ · xλ · · · xλ
t
· x−p .
Our two descriptions hy pi and h(xy)p i of X0 ≤ X ∼
= Z/pn−1 must
coincide, so µ := 1 + λ + · · · + λp−1 − pt generates the same subgroup
of Z/pn−1 as pt does. One computes
pt
p
2n−2
2n−2
µ
n−2
p
if λ = pn−2 + 1 (including the case 2n−2 + 1)
0
if λ = 2n−2 − 1
n−2
2
if λ = −1
p
2
Only in the last case do pt and µ generate the same subgroup of Z/pn−1 .
So p = 2, y inverts X, and y 2 is the involution in X. That is, G is
quaternionic. This finishes the proof in the special case.
Now we treat the general case. Take H to be a subgroup of index p.
If p is odd then H is cyclic by induction, so the special case shows
that G is cyclic too. So suppose p = 2. By induction, H is cyclic or
quaternionic. If it is cyclic then the special case shows that G is cyclic
or quaternionic, as desired. So suppose H is quaternionic and take
X to be a G-invariant index 2 cyclic subgroup of H. This is possible
because H contains an odd number of cyclic subgroups of index 2 (three
if H ∼
= Q8 and one otherwise). Now we consider the action of G/X on
X. If some element of G − X acts trivially then together with X it
generates an abelian, hence cyclic, group, and the special case applies.
So G/X is 2 × 2 or 4 and embeds in Aut X. (These cases require
|X| ≥ 8 or 16 respectively, or equivalently n ≥ 5 or 6.) Furthermore,
Aut X contains just three involutions, and only one of them can be
a square in Aut X, namely the (1 + 2n−2 )nd power map. Therefore,
either possibility for G/X yields an element y of G which acts on X
by this map and has square in X. But then hX, yi is neither cyclic nor
quaternionic, contradicting the special case.
Recall that a group is called perfect if its abelianization is trivial.
SPHERICAL SPACE FORMS REVISITED
9
Lemma 2.4 (2A5 recognition). Suppose G is perfect with center Z/2,
and every noncentral cyclic subgroup has binary dihedral normalizer.
Then G ∼
= 2A5 .
Proof. Write 2g for |G|. The hypothesis on normalizers shows that distinct maximal cyclic subgroups of G have intersection equal to Z(G).
So G is the disjoint union of Z(G) and the subsets C − Z(G) where
C varies over the maximal cyclic subgroups of G. We choose representatives C1 , . . . , Cn for the conjugacy classes of such subgroups and
write 2c1 , . . . , 2cn for their orders. The numbers c1 , . . . , cn are pairwise
coprime because each of C1 , . . . , Cn is the centralizer of each of its subgroups of order > 2. We number the Ci so that c1 is divisible by 2, c2 is
divisible by the smallest prime involved in g but not c1 , c3 is divisible
by the smallest prime involved in g but neither c1 nor c2 , and so on.
In particular, ci is at least as large as the ith prime number.
Each conjugate of Ci −Z(G) has 2ci −2 elements, and the normalizer
hypothesis tells us there are g/2ci many conjugates. Therefore (2ci −
2)g/2ci = g 1 − c1i elements of G −Z(G) are conjugate into Ci −Z(G).
Our partition of G gives
n
X
(2.1)
2g = 2 + g
(1 − c1i )
i=1
P
We can rewrite this as g(2−n) = 2− ni=1 g/ci . Since G has no index 2
subgroups, each term g/ci in the sum is larger than 2. Since the right
side is negative, g(2 − n) is also. So n > 2.
In fact n = 3. Otherwise, we would use c1 ≥ 2, c2 ≥ 3, c3 ≥ 5, c4 ≥ 7
to see that the sum on the right side of (2.1) is
(at least 12 ) + (at least 32 ) + (at least 45 ) + (at least 76 ) + · · · > 2
which is a contradiction. Now we rewrite (2.1) as c11 + c12 + c13 =
1 + 2/g. In particular, the left side must be larger than 1, which
requires c1 = 2, c2 = 3, c3 = 5. Then 21 + 13 + 15 = 1 + 2/g gives a
formula for g, namely g = 60, so |G| = 120. So G/Z(G) is nonsolvable
of order 60. A Sylow’s theorem exercise rules out the possibility that
there are 15 Sylow 2-subgroups, so there must be 5, and it follows easily
that G/Z(G) ∼
= A5 . So G has structure 2.A5 . Finally, A5 has a unique
perfect central extension by Z/2, namely the binary icosahedral group
[5, Prop. 13.7].
Theorem 2.5 (Burnside’s transfer theorem). Suppose G is a finite
group, and P is a Sylow subgroup that is central in its normalizer.
Then P maps faithfully to the abelianization G/G′ .
10
DANIEL ALLCOCK
Proof. [3, Thm. 5.13], [2, Thm. 4.3] or [7, Thm 5.2.9].
Corollary 2.6 (Cyclic transfer). Suppose G is a finite group, p is a
prime, and G’s Sylow p-subgroups are cyclic. If some nontrivial p-group
is central in its normalizer, or maps nontrivially to G/G′ , then every
Sylow p-subgroup maps faithfully to G/G′ . In particular, this holds if
p is the smallest prime dividing |G|.
Proof. Suppose that P0 ≤ G is a p-group satisfying either of the two
conditions, and choose a Sylow p-subgroup P containing it. It is cyclic
by hypothesis, so P0 is characteristic in P , so N(P ) lies in N(P0 ). The
automorphisms of P with order prime to p act nontrivially on every
nontrivial subquotient of P . Under either hypothesis, P0 (hence P )
has a nontrivial subquotient on which N(P ) acts trivially. Therefore
the image of N(P ) in Aut P contains no elements of order prime to p.
It contains no elements of order p either, since P is abelian. So P is
central in its normalizer and we can apply Burnside’s transfer theorem.
Since P maps faithfully to G/G′ , so does every Sylow p-subgroup.
For the final statement, observe that Aut P has no elements of prime
order > p. So its normalizer must act trivially on it, and we can apply
the previous paragraph.
Theorem 2.7 (Schur-Zassenhaus). Suppose G is a group, N is a normal subgroup, and |N| and |G/N| are coprime. Then there exists a
complement to N in G, and all complements are conjugate.
As stated, this relies on the odd order theorem. But we only need
the much more elementary case that N is abelian (Theorem 3.5 of [3]).
In determining the structure of his groups, Wolf used a theorem of
Burnside: if all Sylow subgroups of a given group H are cyclic, then
H ′ and H/H ′ are cyclic of coprime order, H ′ has a complement, and
all complements are conjugate. We prefer the following decomposition
H = A : B because of its “persistence” property (4). We only need
this property for the imperfect case (section 4).
Lemma 2.8 (Metacyclic decomposition). Suppose H is a finite group,
all of whose Sylow subgroups are cyclic. Define A as the subgroup
generated by H ′ and all of H’s Sylow subgroups that are central. Then
A has the following two properties and is characterized by them:
(1) A is normal, and A and H/A are cyclic of coprime orders.
(2) Every nontrivial Sylow subgroup of H/A acts nontrivially on A.
Furthermore,
(3) A has a complement B, and all complements are conjugate.
SPHERICAL SPACE FORMS REVISITED
11
(4) Suppose a finite group G contains H as a normal subgroup,
with |G/H| coprime to |H|. Then there is a complement C to
H, such that the decomposition H ∼ A : B in (3) extends to
G ∼ A : (B × C). Furthermore, all complements of H that
normalize B are conjugate under NH (B).
Proof. First we show that H is solvable. If p is the smallest prime
dividing |H|, and P is a Sylow p-subgroup, then corollary 2.6 shows
that H has a quotient group isomorphic to P . The kernel is solvable
by induction, so H is too.
Now let F be the Fitting subgroup of H, i.e., the unique maximal
normal nilpotent subgroup. Being nilpotent, it is the product of its
Sylow subgroups. Since these are cyclic, so is F . Also, H/F acts
faithfully on F , for otherwise F would lie in a strictly larger normal
nilpotent subgroup. As a subgroup of the abelian group Aut F , H/F
is abelian. Therefore the cyclic group F contains H ′, so H ′ is cyclic.
If p is a prime dividing the order of H/H ′ , then corollary 2.6 shows
that every Sylow p-subgroup meets H ′ trivially. It follows that the
orders of H ′ and H/H ′ are coprime. A is obviously normal. Since A
is the product of H ′ with the central Sylow subgroups of H, we see
that A and H/A also have coprime orders. Since A contains H ′ , H/A
is abelian. Having cyclic Sylow subgroups, H/A is cyclic. We have
proven (1).
Because |A| and |H/A| are coprime, the Schur-Zassenhaus theorem
assures us that A has a complement B, and that all complements are
conjugate, proving (3). For (2), suppose a Sylow subgroup of B acts
trivially on A. Then it is central in H, so A contains it by definition,
which is a contradiction.
Next we prove the “persistence” property (4), so we assume its hypotheses. Since A is characteristic in H, it is normal in G. Since all
complements to A in H are conjugate in A, the Frattini argument shows
that NG (B) maps onto G/H. Applying the Schur-Zassenhaus theorem
to NH (B) inside NG (B) yields a complement C to H that normalizes
B. That theorem also shows that all such complements are conjugate
under NH (B)
To prove (4) it remains only to show that B and C commute. If C
acted nontrivially on B, then G′ would contain a nontrivial p-group for
some prime p dividing |B|. Using corollary 2.6 as before, it follows that
G′ contains a Sylow p-subgroup P of B. Since P lies in the commutator
subgroup of G, it must act trivially on A. This contradicts (2). So B
and C commute, completing the proof of (4). (Remark: since NH (B) =
CA (B)×B, we could replace NH (B) in the statement of (4) by CA (B).)
12
DANIEL ALLCOCK
All that remains is to show that (1) and (2) characterize A; suppose
A∗ ≤ H has these properties. By (2), all the Sylow subgroups of H that
act trivially on A∗ lie in A∗ . Since A∗ is cyclic, Aut A∗ is abelian, so
H ′ acts trivially on it. We already saw that H ′ is the product of some
of H’s Sylow subgroups, so H ′ lies in A∗ . The central Sylow subgroups
of H also act trivially on A∗ , so also lie in A∗ . We have shown that A∗
contains A. If A∗ were strictly larger than A, then the coprimality of
|A∗ | and |H/A∗ | would show that A∗ contains a Sylow subgroup of H
that is not in A. But then A∗ is nonabelian by property (2) of A, and
therefore property (1) fails for A∗ .
3. The perfect case
In this section and the next we prove theorems 1.1 and 1.2 inductively.
We suppose throughout that G is a finite group that acts freely on a
sphere of some dimension. Under the assumption that every proper
subgroup has one of the structures listed in theorem 1.1, we will prove
that G also has such a structure. In this section we also assume G is
perfect. This includes base case G = 1 of the induction, which occurs in
case I. The only other perfect group in theorem 1.1 is 2A5 . Theorem 1.2
is trivial for G ∼
= 2A5
= 1 or 2A5 . Therefore it will suffice to prove G ∼
under the assumption G 6= 1.
Lemma 3.1. G’s Sylow 2-subgroups are quaternionic, in particular
nontrivial.
Proof. By lemma 2.3, all the odd Sylow subgroups are cyclic. If the
Sylow 2-subgroups were too, then corollary 2.6, applied to the smallest
prime dividing |G|, would contradict perfectness. Now lemma 2.3 shows
that the Sylow 2-subgroups must be quaternionic.
Lemma 3.2. G’s 4-elements form a single conjugacy class.
Proof. Let T be a Sylow 2-subgroup (quaternionic by the previous
lemma) and U a cyclic subgroup of index 2. We consider the action of
G on the coset space G/U, whose order is twice an odd number. By
lemma 2.1, G contains a unique involution, necessarily central. Since it
lies in every conjugate of U, it acts trivially on G/U. Now let φ be any
4-element. Since its square acts trivially, φ acts by exchanging some
points in pairs. Since G is perfect, φ must act by an even permutation,
so the number of these pairs is even. Since the size of G/U is not divisible by 4, φ must fix some points. The stabilizers of these points are
conjugates of U, so φ is conjugate into U. Finally, the two 4-elements
in U are conjugate since T contains an element inverting U.
SPHERICAL SPACE FORMS REVISITED
13
Lemma 3.3. O(G) = 1.
Proof. Suppose otherwise. Since G’s odd Sylow subgroups are cyclic,
lemma 2.8(1) shows that O(G) has a characteristic cyclic subgroup of
prime order. Because this subgroup has abelian automorphism group,
and G is perfect, G acts trivially on it. Now corollary 2.6 shows that
G has nontrivial abelianization, contradicting perfectness.
Lemma 3.4. Every maximal subgroup M of G has center of order 2.
Proof. First, M contains G’s central involution. Otherwise, adjoining
it to M would yield G by maximality. Then G would have an index 2
subgroup, contrary to perfectness. Next we show that M has no central
subgroup Y of order 4; suppose it did. By the conjugacy of Z/4’s in
G, and the fact that G’s Sylow 2-subgroups are quaternionic, N(Y )
contains an element inverting Y . So N(Y ) is strictly larger than M,
hence coincides with G, and the map G → Aut(Y ) ∼
= Z/2 is nontrivial,
contrary to perfectness.
Finally we show that M has no central subgroup Y of odd prime
order > 1. The previous lemma shows that N(Y ) is strictly smaller
than G. Since M normalizes Y and is maximal, it is Y ’s full normalizer.
Since Y is central in M, we see that N(Y ) acts trivially on Y . Now
corollary 2.6 shows that G/G′ is nontrivial, contradicting perfectness.
The next lemma is where our development diverges from Wolf’s.
Lemma 3.5 (Maximal subgroups). Every maximal subgroup M of G
has one of the following structures, with O(M) a cyclic group.
(I) O(M) : (cyclic 2-group of order > 2)
(II) O(M) : (quaternionic group)
(III) 2A4
(IV) O(M).2A4 · 2 where the elements of M outside O(M).2A4 act
on O(M) by inversion and on the quotient 2A4 by outer automorphisms.
(V) 2A5
(VI) O(M) × 2A5 · 2 where the elements of M outside O(M)×2A5
act on O(M) by inversion and on 2A5 by outer automorphisms.
The G-normalizer of any nontrivial subgroup of O(M) is M. If M1
and M2 are non-conjugate maximal subgroups, then O(M1 ) and O(M2 )
have coprime orders.
Proof. By induction, M has one of the structures in theorem 1.1. In
light of the previous lemma, we keep only those with center of order 2.
Here are the details. In every case, the prime order elements of B are
14
DANIEL ALLCOCK
central in M, so they cannot exist, so B = 1. For types I–II this leaves
O(M) = A and establishes our claimed structure for M. For type I
we must also show that the cyclic 2-group, call it T , has order > 2.
Otherwise, A is central in M, hence trivial, so T is all of M and has
order 2. That is, the center of G is a maximal subgroup of G, which is
a contradiction because no group can have this property.
For type V we have shown M ∼ 2A5 ×A, so A is central, hence trivial.
For type III we know M ∼ (Q8 × A) : Θ, with Θ’s 3-elements centralizing A. It follows that |Θ| = 3, because otherwise Θ’s 3-elements would
also centralize Q8 , hence be central in M. From |Θ| = 3 it follows
that A is central in M, hence trivial. So M ∼ Q8 : 3 with the Z/3
acting nontrivially on Q8 . Since Aut(Q8 ) ∼
= S4 has a unique class of
3-elements, M is determined up to isomorphism, namely M ∼
= 2A4 .
For type VI we know M ∼ (2A5 × A) · 2 and O(M) = A. Also, A
decomposes as the direct sum of its subgroup inverted by the nontrivial
element t of M/(2A5 × A) ∼
= Z/2 and its subgroup fixed pointwise by t.
The latter subgroup is central in M, hence trivial, so t inverts A as
claimed. Also, t’s image in Out 2A5 is nontrivial by the definition of
type VI groups.
Finally, for type IV we have M ∼ (Q8 × A) : Θ · 2. By remark 1.4,
Θ and A commute. So O(M) is cyclic and generated by A and the
index 3 subgroup of Θ, leaving M ∼ (O(M).2A4 ) · 2. By the argument
for type VI, the elements of M mapping nontrivially to Z/2 must invert
O(M) and act on Q8 by outer automorphisms.
We have shown in each case that O(M) is cyclic. So its subgroups
are characteristic in O(M), hence normal in M. By lemma 3.3 and
maximality, M is the full normalizer of any nontrivial subgroup of
O(M). For the last claim of the theorem, suppose a prime p divides
the orders of O(M1 ) and O(M2 ). We have just shown that M1 is the
normalizer of a cyclic group of order p, and that M2 is the normalizer
of another. These cyclic groups are G-conjugate, so M1 and M2 are
also.
Lemma 3.6 (Done if Q16 6≤ G). Suppose the Sylow 2-subgroups of G
have order 8. Then G ∼
= 2A5 .
Proof. Suppose M is a maximal subgroup of G. It cannot have type
IV or VI, because these contain copies of Q16 . If M has type III or V
then M ∼
= 2A4 or 2A5 by lemma 3.5. We claim that in the remaining
cases, M is binary dihedral.
If M has type I then it has structure O(M) : T where T is a cyclic
group of order ≥ 4. Since this is the largest a cyclic 2-group in G can
be, T has order exactly 4. A generator for it must negate O(M), or else
SPHERICAL SPACE FORMS REVISITED
15
M’s center would have order > 2. We have shown that M is binary
dihedral.
Now suppose M has type II, hence structure O(M) : Q where Q ∼
=
Q
,
which
is
binary
dihedral
as
claimed.
So
Q8 . If O(M) = 1 then M ∼
= 8
suppose O(M) 6= 1 and let P be any Sylow subgroup of O(M). Since
Aut P is cyclic, and Q/Q′ ∼
= 2 × 2, some 4-element of Q acts trivially
on P . Since all 4-elements are conjugate, the centralizer of any one
of them has order divisible by |P |. Now fix a particular 4-element φ.
Letting P vary over all Sylow subgroups of O(M) shows that C(φ) has
order divisible by |O(M)|. The only maximal subgroup of G that could
contain a cyclic group of order 4 · |O(M)| is M, up to conjugacy. So
after conjugation we may suppose that O(M) ≤ C(φ) ≤ M. We have
shown that some 4-element φ of Q centralizes O(M). So Q acts on
O(M) via a quotient group of order ≤ 2. This quotient must be Z/2,
acting by negation, because otherwise M would have center larger than
Z/2. It follows that M is binary dihedral.
We have shown that every maximal subgroup of M is binary dihedral,
binary tetrahedral or binary icosahedral. By examining normalizers in
these groups, one checks that every noncentral cyclic subgroup of G
has binary dihedral normalizer. So G ∼
= 2A5 by lemma 2.4.
To prove the perfect case of theorems 1.1 and 1.2, it now suffices to
rule out the case Q16 ≤ G. We devote the rest of this section to this.
Lemma 3.7 (Z/4 normalizers). For any subgroup Φ ∼
= Z/4 of G, N(Φ)
has structure (odd group).(Sylow 2-subgroup of G).
Proof. We claim first that N(Φ) has structure (odd group).(2-group).
Choosing a maximal subgroup M containing N(Φ), it suffices to show
that NM (Φ) has this structure. To prove this one considers each possible structure for M listed in lemma 3.5, and each subgroup Z/4 of it.
To finish the proof we use the facts that some Z/4 is normal in some
Sylow 2-subgroup, and that all Z/4’s are conjugate.
Lemma 3.8 (Q8 normalizers). Suppose G contains a copy of Q16 .
Choose Q ≤ G isomorphic to Q8 and write N for its normalizer. Then
(1) N ∼ O(N).2A4 · 2.
(2) Q lies in a group 2A4 if and only if 3 ∤ |O(N)|.
(3) G has more than one conjugacy class of Q8 subgroups.
(4) G contains a subgroup 2A4 .
Proof. (1) We begin by exhibiting some elements of N. Choose any
subgroup Φ ∼
= Z/4 of Q. There exists a Sylow 2-subgroup of N(Φ)
that contains Q. So Q lies in some Q16 that normalizes Φ. This Q16
16
DANIEL ALLCOCK
contains an element that inverts Φ and exchanges the other two Z/4
subgroups of Q. We have shown that N contains an element that
normalizes our chosen Z/4 and exchanges the other two Z/4’s in Q. It
follows that N acts by S3 on the three Z/4 subgroups of Q.
Now we fix a maximal subgroup M of G that contains N. The
property of N just established
forces M to have type IV or VI. That is,
M ∼ O(M).(2A4 or 2A5 ) ·2 with Q lying in the index 2 subgroup M ′ .
In either case, N coincides with NM (Q), which has the stated structure.
Also, O(N) = O(M), which we will use later in the proof.
(2) “If” follows from the existence of Sylow 3-subgroup, isomorphic
to Z/3, in N. For “only if”, suppose 3 divides |O(N)|. Then N cannot
contains any 2A4 , because all its 3-elements are central in N.
(3) Fix Φ ≤ Q isomorphic to Z/4. By lemma 3.7 there is a subgroup
Q∗ ∼
= Q8 of N(Φ) that is not N(Φ)-conjugate to Q. We claim that
∗
Q is not G-conjugate to Q either; suppose to the contrary that some
g ∈ G conjugates Q∗ to Q. By Φ ≤ Q∗ we see that g sends Φ into Q.
By replacing g by its composition with an element of N that sends Φg
back to Φ, we may suppose without loss that g normalizes Φ. That is,
Q and Q∗ are conjugate in N(Φ), which is a contradiction.
(4) Supposing that G contains no 2A4 , we will show that every subgroup Q∗ ∼
= Q8 of G is conjugate to Q, which contradicts (3). Applying
the argument for (1) to Q∗ , we write N ∗ for its normalizer and M ∗ for
a maximal subgroup containing N ∗ . By (2) and the nonexistence of
2A4 ’s, 3 divides the orders of O(N) and O(N ∗ ). These groups are the
same as O(M) and O(M ∗ ). Since |O(M)| and |O(M ∗ )| have a common
factor, the last part of lemma 3.5 shows that M and M ∗ are conjugate.
So their index two subgroups M ′ and M ∗ ′ are conjugate, both of which
have structure (odd group).(2A4 or 2A5 ). Since Q resp. Q∗ is a Sylow
2-subgroup of M ′ resp. M ∗ ′ , it follows that Q and Q∗ are conjugate.
Lemma 3.9 (Free actions of binary dihedral groups). Suppose H is
a binary dihedral group, U is an irreducible fixed-point-free real representation of H, and α is the natural map R[H] → End(U). Then
α(R[H]) ∼
= H. Furthermore, if J is any binary dihedral subgroup of H,
then α(R[J]) = α(R[H]).
Proof. It is easy to see that the lemma holds for the representations
(1.1), using their description in terms of H. So it will suffice to show
that U is one of them. Let C be an index 2 cyclic subgroup of H.
Under C, U decomposes as a direct sum of 2-dimensional spaces, on
each of which C acts faithfully by rotations. Fix one, say T , and consider the induced representation IndH
C (T ), of dimension 4. Its canonical
image in U is H-invariant, hence all of U. This image is larger than
SPHERICAL SPACE FORMS REVISITED
17
2-dimensional, because a binary dihedral group has no 2-dimensional
free real representations. (Every finite subgroup of O(2) is cyclic or
dihedral.) Therefore V ∼
= IndH
C (T ). And the representations in (1.1)
are exactly the H-representations of this form.
Lemma 3.10 (Free actions of the binary tetrahedral group). Assume
A∼
= 2A4 acts freely on a real vector space V , and write Q for the copy
of Q8 in A. Then the image of R[A] in End(V ) is isomorphic to H and
equal to the image of R[Q]. In particular, every Q-invariant subspace
is also A-invariant.
Proof. Fix an identification of A with
(3.1)
2A4 = ±1, ±i, ±j, ±k, (±1 ± i ± j ± k)/2 ⊆ H∗
We claim that A has a unique irreducible free real representation. It
follows that V is a direct sum of copies of A’s left-multiplication action
on H, which proves the lemma.
For the claim, fix an irreducible free A-module U. Choose a Q-submodule T which is Q-irreducible. In the proof of lemma 3.9 we showed
that (1.1) accounts for all irreducible free actions of binary dihedral
groups. For Q8 , there was only one. So we may identify T with the real
vector space underlying H, with Q = {±1, ±i, ±j, ±k} ⊆ A acting by
left multiplication. The image of the natural map IndA
Q (T ) → U is AA
invariant, hence all of U. By definition, IndQ (T ) is the real vector space
underlying H3 , with i ∈ Q acting by (x, y, z) 7→ (ix, jy, kz), similarly
with i, j, k cyclically permuted, and θ := (−1+i+j+k)/2 ∈ A acting by
(x, y, z) 7→ (z, x, y). Obviously the kernel of IndA
Q (T ) → U contains the
fixed points of the nonidentity elements of A. For θ and i ◦ θ these are
{(x, x, x)} and {(x, jx, −ix)}, which together span an 8-dimensional
subspace, hence the whole kernel. This proves the uniqueness of U:
it is the quotient of IndA
Q (T ) by the subspace generated by the fixed
points of the nonidentity elements of A.
Lemma 3.11 (The final contradiction). G contains no subgroup Q16 .
Proof. Suppose otherwise, and fix an irreducible fixed-point free real
representation V of G. We write α for the natural map R[G] → End V .
By lemma 3.8(4), G has a subgroup A∗ ∼
= 2A4 . We write Q∗ for its
Q8 subgroup. We fix a Q16 -subgroup of G that contains Q∗ . This is
the only group isomorphic to Q16 we will consider, so we just write Q16
for it. Write Q for the other Q8 subgroup of Q16 . We will distinguish
two cases, according to whether there exists some A ∼
= 2A4 containing
Q. In each case we will prove α(R[G]) ∼
H,
which
implies that G is
=
∗
isomorphic to a subgroup of H . We assume this for the moment.
18
DANIEL ALLCOCK
A well-known property of H∗ is that every non-central cyclic subgroup has H∗ -normalizer isomorphic to the “continuous binary dihedral
group”, meaning the nonsplit extension (R/Z) · 2. It follows that the
G-normalizer of any non-central cyclic subgroup is cyclic or binary dihedral. The cyclic case is ruled out by corollary 2.6 and the perfectness
of G. So lemma 2.4 applies, proving G ∼
= 2A5 .
∼
It remains to prove α(R[G]) = H. First suppose that A exists. G is
generated by A and A∗ , because no maximal subgroup contains two
copies of 2A4 , whose Q8 subgroups generate a copy of Q16 . Now fix a
irreducible Q16 -submodule U of V . It is obviously Q- and Q∗ -invariant,
hence A- and A∗ -invariant by lemma 3.10. So it is G-invariant by
hA, A∗ i = G, and the G-irreducibility of V implies U = V . Lemmas
3.9 and 3.10 also give us the equalities
(3.2)
α(R[A]) = α(R[Q]) = α(R[Q16 ]) = α(R[Q∗ ]) = α(R[A∗ ])
and say that this subalgebra of End(U) is isomorphic to H. Since A
and A∗ generate G, α(R[G]) also equals this copy of H, finishing the
proof in the case that A exists.
Now suppose Q lies in no copy of 2A4 , and set N = NG (Q) and Φ =
Q∩Q∗ ∼
= Z/4. By (1) and (2) of lemma 3.8 we have N ∼ (O(N).2A4 )·2
with |O(N)| divisible by 3. By construction Q∗ normalizes Q, and by
Q∗ 6= Q we see that Q∗ contains a 4-element q ∗ which lies in N but
outside its index 2 subgroup O(N).2A4 . So q ∗ inverts O(N). Of course,
q ∗ also inverts Φ. And O(N) commutes with Q (hence Φ) by the known
structure of N. So H = hq ∗ , O(N), Φi = hQ∗ , O(N)i is binary dihedral.
The rest of the argument is similar to the previous case.
Namely, we have G = hH, A∗ i because no maximal subgroup M of
G contains a copy of Q8 which normalizes one copy of Z/3 in M and
is normalized by a different copy of Z/3 in M. Now we choose an
irreducible H-submodule U of V . It is trivially Q∗ -invariant. Then
lemma 3.10 shows that U is A∗ -invariant, hence G-invariant, hence all
of V . Lemmas 3.9–3.10 give the equalities
(3.3)
α(R[H]) = α(R[Q∗ ]) = α(R[A∗ ])
and say that this subalgebra of End(U) is isomorphic to H. By G =
hH, A∗ i, this subalgebra is also α(R[G]), finishing the proof.
Remark 3.12 (Frobenius complements). As mentioned in the introduction, our arguments adapt easily to classify the Frobenius complements,
which are the same groups. Supposing that G acts freely on a vector
space over a finite field Fq , where q is necessarily odd, we extend scalars
to suppose without loss that all elements of G are diagonalizable. Then
lemmas 3.9–3.11 and their proofs still apply with R replaced by Fq ,
SPHERICAL SPACE FORMS REVISITED
19
H (the algebra) by M2 Fq , H (the module) by F2q , and H∗ by SL2 Fq .
(Although the proof of lemma 3.10 looks H-specific, one defines the
Hurwitz integers as the Z-span of the quaternions (3.1), and tensoring
with Fq gives M2 Fq .)
4. The imperfect case
In this section we will complete the proofs of theorems 1.1 and 1.2.
We suppose throughout that G is an imperfect finite group that acts
freely and isometrically on a sphere of some dimension, and that every
proper subgroup has one of the structures listed in the statement of theorem 1.1. We will prove that G also has one of these structures, in fact
a unique one in the sense of theorem 1.2. We will prove theorems 1.1
and 1.2 in three special cases (which don’t actually use imperfectness),
and then argue that these cases are enough.
Lemma 4.1. Suppose G/O(G) is a 2-group. Then G has type I or II
from theorem 1.1, for a unique-up-to-conjugation triple of subgroups
(A, B, T ).
Proof. We will construct A, B and T such that G ∼ A : (B × T )
as in theorem 1.1, along the way observing that the construction is
essentially unique. Obviously we must choose A and B such that
O(G) = A : B. Applying lemma 2.8 to O(G) proves the following.
The required coprimality of |A| and |B|, together with the requirement
that each nontrivial Sylow subgroup of B acts nontrivially on A, can be
satisfied in a unique way. That is, A is uniquely determined, and B is
determined up to conjugacy in O(G). Using the coprimality of |O(G)|
and |G/O(G)| ∼
= T , part (4) of lemma 2.8 shows that the decomposition O(G) = A : B extends to a decomposition G = A : (B × T ) where
T is determined uniquely up to conjugacy in NG (B).
This finishes the proof of uniqueness; it remains to check a few assertions of theorem 1.1. Lemma 2.3 says that T is cyclic or quaternionic.
Lemma 2.2 assures us that every prime-order element of B or T acts
trivially on every prime-order subgroup of A. An automorphism of the
cyclic group A, of order prime to |A| and acting trivially on every subgroup of prime order, must act trivially on all of A. So the prime-order
elements of B and T centralize A.
Lemma 4.2. Suppose G contains a normal subgroup 2A5 . Then G has
type V or VI from theorem 1.1, for a unique-up-to-conjugation tuple of
subgroups (A, B, 2A5 ) or (A, B, 2A5 , Φ).
Proof. We will show that there is a such a tuple, unique up to conjugation, whose 2A5 term is the given normal subgroup. The existence part
20
DANIEL ALLCOCK
of this assertion shows that G ∼ 2A5 ×(A : B) or G ∼ 2A5 ×(A : B) ·2
as in theorem 1.1. It follows that G has a unique normal subgroup isomorphic to 2A5 . So every tuple has this particular subgroup as its 2A5
term. The uniqueness of the tuple up to conjugacy follows.
It remains to prove the lemma for the given 2A5 subgroup. We define
I as the subgroup of G acting on 2A5 by inner automorphisms. Since
Out(2A5 ) = 2, I has index 1 or 2 in G. By its definition, I is generated
by 2A5 and C(2A5 ), whose intersection is the group Z generated by
G’s central involution. We claim that Z is the
full Sylow 2-subgroup
of C(2A5 ). Otherwise, 2A5 /Z × C(2A5 )/Z ≤ G/Z would contain
an elementary abelian 2-group of rank 3. This is impossible because
the Sylow 2-subgroups of G/Z are dihedral. From corollary 2.6 and
the fact that C(2A5 ) has cyclic Sylow 2-subgroups, we get C(2A5 ) =
Z × O(C(2A5 )). It follows that I = 2A5 × O(I).
Obviously we must choose A and B such that A : B = O(I). As
in the previous proof, lemma 2.8 shows that there is an essentially
unique way to satisfy the conditions that |A| and |B| are coprime and
that every Sylow subgroup of B acts nontrivially on A. That is, A
is uniquely determined and B is determined up to conjugacy in O(I).
Also, |A| and |B| are coprime to 15 because G has no subgroup 3 × 3
or 5 × 5 (lemma 2.2). The prime-order elements of B act trivially on
A by the same argument as in the previous proof.
We have shown that I has type V, so if I = G then the proof is
complete. Otherwise, we know G ∼ 2A5 × (A : B) · 2 and we must
construct a suitable subgroup Φ ∼
= Z/4 of G. Because all complements
to A in A : B are conjugate, the Frattini argument shows that N(B)
surjects to G/A. So N(B) contains a Sylow 2-subgroup T ∼
= Q16 of
G. By Sylow’s theorem it is unique up to conjugacy in N(B). Obviously T ∩ 2A5 is isomorphic to Q8 . Now, T ∼
= Q16 contains exactly
two subgroups isomorphic to Z/4 that lie outside T ∩ 2A5 . So we must
take Φ to be one of them. They are conjugate under T ∩ 2A5 , so Φ is
uniquely defined up to a conjugation that preserves each of A, B and
2A5 . It remains only to check that Φ has the properties required for
G to be a type VI group. It acts on 2A5 by an outer automorphism
because it does not lie in I, by construction. To see that Φ commutes
with B, suppose to the contrary. Then some subgroup of B of prime
order p would lie in G′ . Then corollary 2.6 would show that the Sylow p-subgroup of B lies in G′ . So it acts trivially on A, which is a
contradiction.
SPHERICAL SPACE FORMS REVISITED
21
Lemma 4.3. Suppose G contains a normal subgroup Q ∼
= Q8 that lies
in G′ . Then G has type III or IV from theorem 1.1, for a unique-upto-conjugation tuple of subgroups (A, B, Q8 , Θ) or (A, B, Q8 , Θ, Φ).
Proof. Mimicking the previous proof, we will show that there is a
unique-up-to-conjugation tuple of such subgroups whose Q8 term is Q.
In particular, G ∼ (Q8 × A) : (B × Θ) or G ∼ (Q8 × A) : (B × Θ) · 2
as in theorem 1.1. This shows that G has a unique normal subgroup
isomorphic to Q8 , namely Q, which will complete the proof for the
same reason as before.
To show that there is a unique-up-conjugation tuple of subgroups
whose Q8 term is Q, consider the natural map G → Aut Q ∼
= S4 . We
claim the image G contains a 3-element. Otherwise, G ⊆ Aut Q ∼
=
S4 would lie in a Sylow 2-subgroup of Aut Q, which is dihedral of
′
order 8 with commutator subgroup of order 2. Therefore |G | would
have order ≤ 2. But this is a contradiction because Q lies in G′ and
Q∼
= S3
= 2×2. We have shown that the nontrivial 3-subgroup of Out Q ∼
lies in the image of G. (Now we can discard G.)
Let J be the preimage in G of this copy of Z/3. So G ∼ J.(1 or 2).
Obviously we must choose A, B and Θ so that J = (Q × A) : (B × Θ).
By construction, J has a nontrivial map to Z/3. So corollary 2.6 assures
us that J’s Sylow 3-subgroups map faithfully to J’s abelianization. In
particular, J = I.(cyclic 3-group) where |I| is prime to 3. Mimicking
the previous proof shows that I = Q × O(I). So we must choose A and
B so that A : B = O(I).
Continuing to follow the previous proof shows that there is an essentially unique way to satisfy the conditions that |A| and |B| are coprime
and that every Sylow subgroup of B acts nontrivially on A. That is, A
is uniquely determined and B is determined up to conjugacy in O(I).
The prime-order elements of B act trivially on A for the same reason
as before. We have shown
I
z
}|
{
G ∼ Q × (A : B) .(nontrivial cyclic 3-group) .(1 or 2)
|
{z
}
J
Having worked our way to the “middle” of G, we now work outwards
and construct Θ and (if required) Φ. Using the conjugacy of complements to A in A : B, the Frattini argument shows that NJ (B) maps
onto J/(A : B). So NJ (B) contains a Sylow 3-subgroup of J, indeed a
unique one up to conjugacy in NJ (B). So there is an essentially unique
possibility for Θ. As observed above, Θ acts nontrivially on Q. Its
3-elements act trivially on A for the same reason that B’s prime-order
22
DANIEL ALLCOCK
elements do. Finally, Θ commutes with B. Otherwise, some Sylow
subgroup of B would lie in G′ , hence act trivially on A, contrary to B’s
construction.
We have shown that J has type III, so if J = G then we are done.
Otherwise, mimicking the previous proof shows that there exists a
group Φ ∼
= Z/4 in N(B × Θ) that does not lie in J, and that such
a group is unique up to conjugacy in N(B × Θ). Also as before, Φ
commutes with B. By Φ 6≤ J, Φ’s 4-elements act on Q by outer automorphisms. Since the images of Φ and Θ in Out Q ∼
= S3 do not
commute, Φ cannot commute with Θ. Therefore Φ’s 4-elements must
invert Θ. So G has type IV and the proof is complete.
To finish the proofs of theorems 1.1 and 1.2 we will show that G
satisfies the hypotheses of one of lemmas 4.1–4.3. By imperfectness, G
has a normal subgroup M of prime index p. By induction, M has one
of the structures I–VI. We will examine the various cases and see that
one of the lemmas applies.
If M has type V or VI then it contains a unique subgroup 2A5 , which
is therefore normal in G, so lemma 4.2 applies. If M has type III
or IV then it contains a unique normal subgroup Q8 , which is therefore
normal in G. Also, this Q8 lies in M ′ , hence G′ , so lemma 4.3 applies.
Finally, suppose M has type I or II, so M ∼ A : B × (2-group T ) .
If p = 2 then O(G) = O(M) = A : B and G/O(G) is a 2-group, so
lemma 4.1 applies.
So suppose p > 2, and observe that G/O(M) has structure T.p.
Choose a subgroup P of order p in G/O(M). If it acts trivially on T
then we have G/O(M) ∼
= T ×p, so G/O(G) ∼
= T and lemma 4.1 applies.
So suppose P acts nontrivially on T . The automorphism group of any
cyclic or quaternionic 2-group is a 2-group, except for Aut Q8 ∼
= S4 .
Since P acts nontrivially, we must have T ∼
= Q8 and p = 3. The
nontriviality of P ’s action also implies T < G′ . From this and the fact
that Aut A is abelian, it follows that T acts trivially on A. So T is
normal in M. As M’s unique Sylow 2-subgroup, it is normal in G. So
lemma 4.3 applies. This completes the proofs of theorems 1.1 and 1.2.
5. Irredundant enumeration
The uniqueness expressed in theorem 1.2 makes the isomorphism classification of groups in theorem 1.1 fairly simple. Namely, one specifies
such a group G up to isomorphism by choosing its type I–VI, a suitable
number a for the order of A, a suitable subgroup G of the unit group
(Z/a)∗ of the ring Z/a, and a suitable number g for the order of G.
SPHERICAL SPACE FORMS REVISITED
23
In a special case one must also specify a suitable subgroup G0 of G.
Before developing this, we illustrate some redundancy in Wolf’s list.
Example 5.1 (Duplication). Wolf’s presentations of type II in [7, theorem 6.1.11] have generators A, B, R and relations
Am = B n = 1
R2 = B n/2
BAB −1 = Ar
RAR−1 = Al
RBR−1 = B k
where (m, n, r, k, l) are numerical parameters satisfying nine conditions.
It turns out that the six choices (3, 20, −1, −1, ±1), (5, 12, −1, −1, ±1)
and (15, 4, −1, −1, 4 or 11) give isomorphic groups, namely (3×5) : Q8 .
Here one class of 4-elements in Q8 inverts just the Z/3 factor, another
class inverts just the Z/5 factor, and the third class inverts both. Wolf
decomposes this group by choosing an index 2 subgroup (call it H)
with cyclic Sylow 2-subgroup, taking A to generate H ′ , and taking B
to generate a complement to H ′ in H (which always exists). Then he
takes R to be a 4-element outside of H, that normalizes hBi. There
are three ways to choose H, corresponding to the three Z/4’s in Q8 .
After H is chosen, there are unique choices for hAi and hBi, but two
choices for hRi. These choices lead to the six different presentations.
Our form of this group is A : (B × Q8 ) = 15 : (1 × Q8 ) = 15 : Q8 . (Our
A and B are subgroups, while Wolf’s A and B are elements.)
A minor additional source of redundancy is that replacing Wolf’s
B by a different generator of hBi can change the parameter r in the
presentation above.
Given a group G from theorem 1.1, we record the following invariants. First we record its type I–VI, which is well-defined by the easy
part of theorem 1.2, proven in section 1. Second we record g := |G|,
a := |A| and G, where bars will indicate images in Aut A. Finally,
and only if G has type II and its order is divisible by 16, we record
G0 , where G0 is the unique index 2 subgroup of G with cyclic Sylow
2-subgroups.
Aut A is canonically isomorphic to the group of units (Z/a)∗ of the
ring Z/a, with u ∈ (Z/a)∗ corresponding to the uth power map. Therefore we will regard G and G0 as subgroups of (Z/a)∗ . This is useful
when comparing two groups G, G∗ :
Theorem 5.2 (Isomorphism recognition). Two finite groups G and
G∗ , that act freely and isometrically on spheres of some dimensions,
are isomorphic if and only if they have the same type, and g = g ∗ ,
∗
∗
a = a∗ , G = G , and (if they are defined) G0 = G0 .
24
DANIEL ALLCOCK
Proof. First suppose G ∼
= G∗ . We have already mentioned that they
have the same type, and they obviously have the same order. By the
uniqueness of A and A∗ (theorem 1.2), any isomorphism G → G∗
identifies A with A∗ . In particular, a = a∗ , and the action of G on A
∗
corresponds to that of G∗ on A∗ . So we must have G = G , and (when
∗
defined) G0 = G0 .
Now suppose G and G∗ have the same invariants; we must construct
an isomorphism between them. Case analysis seems unavoidable, but
the ideas are uniform and only the details vary.
Type I. Since A and A∗ are cyclic of the same order, we may choose an
isomorphism A ∼
= A∗ . By order considerations we have |B| = |B ∗ | and
|T | = |T ∗ |. Again by order considerations, the identification of G with
∗
G under the canonical isomorphism Aut A = Aut A∗ identifies B with
∗
∗
B and T with T . Because B and B ∗ are cyclic of the same order,
∗
we may lift the identification B ∼
= B to an isomorphism B ∼
= B ∗,
∗
∗
and similarly for T and T . Together with A ∼
= A , these give an
∗
∼
isomorphism G = G .
∗
Type II when 16 divides |G| = |G∗ |. Because G0 is identified with G0 ,
the previous case gives an isomorphism G0 ∼
= G∗0 that identifies A with
∗
∗
A , B with B and the cyclic 2-group T0 := T ∩ G0 with T0∗ := T ∗ ∩ G∗0 .
We will extend this to an isomorphism G ∼
= G∗ . Choose an element φ
∗
∗
of T − T0 . By the identification of T with T and T 0 with T 0 , there
exists an element φ∗ of T ∗ − T0∗ whose action on A∗ corresponds to
φ’s action on A. As elements of T − T0 and T ∗ − T0∗ , φ and φ∗ have
order 4. They commute with B and B ∗ respectively. Their squares are
the unique involutions in T0 and T0∗ , which we have already identified
with each other. So identifying φ with φ∗ extends our isomorphism
∗
∗
G0 ∼
=G .
= G0 to G ∼
Type II when 16 does not divide |G| = |G∗ |. The argument for
type I identifies A with A∗ and B with B ∗ . Both G and G∗ have
Sylow 2-subgroups isomorphic to Q8 . T is the Sylow 2-subgroup of
G, and is elementary abelian of rank ≤ 2 because Q8 /Q′8 ∼
= 2 × 2.
∗
∗
The identification of G with G identifies T with T . Because Aut Q8
∗
acts as S3 on Q8 /Q′8 , it is possible to lift the identification T ∼
= T to
an isomorphism T ∼
= B ∗,
= A∗ , B ∼
= T ∗ . Now our identifications A ∼
T ∼
= T ∗ fit together to give an isomorphism G ∼
= G∗ .
∗
Type III. Choose an isomorphism A ∼
= A . By |G| = |G∗ | we get
∗
|B| = |B ∗ | and |Θ| = |Θ∗ |. The identification of G ≤ Aut A with G ≤
∗
∗
Aut A∗ identifies Θ with Θ and B with B . These identifications can
be lifted to isomorphisms Θ ∼
= Θ∗ and B ∼
= B ∗ by the same reasoning
as before. Because all 3-elements in Aut Q8 ∼
= S4 are conjugate, it
SPHERICAL SPACE FORMS REVISITED
25
is possible to choose an isomorphism Q8 ∼
= Q∗8 compatible with our
∗
isomorphism Θ ∼
= Θ and the homomorphisms Θ → Aut Q8 and Θ∗ →
Aut Q∗8 . Now our identifications A ∼
= Θ∗ and
= B∗, Θ ∼
= A∗ , B ∼
∗
∗
Q8 ∼
=G .
= Q8 fit together to give an isomorphism G ∼
∗
∗
Type IV. Identify A, B and Θ with A , B and Θ∗ as in the previous
case. Choose generators φ and φ∗ for Φ and Φ∗ . Their actions on A and
∗
A∗ correspond, because they act by the unique involutions in G and G
if these exist, and trivially otherwise. The image of φ in Aut Q8 ∼
= S4
normalizes the image of Θ, so together they generate a copy of S3 , and
similarly for their starred versions. Any isomorphism from one S3 in
Aut Q8 to another is induced by some conjugation in Aut Q8 . (One
checks this using Aut Q8 ∼
= S4 .) Therefore it is possible to identify Q8
∗
with Q8 , such that the actions of Θ and Θ∗ on them correspond, and
the actions of φ and φ∗ also correspond. Using this, and identifying φ
with φ∗ , gives an isomorphism G ∼
= G∗ .
Type V. Identify A and B with A∗ and B ∗ as in previous cases, and
2A5 with 2A∗5 however one likes.
Type VI. Identify A and B with A∗ and B ∗ as before, and choose
generators φ and φ∗ for Φ and Φ∗ . As in the type IV case, their actions
on A and A∗ correspond. Next, φ and φ∗ act on 2A5 and 2A∗5 by involutions which are not inner automorphisms. All such automorphisms
of 2A5 are conjugate in Aut(2A5 ). (They correspond to the involutions
in S5 − A5 .) So we may identify 2A5 with 2A∗5 in such a way that the
actions of φ and φ∗ on them correspond. Using this, and identifying φ
with φ∗ , gives an isomorphism G ∼
= G∗ .
We can now parameterize the isomorphism classes of finite groups G
that admit free actions on spheres. First one specifies a type I–VI. Then
one specifies a positive integer a, a subgroup G of (Z/a)∗ , and possibly
a subgroup G0 of G, all satisfying some constraints. Then one chooses
one or more auxiliary parameters, constrained in terms of properties
of G. Together with a, these specify g, hence the isomorphism type
of G. The following theorem is proven by combining theorem 5.2 with
an analysis of what possibilities can actually arise. We will write the
parameters a, G and g in the order one chooses them, rather than in
the order used in theorem 5.2.
The constraints on the choices of parameters are difficult to express
uniformly. But the constraint on one auxiliary parameter, called b, is
uniform. For each type we obtain a positive integer b from the structure
of G, and b must be the product of b and nontrivial powers of all the
primes dividing b. We will express this by saying “b is as above.”
26
DANIEL ALLCOCK
Theorem 5.3 (Irredundant enumeration). Suppose G is a finite group
admitting a free and isometric action on a sphere. Then there is exactly one tuple (I—VI, a, G, g) or (II, a, G, G0 , g) listed below, whose
corresponding group (defined at the end) is isomorphic to G.
(Type I, a, G, g = abt) where
(1) a is odd.
(2) G is a cyclic subgroup of (Z/a)∗ of order prime to a. Define b
and t as the odd and 2-power parts of |G|.
(3) b is as above and t is a power of 2, larger than t if t 6= 1.
(Type II, a, G, g = abt) or (Type II, a, G, G0 , g = abt) where
(1) a is odd.
(2) G is a subgroup of (Z/a)∗ which is the direct product of a cyclic
group of order prime to 2a and an elementary abelian 2-group
of rank ≤ 2. Define b and t as the orders of these factors.
(3) G0 , if specified, is a subgroup of G of index 2 (if t = 4) or
index ≤ 2 (otherwise).
(4) b is as above; and t = 8, unless G0 was specified, in which case t
is a power of 2, larger than 8.
(Type III, a, G, g = 8abθ) where
(1) a is prime to 6.
(2) G is a subgroup of (Z/a)∗ which is the direct product of a cyclic
3-group and a cyclic group of order prime to 6a. Define θ̄ and b
as the orders of these factors.
(3) b is as above and θ is a power of 3, larger than θ̄.
(Type IV, a, G, g = 16abθ) where
(1) a is prime to 6.
(2) G is a subgroup of (Z/a)∗ which is the direct product of a cyclic
group of order prime to 6a and a group of order 1 or 2. Define b
as the order of the first factor.
(3) b is as above and θ is a nontrivial power of 3.
(Type V, a, G, g = 120ab) where
(1) a is prime to 30.
(2) G is a cyclic subgroup of (Z/a)∗ of order prime to 30a. Define b
as its order.
(3) b is as above.
(Type VI, a, G, g = 240ab) where
(1) a is prime to 30.
SPHERICAL SPACE FORMS REVISITED
27
(2) G is a subgroup of (Z/a)∗ which is the direct product of a cyclic
group of order prime to 30a and a group of order 1 or 2. Define b
as the order of the first factor.
(3) b is as above.
Here are instructions for building G. In a sense this is a constructive
version of the proof of theorem 5.2. For all types, start by taking cyclic
groups A, B with orders a, b. Up to isomorphism of the domain, B
has a unique surjection to the subgroup of G ⊆ Aut A of order b. Form
the corresponding semidirect product A : B. Now we consider the six
cases.
The easiest is type V—just set G = 2A5 × (A : B).
For type I, we take a cyclic group T of order t. Just as for B, there is
an essentially unique surjection from T to the subgroup of G of order t.
Then G is the semidirect product A : (B × T ).
For type III one takes a cyclic group Θ of order θ. Just as for B,
there is an essentially unique surjection from Θ to the subgroup of G of
order θ̄. We also take Θ to act nontrivially on Q8 . (Up to conjugacy in
Aut Q8 there is a unique nontrivial action.) Then G is the semidirect
product (Q8 × A) : (B × Θ). B acts trivially on Q8 ; this is forced since
|B| is prime to 6.
A type IV or VI group is got from a type III or V group by adjoining a
suitable 4-element φ. In both cases, φ squares to the central involution,
centralizes B, and acts on A by the nontrivial involution in G (if one
exists) or trivially (otherwise). For type VI, φ acts on 2A5 by an outer
automorphism of order 2, which is unique up to Aut 2A5 . For type IV,
φ inverts Θ and acts on Q8 by an involution that inverts the action
of Θ. Such an automorphism is unique up to an automorphism of Q8
that respects the Θ-action.
One can describe type II groups in terms of type I in a similar way,
but it is easier to build them directly. Take T to be a quaternion group
of order t. First suppose t = 8. Then we did not specify G0 . Up to
automorphism of the domain there is a unique surjection from T to
the subgroup T of G of order t. We take G = A : (B × T ). On the
other hand, suppose t > 8, in which case we did specify G0 . We write
T0 for the index 2 cyclic subgroup of T . Up to automorphism of the
domain, there is a unique surjection from T to T which carries T0 onto
the 2-part of G0 (which has order 1 or 2). And again G = A : (B × T ).
References
[1] Conway, J. H., et. al., Atlas of Finite Groups., Oxford University Press, Eynsham, 1985.
28
DANIEL ALLCOCK
[2] Gorenstein, D., Finite groups. Harper & Row, New York-London, 1968.
[3] Isaacs, I. Martin, Finite group theory. Graduate Studies in Mathematics 92.
American Mathematical Society, Providence, RI, 2008
[4] Meierfrankenfeld, U., Perfect Frobenius complements, Arch. Math. (Basel) 79
(2002) 19–26.
[5] Passman, D., Permutation Groups, W. A. Benjamin, New York, 1968.
[6] Wall, C. T. C., On the structure of finite groups with periodic cohomology,
in Lie groups: structure, actions, and representations, 381–413, Progr. Math.
306, Birkhuser/Springer, New York, 2013.
[7] Wolf, J., Spaces of Constant Curvature, McGraw-Hill, New York, 1967.
[8] Zassenhaus, H., Über endliche Fastkörper, Abh. Math. Sem. Hamburg 11
(1936) 187–220.
[9] Zassenhaus, H., On Frobenius groups. I, Results Math. 8 (1985) 132–145.
Department of Mathematics,, University of Texas, Austin
E-mail address: [email protected]
URL: http://www.math.utexas.edu/~allcock
| 4math.GR
|
arXiv:1706.02179v2 [cs.CV] 8 Jun 2017
Learning to Represent Mechanics via Long-term
Extrapolation and Interpolation
Sébastien Ehrhardt1
Aron Monszpart2
Andrea Vedaldi1
Niloy Mitra2
1
Department of Engineering Science, University of Oxford
{hyenal, vedaldi}@robots.ox.ac.uk
2
Department of Computer Science, University College London
{a.monszpart, n.mitra}@cs.ucl.ac.uk
Abstract
While the basic laws of Newtonian mechanics are well understood, explaining
a physical scenario still requires manually modeling the problem with suitable
equations and associated parameters. In order to adopt such models for artificial
intelligence, researchers have handcrafted the relevant states, and then used neural
networks to learn the state transitions using simulation runs as training data. Unfortunately, such approaches can be unsuitable for modeling complex real-world
scenarios, where manually authoring relevant state spaces tend to be challenging.
In this work, we investigate if neural networks can implicitly learn physical states
of real-world mechanical processes only based on visual data, and thus enable longterm physical extrapolation. We develop a recurrent neural network architecture
for this task and also characterize resultant uncertainties in the form of evolving
variance estimates. We evaluate our setup to extrapolate motion of a rolling ball
on bowl of varying shape and orientation using only images as input, and report
competitive results with approaches that assume access to internal physics models
and parameters.
1 Introduction
Animals can make remarkably accurate and fast predictions of physical phenomena in order to
perform activities such as navigate, prey, or burrow. However, the nature of the mental models used
to perform such predictions remains unclear and is still actively researched [9].
In contrast, science has developed an excellent formal understanding of physics; for example,
mechanics is nearly perfectly described by Newtonian physics. While the constituent laws are simple
and accurate, applying them to the description of a physical scenario is anything but trivial. First, the
scenario needs to be abstracted (e.g., by segmenting the scene into rigid objects, estimating physical
parameters such as mass, linear and angular velocity, etc., deciding which equations to apply, and so
on). Then, prediction still requires the numerical integration of complex systems of equations. It is
unlikely that this is the process of mental modeling followed by natural intelligences.
In an effort to develop model of physics that are more suitable for artificial intelligence, several
authors have looked at the problem of learning physical predictors using deep neural networks. As
a notable example, the recent Neural Physics Engine (NPE) [5] uses a neural network to learn the
state transition function of mechanical systems. The state itself is handcrafted and includes physical
parameters such as positions, velocities, and masses of rigid bodies. While this approach works well,
a limitation is that it does not allow the network to learn its own abstraction of the physical system.
This may prevent the model from learning efficient approximations of physics that are likely required
to scale to complex real-world scenarios.
In this work, we ask whether a representation of the physical state of a mechanical system can
be learned implicitly by a neural network, and whether this can be used to perform more accurate
predictions. Compared to methods such as NPE, learning such a model is more challenging as no
direct observations of the state of the system are available for training. Instead, the state is a hidden
variable that must be inferred while solving a task for which supervision can be provided. As an
example of such a task, we consider here the problem of long-term physical extrapolation.
Our approach to extrapolation is to develop a recurrent neural network architecture that not only
contains an implicit representation of the state of the system, but is also able to evolve it through
time. This differs from methods such as NPE that predict instantaneous variations of the system
state, which are integrated in long-term predictions a-posteriori, after learning is complete. We show
that accounting for the integration process during learning allows the network to learn an implicit
representation of physics. Furthermore, we show that, in relatively complex physical setups, the
resulting predictions can be competitive to a modified version of NPE, even when the inputs to the
extrapolator are visual observations of the physical system instead of a direct knowledge of its initial
state.
Since physical extrapolation is inherently ambiguous, we allow the model to explicitly estimate its
prediction uncertainty by estimating the variance of a Gaussian observation model. We show that this
modification further improves the quality of long-term predictions.
Empirically, we push our model by considering scenarios beyond the “flat” ones considered in most
recent papers, such as objects sliding on planes and colliding, and look for the first time at the case of
an object rolling on a non-trivial 3D shape, namely a bowl of varying shape and orientation, where
both linear and angular momenta are tightly coupled.
As a final benefit of learning with long-term physical predictions, we show that our model is able, with
minimal modifications, to learn not only to extrapolate physical trajectories, but also to interpolate
them. Remarkably, interpolation is still obtained by computing the trajectory in a feed-forward
manner, from the first to the last time step.
The rest of the paper is organized as follows. The relation of our work to the literature is discussed
in section 2. The detailed structure of the proposed neural networks is given and motivated in section 3.
These networks are extensively evaluated on a large dataset of simulated physical experiments
in section 5. A summary of our finding can be found in section 6.
2 Related work
In this work we address the problem of long-term prediction from observation in a physical environment without voluntary perturbation, which is done by an implicit learning of physical laws. Our
work is closely related to a range of recent works in the machine learning community.
Learning intuitive physics. To the best of our knowledge [4] was the first approach to tackle
intuitive physics with the aim to answer a set of intuitive questions (e.g., will it fall?) using physical
simulations. Their simulations, however, used a sophisticated physics engine that incorporates prior
knowledge about Newtonian physical equations. More recently [17] also used static images and a
graphics rendering engine (Blender) to predict movements and directions of forces from a single RGB
image. Motivated by the recent success of deep learning for image processing (e.g., [12, 10]), they
used a convolutional architecture to understand dynamics and forces acting behind the scenes from a
static image and produced a “most likely motion" rendered from a graphics engine. In a different
framework, [14] and [15] also used the power of deep learning to extract an abstract representation
of the concept of stability of block towers purely from images. These approaches successfully
demonstrated that not only was a network able to accurately predict the stability of the block tower
but in addition, it could identify the source of the instability. Other approaches such as [2] or [7] also
attempted to learn intuitive physics of objects through manipulation. These approaches, however, do
not attempt to precisely model the evolution of the physical world.
Learning dynamics. Learning the evolution of an object’s position also implies to learn about
the object’s dynamics regardless of any physical equations. While most successful techniques
used LSTM-s [11], recent approaches show that propagation can also be done using a single crossconvolution kernel. The idea was further developed in [27] in order to generate a next possible image
frame from a single static input image. The concept has been shown to have promising performance
regarding longer term predictions on the moving MNIST dataset in [6]. The work of [19] also shows
that an internal hidden state can be propagated through time using a simple deep recurrent architecture.
2
These results motivated us to propagate tensor based state representations instead of a single vector
representation using a series of convolutions. Adversarial losses have also been used in [18] which
shows good results in video segmentation. In the future we also aim to experiment with approaches
inspired by [27].
Learning physics. The works of [26] and its extension [25] propose methods to learn physical
properties of scenes and objects. However, in [26] the MCMC sampling based approach assumes the
complete knowledge of the physical equations to estimate the correct physical parameters. In [25]
deep learning has been used more extensively to replace the MCMC based sampling but this work
also employs an explicit encoding and computation of physical laws to regress the output of their
tracker. [22] also used physical laws to predict the movement of a pillow from unlabelled data though
their approach was only applied to a fixed number of frames.
In another related approach [8] attempted to build an internal representation of the physical world.
Using a billiard board with an external simulator they built a network which observing four frames
and an applied force, was able to predict the 20 next object velocities. Generalization in this work was
made using an LSTM in the intermediate representations. The process can be interpreted as iterative
since frame generation is made to provide new inputs to the network. This can also be seen as a
regularization process to avoid the internal representation of dynamics to decay over time which is
different to our approach in which we try to build a stronger internal representation that will attempt
to avoid such decay.
Other research attempted to abstract the physics engine enforcing the laws of physics as neural
network models. [3] and [5] were able to produce accurate estimations of the next state of the world.
Although the results look plausible and promising, reported results show in [5] that accurate long-term
predictions are still difficult. Note, that their process is an iterative one as opposed to ours, which
propagates an internal state of the world through time similarly to [20].
Approximate physics with realistic output. Other approaches also focused on learning to generate
realistic future scenarios ([24] and [13]), or inferring collision parameters from monocular videos [16].
In these approaches the authors used physics based losses to produce visually plausible yet erroneous
results. They however show promising results and constructed new losses taking into account
additional physical parameters other than velocity. Note also that in [3] an energy-based loss has
been used. It can be seen as a way to explicitly incorporate a knowledge of physics in the network
while we aim to understand if we can make accurate prediction without explicit physics knowledge.
3 Method
In this section, we propose a new neural network model (see Fig. 1) that performs predictions in
mechanical systems. Let yt be a vector of physical measurements taken at time t, such as the position
of an object whose motion we would like to track. Physical systems satisfy a Markov condition, in the
sense that there exists a state vector ht such that 1) measurements yt = g(ht ) can be predicted from
the value of the state and 2) the state at the next time step ht+1 = f (ht ) depends only on the current
value of the state ht . Uncertainty in the model can be encoded by means of transition p(ht+1 |ht ) and
observation p(yt |ht ) probabilities, resulting in a hidden Markov model.
Approaches such as NPE [5] start from an handcrafted definition of the state ht . For instance, in order
to model a scenario with two balls colliding, one may choose ht to contain the position and velocity
of each ball. In this case, the observation function g may be as simple as extracting the position
components from the state vector. The goal of NPE is then to learn a neural network approximator φ
of the transition function f . In practice, the authors of [5] suggest that it is often easier to predict a
rate of change ∆t for some of the physical parameters (e.g. the balls’ velocities), which can then be
integrated to update the state: ht+1 = f˜(ht , ∆t ) where f˜ is an hand-crafted integrator and the neural
predictor estimates the change ∆t = φ(ht ).
While these approaches have several advantages [5], there are several limitations too. First, approaches
such as NPE require to handcraft the state representation ht . Even in the simple case of the colliding
balls, the choice of state is ambiguous; for example, one could include in the state the radius, mass and
elasticity and friction coefficients. In more complex situations, choosing a good state representation
may be rather difficult. Overall, this choice is best left to learning. Second, the state must be
observable during training in order to learn the transition function. Third, learning does not account
3
Transition
Network
Encoder network
(VGG)
Decoder Network
Input images t = 0 . . . 3
PhysNet
ProbNet
Figure 1: Overview of our proposed pipeline. The first four images of a sequence first pass through a
partially pre-trained feature encoder network to build the concept of physical state. It then recursively
passes through a transition layer to produce long-term predictions about the future states of the
objects. It is then decoded to produce state estimates. While our PhysNet model is trained to regress
the next states, the ProbNet model trained with the log-likelihood loss is also able to handle the
notion of uncertainty thanks to its extended state space.
for the effect of accumulating errors through integration as integration is applied only after learning.
Finally, the initial value of the state h0 must be known in order to initialize the predictor, whereas
in many applications one would like to start from sensory inputs xt such as images of the physical
system [8].
We propose here an approach to address these difficulties. We assume that the state ht is a hidden
variable, to be determined as part of the learning process. Since the ht cannot be observed, the
transition function ht+1 = f (ht ) cannot be estimated directly as in the NPE. Instead, it must be
inferred as a good explanation of the physical measurements yt . Since the evolution of the state ht
cannot be learned by observing measurement yt in isolation, we supervise the system by explaining
sequences y[0,T ) = (y0 , . . . , yT −1 ). This requires to move the integration step inside the network,
which we do by mean of a recurrent neural network architecture. This has the added advantage of
making learning aware of the integration process, which helps improving accuracy.
The model is analogous to a Hidden Markov Model. Recall that such models are often learned
by maximizing the likelihood of the observations after marginalizing the hidden state.1 However,
since we are interested in extrapolating future observations from past ones, we consider instead
long-term extrapolation as supervisory signal. In order to do so we learn: 1) a transition function
ht+1 = φ(ht ) that evolves the state through time, 2) a decoder function that maps the state ht to an
observation yt = φdec (ht ), and 3) an encoder function that estimates the state ht = φenc (x(t−T0 ,t] )
from the T0 most recent sensor readings (alternatively ht = φenc (y(t−T0 ,t] ) can use the T0 most
recent observations).
In the experiments (section 5) we will show that the added flexibility of learning an internal state
representation automatically can still provide a good prediction accuracy even when the complexity
of the physical scenarios increases. The rest of the section discusses the three modules, encoder,
transition, and decoder maps, as well as the loss function used for training. Further technical details
can be found in section 5.
(i) Encoder map: from images to state. The goal of the encoder map is to take T0 consecutive video
frames recording the beginning of the object motion and to produce an estimate h0 = φenc (x(−T0 ,0] )
1
Formally,
the
Markov
model
is
given
by
p(y[0,T )] , h[0,T ) )
=
Q −2
p(h0 )p(y0 |h0 ) Tt=0
p(ht+1 |ht )p(yt+1 |ht+1 ); traditionally, p can be learned as the maximizer of the
log-likelihood maxp Ey [log Eh [p(y, h)]], where we dropped the subscripts for compactness. Learning to
interpolate/extrapolate can be done by considering subsets ȳ ⊂ y of the measurements as given and optimizing
the likelihood of the conditional probability maxp Ey [log Eh [p(y, h|ȳ)]].
4
of the initial state of the physical system. In order to build this encoder, we follow [8] and concatenate
the RGB channels of the T0 images in a single Hi × Wi × 3T0 . The latter is passed to a convolutional
neural network φenc outputting a feature tensor s0 ∈ RH×W ×C , used as internal representation of the
system. We also add to the state a vector p0 ∈ R2 to store the 2D projection of the object location on
the image plane, so that ht = (st , pt ).
(ii) Transition map: evolving the state. The state ht is evolved through time by learning the
transition function φ : ht 7→ ht+1 , where h0 is obtained from the encoder map, so that ht =
φt (φenc (x(−T0 ,0] )). The state st is updated by using a convolutional network st+1 = φs (st ) whereas
pt is updated incrementally as pt+1 = pt + φp (st ), where φp (st ) is estimated using a single layer
perceptron regressor. Hence (st+1 , pt+1 ) = φ(st , pt ) = (φs (st ), pt + φp (st )). We found that
explicitly incorporating an additive update significantly improves the performance of the model.
(iii) Decoder map: from state to probabilistic predictions. Since we added for convenience the
projected object position pt to the state, the decoder map ŷt = φdec (st , pt ) = pt simply extracts and
returns that part of the state. Training optimizes the average L2 distance between ground truth yt and
PT −1
predicted ŷt positions T1 t=0 kŷt − yt k2 .
Since extrapolation is inherently ambiguous, the L2 prediction error increases with time, which
may unbalance learning. In order to address this issue, we allow the model to explicitly and
dynamically express its prediction uncertainty by outputting the mean and variance (µt , Σt ) of a
bivariate Gaussian observation model. The L2 loss is then replaced with the negative log likelihood
PT −1
− T1 t=0 log N (yt ; µt , Σt ).
In order to estimate µt and Σt , the incremental state component pt = (µt , λ1,t , λ2,t , θt ) is extended
to include both the mean as well as the eigenvalues and rotation of the variance matrix Σt =
R(θt )> diag(λ1,t , λ2,t )R(θt ). In order to ensure numerical stability, eigenvalues are constrained
to be in the range [0.01 . . . 100] by setting them as the output of a scaled and translated sigmoid
λi,t = σλ,α (βi,t ), where σλ,α (z) = λ/(1 + exp(−z)) + α.
4 Experimental setup
In our experimental setup (Fig. 2), we consider a sphere rolling inside a 3D (bowl) surface. When the
bowl is a hemisphere we refer to the setup as ‘Bowl,’ and in the more general case as ‘Ellipse’ (see
Table 1).
We use p = (px , py , pz ) ∈ R3 to denote a point in 3D space or a vector (direction). The camera
center is placed at location (0, 0, cz ), cz > 0 and looks downward along vector (0, 0, −1) using
orthographic projection such that the point (px , py , pz ) projects to a pixel (px , py ) in the image.
(0, 1, 1)
(0, 0, cz )
(0, 0, 0)
(a, 0, 1)
(a)
(b)
(c)
Figure 2: We consider the problem of understanding and extrapolating mechanical phenomena with
recurrent deep networks. (a) Experimental setup: an orthographic camera looks at a ball rolling in a
3D bowl. (b) Example of a 3D trajectory in the 3D bowl simulated using Blender 2.77’s OpenGL
renderer. (c) An example of a rendered frame in the ‘Ellipse‘ experiment that is fed to our model as
input.
We model the bowl as the bottom half of an ellipsoid given by x2 /a2 + y 2 + (z − 1)2 = 1 with
its axes aligned to the XYZ axes and its bottom point being at the origin. We vary the ellipsoid
5
shape by sampling a ∈ U [0.5, 1] for the ‘Ellipse’ case and setting a = 1 (i.e., a hemisphere) for the
‘Bowl’ case. The bowl is given a checker board pattern. Finally, the bowl is given a random rotation
γ ∈ U [−π/2, π/2] only about the z-axis to randomly orient it.
We consider a rolling object in the form of a ball with radius ρ = 0.04 with its center of mass at
time t being located at qt = (qxt , qyt , qzt ), so that its center of mass is imaged at pixel (qxt , qyt ) at any
time t. The ball has a fixed color texture attached to its surface, so it appears as a painted object. We
initially position the ball at angles (θ, φ) with respect to the the bowl center, where the elevation θ
is uniformly sampled in the range θ ∈ U [−9π/10, −π/2] and the azimuth φ ∈ U [−π, π]. We set
the minimum elevation to −9π/10 to avoid starting the ball at the bottom of the bowl. In the end,
the ball will be resting on the bowl surface. The ball is either textured with random color patches or
uniformly colored in white in order to study the impact of observing the ball rotation.
We set the initial orientation of the ball by uniformly sampling its xyz Euler angles in [−π, π]. We set
its initial velocity v by first sampling vx , vy uniformly in the range [5, 10], assigning each of vx , vy a
random sign, and then projecting vector (vx , vy , 0) so that the resulting velocity vector is tangential
to the underlying supporting bowl.
α
Note that, while several parameters of the ball state are included in the observation vector y[−T
,
0 ,T )
these are not part of the state of the neural network, which is inferred automatically. The network
itself is tasked with predicting part of these measurements, but their meaning is not hardcoded.
Simulation setup. For efficiency, we extract multiple sub-sequences xα
[−T0 ,T ) form a single longer
simulation (training, test, and validation sets are completely independent). The simulator runs at
120fps for accuracy, but the data is subsampled to 40fps. We use Blender 2.77’s OpenGL renderer
and the Blender Game Engine (relying on Bullet 2 as physics engine). The ball is a textured sphere
with unit mass. We found that changing the friction parameter of the bowl or the ball does not
influence the motion. Therefore, we added translation and rotation damping (both set to 0.1 in
Blender) to the sphere’s animation properties in order to simulate energy loss due to friction. The
simulation parameters were set as: max physics steps = 5, physics substeps = 3, max logic steps = 5,
FPS = 120. Rendering used white environment lighting (energy = 0.7) and no other light source. The
object color was set to a colored checkerboard texture in order to enable the visual perception of
rotation. We used 70% the data for training, 15% for validation, and 15% for test. During training
we start observation at a random time while it is fixed for test. The output images were stored as
128 × 128 color JPEG files.
5 Experiments
5.1 Baselines
Least squares fit. We compare the performance of our methods to two simple least squares baselines:
Linear and Quadratic. In both cases we fit two least squares polynomials to the screen-space
coordinates of the first T = 10 frames, which are not computed but rather given as inputs. The
polynomials are of first and second degree(s), respectively. Note, that being able to observe the first
10 frames is a large advantage compared to the networks, which only see the first T0 = 4 frames.
NPE. NPE [5] training was done using available online code. We used the same training procedure
as reported in [5]. NPE++ additionally takes angle and angular velocities as parameters and also
predicts angular velocity. In the case of the elliptic bowl, both scaling and bowl rotation angle are
given as input to the networks. In this case NPEs methods carry forward the estimated states via the
network.
While the previously mentioned methods start from state inputs, note that our models work with
raw images as direct observation of the world. Physical properties are then deduced from the
observation and then integrated through our Markov model. Thus we do not need a simulator to
estimate parameters of the physical worlds (such as scaling and rotation angle in the NPE case) and
can train our model on changing environment without requiring additional external measurements of
the underlying 3D spaces.
6
5.2 Results
Implementation details. The encoder network φenc is obtained by taking the ImageNet-pretrained
VGG16 network [21] and retaining the layers up to conv5 (for an input image of size (Hi , Wi ) =
(128, 128, 3) this results in a (8, 8, 512) state tensor st ). The filter weights of all layers except conv1
are retained for fine-tuning on our problem. conv1 is reinitialized as filters must operate on images
with 3T0 channels. The transition network φs (st ) uses a simple chain of two convolution layers (with
256 and 512 filters respectively, of size 3 × 3, stride 1, and padding 1 interleaved by a ReLU layer.
Network weights are initialized by sampling from a Gaussian distribution.
Training uses a batch size of 50 using the first 20 or 40 positions (and angular velocity when explicitly
mentioned) of each video sequence using RMSProp [23]. In our methods we start with a learning rate
of 10−5 and decrease learning rates by a factor of 10 when no improvements of the L2 position loss
have been found after 100 consecutive epochs. Training is halted when the L2 loss hasn’t decreased
after 200 successive epochs; 2,000 epochs were found to be usually sufficient for convergence. Note
here than in every cases where we estimate the angular velocity the corresponding L2 loss on the
latter is simply added to the network’s existing loss.
Since during the initial phases of training the network is very uncertain, the model using the Gaussian
log-likelihood loss wasP
found to get stuck on solutions with very high variance Σ(t); to solve this
issue, the regularizer λ t det Σ(t) was added to the loss, setting λ = 0.01.
In all our experiments we used Tensorflow [1] r0.12 on a single NVIDIA Titan X GPU. In the
following we will refer to our model that has been trained optimizing on the L2 loss over positions as
PhysNet otherwise ProbNet for log-likelihhod loss. When also predicting angular velocities the suffix
‘++’ is added to the name of the model.
Table 1: Long term predictions. The PhysNet and ProbNet models observed the T0 = 4 first frames
as input. PhysNet ++ and ProbNet ++ additionally estimate angular velocity at each time step adding
a L2 angular velocity loss to our position loss. All networks have been trained to predict the T = 20
first positions, except for the NPE and NPE++ which were given T0 = 4 states as input and train to
predict state at time T0 + 1. We report here results for time T = 20 and T = 40. For each time we
report on the left L2 position loss and L2 angular loss on the right. Perplexity (loge values shown in
the table) is defined as 2−E[log2 (p(x))] where p is the estimated posterior distribution.
Method
Images
Linear
Quadratic
NPE
NPE++
PhysNet
PhysNet ++
ProbNet
No
No
No
No
Yes
Yes
Yes
ProbNet ++
Yes
20
39.2
164.3
2.6
2.9
3.0
3.5
2.9
(4.5)
3.4
(4.7)
Bowl
L2 (Perplexity)
7.5
18.4
–
0.8
–
15.9
–
1.2
127.5
120.1
6.0
8.1
29.7
15.9
24.2
(21.9)
15.3
(9.2)
40
20
17.9
861.2
–
2.0
–
11.9
–
3.4
61.9
11.7
3.2
5.7
2.5
2.1
2.9
(32.1)
4.0
(4.5)
Ellipse
L2 (Perplexity)
23.3
14.8
–
1.7
–
1.0
–
1.8
20.1
93.1
6.1
17.5
20.6
16.1
21.8
(54.0)
16.7
(9.3)
40
Ellipse (no ball texture)
L2 (Perplexity)
40
–
–
–
–
–
–
–
–
–
–
–
–
–
44.6
–
1.0 16.2
3.8
–
24.0
–
(12.7)
1.3 15.0
3.5
(8.2)
20
–
70.6
–
3.1
4.4
–
3.8
–
–
–
–
5.2
1.6
3.1
(5.0)
4.3
(4.5)
Extrapolation. Table 1 and Fig. 3 compare the baseline predictors and the four networks on the
task of long term prediction of the object trajectory. All methods observed only the first T0 = 4
inputs (whether frames or object states) except for the linear and quadratic baselines, and aimed
to extrapolate the trajectory to 40 time steps. In that sense predictions can be seen as ”long terms”
relative to the number of inputs.
Table 1 reports the average L2 errors at time Ttest = 20 and 40 for the different estimated parameters.
However all of the methods can perform arbitrary long predictions. In particular our methods are only
trained to predict 20 first positions and reveal to be still competitive with NPEs methods at T = 40.
Our networks perform reasonably well compared to the NPEs methods using only images as inputs.
In our scenario we can see the different NPEs as upper limits of our experiments since they do
have access to the state space (complete or not). Furthermore adding angular velocity has shown to
improve performances of our models while it decreases the accuracy of the NPE++ predictions in
that case. Besides probability based losses show that our models were also able to predict uncertainty
in its outputs even in the case of unobserved scenarios.
7
Ellipse
20.0
L2 residual (pixels)
15.0
12.5
10.0
7.5
5.0
2.5
0.0
Linear
Quadratic
NPE++
PhysNet++
ProbNet++
17.5
L2 residual (angular velocity)
17.5
Ellipse
20.0
Linear
Quadratic
NPE
NPE++
PhysNet
PhysNet++
ProbNet
ProbNet++
15.0
12.5
10.0
7.5
5.0
2.5
0
5
10
15
20 25
Times
30
35
0.0
40
0
5
(a)
10
15
20 25
Times
30
35
40
(b)
Figure 3: Quantitative results. error evolution on Ellipse experiments for all time steps up to 40.
Error bars denote 25th and 75th percentiles of the L2 loss. (a) L2 position loss in pixels. (b) L2
angular velocity loss.
In addition training on a dataset where angular velocity was not explicitly seen (Ellipse no-texture
in Table 1) shows that our models can still provide encouraging results in that case. It managed to
accurately deduce angular velocity without seeing the ball spinning.
Interpolation. In order to remove ambiguity of a short term observed motion one can just indicates
the final desired state. In this experiment we concatenate to the first T0 = 4 input frames the last
frame observed at T = 40 and give it as an input to a model with the same architecture as PhysNet.
This model was then trained using the same aforementioned method with the only difference that we
also extract last positions from the first extracted feature. While this idea is fairly simple it shows to
be very efficient in practice as shown in Table 2 as it efficiently removed the motion ambiguity.
Table 2: Interpolation. InterpNet is essentially the same as PhysNet but takes as input a concatenation
of first T0 = 4 frames and last frame at T = 40. All networks have been trained to predict the T = 40
first positions. InterpNet predicts T = 40 positions using the first extracted feature.
Method
InterpNet
PhysNet
10
1.37
2.19
Bowl
L2
20
30
1.84 1.65
3.64 3.94
40
1.02
4.99
10
1.03
1.40
Ellipse
L2
20
30
1.60 1.35
2.39 2.71
40
0.65
3.00
6 Conclusions
In this paper we studied the possibility of abstracting the knowledge of physics using a single neural
network with a recurrent architecture for long term predictions. We compared our model to strong
baselines on the non-trivial motion of a ball rolling on a 3D bowl with different possible shapes. As
opposed to other concurrent approaches we do not integrate physical quantities but implicitly encode
the states in a feature vector that we can propagate through time.
Our experiments on synthetic simulations indicate that we can still make reasonable predictions
without requiring an explicit encoding of the state space. Besides they are also able to estimate
a distribution over such parameters to account for uncertainty in the predictions. While keeping
the same architecture we also show that we were able to remove motion ambiguity by showing the
network its targeted final states. However, the internal state propagation mechanism is still limited by
its ability to make accurate long term predictions outside observed regimes.
In the future we will aim to bring more robustness to our models by enforcing invariance to observed
regimes to enable longer accurate predictions. Besides, a next obvious step will also be to test the
framework on video footage obtained from real-world data in order to assess the ability to do so from
visual data affected by real nuisance factors.
8
References
[1] Abadi et al. TensorFlow: Large-scale machine learning on heterogeneous systems, 2015.
Software available from tensorflow.org.
[2] Pulkit Agrawal, Ashvin V Nair, Pieter Abbeel, Jitendra Malik, and Sergey Levine. Learning to
Poke by Poking: Experiential Learning of Intuitive Physics. In Proc. NIPS, pages 5074–5082,
2016.
[3] Peter Battaglia, Razvan Pascanu, Matthew Lai, Danilo Jimenez Rezende, et al. Interaction
networks for learning about objects, relations and physics. In Proc. NIPS, pages 4502–4510,
2016.
[4] Peter W Battaglia, Jessica B Hamrick, and Joshua B Tenenbaum. Simulation as an engine of
physical scene understanding. PNAS, 110(45):18327–18332, 2013.
[5] Michael B Chang, Tomer Ullman, Antonio Torralba, and Joshua B Tenenbaum. A compositional
object-based approach to learning physical dynamics. arXiv preprint arXiv:1612.00341, 2016.
[6] Bert De Brabandere, Xu Jia, Tinne Tuytelaars, and Luc Van Gool. Dynamic filter networks. In
Proc. NIPS, 2016.
[7] Misha Denil, Pulkit Agrawal, Tejas D Kulkarni, Tom Erez, Peter Battaglia, and Nando de Freitas.
Learning to perform physics experiments via deep reinforcement learning. Deep Reinforcement
Learning Workshop, NIPS, 2016.
[8] Katerina Fragkiadaki, Pulkit Agrawal, Sergey Levine, and Jitendra Malik. Learning visual
predictive models of physics for playing billiards. arXiv preprint arXiv:1511.07404, 2015.
[9] J. B. Hamrick, P. W. Battaglia, T. L. Griffiths, and J. B. Tenenbaum. Inferring mass in complex
scenes by mental simulation. Cognition, 157:61–76, 2016.
[10] Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Deep residual learning for image
recognition. In IEEE CVPR, pages 770–778, 2016.
[11] Sepp Hochreiter and Jürgen Schmidhuber. Long short-term memory. Neural Comput., 9(8):1735–
1780, 1997.
[12] Alex Krizhevsky, Ilya Sutskever, and Geoffrey E Hinton. Imagenet classification with deep
convolutional neural networks. In Proc. NIPS, pages 1097–1105, 2012.
[13] Ladický, Jeong, SoHyeon, Barbara Solenthaler, Marc Pollefeys, Markus Gross, et al. Datadriven fluid simulations using regression forests. ACM Trans. on Graphics (TOG), 34(6):199,
2015.
[14] Adam Lerer, Sam Gross, and Rob Fergus. Learning physical intuition of block towers by
example. arXiv preprint arXiv:1603.01312, 2016.
[15] Wenbin Li, Aleš Leonardis, and Mario Fritz. Visual stability prediction and its application to
manipulation. arXiv preprint arXiv:1609.04861, 2016.
[16] Aron Monszpart, Nils Thuerey, and Niloy Mitra. SMASH: Physics-guided Reconstruction of
Collisions from Videos. ACM Trans. on Graphics (TOG), 2016.
[17] Roozbeh Mottaghi, Hessam Bagherinezhad, Mohammad Rastegari, and Ali Farhadi. Newtonian
scene understanding: Unfolding the dynamics of objects in static images. In IEEE CVPR, 2016.
[18] Natalia Neverova, Pauline Luc, Camille Couprie, Jakob Verbeek, and Yann LeCun. Predicting
deeper into the future of semantic segmentation. arXiv preprint arXiv:1703.07684, 2017.
[19] Peter Ondruska and Ingmar Posner. Deep tracking: Seeing beyond seeing using recurrent neural
networks. In Proc. AAAI, 2016.
[20] David Silver, Hado van Hasselt, Matteo Hessel, Tom Schaul, Arthur Guez, Tim Harley, Gabriel
Dulac-Arnold, David Reichert, Neil Rabinowitz, André Barreto, and Thomas Degris. The
predictron: End-to-end learning and planning. CoRR, abs/1612.08810, 2016.
9
[21] K. Simonyan and A. Zisserman. Very deep convolutional networks for large-scale image
recognition. In International Conference on Learning Representations, 2015.
[22] Russell Stewart and Stefano Ermon. Label-free supervision of neural networks with physics
and domain knowledge. CoRR, abs/1609.05566, 2016.
[23] T. Tieleman and G. Hinton. Lecture 6.5—RMSProp: Divide the gradient by a running average
of its recent magnitude. COURSERA: Neural Networks for Machine Learning, 2012.
[24] J. Tompson, K. Schlachter, P. Sprechmann, and K. Perlin. Accelerating Eulerian Fluid Simulation With Convolutional Networks. ArXiv e-print arXiv:1607.03597, 2016.
[25] Jiajun Wu, Joseph J Lim, Hongyi Zhang, Joshua B Tenenbaum, and William T Freeman. Physics
101: Learning physical object properties from unlabeled videos. In Proc. BMVC, 2016.
[26] Jiajun Wu, Ilker Yildirim, Joseph J Lim, Bill Freeman, and Josh Tenenbaum. Galileo: Perceiving
physical object properties by integrating a physics engine with deep learning. In Proc. NIPS,
pages 127–135, 2015.
[27] Tianfan Xue, Jiajun Wu, Katherine L Bouman, and William T Freeman. Visual dynamics:
Probabilistic future frame synthesis via cross convolutional networks. In Proc. NIPS, 2016.
10
| 2cs.AI
|
Exact uniform sampling over catalan structures
arXiv:1803.03945v1 [cs.DM] 11 Mar 2018
Alexandros Angelopoulos, Eleni Bakali
Department of Computer Science,
School of Electical and Computer Engineering,
National Technical University of Athens, Greece.
{angelop,mpakali}@corelab.ntua.gr
March 13, 2018
Abstract
We present a new framework for creating elegant algorithms for
exact uniform sampling of important Catalan structures, such as triangulations of convex polygons, Dyck words, monotonic lattice paths and
mountain ranges. Along with sampling, we obtain optimal coding, and
optimal number of random bits required for the algorithm. The framework is based on an original two-parameter recursive relation, where
Ballot and Catalan numbers appear and which may be regarded as
to demonstrate a generalized reduction argument. We then describe
(a) a unique n × n matrix to be used for any of the problems -the
common pre-processing step of our framework- and (b) a linear height
tree, where leaves correspond one by one to all distinct solutions of
each problem; sampling is essentially done by selecting a path from
the root to a leaf - the main algorithm. Our main algorithm is linear
for a number of the problems mentioned.
keywords uniform sampling, optimal coding, catalan structures, convex
triangulations, ballot numbers
1
Introduction
The consideration of different triangulations of a point set first appears in a
well-studied form in the middle of the 18th century by Leonhard Euler: he
successfully conjectured the closed formula for the number of triangulations
of the convex n-gon, that was what we denote now by Cn−2 , the (n − 2)-th
Catalan number. These numbers, named after the Belgian mathematician
Eugène Charles Catalan, satisfy the following basic relations:
1
Cn+1 =
n
X
Ck Cn−k ,
C0 = 1
(1)
k=0
2n
1
, C0 = 1
Cn =
n+1 n
4n
4n
Cn ≤ 3/2 √
and
lim
√ =1
n→∞ Cn n3/2 π
n
π
(2)
(3)
They occur as the solution of a very large number of counting problems
in combinatorics. [30] gives more than 200 interpretations, more than 60
exercises, in all, a spectacular volume of work centered around the Catalan
numbers.
Some modern views regarding this core problem is the study of algorithms for efficient coding of triangulations, and for uniform generation or
sampling a random triangulation.
Motivation-Applications. Triangulations of polygons are fundamental structures with many applications e.g. in Computational Geometry
[6, 22], VLSI floorplanning [25], and Graph Drawing [21]. Many algorithms like point location, ray-shooting, visibility area computing and computing shortest paths inside simple polygons, are based on triangulations
[31, 13, 14, 18]. In particular sampling (or equivalently uniform generation)
of random triangulations, apart from its theoretical interest, has many practical applications. Interestingly sampling triangulations was first considered
by physicists for its applications in the study of two dimensional quantum
gravity [3]. Sampling plays a central role in testing and verifying the time
complexity of particular implementations of algorithms like the previously
mentioned, that depend on triangulations. A method to achieve time verification is presented in [10]. Finally efficient coding of triangulations, is
essential for storing them after their random generation, since these data
are usually huge and inefficient coding may cause storing to dominate the
running time of the algorithm that uses these data.
Previous work. There has been significant work on uniform sampling
and coding triangulations, especially since the 1990s [11, 9, 7, 8, 24, 28, 27,
26].
We will mostly compare our results and framework to [8]: Devroye et
al. describe a linear-time algorithm in the RAM model of computation, for
the uniform generation of convex triangulations and monotone lattice paths.
This is actually equivalent to a O(n log n) algorithm, when taking into account that this algorithm needs the generation of O(n) random numbers of
O(log n) bits each. The ballot theorem is invoked in their work (see also
[12], Chapter III), as it describes lattice path problems.
Another line of research regarding triangulations is the study of Markov
chains that move along similar triangulations, most commonly considering as
2
similar those that differ by a single edge flip [16, 20, 19, 23]. These Markov
chains converge to the uniform distribution over the set of triangulations,
thus yielding almost uniform sampling algorithms (this is the well known
Markov chain Monte Carlo method for sampling and counting). The best
of the above mentioned algorithms runs in O(n5 ), but has a deviation ǫ > 0
from the uniform distribution (which is a common drawback/characteristic
of the MCMC method).
While for convex graphs it is the Catalan numbers that give the exact number of triangulations, no such formula exists for a general graph.
Exhaustively enumerating the triangulations is not an easy task: already
Cn = Θ(n−3/2 4n ), while the best known bounds for the generic case are
currently set a lower Ω(2.43n ) ([27]) and an upper O(30n ) ([26]). There is
also no general formula for counting triangulations of convex polygons with
forbidden edges, i.e. when the input is a general graph G embedded to the
plane, and valid triangulations are those that use only edges of G. Naturally,
there has been work on counting the triangulations given a specific point
set asymptotically faster than by enumerating all triangulations ([2]), and
approximately counting with favorable compromises ([1]).
1.1
Our contribution
In this article, we present a unified framework to obtain algorithms for exact
uniform sampling and optimal coding of Catalan structures. We will use the
triangulations of convex polygons as our main problem. We will then use the
monotone lattice path problem to show that our framework can be tweaked
to easily get the very algorithms presented in [8]. In a nutshell, we present:
• new framework and elegant algorithm for exact uniform sampling over
convex triangulations and other Catalan structures;
• new recursive relation for ballot and Catalan numbers with an interesting combinatorial interpretation;
• separate pre-processing step of O(n2 ) time, common to all problems
that can be described by the recursive relation,
• optimal coding of the solutions/samples of the problems: for an input
related to size n, we need exactly log(Cn ) bits to encode each solution;
• optimal number of random bits for the main sampling algorithm: it
needs exactly log Cn random bits to run, i.e. to generate uniformly at
random a solution;
• efficient algorithm for sampling, as well as counting triangulations for
a more general family of graphs embedded to the plane in convex
position: Kn,−m is obtained by an embedding of the complete graph
Kn after removing m consecutive span-2 edges.
3
Although our sampling algorithm has total running time O(n2 ), which
is worse than the O(n log n) of [8], our preprocessing step helps to reduce to
the optitmal the number of random bits needed, as well as the length of the
codewords.
An outline - main ideas Given n, we consider an initial instance which
-in some sense- describes the space of all potential solutions; for instance, in
the case of convex triangulations, we consider the complete convex graph
Kn , as all n(n − 3)/2 diagonals are in our disposal to be selected for some
triangulation, which requires only n − 3 such edges. Our goal is to describe1
a binary tree of polynomial height, with its leaves corresponding one by one
to all triangulations of the convex n-gon and then aim at sampling a leaf
uniformly at random.
In order to achieve this, we need a reduction argument, w.r.t. which the
set of potential solutions on some node’s graph can actually be partitioned
into the solutions obtained either by its left or the right child and which
are disjoint. Then, in order to sample a solution uniformly at random, it
would suffice to be able to calculate the size of each of the two subtrees of
any node [17, 29]. Thus, starting from the root, we should be capable of
uniformly selecting a leaf by recursively selecting one of a node’s children
with probability proportional to the size of the corresponding subtree.
Usually, the estimation of the size of subtrees for an arbitrary tree is
computationally hard [4], and this is the reason that the above method
usually fails. The innovation of our approach consists in that we manage
to construct this tree in a systematic way that not only reflects our reduction argument, but also plenty of isomorphisms are revealed so that (a) the
number of all classes of non-isomorphic instances is polynomial in n (in particular quadratic), and (b) it is easy to determine the class in which each
instance belongs. Eventually, it suffices to solve the general problem only
for a polynomial number of non-isomorphic sub-instances, in a preprocessing
step, bottom-up, in time linear to the number of non-isomorphic instances,
thus in total quadratic in n.
In particular, it occurs that all internal nodes of our tree correspond to
(sub)instances of a more general problem, needing a second parameter to
be described and for which no formula nor algorithm was known until now:
compute the number of triangulations of an embedded to the plane almost
complete convex graph Kn,−m , a graph missing only m consecutive span-2
edges (or ears, as denoted in [15, 8]) from what would be a the complete Kn .
As a first simple note, we get that m ≤ n, thus we have the O(n2 ) classes
of non-isomorphic instances.
In the Sections to follow, we will state and prove properties of the central
1
The construction is done only mentally, for the purposes of the analysis; it is not
actually performed by the algorithm.
4
to our work recursive relation, the sampling algorithm scheme it implies and
its application to convex triangulations and mountain ranges problems (the
latest to be trivially linked also to Dyck words, monotone lattice paths, etc.).
2
Our framework
Let an,m denote the number of solutions corresponding to any problem parameterized by n, m, and consider the following recursive relation:
an,0 = an−1,0 + an,1
(4)
an,m = an−1,m−1 + an,m+1
(5)
a0,0 = 1 and an,n = 0, ∀i ≥ 1
(6)
Theorem 1 Consider the ballot numbers
i+1−j i+1+j
, i, j ≥ 0
Ni,j =
i+1+j
j
Along with defining Ni,−1 = 0, the ballot numbers satisfy 4, 5 and 6 for i = n
and j = n − 1 − m.
In other words, an,m = Nn,n−1−m . Note also that:
2n
2n
2
1
an,0 = Nn,n−1 =
=
= Cn
2n n − 1
n+1 n
(7)
We will from now on refer to the relations 4, 5 and 6 as the BC (recursive)
relation or recursion, a naming derived from its close relationship with ballot
and Catalan numbers.
Theorem 2 The generating function for the numbers an,m is
√
(1 − xy)(1 − 1 − 4x − 2xy)
G(x, y) =
2x(1 − y + xy 2 )
Proof. [Proofs of Theorems 1 and 2] The proofs can be found in Appendix
A.
The BC table Immediately, we may define a n × n table/matrix, with
an,m as entries. It can be calculated in O(n2 ) time, bottom-up (Figure 1),
and will be considered as our framework’s pre-processing step. The main
algorithm will simply recall some of its values when needed, in constant
time.
5
n
m
0
1
2
3
4
5
6
7
8
..
.
0
1
1
2
5
14
42
132
429
1430
↑
1
2
0
1
0
3
1
9
4
28
14
90
48
297 165
1001 572
3
4
5
6
7
8
0
1
5
20
75
275
0
1
6
27
110
0
1
7
35
0
1
8
0
1
0
···
..
.
Cn
Figure 1: The BC table. It has (n − 3)(n − 1) + 1 entries. The arrows show
the sequence in which the cells fill up.
The main algorithm scheme Consider now the binary tree implied by
the BC relation (Figure 2), rooted at a node related to an,0 . This means we
are attempting to randomly select one of Cn samples. The BC table allows
us to achieve:
• optimal coding, requiring exactly log(Cn ) = O(n) bits to encode each
solution;
• optimal number of random bits for the main sampling algorithm: generating one random number in the range [0..Cn − 1], which requires
log Cn random bits, suffices.
A common approach is to calculate the sizes of the two sub-trees hanging from some node upon arriving on the very node and branch left or
right with the appropriate probability. This requires a total of (number
of branchings)×(random bits required per branching) random bits. Indeed,
a
≈ 2(n + m),
we may well apply the algorithm of [8], given that n−1,m−1
an,m
the number of random bits needed is O(n log n), as the height of the tree is
linear to n, thus the branchings required to reach a leaf is linear in n, too.
It is evident that establishing the BC table beforehand, and tossing only
log Cn ≈ 4n coins (see (3)) we generate a code uniformly at random, which
uniquely defines the leaf of the tree the algorithm will end upon: we branch
without any more coin tosses, as we know all critical quantities in advance.
Moreover, the scheme allows for down to linear time main algorithms
for sampling an instances, as all leaves’ distance from the root is linear in
n - it actually fluctuates from n to 2n. For instance, we will show that the
6
pr =
pr =
a2,0
a1,0
a2,0
pr =
a1,0
a3,0
a2,0
a3,0
a2,−1
a2,0
pr =
a2,−1
a1,0
a2,−2
pr =
a3,−1
a3,0
a3,−1
a2,0
a3,−1
pr =
a2,0
a1,0
a3,−2
a2,−1
a1,0
a3,−2
a3,−1
a2,−2
a2,−1
a1,0
a3,−3
a2,−2
Figure 2: The universal sampling algorithm scheme: branching with probability analogous to the size of the subtree. The height of the tree is O(n). We
note that typically all an,n nodes are non-existent, as the algorithm branches
towards them with probability 0 - that’s why they are marked red. Also, all
a1,0 labeled nodes have a left child, a0,0 , which is the actual leaf according
to the BC relation.
mountain ranges problem (and, therefore, Dyck words and monotone lattice
paths) has an O(n) main sampling algorithm, which we consider a good
trade-off when we need many samples for the same problem. Remember,
that only a O(n log n) algorithm is proposed in [8].
3
Convex triangulations
As we have already mentioned, for any problem we consider the object which
describes the space of all solutions. In the case of convex triangulations, this
is the complete geometric graph. A geometric graph is defined [5] as a pair
of a point set V on
R2 and a subset of straight line segments withendpoints
V
in V , i.e. E ⊆ 2 . Now let our point set be convex and E = V2 . We may
refer to this special case as the “convex Kn ”, an alternate to the complete
convex geometric graph, taking into account that all convex drawings of Kn
are isomorphic. Some important definitions are the following.
Proper labeling, consecutive vertices and span-2 edges Given a
convex geometrical graph, we will say that its vertex labeling v0 , ..., vn−1 is
proper if its n vertices appear in order, clockwise or counter-clockwise around
its convex hull. We will always assume such a labeling for any convex graph
we refer to, unless noted otherwise. The above being stated, it is evident that
7
for all i ∈ [0..n − 1], vertices vi and vi+1 are consecutive, naturally defining
that vn ≡ v0 . We shall also admit that all edges vi vi+2 , i ∈ [0..n − 1] are
properly defined, as vx ≡ vx mod n , for any x, n.
Let V be a convex point set and assume proper vertex labeling. For
every edge (diagonal) e = vi vj ∈ E, we define its span, denoted by |e|, to be
the minimum distance of its adjacent vertices around the convex hull. The
edges that miss only one vertex, that is edges of the form vi−1 vi+1 , will hold
a key-role in our work, thus we will denote them as span-2 edges. All such
edges can be named after the missed vertex with which they form a triangle:
ei ≡ vi−1 vi+1 .
As an analog to the notion of consecutive vertices, we define two consecutive span-2 edges to be a pair of edges of the form vi−1 vi+1 , vi vi+2 .
Observe that: K3 has no span-2 edges, K4 has two and, for n ≥ 5, Kn
has exactly n of such edges. For n ≥ 5 and any vertex vi , we denote by ei
the span-2 edge vi−1 vi+1 , in other words, the edge that may form a triangle
together with vi .
The Kn,−m graph. We will need to work on specific graphs, that allow for
the desired structure of triangulations to be witnessed. We define Kn,−m to
be the nearly complete convex Kn which misses only m consecutive span-2
edges. Therefore:
• Kn,0 ≡ Kn and when properly defined, Kn,−m has n2 − m edges.
• For n ≥ 5, it is −n ≤ −m ≤ 0, as a graph may miss up to all n span-2
edges.
• The graphs K4,−1 , K4,−2 are properly defined.
• For fixed n, m, all Kn,−m are isomorphic to each other (under rotation).
Proposition 3 Every triangulation of a convex geometric graph on 5 or
more vertices has at least two span-2 edges.
Proof. A triangulation TC on n points requires that all faces but the outer
are triangles. The number of faces f is equal to n − 1 (e.g. use Euler’s
characteristic on plane graphs), therefore there is a total of n − 2 inner
faces/triangles. Since all n non-diagonal edges of TC (the sides of the polygon) are sides of the n − 2 triangles, by the pigeonhole principle, there are
at least 2 triangles which use 2 sides of the n-gon as their sides. Then, those
triangles’ third edge must be an span-2 one and, as soon as n ≥ 5, those
third edges do not coincide.
Proposition 4 A convex geometric graph with n ≥ 5 and only two span-2
edges which appear consecutive in the drawing has no triangulation. Equivalently, T (Kn,−(n−2) ) = 0.
8
Proof.
Two consecutive span-2 edges intersect, therefore together they
do not form any triangulation, unless only one is needed (quadrilateral).
So there must be a third span-2 edge which, together with one of the 2
consecutive ones, is the obligatory second span-2 edge in a triangulation T
of the graph (see Proposition 3). Contradiction, as the graph has no other
such edge.
3.1
The reduction argument
Our reduction argument is primarily based on partitioning the number of
triangulations of some convex graph G into those which include a specific
span-2 edge ei and those which do not (assuming there is at least one span2 edge in G). Let us already point out the tree structure implied by the
partitioning.
v0
v7
v1
e0
e1
e7
v6
v0
K8
e6
e2
v7
v0
v2
v7
v1
v1
e5
e3
e4
v5
v6
K7
v3
v2
v6
K8,−1
v2
v4
v5
v5
v3
v3
v4
v4
Figure 3: Reduction for the complete Kn , working on v0 /e0
Proposition 5 Let G = (V, E) be a convex geometric graph and T (G) the
number of its triangulations. Then, for any span-2 edge ei we have that
T(G | ei included) = T(G \ vi ).
Obviously, the following holds: T (G) = T (G \ vi ) + T (G \ ei ).
Proof. Observe that if ei is selected to participate in a triangulation TC ,
then all edges incident to vi may not participate in TC , as they all cross
ei . Therefore, the number of triangulations where ei is included is exactly
determined by the number of triangulations of G \ vi , as adding the “hat”
9
vi−1 vi vi+1 in any of the latest will yield a distinct triangulation of the original
graph.
Figure 3 demonstrates the above, nevertheless for the special case of an
initial complete graph. However, we easily get that T (Kn,0 ) = T (Kn−1,0 ) +
T (Kn,−1 ), which is essentially the first of the BC relations.
Now, consider a Kn,−1 graph. If we work on v1 /e1 (Figure 4, marked
blue vertex), thus the selection or not of e1 for the next branching of our
tree, we obtain either a K7 ≡ K7,0 (left child), either a K8,−2 . In general
(Figure 5), working on the next available span-2 edge, we reduce Kn,−m is
to either a Kn−1,−m+1 (left child) or a Kn,−m−1 (right child).
v0
v7
v1
v6
v0
v0
K8,−1
v2
v7
v7
v1
v1
v5
v6
v3
K7
v6
K8,−2
v2
v2
v4
v5
v5
v3
v3
v4
v4
Figure 4: Reduction for Kn,−1 , working on the next vertex/span-2 edge
It proves that the key to our reduction is the correct definition of the
next vertex (or span-2 edge) to work on. If, for instance, while on K8,−1
we select to work on v5 /e5 , the nice to our reduction K7 does not pop out.
More importantly, we would miss the recurring of isomorphic graphs, which
give us the number of triangulations they feature per class (Kn,−m ), and not
per specific instance.
Definition 1 (Next vertex/span-2 edge) Given a properly labeled convex geometric graph on n vertices, missing only m consecutive span-2 edges,
ei , ei+1 , ..., ei+m . The next vertex/span-2 edge is the pair vm+1 /em+1 .
Now, let us formally prove our claim.
Theorem 6 For any Kn,−m and −n + 1 ≤ −m ≤ −1, it is
T (Kn,−m ) = T (Kn−1,−m+1 ) + T (Kn,−m−1 )
10
v0
v7
v1
v6
v 0 ≡ r0
v 7 ≡ r6
v0
K8,−3
v2
v1
v5
v 6 ≡ r5
v7
v 1 ≡ r1
v3
K7,−2
v6
K8,−4
v 2 ≡ r2
v2
v4
v 5 ≡ r4
v5
v3
v3
v 4 ≡ r3
v4
Figure 5: Reduction for Kn,−m , working on the next vertex/span-2 edge
Also, it is
T (Kn,−m ) = an−2,m
for all defined quantities.
Proof. Without loss of generality (see 9), we may relabel our initial graph
–if necessary– and have the edges e0 , ..., em−1 as the missing span-2 ones.
The next vertex/span-2 edge is the pair vm /em . The right subtree is rooted
to a Kn,−m−1 graph, as it derives from deleting em , having a consecutive
m + 1 span-2 (but no other) edges missing.
For the left subtree, deleting vm leaves us to examine the edges of a
graph on n − 1 vertices. We have that edges vn−1 v1 , v0 v2 , ..., vm−3 vm−1
are all missing from the induced subgraph, and together they add up to
m − 1 consecutive span-2 edges. Edge vm−2 vm , missing from Kn,−m is not a
potential edge of the smaller graph. Edge vm−1 vm+1 has now become a side
of the (n − 1)-gon, and vm−2 vm+1 and vm−1 vm+2 are now span-2 edges of
the new graph, as are all the (potentially) remaining vm+1 vm+3 , ..., vn−2 v0 .
Thus, we have obtained a Kn−1,−m+1 graph. To complete the proof, we
remind that:
• Proposition 4 gives us T (Kn,−n+2 ) = 0 for pentagons and up; but
T (K4,−2 ) gives the number of triangulations of a quadrilateral missing
all 2 span-2 edges, therefore the relation is satisfied for all n ≥ 4.
• T (K3,0 ) = 1, as K3 is a triangle.
11
• K3,−1 and K2,0 are not properly defined as convex graphs, and not
actually needed, but for sake of completeness, we shall consider their
number of triangulations equal to a1,1 and a0,0 respectively.
Theorem 7 Our main sampling algorithm scheme adopted for convex triangulations yields an algorithm of running time O(n2 ).
Proof. As an outline, the quadratic (and not linear) time is due to the
information that must be stored when branching left. For a complete proof,
refer to the Appendix. Yet, we note that [8] implies a linear algorithm by
sampling monotone lattice paths, first. However, if one wants to preserve
one-to-one relation between the subinstances of the two problems, we are
not aware of any work proposing any similar framework to ours.
4
Mountain ranges
The mountain range problem consider the ways to form a “mountain range”
with n upstrokes and n downstrokes that all stay above a horizontal line. As
with the convex triangulations, we assume the space of all solutions, that is
actually a n×n lattice rotated as to comprehend our node to node movement
as Up or Down and always maintaining direction to the right (w.l.o.g.).
Assume we are on the horizon, or level 0, so we have to move Up. Our
actual choice is whether to go further Up or slant Down. The latest case
brings us to the horizon with 1 upstroke and downstroke to our left, therefore
the remaining mountain ranges are exactly the mountain ranges with n − 1
upstrokes and downstrokes - correlate to the left child of the BC-implied
tree. That is:
rn,0 = rn−1,0 + rn,1
where the remainder rn,1 denotes the case we moved Up. Of course, the
cases yield mutually disjoint mountain ranges.
It is easy enough to go on, explaining that if we are not on the horizon
(m ≥ 1), we are not dictated to move up (unless we cannot - the “height” or
the range is at most n). If we move up, our m increases by one. If we move
down, we “see” again a disjoint set of potential solutions. Since we slanted
down (m decreased) we can symbolize this reduction by
rn,m = rn−1,m−1 + rn,m+1
.
Theorem 8 The main algorithm obtained by our scheme for the mountain
ranges problem is linear.
12
Proof. We need linear in n coin tosses to get the code of the mountain
range; we branch linear in n times and for each node we lie on, we store a
linear amount of information (Ups-Downs) to backtrack to the root.
A
Omitted proofs
Proof. [Proof of Theorem 1] We will consider the 2 main of the BC-relations.
The marginal cases are trivial to prove.
an,0 = an−1,0 + an,1
⇔
Nn,n−1 = Nn−1,n−2 + Nn,n−2
1
2n
2n − 2
2n − 1
1
3
=
+
n n−1
n−1 n−2
2n − 1 n − 2
(2n − 2)!
3(2n − 2)!
(2n)!
=
+
n!(n + 1)!
(n − 1)!n! (n − 2)!(n + 1)!
(2n − 1)(2n)
1
3
=
+
(n + 1)!
(n − 1)! (n − 2)!(n + 1)
2(2n − 1)
1
3
=
+
(n − 1)(n + 1)
(n − 1) (n + 1)
⇔
⇔
⇔
⇔
⇔
4n − 2 = (n + 1) + 3(n − 1),
which holds.
Regarding an,m = an−1,m−1 + an,m+1 we have:
Nn,m = Nn−1,m + Nn,m−1
n−m n+m
n−m+2 n+m
n+1−m n+1+m
=
+
n+1+m
n+m
n+m
m
m
m−1
(n + 1 − m)(n + m)!
(n − m)(n + m)!
(n − m + 2)(n + m)!
=
+
m!(n + 1)!
(n + m)m!n!
(n + m)(m − 1)!(n + 1)!
(n − m)
(n − m + 2)
(n + 1 − m)
=
+
m(n + 1)
(n + m)m (n + m)(n + 1)
1
1
1
2
(n − m + 2)
−
=
−
+
m n+1
m n + m (n + m)(n + 1)
2
1
(n − m + 2)
−
=
n+m n+1
(n + m)(n + 1)
2(n + 1) − (n + m) = n − m + 2,
⇔
⇔
⇔
⇔
⇔
⇔
which holds.
Therefore, we have completed our proof.
Proof. [Proof of Theorem 2] Let G be the generating function for the numbers
13
ai,j , i.e.
G(x, y) =
∞
∞ X
X
ai,j xi y j
i=0 j=0
and let B be the generating function for numbers bi,j = ai+1,j for all i, j ≥ 0.
We will first determine B, and then it is simply:
G = xB + 1.
(8)
Initially, let us break B into sums of fixed j:
B = A0 + A1 + A2 + ... =
∞
X
Ak ,
(9)
k=0
where for all k ∈ N Ak =
P∞
i=0 bi,k x
A0 =
iyk .
From the BC-relation 4 we obtain:
1
A1 + xA0 + 1,
y
(10)
while from the recursive BC-relation 5 we obtain:
∀k > 0 Ak =
1
Ak+1 + xyAk−1 .
y
(11)
We have also showed that the numbers ai,0 are actually Catalan numbers,
in particular bi,0 = ai+1,0 = Ci+1 , for i ≥ 0. So, if Cat is the generating
function of the Catalan numbers, then:
Cat = xA0 + 1 ⇒ A0 =
Cat − 1
.
x
(12)
It is well known that:
Cat(x) =
1−
√
1 − 4x
.
2x
(13)
In order to get the generating function G, plug equations 10,11,12,13 into
equation 9:
1
(A1 + A2 + ...) + xy(A0 + A1 + A2 + ...) + xA0 + 1
y
1
= (G − A0 ) + xyG + xA0 + 1
y
B=
Cat(x)−1
y + (xy − 1)
y + (xy − 1)A0
x
=
2
y − 1 − xy
y − 1 − xy 2
√
y
(xy − 1)(1 − 1 − 4x − 2x)
=
+
.
y − 1 − xy 2
2x2 (y − 1 − xy 2 )
=
14
Finally, from relation 8 he have:
√
(1 − xy)(1 − 1 − 4x − 2xy)
G(x, y) = xB(x, y) + 1 =
.
2x(1 − y + xy 2 )
Observe that we did not directly use the initial condition that an,n =
0, n ≥ 1; we actually did account for it, as it is hidden in the proof that the
numbers an,0 correspond to Catalan numbers.
B
Notes on the main sampling algorithm for convex triangulations
For our convenience, we hereby adopt the notation Tn,−m = T (Kn,−m ).
The left child of a Kn,−m in our reduction is a graph on n − 1 vertices,
in other words, w.r.t. our initial proper vertex labeling, the labeling of the
left child is not proper, as a vertex is missing. Therefore, we must relabel
this graph, and every left child graph of the tree. The following Rule gives
the final ingredient for building the desirable reduction tree.
Rule 9 Let Kr,−m be the left child of a node of a tree rooted at Kn . If
m = 0, then relabel the complete Kr as desired. Else, place r0 opposite to
the first missing span-2 edge and complete with a proper relabeling. For each
new graph, maintain a 1 × n table to indicate the mapping of the current
to the initial labeling; current missing vertices of the parent graph can be
marked (e.g. −1 entries).
B.0.1
Properties of the reduction tree
In all, we have build a triangulation tree with the following properties:
• Every node has 2 children (left and right – binary tree).
• Every node indicating Kr,−m needs O(n) time to be created and coded:
store integers r and m, the 1×n mapping matrix for the vertex labeling,
plus a 2 integer indicator for backtracking to the parent node: if it is a
left child, hold [vm , −1], for a right child hold [vm−1 , vm+1 ] where vm is
the critical vertex of the parent node w.r.t. which the node branched
(store as labeled in the parent node).
• For any node, the triangulations coded in the left subtree are disjoint
to the ones of the right subtree, as they differ at the edge w.r.t. which
the node branched.
• If a node is K3 , then stop and mark one triangulation (green leaf).
Due to the above, all green leaves are left children and there is a total
of exactly Cn−2 green leaves in the tree.
15
• If a node is of the form Kr,−r+2 , then stop and mark no triangulation
(red leaf)
• Considering all the above, from any green leaf, backtracking to the root
is equivalent to obtaining one specific triangulation; this is achieved in
O(n) time.
0
4
\v
1
3
\e
2
0
0
4
1
3
4
2
3
0
0
4
1
3
2
0
4
2
1
1
3
0
4
2
1
3
4
2
1
3
2
T1
0
0
4
1
3
2
T2
0
4
1
3
2
4
1
3
4
2
0
0
0
1
3
4
2
4
1
3
1
3
2
2
T3
0
0
4
1
3
2
T4
0
4
1
3
2
0
4
1
3
2
4
1
3
T5
Figure 6: Full reduction tree for the convex pentagon. Blue color indicates
the working on node. Relabelings are not marked. Each of its 5 triangulations is encoded in a different green leaf.
Figure 6 shows the full reduction tree for the convex K5 . To give a for
instance, consider the green leaf encoding triangulation T3 . T3 includes the
triangle v0 v3 v4 (end of reduction); as a left child of its parent node, which
branched w.r.t. v2 /v0 v3 , it includes v0 v3 as an span-2 edge of the parent K4
subgraph, so triangle v0 v2 v3 is in T4 . The K4 parent node is a left child of
the K5,−1 node which branched w.r.t. v1 , therefore the triangulation does
also include triangle v0 v1 v2 ; finally (though not necessary), the K5,−1 node
being a right child of the K5 which branched w.r.t. v0 suggests that v4 v1 is
missing from the T4 .
Note that this is a small example, and some leaves (T2 , T4 , T5 ) already
16
2
indicate unambiguously the encoded triangulation. Observe also that even
if it is not directly visible that T1 differs from T4 , our simple branching
rule guarantees that T1 includes v4 v1 as an edge, while T4 does not, as they
belong to a different subtree of the root node which branched w.r.t. v0 /v4 v1 .
References
[1] Victor Alvarez, Karl Bringmann, Saurabh Ray, and Raimund Seidel. Counting triangulations and other crossing-free structures approximately. Comput. Geom., 48(5):386–397, 2015.
[2] Victor Alvarez and Raimund Seidel. A simple aggregative algorithm
for counting triangulations of planar point sets and related problems.
In Symposuim on Computational Geometry 2013, SoCG ’13, Rio de
Janeiro, Brazil, June 17-20, 2013, pages 1–8, 2013.
[3] J. Ambjorn, B. Durhus, and T. Jonsson. Quantum Geometry: A Statistical Field Theory Approach. Cambridge Monographs on Mathematical
Physics, Cambridge University Press, Cambridge, 1997.
[4] Eleni Bakali, Aggeliki Chalki, Aris Pagourtzis, Petros Pantavos, and
Stathis Zachos. Completeness results for counting problems with easy
decision. In Algorithms and Complexity - 10th International Conference,
CIAC 2017, Athens, Greece, May 24-26, 2017, Proceedings, pages 55–
66, 2017.
[5] Prosenjit Bose, Ferran Hurtado, Eduardo Rivera-Campo, and David R.
Wood. Partitions of complete geometric graphs into plane trees. Comput. Geom., 34(2):116–125, 2006.
[6] Mark de Berg, Otfried Cheong, Marc J. van Kreveld, and Mark H.
Overmars. Computational geometry: algorithms and applications, 3rd
Edition. Springer, 2008.
[7] Markus Denny and Christian Sohler. Encoding a triangulation as a permutation of its point set. In Proceedings of the 9th Canadian Conference
on Computational Geometry, Kingston, Ontario, Canada, August 1114, 1997, 1997.
[8] Luc Devroye, Philippe Flajolet, Ferran Hurtado, Marc Noy, and
William L. Steiger. Properties of random triangulations and trees. Discrete & Computational Geometry, 22(1):105–117, 1999.
[9] Q. Ding, J. Qian, W. Tsang, and C. Wang. Randomly generating triangulations of a simple polygon. In Computing and Combinatorics, 11th
Annual International Conference, COCOON 2005, Kunming, China,
August 16-29, 2005, Proceedings, pages 471–480, 2005.
17
[10] Peter Epstein, J. Kavanagh, A. Knight, J. May, T. Nguyen, and JörgRüdiger Sack. A workbench for computational geometry. Algorithmica,
11(4):404–428, 1994.
[11] Peter Epstein and Jörg-Rüdiger Sack. Generating triangulations at random. ACM Trans. Model. Comput. Simul., 4(3):267–278, 1994.
[12] W. Feller. An introduction to probability theory and its applications.
Number v. 1. Wiley, 1968.
[13] Leonidas J. Guibas and John Hershberger. Optimal shortest path
queries in a simple polygon. J. Comput. Syst. Sci., 39(2):126–152, 1989.
[14] Leonidas J. Guibas, John Hershberger, Daniel Leven, Micha Sharir, and
Robert Endre Tarjan. Linear-time algorithms for visibility and shortest
path problems inside triangulated simple polygons. Algorithmica, 2:209–
233, 1987.
[15] Ferran Hurtado and Marc Noy. Ears of triangulations and catalan numbers. Discrete Mathematics, 149(1-3):319–324, 1996.
[16] Ferran Hurtado and Marc Noy. Graph of triangulations of a convex polygon and tree of triangulations. Comput. Geom., 13(3):179–188, 1999.
[17] Donald E. Knuth. Estimating the efficiency of backtrack programs.
Technical report, Stanford, CA, USA, 1974.
[18] D. T. Lee. Visibility of a simple polygon. Computer Vision, Graphics,
and Image Processing, 22(2):207–221, 1983.
[19] Lisa McShine and Prasad Tetali. On the mixing time of the triangulation walk and other catalan structures. In Randomization Methods
in Algorithm Design, Proceedings of a DIMACS Workshop, Princeton,
New Jersey, USA, December 12-14, 1997, pages 147–160, 1997.
[20] Michael S. O. Molloy, Bruce A. Reed, and William Steiger. On the mixing rate of the triangulation walk. In Randomization Methods in Algorithm Design, Proceedings of a DIMACS Workshop, Princeton, New
Jersey, USA, December 12-14, 1997, pages 179–190, 1997.
[21] Takao Nishizeki and Md. Saidur Rahman. Planar Graph Drawing, volume 12 of Lecture Notes Series on Computing. World Scientific, 2004.
[22] Joseph O’Rourke. Computational Geometry in C. Cambridge University
Press, New York, NY, USA, 2nd edition, 1998.
[23] Mohammad Tanvir Parvez, Md. Saidur Rahman, and Shin-Ichi Nakano.
Generating all triangulations of plane graphs. J. Graph Algorithms
Appl., 15(3):457–482, 2011.
18
[24] Dominique Poulalhon and Gilles Schaeffer. Optimal coding and sampling of triangulations. Algorithmica, 46(3-4):505–527, 2006.
[25] Sadiq M. Sait and Habib Youssef. VLSI Physical Design Automation Theory and Practice, volume 6 of Lecture Notes Series on Computing.
World Scientific, 1999.
[26] Micha Sharir and Adam Sheffer. Counting triangulations of planar point
sets. Electr. J. Comb., 18(1), 2011.
[27] Micha Sharir, Adam Sheffer, and Emo Welzl. On degrees in random
triangulations of point sets. J. Comb. Theory, Ser. A, 118(7):1979–1999,
2011.
[28] Micha Sharir and Emo Welzl. Random triangulations of planar point
sets. In Proceedings of the 22nd ACM Symposium on Computational
Geometry, Sedona, Arizona, USA, June 5-7, 2006, pages 273–281, 2006.
[29] Alistair Sinclair and Mark Jerrum. Approximate counting, uniform generation and rapidly mixing markov chains. Inf. Comput., 82(1):93–133,
1989.
[30] Richard P. Stanley. Catalan Numbers. Cambridge University Press,
2015. doi:10.1017/CBO9781139871495.
[31] Robert Endre Tarjan and Christopher J. Van Wyk. An o(n log log n)time algorithm for triangulating a simple polygon. SIAM J. Comput.,
17(1):143–178, 1988.
19
| 8cs.DS
|
Noname manuscript No.
(will be inserted by the editor)
Binets: fundamental building blocks for phylogenetic networks
arXiv:1701.08995v1 [q-bio.PE] 31 Jan 2017
Leo van Iersel · Vincent Moulton · Eveline de Swart ·
Taoyang Wu
the date of receipt and acceptance should be inserted later
Abstract Phylogenetic networks are a generalization of evolutionary trees that are used by biologists to
represent the evolution of organisms which have undergone reticulate evolution. Essentially, a phylogenetic
network is a directed acyclic graph having a unique root in which the leaves are labelled by a given set of
species. Recently, some approaches have been developed to construct phylogenetic networks from collections
of networks on 2- and 3-leaved networks, which are known as binets and trinets, respectively. Here we study
in more depth properties of collections of binets, one of the simplest possible types of networks into which a
phylogenetic network can be decomposed. More specifically, we show that if a collection of level-1 binets is
compatible with some binary network, then it is also compatible with a binary level-1 network. Our proofs
are based on useful structural results concerning lowest stable ancestors in networks. In addition, we show
that, although the binets do not determine the topology of the network, they do determine the number of
reticulations in the network, which is one of its most important parameters. We also consider algorithmic
questions concerning binets. We show that deciding whether an arbitrary set of binets is compatible with
some network is at least as hard as the well-known Graph Isomorphism problem. However, if we restrict to
level-1 binets, it is possible to decide in polynomial time whether there exists a binary network that displays
all the binets. We also show that to find a network that displays a maximum number of the binets is NP-hard,
but that there exists a simple polynomial-time 1/3-approximation algorithm for this problem. It is hoped that
these results will eventually assist in the development of new methods for constructing phylogenetic networks
from collections of smaller networks.
Part of this work was conducted while Vincent Moulton was visiting Leo van Iersel on a visitors grant funded by the Netherlands
Organization for Scientific Research (NWO). Leo van Iersel was partially supported by NWO, including Vidi grant 639.072.602, and
partially by the 4TU Applied Mathematics Institute. We thank the editor and the two anonymous referees for their constructive
comments.
Leo van Iersel
Delft Institute of Applied Mathematics
Delft University of Technology
The Netherlands
E-mail: [email protected]
Vincent Moulton and Taoyang Wu
School of Computing Sciences
University of East Anglia
Norwich
United Kingdom
E-mail: [email protected]
Eveline de Swart
Delft Institute of Applied Mathematics
Delft University of Technology
The Netherlands
E-mail: [email protected]
Taoyang Wu
School of Computing Sciences
University of East Anglia
Norwich
United Kingdom
E-mail: [email protected]
2
Leo van Iersel et al.
x
y
z
x
y
z
x
y
y
z
x
z
Fig. 1: An example of two level-1 trinets (left) that display the same set of three binets (right). All arcs are
directed downwards.
Keywords reticulate evolution · phylogenetic network · subnetwork · binet · algorithm
1 Introduction
Phylogenetic networks are a generalization of evolutionary trees which biologists use to represent the evolution
of species that have undergone reticulate evolution. Such networks are essentially directed acyclic graphs having
a unique root in which the leaves are labelled by a set X of species [14]. In contrast to evolutionary trees,
which can only represent speciation events, phylogenetic networks permit the representation of evolutionary
events such as gene transfer and hybridization which are known to occur in organisms such as bacteria and
plants, respectively. Although theoretical properties of evolutionary trees have been studied since at least the
1970’s, phylogenetic networks have been considered from this perspective only more recently, especially the
rooted variants which we will focus on in this paper.
One of the most important open questions concerning phylogenetic networks is how to construct them for
biological datasets [3]. It is now common practice for biologists to construct evolutionary trees from molecular
data, and several computer programs are available for this purpose [7]. However, the problem of constructing
networks from such data is an active area of research, and there are only a limited number of programs
available for biologists to perform this task. A survey of some of these methods and the theory underpinning
phylogenetic networks may be found in [9, 14, 15].
One approach that has been recently developed for constructing phylogenetic networks involves building
them up from smaller networks, using what can be thought of as a divide-and-conquer approach [16]. In
particular, for a set X of species, a network is constructed for every subset of X size 3 (called a trinet), and
then the trinets are puzzled together to build a network (see Figure 1 for an example of a trinet). This approach
constructs and is based on level-1 networks, networks that are slightly more general than evolutionary trees
(see Section 2 for the definition of such networks).
At first sight, it might appear that trinets are the simplest possible networks that could be considered for
building up networks from smaller ones. However, trinets contain even simpler networks called binets, networks
with 2 leaves (see e.g. Figure 1 for a level-1 trinet and the binets that it displays). Note that whereas binets
are the smallest informative building blocks for phylogenetic networks, for rooted phylogenetic trees, these
are 3-leaf trees (see e.g. [5]). Interestingly, even though binets are in themselves very simple, the collection of
binets displayed by a network can still contain some useful information concerning the network. Indeed, in the
aforementioned approach for building level-1 networks from trinets, binets are used in the process of puzzling
together the trinets.
In light of these considerations some obvious questions immediately arise concerning binets. For example, when is a collection of binets displayed by some phylogenetic network (the compatibility problem), and
how much information might we expect to extract concerning a phylogenetic network by just looking at the
collection of binets that it displays? In this paper, we shall address these and related algorithmic questions
concerning binets. It is hoped that these results will be useful in future for developing improved methods for
constructing phylogenetic networks from smaller networks.
We now present a summary of the rest of the paper. After introducing some preliminaries concerning
phylogenetic networks in the next section, we derive a key structural result for networks (Corollary 1) which
is useful in identifying which of the two possible types of binet is displayed on two leaves within a binary
phylogenetic network (that is a network in which all internal vertices have degree 3). Using this theorem, in
Section 4 we show that the collection of level-1 binets displayed by any binary phylogenetic network can always
be displayed by some binary level-1 network (Theorem 3). This reduces the problem of understanding binets
displayed by arbitrary binary networks to level-1 networks. To prove this result, we develop a framework which
also implies that there is a polynomial-time algorithm in |X| for deciding whether or not a collection of level-1
binets with combined leaf-set X can be displayed by some network with leaf-set X, and, if it is, gives a level-1
network that does this (see Section 6). Note that this is related to an algorithm presented in [11].
Binets: fundamental building blocks for phylogenetic networks
3
In Section 5, we turn to the question as to what can be deduced about the features of a phylogenetic
network just by considering the collection of binets that it displays. Note that, as might be expected, there
are networks - even trinets - that display the same set of binets but that are not equivalent. For example, the
two trinets in Figure 1 both display the same set of binets, but they are not equivalent. Even so, we will show
in Theorem 4 that if two level-1 networks both display exactly the same collection of binets, then they must
have the same number of reticulation vertices (indegree-2 vertices). Note that the number of such vertices
corresponds to the number of reticulate evolutionary events, such as hybridization, that took place in the
evolutionary history of the species labelling the leaves of the network. Consequently, the binets displayed by
a network can at least capture a useful course-grained feature of the network in question.
In Sections 6 and 7, we consider some algorithmic questions concerning binets. As we have mentioned
above, it can be decided in polynomial time in |X| as to when a collection of binets with combined leaf-set
X is displayed by some level-1 network on X. However, we show that if we consider arbitrary binets (i.e. not
necessarily binary or level-1) then this decision problem becomes at least as hard as the graph-isomorphism
problem (see Theorem 5), one of the most famous problems whose complexity is still unknown. In addition,
in Section 7 we consider a related problem which, for a given collection of binary level-1 binets, asks for
a network which displays the maximum number of binets in this collection. This is closely related to the
maximum rooted triplet consistency problem for evolutionary trees [5]. We show that the binet problem is
NP-complete (Theorem 6), by giving a reduction from the feedback-arc set problem. However, we also show
that the problem is 1/3-approximable. In fact, given any collection of binary level-1 binets we can always
find some network that displays at least 1/3 of the binets (see Theorem 7). We conclude in Section 8 with
discussion of some possible future research directions, and a brief discussion of a potential application of our
results.
2 Preliminaries
Throughout this paper, X is a non-empty finite set (which usually represents a set of species or organisms).
2.1 Digraphs
A directed graph, or digraph for short, G = (V, E) consists of a finite set V = V (G) of vertices and a set
E = E(G) of arcs, where each arc is an ordered pair (u, v) of vertices in V in which u is said to be a parent
of v, denoted by u = p(v), and v a child of u. All digraphs studied here contain no loops, that is, vertices
that are children of themselves. The in-degree of vertex u is the number of vertices v in V such that (v, u) is
an arc, and the out-degree of u is the number of vertices w with (u, w) being an arc. A root is a vertex with
in-degree 0. A leaf is a vertex of out-degree 0 and the set of leaves is denoted by L(G). Any vertex in G that
is neither a root nor a leaf is referred to as an interior vertex. In addition, an interior vertex is a tree vertex if
it has in-degree 1, and a reticulation vertex if it has in-degree greater than 1.
A directed path or dipath in a digraph is a sequence u0 , u1 , . . . , uk (k ≥ 1) of vertices such that (ui−1 , ui )
is an arc for 1 ≤ i ≤ k. An acyclic digraph is a digraph that does not contain any directed path starting and
ending at the same vertex. If an acyclic digraph G contains a unique root, which is usually designated by
ρ = ρ(G), then it will be referred to as a rooted acyclic digraph.
An acyclic digraph G induces a canonical partial order ≺G on its vertex set V , that is, v ≺G u if there
exists a directed path from u to v. In this case, we shall say that v is below u. When the digraph G is clear
from the context, ≺G will be written as ≺. In addition, we write v u if u = v or u ≺ v. Given a subset U of
the vertex set of an acyclic digraph, we say that u ∈ U is a lowest vertex in U if there is no v ∈ U with v ≺ u.
Let G be the undirected graph obtained from digraph G by ignoring the direction of the arcs in G. Then G
is connected if G is connected, that is, there exists an undirected path between every pair of distinct vertices in
G. Note that a rooted acyclic digraph is necessarily connected (since each connected component of an acyclic
digraph has at least one root). A cut vertex is a vertex of G whose removal disconnects G. Similarly, a cut arc
is an arc of G whose removal disconnects G. A directed graph is biconnected if it contains no cut vertex, and a
biconnected component of G is a maximal biconnected subgraph, which is called trivial if it contains precisely
one arc (which is necessarily a cut arc), and non-trivial otherwise.
4
Leo van Iersel et al.
2.2 Phylogenetic networks
A phylogenetic network N on X is a rooted acyclic digraph whose leaves are bijectively labeled by the elements
in X and which does not contain any vertex with in-degree one and out-degree one. For simplicity, we will
just write L(N ) = X in case there is no confusion about the labeling. To simplify the argument, throughout
this paper we will also assume that all leaves in a phylogenetic network have in-degree one. In addition, a
phylogenetic network is binary if each tree vertex, as well as the root, has out-degree 2, and each reticulation
vertex has in-degree 2 and out-degree 1. Finally, we say a binary phylogenetic network is level -k (k ≥ 0) if
each of its biconnected components contains at most k reticulation vertices. To some extent, the concept of
the level of a phylogenetic network can be regarded as a measure of its ‘distance’ to being a phylogenetic tree.
In particular, a binary phylogenetic network is a phylogenetic tree if and only if it is level-0. A phylogenetic
network is called simple if it contains precisely one non-trivial biconnected component H and no cut arcs other
than the ones leaving H.
Two networks N1 = (V1 , E1 ) and N2 = (V2 , E2 ) on X are said to be isomorphic if there exists a bijection
f : V1 → V2 such that f (x) = x for all x ∈ X, and (u, v) is an arc in N1 if and only if (f (u), f (v)) is an arc
in N2 .
Finally, the cluster of a vertex u, denoted by CN (u) = C(u), is defined as the subset of X consisting of the
leaves below u. Here we will use the convention that C(u) = {u} if u is a leaf.
2.3 Stable ancestors and binets
Given a phylogenetic network N on X and a subset U ⊆ V (N ), a stable ancestor of U in N is a vertex v
in V (N ) \ U such that every path in N from the root to a vertex in U contains v. Note that for two stable
ancestors u and u0 of U , we have either u v or v u. Therefore, there exists a unique lowest vertex in the
set of stable ancestors of U , which will be referred to as the lowest stable ancestor of U in N and denoted by
lsaN (U ) = lsa(U ). Note that for a subset Y of X with |Y | ≥ 2, there exist two elements x and y in Y such
that lsa(Y ) = lsa({x, y}). For simplicity, we also write lsa({x, y}) as lsa(x, y).
The following property of lowest stable ancestors will be useful.
Lemma 1 Suppose that u and v are two vertices in a phylogenetic network such that u ≺ v ≺ lsa(u), then
we have lsa(v) lsa(u).
Proof Since u ≺ v, we know that there exists a dipath P from ρ to u that contains v. By the definition of
lowest stable ancestor, we know that lsa(u) and lsa(v) are contained in P . Hence, either lsa(v) lsa(u) or
lsa(u) ≺ lsa(v). If lsa(u) ≺ lsa(v), then we have v ≺ lsa(u) ≺ lsa(v). Then there exists a dipath P 0 from
ρ to v that does not contain lsa(u) (otherwise lsa(u) would be a stable ancestor of v that is below lsa(v)).
Using that u ≺ v ≺ lsa(u), it follows that there exists a dipath from ρ to u that does not contain lsa(u), a
contradiction. Therefore, lsa(v) lsa(u).
t
u
For Y ⊆ X, the subnet of N on Y , denoted by N |Y , is defined as the subgraph obtained from N by deleting
all vertices that are not on any path from lsa(Y ) to elements in Y and subsequently suppressing all in-degree
1 and out-degree 1 vertices and parallel arcs until no such vertices or arcs exist. A network N 0 is said to be
displayed by network N if N 0 = N |Y for some Y ⊆ X.
Note that, by definition, N |X = N if and only if lsa(X) = ρ(N ). In this case, N is referred to as a
recoverable network. Note that every subnet of N is necessarily recoverable. Moreover, a collection of subnets
is displayed by some network if and only if it is displayed by some recoverable network. Therefore, we assume
all networks in this paper to be recoverable.
A binet is a phylogenetic network with precisely two leaves, while a trinet is a phylogenetic network with
precisely three leaves. Let
B(N ) = {N |Y : Y ⊆ X and |Y | = 2}
be the collection of binets displayed by N . Note that there are precisely three binary level-1 binets on a set
{x, y}, and they can be grouped into two types: the “tree type”, T (x, y), and the “reticulate type” R(x; y)
and R(y; x) (see Figure 2). A collection of binets B on X is a collection of binets such that the union of the
leaf-sets of the binets is equal to X.
Binets: fundamental building blocks for phylogenetic networks
x
y
T (x, y)
x
y
y
R(x; y)
5
x
y
R(y; x)
x
level-2
Fig. 2: The three binary level-1 binets on {x, y} and an example of a level-2 binet.
ρ
lsa(v)
x
r
v
y
p
q
Fig. 3: Example for the proof of Theorem 1. The lowest stable ancestor of v is not equal to the root ρ. An
undirected path Pu between ρ and lsa(v) that does not contain the incoming arc of lsa(v) is indicated in
bold. Path Pu contains one alternating vertex r, for which the lowest stable ancestor is indeed equal to ρ.
3 A structure theorem
In this section we present a key result (Corollary 1) concerning the structure of the non-trivial biconnected
component of a simple network. Note that a similar result has been obtained for a special collection of (nonbinary) phylogenetic networks in [13].
Let G be a directed acyclic graph and let P = v0 , v1 , . . . , vt be an undirected path in the underlying
undirected graph G, then a vertex vi (with 1 ≤ i ≤ t − 1) is called alternating (with respect to P ) if we have
either {(vi−1 , vi ), (vi+1 , vi )} ⊆ E(G) or {(vi , vi−1 ), (vi , vi+1 )} ⊆ E(G). The number of alternating vertices
contained in P is denoted by alt(P ). Using this concept, we now prove the following theorem. See Figure 3
for an example.
Theorem 1 Let N be a binary phylogenetic network on X whose root ρ is in some non-trivial biconnected
component H. Then there exists a lowest vertex in H with lsa(v) = ρ.
Proof Let Γ0 (H) be the set of reticulation vertices v in H for which the distance (length of a shortest directed
path) between ρ and lsa(v) is minimum over all reticulation vertices in H. Note that Γ0 (H) 6= ∅.
We first show that lsa(v) = ρ for all v ∈ Γ0 (H). Suppose this were not the case. Then there exists a vertex
v ∈ Γ0 (H) such that lsa(v) ≺ ρ. Note that lsa(v) necessarily has outdegree 2 and therefore has indegree 1
since N is binary and lsa(v) 6= ρ. Denote the parent of lsa(v) by v ∗ . Since H is biconnected, there exists
some undirected path from ρ to lsa(v) that does not contain the edge e = {lsa(v), v ∗ }. Let Pu = v0 , . . . , vt ,
where v0 = ρ and vt = lsa(v), be such an undirected path for which alt(Pu ) is minimum.
We claim that alt(Pu ) = 1. To see this, note first that since v0 = ρ, vt = lsa(v) and vt−1 6= v ∗ , we know
that (v0 , v1 ) and (vt , vt−1 ) are arcs of N . Hence, alt(Pu ) is odd and strictly positive. Assume for the sake
of contradiction that alt(Pu ) 6= 1, then we have alt(Pu ) ≥ 3. Let vk (1 < k < t) be the second alternating
vertex contained in Pu (when travelling from v0 to vt ).
Now fix a directed path Pd in N from ρ to vk .
If the arc (v ∗ , lsa(v)) is not contained in Pd , then, we can find an undirected path from ρ to lsa(v)
that does not contain e and has fewer alternating vertices than Pu by following Pd until we reach a vertex
in {vk , . . . , vt } and then following Pu to lsa(v). This gives a contradiction.
Now assume that the arc (v ∗ , lsa(v)) is contained in Pd . Then we can find an undirected path from ρ
to lsa(v) that does not contain e and has only one alternating vertex as follows. Follow Pu up to vk and then
follow Pd backward from vk to lsa(v). Since this path has fewer alternating vertices than Pu , we again obtain
a contradiction.
We have thus shown that alt(Pu ) = 1. Denoting this alternating vertex in Pu by r, then r is necessarily
a reticulation by the choice of Pu . Hence, Pu consists of two directed paths: a directed path from ρ to r that
does not contain lsa(v) and a directed path from lsa(v) to r. However, this means that lsa(v) ≺ lsa(r), a
contradiction to the assumption that v ∈ Γ0 (H).
6
Leo van Iersel et al.
Hence, we know that Γ0 (H) is the set of reticulation vertices v of H such that lsa(v) = ρ and that Γ0 (H)
is not empty.
Now fix a vertex v in Γ0 (H) that is lowest over all vertices of Γ0 (H), that is, there does not exist a vertex
u in Γ0 (H) such that v ≺ u. It remains to show that v is lowest over all vertices of H. Assume that this is
not the case. Then the child c of v is also in H. If c were a reticulation then, by Lemma 1, lsa(v) lsa(c).
However, this would imply that lsa(c) = ρ, contradicting the choice of v. Hence, c is a tree vertex.
Since H is biconnected, there exists some undirected path from ρ to c that does not contain v. Let Pu =
w0 , . . . , wt be such a path such that alt(Pu ) is minimum. Note that we have w0 = ρ and wt = c.
Since c is a tree vertex and Pu does not contain its parent v, (wt , wt−1 ) is an arc of N . Together with
(w0 , w1 ) being an arc in N , we know that alt(Pu ) is odd and strictly positive. We now show, using a similar
proof as above, that alt(Pu ) = 1. If this were not the case, then we would have alt(Pu ) ≥ 3. Let wk
(1 < k < t) be the second alternating vertex contained in Pu . We know that (wk , wk−1 ) and (wk , wk+1 ) are
two arcs contained in N . Now fix a directed path Pd in N from ρ to wk .
If the vertex v is not contained in Pd , then we can find an undirected path from ρ to c that does not contain
v and has fewer alternating vertices than Pu by following Pd from ρ it reaches a vertex from {wk , . . . , wt } and
then following Pu up to c. If v is contained in Pd , then we follow Pu from ρ to wk and then follow Pd from wk
to c and obtain an undirected path from ρ to c that does not contain v and has one alternating vertices, which
is less than the number of alternating vertices in Pu . In either case, we obtain a contradiction.
We have thus shown that alt(Pu ) = 1. Denoting this alternating vertex in Pu by r, then r is necessarily
a reticulation by the choice of Pu . Hence, Pu consists of two directed paths: a directed path from ρ to r
that does not contain v and a directed path from c to r. However, this means that v ≺ lsa(r), and hence
lsa(v) lsa(r) in view of Lemma 1. This implies that r ∈ Γ0 (H), a contradiction to the assumption that v
is lowest among Γ0 (H).
t
u
The following is a direct consequence of the above theorem.
Corollary 1 Suppose that N is a simple binary phylogenetic network. Let H be the unique non-trivial biconnected component of N . Then there exists a lowest vertex v of H such that there exist two arc-disjoint directed
paths from the root of N to v.
4 Displaying binets by binary networks
A collection of binary level-1 binets is compatible if there exists some binary network that displays all binets
from the collection. In this section, we study the compatibility of binets. Our main result in this section
(Theorem 3) shows that when studying the compatibility of binets, we can restrict to binary level-1 networks.
We will restrict ourselves throughout this section to thin collections of binets, i.e. collections containing at
most one binet on x and y for all distinct x, y ∈ X. Clearly, any collection of binets that is not thin is not
compatible.
First, we need some new definitions. Given a digraph G, a sink set of G is a proper subset U ⊂ V (G) such
that there is no arc leaving U , that is, there exists no arc (x, y) with x ∈ U and y ∈ V (G) \ U . A bipartition
(or split) of V (G) into nonempty sets A and B, denoted A|B, is called
– Type I if both A and B are sink sets (i.e. there is no arc from any element in A to any element in B or
vice versa);
– Type II if either A or B (but not both) is a sink set; and
– Type III if for all x ∈ A, y ∈ B (x, y) is an arc in G if and only if (y, x) is an arc in G.
We say that A|B is a typed split of G if it is a split of Type I, II or III.
For a collection B of binary level-1 binets on X, we introduce the digraph D(B) with vertex set X and
(x, y) being an arc in D(B) if T (x, y) ∈ B or R(x; y) ∈ B. See Figure 4 for an example.
The following two lemmas show important properties of typed splits that will be used to establish Theorems 2 and 3.
Lemma 2 Suppose that B and B 0 are two thin collections of binary level-1 binets on X with B ⊆ B 0 . Then
each typed split of D(B 0 ) is a typed split of D(B).
Proof Suppose that A|B is a typed split of D(B 0 ). If A|B is of Type I in D(B 0 ), then it is of Type I in D(B)
since D(B) is a subgraph of D(B 0 ). Similarly, if A|B is of Type II in D(B 0 ), then it is of Type I or II in D(B).
If A|B is of Type III in D(B 0 ) then (since B 0 is thin) any binet on x and y with x ∈ A and y ∈ B is T (x, y).
Therefore, A|B is of Type I or III in D(B).
t
u
Binets: fundamental building blocks for phylogenetic networks
Binets: fundamental building blocks for phylogenetic networks
x4
x4
x1
x2
7
7
x6
x3
x1
x5
x5
x2
x3
x6
D(B)
N
Fig.
Fig. 4:
4: A
A digraph
digraph D(B)
D(B) representing
representing the
the set
set of
of binets
binets B
B=
= {T
{T(x
(x44,, xx33),
), R(x
R(x44;; xx11),
), R(x
R(x44;; xx22),
), TT(x
(x55,, xx11),
), R(x
R(x55;; xx22),
),
R(x
R(x55;; xx33),
), TT(x
(x66,, xx22),
), R(x
R(x66;; xx11),
), R(x
R(x66;; xx33)}
)} and
and aa network
network N
N displaying
displaying B.
B. The
The direction
direction of
of the
the arcs
arcs in
in N
N is
is
downward,
downward, and
and omitted.
omitted.
Lemma
Lemma 33 Suppose
Suppose that
that B
B is
is aa thin
thin collection
collection of
of binary
binary level-1
level-1 binets
binets on
on X.
X. If
If B
B is
is displayed
displayed by
by aa binary
binary
network,
then
D(B)
has
a
typed
split.
network, then D(B) has a typed split.
Proof
Proof Suppose
Suppose that
that B
B is
is displayed
displayed by
by aa binary
binary network.
network. Then
Then B
B is
is displayed
displayed by
by aa binary
binary recoverable
recoverable network
network N
N..
Let
Let B
B00 be
be the
the set
set of
of binary
binary level-1
level-1 binets
binets contained
contained in
in B(N
B(N).
). Then
Then we
we have
have B
B✓
⊆B
B00 ✓
⊆ B(N
B(N).
). By
By Lemma
Lemma 2,
2, it
it
suffices
suffices to
to show
show that
that D(B
D(B00)) has
has aa typed
typed split.
split.
Consider
Consider the
the root
root ⇢ρ of
of N
N,, which
which is
is equal
equal to
to lsa(X)
lsa(X) since
since N
N is
is recoverable.
recoverable. Denote
Denote the
the two
two children
children of
of ⇢ρ
by
by uu11 and
and uu22.. We
We consider
consider two
two cases.
cases.
The
The first
first case
case is
is that
that at
at least
least one
one arc
arc incident
incident with
with ⇢ρ is
is aa cut
cut arc.
arc. Then
Then the
the other
other arc
arc incident
incident with
with ⇢ρ is
is
also
also aa cut
cut arc.
arc. Then
Then let
let A
A=
= C(u
C(u11)) and
and B
B=
= C(u
C(u22).
). Note
Note that
that A|B
A|B is
is aa split
split because
because neither
neither A
A nor
nor B
B is
is empty.
empty.
In
In addition,
addition, for
for all
all xx 2
∈ A,
A, yy 2
∈B
B we
we have
have N
N||{x,y}
= TT(x,
(x, y)
y) and
and hence
hence A|B
A|B is
is aa Type
Type III
III split
split with
with respect
respect to
to
{x,y} =
D(B
D(B00).
).
In
In the
the second
second case,
case, both
both arcs
arcs incident
incident with
with ⇢ρ are
are not
not cut
cut arcs.
arcs. Hence,
Hence, the
the root
root ⇢ρ is
is contained
contained in
in aa non-trivial
non-trivial
biconnected
component
H
containing
u
and
u
.
By
Corollary
1,
there
exists
a
lowest
vertex
v
biconnected component H containing u11 and u22 . By Corollary 1, there exists a lowest vertex v in
in H
H with
with two
two
arc-disjoint
paths
P
,
P
from
⇢
to
v.
Since
v
is
a
lowest
vertex
in
H,
we
know
that
v
is
a
reticulation
arc-disjoint paths P11 , P22 from ρ to v. Since v is a lowest vertex in H, we know that v is a reticulation vertex
vertex
and
and the
the arc
arc leaving
leaving vv is
is aa cut
cut arc.
arc. Let
Let B
B=
= C(v)
C(v) and
and A
A=
=X
X \\ B.
B. Then
Then B
B is
is clearly
clearly nonempty.
nonempty. In
In addition,
addition,
A
A is
is nonempty,
nonempty, as
as otherwise
otherwise lsa(X)
lsa(X) v,
v, aa contradiction
contradiction to
to the
the fact
fact that
that lsa(X)
lsa(X) =
= ⇢ρ (as
(as N
N is
is recoverable).
recoverable).
Therefore,
Therefore, A|B
A|B is
is aa split.
split.
Consider xx 2
∈A
A and
and yy 2
∈B
B and
and the
the subnetwork
subnetwork N
N||{x,y}
There is
is at
at least
least one
one directed
directed path
path from
from ⇢ρ to
to x,
x,
Consider
{x,y}.. There
and each
each such
such path
path contains
contains at
at least
least one
one arc
arc of
of P
P11 or
or P
P22.. Hence,
Hence, in
in the
the process
process of
of obtaining
obtaining N
N||{x,y}
from N
N,,
and
{x,y} from
the paths
paths P
P11,, P
P22 do
do not
not become
become parallel
parallel arcs.
arcs. Therefore,
Therefore, N
N||{x,y}
contains two
two arc-disjoint
arc-disjoint paths
paths from
from ⇢ρ to
to vv
the
{x,y} contains
and we
we can
can conclude
conclude that
that N
N||{x,y}
6= TT(x,
(x, y).
y). Therefore,
Therefore, ifif N
N||{x,y}
∈B
B⇤∗,, that
that is,
is, N
N||{x,y}
is level-1,
level-1, then
then
and
{x,y} is
{x,y} 6=
{x,y} 2
N||{x,y}
= R(x;
R(x; y).
y). This
This implies
implies that
that there
there is
is no
no arc
arc (y,
(y, x).
x). Therefore,
Therefore, A|B
A|B is
is aa Type
Type II or
or Type
Type II
II split
split of
of
N
{x,y} =
D(B⇤∗).
).
t
u
D(B
t
u
Note that
that the
the condition
condition that
that B
B is
is displayed
displayed by
by aa binary
binary network
network in
in the
the above
above lemma
lemma can
can not
not be
be weakened
weakened
Note
to that
that B
B is
is displayed
displayed by
by aa network.
network. For
For example,
example, consider
consider the
the binet
binet collection
collection B
B and
and network
network N
N in
in Figure
Figure 4.
4.
to
Although network
network N
N displays
displays B,
B, digraph
digraph D(B)
D(B) has
has no
no typed
typed split
split (as
(as can
can be
be easily
easily checked).
checked).
Although
We now
now introduce
introduce two
two operations,
operations, which
which can
can be
be used
used to
to combine
combine two
two phylogenetic
phylogenetic networks
networks into
into aa new
new
We
one.
Suppose
that
N
and
N
are
two
phylogenetic
networks
with
disjoint
leaf
sets.
Let
T
(N
,
N
)
be
the
one. Suppose that N11 and N22 are two phylogenetic networks with disjoint leaf sets. Let T (N11, N22) be the
phylogenetic
network
obtained
from
N
and
N
by
adding
a
new
vertex
v
and
two
arcs
from
v
to
the
roots
of
N11
phylogenetic network obtained from N11 and N22 by adding a new vertex v and two arcs from v to the roots of N
and
N
.
In
addition,
the
network
R(N
;
N
)
is
obtained
by
taking
a
binet
R(y
;
y
),
with
y
,
y
∈
/
L(N
)∪L(N
),
and N22. In addition, the network R(N11; N22) is obtained by taking a binet R(y11; y22), with y11, y22 2
/ L(N11)[L(N22),
and
replacing
y
by
the
root
of
N
,
for
i
=
1,
2.
See
Figure
5
for
examples.
and replacing yii by the root of Nii, for i = 1, 2. See Figure 5 for examples.
For aa binet
binet set
set B
B on
on X
X and
and aa subset
subset A
A✓
⊆ X,
X, we
we define
define
For
B|AA =
= {S
{S 2
∈B
B :: L(S)
L(S) ✓
⊆ A}.
A}.
B|
The next
next theorem
theorem can
can be
be used
used to
to determine
determine in
in polynomial
polynomial time
time whether
whether aa collection
collection of
of binary
binary level-1
level-1 binets
binets
The
is
displayed
by
some
binary
level-1
network.
See
Section
6
for
more
details.
is displayed by some binary level-1 network. See Section 6 for more details.
8
Leo van Iersel et al.
x
x
p
p
y
q
y
q
R(R(x; y); R(p; q))
T (R(x; y), R(p; q))
Fig. 5: Examples of two networks built recursively by using the operations introduced in the text.
Theorem 2 Suppose that B is a thin collection of binary level-1 binets on X. If there exists a typed split A|B
of D(B) such that B|A and B|B are both displayed by some binary level-1 network, then B is displayed by a
binary level-1 network. Moreover, if B is displayed by a binary level-1 network, then there exists at least one
typed split of D(B) and, for each typed split A|B of D(B), B|A and B|B are both displayed by some binary
level-1 network.
Proof First suppose that there exists a typed split A|B of D(B) such that B|A and B|B are displayed by binary
level-1 networks NA and NB , respectively.
If A|B is a Type I or Type III split of D(B), then consider the network N = T (NA , NB ). Then N is a
binary level-1 phylogenetic network on X and
B ⊆ {T (x, y) : x ∈ A, y ∈ B} ∪ B(NA ) ∪ B(NB ) = B(N ),
and so B is displayed by N .
If A|B is a Type II split of D(B), then without loss of generality we may assume that B is a sink set in
D(B). Now consider the network N = R(NA ; NB ). Then N is a binary level-1 phylogenetic network on X and
B ⊆ {R(x; y) : x ∈ A, y ∈ B} ∪ B(NA ) ∪ B(NB ) = B(N ),
and so B is displayed by N .
Now suppose that B is displayed by a binary level-1 network N . By Lemma 3, there exists a typed split
A|B of D(B). Then B|A ⊆ B(N |A ) and B|B ⊆ B(N |B ).
t
u
We now prove the main result of this section.
Theorem 3 Suppose that B is a thin collection of binary level-1 binets on X. Then B is displayed by a binary
level-1 network if and only if it is displayed by a binary network.
Proof Suppose that B is displayed by a binary network. We claim that B is also displayed by a binary level-1
network. We shall establish this claim by induction on |X|.
If |X| = 2, then B contains at most one binet, which has leaf set X. Therefore we know that B is displayed
by a binary level-1 network.
Now assume that |X| > 2, and the claim holds for all sets X 0 with 2 ≤ |X 0 | < |X|. Let N be a binary
network on X with B ⊆ B(N ). By Lemma 3, there exists a typed split A|B of D(B). Note that B|A ⊆ B(N |A )
and B|B ⊆ B(N |B ). Therefore, by induction, each of B|A and B|B is displayed by a binary level-1 network. By
Theorem 2, it follows that B is displayed by a binary level-1 network.
t
u
5 Binets determine the number of reticulations of a binary level-1 network
In this section we show that, that although the collection of binets displayed by a level-1 network does not
necessarily determine the network (see Figure 1), it does in fact determine the number of reticulations in the
network. We begin by showing that it suffices to consider level-1 networks in which all cycles (in the underlying
undirected graph) have length 3.
First, we introduce some further notation. A semi-cycle C of an acyclic directed graph is the union of two
non-identical, internally-vertex-disjoint, directed paths from s to t, with s = s(C) and t = t(C) two distinct
vertices that are referred to as the source and terminal of C, respectively. The length of a semi-cycle is the
number of distinct vertices that it contains.
We now show that we may restrict to networks in which all semi-cycles have length 3.
Binets: fundamental building blocks for phylogenetic networks
9
Ai
Ai
vi
Bi
Ai
vi
x
Bi
(a) The parent of x is not in a semicycle.
vi
x
Bi
(b) The parent of x is the terminal of
a semi-cycle.
x
(c) The parent of x is a non-terminal
non-source vertex of a semi-cycle.
Fig. 6: The three cases for the location of x in each of the networks N1 and N2 in the proof of Theorem 4.
A1
v1
v2
x
B1
N1
A2
v1
x
B2
A1
N2
(a) Case 1: the parent of x is not in
a semi-cycle in N1 but is the terminal of a semi-cycle in N2 .
v2
x
B1
N1
A2
x
B2
N2
(b) Case 2: the parent of x is not
in a semi-cycle in N1 but is the
non-terminal non-source vertex of
a semi-cycle in N2 .
Fig. 7: The two possible ways to add leaf x to N10 and N20 in the proof of Theorem 4 such that the obtained
networks N1 and N2 have different numbers of reticulation vertices.
Lemma 4 If N is a binary level-1 network, then there exists a binary level-1 network N 0 in which every semicycle has length 3, such that B(N 0 ) = B(N ) and N and N 0 have the same number of reticulation vertices.
Proof Consider a semi-cycle of N with source s and terminal t and length at least 4. Let (u1 , v1 ), . . . ,(uk , vk ),
(t, w) be the arcs leaving the semi-cycle. Then k ≥ 2. Let N ∗ be a network obtained from a binary tree
on {v1 , . . . , vk } by replacing vi by the subgraph of N rooted at vi , for i = 1, . . . , k. Let Nw be the subgraph
of N rooted at w. Then we construct N 0 from N by replacing the subgraph of N rooted at s by the network R(N ∗ ; Nw ). It is straightforward to see that N 0 is a binary level-1 network with the required properties.
t
u
We now establish the main result of this section.
Theorem 4 If N1 and N2 are rooted binary level-1 phylogenetic networks on X with B(N1 ) = B(N2 ) then N1
and N2 have the same number of reticulation vertices.
Proof The proof is by induction on the number of leaves |X|. The induction basis for |X| = 2 is clear. Now
suppose that N1 and N2 are two non-isomorphic rooted binary level-1 phylogenetic networks on |X| ≥ 3 with
B(N1 ) = B(N2 ) but with different numbers of reticulation vertices. We add an outdegree-1 root to each of N1
and N2 with an arc to the original root. By Lemma 4, we may assume that all semi-cycles in N1 and N2 have
length 3.
Choose an arbitrary leaf x ∈ X and let X 0 = X \ {x}. Let N10 and N20 be the networks obtained from N1 |X 0
and N2 |X 0 , respectively, by adding an outdegree-1 root with an arc to the original root. Then N10 and N20 have
the same number of reticulation vertices by induction.
Since all semi-cycles in N1 and N2 are assumed to have length 3, there are three cases for the location of x
in each of the networks N1 , N2 , illustrated in Figure 6.
If the parent of x is in a semi-cycle in Ni , let vi be the source of this semi-cycle, and let vi be the parent
of x otherwise. Let Bi := C(vi ) \ {x} and Ai := X 0 \ Bi (recall that C(vi ) denotes the cluster of vi ).
We now consider the different ways in which we could add x to both networks. Since N1 and N2 have
different numbers of reticulation vertices, there are two cases to consider (after eliminating symmetric cases),
as illustrated in Figure 7.
The first case is that the parent of x is not in a semi-cycle in N1 but is the terminal of a semi-cycle in N2 .
First suppose that B1 ∩ B2 6= ∅. Then choose an arbitrary vertex y ∈ B1 ∩ B2 . Then N1 |{x,y} = T (x, y)
10
Leo van Iersel et al.
while N2 |{x,y} = R(y; x), a contradiction. Hence, we may assume that B1 ∩ B2 = ∅. Then B1 = A2 and
B2 = A1 . Clearly, B1 , B2 6= ∅. Take y ∈ B1 = A2 and z ∈ B2 = A1 . Then N1 |{x,y} = T (x, y) and hence
N2 |{x,y} = T (x, y), from which we can deduce that N2 |{z,y} = T (z, y). In addition, N2 |{z,x} = R(z; x) and
hence N1 |{z,x} = R(z; x), from which we can deduce that N1 |{z,y} = R(z; y). This leads to a contradiction
since N2 |{z,y} = T (z, y).
The second case is that the parent of x is not in a semi-cycle in N1 but is the non-terminal non-source
vertex of a semi-cycle in N2 . First suppose that B1 ∩ B2 6= ∅. Then choose an arbitrary vertex y ∈ B1 ∩ B2 .
Then N1 |{x,y} = T (x, y) while N2 |{x,y} = R(x; y), a contradiction. Hence, we may assume that B1 ∩ B2 = ∅.
Then, as in the previous case, B1 = A2 6= ∅ and A1 = B2 6= ∅. Take y ∈ B1 = A2 and z ∈ B2 = A1 . Then,
similar to the previous case, N1 |{x,y} = T (x, y) and hence N2 |{x,y} = T (x, y), from which we can deduce that
N2 |{z,y} = T (z, y). In addition, N2 |{z,x} = R(x; z) and hence N1 |{z,x} = R(x; z), from which we can deduce
that N1 |{z,y} = R(y; z). This again leads to a contradiction since N2 |{z,y} = T (z, y).
t
u
6 Complexity of Binet Compatibility
A direct consequence of Theorem 2 is that there exists a simple polynomial-time algorithm to decide whether
there exists a binary level-1 network displaying a given collection B of binary level-1 binets (see [11] for
a related algorithm). In particular, a sink set of D(B) can be found in polynomial-time by computing the
strongly connected components of D(B) [17] and checking for each of them whether it is a sink set. This can
be used to find a typed split, if it exists. If such a split does not exist, then B is not compatible. Otherwise,
we can try to construct networks for B|A and B|B recursively, and combine them as described in the proof of
Theorem 2. This algorithm is similar to the Aho algorithm for deciding whether a set of rooted trees can be
displayed by some rooted tree [1].
From Theorem 3, it now follows that the following problem can also be solved in polynomial time.
Binet Compatibility (BC)
Input: a set B of binary level-1 binets.
Question: is B compatible, i.e., does there exist a binary network N with B ⊆ B(N )?
We show now that the assumption that all binets in B are binary and level-1 is essential. Indeed, for general
binets, the compatibility problem is at least as hard as the well-known graph isomorphism problem (GI) [8,
18], which is not known to be solvable in polynomial time. This is even true when the given binet set is thin
(contains at most one binet for each pair of leaves).
Theorem 5 Deciding whether there exists a phylogenetic network displaying a given thin set B of binets is
GI-hard.
Proof We reduce from DAG-isomorphism, which is known to be GI-complete [18]. Let G1 , G2 be two directed acyclic graphs, which form an instance of the DAG-isomorphism problem. For i = 1, 2, we add vertices ρi , ui , vi , wi , ri , a new leaf labelled x, an arc from wi to each indegree-0 vertex of Gi and from each
outdegree-0 vertex of Gi to ri and arcs (ρi , ui ), (ui , vi ), (ρi , vi ), (vi , wi ) and (ri , x). In G1 , we add a new leaf
labelled y and an arc (u1 , y). In G2 , we add a new leaf labelled z and an arc (u2 , z). We have thus transformed G1 into a binet B1 and G2 into a binet B2 . The third binet is B3 = T (y, z). See Figure 8 for an
illustration.
We claim that G1 and G2 are isomorphic if and only if there exists a network displaying B1 , B2 and B3 .
First assume that G1 and G2 are isomorphic. Then we can construct a network displaying B1 , B2 and B3
as follows. Take B1 and subdivide the arc (u1 , y) by a new vertex u01 and add leaf z with an arc (u01 , z). The
obtained network clearly displays B1 and B3 and it also displays B2 since G1 and G2 are isomorphic.
Now assume that there exists some network N displaying B1 , B2 and B3 . Then N |{x,y} = B1 . Hence, N
contains a cycle (in the underlying undirected graph) containing a reticulation v, such that x and the image
of G1 are below the arc leaving v, while y is below some other arc leaving the cycle. Since N |{y,z} = T (y, z),
leaf z is not below v in N . Therefore, deleting v, x and the parent of x from the subgraph of N rooted at v
gives G1 .
Similarly, N contains a cycle containing a reticulation v 0 , such that x and the image of G2 are below the
arc leaving v 0 , while z is below some other arc leaving the cycle. Since N |{y,z} = T (y, z), leaf y is not below v 0
in N . Therefore, deleting v 0 , x and the parent of x from the subgraph of N rooted at v 0 gives G2 .
Moreover, v = v 0 since N |{y,z} = T (y, z). Hence, G1 and G2 are isomorphic.
t
u
Binets: fundamental building blocks for phylogenetic networks
y
11
z
z
G1
y
z
y
G1
G2
B3
x
x
x
B1
B2
N
Fig. 8: The three binets constructed in the proof of Theorem 5, and a network N that displays all three binets
if the digraphs G1 and G2 are isomorphic.
7 Maximum Binet Compatibility
If a collection of binets is not compatible, the question arises whether it is possible to find a largest compatible
subset of the binets, in polynomial time. Here we show that this is unlikely to be the case. The decision version
of this problem is defined as follows.
Maximum Binet Compatibility (MBC)
Input: a set B of binary level-1 binets and an integer k.
Question: does there exist a compatible subset B 0 of B with |B 0 | ≥ k?
We now establish the complexity of this problem (see Theorem 6). Recall from Section 5 that s(C) and t(C)
denote the source and terminal of a semi-cycle C, respectively.
Lemma 5 If the binet R(x; y) is displayed by a binary level-1 network N , then lsa(x, y) is the source of a
semi-cycle C in N . In addition, y is below t(C) and x is not below t(C).
Proof Let u = lsa(x, y). Note that u is not a reticulation vertex, as otherwise the child of u would be a stable
ancestor of x and y that is below u. Hence, u has two children, denoted by u1 and u2 .
Observe that neither (u, u1 ) nor (u, u2 ) is a cut arc, since otherwise we would have N |{x,y} = T (x, y), while
by the assumption of the lemma N |{x,y} = R(x; y). Hence, u is the source of a semi-cycle C. Let v := t(C) be
the terminal of C. If neither x nor y is below v, then N |{x,y} = T (x, y), a contradiction. If both x and y are
below v, then v is a stable ancestor of x and y, a contradiction to lsa(x, y) = u. Therefore, precisely one of x
and y is below v. If x is below v and y is not, then N |{x,y} = R(y; x), a contradiction. Therefore, y is below v
and x is not.
t
u
In view of the last lemma, for each binet R(x; y) = N |{x,y} , there exists a unique semi-cycle CN (x; y)
containing lsa(x, y).
Lemma 6 If the two binets R(x; y) and R(y; z) are both displayed by a binary level-1 network N , then
s(CN (y; z)) ≺ t(CN (x; y)).
Proof Let C1 = CN (x; y) and C2 = CN (y; z). By Lemma 5, y ≺ t(C1 ) but y is not below t(C2 ), from which
we know that C1 6= C2 . Since s(C1 ) and s(C2 ) are stable ancestors of y in view of Lemma 5, we have either
s(C1 ) ≺ s(C2 ) or s(C2 ) ≺ s(C1 ) but not both.
Note that if s(C1 ) ≺ s(C2 ), then s(C1 ) ≺ t(C2 ) and hence y ≺ s(C1 ) ≺ t(C2 ), a contradiction. Thus
s(C2 ) ≺ s(C1 ), from which it follows that s(C2 ) ≺ t(C1 ).
t
u
Given a digraph G, let R(G) be the collection of binets {R(x; y) | (x, y) ∈ E(G)} induced by G. Note that
R(G) is a binet set on V (G), i.e., the leaves of the binets in R(G) correspond to the vertices of G.
Proposition 1 Let G be a digraph. Then G is acyclic if and only if R(G) is compatible.
12
Leo van Iersel et al.
xn
xn−1
xn−2
x1
Fig. 9: A level-1 network N∗ on X = {x1 , . . . , xn }.
Proof Let n = |X|, with X the vertex set of G. Suppose first that G is acyclic, then there exists a topological
sorting of G, that is, the vertices of G can be ordered as x1 , . . . , xn so that (xi , xj ) ∈ E(G) implies i < j.
Hence, the network N∗ in Figure 9 displays R(G) since N∗ displays each binet R(xi ; xj ) with i < j.
Conversely, suppose that R(G) is compatible. By Theorem 3, there exists a binary level-1 network N with
R(G) ⊆ B(N ). It remains to show that G is acyclic. If not, then there exists a directed cycle (x1 , x2 , . . . , xm )
for some m ≥ 3. Denote xm+1 = x1 . In view of Lemma 5, let Ci = CN (xi ; xi+1 ) be the semi-cycle in N
containing lsa(xi , xi+1 ) for 1 ≤ i ≤ m. Then Lemma 5 implies x1 ≺ s(Cm ) and that x1 is not below t(C1 ).
On the other hand, by Lemma 6 we have
s(Cm ) ≺ t(Cm−1 ) ≺ s(Cm−1 ) ≺ . . . ≺ s(C2 ) ≺ t(C1 ).
Together with x1 ≺ s(Cm ), it follows that x1 ≺ t(C1 ), a contradiction.
t
u
A set of binets B on X is said to be dense if for each pair of distinct elements x and y in X, there exists
precisely one binet on {x, y} in B. Hence, a dense set of binets is always thin.
Theorem 6 The problem MBC is NP-complete, even if the given set of binets is dense.
Proof We reduce from the NP-hard problem Feedback Arc Set in Tournaments (FAST) [2, 6], which is defined
as follows. Given a tournament, i.e. a digraph G = (V, E) with either (a, b) ∈ E or (b, a) ∈ E (but not both)
for each pair of distinct elements a and b in V , and given a positive integer k 0 , does there exist a subset F ⊆ E
of at most k 0 arcs whose removal makes G acyclic. If such an arc set exists, then we call it a feedback arc set
of G.
The reduction is as follows. For each instance (G, k 0 ) of FAST, consider the corresponding instance (R(G), k)
of MBC with k = |R(G)| − k 0 . Since the set R(G) of binets induced by G can be constructed in polynomial
time, it suffices to show that G contains a feedback arc set with size at most k 0 if and only if there exists a
compatible subset of R(G) of size at least k.
First assume that there exists a feedback arc set E 0 of G with size at most k 0 . That is, |E 0 | ≤ k 0 , and the
digraph G∗ obtained from G by deleting the arcs in E 0 is acyclic. Consider the set of binets B 0 = {R(x; y) :
(x, y) ∈ E \ E 0 }. This set contains at least k binets. In addition, since B 0 = R(G∗ ), it follows by Proposition 1
that B 0 is compatible.
Now assume that there exists a compatible binet set B 0 ⊆ R(G) with |B 0 | ≥ k. Consider the set E 0 =
{(x, y) : R(x, y) ∈ R(G) \ B 0 } of arcs of G. Then by Proposition 1, it follows that E 0 is a feedback arc set.
Moreover, |E 0 | ≤ k 0 , which completes the proof.
t
u
We complete the section by showing that there exists a polynomial time 1/3-approximation algorithm for
the MBC problem, which follows directly from the next theorem and its proof.
Theorem 7 Suppose that B is a set of binary level-1 binets on X. Then there exists a binary level-1 network
N such that |B(N ) ∩ B| ≥ |B|/3.
Proof If at least a third of the binets in B are tree type, then take N to be any binary tree on X and we are
done. Hence we may assume that at least two thirds of the binets are reticulate type.
Impose an arbitrary ordering on the elements in X, that is, write X = {x1 , . . . , xn }. Let B1 = B ∩
{R(xi ; xj ) : 1 ≤ i < j ≤ n} and B2 = B ∩ {R(xj ; xi ) : 1 ≤ i < j ≤ n}. Without loss of generality, we may
Binets: fundamental building blocks for phylogenetic networks
13
assume that |B1 | ≥ |B2 | (as the other case can be established in a similar way). Since at least two thirds of
the binets are reticulate type, and each of those is contained in either B1 or B2 (but not both), we know that
|B1 | ≥ |B|/3. Now consider the network N∗ in Figure 9, then clearly we have B1 ⊆ B(N∗ ). Thus we have
|B(N∗ ) ∩ B| ≥ |B1 | ≥ |B|/3, from which the theorem follows.
t
u
8 Discussion
In this paper we have developed some combinatorial results concerning collections of level-1 binets. Several
interesting questions arise from these results. For example, we have shown that the collection of level-1 binets
displayed by a binary phylogenetic network can be displayed by some level-1 network, but is there some
canonical level-1 network that could be used to display such a collection? In addition, can we count the
number of binary level-1 networks that display a dense compatible collection of binets? We have also seen that
the collection of binets displayed by a binary level-1 network determine its reticulation number. Therefore it
is natural to ask which properties of a phylogenetic network in general are determined by its binets?
We have also studied some algorithmic questions concerning binets. Concerning the maximum binet compatibilty problem, note that the constant 1/3 is sharp in Theorem 7. For example, consider the binet collection
{R(x; y), T (x, y), R(y; x)}. However, can a better bound be achieved by restricting to thin collections of binets,
and can improved approximation algorithms also be found?
In another direction, it would be interesting to know whether similar results to those proven in this paper
might hold for higher level networks. For example, what can be said about properties of collections of level-2
binets, and does Theorem 4 hold also for higher level networks? Also, we could try to generalize some of our
results to k-nets, i.e. networks on k leaves, k ≥ 2. For example, does Theorem 3 hold for trinets? In general,
it would be interesting to know what additional information the collection of k-nets displayed by a network
might contain for k ≥ 3. Note that it has been shown that trinets do not completely determine rooted networks
in general [12]. However, do they determine properties of networks such as the number of reticulations?
Similarly, it would be interesting to extend some of our algorithmic results to higher-level networks and
k-nets. For example, it is known that the compatibility problem is NP-complete for collections of level-1 trinets
[11]. However, to date the maximum trinet compatibility problem has not been studied.
Eventually, it is hoped that new results in these directions could be useful for developing novel methods
to construct phylogenetic networks from higher-level networks and k-nets. For example, using our results it
may be possible to develop approaches to build a consensus network for a collection of phylogenetic trees
or networks. Note that consensus networks have already proven themselves useful in the unrooted setting,
where they are used to summarize key features displayed by a collection of trees or networks (see e.g. [10]). A
consensus method based on binets could work by breaking each of the given networks down into a collection of
binets, and then developing methods to pool together the information contained in the resulting binets so as
to construct some consensus network, or at least some constraints that any such network should satisfy. Note
that similar approaches have been developed to build consensus trees for a collection of phylogenetic trees by
breaking each of the trees down into a collection of triplets (see e.g. [4, Section 2]). Probably it would be of
some interest to first consider how to construct a level-1 consensus network for a collection of level-1 networks
by breaking each of them down into level-1 binets. This is already likely to be quite challenging in view of our
result concerning NP-completeness of Maximum Binet Compatibility.
References
1. Aho, A.V., Sagiv, Y., Szymanski, T.G., Ullman, J.D.: Inferring a tree from lowest common ancestors with an application to
the optimization of relational expressions. SIAM Journal on Computing 10(3), 405–421 (1981)
2. Alon, N.: Ranking tournaments. SIAM Journal on Discrete Mathematics 20(1), 137–142 (2006)
3. Bapteste, E., van Iersel, L.J.J., Janke, A., Kelchner, S., Kelk, S., McInerney, J.O., Morrison, D.A., Nakhleh, L., Steel, M.,
Stougie, L., Whitfield, J.: Networks: expanding evolutionary thinking. Trends in Genetics 29(8), 439–441 (2013)
4. Bryant, D.: A classification of consensus methods for phylogenetics. DIMACS series in discrete mathematics and theoretical
computer science 61, 163–184 (2003)
5. Byrka, J., Guillemot, S., Jansson, J.: New results on optimizing rooted triplets consistency. Discrete Applied Mathematics
158(11), 1136–1147 (2010)
6. Charbit, P., Thomassé, S., Yeo, A.: The minimum feedback arc set problem is NP-hard for tournaments. Combinatorics,
Probability and Computing 16(01), 1–4 (2007)
7. Felsenstein, J.: Inferring phylogenies. Sinauer Associates Sunderland (2004)
8. Goldberg, M.: The graph isomorphism problem. In: J.L. Gross, J. Yellen (eds.) Handbook of Graph Theory, pp. 68–78. CRC
Press (2003)
9. Gusfield, D.: ReCombinatorics: The Algorithmics of Ancestral Recombination Graphs and Explicit Phylogenetic Networks.
MIT Press (2014)
14
Leo van Iersel et al.
10. Holland, B., Huber, K., Moulton, V., Lockhart, P.: Using consensus networks to visualize contradictory evidence for species
phylogeny. Molecular Biology and Evolution 21(7), 1459–1461 (2004)
11. Huber, K., van Iersel, L.J.J., Moulton, V., Scornavacca, C., Wu, T.: Reconstructing phylogenetic level-1 networks from
nondense binet and trinet sets. Algorithmica (2015). DOI 10.1007/s00453-015-0069-8
12. Huber, K., van Iersel, L.J.J., Moulton, V., Wu, T.: How much information is needed to infer reticulate evolutionary histories?
Systematic biology 64, 102–111 (2015)
13. Huber, K., Moulton, V., Wu, T.: Closed sets in phylogenetic networks. Preprint (2016)
14. Huson, D., Rupp, R., Scornavacca, C.: Phylogenetic Networks: Concepts, Algorithms and Applications. Cambridge University
Press (2010)
15. Morrison, D.: An introduction to phylogenetic networks. RJR Productions (2011)
16. Oldman, J., Wu, T., van Iersel, L.J.J., Moulton, V.: Trilonet: Piecing together small networks to reconstruct reticulate
evolutionary histories. Molecular biology and evolution 33(8), 2151–2162 (2016)
17. Tarjan, R.: Depth-first search and linear graph algorithms. SIAM journal on computing 1(2), 146–160 (1972)
18. Zemlyachenko, V.N., Korneenko, N.M., Tyshkevich, R.I.: Graph isomorphism problem. Journal of Soviet Mathematics 29(4),
1426–1481 (1985)
| 8cs.DS
|
The infinite simple group V of Richard J. Thompson:
presentations by permutations
arXiv:1511.02123v2 [math.GR] 28 Aug 2017
Collin Bleak & Martyn Quick
School of Mathematics & Statistics, University of St Andrews,
St Andrews, Fife, KY16 9SS, United Kingdom
[email protected], [email protected]
August 29, 2017
Abstract
We show that one can naturally describe elements of R. Thompson’s finitely presented
infinite simple group V , known by Thompson to have a presentation with four generators and
fourteen relations, as products of permutations analogous to transpositions. This perspective
provides an intuitive explanation towards the simplicity of V and also perhaps indicates a
reason as to why it was one of the first discovered infinite finitely presented simple groups: it
is (in some basic sense) a relative of the finite alternating groups. We find a natural infinite
presentation for V as a group generated by these “transpositions,” which presentation bears
comparison with Dehornoy’s infinite presentation and which enables us to develop two small
presentations for V : a human-interpretable presentation with three generators and eight
relations, and a Tietze-derived presentation with two generators and seven relations.
Mathematics Subject Classification (2010).
Primary: 20F05; Secondary: 20E32, 20F65.
Keywords. Thompson’s groups, simple groups, presentations, generators and relations, permutations, transpositions.
1
Introduction
In this article, we investigate R. Thompson’s group V from a mostly-unexplored perspective.
As a consequence we derive new, and hopefully elegant, presentations of this well-known group
and introduce a simple and dextrous notation for handling computations in V .
Recall that the group V first appears in Thompson’s 1965 notes [23] and is given there as
one of two “first-examples” of infinite finitely presented simple groups (along with its simple
subgroup T , called “C” in those notes). Since then, it has been the focus of a large amount of
subsequent research (see, for example, [4, 5, 6, 13, 15, 18, 24] for a small part of that research).
Thompson’s group V arises in various other settings, for example, Birget [2, 3] investigates
connections to circuits and complexity while Lawson [19] considers links to inverse monoids and
étale groupoids.
We shall demonstrate that one can consider V as a symmetric group acting, not on a finite
set, but instead on a Cantor algebra (the algebra of basic clopen sets in a Cantor space). We
focus upon certain well-known properties of a finite symmetric group, namely being generated
by transpositions and being transitive in its natural action. Reflecting these two fundamental
properties, a finite symmetric group possesses a Coxeter-type presentation, with generating
set T corresponding to a set of appropriate transpositions and relations t2 = 1 for all t ∈ T ,
(tu)2 = 1 when t, u ∈ T correspond to transpositions of disjoint support and (tu)3 = 1 when
1
t 6= u but the corresponding transpositions have intersecting support. If we exploit the fact
that these generators have order 2, this third type of relation can be rewritten as t−1 ut = u−1 tu
and indeed in the symmetric group this conjugate equals another transposition v, namely that
whose support satisfies supp v = (supp t)u.
In the context of a Cantor algebra, the analogues of transpositions are piecewise affine maps
which “swap” a pair of basic open sets. We shall observe that Thompson’s group V is generated
by such transpositions of the standard Cantor algebra and hence derive an infinite Coxeter-like
presentation for V , as appears in Theorem 1.1 below.
As is well known, the standard Cantor algebra admits a natural tree-structure where the
nodes correspond to the basic open sets in Cantor space C and these nodes are indexed by finite
words in the alphabet X = {0, 1}. Consequently, we label our transpositions by two incomparable words α and β from X ∗ . Indeed, for such α and β, we write tα,β for the element of V that is
the transposition defined in Equation (2.1). We shall also write sα,β and (α β) for symbols representing elements in two abstract groups whose presentations we give in Theorems 1.1 and 1.2,
respectively. We specifically use different notations for each of these elements so as to distinguish
between the elements of each abstract group and the actual transformations of Cantor space.
The thrust of our work is to demonstrate that the two abstract groups are isomorphic to V and
that under the isomorphisms these three elements sα,β , (α β) and tα,β correspond. The first two
of our families of relations appearing in Theorem 1.1 reflect that these tα,β act as transpositions
so have order 2, commute when their supports are disjoint, and conjugate in a manner analogous
to transpositions in symmetric groups when their supports intersect appropriately.
Passing from the setting of actions of finite permutation groups on finite sets to the setting
of corresponding actions of infinite groups on Cantor algebras has further implications for the
resulting presentation. Namely, due to the self-similar nature of Cantor space, each generating
transposition can be factorised. To be precise, each tα,β satisfies what we call a split relation:
tα,β = tα0,β0 tα1,β1 . This provides the third family of relations that are seen in Theorem 1.1. They
have the consequence that not only is every element of V a product of our transpositions tα,β , but
also we can re-express any such product as one that involves an even number of transpositions.
Thus one can simultaneously view R. Thompson’s group V as an infinite analogue of both the
finite alternating groups and of the finite symmetric groups.
It follows quite easily from the presentation in Theorem 1.1 that any transposition tγ,δ can be
obtained by conjugation using only those tα,β with |α|, |β| 6 3, for example, and this motivates
an effort to find a finite presentation involving permutations and their relations, where these
permutations involve only the nodes in the first three levels of the tree. Theorem 1.2 provides
this presentation (involving three generators and eight relations). Note here that we depart
slightly from the Coxeter-style of presentation: we exploit the presence of the symmetric group
of degree 4 acting upon X 2 to reduce further the presentation, at the cost of employing a “threecycle” as a generator. Of note, this human-interpretable presentation is much smaller than the
currently known finite presentation for V (given by Thompson [23] and discussed in detail in
Cannon, Floyd and Parry’s survey [12]), which has four generators and fourteen relations.
As a technical exercise, we further reduce the presentation in Theorem 1.2 to a 2-generator
and 7-relation presentation, found in Theorem 1.3. The resulting presentation is small, but not
so readily interpretable by humans.
Our infinite presentation in Theorem 1.1 bears comparison with Dehornoy’s infinite presentation for V (see [13, Proposition 3.20]). Dehornoy’s presentation highlights different aspects
as to why the group V can be considered as a fundamental object in group theory, and even in
mathematics, bearing out, as it does, the connection of V to systems with equivalences under
associativity and commutativity.
Our viewpoint of V as a form of a symmetric or alternating group perhaps hints at why
V arose as one of first two known examples of an infinite simple finitely presented group. Permuting sets is a basic activity, and the Cantor algebra represents a fundamental way to pass from
2
a finite to an infinite context, thus it seems natural that researchers eventually noticed V . To
give further background, we note there are many generalisations of V to infinite simple finitely
presented groups, all of which owe their simplicity to the same fundamental idea (similar to
the reason why the alternating groups are simple). One such family is the Higman–Thompson
groups Gn,r for which V = G2,1 , see [15]. (The group Gn,r is simple for n even. When n is
odd, one must pass to the commutator subgroup of index 2, reflecting the observation that the
corresponding split relations in Gn,r do not change the parity of any decomposition as a product
of transpositions.) Other families include the Brin–Thompson groups nV for which V = 1V ,
see [6], and the groups nVm,r that generalise the previous two families, see [20], and where we
have similar simplicity considerations, see [7]. The finite presentability of these groups comes
from the much stronger fact that they are all in fact F∞ groups. (There is a beautiful argument of the F∞ nature of these groups given in [24], which applies to many of these “relatives”
of V . In many specific cases, F∞ arguments already exist for individual groups and for classes
of groups in these families. See, for example, [1, 8, 9, 17].) The ideas of this paper ought to
apply to all of these groups of “Thompson type” in aiding in the discovery of natural and small
presentations. On the other hand, the infinite family of finitely-presented infinite simple groups
arising from the Burger-Mozes construction and following related work (see, e.g., [10, 11, 21])
are of an entirely different nature, and the methods employed here do not seem appropriate to
that context.
We mention here a debt to Matatyu Rubin and Matthew G. Brin. Rubin indicated to Brin
a proof of the simplicity of V , which uses the generation of V by transpositions with restricted
support on Cantor space. Brin set this proof out briefly in his paper [6] and developed the ideas
to extend the proof to the groups nV , which he carries out in the short paper [7]. It is not a
stretch to say that the current article would not exist without that thread of previous research.
A note on content
The first two sections of this article are intended for the interested mathematician and provide
structure and insights into these sorts of groups. The outline of the proofs of the theorems are
found towards the end of Section 2. The sections that follow are more technical and verify the
details required for those proofs.
Statement of results and some notation
Let X = {0, 1}. We write X ∗ for all finite sequences x1 x2 . . . xk where k > 0 and each xi ∈ X.
In particular, we assume that X ∗ contains the empty word ε. We view the elements of X ∗
as representing the nodes on the infinite binary rooted tree with edges between nodes if they
are represented by words which differ by a suffix of length 1. (Figure 1 illustrates this tree
together with the nodes labelled by elements of X ∗ .) Similarly, we give the standard definition
of the Cantor set C as X ω , the set of all infinite sequences x1 x2 x3 . . . of elements of X under
the product topology (starting with X endowed with the discrete topology). Thus points in C
correspond to boundary points of the infinite binary rooted tree.
If α ∈ X ∗ and β ∈ X ∗ ∪ X ω , then we write αβ for the concatenation of the two sequences.
We denote by αC the set of elements of C with initial prefix α. This set is a basic open set
in the topology on C and is itself homeomorphic to C. We shall write α β to indicate that
α is a prefix of β (including the possibility that the two sequences are equal). This notation
then means that β = αγ for some γ ∈ X ∗ ∪ X ω . Moreover, when β ∈ X ∗ , then α and β
represent nodes on the infinite binary rooted tree such that β lies on a path descending from α
(see Figure 2(i)), and therefore βC ⊆ αC.
We also write α ⊥ β to denote that both α 6 β and β 6 α. Then we shall say that α and β
are incomparable. In this case, the paths to α and to β from the root separate at some node
above both α and β (as shown in Figure 2(ii)), so that αC ∩ βC = ∅ (for such α, β ∈ X ∗ ).
3
ε
0
1
00
01
000
..
.
001 010
..
.
..
.
..
.
..
.
10
11
011 100
..
.
..
.
..
.
..
.
101 110
..
.
..
.
..
.
111
..
.
..
.
..
.
..
.
Figure 1: The infinite binary rooted tree with nodes labelled by elements of X ∗
..
.
..
.
..
.
..
.
..
.
..
.
α
α
β
β
|
{z
βC
}
Figure 2: (i) α β (and the paths representing elements of βC); and (ii) α ⊥ β
4
If m is a positive integer, we shall also use X m to denote the collection of all finite sequences
x1 x2 . . . xm of length m with xi ∈ X for each i. We write |α| for the length of the sequence
α ∈ X ∗.
Motivated by the well-known fact (see, for example, [13]) that R. Thompson’s group V has
a partial action on the set of finite binary rooted trees and equally on the set X ∗ , we shall use
the notation γ · (α β), for α, β, γ ∈ X ∗ , defined by
if γ = αδ for some δ ∈ X ∗ ,
βδ
αδ
if γ = βδ for some δ ∈ X ∗ ,
γ · (α β) =
(1.1)
γ
if
both
γ
⊥
α
and
γ
⊥
β,
undefined otherwise.
Thus γ · (α β) is undefined precisely when γ ≺ α or γ ≺ β and when it is defined it represents a
prefix substitution replacing any occurrence of α by β and vice versa.
The notation appearing in Equation (1.1) above is motivated via our anticipated isomorphism
between V and the abstract group defined by the presentation in Theorem 1.2. The map tα,β is
taken to the element (α β) and the above formula reflects the effect of applying tα,β to a point
in the partial action of V on X ∗ . Note also that we are choosing to write our maps on the right
since in our opinion this enables one to more conveniently compose a number of maps and such
a convention is consistent with denoting an element of V by tree-pairs with the domain on the
left and the codomain on the right. Nevertheless, we still view maps in V as being given by
prefix substitutions of the infinite sequences that are elements of the Cantor space so as to be
consistent with other work on these groups.
Our results are as follows:
Theorem 1.1 Let A to be the set of all symbols sα,β where α, β ∈ X ∗ with α ⊥ β. Then
R. Thompson’s group V has an infinite presentation with generating set A and relations
s2α,β = 1
s−1
γ,δ sα,β sγ,δ = sα·(γ δ),β·(γ δ)
(1.2)
sα,β = sα0,β0 sα1,β1
where α, β, γ and δ range over all sequences in X ∗ such that α ⊥ β, γ ⊥ δ, and α · (γ δ) and
β · (γ δ) are defined.
Our primary finite presentation for the group V has three generators a, b and c, but, as mentioned above, it is most naturally expressed in terms of a “permutation-like” notation extending
the transpositions in the infinite presentation. Our generators a, b and c then correspond to
permutations that we denote (00 01), (01 10 11) and (1 00), respectively, and the relations are
similarly expressed in terms of elements (α β) that we define fully in Section 2. This “humanreadable” presentation is as follows:
Theorem 1.2 R. Thompson’s group V has a finite presentation with three generators (00 01),
(01 10 11) and (1 00) and eight relations
4
R1. (00 01)2 = (01 10 11)3 = (00 01) (01 10 11) = 1;
R2. (1 01)(1 00) = (00 01);
R3. (1 00) = (10 000) (11 001);
R4. [(00 010), (10 111)] = [(00 011), (10 111)] = 1;
R5. [(000 010), (10 110)] = 1.
5
We shall provide words in terms of the generators a, b and c to express these relations later
in Equation (2.3). Observe that the Relations R1 tells us that (00 01) and (01 10 11) satisfy the
relations of the symmetric group S4 , so the subgroup that they generate is isomorphic to some
quotient of S4 . In fact, it will turn out that this subgroup is isomorphic to S4 .
The element (α β) will correspond to the element of Thompson’s group V that maps a point
of the Cantor set that has prefix α to a point with prefix β and vice versa. Relations R4 and R5
then reflect the fact that certain elements of V commute because they have disjoint support.
We show that V is generated by the two elements u and v described by the tree-pairs in
Figure 3. Transforming the presentation in Theorem 1.2 to one using these two generators via
Tietze transformations (as described in Corollary 5.2) and reducing the nine resulting relations
using the Knuth–Bendix algorithm, as implemented in the GAP package KBMAG [14, 16], results
in the surprising two generator and seven relation presentation given below:
Theorem 1.3 R. Thompson’s group V has a finite presentation with two generators u and v
and the seven relators
u6 , v 3 , (u3 v)4 ,
v −1 u(u2 v −1 )2 u3 vu−1 v −1 u3 vu(uvu2 (uv −1 u3 v)3 )2 uv −1 u3 v −1 ,
uv −1 u3 v −1 u−2 v −1 uvu2 v −1 u−1 vu2 v −1 uvu−1 (u−1 v −1 )2 u3 vu−1 ,
v(uv −1 u3 v −1 )2 u−1 v −1 u3 v −1 u−1 v −1 u3 v,
uvu3 vuv −1 u−2 v −1 u(u2 v)2 (u2 v −1 )2 u3 vu−2 v −1 u3 v.
This reduction to seven relations caught the authors by surprise, but perhaps it is not so
unexpected in view of the deficiency (as defined, for example, in [22, §14.1]) of the presentations
in Theorems 1.2 and 1.3 both being −5.
2
Further preliminaries and the proofs of the main theorems
This section contains the heart of the mathematics within the article. We present all the remaining preliminaries required to fully understand the statements of the theorems listed in the
introduction, in particular, unpacking the presentations that we use. We then provide the proofs,
subject to deferring technical calculations to the sections that follow.
R. Thompson’s group V
One view of Thompson’s group V is as a group of certain homeomorphisms of the Cantor set C,
namely those that are finite products of the elements tα,β , for α, β ∈ X ∗ with α ⊥ β, defined as
follows
βy if x = αy for some y ∈ C;
(2.1)
xtα,β = αy if x = βy for some y ∈ C;
x
otherwise
u
v
−−→
1 2 3
−−→
2 1 5
4 5
1 2 3 4
1 4 2 3
3 4
Figure 3: Two elements given by tree-pairs that generate for R. Thompson’s group V
6
1
−−−→
1
4
2
2
3
4
3
Figure 4: The map t100,11 denoted using tree-pairs
(see Brin [6, Lemma 12.2]). Note that the map tα,β has the effect of swapping those elements
of C that have an initial prefix α with those that have an initial prefix β and fixing all other
points in C. A general element of V is often denoted by a pair of finite binary rooted trees
representing the domain and codomain of the map. We label the leaves of these two trees by the
numbers 1, 2, . . . , n (for some n) and this then specifies that our element of V has the effect of
substituting the prefix from X ∗ corresponding to the node in the domain tree labelled i by the
member of X ∗ corresponding to the node in the codomain tree with the same label (for each i).
For example, Figure 4 provides such tree-pairs for the map t100,11 as just defined.
From the definition, it is visible that t2α,β = 1. Equations of this type (as α and β range over
all incomparable pairs from X ∗ ) will form our family of order relations.
If we shift our attention to conjugation, it is a straightforward calculation in V , along the
lines of the familiar one concerning conjugation of permutations demonstrated to undergraduates
in a first course on group theory, to verify that
t−1
γ,δ tα,β tγ,δ = tα·(γ δ),β·(γ δ)
whenever α · (γ δ) and β · (γ δ) are both defined. We call this resultant family of relations in V
our conjugacy relations. At this point, we also note that we will use an exponential notation for
conjugation, so the left-hand side of the above relation will also be denoted by tα,β tγ,δ in what
follows.
Our final family of relations exploit the action of our elements tα,β on basic open sets of the
Cantor set C and the self-similar structure of this space. Specifically, if α ∈ X ∗ , then the basic
open set αC splits into two subsets, namely the set of all elements of C with initial prefix α0 and
those with initial prefix α1. In view of this, we obtain the equation
tα,β = tα0,β0 tα1,β1
(2.2)
when α, β ∈ X ∗ with α ⊥ β. We refer to the family of these relations as split relations.
Deriving the presentations for V
One of the presentations that we use in this article is that found by R. Thompson and discussed
in Cannon–Floyd–Parry (see [12, Lemma 6.1]). This presentation has four generators A, B,
C and π0 and fourteen relations. We state these relations when we need them at the start of
Section 4 below.
As described in Theorem 1.1, the first of our new presentations involves the order relations,
conjugacy relations and split relations of V just described. To be precise, we define P∞ to be the
group having the infinite presentation with generating set A = { sα,β | α, β ∈ X ∗ , α ⊥ β } and
the relations listed in Equation (1.2). Of course, we already know that that V is generated by
the maps tα,β and that these satisfy the order, conjugacy and split relations. This ensures that
there is a surjective homomorphism φ : P∞ → V given by sα,β 7→ tα,β for α, β ∈ X ∗ with α ⊥ β.
When establishing Theorem 1.1, we shall be observing that φ is actually an isomorphism.
We now describe our primary finite presentation for V , which has three generators a, b and c
and eight relations but, more importantly, can be readily understood by a human. The majority
7
of our calculations will take place with this presentation and so, as indicated above, we develop
a helpful notation that is parallel to that used in finite permutation groups. It is a consequence
of Higman [15] that all the relations that hold in V can be detected as consequences of products
using tree-pairs of some bounded size. This motivates our presentation which employs essentially
a finite subcollection of the order, conjugacy and split relations from P∞ and involving only some
swaps (α β) all satisfying |α|, |β| 6 3. (To aid reducing the number of relations required we
encode a copy of the symmetric group of degree 4, corresponding to acting on X 2 , within our
presentation.)
Accordingly, the three generators a, b and c of the group P3 that we define will represent cyclic
permutations of basic open sets. As stated above, we shall write (00 01), (01 10 11) and (1 00)
for a, b and c, respectively. This reflects the fact that, under the isomorphism that we shall
establish between P3 and V , the element a corresponds to the map t00,01 that interchanges the
basic open sets 00C and 01C, b corresponds to the product t01,10 t01,11 (inducing a 3-cycle of
the sets 01C, 10C and 11C), and c corresponds to t1,00 . We extend this notation by defining
elements (α β) that we will refer to as swaps below and a formula for each in terms of a, b and c
will be extracted from the definitions we make. The element (α β) will correspond to tα,β under
the isomorphism. It is these swaps that appear in our list of relations found in Theorem 1.2
above.
Once we have defined the swaps below, we can translate the Relations R1–R5 into words in
a, b and c. The result is the following restatement of Theorem 1.2:
Theorem 2.1 R. Thompson’s group V has a finite presentation with three generators a, b and c
and the following eight relations:
a2 = b3 = (ab)4 = 1,
ba
−1 cacaab−1 a
c = abcacaa ab
[ab
−1 cac
,a
cac = a,
−1
b−1 cacab ab a
−1 cacab ab−1 a
[abcac , ab
,
bca
[abca
] = 1,
−1
bcacab ab a
,a
] = 1,
(2.3)
] = 1.
The careful reader will doubtless have observed that the eighth relation can be shortened
by conjugating by a. The presentation as listed is a direct consequence of the interpretation of
Theorem 1.2 in terms of a, b and c. No effort has been made in its statement to reduce the
length of the relations.
Having found this nice presentation for V , we felt obligated to reduce the relations employing
the available technology, specifically the Knuth–Bendix Algorithm. This algorithm shortens the
above relations, although the results are no longer particularly transparent. To carry out these
reductions, we used the implementation of the algorithm found in the freely available KBMAG
package [16] in GAP [14] in the following way. Denote the eight relators corresponding to the
equations in (2.3) by r1 , r2 , . . . , r8 . We can construct a rewriting system associated to each of the
groups Qi = h a, b, c | r1 , r2 , . . . , ri−1 , ri+1 , . . . , r8 i for i = 4, 5, . . . , 8 in sequence. The systems
that KBMAG constructs are not confluent, but nevertheless enable us to replace each ri by a
Tietze-equivalent (in the group Qi ) shorter relation. This process is repeated until the resulting
relations stabilise. As a consequence, the normal closure, in the free group on {a, b, c}, of the
following eight relations is identical to that of our original list:
a2 = b3 = (ab)4 = 1,
c−1 (ac)2 a = 1,
(cab−1 aba)2 cb(cabab−1 a)2 = 1,
a(cb)2 a(b−1 c)2 bcabcb−1 cab−1 acb−1 (cb)2 ab−1 = 1,
ab−1 cbc(ab−1 )2 cbcb−1 a(b−1 c)2 babcb−1 cab−1 = 1,
ca(b−1 c)2 bacabacbc(b−1 ca)2 b(cb−1 )2 (acb)2 cb−1 cab−1 = 1.
8
(2.4)
We observe this mechanical process produces considerably shorter relations than our original
eight in Equation (2.3).
The presentation in Theorem 1.3 is deduced in a manner that similarly depends upon the
use of the Knuth–Bendix Algorithm. One first applies Tietze transformations to pass to a
2-generator presentation employing generators u and v and relations deduced from the list (2.4).
We shall describe these Tietze transformations by expressing u and v in terms of a, b and c
(adding extraneous generators), and expressing a, b and c in terms of u and v (removing extraneous generators). The relevant formulae are
b ab−1 a
u = a(ab ab )caca
−1
and
and
a = u3 ,
b = v,
c = (u3 )vu
−2 vu3
v=b
(u3 )vu
−1 vu3 v
.
These formulae can be deduced by direct calculation in V . This application of Tietze transformations is expanded upon a little in Section 5 and Corollary 5.2 provides the intermediate step
to the theorem. (This corollary is established by purely theoretical means and does not rely
upon computer calculation.)
We then employ the same relation reduction process using KBMAG as described earlier
and this shows that two of the nine relations resulting from the Tietze transformations are
extraneous. In this manner we have deduced Theorem 1.3 from Theorem 1.2.
We now proceed to formally define the swaps (α β) for α, β ∈ X ∗ with α ⊥ β and |α|, |β| 6 3
in terms of our generators a, b and c in order to present the group P3 . To start off, we define
swaps (α β) for α, β ∈ X 2 as follows:
(00 01) = a,
(00 10) = ab ,
(01 10) = aba , (01 11) = ab
−1 a
(00 11) = ab
−1
, (10 11) = abab
(2.5)
Here, and in all that follows, we shall also adopt the convention that the swap (β α) coincides
with (α β) whenever the latter has already been defined. We write T2 for the set of swaps (α β)
with α, β ∈ X 2 .
The swaps in T2 and their effect when conjugating will be of fundamental importance in our
calculations. Accordingly we spend a little time expanding upon the above definitions before
we define the remaining swaps. In the Relations R1, we have assumed that a and b satisfy the
relations of the symmetric group S4 and the formulae on the right-hand side of Equation (2.5) are
those that correspond to transpositions in S4 . Consequently, when we multiply and conjugate
elements of T2 , they behave in exactly the same way as transpositions do. In particular, we can
view individual elements of T2 , and, by extension, products of such swaps, as transformations
of the set X 2 . Indeed, our notation γ · (α β), as defined in Equation (1.1), when α, β, γ ∈ X 2 ,
is precisely the formulae for these maps. Our assumption of Relations R1 justifies our using
products of swaps from T2 as maps X 2 → X 2 , as we shall do explicitly, for example, in Lemma 3.4
below. Similarly, we have written (01 10 11) for the generator b, since it follows from the
Relations R1 that b is equal to the product (01 10) (01 11), which induces a 3-cycle on X 2 .
To define the remaining swaps (α β), where |α|, |β| 6 3, we need one further piece of notation.
If x ∈ X, we define x̄ to be the other element in X; that is,
(
1 if x = 0,
x̄ =
0 if x = 1.
Then for any x, y, z ∈ X, we make our definitions in the following order:
(0 1) = (00 10) (01 11);
9
(2.6)
(1 01) = (1 00)(00 01) ,
(1 00) = c,
(0 1x) = (1 0x)(0 1) ;
(1 00x) = (00 1x)(1 00) ,
(1 01x) = (1 00x)(00 01) ,
(0 1xy) = (1 0xy)(0 1) ;
(00 01x) = (1 01x)(1 00) ,
(01 00x) = (00 01x)(00 01) ,
(1x 1x̄y) = (0x 0x̄y)(0 1) ,
(1x 0yz) = (0ȳ 0yz)(0ȳ 1x) ,
(2.7)
(2.8)
(2.9)
(0x 1yz) = (1x 0yz)(0 1) ;
(000 001) = (1 000)(1 001) ,
(000 010) = (1 000)(1 010) ,
(000 011) = (1 000)(1 011) ,
(001 011) = (1 001)(1 011) ,
(2.10)
(xy0 xy1) = (000 001)(00 xy) .
Finally, for distinct κ, λ ∈ X 2 , fix a product ρκλ of swaps from T2 that moves 00 to κ and 01
to λ when viewed, as described above, as a map X 2 → X 2 . Define
(κx λy) = (00x 01y)ρκλ
(2.11)
for (x, y) ∈ {(0, 0), (0, 1), (1, 1)}. In this way, we have now defined all swaps (α β) where
|α|, |β| 6 3.
Having made these definitions, it is a straightforward matter to convert the relations R1–
R5 into the list (2.3) of actual words expressed in the generators a, b and c, completing the
translation of Theorem 1.2 into Theorem 2.1.
Proofs of the main theorems
We now provide the proofs of the main theorems (that is, Theorems 1.1 and 1.2), subject to
information that we shall establish in the sections of the paper that follow. Here we link the
groups V , P3 and P∞ . Specifically, we build homomorphisms between these groups as indicated
in the following diagram:
/
❥❥4 P3
' ❥❥❥❥❥❥❥
i0
τ
Tietze
/ / P̄ ❚
3 ❚❚❚ θ
❚❚❚❚
❚* *
hs00,01 ,g s01,10 , s10,11 , s1,00 i
hĀ, B̄, C̄, π̄0 i
j❚j ❚❚❚ ψ
❚❚❚❚
❚❚
(2.12)
i1
V oo
φ
P∞
❥G
❥❥❥❥
t ❥❥❥
❥
We already know that φ : P∞ → V is a surjective homomorphism. We now describe the
other parts of the hexagon of maps.
The majority of the work in Sections 3–5 involves the presentation for the group P3 , where
we establish information about the swaps (α β) defined above. In Section 3, we verify that
these swaps satisfy the order relations, conjugacy relations and split relations of R. Thompson’s
group V , providing we restrict to those involving only swaps (α β) with |α|, |β| 6 3. Then in
Section 4, we establish that four specific elements Ā, B̄, C̄ and π̄0 in P3 satisfy the fourteen
relations listed in Cannon–Floyd–Parry [12] that define the group V . In that section, we ensure
that we only rely upon the consequences of our Relations R1–R5 established in Section 3. This
then guarantees the existence of a surjective homomorphism ψ : V → hĀ, B̄, C̄, π̄0 i.
In the final section, we establish that hĀ, B̄, C̄, π̄0 i coincides with the group P3 (see Proposition 5.1), from which it follows that the natural inclusion map i0 is also surjective.
10
Amongst the generators for P3 are the elements a = (00 01) and b = (01 10 11), which satisfy
the relations of the symmetric group S4 (Relations R1). Of course, S4 also enjoys a presentation
in terms of transpositions involving only order and conjugacy relations. Accordingly, we apply
Tietze transformations to convert the presentation for P3 into one for a group P̄3 with generators
(00 01), (01 10), (10 11) and (1 00) and some order, conjugacy and split relations (specifically
translations of R2–R5, together with the new ones to replace R1). Thus we have on the one
hand, an isomorphism τ : P3 → P̄3 and, on the other, a surjective homomorphism θ : P̄3 →
hs00,01 , s01,10 , s10,11 , s1,00 i (a subgroup of P∞ ), since the relations defining P̄3 all hold in P∞ .
We can now deduce that P3 = hĀ, B̄, C̄, π̄0 i is not trivial, since successively composing the
appropriate maps in (2.12) sends, for example, a = (00 01) to the non-identity element t00,01
in V . Hence, from simplicity of V , we conclude P3 ∼
= V and therefore, subject to the work in
Sections 3–5, establish Theorem 1.2.
Finally, it is relatively straightforward to observe that if α is a non-empty sequence in X ∗ ,
then there is a product w involving only the swaps (00 01), (01 10), (10 11) and (1 00) such that
00 · w = α. From this, one quickly deduces, principally relying upon the conjugacy relations,
that one can conjugate s00,01 by some element of hs00,01 , s01,10 , s10,11 , s1,00 i to any generator sα,β
where (α, β) 6= (0, 1). This ensures that the inclusion i1 is surjective. Hence P∞ ∼
= V also and
we have established Theorem 1.1.
The remaining sections are perhaps technical, but carry out the deferred work just as described above. We hope that these sections will quickly impress the reader with the utility of
the permutation notation (α β) in performing calculations within R. Thompson’s group V .
Remarks
(i) If our goal had been simply to establish Theorem 1.1, then our work in the next two
sections would have been greatly reduced. Indeed, it is actually rather easy to show that
the group P∞ defined by all the relations listed in Theorem 1.1 is isomorphic to V (for
example, the relations that Dehornoy [13] lists are particularly straightforward to deduce).
However, from the viewpoint of the high transitivity of the action of V on the Cantor
set C, one expects that it would be enough to restrict to relations involving swaps (α β)
with |α| and |β| bounded. Indeed, this is what leads to our presentation for the group P3
and the small set of relations, R1–R5, where we are relying upon a small subset involving
only swaps (α β) with |α|, |β| 6 3. Establishing that this set of relations is sufficient is the
delicate business of Sections 3 and 4.
(ii) Now that we have established that the groups P3 , P∞ and V are all isomorphic, it is safe
to use the notation (α β) as a convenient notation for the map tα,β as defined earlier. We
can then perform computations within R. Thompson’s group V employing this notation,
for example, along the lines of those in the sections that follow, and we hope this will be
of use to those working with elements in this group.
3
Verification of relations to level 3
Our principal aim is to establish that all the relations holding in R. Thompson’s group V can
be deduced from Relations R1–R5. In this section, we complete the first stage of our technical
calculations by establishing essentially a subset of the infinitely many relations in the list (1.2),
namely those order relations, the conjugacy relations and the split relations involving only
swaps (α β) with |α|, |β| 6 3. It will turn out that these are enough to then deduce the fourteen
relations for V found in [12] as we shall see in Section 4.
Accordingly, in this section, we shall verify all relations of the form
(α β)2 = 1
11
(α β)(γ δ) = (α·(γ δ) β ·(γ δ))
(α β) = (α0 β0) (α1 β1)
whenever any swap (κ λ) appearing above satisfies |κ|, |λ| 6 3. (So, for example, the split
relation (α β) = (α0 β0) (α1 β1) needs only to be verified for |α|, |β| 6 2 in order that the swaps
on the right-hand side of the equation fulfil this requirement.) The main focus throughout the
section will be in establishing all the conjugacy relations σ τ = υ and we will consider these
relations when we select σ, τ and υ from the following sets:
T2 = { (α β) | (α, β) = (0, 1) or α, β ∈ X 2 }
T3 = { (α β) | α, β ∈ X 3 }
Tmn = { (α β) | α ∈ X m , β ∈ X n },
where 1 6 m < n 6 3
We start our verification by first noting that (1 00) is a conjugate of (00 01) by Relation R2
and hence has order dividing 2 by the first relation in R1. From this and the definitions of the
swaps, we now know that (α β)2 = 1 whenever α ⊥ β with |α|, |β| 6 3. We will use this fact
throughout the rest of this section.
We step through the various relations, essentially introducing “longer” swaps through the
stages. Accordingly, we start with relations involving only swaps from T12 ∪ T2 , then introducing
swaps from T13 , and so on. We need to take various side-trips from this general direction in
order to successfully establish all the relations we want.
Relations involving T12 and T2 only
With careful analysis, one can soon establish which conjugacy relations involve only swaps
selected from T12 ∪ T2 . These are, for x, y ∈ X, the following three relations:
(x x̄y)(0 1) = (x̄ xy)
(x̄y x̄ȳ)
(x x̄y)
(x x̄ȳ)
(x x̄y)
(3.1)
= (x x̄ȳ)
(3.2)
= (x̄y x̄ȳ)
(3.3)
These are actually very easy to verify. For example, Equation (3.1) simply follows from our
definition of (0 1x) (for x ∈ X) in (2.7), while we can establish Equation (3.2) using our
definition of (1 01) in (2.7) and then conjugating, if necessary, by (0 1) and using the now
established Equation (3.1). We now have the first step in our verification and results along the
lines of the following lemma will occur throughout our progress.
Lemma 3.1 All conjugacy relations of the form σ τ = υ where σ, υ ∈ T12 and τ ∈ T2 can be
deduced from Relations R1–R5.
This lemma contributes now to establishing Equation (3.3), since we observe that, for
the case x = 1 and y = 0, the equation is Relation R2 and that the general equation can
then be deduced by conjugating by a product of elements from T2 . Specifically, conjugating
by (0 1) gives (0 11)(0 10) = (10 11) and then subsequently the two equations now established
by (00 01) and (10 11), respectively, establishes the final cases.
Relations involving T12 , T13 and T2 only
When we introduce swaps from T13 , in addition to those from T12 and T2 , the relations that
need to be verified are, for x, y, z ∈ X, the following:
(x x̄yz)(0 1) = (x̄ xyz)
(x̄y x̄ȳ)
(x x̄yz)
12
= (x x̄ȳz)
(3.4)
(3.5)
(x x̄yz)(x x̄y) = (xz x̄y)
(3.6)
Both Equations (3.4) and (3.5) follow quickly from the definitions in (2.8). They establish:
Lemma 3.2 All conjugacy relations of the form σ τ = υ where σ, υ ∈ T13 and τ ∈ T2 can be
deduced from Relations R1–R5.
If we expand the definition of (1 00z) from Equation (2.8), we obtain (1 00z)(1 00) = (00 1z)
for z ∈ X. Now conjugate by an appropriate product of elements from T2 , using Lemmas 3.1
and 3.2 similarly to the argument used for Equation (3.3), to establish Equation (3.6).
First batch of relations involving T2 and T23 only
We now turn to relations involving swaps from T23 . There are additional relations that we
shall establish later involving only swaps from T2 and T23 , but for now we are concerned with
the following equations (in particular, the first of our split relations) for x, y ∈ X, for distinct
κ, λ, µ ∈ X 2 , and for any τ ∈ T2 for which the first is defined:
(κ λx)τ = (κ·τ (λx)·τ )
(x x̄y) = (x0 x̄y0) (x1 x̄y1)
(µ λx)
(κ λx)
= (κ µ)
(3.7)
(3.8)
(3.9)
We shall need the following lemma to be able to manipulate the initial swaps from T23 from
which the others are built, as given in (2.9). We shall then establish Equation (3.7) in the form
of Lemma 3.4 below.
Lemma 3.3
(i) (1 00), (10 000) and (11 001) all commute;
(ii) (01 00x)(1 00) = (01 1x);
Proof: (i) Using Relation R3 and the fact that all the swaps involved have order dividing 2, we
conclude that (10 000) and (11 001) commute. It then follows, again using R3, that (1 00) also
commutes with these elements.
(ii) Pull apart the formula for (01 00x) using the definitions in (2.9), and then apply Relation R2 and Equation (3.6) as follows:
(01 00x)(1 00) = (1 01x)(1 00) (00 01) (1 00) = (1 01x)(1 01) = (01 1x).
Lemma 3.4 All conjugacy relations of the form σ τ = υ where σ, υ ∈ T23 and τ ∈ T2 can be
deduced from Relations R1–R5.
Proof: The first half of the proof deals with the case when σ = (κ λ0) for distinct κ, λ ∈ X 2 .
To establish this, we must first verify that the swap (00 010) commutes with (10 11). However,
to achieve this, we actually work first with the swap (10 000). Indeed,
(10 000) (01 11) = (1 00) (11 001) (01 11)
by Rel. R3
= (1 00) (01 11) (01 001)
by the def. of (11 001) in (2.9)
= (01 001) (01 11) (1 00)
by Lem. 3.3(ii) twice
= (01 11) (11 001) (1 00)
by the def. in (2.9)
= (01 11) (10 000)
by Lem. 3.3(i) and Rel. R3.
13
As the definition of (10 000) in Equation (2.9) is (00 010)(00 01) (01 10) , we conclude that (00 010)
commutes with (01 11)(01 10) (00 01) = (10 11).
So we now turn to the required relation when σ = (κ λ0) for distinct κ, λ ∈ X 2 . As described
earlier, we view τ as a permutation of X 2 . As such a map, suppose τ maps κ and λ to µ and ν,
respectively. Then by the definition in Equation (2.9) there are products ρ1 and ρ2 of elements
from T2 such that
(κ λ0) = (00 010)ρ1
and
(µ ν0) = (00 010)ρ2 .
Specifically, ρ1 and ρ2 are products that, when viewed as permutations of X 2 , map 00 and 01
to κ and λ and to µ and ν, respectively. Then ρ1 τ ρ−1
2 ∈ h(10 11)i since it fixes both 00 and 01.
Hence, by our previous calcuation, (00 010) commutes with ρ1 τ ρ−1
2 , so
(κ λ0)τ = (00 010)ρ1 τ = (00 010)ρ2 = (µ ν0).
(3.10)
Thus, we have established Equation (3.7) in the case when x = 0.
To deduce the equation for x = 1, we proceed similarly and first need to establish that
(00 011) commutes with (10 11). We calculate as follows:
(10 000)(01 000) = (10 000)(1 00) (01 10) (1 00)
(01 10) (1 00)
by Lem. 3.3(ii)
= (10 000)
by Lem. 3.3(i)
= (01 000)(1 00)
by Eq. (3.10)
= (01 10)
by Lem. 3.3(ii).
Conjugate by (01 10) and use Equation (3.10) again to establish the formula (01 000)(10 000) =
(01 10). Now we find
(11 001) (01 10) = (10 000) (1 00) (01 10)
by Rel. R3
= (10 000) (01 000) (1 00)
by Lem. 3.3(ii)
= (01 10) (10 000) (1 00)
as just established
= (01 10) (11 001)
by Rel. R3.
Thus [(11 001), (01 10)] = 1, and then using the definition of (11 001) in (2.9) and the Relations R1, we deduce [(00 011), (10 11)] = 1. We then proceed as in the first half of the proof,
using this new equation, and we establish Equation (3.7) when x = 1, completing the proof of
the lemma.
Equation (3.8) now follows by conjugating Relation R3 by an appropriate product of elements
from T2 using Lemmas 3.1 and 3.4.
The establishment of Equation (3.9) requires an intermediate observation first. We use
Lemma 3.4 to tell us that (11 001) commutes with (01 10), so
(01 10) (11 001) = (11 001) (01 10)
= (10 000) (1 00) (01 10)
by Rel. R3
= (10 000) (01 000) (1 00)
by Lem. 3.3(ii)
= (10 000) (01 000) (10 000) (11 001)
by Rel. R3.
Hence (01 000)(10 000) = (01 10). By a similar sequence of calculations we establish
(10 000) (01 11) = (01 11) (10 000)
by Lem. 3.4
= (01 11) (1 00) (11 001)
by Rel. R3
= (1 00) (01 001) (11 001)
by Lem. 3.3(ii)
= (10 000) (11 001) (01 001) (11 001)
by Rel. R3,
so (01 001)(11 001) = (01 11). We now have two equations that, once we conjugate by a product
of elements from T2 , yield the general form of Equation (3.9) using Lemma 3.4 and Relations R1.
14
Relations involving T12 , T2 and T23
The relations that involve swaps from T12 , T23 and T2 and that definitely include at least one
swap from each of the first two sets are, for x, y, z, t ∈ X, the following:
(xy x̄z)(x x̄z̄) = (x̄z x̄z̄y)
(x x̄z)
(xy x̄zt)
(3.11)
= (xt x̄zy)
(3.12)
To establish Equation (3.11), first calculate
(00 1x)(1 01) (1 00) = (00 1x)(1 00) (00 01) = (1 00x)(00 01) = (1 01x)
using Relation R2 and the definitions in (2.8). Hence
(00 1x)(1 01) = (1 01x)(1 00) = (00 01x)
by the definitions in (2.9). This is Equation (3.11) in the case when x = 1 and z = 0. The
general equation then follows by conjugating by a suitable product of elements from T2 and
using Lemmas 3.1 and 3.4.
To establish Equation (3.12), we first deal with the case when x = 1 and z = 0. We calculate
(1y 00t)(1 00) = (01 00t)(01 1y) (1 00) = (01 00t)(1 00) (01 00y)
= (01 1t)(01 00y) = (1t 00y)
using the definitions in (2.9), Equation (3.11) (twice) and (3.9). Now conjugate by an appropriate
product of elements from T2 , using Lemmas 3.1 and 3.4, to conclude that Equation (3.12) holds.
Intermediate relations
Our current goal at this stage is to complete the establishment of relations involving swaps from
T2 and T23 to supplement Equations (3.7)–(3.9) already obtained. However, in order to achieve
this, we need some intermediate relations involving swaps from T3 of the form (κ0 κ1) for some
κ ∈ X 2 , specifically for x, y ∈ X and distinct κ, λ ∈ X 2 :
(κ λx)(κ λx̄) = (λ0 λ1)
(λ0 λ1)
(κ λx)
(3.13)
= (κ λx̄)
(3.14)
[(x x̄y), (x̄ȳ0 x̄ȳ1)] = 1
(3.15)
We start by establishing a helpful lemma, analogous to Lemmas 3.3 and 3.4, concerning the
swaps of the form (κ0 κ1).
Lemma 3.5
(i) (000 001)(1 00) = (10 11);
(ii) (000 001) commutes with (01 10), with (01 11), and with (10 11).
(iii) All conjugacy relations of the form σ τ = υ, where σ, υ ∈ T3 have the form (κ0 κ1) for
some κ ∈ X 2 and τ ∈ T2 , can be deduced from Relations R1–R5.
Proof: (i) This follows using the definitions in (2.8) and (2.10):
(000 001)(1 00) = (1 000)(1 001) (1 00) = (1 000)(1 00) (00 11)
= (00 10)(00 11) = (10 11).
15
(ii) First we know, by Lemma 3.4, that (10 11) commutes with (01 00x) for any x ∈ X.
Conjugating by (1 00), using part (i) and Lemma 3.3(ii), establishes that (000 001) commutes
with (01 1x).
Then we perform the following calculation:
(000 001) (10 11) = (1 00) (10 11) (1 00) (10 11)
by part (i)
= (10 000) (11 001) (10 11) (1 00) (10 11)
by Rel. R3
= (10 11) (11 000) (10 001) (1 00) (10 11)
by Lem. 3.4
= (10 11) (1 00) (10 001) (11 000) (10 11)
by Eq. (3.12)
= (10 11) (1 00) (10 11) (11 001) (10 000)
by Lem. 3.4
= (10 11) (1 00) (10 11) (1 00)
by Lem. 3.3(i) and Rel. R3
= (10 11) (000 001)
by part (i).
Thus (000 001) commutes with (10 11).
(iii) This follows by the same argument as used in Lemma 3.4, noting that if a product ρ of
elements from T2 fixes 00 then it lies in the subgroup generated by (01 10), (01 11) and (10 11)
and so commutes with (000 001) by part (ii).
For Equation (3.13), start with the equations (01 1x)(01 1x̄) = (10 11) and then conjugate
by (1 00). Use Lemmas 3.3(ii) and 3.5(i) to conclude
(01 00x)(01 00x̄) = (000 001)
for any x ∈ X. The required equation now follows by conjugating by a product of elements
from T2 and using Lemmas 3.4 and Lemma 3.5(iii).
To establish Equation (3.14), first use Lemma 3.4 to conclude that (10 000)(10 11) = (11 000).
Now conjugate by (1 00) and use Equation (3.12) and Lemma 3.5(i) to establish the formula
(10 000)(000 001) = (10 001). Conjugating by an appropriate product of elements from T2 and
use of Lemmas 3.4 and 3.5(iii) establishes (κ λ0)(λ0 λ1) = (κ λ1), which is sufficient to verify
Equation (3.14).
We deduce Equation (3.15) by starting with [(00 01), (10 11)] = 1 and conjugating by (1 00)
to yield [(1 01), (000 001)] = 1, using Relation R2 and Lemma 3.5(i). Conjugating by an
appropriate product of elements from T2 and using Lemmas 3.1 and 3.5(iii) establishes the
required relation.
Remaining relations involving T2 and T23
We now establish all the relations remaining that involve just swaps from T2 and T23 . Careful
analysis shows that the ones we are currently missing are, for x, y ∈ X and distinct κ, λ, µ, ν ∈
X 2 , the following:
[(κ λ0), (µ λ1)] = 1
(3.16)
[(κ λx), (µ νy)] = 1
(3.17)
Note that in establishing these equations we are essentially establishing that swaps from T23 that
have disjoint support (or, more accurately, corresponding to maps in V with disjoint support)
commute.
Equation (3.16) simply follows from Lemma 3.3(i) using Lemma 3.4.
Use of Lemma 3.4 deduces [(κ λ0), (µ ν1)] = [(κ λ1), (µ ν1)] = 1 for all distinct κ, λ, µ, ν ∈
X 2 from Relations R4. Consequently, in the case of Equation (3.17), it remains to verify the
relation in the case when x = y = 0. First observe that
(11 011)(000 001) = (11 011)(10 000) (10 001) (10 000) = (11 011)
16
by use of Equation (3.13) and then repeated use of the cases of Equation (3.17) that we already
have; that is, [(11 011), (000 001)] = 1. Now
(000 001)(10 010) = (000 001)(1 01) (11 011)
by Eq. (3.8)
= (000 001)(11 011)
by Eq. (3.15)
= (000 011)
as just established.
Thus, (10 010) and (000 001) commute. This means that when we conjugate the relation
[(10 010), (11 001)] = 1, which is an instance of Equation (3.17) that we already know, by the
swap (000 001), we obtain
[(10 010), (11 000)] = 1,
with use of Equation (3.14). We now make use of Lemma 3.4 in our usual way to establish the
missing case of Equation (3.17), namely when x = y = 0.
Relations involving T12 , T13 , T2 and T23
We now establish all the relations we require that involve swaps from T12 , T13 , T2 and T23 . In
view of the relations that we have already obtained, we can assume that at least one swap
from T13 and at least one from T23 occur within our relation. The relations we need to establish
are therefore, for x, y, z ∈ X, the following:
[(x x̄yz), (x̄ȳ x̄y z̄)] = 1
(x x̄ȳz)
(x x̄y)
(3.18)
= (x̄y x̄ȳz)
(3.19)
(x x̄y)(x̄y x̄ȳz) = (x x̄ȳz)
(x x̄ȳ)
(x x̄yz)
(3.20)
= (x̄ȳ x̄yz)
(3.21)
For Equation (3.18), take the equation [(00 10), (01 11)] = 1, conjugate by (1 00) and use the
definition in (2.8) and Lemma 3.3(ii) to conclude [(1 000), (01 001)] = 1. The required equation
then follows, as usual, by use of Lemmas 3.2 and 3.4.
For Equation (3.19), we calculate as follows:
(1 00)(1 01z) = (1 00)(00 01) (1 00z) (00 01)
by the definition in (2.8)
(1 00z) (00 01)
by the definition in (2.7)
(1 00) (00 1z) (1 00) (00 01)
by the definition in (2.8)
= (1 01)
= (1 01)
= (01 1z)(1 00) (00 01)
using Rels. R2 and R1
(00 01)
= (01 00z)
by Eq. (3.11)
= (00 01z)
by Lem. 3.4.
The required equation now follows using Lemmas 3.1, 3.2 and 3.4.
For Equation (3.20), our main calculation is
(1 00)(00 01z) = (1 00)(1 00) (1 01z) (1 00) = (1 00)(1 01z) (1 00)
= (00 01z)(1 00) = (1 01z),
obtained by exploiting the definition of (00 01z) in (2.9) and Equation (3.19) above. The required
equation again follows by Lemmas 3.1, 3.2 and 3.4.
Equation (3.21) follows from the definition of (1 01z) as in Equation (2.8) with use of
Lemmas 3.1, 3.2 and 3.4.
17
First relations involving T2 and T3 only
We now introduce swaps from T3 into the relations we verify. The first step is to establish that
swaps from T3 behave well when we conjugate by one from T2 and then our other split relation.
All other relations involving just swaps from T2 and T3 will have to wait until we have established
some more intermediate relations. Accordingly, we start with the following for x, y ∈ X, distinct
κ, λ ∈ X 2 and τ ∈ T2 for which Equation (3.22) is defined:
(κx λy)τ = ((κx)·τ (λy)·τ )
(3.22)
(κ λ) = (κ0 κ1) (λ0 λ1)
(3.23)
As with those from T23 , we begin with a lemma to manipulate the basic T3 -swaps from the
definition in (2.10). In particular, we will establish Equation (3.22) as part (iv) in the lemma.
Lemma 3.6
(i) (000 01x)(1 00) = (10 01x), for any x ∈ X;
(ii) (001 011)(1 00) = (11 011);
(iii) (000 010), (000 011) and (001 011) each commute with (10 11).
(iv) All conjugacy relations of the form σ τ = υ, where σ, υ ∈ T3 and τ ∈ T2 , can be deduced
from Relations R1–R5.
(v) (001 010)(1 00) = (11 010);
Proof: (i) We calculate as follows:
(000 01x)(1 00) = (1 000)(1 01x) (1 00)
by the definition in (2.10)
= (1 000)(1 00) (00 01x)
(00 01x)
by Eq. (3.21)
= (00 10)
by the definition in (2.8)
= (10 01x)
by Eq. (3.9).
Part (ii) is established in exactly the same way.
(iii) We perform the following calculations:
(000 01x)(10 11) (1 00)
= (10 01x)(1 00) (10 11) (1 00)
by part (i)
(10 000) (11 001) (10 11) (1 00)
by Rel. R3
(11 000) (10 001) (1 00)
= (11 01x)
by Lem. 3.4
= (11 01x)(11 000) (1 00)
by Eq. (3.17) twice
= (10 01x)
(11 000) (10 000) (11 001)
= (11 01x)
by Rel. R3
= (11 01x)(10 000) (10 11) (11 001)
by Eq. (3.9)
= (11 01x)(10 11) (11 001)
by Eq. (3.17)
(11 001)
= (10 01x)
by Lem. 3.4
= (10 01x)
by Eq. (3.17).
Thus (000 01x)(10 11) = (10 01x)(1 00) = (000 01x), again by part (i). A similar argument,
using (ii), shows that (001 011) commutes with (10 11).
(iv) When σ (and υ) has the form (κ0 κ1), this result was established in Lemma 3.5(iii).
All remaining swaps in T3 are defined by conjugating one of (000 010), (000 011) or (001 011)
18
by some product of elements from T2 . The result then follows by the same argument, but now
relying upon part (iii).
(v) appears to be similar to the first two parts of the lemma, but actually requires a different
argument, based on what we have just established:
(001 010)(1 00) = (000 011)(00 01) (1 00) = (000 011)(1 00) (1 01)
= (10 011)(1 01) = (11 010),
by part (iv), Relation R2, part (i) and Equation (3.12).
Equation (3.23) is now established by taking the equation (1 01) = (10 010) (11 011), which
is an instance of Equation (3.8), and conjugating by (1 00) to yield
(00 01) = (000 010) (001 011),
using Relation R2 and Lemma 3.6(i) and (ii). The required relation then follows by conjugating
by a product of elements from T2 and using the Relations R1 and Lemma 3.6(iv).
Further intermediate relations involving T23 and T3
Our principal direction of travel at this stage is to complete the verification of those relations
involving swaps from T2 and T3 to supplement those in Equations (3.22) and (3.23). However,
to achieve this we need some intermediate results making use of swaps from T23 , specifically, for
x ∈ X, distinct κ, λ, µ ∈ X 2 and distinct α, β ∈ X 3 for which κ ⊥ α, β, the following:
(κ α)(κ β) = (α β)
(α β)
(κ α)
(3.24)
= (κ β)
(3.25)
[(κ λx), (µ0 µ1)] = 1
(3.26)
For Equation (3.24), first note that Equation (3.13) deals with the case when α and β share
the same two-letter prefix. For the remaining cases, first observe
(10 000)(10 010) (1 010)
= (10 000)(10 010) (11 011) (1 010)
by Eqs. (3.16) and (3.17)
= (10 000)(1 01) (1 010)
by Eq. (3.8)
= (10 000)(01 10) (1 01)
by Eq. (3.6)
(1 01)
= (01 000)
by Lem. 3.4
= (1 000)
by Eq. (3.21).
Hence (10 000)(10 010) = (1 000)(1 010) = (000 010), using the definition in Equation (2.10). A
similar argument establishes (11 000)(11 011) = (1 000)(1 011) = (000 011). Equally we apply a
variant of the argument to obtain further equations:
(10 011)(10 000) (1 011) = (10 011)(1 00) (1 011)
(00 011) (1 00)
arguing as before
= (10 011)
by Eq. (3.21)
= (00 10)(1 00)
by Eq. (3.9)
= (1 000)
by the definition in (2.8).
Thus we obtain (10 011)(10 000) = (1 000)(1 011) = (000 011). Similarly we determine the equation
(11 011)(11 001) = (001 011). Thus given any choice of x, y ∈ X, we have obtained one example
of a relation
(κ λx)(κ µy) = (λx µy)
19
(for some choice of distinct κ, λ and µ.) We can then obtain all examples by use of Lemmas 3.4
and 3.6(iv). This completes the establishment of Equation (3.24).
Equation (3.14) is already Equation (3.25) in the case when α and β share the same twoletter prefix. For the remaining cases, use Equation (3.24) to tell us (1x 000)(1x 01y) = (000 01y)
for any x, y ∈ X. Conjugate this equation by (1 00) and use Equation (3.12) and parts of
Lemma 3.6 to establish (10 00x)(00x 01y) = (10 01y). All cases of Equation 3.25 now follow by
conjugating by an appropriate product of elements from T2 .
For Equation (3.26), start with the fact that (10 11) commutes with (000 01x) for any x ∈
X (Lemma 3.6(iii)). Conjugate by (1 00) and use Lemmas 3.5(i) and 3.6(i) to conclude
[(000 001), (01 01x)] = 1. Then conjugating by a product of swaps from T2 establishes the
required equation.
Remaining relations involving only T2 , T23 and T3
Having established the intermediate relations, we can now establish all remaining relations
involving swaps only from T2 and T3 . We obtain those also involving swaps from T23 at the same
time. When one analyses the relations required, we find that they are, for x, y ∈ X, distinct
κ, λ ∈ X 2 and distinct α, β, γ, δ ∈ X 3 , the following:
[(κ0 κ1), (λx µy)] = 1
(κ0 κ1)
(κx λy)
(3.27)
= (κx̄ λy)
(3.28)
[(κ α), (β γ)] = 1
for κ ⊥ α, β, γ
(α β)(α γ) = (β γ)
(3.29)
(3.30)
[(α β), (γ δ)] = 1
(3.31)
We establish Equation (3.27) by choosing ν to be the element in X 2 \ {κ, λ, µ}, using Equation (3.24) to tell us (λx µy) = (ν λx)(ν µy) and then, as Equation (3.26) says that both (ν λx)
and (ν µy) commute with (κ0 κ1), we establish Equation (3.27).
By Lemma 3.4, (1x 01y)(10 11) = (1x̄ 01y) for any x, y ∈ X. Conjugate by (1 00) and
use Lemma 3.5(i) and parts of Lemma 3.6 to conclude (00x 01y)(000 001) = (00x̄ 01y). Equation (3.28) then follows.
Our final equation involving swaps from T23 and T3 is Equation (3.29). We need to establish
this in a number of stages. If x ∈ X, we know that (10 11) commutes with the swap (000 01x) by
Lemma 3.6(iii). If we conjugate by (1 00) and use Lemma 3.5(i) and Lemma 3.6(i), we conclude
[(10 01x), (000 001)] = 1. We then deduce Equation (3.29) in the case when β and γ share the
same two-letter prefix in our now established manner.
The second case of the equation is when α and β share their two-letter prefix. Equation (3.17)
tells us that [(1x 000), (1x̄ 01y)] = 1 for any x, y ∈ X. Now conjugate by (1 00) and use
Equation (3.12) and parts of Lemma 3.6 to conclude [(10 00x), (00x̄ 01y)] = 1. Equation (3.29)
when α and β share their two-letter prefix then follows.
It remains to deal with the case when α, β and γ have distinct two-letter prefixes. One
particular case is our Relation R5: [(10 110), (000 010)] = 1. Conjugating by (110 111), using
Equation (3.14) and (3.27), we deduce [(10 111), (000 010)] = 1. Similarly, conjugating what we
now have, [(10 11x), (000 010)] = 1 for any x ∈ X, by (000 001) and use (3.26) and (3.28) to
now conclude that [(10 11x), (00y 010)] = 1 for all x, y ∈ X. Finally use the same argument,
conjugating by (010 011), to conclude [(10 11x), (00y 01z)] = 1 for all x, y, z ∈ X. The remaining
case of Equation (3.29) now follows.
One case of Equation (3.30), namely when α and γ share the same two-letter prefix, has
already been established as Equation (3.28). For the case when α and β share the same twoletter prefix, start with the equation (10 11)(1x 01y) = (1x̄ 01y), for x, y ∈ X, as given by
Equation (3.9). Conjugate by (1 00) and use Lemma 3.5(i) and parts from Lemma 3.6 to
20
conclude (000 001)(00x 01y) = (00x̄ 01y). From this the general formula (κ0 κ1)(κx λy) = (κx̄ λy)
follows for distinct κ, λ ∈ X 2 .
For the case when α, β and γ have distinct two-letter prefixes, say α = κx, β = λy and
γ = µz, choose ν to be the other element of X 2 . Then
(α β)(α γ) = (κx λy)(κx µz) = (κx λy)(ν κx) (ν µz) (ν κx)
= (ν λy)(ν µz) (ν κx)
= (λy µz)(ν κx) = (λy µz) = (β γ),
by Equations (3.24) (used three times) and (3.29).
Part of Equation (3.31) has already been established as Equation (3.27), but we shall deal
with our required relation in full generality. Indeed, first assume that α, β, γ and δ have between
them at most three distinct two-letter prefixes. Let ν ∈ X 2 be different from those two-letter
prefixes. Then write (γ δ) as (ν γ) (ν δ) (ν γ), by Equation (3.24), and observe this commutes
with (α β) using Equation (3.29).
The case when α, β, γ and δ have four distinct two-letter prefixes can then be deduced as
follows. Suppose as α = κx for some κ ∈ X 2 and x ∈ X. By the previous case, (α β) commutes
with both (κx̄ γ) and (κx̄ δ), and hence it also commutes with (γ δ) = (κx̄ γ)(κx̄ δ) , using
Equation (3.30).
Relations involving T3 , at least one of T12 , T13 and T23 , and possibly T2
We now establish the final batch of relations for this section. These involve swaps from T3 and
at least one of T12 , T13 and T23 , and are the following for x, y, z, t ∈ X and distinct α, β, γ ∈ X 3
satisfying x 6≺ α, β, γ:
(x̄y0 x̄y1)(x x̄y) = (x0 x1)
[(x α), (β γ)] = 1
(α β)
(x α)
(3.32)
(3.33)
= (x β)
(3.34)
(α β)(x α) = (x β)
(3.35)
(x̄yz x̄ȳt)(x x̄y) = (xz x̄ȳt)
(3.36)
Equation (3.32) follows from Lemma 3.5(i) by our standard T2 -conjugation argument.
Equation (3.33) follows by taking the relation [(00 1y), (1ȳ 01z)] = 1 and the relation
[(00 1y), (010 011)] = 1, which hold by Lemmas 3.4 and 3.6(iv) respectively, and then conjugating by (1 00) and proceeding as in previous arguments to conclude that [(x κy), (κȳ λz)] = 1
and [(x κy), (λ0 λ1)] = 1 for any x, y, z ∈ X and any distinct κ, λ ∈ X 2 with x 6≺ κ, λ.
To establish Equation (3.34), conjugate the already established equations (00 1y)(10 11) =
(00 1ȳ) and (00 1y)(1y 01z) = (00 01z), for y, z ∈ X, by (1 00). This yields (1 00y)(000 001) =
(1 00ȳ) and (1 00y)(00y 01z) = (1 01z), which now yields the two forms of Equation (3.34):
(x κy)(κ0 κ1) = (x κȳ) and (x κy)(κy λz) = (x λz) for any x, y, z ∈ X and distinct κ, λ ∈ X 2 with
x 6≺ κ, λ.
For Equation (3.35), we shall show (000 001)(1 00x) = (1 00x̄) and (00x 01y)(1 01y) = (1 00x)
for any x, y ∈ X. Four of these occurrences are found in the definitions in (2.10), while the other
two are deduced by conjugating (10 11)(00 10) = (00 11) and (11 010)(00 010) = (00 11) by (1 00).
The required equation then follows.
Finally, for Equation (3.36), from Lemma 3.6: (00z 01t)(1 00) = (1z 01t) for any z, t ∈ X.
Then as in the previous equations we conjugate by products of elements from T2 .
We have now established all required relations of the form σ τ = υ where σ, τ and υ come
from the sets T2 , T12 , T13 , T23 and T3 . This is the first stage in establishing the existence of the
homomorphism ψ in Diagram (2.12) and, in particular, the verification of Theorem 1.2.
21
4
Verifying the Cannon–Floyd–Parry relations
In this section we describe how to verify that all the relations that hold in R. Thompson’s
group V can be deduced from those assumed in Relations R1–R5. We shall rely upon the work
in the previous section. One might wonder whether it is possible to proceed more directly to
show, for example, that all relations holding in V can be deduced from the infinitely many in
the presentation in Theorem 1.1. It is a consequence of our results that this can be done, but
our own attempt to do so resulted in overly long arguments replicating those already found in
Section 6 of [12]. We have chosen the more direct method of verifying the finite set of relations
known already to define V .
In their paper (see [12, Lemma 6.1]), Cannon–Floyd–Parry provide the following presentation
for V . It has generators A, B, C and π0 and relations
CFP1.
CFP2.
CFP3.
CFP4.
CFP5.
CFP6.
CFP7.
[AB −1 , X2 ] = 1;
[AB −1 , X3 ] = 1;
C1 = BC2 ;
C2 X2 = BC3 ;
C1 A = C22 ;
C13 = 1;
π12 = 1;
CFP8.
CFP9.
CFP10.
CFP11.
CFP12.
CFP13.
CFP14.
π1 π3 = π3 π1 ;
(π2 π1 )3 = 1;
X3 π1 = π1 X3 ;
π1 X2 = Bπ2 π1 ;
π2 B = Bπ3 ;
π 1 C3 = C3 π 2 ;
(π1 C2 )3 = 1;
where the elements appearing here are defined by the following formulae Cn = A−n+1 CB n−1 ,
Xn = A−n+1 BAn−1 both for n > 1, π1 = C2−1 π0 C2 and πn = A−n+1 π1 An−1 for n > 2.
Recall from Section 2 that P3 is the group presented by generators a = (00 01), b =
(01 10) (01 11) and c = (1 00) subject to relations R1–R5. Define four new elements of P3 by
Ā = (0 1) (0 10) (10 11);
B̄ = (10 11) (10 110) (110 111);
C̄ = (10 11) (0 10);
π̄0 = (0 10),
and then new elements C̄n , X̄n and π̄n for n > 1 defined in terms of these four by same formulae
used when defining the relations for V .
It is a consequence of the relations involving swaps from the sets T2 , T12 , T13 , T23 and T3
established in the previous section (i.e., Equations (3.1)–(3.36)) that the elements Ā, B̄, C̄ and
π̄0 satisfy CFP1–CFP14. To verify this is a sequence of calculations. Below we present the verification of CFP1 for these elements. For the entertainment of the reader, Relation CFP2 required
the longest calculation whilst the others are more straightforward. The following formulae are
useful for this work.
Lemma 4.1 The following formulae hold in G:
(i) ĀB̄ −1 = (00 01) (01 10) (0 10);
(ii) X̄2 = (0 11) (00 01) (00 010) (010 011) (0 11);
(iii) X̄3 = (0 111) (00 01) (00 010) (010 011) (0 111);
(iv) C̄2 = (0 10) (0 111) (110 111);
(v) C̄3 = (0 110) (10 111) (0 100) (0 101) (10 110) (110 111);
(vi) π̄1 = (10 110);
(vii) π̄2 = (0 11) (00 010) (0 11);
(viii) π̄3 = (0 111) (00 010) (0 111).
22
Proof: We verify the two formulae, (i) and (ii), required to verify CFP1. Below, we principally
rely upon the conjugacy relations, although a split relation is applied in one step. The other
formulae listed are established similarly.
(i) We calculate
ĀB̄ −1 = (0 1) (0 10) (10 11) · (110 111) (10 110) (10 11)
= (0 1) (0 10) (100 101) (11 100)
= (0 1) (00 01) (00 11) (0 10)
= (00 10) (01 11) (00 01) (00 11) (0 10)
= (00 01) (01 10) (0 10).
(ii) We start with the definition of Ā and B̄:
X̄2 = Ā−1 B̄ Ā
= (10 11) (0 10) (0 1) · (10 11) (10 110) (110 111) · (0 1) (0 10) (10 11)
= (10 11) (0 10) (00 01) (00 010) (010 011) (0 10) (10 11)
= (0 11) (00 01) (00 010) (010 011) (0 11).
We now verify that the elements Ā, B̄, C̄ and π̄0 of our P3 satisfy the relation CFP1:
[ĀB̄ −1 , X̄2 ] = (0 10) (01 10) (00 01) · (0 11) (010 011) (00 010) (00 01) (0 11)
· (00 01) (01 10) (0 10) · (0 11) (00 01) (00 010) (010 011)
· (0 11)
= (0 11) (10 11) (10 111) (110 111) (010 011) (00 010) (00 01)
· (0 11) (00 01) (01 10) (0 10) (0 11) (00 01) (00 010)
· (010 011) (0 11)
= (0 11) (10 11) (10 111) (110 111) (010 011) (00 010) (00 01)
· (110 111) (10 111) (10 11) (00 01) (00 010) (010 011) (0 11)
= (0 11) (11 101) (100 101) (010 011) (00 010) (00 01) (100 101)
· (11 101) (00 01) (00 010) (010 011) (0 11)
= (0 11) (11 101) (100 101) (010 011) (00 010) (100 101)
· (11 101) (00 010) (010 011) (0 11)
= (0 11) (11 101) (010 011) (00 010) (11 101) (00 010) (010 011)
· (0 11)
= (0 11) (11 101) (010 011) (11 101) (010 011) (0 11)
=1
(by first collecting (0 11) to the left, then conjugating some swaps by (0 11), some by (10 11),
some by (00 01), some by (100 101), then single swaps by (00 010) and by (11 101), and finally
exploiting the fact our swaps have order 2).
Once we have established the fourteen relations CFP1–CFP14, it follows that there is indeed
a surjective homomorphism ψ : V → hĀ, B̄, C̄, π̄0 i, as indicated in the Diagram (2.12) and used
in the proof of Theorems 1.1 and 1.2.
5
Final details for the proofs
In this section, we complete the technical details relied upon in the proofs given in Section 2.
23
We first need to show that the subgroup hĀ, B̄, C̄, π̄0 i coincides with the group P3 . Indeed
observe this subgroup contains all the following elements:
π̄0 = (1 00) = c
C̄ π̄0 = (10 11)
(C̄ π̄0 )ĀC̄ = (10 11)(0 1) = (00 01) = a
π̄0B̄
π̄0B̄
−1 C̄
−1 C̄
= (0 10)(110 111) (10 110) (0 10) = (10 110)
C̄ π̄0 B̄ = (110 111)
and
(10 110)(110 111) (10 11) (0 10) (10 11) = (01 10).
The Relations R1 ensure that b ∈ h(00 01), (01 10), (10 11)i, and so we now conclude that this
subgroup generated by Ā, B̄, C̄ and π̄0 is the whole group P3 . This establishes the following result
and means that we have now completed all the details required for the proofs of Theorem 1.1
and 1.2.
Proposition 5.1 The elements Ā, B̄, C̄ and π̄0 , defined earlier, generate the group P3 .
Finally, we deduce a 2-generator presentation for V from Theorem 1.2. As noted in Section 2,
the following is the intermediate step used to establish Theorem 1.3. Although the latter depends
on computer calculation, the following is established by purely theoretical methods in line with
our proofs of Theorems 1.1 and 1.2.
Corollary 5.2 R. Thompson’s group V has a finite presentation with two generators and nine
relations.
Proof: We work in the group P3 . Define u and v to be the elements
u = (00 01) (10 110) (10 111)
and
v = b = (01 10 ).
(When interpreted via the isomorphism from P3 to V , obtained by composing the maps specified
in the diagram (2.12), these two elements correspond to the element of V given by tree-pairs in
Figure 3 in the Introduction.)
If we rely upon the relations that hold in P3 (i.e., simply calculating within R. Thompson’s
group V , as, by this stage, we have completed all steps in establishing Theorem 1.2), then we
can obtain a formula for u as a product of the generators a, b and c, for example,
b ab−1 a
u = w(a, b, c) = a(ab ab )caca
−1
and the following formulae:
a = (00 01) = u3 ,
(10 000) = (u3 )vu
−2 vu3
,
vu−1 vu3 v
(11 001) = (u3 )
3
3
Therefore c = γ(u, v) = (u3 )vu vu (u3 )vu vu v . If r1 (a, b, c), r2 (a, b, c), . . . , r8 (a, b, c) denote
the words in a, b and c that define our relations (see the Equations (2.4) in Section 2, or
alternatively, Equations (2.3)), then applying Tietze transformations shows that
V ∼
= u, v r1 u3 , v, γ(u, v) = r2 u3 , v, γ(u, v) = · · · =
r8 u3 , v, γ(u, v) = 1, u = w u3 , v, γ(u, v) .
−2
−1
This establishes the corollary.
24
As we described in Section
2, Theorem 1.3 is deduced from this presentation. We produce
the formulae ri u3 , v, γ(u, v) , for i = 1, 2, . . . , 8, by taking ri to be the formulae in (2.4).
We then apply the process of producing equivalent relations for this 2-generator presentation
by repeatedly using the Knuth–Bendix Algorithm as described in Section 2. It is during this
process that we discover that two of the relations can be omitted since the relevant word reduces
to the identity. The remaining seven relations reduce to those listed in Theorem 1.3.
Acknowledgements: The authors wish to acknowledge partial support by EPSRC grant
EP/H011978/1. We further wish to recognise our gratitude to the authors of the computer
packages that greatly assisted when we performed calculations and also helped to reduce our
presentations: GAP, KBMAG and the Java VTrees applet written by the first author and Roman
Kogan.
References
[1] James Belk and Bradley Forrest, “Rearrangement groups of fractals,” 2015 (preprint).
arXiv:1510.03133
[2] Jean-Camille Birget, “Circuits, the groups of Richard Thompson, and coNP-completeness,”
Internat. J. Algebra Comput. 16 (2006), no. 1, 35–90.
[3] Jean-Camille Birget, “Factorizations of the Thompson–Higman groups, and circuit complexity,” Internat. J. Algebra Comput. 18 (2008), no. 2, 285–320.
[4] Collin Bleak, Francesco Matucci and Max Neunhöffer, “Embeddings into Thompson’s
group V and coCF groups,” J. Lond. Math. Soc. (2) 94 (2016), no. 2, 583–597.
[5] Collin Bleak and Olga, Salazar-Dı́az, “Free products in R. Thompson’s group V ,” Trans.
Amer. Math. Soc. 365 (2013), no. 11, 5967–5997.
[6] Matthew G. Brin, “Higher dimensional Thompson groups,” Geom. Dedicata 108 (2004),
163–192.
[7] Matthew G. Brin, “On the baker’s map and the simplicity of the higher dimensional Thompson groups nV ,” Publ. Math. 54 (2010), no. 2, 433–439.
[8] Kenneth S. Brown, “Finiteness properties of groups,” J. Pure Appl. Algebra 44 (1987),
no. 1–3, 45–75.
[9] Kenneth S. Brown and Ross Geoghegan, “An infinite-dimensional torsion-free FP∞ group,”
Invent. Math. 77 (1984), no. 2, 367–381.
[10] Marc Burger and Shahar Mozes, “Finitely presented simple groups and products of trees,”
C. R. Acad. Sci. Paris Sér. I Math. 324 (1997), no. 7, 747–752.
[11] Marc Burger and Shahar Mozes, “Groups acting on trees: from local to global structure,”
Inst. Hautes Études Sci. Publ. Math. No. 92 (2001), 113–150.
[12] J. W. Cannon, W. J. Floyd & W. R. Parry, “Introductory notes on Richard Thompson’s
groups,” Enseign. Math. (2) 42 (1996), no. 3–4, 215–256.
[13] Patrick Dehornoy, “Geometric presentations for Thompson’s groups,” J. Pure Appl. Algebra 203 (2005), no. 1–3, 1–44.
[14] The GAP Group, GAP – Groups, Algorithms, and Programming, Version 4.7.8, 2015,
http://www.gap-system.org.
25
[15] Graham Higman, Finitely presented infinite simple groups, Notes on Pure Mathematics,
No. 8 (1974), Department of Pure Mathematics, Department of Mathematics, I.A.S. Australian National University, Canberra, 1974.
[16] Derek Holt, KBMAG, Knuth–Bendix on Monoid and Automatic Groups, Version 1.5, 2009,
http://www.warwick.ac.uk/~mareg/kbmag.
[17] Dessislava H. Kochloukova, Conchita Martı́nez-Pérez and Brita E. A. Nucinkis, “Cohomological finiteness properties of the Brin–Thompson–Higman groups 2V and 3V ,” Proc.
Edinb. Math. Soc. (2) 56 (2013), no. 3, 777–804.
[18] Mark V. Lawson, “Orthogonal completions of the polycyclic monoids,” Comm. Algebra 35
(2007), no. 5, 1651–1660.
[19] Mark V. Lawson, “Subgroups of the group of homeomorphisms of the Cantor space and
a duality between a class of inverse monoids and a class of Hausdorff étale groupoids,” J.
Algebra 462 (2016), 77–114.
[20] Conchita Martı́nez-Pérez and Brita E. A. Nucinkis, “Bredon cohomological finiteness conditions for generalisations of Thompson groups,” Groups Geom. Dyn. 7 (2013), no. 4,
931–959.
[21] Diego Rattaggi, “A finitely presented torsion-free simple group,” J. Group Theory 10
(2007), no. 3, 363–371.
[22] Derek J. S. Robinson, A Course in the Theory of Groups, Second Edition, Graduate Texts
in Mathematics 80, Springer-Verlag, New York, 1996.
[23] Richard J. Thompson, Handwritten widely circulated notes, 1965.
[24] Werner Thumann, “Operad groups and their finiteness properties,” Adv. Math. 307 (2017),
417–487.
26
| 4math.GR
|
The Karyotype Ontology: a computational representation
for human cytogenetic patterns
Jennifer D. Warrender and Phillip Lord∗
arXiv:1305.3758v1 [cs.CE] 16 May 2013
School of Computing Science, Newcastle University, Newcastle-upon-Tyne, UK
ABSTRACT
The karyotype ontology describes the human chromosome
complement as determined cytogenetically, and is designed as an
initial step toward the goal of replacing the current system which is
based on semantically meaningful strings. This ontology uses a novel,
semi-programmatic methodology based around the tawny library to
construct many classes rapidly. Here, we describe our use case,
methodology and the event-based approach that we use to represent
karyotypes.
The ontology is available at http://www.purl.org/ontolink/
karyotype/. The clojure code is available at http://code.
google.com/p/karyotype-clj/.
complement of a human, as determined cytogenetically by the
banding patterns which are revealed after staining and fixation of
metaphase cells. The ISCN specification has a long history. Initially,
it was developed to address the need for an explicit nomenclature
“to enable communication between workers in the field”. The
early versions date from around 1960, when the emphasis was
on human-to-human communication, and for small numbers of
karyotypes.
ISCN strings represents a number of key concepts:
• The autosomal chromosomes are represented by a number 1 to
22.
• The sex chromosomes are represented by X or Y.
1
INTRODUCTION
A karyotype describes the chromosome complement of the
individual. It can be easily assayed cytogenetically and, therefore,
has been widely used as a mechanism for understanding the
underlying genetic complement of cells and organisms. It remains
of vital diagnostic importance, as well as a key tool for a large
research community. Human karyotypes are normally represented
using a string, as defined by the International System for human
Cytogenetic Nomenclature 2009 (ISCN2009) (Shaffer et al., 2009)
— here we call these ISCN strings. Unlike similar string-based
representations such as InCHI (McNaught, 2006), ISCN strings
lack a formal interpretation, and do not have good computational
properties. For example, they cannot be represented in ASCII as
they include meaningful underlining. Even the ISCN specification
has no electronic representation and is not searchable.
In this paper, we describe our work in developing an ontological
representation for karyotypes. Currently, karyotypes have only
been represented as experimental entities, or results of medical
procedures. The purpose of our ontology is to provide a strong
computational and formal interpretation for a karyotype. This will
enable semantic (and syntactic) checking of karyotypic information
at the point of generation; it will allow the development of a
knowledge base of karyotypes which is open to rich querying, and
finally a web-capable interchange format as many different groups
around the world generate this information.
2
WHAT IS AN ISCN STRING
whom
correspondence
[email protected]
should
• Bands at different resolutions are represented numerically such
as 1p11.1.
• Changes from the base karyotypes are represented: del
represents a deletion, add represents additional material.
In addition to these concepts, there are many more that can be
represented in an extended karyotype: these include chromosomal
groups, mosaicism, ploidy level and so forth. The full specification,
describes many parts of human cytogenetics, including both the
biology and the experimental techniques used. As would be
expected for a specification with a long history, not all parts are
regularly used.
Banding Patterns used to describe chromosome locations are
defined cytogenetically by the appearance of the chromosome,
during a part of division, following staining with a dye; this staining
process is normally lethal to the cell. The original banding pattern
described in the Paris Conference 1971 report, represented the
results of three whole chromosome banding techniques: Quinacrine(Q-), Giemsa- (G-), and Reverse-banding (R-).
The main components of stained chromosomes are:
• A band is a part of the chromosome that is distinguishable
from its adjacent segments, appearing darker or lighter. Bands
proximal to the centromere are labelled as 1, then 2 and so on.
ISCN defines a string format, initially designed for writing and
printing, which provides a representation of the chromosome
∗ To
• Chromosomal structural components are represented: The long
and short arm are represented by q and p; centromeres are
represented by cen or more specifically, p10 for the part of
the centromere facing the short arm or q10 for part facing the
long arm; and telomeres are represented by ter.
be
• A region is an area of a chromosome lying between two
landmarks. Regions adjacent to the centromere are labelled as
1 in each arm, then 2 and so on.
addressed:
1
Jennifer D. Warrender and Phillip Lord4
• A landmark is a consistent and distinct morphological
feature of a chromosome. They are used as a delimiters for
regions.
Bands are represented numerically such that bands are numbered
from the centromere outward. The band name is a combination of:
the chromosome number, the arm symbol, the region number, and
the band number within that region. For example, the band 1q42
is found on the long arm of chromosome 1 and is the second band,
proximal to the centromere in region 4. Broadly speaking there is a
correlation between the cytogenetic bands and the underlying DNA
sequence of the chromosome; however, the very different scales
(1q42 is 12.4Mb long) of these two measurements means that this
relationships is approximate.
Cytogenetic banding also comes at several resolutions: highresolution banding involves the staining of chromosomes during
prophase, prometaphase, or interphase when the chromosomes
are less condensed and spread over a large area; low-resolution
uses the highly-condensed metaphase chromosome. The level of
resolution is determined by the number of bands seen in a haploid
set and ranges approximately from 300 to 850. High-resolution
banding techniques result in existing bands being subdivided into
sub-bands. Whenever a band is subdivided, a decimal place is
placed after the original band number, and the sub-band number is
appended to the band name with proximal sub-bands bring labelled
1, then 2 and so on. For example, the sub-bands of band 1q42 will
be: 1q42.1, 1q42.2, and 1q42.3, such that sub-band 1q42.1
is more proximal to the centromere. However when a sub-band is
subdivided, then no additional decimal is added. For example, the
sub-bands of sub-band 1q42.1 are: 1q42.11, 1q42.12, and
1q42.13.
Typical queries that we might wish to make of a collection of
karyotypes include:
“portions of reality”; for instance, a chromosome in a live cell
cannot meaningfully be said to have bands. These distinctions can
be represented ontologically, however the result is a ontology with
many duplicated hierarchies: chromosome 1, stained chromosome
1, and the visualisation of chromosome 1.
As these distinctions are not required for our application, we
have instead followed a pragmatic approach (Lord and Stevens,
2010). We have developed a lightweight ontology with specific
computational goals. Our desire for computational support and
inferencing, as well as a web-capable interchange format, has lead
us to adopt OWL2 as our representation format.
While avoiding a realist approach has reduced some duplication,
karyotype ontology still requires a considerable number of highly
similar concepts, which is intrinsic to the problem domain.
Trivially, for instance, the human karyotype requires 24 individual
chromosome concepts, with similar logical and textual definitions.
In turn, each chromosome has a complex band pattern (over
850 bands in total), including band intervals for use at different
resolutions. Developing this type of ontology would be complex,
time consuming and difficult to maintain using conventional tools.
Therefore, we developed the tawny library, which allows fully
programmatic development of OWL ontologies (Lord, 2013). This
library allows expansion of arbitrary patterns; this is similar to the
capabilities of OPPL(Egana Aranguren et al., 2009), populous (Jupp
et al., 2010) or safe macros (Mungall et al., 2010). However, it
additionally provides us with the ability to define unit tests to
provide computationally checkable expressions of the requirements
for inferencing, a semi-literate programming environment, and
the ability to make arbitrary syntactic extensions. The syntax is
modelled after and highly similar to Manchester syntax, therefore
it is presented here without further explanation; a fuller description
is provided in the tawny documentation2 .
The basic structure of our ontology is shown in Figure 1.
• Which karyotypes have abnormalities in a given chromosome?
• Which karyotypes increase the copy number of a given band?
• Which karyotypes affects a given band in any way?
Currently, these are hard to answer computationally because of the
complexity of the ISCN strings, as well as intrinsic complexity of
the biology. Our karyotype ontology aims to address the former, and
contain the latter.
3
OUR METHODOLOGY
For the karyotype ontology, we have a very specific requirement
which is to enable machine interpretation of the knowledge that
is currently represented in ISCN strings. One of the implications
of this is that our knowledge capture is extremely contained;
essentially all the knowledge we require is present in the ISCN2009
specification1 . Our task is to formalise and represent this.
Our initial experiments with a realist ontology showed a number
of difficulties; the distinction between a chromosome (as a piece
of DNA and protein), the experimental artefact (following staining)
and the visualisation of the experimental artefact are all different
Fig. 1. The abstract structure of the karyotype ontology.
While ISCN2009 contains most of the knowledge we need, it is
informally represented; it sometimes lacks the clarity and contains
contradictions; trivially, for instance, Group G is described as
having satellites (page 7), while Chromosome Y (a member of
Group G) is described as having no satellites. A similar confusion
lies over the instance/type distinction. So, while for an individual
1
During the course of the work described here, ISCN2013 was released (in
2012!). We have not updated for this version yet.
2
2
https://github.com/phillord/tawny-owl
• Insertion: Band insertion between chromosomes. Specialised
with DirectInsertion or InverseInsertion.
organism or cell line all (normal) Chromosome 21s have (visible)
satellites, an individual chromosome, in an individual cell may
not3 . Similarly small supernumerary marker chromosomes (sSMCs)
cannot be fully represented in ISCN2009 (Liehr, 2009). This means
that an ontological representation of the ISCN2009 specification
cannot therefore be a completely faithful representation.
• Inversion: Band inversion, both paracentric and pericentric.
• Quadruplication: Band quadruplication.
• Translocation: Band translocation between chromosomes.
• Triplication: Band triplication.
4
REPRESENTING ABNORMALITIES
Our initial experiments attempt to represent karyotypes as a rich
partonomy, using the concepts described in the previous section. For
example, the normal male karyotype 46,XY would be described
as having 46 chromosomes of the appropriate types. One problem
with this approach is that the definition of any karyotype is relatively
large; while tawny enables the generation of this form of concept, it
cannot reduce the complexity for reasoners; so this form of ontology
is not likely to scale well. Further, a simple partonomy is not a
rich enough representation, as it cannot represent simple inversions
which contain all the same parts, but not necessarily in the right
order. While it is possible to represent order in OWL (Drummond
et al., 2006), this would add more complexity and scaling issues.
Further, there are some strong edge cases that are not complex,
but impossible to represent as a partonomy; for example, the
karyotype 45,X,-Y describes the chromosomes of a cell line,
isolated from a normal male, which has lost its Y chromosome. This
is a different karyotype but is partonomically indistinguishable from
45,X, a phenotypically female individual with Turners syndrome.
Therefore we represented karyotypes using events: a karyotype is
described as a set of changes from a base or normal karyotype.
For example, 45,X,-Y is described as a 46,XY male, with a
deletion event of Y, while 45,X female is described as a 46,XN,
with a deletion event of a sex chromosome (see Listing1): in this
case N represents an unknown autosome. OWL can represent partial
knowledge straight-forwardly.
(defclass k45_X
:label "The 45,X karyotype"
:subclass ISCNExampleKaryotype
(owlsome derivedFrom k46_XN)
(deletion 1 HumanSexChromosome))
Listing 1. A basic class definition
In total there are 13 events that represent the following key
concepts:
• Addition: Chromosome gain or band addition.
• Deletion: Chromosome loss or band deletion, including
terminal deletion with break (:) and interstitial deletion with
breakage and reunion (::).
• Duplication: Band duplication. Specialised with
DirectDuplication or InverseDuplication.
• Fisson: Centric fission.
3
As well as variation at a genetic level in even a clonal population, the
cytogenetic definition of satellite is a staining region. So even for two
genetically identical chromosomes, one may show a satellite, and another
may not.
These concepts are supported by a number of properties created
for the purpose, such as isBandOf.
The simplest representation in our ontology shares some
limitations with the ISCN “short system” – a usable subset of ISCN,
which is more generally used. For example, with both triplication
or quadruplication events, we do not represent the orientation of
all the repeats. It would be possible to differentiate these as two
direct duplications, or one direct and one inverted duplication
(for triplication); however, again it is useful to represent partial
information; for many existing ISCN strings which use the short
system, this knowledge is not available.
5
DEFINING SEX
One interesting outcome of both our representation and normal
custom within cytology is that the definition of the sex of
a karyotype is quite different from what might be expected.
Intuitively, male would be defined as a karyotype with a Y
chromosome5 , while female would be defined as a karyotype
without. However, this intuitive definition is not correct. For
example, the previously described 45X,-Y has no chromosome
Y and yet would generally be considered to be a male karyotype,
since the organism from which the cell line originated was male.
Our definitions of male and female, therefore, consider the
“history” of the karyotype. Female is defined as derived from
46,XX (Listing2), Male from 46,XY (Listing3). This definition
also copes with Turner’s syndrome which is not defined as
either male or female, nor describe sex for haploid karyotypes:
these can contain a Y chromosome (or not), but sex is not
meaningful for these karyotypes. Karyotypes which are definitional
for syndromes such as Turner’s or being male, are categorised under
NamedKaryotype.
(defclass FemaleKaryotype
:equivalent
(owlor k46_XX
(owlsome derivedFrom k46_XX)))
Listing 2. Definition of Female Karyotype
(defclass MaleKaryotype
:equivalent
(owlor k46_XY
(owlsome derivedFrom k46_XY)))
Listing 3. Definition of Male Karyotype
While this is ontologically correct, it does remove some
inferencing power that might reasonably be expected; the karyotype
45,X is effectively stated to be female, as it is not formally possible
5
We ignore Y chromosome translocations for simplicity
3
Jennifer D. Warrender and Phillip Lord7
to determine the sex from the components of a karyotype; for future
work, we may be able to address this, by describing the origin of the
karyotype (45,X,-Y is only valid as the karyotype of a cell line).
6
ASSESSMENT
As well as providing a specification, we are fortunate that ISCN2009
provides many examples; we are using these examples as an initial
evaluation for our ontology, to determine whether the ontology is
expressive enough to represent these exemplar karyotypes.
We wished this to be related to the ISCN string as, in most cases,
there is no other more humanly readable name. In order to represent
a karyotype in tawny a name is needed which is “safe” both as a
URL and in Clojure, the language used to implement tawny, and,
pragmatically, in Manchester syntax also6 .
• All karyotypes start with a “k” — Clojure symbols cannot start
with numbers
• Replaced ; character with — comment in Clojure
• Replaced ( and ) characters with ! — list delimiter in Clojure
• Replaced , character with — separator in Manchester syntax
Currently, we have represented 71 karyotypes in our karyotype
ontology. During this process, we have also discovered two
difficulties with the existing ISCN2009 specification; in both cases
a simple and intuitive correction is possible. These are:
• The lack of a band Xq12 in figures showing chromosome
bands (page 31); the figures are the only list of all chromosome
bands in ISCN2009.
• The absence of a band Yq11.2 in the 300 band resolution
(11.21, 11.22, 11.23 do exist on page 31) while this band
is used in several exemplars (for example on page 78). This
band does exist in ISCN2005 – the previous specification.
Taken together, these 71 karyotypes use all of the distinctions
necessary to answer questions given in Section 2.
7
DISCUSSION
The development of a karyotype ontology is potentially valuable
for cytogenetics, as the current ISCN specification is not
computationally amenable, reducing the value of collections of
karyotypes as they are hard to query, check and maintain. The
work described here presents an initial step towards this goal.
The process of producing this ontology is already of use; we
have discovered some errors or inconsistencies within ISCN which
prevent its direct interpretation computationally; we expect to find
more as we continue.
We have found the use of an ontology to be an appropriate
mechanism; the knowledge that needs to be represented is complex,
and overlapping. Cytogenetic data also requires the representation
of partial knowledge, such as locations that are only known to a
given resolution. The open world assumption of OWL copes well
6
It is possible to dissociate these two with tawny, but that did not seem
useful in this case
4
with this situation. Cytogenetics databases are also relatively small
(100,000’s rather than millions or billions), sizes to which OWL
should scale.
Existing tools for ontology development are, however, rather
limited in their support for building this form of ontology; it is to
address this need that we have developed tawny. This has proven
to be highly useful; for example, the current karyotype ontology
consists of 1466 classes, of which 1293 are used to represent the
chromosomes and their bands at different resolutions. All of these
classes have been generated from simpler data structures in Clojure.
Additionally, the arbitrary expressiveness of tawny has allowed us
to add syntax specific for the karyotype; many definitions in our
ontology follow patterns. Using tawny these can be encoded as
Clojure functions, such as that shown in and used in Listing4.
(defn inversion
[n band1 band2]
(exactly n hasEvent
(owland Inversion
(owlsome hasBreakPoint
band1 band2))))
(e/inversion 1 h/Hu2Bandp21 h/Hu2Bandq31)
Listing 4. A function used to define inverse events
In addition to the convenience, this also aids significantly in
maintainability, as it is possible to change definitions for all classes
that use this function. In time, we expect to extend this work to
present an end-user syntax and parser, probably built directly using
Clojure. Through the use of tawny we aim to build an end-to-end
solution for the computational encoding of karyotypes.
ACKNOWLEDGEMENTS
This work was supported by Newcastle University.
REFERENCES
Drummond, N., Rector, A., Stevens, R., Moulton, G., Horridge, M., Wang, H. H.,
and Seidenberg, J. (2006). Putting OWL in order: Patterns for sequences in OWL.
Concrete, pages 1–10.
Egana Aranguren, M., Stevens, R., and Antezana, E. (2009). Transforming
the axiomisation of ontologies: The ontology pre-processor language. Nature
Precedings.
Jupp, S., Horridge, M., Iannone, L., Klein, J., Owen, S., Schanstra, J., Stevens, R.,
and Wolstencroft, K. (2010). Populous: A tool for populating ontology templates.
Proceedings of the 3rd International Workshop on Semantic Web Applications and
Tools for the Life Sciences BerlinGermany December 810 2010.
Liehr, T. (2009). Small supernumerary marker chromosomes (sSMCs): a spotlight
on some nomenclature problems. Journal of Histochemistry and Cytochemistry,
57(11), 991–993.
Lord, P. (2013). The Semantic Web takes Wing: Programming Ontologies with TawnyOWL. http://arxiv.org/abs/1303.0213.
Lord, P. and Stevens, R. (2010). Adding a little reality to building ontologies for
biology. PLoS One.
McNaught, A. D. (2006). The IUPAC International Chemical Identifier (InChI).
Chemistry International, 2006(September 18).
Mungall, C., Ruttenberg, A., and Osumi-Sutherland, D. (2010). Taking shortcuts with
OWL using safe macros. Nature Preceedings.
Shaffer, L., on Human Cytogenetic Nomenclature, I. S. C., Slovak, M., and
Campbell, L. (2009). ISCN 2009: An International System for Human Cytogenetic
Nomenclature (2009). Karger.
| 5cs.CE
|
1
Production Line Technique for Autonomous Vehicle Scheduling
Nasser Aloufi
Department of Computer Science
California State University, Dominguez Hills
Carson, CA USA
[email protected]
Abstract - This paper considers the problem of scheduling autonomous vehicles in intersections. A new system is proposed
that could be an additional choice to the recently introduced autonomous intersection management (AIM) model. The
proposed system is based on the production line technique, where the environment of the intersection, vehicles position,
speeds and turning are specified and determined in advance. The goal of the proposed system is to eliminate vehicle collision
and the waiting time inside the intersection. 3 different patterns of the vehicles’ flow toward the intersection have been
considered for the evaluation of the model. The system requires less waiting time –compared to the other models- in the
random case where the flow is unpredictable. The KNN algorithm is used to predict the right turn vehicle. The experimental
results show that there is no single chance of collision inside the intersection; however, the system requires more free space
in the traffic lane.
I. INTRODUCTION
number of vehicles on streets is increasing day after
Theanother.
The more vehicles we have in roads, the more
furious people get which resulting in breaking traffic rules
and delaying the vehicles behind. As vehicles are
expecting to be completely autonomous, a new solution
to traffic jams has sparked. The necessity of creating an
autonomous vehicles and intelligent transportation
systems is more than ever before. This intelligent system
can be done by making vehicles interact with each others
and updating their routes according to the traffic flow.
If we look at the history of autonomous vehicle we can
see that they went through 5 stages [1]: A) No
Automation: in this stage the human was responsible
about all the driving. No automation interaction was
involved. B) Driver Assistance: in this stage the system
was responsible about simple tasks such as steering and
acceleration/deceleration. C) Partial Automation: this
stage is a continuation of the previous one with some
enhancement. Features such as cruise control and lanecentering have been added to the vehicles. D) Conditional
Automation: the autonomous driving system performs all
aspect of tasks; however, the human should be standing
by, in case anything went wrong. E) High Automation: in
this stage, the vehicle operates autonomously to all
conditions in the domain. Any scenario in the system
domain, the vehicle should do it fully autonomously. F)
Fully Automation: this is the final stage where human
intervention is not needed. The system’s performance is
equal to human driver in all scenarios without any domain
constraints. It is expected for all vehicles to reach the fully
automation stage and work without any human control by
the year of 2035 [2]. The Institute of Electrical and
Electronics Engineers (IEEE) have claimed that driverless
vehicles will be the most viable form of intelligent
transportation. They estimate that up to 75% of all
vehicles around the world will be autonomous by the year
of 2040 [3].
In 2008, The Defense Advanced Research Projects
Agency (DARPA) held an event which ask teams to build
autonomous vehicles that have the ability to drive in
traffic, make maneuvers and park. The event was
described as the first time that autonomous vehicles make
interaction between manned and unmanned vehicles in a
real environment [4]. The VisLab in Italy that had made
many advanced driver assistance systems [5], [6] [7] [8],
and prototype vehicles including ARGO [9], TerraMax
[5], [10], [11], and BRAiVE [12], [13] made another
experiment related to the autonomous vehicle
development. The team that consists of Massimo
Bertozzi, Alberto Broggi, Alessandro Coati, and Rean
Isabella Fedriga made a long trip experiment for four
autonomous vehicles [14]. The trip took a place from Italy
to China crossing more than 15,000 km for a consecutive
three months. The result of their experiment told us three
major things: a- the autonomous vehicle faced troubles
while making maneuver; b- being one of the few vehicles
that follow the street rules might cause a long waiting time
(specially while applying FIFO); c- hard to combine
autonomous with un-autonomous vehicles in the same
environment. In [15], an intersection algorithm model
was proposed. The model is based on (MixedInteger
Linear Program) MILP controller. Their contributions
are: 1) an algorithm that predict vehicle arrivals. 2)
Applying mixed-integer linear program. 3) Develop a
simulation that based on the proposed MILP controller.
For a maneuver and changing lanes, a politely change lane
(PCL) [16] paper was proposed. The main goal of the PCL
2
is to provide safety and efficiency while maneuver.
In 2013, Mladenović and Abbas proposed a selforganizing control framework for driverless vehicles [27].
Their proposal is based on cooperative control framework
and intersections as agent system, where distributed
vehicle intelligence has been used to get the vehicle’s
velocity. The priority level system determines the vehicle
that pass the intersection first and adjust the speed for the
following vehicle in the queue so they don’t collide. In
2014, Yan, Wu, and Dridi [28] studied the complexity of
the sequencing problem. Their simulation was based the
AIM framework. They converted the autonomous
vehicles scheduling to a single machine scheduling
problem, then they proved that it is an NP-hard problem.
Dresner and Stone proposed a new intersection control
mechanism called Autonomous Intersection Management
(AIM) [29]. Their paper shows that by making a smart
intersection controlling system, vehicles’ flow would be
more efficient than the current situation (traffic signals
and stop signs). They suggested that the drivers and the
designed intersections should be treated as agents. The
system could have more than one agent leading us to have
a Multiagent Systems (MAS). The MAS includes all the
interacted elements in the environment such as drivers,
pedestrians, speeds and road signs. Whenever a vehicle
wants to reserve a place in the intersection, it sends a
request to the intersection manager, and then the
intersection manager takes an action by weather accepting
or rejecting the vehicle’s request. Figure1 below shows
how
the
AIM
system
works[29].
Figure1.How an AIM driver agent make a
reservation.
In this paper, we propose a new scheduling model
that based on the producion line technique where items
don’t collide and interfere with each other. Our proposed
method can be implemented for faster computation
[19][20] using GPUs as well [21][25][26]. Also, the
network data overhead can be reduced using compression
techniques [18][22][23], or using cloud computing
resources [24].
The rest of the paper is organized as the following:
In section 2 we made a simulation to show the cahnce of
collision and the amount of waiting time in the current
model. In section 3 we propose our model. Then we
provide the simulation and the result of our system.
II. PROBLEM DESCRIPTION
It seems a mission impossible to make all vehicles go
through an intersection safely. We need to take into
account the speed, timing, distance, the chance of
collision, and the appropriate response that we need to
make if there is a chance of collision. In AIM and similar
systems, the vehicle sends a request to the intersection
manager asking for a permission to go through the
intersection. The intersection manager must make one of
those decisions: 1) Accept vehicle’s request (when the
vehicle meets the requirements). 2) Reject vehicle’s
request (when the vehicle failed to meet all the
requirement). The rejected request has two options too: 1ask the vehicle to accelerate or decelerate its speed (in this
case the vehicle should send a new request to the
intersection manager. 2- ask the vehicle to stop due to
requirements failure. Figure2 below shows a general
overview of the current intersection scheduling model.
Figure2. The current system structure.
The current model works well, but still has some
problems that we have to overcome before applying it to
a real autonomous environment. Asking vehicles to send
requests few hundred meters before approaching the
intersection cause a critical time situation. There are some
condition where stopping the vehicle completely is a
must, and this happens whenever:
Vx(T,S,P) = Vz(T,S,P)
Where: T is the time of approaching a specific point in the
intersection ,S is the speed of the vehicle,P is the occupied
point in the intersection.
The more the intersection manager asks vehicles to stop,
the more traffic jam happens which make the system
inefficient especially in big cities. Figure3 shows one of
the conditions that cause traffic jam. Let’s make an
3
example and assume that we have two vehicles. Vehicle
A is going to the east side with a speed of 80mph, and
vehicle B going to the west side with the same speed. Both
have the same distance from the intersection, 600 ft. Both
had sent requests to the intersection manager asking to go
through the intersection. The intersection manager
calculated the characteristics and the conditions of the two
vehicles and came to conclusion that both vehicles will
approach the same point at the same time, specifically
after 5.11 seconds (converting 80 mph to foot -equal to
422400- then divided by 60 –equal to 7040- then divided
by 60 –equal to 117.33- foot per second). To avoid the
collision, the intersection manager has two options as we
stated before; either reject the requests and ask vehicle A
or B to change its speed; or simply ask one of them to stop
in order to avoid the collision.
vehicles. When we had 300 vehicles, the number of
collisions increased to be 4.3 for each vehicle. The same
thing happened for the waiting time. It was increasing as
the number of vehicles increase. The waiting time was 85
seconds per vehicle when we had 50 vehicles inside the
intersection. Then it increased to be 320 seconds when we
had 200. In the end when we had 300 vehicles, the waiting
time was 515 seconds per vehicle. Figure4 and Figure5
show the number of collisions and waiting times
respectively.
Figure4. Chances of collisions for every vehicle.
Figure3. A point of collision between vehicles A and B.
The arisen problem is, during rush hours when the
intersection gets hundreds or thousands of requests, the
chances of collisions increase, leading to more stopping
and waiting times.
We made a simulation of a similar environment to this
model in order to show the chance of collisions that each
vehicle might have. The simulated intersection has the
following characteristics:
I.
Two directions (one direction is going from north
to south and the other one is going from west to
east.).
II.
Each side of the intersection can occupy 722
vehicle in total.
III.
All vehicles have the same speed 100 mph.
After running the simulation for 100 times, the
experiment shows that, as the number of vehicles
increase, the number of expected collisions and waiting
times increase. When we had 50 vehicles in the
intersection, the number of expected collisions was 1
collision for each vehicle. Then it was 3 when we got 200
Figure5. The waiting time for every vehicle.
Increasing and decreasing speed is not an option when the
intersection get enormous requests because there are
vehicles in front and behind each vehicle, and whenever
we fix one collision, another one appears. To sum up, the
more vehicles approaching the intersection we have, the
more chances of collision we get, leading us to more
stopping time.
III. THE PROPOSED SYSTEM
In the old model, the scheduling process starts after
receiving the vehicle’s request (Figure2). In this paper we
flipped the current approach and created another model
where the scheduling should be sat up in the intersection
4
prior receiving any request. Our proposal is based on the
production line system where every position (container)
in the line is reserved for a specific item.
Figure 6 shows the architecture of the proposed system
where the intersection’s spots should be sat up as the first
step. We prepare the intersection by making containers
that based on the length of the vehicles. Once setting up
the vehicles position, entering timing, and the speed of the
lanes; then vehicles can send requests to the intersection
manager.
Figure7 shows a closer look of the design where:
• S1; the minimum accepted speed.
• S2; the maximum accepted speed.
• Spin; the times where the lane is open.
Figure6: The architecture of the proposed system.
consideration, and instead of applying one specific speed
value, we applied S1 and S2 which are the minimum and
maximum speed. Any vehicle speed that meets this range
should be accepted.
A) ARISEN PROBLEMS:
There are 2 problems that had arisen after the initial
design:
1. After applying S1 and S2, vehicles speed are vary,
leading vehicles to collide after certain distance.
Let’s assume we sat up the entering speed for lane A to
60MPH as a minimum speed (S1), and to 65MPH as a
maximum speed (S2). Two vehicles (V1 and V2) sent
requests to enter the intersection. V1 came first with a
61MPH speed, and V2 came after it with a 64MPH speed.
The problem is after a certain distance, V2 will approach
V1 and collide with it.
2. Entering an intersection with one speed range
while the following intersection requires a
different speed range.
Let’s assume we have two intersections, one after another.
The first intersection accept vehicles with any speed
between 60 and 65, and the second one accept vehicles
with 102.5 - 107.5 speed range. The problem now is how
to make those two intersections compatible so they get
connected together in one system. Figure9. Shows this
problem.
Figure9. Varying speed between two intersections.
3. Making a right turn.
The system must produce a container that makes a right
turn, otherwise vehicles will be forced to go in straight
direction.
B) PROBLEMS SOLVING
Figure7. Production line intersection.
The timer is used to switch between lanes. If lane A is
open at this moment, lane B should be closed. In [30] a
setpoint system for generating setpoints for the PID
controllers was proposed. The purpose of the system is to
make sure that the vehicle arrives at the exact expected
time with the exact expected speed. However, the system
doesn’t guarantee the arrival time of the vehicle to a
specific point, so it’s not ideal where an unexpected
latency cause a catastrophic result. We took that into
To solve the first problem we applied an average speed
value. This average speed should be applied to every
vehicle as soon as entering the intersection.
Avg = (S1+S2)/2
The goal of the average speed it to make sure that the
vehicle stays in its given container and doesn’t jump to
another one. Figure10 shows the problem before and after
applying the average speed.
5
Figure10. The intersection flow before and after
applying the average speed.
To solve the second problem, we created an increasing
and decreasing speed areas. The intersection manager ask
all the vehicles either to increase or decrease the speed
depending on the speed of the next intersection.
Figure11. The vehicle in the yellow triangle is
going to make a right turn when K=3.
IV. SIMULATION AND RESULT
S = Ep1 + (Tp1- Ep1); where: Ep is the exit speed of the
intersection. Tp is the entering speed of the following
intersection. Figure11 shows how the increasing speed
works.
Figure11. Areas of changing the speed.
Regarding the third problem which is making a right turn.
We made a classifier by using the key nearest neighbor
(KNN) technique. In the KNN the intersection produce
right turn containers based on whatever features we would
like to apply. Some of the features that we could apply for
the KNN: day, time, population of the city, event
happening in the area,…etc. For our KNN we used the
Euclidean distance function:
In our experiment we made a virtual intersection with the
following features:
1- Vehicles are coming from 4 different directions:
A1: from east to west.
A2: from west to east.
B1: from north to west.
B2: from west to north.
2- Vehicle arriving speed to the intersection is
ranged between (60-65) mph.
3- The length for every container is 26.2467 ft.
4- The running time for the intersection is 1 minute.
5- The system produce one container for every
opening lane.
6- Gates A1 and A2 should open together while
gates B1 and B2 closed.
7- Gates B1 and B2 should open together while
gates A1 and A2 closed.
8- Every lane has 60 containers in total.
Figure12 below shows an illustration of the virtual
intersection that we built for the experiment.
This classifier will be used to calculate the possibility of
making a right turn for the next container (vehicle).
Figure11 shows an example the KNN method.
Figure12. Experiment virtual intersection.
For expecting the right turn in the KNN we need to enter
initial testing data in the system. The following are the
features and initial data:
6
Day
Hour
1
3
4
3
4
2
5
1
2
9
10
8
8
10
20
19
4
7
Event in Class
the area
turn
0
+
0
+
0
+
0
+
0
+
1
1
1
1
-
of
Where:
1- Days are numbered from 1:Monday to 5:Friday.
2- Hour is a 24 format.
3- Event in the area is :
0; if there is no event in the area of the
intersection.
1; if there is no event..
4. “+” means the vehicle is going to make a right
turn. “-” means the vehicle is going in a straight
direction.
We also created 3 different patterns of the vehicles flow.
The goal of these three patters is to calculate the waiting
time if we got unordered flow. In addition we wanted to
calculate the required space for each pattern. The first
pattern represents the best case where the flow match the
opening and the closing times of the intersection. The
second pattern represents the worst case of the flow where
vehicles keep coming even if the intersection is closed.
The third and final pattern represent the random (normal)
case where the flow is unpredictable.
Each of the three patterns has the follow features:
I.
It has 60 spots.
II.
Accept only one request per spot.
III.
Runs for 1 minute.
For the patterns, we got different results based on the flow
toward the intersection. For all of the following results:
1 represents a request
0 represent no request
In the average case where the flow pattern is: [1, 0, 1, 0,
1, 0, 1, 0, 1, 0, 1, 0,…..]: the arriving times for vehicles in
one minute was: [0, 2, 4, 6, 8, 10, 12, 14, 16, 18, 20, 22,
24, 26, 28, 30, 32, 34, 36, 38, 40, 42, 44, 46, 48, 50, 52,
54, 56, 58]. We don’t need to arrange them because they
are already compatible with the opening and closing times
for our lane. The waiting time in this case is always zero.
In the second case the flow is constant (worst case): [1, 1,
1, 1, 1, 1, 1, 1, 1, 1……]. The arriving times for this
pattern in one minute was: [0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10,
11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25,
26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40,
41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55,
56, 57, 58, 59]. Arranging them to match the intersection
opening and closing moments was a time consuming
since it took 164.84 seconds as an average waiting time
for each vehicle. Here is the order of arrivals after
arranging them: [0, 2, 4, 6, 8, 10, 12, 14, 16, 18, 20, 22,
24, 26, 28, 30, 32, 34, 36, 38, 40, 42, 44, 46, 48, 50, 52,
54, 56, 58, 60, 62, 64, 66, 68, 70, 72, 74, 76, 78, 80, 82,
84, 86, 88, 90, 92, 94, 96, 98, 100, 102, 104, 106, 108,
110, 112, 114, 116, 118]. The worst part of this case is not
only the high waiting time, but also we needed to increase
the space by 100% to arrange the vehicles. The last pattern
where the flow is unpredictable (random), the system was
really promising since the waiting time was less than the
old models. In our model, the waiting time was 35
seconds compared to 101 seconds for the old model. For
testing, we created a random function that creates random
requests. The requests we got were : [1, 1, 0, 1, 1, 1, 0, 0,
0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 1, 0, 0, 1, 0, 0, 1, 0, 1, 0, 1, 0, 1,
0, 1, 1, 1, 0, 1, 0, 1, 0, 0, 1, 0, 1, 0, 0, 0, 0, 1, 0, 1, 0, 1, 1,
0, 0, 0, 1, 1, 1], and their arriving times were: [0, 1, 3, 4,
5, 9, 11, 13, 15, 17, 18, 21, 24, 26, 28, 30, 32, 33, 34, 36,
38, 41, 43, 48, 50, 52, 53, 57, 58, 59]. In this random
pattern it only took 6.79 seconds as an average waiting
time. Here is the arranged arrivals : [0, 0, 1, 0, 3, 0, 4, 0,
5, 0, 9, 0, 11, 0, 13, 0, 15, 0, 17, 0, 18, 0, 21, 0, 24, 0, 26,
0, 28, 0, 30, 0, 32, 0, 33, 0, 34, 0, 36, 0, 38, 0, 41, 0, 43, 0,
48, 0, 50, 0, 52, 0, 53, 0, 57, 0, 58, 0, 59]. To sum up the
patterns result: -The first pattern (matched pattern) has 0
waiting time and 0 additional space. The second pattern
(worst pattern) has increased by double in both timing and
spacing. The third pattern (random flow) result depends
on the number of requests: 0 if the number of requests
below the giving spots, otherwise it will be ((n-30)
/30*100) where n is the number of requests. However, it
was less than the previous model in all tested random
flow.
For predicting the right turn, whenever a new vehicle
comes to the lane, its (day, hour, event) will be calculated
by the KNN classifier to predict if it’s going to make a
right turn or not. The resulted data of the entered vehicle
will be added to the classifier so it helps to predict the next
generated spot. After running the simulation for one
minute we got the following results:
Lane A1 and A2 instances:
7
Day
Hour
3
1
2
5
4
1
2
2
3
2
4
1
2
4
4
4
3
2
3
1
4
1
1
1
2
4
2
3
2
4
3
5
11
10
1
23
13
18
14
8
6
21
3
15
22
22
8
21
0
20
12
3
7
23
2
6
0
16
1
11
B1 and B2 instances:
Day
Hour
1
4
5
4
4
2
2
4
3
5
2
5
5
3
8
12
2
3
12
1
13
20
18
16
1
3
9
11
Event in the
area
0
0
0
0
0
0
0
1
1
1
1
1
0
0
1
0
1
0
1
0
0
1
1
1
1
0
1
0
1
0
Event in the
area
0
0
1
1
0
0
0
1
1
0
0
0
0
1
4
2
2
5
3
3
2
5
3
4
3
3
5
2
2
5
2
9
9
19
11
18
16
15
11
17
16
22
23
12
11
19
1
0
0
1
1
1
1
1
1
1
1
1
0
1
0
1
Turns prediction for lane A1 and lane A2:
1
2
3
4
5
6
7
8
+
+
+
11 12 13 14 15 16 17 18
+
+
+
21 22 23 24 25 26 27 28
+
+
+
+
9
+
19
29
-
10
+
20
30
+
9
19
+
29
+
10
20
30
-
Figure14. KNN for lane A1 and A2.
Turns prediction for lane B1 and lane B2:
1
2
3
4
5
6
7
8
+
+
+
+
11 12 13 14 15 16 17 18
+
+
+
+
21 22 23 24 25 26 27 28
+
+
8
working on for the second version of the system.
VI. REFERENCES
Figure14. KNN for lane B1 and B2.
The following Table1 shows the first 5 vehicles for each
lane.
Vehicle
ID
123
206
301
413
106
224
306
405
115
200
324
422
109
213
311
418
105
222
313
418
Lane
A1
A2
B1
B2
A1
A2
B1
B2
A1
A2
B1
B2
A1
A2
B1
B2
A1
A2
B1
B2
Arriving
Time
0.0
0.0
1.0
1.0
2.0
2.0
3.0
3.0
4.0
4.0
5.0
5.0
6.0
6.0
7.0
7.0
8.0
8.0
9.0
9.0
Right
Turn
No
No
Yes
Yes
No
No
Yes
Yes
Yes
Yes
No
No
Yes
Yes
No
No
No
No
Yes
Yes
Exiting Time
17.179657557103365
17.179657557103365
18.179657557103365
18.179657557103365
19.179657557103365
19.179657557103365
20.179657557103365
20.179657557103365
21.179657557103365
21.179657557103365
22.179657557103365
22.179657557103365
23.179657557103365
23.179657557103365
24.179657557103365
24.179657557103365
25.179657557103365
25.179657557103365
26.179657557103365
26.179657557103365
Table1. Data of the first 5 vehicles that entered the intersection.
V. CONCLUSION
The proposed autonomous scheduling system introduced
in this paper is based on the manufacturing production
line system. The intersection environment is sat up in
advance before any vehicle arrives to the intersection. We
tested three different patterns (best-worst-random). In the
first pattern where the flow matches the intersection
requirements, the queue waiting time was zero. In the
worst case the waiting time was high and could be
presented as X!. In the third pattern the waiting time was
promising for a real environment since it got less waiting
time compared to the old model. Having said that, using
a huge amount of space is still an issue that we are
[1]: SAE On-Road Automated Vehicle Standards Committee.
"Taxonomy and definitions for terms related to on-road motor
vehicle automated driving systems." Society of Automotive
Engineers , International J3016_201609, October 2016 .
[2]:Bimbraw, Keshav. "Autonomous cars: Past, present and
future a review of the developments in the last century, the
present scenario and the expected future of autonomous
vehicle technology." Informatics in Control, Automation and
Robotics (ICINCO), 2015 12th International Conference on.
Vol. 1. IEEE, 2015.
[3]:“IEEE News Releases.” IEEE - News Releases,
www.ieee.org/about/news/2012/5september_2_2012.html.
Last visited: 11/1/2017.
[4]: DARPA. (2007) Urban challenge. [Online]. Avilable:
http://archive.darpa.mil/grandchallenge/ Last visited :
10/4/2017.
[5] Y.-L. Chen, V. Sundareswaran, C. Anderson, A. Broggi, P.
Grisleri, P. P. Porta, P. Zani, and J. Beck, “TerraMax: Team
oshkosh urban robot,” in The DARPA Urban Challenge,
Autonomous Vehicles in City Traffic, M. Buehler, K.
Iagnemma, and S. Singh, Eds. Berlin, Germany:
SpringerVerlag, 2009, pp. 595–622.
[6] P. Cerri, L. Gatti, L. Mazzei, F. Pigoni, and G. Ho, “Day
and night pedestrian detection using cascade adaboost
system,” in Proc. IEEE Intelligent Transportation Systems
2010, pp. 1843–1848.
[7] C. Caraffi, E. Cardarelli, P. Medici, P. P. Porta, and G.
Ghisio, “Real time road signs classification,” in Proc. IEEE
Int. Conf. Vehicular Electronics Safety, Sept. 2008, pp. 253–
258.
[8] M. Bertozzi, A. Broggi, and A. Fascioli, “Vislab and the
evolution of vision-based UGVs,” IEEE Computer, vol. 39,
no. 12, pp. 31–38, Dec. 2006.
[9] A. Broggi, M. Bertozzi, A. Fascioli, and G. Conte,
Automatic Vehicle Guidance: The Experience of the ARGO
Vehicle. Singapore: World Scientific, 1999.
[10] D. Braid, A. Broggi, and G. Schmiedel, “The TerraMax
autonomous vehicle,” J. Field Robot., vol. 23, no. 9, pp. 693–
708, Sept. 2006.
[11] Y.-L. Chen, V. Sundareswaran, C. Anderson, A. Broggi,
P. Grisleri, P. P. Porta, P. Zani, and J. Beck, “TerraMax: Team
oshkosh urban robot,” J. Field Robot., vol. 25, no. 10, pp.
841–860, Oct. 2008.
[12] L. Bombini, S. Cattani, P. Cerri, R. I. Fedriga, M. Felisa,
and P. P. Porta, “Test bed for unified perception & decision
architecture,” in Proc. 13th Int. Forum Advanced
Microsystems Automotive Applications, 2009, pp. 287–298.
[13] P. Grisleri and I. Fedriga, “The braive platform,” in Proc.
7th IFAC Symp. Intelligent Autonomous Vehicles, 2010, pp.
497–502.
[14]: Bertozzi, Massimo, et al. "A 13,000 km intercontinental
trip with driverless vehicles: The VIAC experiment." IEEE
Intelligent Transportation Systems Magazine 5.1 (2013): 2841.
9
[15]: Fayazi, S. Alireza, Ardalan Vahidi, and Andre Luckow.
"Optimal scheduling of autonomous vehicle arrivals at
intelligent intersections via MILP." American Control
Conference (ACC), 2017. IEEE, 2017.
[16]: Hu, Jiajun, et al. "Scheduling of connected autonomous
vehicles on highway lanes." Global Communications
Conference (GLOBECOM), 2012 IEEE. IEEE, 2012.
[17] A. Chatterjee, A. Aceves, R. Dungca, H. Flores, and K.
Giddens. Classification of wearable computing: A survey of
electronic assistive technology and future design. In Research
in Computational Intelligence and Communication Networks
(ICRCICN), pages 22–27. IEEE, 2016.
[18] A. Chatterjee, M. Levan, C. Lanham, M. Zerrudo, M.
Nelson, and S. Radhakrishnan. Exploiting topological
structures for graph compression based on quadtrees. In
Research in Computational Intelligence and Communication
Networks (ICRCICN), 2016 Second International Conference
on, pages 192–197. IEEE, 2016.
[19] A. Chatterjee, S. Radhakrishnan, and J. K. Antonio. Data
Structures and Algorithms for Counting Problems on Graphs
using GPU. International Journal of Networking and
Computing (IJNC), Vol. 3(2):264–288, 2013.
[20] A. Chatterjee, S. Radhakrishnan, and J. K. Antonio. On
Analyzing Large Graphs Using GPUs. In Parallel and
Distributed Processing Symposium Workshops & PhD Forum
(IPDPSW), 2013 IEEE 27th International, pages 751–760.
IEEE, 2013.
[21] A. Chatterjee, S. Radhakrishnan, and John K. Antonio.
Counting Problems on Graphs: GPU Storage and Parallel
Computing Techniques. In Parallel and Distributed Processing
Symposium Workshops & PhD Forum, 2012 IEEE 26th
International, pages 804–812. IEEE, 2012.
[22] M. Nelson, S. Radhakrishnan, A. Chatterjee, and C. N.
Sekharan. On compressing massive streaming graphs with
Quadtrees. In Big Data, 2015 IEEE International Conference
on, pages 2409–2417, 2015.
[23] M. Nelson, S. Radhakrishnan, A. Chatterjee and C. N.
Sekharan, "Queryable compression on streaming social
networks," 2017 IEEE International Conference on Big Data
(Big Data), Boston, MA, 2017, pp. 988-993.
[24] A. Chatterjee, M. Levan, C. Lanham and M. Zerrudo,
"Job scheduling in cloud datacenters using enhanced particle
swarm optimization," 2017 2nd International Conference for
Convergence in Technology (I2CT), Mumbai, 2017, pp. 895900.
[25] Khondker S. Hasan, Amlan Chatterjee, Sridhar
Radhakrishnan, and John K. Antonio, “Performance
Prediction Model and Analysis for Compute-Intensive Tasks
on GPUs”, Network and Parallel Computin,g 2014, pp. 612617
[26] A. Chatterjee, “Parallel Algorithms for Counting
Problems on Graphs Using Graphics Processing Units”, Ph.D.
Dissertation, University of Oklahoma, 2014
[27]: M. N. Mladenovic and M. M. Abbas, “Self-organizing
control framework for driverless vehicles,” in Proc. 16th Int.
IEEE Conf. on Intell. Transp. Syst., The Hague, The
Netherlands, Oct. 2013.
[28]: Yan, Fei, Jia Wu, and Mahjoub Dridi. "A scheduling
model and complexity proof for autonomous vehicle
sequencing problem at isolated intersections." Service
Operations and Logistics, and Informatics (SOLI), 2014 IEEE
International Conference on. IEEE, 2014.
[29] : Dresner, Kurt, and Peter Stone. "A multiagent approach
to autonomous intersection management." Journal of artificial
intelligence research 31 (2008): 591-656.
[30]: Au, Tsz-Chiu, Michael Quinlan, and Peter Stone.
"Setpoint scheduling for autonomous vehicle controllers."
Robotics and Automation (ICRA), 2012 IEEE International
Conference on. IEEE, 2012.
| 3cs.SY
|
Extremal attractors of Liouville copulas
Léo R. Belzile∗ and Johanna G. Nešlehová†
arXiv:1704.03377v2 [math.ST] 6 Jul 2017
This is a copyedited, author-produced version of an article accepted for publication following peer-review in the
Journal of Multivariate Analysis, an Elsevier publication, c 2017. This manuscript version is made available under
the CC-BY-NC-ND 4.0 license. Please cite as
Belzile, L. R and J. G. Nešlehová. Extremal attractors of Liouville copulas, Journal of Multivariate
Analysis (2017), 160C, pp. 68–92. doi:10.1016/j.jmva.2017.05.008
Abstract
Liouville copulas introduced in [31] are asymmetric generalizations of the ubiquitous Archimedean copula class.
They are the dependence structures of scale mixtures of Dirichlet distributions, also called Liouville distributions. In
this paper, the limiting extreme-value attractors of Liouville copulas and of their survival counterparts are derived.
The limiting max-stable models, termed here the scaled extremal Dirichlet, are new and encompass several existing
classes of multivariate max-stable distributions, including the logistic, negative logistic and extremal Dirichlet. As
shown herein, the stable tail dependence function and angular density of the scaled extremal Dirichlet model have a
tractable form, which in turn leads to a simple de Haan representation. The latter is used to design efficient algorithms
for unconditional simulation based on the work of [10] and to derive tractable formulas for maximum-likelihood
inference. The scaled extremal Dirichlet model is illustrated on river flow data of the river Isar in southern Germany.
1. Introduction
Copula models play an important role in the analysis of multivariate data and find applications in many areas, including
biostatistics, environmental sciences, finance, insurance, and risk management. The popularity of copulas is rooted
in the decomposition of Sklar [39], which is at the heart of flexible statistical models and various measures, concepts
and orderings of dependence between random variables. According to Sklar’s result, the distribution function of any
random vector X = (X1 , . . . , Xd ) with continuous univariate margins F1 , . . . , Fd satisfies, for any x1 , . . . , xd ∈ R,
Pr(X1 ≤ x1 , . . . , Xd ≤ xd ) = C{F1 (x1 ), . . . , Fd (xd )},
for a unique copula C, i.e., a distribution function on [0, 1]d whose univariate margins are standard uniform. Alternatively, Sklar’s decomposition also holds for survival functions, i.e., for any x1 , . . . , xd ∈ R,
Pr(X1 > x1 , . . . , Xd > xd ) = Ĉ{F̄1 (x1 ), . . . , F̄d (xd )},
where F̄1 , . . . , F̄d are the marginal survival functions and Ĉ is the survival copula of X, related to the copula of X as
follows. If U is a random vector distributed as the copula C of X, Ĉ is the distribution function of 1 − U.
In risk management applications, the extremal behavior of copulas is of particular interest, as it describes the dependence between extreme events and consequently the value of risk measures at high levels. Our purpose is to study
the extremal behavior of Liouville copulas. The latter are defined as the survival copulas of Liouville distributions
[14, 17, 38], i.e., distributions of random vectors of the form R Dα , where R is a strictly positive random variable
independent of the Dirichlet random vector Dα = (D1 , . . . , Dd ) with parameter vector α = (α1 , . . . , αd ). Liouville
copulas were proposed by McNeil and Nešlehová [31] in order to extend the widely used class of Archimedean
copulas and create dependence structures that are not necessarily exchangeable. The latter property means that for
∗ École
Polytechnique Fédérale de Lausanne, EPFL-SB-MATH-STAT, Station 8, CH-1015 Lausanne, Switzerland. [email protected]
of Mathematics and Statistics, McGill University, 805 rue Sherbrooke Ouest, Montréal, Québec, H3A 0B9, Canada.
[email protected]
† Department
2
L. R. Belzile and J. G. Nešlehová
any u1 , . . . , ud ∈ [0, 1] and any permutation π of the integers 1, . . . , d, C(u1 , . . . , ud ) = C(uπ(1) , . . . , uπ(d) ). When
α = 1d ≡ (1, . . . , 1), Dα = D1d is uniformly distributed on the unit simplex
Sd = {x ∈ [0, 1]d : x1 + · · · + xd = 1}.
(1)
In this special case, one recovers Archimedean copulas. Indeed, according to [30], the latter are the survival copulas
of random vectors R D1d , where R is a strictly positive random variable independent of D1d . When α , 1d , the survival
copula of RDα is not Archimedean anymore. It is also no longer exchangeable, unless α1 = · · · = αd .
In this article, we determine the extremal attractor of a Liouville copula and of its survival counterpart. As a byproduct, we also obtain the lower and upper tail dependence coefficients of Liouville copulas that quantify the strength
of dependence at extreme levels [25]. These results are complementary to [21], where the upper tail order functions
of a Liouville copula and its density are derived when α1 = · · · = αd , and to [19], where the extremal attractor of
RDα is derived when R is light-tailed. The extremal attractors of Liouville copulas are interesting in their own right.
Because non-exchangeability of Liouville copulas carries over to their extremal limits, the latter can be used to model
the dependence between extreme risks in the presence of causality relationships [15]. The limiting extreme-value
models can be embedded in a single family, termed here the scaled extremal Dirichlet, whose members are new, nonexchangeable generalizations of the logistic, negative logistic, and Coles–Tawn extremal Dirichlet models given in
[7]. We examine the scaled extremal Dirichlet model in detail and derive its de Haan spectral representation. The latter
is simple and leads to feasible stochastic simulation algorithms and tractable formulas for likelihood-based inference.
The article is organized as follows. The extremal behavior of the univariate margins of Liouville distributions is
first studied in Section 2. The extremal attractors of Liouville copulas and their survival counterparts are then derived
in Section 3. When α is integer-valued, the results of [27, 31] lead to closed-form expressions for the limiting stable
tail dependence functions, as shown in Section 4. Section 5 is devoted to a detailed study of the scaled extremal
Dirichlet model. In Section 6, the de Haan representation is derived and used for stochastic simulation. Estimation
is investigated in Section 7, where expressions for the censored likelihood and the gradient score are also given. An
illustrative data analysis of river flow of the river Isar is presented in Section 8, and the paper is concluded by a
discussion in Section 9. Lengthy proofs are relegated to the Appendices.
In what follows, vectors in Rd are denoted by boldface letters, x = (x1 , . . . , xd ); 0d and 1d refer to the vectors
(0, . . . 0) and (1, . . . , 1) in Rd , respectively. Binary operations such as x + y or a · x, xa are understood as componentwise operations. k · k stands for the `1 -norm, viz. kxk = |x1 | + · · · + |xd |, ⊥
⊥ for statistical independence. For any x, y ∈ R,
let x ∧ y = min(x, y) and x ∨ y = max(x, y). The Dirac delta function Ii j is 1 if i = j and zero otherwise. Finally, Rd+ is
the positive orthant [0, ∞)d and for any x ∈ R, x+ denotes the positive part of x, max(0, x).
2. Marginal extremal behavior
A Liouville random vector X = RDα is a scale mixture of a Dirichlet random vector Dα = (D1 , . . . , Dd ) with
parameters α = (α1 , . . . , αd ) > 0d . In what follows, R is referred to as the radial variable of X and ᾱ denotes the sum
of the Dirichlet parameters, viz. ᾱ = kαk = α1 + · · · + αd . Recall that Dα has the same distribution as Z/kZk, where
Zi ∼ Ga(αi , 1), i = 1, . . . , d are independent Gamma variables with scaling parameter 1. The margins of X are thus
scale mixtures of Beta distributions, i.e., for i = 1, . . . , d, Xi = RDi with Di ∼ Beta(αi , ᾱ − αi ).
As a first step towards the extremal behavior of Liouville copulas, this section is devoted to the extreme-value
properties of the univariate margins of the vectors X and 1/X, where X is a Liouville random vector with parameters
α and a strictly positive radial part R, i.e., such that Pr(R ≤ 0) = 0. To this end, recall that a univariate random variable
X with distribution function F is in the maximum domain of attraction of a non-degenerate distribution F0 , denoted
F ∈ M(F0 ) or X ∈ M(F0 ), if and only if there exist sequences of reals (an ) and (bn ) with an > 0, such that, for any
x ∈ R,
lim F n (an x + bn ) = F0 (x).
n→∞
By the Fisher–Tippett Theorem, F0 must be, up to location and scale, either the Fréchet (Φρ ), the Gumbel (Λ) or the
Weibull distribution (Ψρ ) with parameter ρ > 0. Further recall that a measurable function f : R+ → R+ is called
regularly varying with index ρ ∈ (−∞, ∞), denoted f ∈ Rρ , if for any x > 0, f (tx)/ f (t) → xρ as t → ∞. If ρ = 0, f is
called slowly varying. For more details and conditions for F ∈ M(F0 ), see, e.g., [12, 35].
Extremal attractors of Liouville copulas
3
Because the univariate margins of X are scale mixtures of Beta distributions, their extremal behavior, detailed in
Proposition 1, follows directly from Theorems 4.1, 4.4. and 4.5 in [20].
Proposition 1 Let X = RDα be a Liouville random vector with parameters α = (α1 , . . . , αd ) and a strictly positive
radial variable R, i.e., Pr(R ≤ 0) = 0. Then the following statements hold for any ρ > 0:
(a) R ∈ M(Φρ ) if and only if Xi ∈ M(Φρ ) for all i = 1, . . . , d.
(b) R ∈ M(Λ) if and only if Xi ∈ M(Λ) for all i = 1, . . . , d.
(c) R ∈ M(Ψρ ) if and only if Xi ∈ M(Ψρ+ᾱ−αi ) for all i = 1, . . . , d.
Proposition 1 implies that the univariate margins of X are all in the domain of attraction of the same distribution if the
latter is Gumbel or Fréchet. This is not the case when R is in the Weibull domain of attraction. Note also that there are
cases not covered by Proposition 1, in which the univariate margins Xi are in the Weibull domain while R is not in the
domain of attraction of any extreme-value distribution. For example, when d = 2, α = (1, 1) and R = 1 almost surely,
the margins of X are standard uniform and hence in the maximum domain of attraction of Ψ1 ; see Example 3.3.15 in
[12]. At the same time, R is clearly neither in the Weibull, nor the Gumbel, nor the Fréchet domain of attraction.
In subsequent sections, we shall also need the extremal behavior of the univariate margins of 1/X. The proposition
below shows that the latter is determined by the properties of 1/R. In contrast to Proposition 1, however, the univariate
margins of 1/X are always in the Fréchet domain. The proof may be found in A.
Proposition 2 Let X = RDα be a Liouville random vector with parameters α = (α1 , . . . , αd ) and a strictly positive
radial variable R with Pr(R ≤ 0) = 0. The following statements hold for any i = 1, . . . , d.
(a) If 1/R ∈ M(Φρ ) for ρ ∈ (0, αi ], then 1/Xi ∈ M(Φρ ).
(b) If E(1/Rαi +ε ) < ∞ for some ε > 0, then 1/Xi ∈ M(Φαi ).
3. Extremal behavior of Liouville copulas
In this section, we will identify the extremal behavior of a Liouville random vector X = RDα and of the random
vector 1/X, assuming that Pr(R ≤ 0) = 0. As a by-product, we will obtain the extremal attractors of Liouville copulas
and their survival counterparts. To this end, recall that a random vector Y with joint distribution function H is in the
maximum domain of attraction of a non-degenerate distribution function H0 , in notation H ∈ M(H0 ) or Y ∈ M(H0 ),
iff there exist sequences of vectors (an ) in (0, ∞)d and (bn ) in Rd such that for all x ∈ Rd ,
lim H n (an x + bn ) = H0 (x).
n→∞
When the univariate margins F1 , . . . , Fd of H are continuous, H ∈ M(H0 ) holds if and only if Fi ∈ M(F0i ) for all
i = 1, . . . , d, where F01 , . . . , F0d are the univariate margins of H0 , and further if the unique copula C of H is in the
domain of attraction of the unique copula C0 of H0 , denoted C ∈ M(C0 ), i.e., iff for all u ∈ [0, 1]d ,
lim C n (u1/n ) = C0 (u).
n→∞
In particular, the univariate margins of the max-stable distribution H0 must each follow a generalized extreme-value
distribution, and C0 must be an extreme-value copula. This means that for all u ∈ [0, 1]d ,
C0 (u) = exp[−`{− log(u1 ), . . . , − log(ud )}],
(2)
where ` : Rd+ → [0, ∞) is a stable tail dependence function, linked to the so-called exponent measure ν viz.
ν{[0d , x)c } = `(1/x), see, e.g., [35]. The latter Rcan be characterized through an angular (or spectral) probability
measure σd on Sd given in Eq. (1) which satisfies S wi dσd (w) = 1/d for all i = 1, . . . , d. For all x ∈ Rd+ , one has
d
`(x) = d
Z
Sd
max(w1 x1 , . . . , wd xd ) dσd (w).
(3)
4
L. R. Belzile and J. G. Nešlehová
Because ` is homogeneous of order 1, i.e., for any c > 0 and x ∈ Rd+ , `(cx) = c`(x), C0 can also be expressed via the
Pickands dependence function A : Sd → [0, ∞) related to ` through `(x) = kxkA(x/kxk). Then at any u ∈ [0, 1]d ,
)#
"
(
log(ud )
log(u1 )
,...,
.
C0 (u) = exp log(u1 · · · ud )A
log(u1 · · · ud )
log(u1 · · · ud )
When d = 2, it is more common to define the Pickands dependence function A : [0, 1] → [0, 1] through `(x1 , x2 ) =
(x1 + x2 )A{x2 /(x1 + x2 )} so that, for all u1 , u2 ∈ [0, 1],
"
(
)#
log(u2 )
C0 (u1 , u2 ) = exp log(u1 u2 )A
.
(4)
log(u1 u2 )
Now consider a Liouville vector X = RDα with a strictly positive radial variable. Theorem 1 specifies when
X ∈ M(H0 ) and identifies H0 . While part (a) follows from regular variation of X, parts (b) and (c) are special cases
of the results discussed in Section 2.2 in [19]. Details of the proof may be found in B.
Theorem 1 Let X = RDα , Dα = (D1 , . . . , Dd ), α > 0d , and Pr(R ≤ 0) = 0. Then the following statements hold.
(a) If R ∈ M(Φρ ) for some ρ > 0, then X ∈ M(H0 ), where H0 is a multivariate extreme-value distribution with
univariate margins F0i = Φρ , i = 1, . . . , d, and a stable tail dependence function given, for all x ∈ Rd+ , by
ρ
Γ(αd )xd Dρd
Γ(ᾱ + ρ)
Γ(α1 )x1 D1
E max
,...,
`(x) =
.
Γ(ᾱ)
Γ(α1 + ρ)
Γ(αd + ρ)
(b) If R ∈ M(Λ), then X ∈ M(H0 ), where for all x ∈ Rd , H0 (x) =
Qd
i=1
Λ(xi ).
(c) If R ∈ M(Ψρ ) for some ρ > 0, then X ∈ M(H0 ), where for all x ∈ Rd , H0 (x) =
Qd
i=1
Ψρ+ᾱ−αi (xi ).
The next result, also proved in B, specifies the conditions under which 1/X ∈ M(H0 ) and gives the form of the limiting
extreme-value distribution H0 .
Theorem 2 Let X = R Dα , Dα = (D1 , . . . , Dd ), α > 0d , and assume that Pr(R ≤ 0) = 0. Let αM = max(α1 , . . . , αd ).
The following cases can be distinguished:
P
(a) If 1/R ∈ M(Φρ ) for ρ ∈ (0, αM ], set I1 = {i : αi ≤ ρ}, I2 = {i : αi > ρ} and ᾱ2 = i∈I2 αi . Then
1/X ∈ M(H0 ), where the univariate margins of H0 are F0i = Φρ∧αi , i = 1, . . . , d, and the stable tail dependence
function is given, for all x ∈ Rd+ , by
−ρ
X
e−ρ
Γ(ᾱ2 − ρ)
Γ(ᾱ − ρ)
Γ(αi )xi Di
X
Γ(αi )xi D
i
,
E max
xi +
E max
xi +
`(x) =
=
i∈I2 Γ(αi − ρ)
i∈I2 Γ(αi − ρ)
Γ(ᾱ)
Γ(ᾱ2 )
i∈I1
i∈I1
ei , i ∈ I2 ) is a Dirichlet random vector with parameters (αi , i ∈ I2 ) if |I2 | > 1 and D
ei ≡ 1 if I2 = {i}.
where (D
Q
(b) If E 1/Rβ < ∞ for β > αM , then 1/X ∈ M(H0 ), where for all x ∈ Rd , H0 (x) = di=1 Φαi (xi ).
Remark 1 Note that in the case of asymptotic independence between the components of X (Theorem 1 (b–c)) or
1/X (Theorem 2 (b)), dependence between component-wise maxima of finitely many vectors may still be present.
Refinements of asymptotic independence are then needed, but these considerations surpass the scope of this paper.
One option would be to consider triangular arrays as in [23]; extremes of arrays of Liouville vectors can be obtained
as a special case of extremes of arrays of weighted Dirichlet distributions developed in [18]. Another avenue worth
exploring might be the limits of scaled sample clouds, as in [2] and [32].
The stable tail dependence functions appearing in Theorems 1 and 2 will be investigated in greater detail in the
subsequent sections. Before proceeding, we introduce the following terminology, emphasizing that they can in fact be
embedded in one and the same parametric class.
Extremal attractors of Liouville copulas
5
Definition 1 For any α > 0 and ρ ∈ (−α, ∞), let c(α, ρ) = Γ(α + ρ)/Γ(α) denote the rising factorial. For d ≥ 2
and α1 , . . . , αd > 0 and let (D1 , . . . , Dd ) denote a Dirichlet random vector with parameters α = (α1 , . . . , αd ) and set
ᾱ = α1 + · · · + αd . For any − min(α1 , . . . , αd ) < ρ < ∞, the scaled extremal Dirichlet stable tail dependence function
with parameters ρ and α is given, for all x ∈ Rd+ , by
ρ
xd Dρd
x 1 D1
,
.
.
.
,
`D (x; ρ, α) = c(ᾱ, ρ)E max
,
c(α1 , ρ)
c(αd , ρ)
(5)
when ρ , 0 and by max(x1 , . . . , xd ) when ρ = 0. For any ρ > 0, the positive scaled extremal Dirichlet stable tail
dependence function `pD with parameters ρ and α is given, for all x ∈ Rd+ , by `pD (x; ρ, α) = `D (x; ρ, α), while for any
0 < ρ < min(α1 , . . . , αd ), the negative scaled extremal Dirichlet stable tail dependence function `nD is given, for all
x ∈ Rd+ , by `nD (x; ρ, α) = `D (x; −ρ, α).
Remark 2 As will be seen in Section 5, distinguishing between the positive and negative scaled extremal Dirichlet
models makes the discussion of their properties slightly easier because the sign of ρ impacts the shape of the corresponding angular measure. When ρ → 0, `D (x; ρ, α) becomes max(x1 , . . . , xd ), the stable tail dependence function
corresponding to comonotonicity, while when ρ → ∞, `D (x; ρ, α) becomes x1 + · · · + xd , the stable tail dependence
function corresponding to independence. Note also that ρ ∈ (−∞, ∞) can be allowed, with the convention that all
variables whose indices i are such that ρ ≤ −αi are independent, i.e., `nD is then of the form given in Theorem 2 (a).
From Theorems 1 and 2, we can now easily deduce the extremal behavior of Liouville copulas and their survival
counterparts. To this end, recall that a Liouville copula C is defined as the survival copula of a Liouville random
vector X = RDα with Pr(R ≤ 0) = 0. The following corollary follows directly from Theorem 2 upon noting that C is
also the unique copula of 1/X.
Corollary 1 Let C be the unique survival copula of a Liouville random vector X = RDα with Pr(R ≤ 0) = 0. Let
αM = max(α1 , . . . , αd ) and set I1 = {i : αi ≤ ρ}, I2 = {i : αi > ρ}. Then the following statements hold.
(a) If 1/R ∈ M(Φρ ) for ρ ∈ (0, αM ] and |I2 | > 1, then C ∈ M(C0 ), where C0 is an extreme-value copula of the form
(2) whose stable tail dependence function is given, for all x ∈ Rd+ , by
X
xi + `nD (x{2} ; ρ, α{2} ),
`(x) =
i∈I1
where and x{2} = (xi , i ∈ I2 ), α{2} = (αi , i ∈ I2 ). If 1/R ∈ M(Φρ ) for ρ ∈ (0, αM ] and |I2 | ≤ 1, then C ∈ M(Π),
where Π is the independence copula given, for all u ∈ [0, 1]d , by Π(u) = u1 · · · ud .
(b) If E 1/Rβ < ∞ for β > αM , then C ∈ M(Π).
Remark 3 Observe that Corollary 1 (a) in particular implies that when d = 2, α1 < α2 and 1/R ∈ M(Φρ ) for
α1 ≤ ρ < α2 , C ∈ M(Π). Also note that when α1 = · · · = αd ≡ α and 1/R ∈ M(Φρ ) for ρ ∈ (0, α), the result in
Corollary 1 (a) can be derived from formula (5) in Proposition 3 in [21] by relating the tail order function to the stable
tail dependence function when the tail order equals 1.
The survival counterpart Ĉ of a Liouville copula C is given as the distribution function of 1 − U, where U is a
random vector distributed as C. As C is the unique survival copula of X, Ĉ is the unique copula of X. The following
result thus follows directly from Theorem 1.
Corollary 2 Let Ĉ be the unique copula of a Liouville random vector X = R Dα with Pr(R ≤ 0) = 0. Then the
following statements hold.
(a) If R ∈ M(Φρ ) for ρ > 0, then Ĉ ∈ M(C0 ), where C0 is an extreme-value copula of the form (2) with the positive
scaled extremal Dirichlet stable tail dependence function given, for all x ∈ Rd+ , by `pD (x; ρ, α).
(b) If R ∈ M(Λ) or R ∈ M(Ψρ ) with ρ > 0, then Ĉ ∈ M(Π), where Π is the independence copula.
6
L. R. Belzile and J. G. Nešlehová
4. The case of integer-valued Dirichlet parameters
When α is integer-valued, Liouville distributions are particularly tractable because their survival function is explicit.
In this section, we will use this fact to derive closed-form expressions for the positive and negative scaled extremal
Dirichlet stable tail dependence functions. To this end, first recall the notion of the Williamson transform. The latter
is related to Weyl’s fractional integral transform and was used to characterize d-monotone functions in [43]; it was
adapted to non-negative random variables in [30].
Definition 2 Let X be a non-negative random variable with distribution function F, and let k ≥ 1 be an arbitrary
integer. The Williamson k-transform of X is given, for all x > 0, by
Wk F(x) =
∞
Z
x
x k−1
x k−1
dF(r) = E 1 −
.
1−
r
X +
For any k ≥ 1, the distribution of a positive random variable X is uniquely determined by its Williamson k-transform,
the formula for the inverse transform being explicit [30, 43]. If ψ = Wk F, then, for all x > 0,
F(x) = W−1
k ψ(x) = 1 −
k−2
X
(−1) j x j ψ( j) (x)
j!
j=0
−
(−1)k−1 xk−1 ψ+(k−1) (x)
,
(k − 1)!
where for j = 1, . . . , k − 2, ψ( j) is the jth derivative of ψ and ψ(k−1)
is the right-hand derivative of ψ(k−2) . These deriva+
tives exist because a Williamson k-transform ψ is necessarily k-monotone [43]. This means that ψ is differentiable up
to order k − 2 on (0, ∞) with derivatives satisfying (−1) j ψ( j) ≥ 0 for j = 0, . . . , k − 2 and such that (−1)k−2 ψ(k−2) is
non-increasing and convex on (0, ∞). Moreover, ψ(x) → 0 as x → ∞ and if F(0) = 0, ψ(x) → 1 and x → 0.
Now let C be a Liouville copula corresponding to a Liouville random vector X = RDα with integer-valued
parameters α = (α1 , . . . , αd ) and a strictly positive radial part R, i.e., Pr(R ≤ 0) = 0. Let ψ be the Williamson
ᾱ-transform of R and set Iα = {0, . . . , α1 − 1} × · · · × {0, . . . , αd − 1}. By Theorem 2 in [31], one then has, for all x ∈ Rd+ ,
Pr(X > x) = H̄(x) =
X
ψ( j1 +···+ jd ) (x1 + · · · + xd ) Y ji
xi .
j1 ! · · · jd !
i=1
d
(−1) j1 +···+ jd
( j1 ,..., jd )∈Iα
(6)
In particular, the margins of X have survival functions satisfying, for all x > 0 and i = 1, . . . , d,
Pr(Xi > x) = H̄i (x) =
α
i −1
X
j=0
(−1) j x j ψ( j) (x)
= 1 − W−1
αi ψ(x).
j!
(7)
By Sklar’s Theorem for survival functions, the Liouville copula C is given, for all u ∈ [0, 1]d , by
C(u) = H̄{H̄1−1 (u1 ), . . . , H̄d−1 (ud )}.
Although this formula is not explicit, it is clear from Equations (6) and (7) that C depends on the distribution of X
only through the Williamson ᾱ-transform ψ of R and the Dirichlet parameters α. For this reason, we shall denote
the Liouville copula in this section by Cψ,α and refer to ψ as its generator, reiterating that ψ must be an ᾱ-monotone
function satisfying ψ(1) = 0 and ψ(x) → 0 as x → ∞. When α = 1d , Cψ,1 is the Archimedean copula with generator
ψ, given, for all u ∈ [0, 1]d by Cψ,1 (u) = ψ{ψ−1 (u1 ) + · · · + ψ−1 (ud )}. Because the relationship between ψ and R is
one-to-one [30, Proposition 3.1], we will refer to R as the radial distribution corresponding to ψ.
Now suppose that 1/R ∈ M(Φρ ) with ρ ∈ (0, 1). By Theorem 2 in [27], this condition is equivalent to 1 − ψ(1/·) ∈
R−ρ . It further follows from Corollary 1 (a) that Cψ,α ∈ M(C0 ) where C0 is an extreme-value copula with the negative
scaled extremal Dirichlet stable tail dependence function `nD (·; ρ, α). This is because ρ < 1 ≤ min(α1 , . . . , αd ) so that
I1 = ∅ in Corollary 1 (a). Eq. (6) and the results of [27] can now be used to derive the following explicit expression
for `nD , as detailed in C.
7
Extremal attractors of Liouville copulas
Proposition 3 Let Cψ,α be a Liouville copula with integer-valued parameters α = (α1 , . . . , αd ) and generator ψ. If
1 − ψ(1/·) ∈ R−ρ for some ρ ∈ (0, 1), then Cψ,α ∈ M(C0 ), where C0 is an extreme-value copula with scaled negative
extremal Dirichlet stable tail dependence function `nD as given in Definition 1. Furthermore, for all x ∈ Rd+ ,
n
o1/ρ ji
ρ
d (
)
xi
d
1/ρ
X Γ( j1 + · · · + jd − ρ) Y
X
xj
1
c(αi ,−ρ)
.
1 − ρ
`nD (x; ρ, α) = Γ(1 − ρ)
c(α j , −ρ)
Γ(1 − ρ)
Γ( ji + 1) Pd n xk o1/ρ
( j1 ,..., jd )∈Iα
i=1
j=1
k=1 c(α ,−ρ)
( j1 ,..., jd ),(0,...,0)
k
When α = 1d , the index set Iα reduces to the singleton {0}, and the expression for `nD given in Proposition 3 simplifies,
for all x ∈ Rd+ , to the stable tail dependence function of the Gumbel–Hougaard copula, viz.
`nD (x; ρ, 1d ) = x11/ρ + · · · + xd1/ρ ρ .
The Liouville copula Cψ,1d , which is the Archimedean copula with generator ψ, is thus indeed in the domain of
attraction of the Gumbel–Hougaard copula with parameter 1/ρ, as shown, e.g., in [6, 27].
Remark 4 When α = 1d and 1 − ψ(1/·) ∈ R−1 , it is shown in Proposition 2 of [27] that Cψ,1 is in the domain of
attraction of the independence copula. However, when α is integer-valued but such that max(α1 , . . . , αd ) > 1, regular
variation of 1 − ψ(1/·) does not suffice to characterize those cases in Corollary 1 that are not covered by Proposition 3.
This is because by Theorem 2 of [27], 1/R ∈ M(Φρ ) for ρ ≥ 1, 1/R ∈ M(Λ) and 1/R ∈ M(Ψρ ) for ρ > 0 all imply
that 1 − ψ(1/·) ∈ R−1 . At the same time, by Corollary 1, Cψ,α ∈ M(Π) clearly does not hold in all these cases.
Next, let Ĉψ,α be the survival copula of a Liouville copula Cψ,α , i.e., the distribution function of 1 − U, where U is a
random vector with distribution function Cψ,α . The results of [27] can again be used to restate the conditions under
which Ĉψ,α ∈ M(C0 ) in terms of ψ and to give an explicit expression for the stable tail dependence function of C0 .
Proposition 4 Let Ĉψ,α be the survival copula of a Liouville copula Cψ,α with integer-valued parameters α and a
generator ψ. Then the following statements hold.
(a) If ψ ∈ R−ρ for some ρ > 0, then Ĉψ,α ∈ M(C0 ), where C0 has a positive scaled extremal Dirichlet stable tail
dependence function `pD as given in Definition 1. The latter can be expressed, for all x ∈ Rd+ , as
−1/ρ −ρ
d
k
X
X
X
x
Γ(1
+
ρ)
i
j
(−1)k+1
`pD (x; ρ, α) =
×
Γ(ρ) k=1 1≤i <···<i ≤d
j=1 c(αi j , ρ)
1
k
n
o−1/ρ jm
xim
k
Y
Γ( j1 + · · · + jk + ρ)
c(αim , ρ)
.
−1/ρ
Pk
xi j
j
!
·
·
·
j
!
1
k
( j1 ,..., jk )∈I(αi ,...,αi )
m=1
1
k
X
j=1
c(αi j , ρ)
(b) If ψ ∈ M(Λ) or ψ ∈ M(Ψρ ) for some ρ > 0, C̄ψ,α ∈ M(Π), where Π is the independence copula.
When α = 1d , the expression for `pD in part (a) of Proposition 4 simplifies, for all x ∈ Rd+ , to
X
X −1/ρ −ρ
pD
|A|+1
` (x; ρ, 1d ) =
(−1)
x
,
i
A⊆{1,...,d}, A,∅
i∈A
which is the stable tail dependence function of the Galambos copula [24]. When ψ ∈ R−ρ for some ρ > 0, Ĉψ,1d is thus
indeed in the domain of attraction of the Galambos copula, as shown, e.g., in [27].
5. Properties of the scaled extremal Dirichlet models
In this section, the scaled extremal Dirichlet model with stable tail dependence function given in Definition 1 is
investigated in greater detail. In Section 5.1 we derive formulas for the so-called angular density and relate the
positive and negative scaled extremal Dirichlet models to classical classes of stable tail dependence functions. In
Section 5.2 we focus on the bivariate case and derive explicit expressions for the stable tail dependence functions and,
as a by-product, obtain formulas for the tail dependence coefficients of Liouville copulas.
8
L. R. Belzile and J. G. Nešlehová
scaled Dirichlet, ρ < 0
2.0
1.5
0.0
0.0
0.5
1.0
Angular density
2.0
1.0
Angular density
3.0
2.5
3.0
scaled Dirichlet, ρ > 0
0.0
0.2
0.4
0.6
w
0.8
1.0
0.0
0.2
0.4
0.6
0.8
1.0
w
Figure 1: Angular density of the scaled extremal Dirichlet model. Left panel: ρ = 4/5 and α = (2, 1/2) (black full),
ρ = 1/4 and α = (1/10, 1/10) (red dashed), ρ = 1/4 and α = (1/2, 1/2) (blue dotted). Right panel: ρ = −1/4 and
α = (2, 1/2) (black full), α = (2/5, 2/5) (red dashed) and α = (1/2, 1/2) (blue dotted).
5.1. Angular density
The first property worth noting is that the positive and negative scaled extremal Dirichlet models are closed under
marginalization. Indeed, letting xi → 0 for some arbitrary 1 ≤ i ≤ d, we can easily derive from Lemma 2 that for
any α > 0d , ρ > 0, and any x ∈ Rd+ , `pD (x; ρ, α) → `pD (x−i ; ρ, α−i ) as xi → 0, where for any y ∈ Rd , y−i denotes the
vector (y1 , . . . , yi−1 , yi+1 , . . . , yd ). Similarly, for any 1 ≤ i ≤ d, α > 0d , 0 < ρ < min(α1 , . . . , αd ), and any x ∈ Rd+ ,
`nD (x; ρ, α) → `nD (x−i ; ρ, α−i ) as xi → 0.
Since none of the scaled extremal Dirichlet models places mass on the vertices or facets of the simplex Sd when
ρ , 0, the density of the angular measure σd completely characterizes the stable tail dependence function and hence
also the associated extreme-value copula. This so-called angular density of the scaled extremal Dirichlet models is
given below and derived in D.
Proposition 5 Let d ≥ 2 and set α1 , . . . , αd > 0 and ᾱ = α1 + · · · + αd . For any ρ > − min(α1 , . . . , αd ), let also
c(α, ρ) = (c(α1 , ρ), . . . , c(αd , ρ)), where c(α, ρ) is as in Definition 1. Then for any − min(α1 , . . . , αd ) < ρ < ∞, ρ , 0,
the angular density of the scaled extremal Dirichlet model with parameters ρ > 0 and α is given, for all w ∈ Sd , by
d
−ρ−ᾱ d
Y
X n
o1/ρ
Γ(
ᾱ
+
ρ)
hD (w; ρ, α) =
c(α
,
ρ)w
{c(αi , ρ)}αi /ρ wiαi /ρ−1 .
Q
j
j
d
d−1
d|ρ|
i=1 Γ(αi ) j=1
i=1
The angular density of the positive scaled extremal Dirichlet model with parameters ρ > 0 and α is given, for all
w ∈ Sd , by hpD (w; ρ, α) = hD (w; ρ, α), while the angular density of the negative scaled extremal Dirichlet model with
parameters 0 < ρ < min(α1 , . . . , αd ) and α is given, for all w ∈ Rd+ , by hnD (w; ρ, α) = hD (w; −ρ, α).
From Proposition 5, it is easily seen that when α = 1d , the angular density hpD reduces, for any ρ > 0 and w ∈ Sd ,
to the angular density of the symmetric negative logistic model; see, e.g., Section 4.2 in [7]. In general, the angular
density hpD is not symmetric unless α = α1d .
The positive scaled Dirichlet model can thus be viewed as a new asymmetric generalization of the negative logistic
model which does not place any mass on the vertices or facets of Sd , unless at independence or comonotonicity, i.e.,
when ρ → ∞ and ρ → 0, respectively. Furthermore, hpD can also be interpreted as a generalization of the Coles–
Tawn extremal Dirichlet model. Indeed, hpD (x; 1, α) is precisely the angular density of the latter model given, e.g., in
Equation (3.6) in [7]. Similarly, the negative scaled extremal Dirichlet model is a new asymmetric generalization of
Gumbel’s logistic model [16]. Indeed, when α = 1d , hnD simplifies to the logistic angular density, given, e.g., on p.
381 in [7].
9
Extremal attractors of Liouville copulas
scaled Dirichlet,
α = (1, 1/2, 1/5), ρ = 1/5
scaled Dirichlet,
α = (5/4, 2, 1), ρ = −2/5
w3 = 1
w3 = 1
w1 = 1
w1 = 1
w2 = 1
w1 = 1
w2 = 1
scaled Dirichlet,
α = (1/5, 1/5, 1/5), ρ = 1/5
scaled Dirichlet,
α = (5/4, 5/4, 5/4), ρ = −2/5
w3 = 1
w3 = 1
w2 = 1
w1 = 1
w2 = 1
Figure 2: Angular density of the scaled extremal Dirichlet model with α = (1, 1/2, 1/5), ρ = 1/5 (top left) and
α = (1/5, 1/5, 1/5), ρ = 1/5 (bottom left), α = (5/4, 2, 1), ρ = −2/5 (top right) and α = (5/4, 5/4, 5/4), ρ = −2/5
(bottom right). The colors correspond to log density values and range from red (high density) to blue (low density).
Figures 1 and 2 illustrate the various shapes of hpD and hnD that obtain through various choices of α and ρ. The
asymmetry when α , α1d is clearly apparent. For the same value of ρ, the shapes of the angular density can be quite
different depending on α. In view of the aforementioned closure of both the positive and negative scaled extremal
Dirichlet models under marginalization, this means that these models are able to capture strong dependence in some
pairs of variables (represented by a mode close to 1/2 of the angular density) and at the same time weak dependence
in others pairs (represented by a bathtub shape).
5.2. The bivariate case
When d = 2, the stable tail dependence functions of the positive and negative scaled extremal Dirichlet models have
a closed-form expression in terms of the incomplete beta function given, for any t ∈ (0, 1) and α1 , α2 > 0, by
B(t; α1 , α2 ) =
Z
0
t
xα1 −1 (1 − x)α2 −1 dx.
When t = 1, this integral is the beta function, viz. B(α1 , α2 ) = Γ(α1 )Γ(α2 )/Γ(α1 + α2 ). A direct calculation yields the
corresponding Pickands dependence function, for any t ∈ [0, 1], ApD (t; ρ, α1 , α2 ) = `pD (1 − t, t; ρ, α1 , α2 ), i.e.,
10
L. R. Belzile and J. G. Nešlehová
scaled Dirichlet, ρ < 0
1.0
1.0
0.9
0.9
0.8
0.8
A(t)
A(t)
scaled Dirichlet, ρ > 0
0.7
0.7
0.6
0.6
0.5
0.5
0.0
0.2
0.4
0.6
0.8
1.0
0.0
t
0.2
0.4
0.6
0.8
1.0
t
Figure 3: Pickands dependence function of the scaled extremal Dirichlet model. Left panel: ρ = 4/5 and α = (2, 1/2)
(black full), ρ = 1/4 and α = (1/10, 1/10) (red dashed), ρ = 1/4 and α = (1/2, 1/2) (blue dotted). Right panel:
ρ = −1/4 and α = (2, 1/2) (black full), α = (2/5, 2/5) (red dashed) and α = (1/2, 1/2) (blue dotted).
ApD (t; ρ, α1 , α2 ) =
"
#
(1 − t)
{c(α2 , ρ)(1 − t)}1/ρ
B
;
α
,
α
+
ρ
2
1
B(α2 , α1 + ρ) {c(α2 , ρ)(1 − t)}1/ρ + {c(α1 , ρ)t}1/ρ
"
#
t
{c(α1 , ρ)t}1/ρ
B
+
; α1 , α2 + ρ .
B(α1 , α2 + ρ) {c(α2 , ρ)(1 − t)}1/ρ + {c(α1 , ρ)t}1/ρ
When α1 = α2 = 1, ApD becomes the Pickands dependence function of the Galambos copula, viz. ApD (t; ρ, 1, 1) =
1 − t−1/ρ + (1 − t)−1/ρ −ρ , as expected given that the positive scaled extremal Dirichlet model becomes the symmetric
negative logistic model in this case.
Similarly, for any t ∈ [0, 1], the Pickands dependence function AnD (t; ρ, α1 , α2 ) = `nD (1 − t, t; ρ, α1 , α2 ) equals
AnD (t; ρ, α1 , α2 ) =
"
#
(1 − t)
{(1 − t)c(α2 , −ρ)}1/ρ
B
;
α
−
ρ,
α
1
2
B(α1 − ρ, α2 ) {tc(α1 , −ρ)}1/ρ + {(1 − t)c(α2 , −ρ)}1/ρ
#
"
t
{tc(α1 , −ρ)}1/ρ
; α2 − ρ, α1 .
+
B
B(α2 − ρ, α1 ) {tc(α1 , −ρ)}1/ρ + {(1 − t)c(α2 , −ρ)}1/ρ
When α1 = α2 = 1, AnD simplifies to the stable tail dependence function of the Gumbel extreme-value copula, viz.
AnD (t; ρ, 1, 1) = t1/ρ + (1 − t)1/ρ ρ . This again confirms that the negative scaled extremal Dirichlet model becomes
the symmetric logistic model when α1 = α2 = 1. The Pickands dependence functions ApD and AnD are illustrated in
Figure 3, for the same choices of parameters and the corresponding angular density shown in Figure 1.
The above formulas for ApD and AnD now easily lead to expressions for their upper tail dependence coefficients.
Recall that for an arbitrary bivariate copula C, the lower and upper tail dependence coefficients of [25] are given by
C(u, u)
,
u→0
u
λ` (C) = lim
C(u, u) − 1
Ĉ(u, u)
= lim
,
u→1
u→0
u−1
u
λu (C) = 2 − lim
where Ĉ is the survival copula of C, provided these limits exist. When C is bivariate extreme-value with Pickands
dependence function A, it follows easily from (4) that λ` (C) = 0 and λu (C) = 2 − 2A(1/2).
Extremal attractors of Liouville copulas
11
pD
Now suppose that Cρ,α is a bivariate extreme-value copula with positive scaled extremal Dirichlet Pickands dependence function ApD and parameters ρ > 0 and α1 , α2 > 0. Then
pD
λu (Cρ,α )
(
)
c(α2 , ρ)1/ρ
1
B
; α2 , α1 + ρ
=2−
B(α2 , α1 + ρ)
c(α2 , ρ)1/ρ + c(α1 , ρ)1/ρ
(
)
1
c(α1 , ρ)1/ρ
−
B
;
α
,
α
+
ρ
. (8)
1
2
B(α1 , α2 + ρ)
c(α2 , ρ)1/ρ + c(α1 , ρ)1/ρ
nD
Similarly, if Cρ,α
is a bivariate extreme-value copula with negative scaled extremal Dirichlet Pickands dependence
nD
function A and parameters α1 , α2 > 0 and 0 < ρ < min(α1 , α2 ), then
nD
λu (Cρ,α
)=2−
(
)
1
c(α2 , −ρ)1/ρ
B
;
α
−
ρ,
α
1
2
B(α1 − ρ, α2 )
c(α1 , −ρ)1/ρ + c(α2 , −ρ)1/ρ
)
(
1
c(α1 , −ρ)1/ρ
;
α
−
ρ,
α
+
B
2
1 . (9)
B(α2 − ρ, α1 )
c(α1 , −ρ)1/ρ + c(α2 , −ρ)1/ρ
In the symmetric case α1 = α2 ≡ α, Expressions (8) and (9) simplify to
pD
λu (Cρ,α )
!
1
2
=2−
B ; α, α + ρ ,
B(α, α + ρ) 2
nD
λu (Cρ,α
)
!
2
1
=2−
B ; α − ρ, α .
B(α − ρ, α) 2
Formulas (8) and (9) lead directly to expressions for the tail dependence coefficients of Liouville copulas. This is
because if C ∈ M(C0 ), where C0 is an extreme-value copula with Pickands tail dependence function A0 , λu (C) =
2 − 2A0 (1/2) [29, Proposition 7.51]. Similarly, if Ĉ ∈ M(C0∗ ), where C0∗ is an extreme-value copula with Pickands
tail dependence function A∗0 , λ` (C) = 2 − 2A∗0 (1/2). The following corollary is thus an immediate consequence of
Corollaries 1 and 2.
Corollary 3 Suppose that C is the survival copula of a Liouville random vector RDα with parameters α > 0 and a
radial part R such that Pr(R ≤ 0) = 0. Then the following statements hold.
pD
(a) If R ∈ M(Φρ ) for some ρ > 0, λ` (C) = λu (Cρ,α ) is given by Eq. (8).
(b) If R ∈ M(Λ) or R ∈ M(Ψρ ) for some ρ > 0, λ` (C) = 0.
nD
(c) If 1/R ∈ M(Φρ ) for some 0 < ρ < α1 ∧ α2 , λu (C) = λu (Cρ,α
) is given by Eq. (9).
(d) If 1/R ∈ M(Φρ ) for ρ > α1 ∧ α2 or if E(1/Rβ ) < ∞ for β > α1 ∨ α2 , λu (C) = 0.
The role of the parameters α and ρ is best explained if we consider the reparametrization ∆α = |α1 − α2 | and
Σα = α1 + α2 . As is the case for the Dirichlet distribution, the level of dependence is higher for large values of Σα .
Furthermore, λu is monotonically decreasing in ρ. Higher levels of extremal asymmetry, as measured by departures
from the diagonal on the copula scale, are governed by both Σα and ∆α . The larger Σα , the lower the asymmetry.
Likewise, the larger ∆α , the larger the asymmetry. Contrary to the case of extremal dependence, the behavior in ρ is
not monotone. For the negative scaled extremal Dirichlet model, asymmetry is maximal when ρ ≈ α1 ∧ α2 . When
Σα is small, smaller values of ρ induce larger asymmetry, but this is not the case for larger values of Σα where the
asymmetry profile is convex with a global maximum attained for larger values of ρ.
6. de Haan representation and simulation algorithms
Random samples from the scaled extremal Dirichlet model can be drawn efficiently using the algorithms recently
developed in [10]. We first derive the so-called de Haan representation in Section 6.1 and adapt the algorithms from
[10] to the present setting in Section 6.2.
12
L. R. Belzile and J. G. Nešlehová
6.1. de Haan representation
First, introduce the following family of univariate distributions, which we term the scaled Gamma family and denote
by sGa(a, b, c). It has three parameters a, c > 0 and b , 0 and a density given, for all x > 0, by
( b )
|b| −bc bc−1
x
f (x; a, b, c) =
a x
exp −
.
(10)
Γ(c)
a
d
Observe that when Z ∼ Ga(c, 1) is a Gamma variable with shape parameter c > 0 and scaling parameter 1, Y = aZ 1/b is
scaled Gamma sGa(a, b, c). Consequently, E (Y) = aΓ(c + 1/b)/Γ(c) < ∞ provided that b < −1/c. The scaled Gamma
family includes several well-known distributions as special cases, notably the Gamma when b = 1, the Weibull when
c = 1 and b > 0, the inverse Gamma when b = −1, and the Fréchet when c = 1 and b < 0. When b > 0, the scaled
Gamma is the generalized Gamma distribution of [41], albeit in a different parametrization.
Now consider the parameters α = (α1 , . . . , αd ) with α > 0d and ρ > − min(α1 , . . . , αd ), ρ , 0. Let V be a random
vector with independent scaled Gamma margins Vi ∼ sGa{1/c(αi , ρ), 1/ρ, αi }, where for α > 0, c(α, ρ) = Γ(α+ρ)/Γ(α)
as in Definition 1. If Z is a random vector with independent Gamma margins Zi ∼ Ga(αi , 1) then for all i = 1, . . . , d,
d
Vi = Ziρ /c(αi , ρ). Furthermore, recall that kZk ∼ Ga(ᾱ, 1) is independent of Z/kZk, which has the same distribution
as the Dirichlet vector Dα = (D1 , . . . , Dd ). One thus has, for all x ∈ Rd+ ,
)#
)#
"
(
"
(
xi Dρi
xi Ziρ
ρ
= E (kZk ) E max
= `D (x; ρ, α),
(11)
E max (xi Vi ) = E max
1≤i≤d c(αi , ρ)
1≤i≤d
1≤i≤d c(αi , ρ)
where `D is as in Definition 1, given that E (kZkρ ) = c(ᾱ, ρ).
When ρ = 1, the positive scaled Dirichlet extremal model becomes the Coles–Tawn Dirichlet extremal model,
Vi ∼ Ga(αi , 1) and Eq. (11) reduces to the representation derived in [37]. When α = 1d , `D becomes the stable tail
dependence function of the negative logistic model, Vi is Weibull and Eq. (11) is the representation in Appendix A.2.4
of [10]. Similarly, when ρ < 0 and α = 1d , the negative scaled Dirichlet extremal model becomes the logistic model,
Vi is Fréchet and Eq. (11) is the representation in Appendix A.2.4 of [10]. The requirement that ρ > − min(α1 , . . . , αd )
ensures that the expectation of Vi is finite for all i ∈ {1, . . . , d}.
Eq. (11) implies that the max-stable random vector Y with unit Fréchet margins and extreme-value copula with
stable tail dependence function `D (·; ρ, α) admits the de Haan [9] spectral representation
d
Y = max ζk V k ,
k∈N
(12)
−2
where Z = {ζk }∞
dζ and V k is an i.i.d. sequence of rank=1 is a Poisson point process on (0, ∞) with intensity ζ
dom vectors independent of Z. Furthermore, the univariate margins of V k are independent and such that Vk j ∼
sGa{1/c(α j , ρ), 1/ρ, α j } for j = 1, . . . , d with E (V k ) = 1d for all k ∈ N.
6.2. Unconditional simulation
The de Haan representation (12) offers, among other things, an easy route to unconditional simulation of max-stable
random vectors that follow the scaled Dirichlet extremal model, as laid out in [10] in the more general context of maxstable processes. To see how this work applies in the present setting, fix an arbitrary j0 ∈ {1, . . . , d} and recall that the
j0 th extremal function φ+j0 is given, almost surely, as ζk V k such that Y j0 = ζk Vk j0 . From Eq. (12) and Proposition 1 in
d
[10] it then directly follows that φ+j0 /Y j0 = (W j0 1 /W j0 j0 , . . . , W j0 d /W j0 j0 ), where W j0 = (W j0 1 , . . . , W j0 d ) is a random
vector with density given, for all x ∈ Rd+ , by
d
Y
h
i
h
i
|1/ρ|
|1/ρ|
α j /ρ
α /ρ−1
c(α j0 , ρ)α j0 /ρ x j0 0 exp −{c(α j0 , ρ)x j0 }1/ρ ×
c(α j , ρ)α j /ρ x j j
exp −{c(α j , ρ)x j }1/ρ .
Γ(α j0 )
Γ(α j )
j=1, j, j
0
This means that the components of W j0 are independent and such that W j0 j ∼ sGa{1/c(α j , ρ), 1/ρ, α j } when j , j0
and W j0 j0 ∼ sGa{1/c(α j0 , ρ), 1/ρ, α j0 + ρ}. In other words, W j0 j0 ∼ Z ρj0 /c(α j0 , ρ) where Z j0 ∼ Ga(α j0 + ρ, 1), while for
all j , j0 , W j0 j = Z ρj /c(α j , ρ) where Z j ∼ Ga(α j , 1).
d
Extremal attractors of Liouville copulas
13
The exact distribution of φ+j0 /Y j0 given above now allows for an easy adaptation of the algorithms in [10]. To
draw an observation from the extreme-value copula with the scaled Dirichlet stable tail dependence function `D with
parameters α > 0d and ρ > − min(α1 , . . . , αd ), ρ , 0, one can follow Algorithms 1 and 2 below. The first procedure
corresponds to Algorithm 1 in [10] and relies on [36]; the second is an adaptation of Algorithm 2 in [10].
Algorithm 1 Exact simulations from the extreme-value copula based on spectral densities.
1: Simulate E ∼ Exp(1) .
2: Set Y = 0.
3: while 1/E > min(Y1 , . . . , Yd ) do
4:
Simulate J from the uniform distribution on {1, . . . , d}.
5:
Simulate independent Z j ∼ Ga(α j , 1) for j ∈ {1, . . . , d} \ J and Z J ∼ Ga(α J + ρ, 1).
6:
Set W j ← Z ρj /c(α j , ρ), j = 1, . . . , d.
7:
Set S ← W/kWk.
8:
Update Y ← max{Y, dS/E}.
9:
Simulate E ∗ ∼ Exp(1) and update E ← E + E ∗ .
10: return U = exp(−1/Y).
Algorithm 2 Exact simulations based on sequential sampling of the extremal functions.
Simulate Z1 ∼ Ga(α1 + ρ, 1) and Z j ∼ Ga(α j , 1), j = 2, . . . , d.
Compute W where W j ← Z ρj /c(α j , ρ), j = 1, . . . , d.
Simulate E1 ∼ Exp(1).
Set Y ← W/(W1 E1 ).
for k = 2, . . . , d do
Simulate Ek ∼ Exp(1).
while 1/Ek > Yk do
Simulate independent Zk ∼ Ga(αk + ρ, 1) and Z j ∼ Ga(α j , 1), j = 1, . . . , d, j , k .
Set W = (W1 , . . . , Wd ) where W j ← Z ρj /c(α j , ρ), j = 1, . . . , d.
if Wi /(Wk Ek ) < Yi for all i = 1, . . . , k − 1 then
Update Y ← max{Y, W/(Wk Ek )}.
12:
Simulate E ∗ ∼ Exp(1) and update Ek ← Ek + E ∗ .
13: return U = exp(−1/Y).
1:
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
Note that S obtained in Step 7 of Algorithm 1 has the angular distribution σd of `D ; see Theorem 1 in [10].
Similar algorithms for drawing samples from the angular distribution of the extremal logistic and Dirichlet models
were obtained in [3]. Algorithm 2 requires a lower number of simulations and is more efficient on average, cf. [10].
Both algorithms are easily implemented using the function rmev in the mev package within the R Project for Statistical
Computing [34], which returns samples of max-stable scaled extremal Dirichlet vectors with unit Fréchet margins,
i.e., Y in Algorithms 1 and 2.
7. Estimation
The scaled extremal Dirichlet model can be used to model dependence between extreme events. To this end, several
schemes can be envisaged. For example, one can consider the block-maxima approach, given that max-stable distributions are the most natural for such data. Another option is peaks-over-threshold models. Yet another alternative,
used in [13] for the Brown–Resnick model, is to approximate the conditional distribution of a random vector with unit
Fréchet margins given that the j0 th component exceeds a large threshold by the distribution of φ+j0 /Y j0 discussed in
Section 6.2.
Here, we focus on the multivariate tail model of [28]; see also Section 16.4 in [29]. To this end, let X1 , . . . , Xn be a
random sample from some unknown multivariate distribution H with continuous univariate margins which is assumed
to be in the maximum domain of attraction of a multivariate extreme-value distribution H0 . To model the tail of H, its
margins F j , j = 1, . . . , d can first be approximated using the univariate peaks-over-threshold method. For all x above
14
L. R. Belzile and J. G. Nešlehová
some high threshold u j , one then has
F j (x) ≈ F̃ j (x; η j , ξ j ) = 1 − ν j 1 + ξ j
(x − u j )
ηj
!−1/ξ j
,
(13)
+
where ν j = 1 − F j (u j ), and η j > 0 and ξ j are the parameters of the generalized Pareto distribution. Furthermore, for
w sufficiently close to 1d , the copula of H can be approximated by the extreme-value copula C0 of H0 , so that, for
x ≥ u, H(x) ≈ H̃(x) = C0 {F̃1 (x1 ), . . . , F̃d (xd )}. The parameters of this multivariate tail model, i.e., the parameters
θ of the stable tail dependence function `0 of C0 as well as the marginal parameters ν, η and ξ can be estimated
using likelihood methods; this allows, e.g., for Bayesian inference, generalized additive modeling of the parameters
and model selection based on likelihood-ratio tests. For a comprehensive review of likelihood inference methods for
extremes, see, e.g., [22].
The multivariate tail model can be fitted in low-dimensions using the censored likelihood L(X; ν, η, ξ, θ) =
Qn
i=1 Li (X i ; ν, η, ξ, θ), where for i = 1, . . . , n,
Li (Xi ; u, ν, η, ξ, θ) =
∂mi H̃(y1 , . . . , yd )
∂y j1 · · · ∂y jmi
=
y=max(Xi ,u)
∂mi exp{−`0 (1/y)}
∂y j1 · · · ∂y jmi
mi
Y
J jk (Xi jk )
(14)
y=t{max(Xi ,u)} k=1
In this expression, the indices j1 , . . . , jmi are those of the components of Xi exceeding the thresholds u and for x ≥ u,
t(x) = (t1 (x1 ), . . . , td (xd )), where for j = 1, . . . , d,
(x j − u j )
νj
1 + ξj
J j (x j ) =
ηj
ηj
1
,
t j (x j ) = −
log{F̃ j (x j ; η j , ξ j )}
!−1/ξ j −1
1
.
[log{F̃ j (x j ; η j , ξ j )}]2 F̃ j (x j ; η j , ξ j )
(15)
The censored likelihood L(X; ν, η, ξ, θ) can be maximized either over all parameters at once, or the marginal parameters ν, η and ξ can be estimated from each univariate margin separately, so that only the estimate of θ is obtained
through maximizing L. When d is large, one can also maximize the likelihood in [40] that uses the tail approximation
H̄(x) ≈ 1 − `(1/x). In either case, `0 and the higher-order partial derivatives of `0 (1/x) need to be computed.
When `0 is the scaled extremal Dirichlet stable tail dependence function `D (·; ρ, α) given in Definition 1 with
parameters α > 0 and ρ > − min(α1 , . . . , αd ), ρ , 0, its expression is not explicit. However, `D can be calculated numerically using adaptive numerical cubature algorithms for integrals of functions defined on the simplex, as
implemented in, e.g., the R package SimplicialCubature. Given the representation in Eq. (5), `D is also easily
approximated using Monte Carlo methods. Instead of employing Eq. (5) directly and sampling from the Dirichlet
vector Dα , one can use the more efficient importance sampling estimator
h
i
−1 ρ
B max
X
1≤ j≤d {c(α j , ρ)u j } Di j
1
`bD (1/u, ρ, α) =
,
1 Pd
−1 ρ
B i=1
j=1 c(α j , ρ) Di j
d
P
where Di ∼ d−1 dj=1 Dir(α + I j ρ1d ) is sampled from a Dirichlet mixture.
The partial derivatives of `D can be calculated using the following result, shown in E.
Proposition 6 Let `D be the scaled extremal Dirichlet stable tail dependence function with parameters α > 0d and
− min(α1 , . . . , αd ) < ρ < ∞, ρ , 0. Then, for any x ∈ Rd+ ,
d
−ρ−ᾱ d
Y
X n
o1/ρ
∂d `D (1/x)
Γ(ᾱ + ρ)
D
= −dh (x; ρ, α) = −
c(α j , ρ)x j
{c(αi , ρ)}αi /ρ xiαi /ρ−1 ,
Qd
d−1
∂x1 · · · ∂xd
|ρ|
Γ(α
)
i
i=1
j=1
i=1
where hD is as given in Proposition 5. Furthermore, for all k = 1, . . . , d − 1 and x ∈ Rd+ ,
∂k `D (1/x)
=−
∂x1 · · · ∂xk
Z
∞
tk
0
k
Y
i=1
f xi t;
!Y
!
d
1
1
1
1
, , αi
F xi t;
, , αi dt,
c(αi , ρ) ρ
c(αi , ρ) ρ
i=k+1
(16)
15
Extremal attractors of Liouville copulas
where f (; a, b, c) and F(; a, b, c) denote, respectively the density and distribution function of the Rscaled Gamma
x
distribution with parameters a, c > 0 and b , 0 given in Eq. (10). Furthermore, if γ(c, x) = 0 tc−1 e−t dt denotes the lower incomplete gamma function, then for x > 0, F(x; a, b, c) = γ{c, (x/a)b }/Γ(c) when b > 0 while
F(x; a, b, c) = 1 − γ{c, (x/a)b }/Γ(c) when b < 0.
Other estimating equations could be used to circumvent the calculation of `D (1/x) and its partial derivatives. An
interesting alternative to likelihoods in the context of proper scoring functions is proposed in [8]. Specifically, the
authors advocate the use of the gradient score, adapted by them for the peaks-over-threshold framework,
(
)
d
X
∂2 log h(x) 1 ∂ log h(x) 2
∂wi (x) ∂ log h(x)
2
+
+ wi (x)
δw (x) =
2wi (x)
∂xi
∂xi
2
∂xi
∂xi2
i=1
for a differentiable weighting function w(x), unit Fréchet observations x and density h(x) that would correspond in
the setting of the scaled extremal Dirichlet to dhD (x; ρ, α). Explicit expressions for the derivatives of log dhD may be
P
found in E. The parameter estimates are obtained as the solution to argmaxθ∈Θ ni=1 δw (xi )IR(xi /u)>1 , where θ = (ρ, α)
is the vector of parameters of the model and R is a differentiable risk functional, usually the ` p norm for some p ∈ N.
Although the gradient score is not asymptotically most efficient, weighting functions can be designed to reproduce
approximate censoring, lending the method robustness and tractability.
8. Data illustration
In this section, we illustrate the use of the scaled extremal Dirichlet model on a trivariate sample of daily river
flow data of the river Isar in southern Germany; this dataset is a subset of the one analyzed in [1]. All the code
can be downloaded from https://github.com/lbelzile/ealc. For this analysis, we selected data measured at
Lenggries (upstream), Pupplinger Au (in the middle) and Munich (downstream). To ensure stationarity of the series
and given that the most extreme events occur during the summer, we restricted our attention to the measurements
for the months of June, July and August. Since the sites are measuring the flow of the same river, dependence at
extreme levels is likely to be present, as is indeed apparent from Figure 4. Directionality of the river may further lead
to asymmetry in the asymptotic dependence structure, suggesting that the scaled extremal Dirichlet model may be
well suited for these data. Furthermore, given that other well-known models like the extremal Dirichlet, logistic and
negative logistic are nested within this family, their adequacy can be assessed through likelihood ratio tests.
To remove dependence between extremes over time, we decluster each series and retain only the cluster maxima
based on three-day runs. Rounding of the measurements has no impact on parameter estimates and is henceforth
neglected. The multivariate tail model outlined in Section 7 is next fitted to the cluster maxima. The thresholds
u = (u1 , u2 , u3 ) were selected to be the 92% quantiles using the parameter stability plot of [42] (not shown here).
Next, set θ = (η, ξ, α, ρ), where η and ξ are the marginal parameters of the generalized Pareto distribution in Eq. (13)
and ρ and α are the parameters of the scaled Dirichlet model. To estimate θ, the trivariate censored likelihood (14)
could be used. To avoid numerical integration and because of the relative robustness to misspecification, we employed
the pairwise composite log-likelihood lC of [28] instead; the loss of efficiency in this trivariate example is likely small.
Specifically, we maximized
lC (θ) =
n X
d−1 X
d h
X
i
log g{t j (xi j ), tk (xik ); θ, t j (u j ), tk (uk )} + I xi j >u j log J j (xi j ) + I xik >uk log Jk (xik ) ,
i=1 j=1 k= j+1
where
exp{−`(1/u j , 1/uk )},
−∂`(1/y j , 1/uk )/∂y j exp{−`(1/y j , 1/uk )},
g(y j , yk ; θ, u j , uk ) =
−∂`(1/u j , 1/yk )/∂yk exp{−`(1/u j , 1/yk )},
on
o
hn
i
∂`(1/y j , 1/yk )/∂y j ∂`(1/y j , 1/yk )/∂yk − dhD (y j , yk ) exp{−`(1/y j , 1/yk )},
where ` = `D and for all j = 1, . . . , d, t j and J j are as in Eq. (15).
yj
yj
yj
yj
≤ u j , yk
> u j , yk
≤ u j , yk
> u j , yk
≤ uk
≤ uk
> uk
> uk
16
L. R. Belzile and J. G. Nešlehová
Isar daily river flow
800
1958-11-01 / 2014-01-18
Muenchen
800
600
600
400
400
200
200
400 Pupplinger Au
400
300
300
200
200
100
100
400
400
Lenggries
300
300
200
200
100
100
1958
1962
1964
1966
1968
1970
1972
1974
1976
1978
1980
1982
1984
1986
1988
1990
1992
1994
1996
1998
2000
2002
2004
2006
2008
2010
2012
2014
Figure 4: Daily river flow of the Isar river at three sites
Uncertainty assessment can be done in the same way as for general estimating equations. Specifically, let g(θ)
denote an unbiased estimating function and define the variability matrix J, the sensitivity matrix H and the Godambe
information matrix G as
!
!
∂g(θ) ∂g(θ) >
∂2 g(θ)
J=E
,
H = −E
,
G = HJ−1 H.
(17)
∂θ ∂θ
∂θ∂θ>
The maximum composite likelihood estimator is strongly consistent and asymptotically normal, centered at the true
parameter θ with covariance matrix given by the inverse Godambe matrix G−1 .
Using the pairwise composite log-likelihood lC , we fitted the scaled extremal Dirichlet model as well as the
logistic and negative logistic models that correspond to the negative and positive scaled extremal Dirichlet models,
respectively, and the parameter restriction α = 1d . The estimates of the marginal generalized Pareto parameters η and
ξ are given in Table 1. As the estimates were obtained by maximizing `C , their values depend on the fitted model; the
line labeled “Marginal" corresponds to fitting the generalized Pareto distribution to threshold exceedances of each one
of the three series separately. The marginal Q-Q plots displayed in Figure 5 indicate a good fit of the model as well.
Scaled Dirichlet
Neg. logistic
Logistic
ext. Dirichlet
Marginal
η1
η2
η3
ξ1
ξ2
ξ3
123.2 (7.5)
117.1 (6.8)
117.3 (6.8)
114.4 (6.8)
129.1 (14.5)
84.4 (5)
86.2 (5.1)
86.6 (5.1)
84.3 (4.9)
95.1 (10.6)
68.1 (4.2)
70 (4.3)
70.4 (4.3)
68.2 (4.1)
76 (8.7)
0.05 (0.04)
0.08 (0.04)
0.08 (0.04)
0.12 (0.04)
-0.01 (0.08)
-0.03 (0.04)
-0.05 (0.04)
-0.05 (0.04)
-0.02 (0.04)
-0.15 (0.08)
0.02 (0.04)
0 (0.04)
0 (0.04)
0.04 (0.04)
-0.08 (0.08)
Table 1: Generalized Pareto parameter estimates and standard errors (in parenthesis) for the trivariate river example
for four different models.
17
Extremal attractors of Liouville copulas
600
700
500
400
300
500
100
200
100
200
400
200
300
400
Sample quantiles
Sample quantiles
600
1200
1000
800
600
Sample quantiles
Q-Q plot, Lenggries
700
Q-Q plot, Pupplinger Au
1400
Q-Q plot, Muenchen
200 300 400 500 600 700 800 900
200
Theoretical quantiles
300
400
500
100
200
Theoretical quantiles
300
400
Theoretical quantiles
Figure 5: Marginal Q-Q plots for the three sites based on pairwise composite likelihood estimates for the scale and
shape parameters obtained from the scaled Dirichlet model, retaining marginal exceedances of the 92% quantiles. The
pointwise confidence intervals were obtained from the transformed Beta quantiles of the order statistics.
Scaled Dirichlet
Neg. logistic
Logistic
ext. Dirichlet
Gradient score
α1
α2
α3
ρ
0.76 (0.3)
1
1
3.34 (0.52)
1
1.65 (0.82)
1
1
10.2 (2.84)
2.72
2.03 (1.15)
1
1
12.78 (3.93)
2.66
−0.32 (0.1)
0.36 (0.02)
0.28 (0.01)
1
−0.39
Table 2: Dependence parameters estimates and standard errors (in parenthesis) for the trivariate river example.
w1 = 1
Negative logistic
Logistic
scaled
Dirichlet
w3 = 1
w3 = 1
w3 = 1
w2 = 1
w1 = 1
w2 = 1
w1 = 1
w2 = 1
Figure 6: Angular density plots for the three models, the negative logistic (left), logistic (middle) and scaled Dirichlet
(right). The colours correspond to log density values and range from red (high density) to blue (low density).
The estimates of the dependence parameters α and ρ are given in Table 2. The last line displays the maximum gradient score estimates were obtained from the raw data, i.e., ignoring the clustering, after transforming the observations
to the standard Fréchet scale using the probability integral transform. We retained only the 10% largest values based
on the ` p norm with p = 20; this risk functional is essentially a differentiable approximation of `∞ . We selected the
weight function w(x, u) = x[1 − exp{−(kxk p /u − 1)}] based on [8] to reproduce approximate censoring. The estimates
are similar to the composite maximum likelihood estimators, though not efficient.
18
L. R. Belzile and J. G. Nešlehová
The angular densities of the fitted logistic, negative logistic and scaled extremal Dirichlet models are displayed
in Figure 6. The right panel of this figure shows asymmetry caused by a few extreme events that only happened
downstream. Whether this asymmetry is significant can be assessed through composite likelihood ratio tests; recall
that the logistic model, the negative logistic model and the extremal Dirichlet model of [7] are all nested within
the scaled extremal Dirichlet model. To this end, consider a partition of θ = (ψ, λ) into a q dimensional parameter of
interest ψ and a 3d +1−q dimensional nuisance parameter λ, and the corresponding partitions of the matrices H, J and
G. Let b
θC = (b
ψC , b
λC ) denote the maximum composite likelihood parameter estimates and b
θ0 = (ψ0 , b
λ0 ) the restricted
parameter estimates under the null hypothesis that the simpler model is adequate. The asymptotic distribution of
P
the composite likelihood ratio test statistic 2{log lC (θbC ) − log lC (θb0 )} is equal to qi=1 ci Zi where Zi are independent
−1
χ21 variables and ci are the eigenvalues of the q × q matrix (Hψψ − Hψλ H−1
λλ Hλψ )Gψψ ; see [26]. We estimated the
−1
inverse Godambe information matrix, G , by the empirical covariance of B nonparametric bootstrap replicates. The
sensitivity matrix H was obtained from the Hessian matrix at the maximum composite likelihood estimate and the
variability matrix J from Eq. (17). Since the Coles–Tawn extremal Dirichlet, negative logistic and logistic models are
nested within the scaled Dirichlet family, we test for a restriction to these simpler models; the respective approximate
P-values were 0.003, 0.74 and 0.78. These values suggest that while the Coles–Tawn extremal Dirichlet model is
clearly not suitable, there is not sufficient evidence to discard the logistic and negative logistic models. The effects of
possible model misspecification are also visible for the Coles–Tawn extremal Dirichlet model, as the parameter values
of α1 , α2 and α3 are very large (viz. Table 2) and this induces negative bias in the shape parameter estimates, as can
be seen from Table 1.
9. Discussion
In this article, we have identified extremal attractors of copulas and survival copulas of Liouville random vectors
RDα , where Dα has a Dirichlet distribution on the unit simplex with parameters α, and R is a strictly positive random
variable independent of Dα . The limiting stable tail dependence functions can be embedded in a single family,
which can capture asymmetry and provides a valid model in dimension d. The latter is novel and termed here the
scaled extremal Dirichlet; it includes the well-known logistic, negative logistic as well as the Coles–Tawn extremal
Dirichlet models as special cases. In particular, therefore, this paper is first to provide an example of a random vector
attracted to the Coles–Tawn extremal Dirichlet model, which was derived by enforcing moment constraints on a
simplex distribution rather than as the limiting distribution of a random vector.
A scaled extremal Dirichlet stable tail dependence function `D has d + 1 parameters, ρ and α. The parameter
vector α is inherited from Dα and induces asymmetry in `D . The parameter ρ comes from the regular variation of
R at zero and infinity, respectively; this is reminiscent of the extremal attractors of elliptical distributions [33]. The
magnitude of ρ has impact on the strength of dependence while its sign changes the overall shape of `D . Having
d + 1 parameters, the scaled extremal Dirichlet model may not be sufficiently rich to account for spatial dependence,
unlike the Hüsler–Reiss or the extremal Student-t models, which have one parameter for each pair of variables and
are thus easily combined with distances. Also, it is less flexible than Dirichlet mixtures [4], which are however hard
to estimate in high dimensions and require sophisticated machinery. To achieve greater flexibility, the scaled extremal
Dirichlet model could perhaps be extended by working with more general scale mixtures, such as of the weighted
Dirichlet distributions considered, e.g., in [18].
Nonetheless, the scaled extremal Dirichlet model may naturally find applications whenever asymmetric extremal
dependence is suspected; the latter may be caused, e.g., by causal relationships between the variables [15]. The
stochastic structure of the scaled extremal Dirichlet model has several major advantages, that make the model easy
to interpret, estimate and simulate from. Its angular density has a simple form; in contrast to the asymmetric generalizations of the logistic and negative logistic models, this model does not place any mass on the vertices and
lower-dimensional facets of the unit simplex. Another plus is the tractability of the de Haan representation and of
the extremal functions, both expressible in terms of independent scaled Gamma variables; this allows for feasible
inference and stochastic simulation. While the scaled extremal Dirichlet stable tail dependence function `D does not
have a closed form in general, closed-form algebraic expressions exist when α is integer-valued and in the bivariate
case. Model selection for well-known families of extreme-value distributions can be performed through likelihood
ratio tests. Another potentially useful feature is that ρ ∈ (−∞, ∞) can be allowed, with the convention that all variables
whose indices i are such that −ρ ≤ −αi are independent.
Extremal attractors of Liouville copulas
19
Acknowledgment
Funding in partial support of this work was provided by the Natural Sciences and Engineering Research Council
(RGPIN-2015-06801, CGSD3-459751-2014), the Canadian Statistical Sciences Institute, and the Fonds de recherche
du Québec – Nature et technologies (2015–PR–183236). We thank the acting Editor-in-Chief, Richard Lockhart, the
Associate Editor and two anonymous referees for their valuable suggestions.
References
[1] P. Asadi, A. C. Davison, and S. Engelke. Extremes on river networks. Ann. Appl. Stat., 9(4):2023–2050, 2015.
[2] G. Balkema and N. Nolde. Asymptotic independence for unimodal densities. Adv. in Appl. Probab., 42(2):411–
432, 2010.
[3] M.-O. Boldi. A note on the representation of parametric models for multivariate extremes. Extremes, 12(3):211–
218, 2009.
[4] M.-O. Boldi and A. C. Davison. A mixture model for multivariate extremes. J. Roy. Stat. Soc. B Met., 69(2):217–
229, 2007.
[5] L. Breiman. On some limit theorems similar to the arc-sin law. Theory Probab. Appl., 10(2):323–331, 1965.
[6] A. Charpentier and J. Segers. Tails of multivariate Archimedean copulas. J. Multivariate Anal., 100:1521–1537,
2009.
[7] S. G. Coles and J. A. Tawn. Modelling extreme multivariate events. J. Roy. Stat. Soc. B Met., 53(2):377–392,
1991.
[8] R. de Fondeville and A. C. Davison. High-dimensional peaks-over-threshold inference for the Brown-Resnick
process. ArXiv e-prints, 2016.
[9] L. de Haan. A spectral representation for max-stable processes. Ann. Probab., 12(4):1194–1204, 1984.
[10] C. Dombry, S. Engelke, and M. Oesting. Exact simulation of max-stable processes. Biometrika, 103(2):303–317,
2016.
[11] P. Embrechts and C. M. Goldie. On closure and factorization properties of subexponential and related distributions. J. Austral. Math. Soc. Ser. A, 29(2):243–256, 1980.
[12] P. Embrechts, C. Klüppelberg, and T. Mikosch. Modelling Extremal Events for Insurance and Finance. Springer,
New York, 1997.
[13] S. Engelke, A. Malinowski, Z. Kabluchko, and M. Schlather. Estimation of Hüsler–Reiss distributions and
Brown–Resnick processes. J. Roy. Stat. Soc. B, 77(1):239–265, 2015.
[14] K.-T. Fang, S. Kotz, and K. W. Ng. Symmetric Multivariate and Related Distributions. Chapman & Hall,
London, 1990.
[15] C. Genest and J. G. Nešlehová. Assessing and modeling asymmetry in bivariate continuous data. In P. Jaworski,
F. Durante, and W. K. Härdle, editors, Copulae in Mathematical and Quantitative Finance, pages 91–114.
Springer, Berlin, 2013.
[16] É. J. Gumbel. Distributions des valeurs extrêmes en plusieurs dimensions. Publ. Inst. Statist. Univ. Paris,
9:171–173, 1960.
[17] R. D. Gupta and D. S. P. Richards. Multivariate Liouville distributions. J. Multivariate Anal., 23(2):233–256,
1987.
[18] E. Hashorva. Extremes of weighted dirichlet arrays. Extremes, 11(4):393–420, 2008.
[19] E. Hashorva. Extremes of aggregated dirichlet risks. J. Multivariate Anal., 133:334 – 345, 2015.
[20] E. Hashorva and A. G. Pakes. Tail asymptotics under beta random scaling. J. Math. Anal. Appl., 372(2):496–514,
2010.
[21] L. Hua. A note on upper tail behaviour of Liouville copulas. Risks, 4(4):40, 2016.
[22] R. Huser, A. C. Davison, and M. G. Genton. Likelihood estimators for multivariate extremes. Extremes,
19(1):79–103, 2016.
[23] J. Hüsler and R.-D. Reiss. Maxima of normal random vectors: between independence and complete dependence.
Statist. Probab. Lett., 7(4):283–286, 1989.
[24] H. Joe. Families of min-stable multivariate exponential and multivariate extreme value distributions. Statist.
Probab. Lett., 9:75–81, 1990.
[25] H. Joe. Multivariate dependence measures and data analysis. Comput. Statist. Data Anal., 16:279–297, 1993.
20
L. R. Belzile and J. G. Nešlehová
[26] J. T. Kent. Robust properties of likelihood ratio test. Biometrika, 69(1):19–27, 1982.
[27] M. Larsson and J. Nešlehová. Extremal behavior of Archimedean copulas. Adv. Appl. Probab., 43:195–216,
2011.
[28] A. W. Ledford and J. A. Tawn. Statistics for near independence in multivariate extreme values. Biometrika,
83(1):169–187, 1996.
[29] A. J. McNeil, R. Frey, and P. Embrechts. Quantitative risk management. Princeton Series in Finance. Princeton
University Press, Princeton, NJ, revised edition, 2015.
[30] A. J. McNeil and J. Nešlehová. Multivariate Archimedean copulas, d-monotone functions and `1 -norm symmetric distributions. Ann. Statist., 37:3059–3097, 2009.
[31] A. J. McNeil and J. Nešlehová. From Archimedean to Liouville copulas. J. Multivariate Anal., 101:1772–1790,
2010.
[32] N. Nolde. The effect of aggregation on extremes from asymptotically independent light-tailed risks. Extremes,
17(4):615–631, 2014.
[33] T. Opitz. Extremal processes: Elliptical domain of attraction and a spectral representation. J. Multivariate Anal.,
122:409 – 413, 2013.
[34] R Core Team. R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria, 2016.
[35] S. I. Resnick. Extreme values, regular variation, and point processes. Springer-Verlag, Berlin; New York, 1987.
[36] M. Schlather. Models for stationary max-stable random fields. Extremes, 5(1):33–44, 2002.
[37] J. Segers. Max-stable models for multivariate extremes. REVSTAT, 10(1):61–82, 2012.
[38] B. D. Sivazlian. On a multivariate extension of the gamma and beta distributions. SIAM J. Appl. Math.,
41(2):205–209, 1981.
[39] A. Sklar. Fonctions de répartition à n dimensions et leurs marges. Publ. Inst. Statist. Univ. Paris, 8:229–231,
1959.
[40] R. L. Smith, J. A. Tawn, and S. G. Coles. Markov chain models for threshold exceedances. Biometrika,
84(2):249–268, 1997.
[41] E. W. Stacy. A generalization of the gamma distribution. Ann. Math. Stat., 33(3):1187–1192, 1962.
[42] J. L. Wadsworth. Exploiting structure of maximum likelihood estimators for extreme value threshold selection.
Technometrics, 58(1):116–126, 2016.
[43] R. E. Williamson. Multiply monotone functions and their Laplace transforms. Duke Math. J., 23:189–207, 1956.
21
Extremal attractors of Liouville copulas
Appendix A. : Proofs from Section 2
Proof of Proposition 2. To prove parts (a) and (b), recall that 1/Xi is distributed as 1/(RDi ), where Di ∼ Beta(αi , ᾱ−αi )
is independent of R. Furthermore, it is easy to show that 1/Di ∈ M(Φαi ), which implies that E(1/Dβi ) < ∞ for any
β < αi . The extremal behavior of 1/Xi will thus be determined by the extremal behavior of either 1/R or 1/Di ,
depending on which one has a heavier tail. Indeed, Breiman’s Lemma [5] implies that 1/Xi ∈ M(Φρ ) if 1/R ∈ M(Φρ )
for some ρ < αi and that 1/Xi ∈ M(Φαi ) if E(1/Rαi +ε ) < ∞ for some ε > 0. Finally, the fact that 1/Xi ∈ M(Φαi ) when
1/R ∈ M(Φαi ) follows directly from the Corollary to Theorem 3 in [11].
The following lemma is a side result of Proposition 2, which is needed in the subsequent proofs.
Lemma 1 Suppose that X = RDα . If 1/R ∈ M(Φαi ) for some i ∈ {1, . . . , d}, then
lim
x→∞
Pr (1/R > x)
= 0.
Pr (1/Xi > x)
Proof of Lemma 1.
Because 1/R ∈ M(Φαi ), Pr(1/R > x) is regularly varying with index −αi . In particular, for any b ∈ (0, 1),
Pr(1/R > xb)/ Pr(1/R > x) → b−αi as x → ∞. An application of Fatou’s lemma thus gives
Z 1
Z 1 −1
Pr(1/R > xb)
b (1 − b)ᾱ−αi −1
Pr(1/Xi > x)
= lim inf
fDi (b) db ≥
db = ∞
lim inf
x→∞
x→∞ Pr(1/R > x)
B(αi , ᾱ − αi )
0 Pr(1/R > x)
0
and hence the result.
Appendix B. : Proofs from Section 3
First recall the following property of the Dirichlet distribution, which is easily shown using the transformation formula
for Lebesgue densities.
Lemma 2 Let Dα be a Dirichlet random vector with parameters α. Then for any 2 ≤ k ≤ d and any collection of
distinct indices 1 ≤ i1 < · · · < ik ≤ d,
(Di1 , . . . , Dik ) = Bi1 ,...,ik × D(αi1 ,...,αik ) ,
d
where Bi1 ,...,ik ∼ Beta(αi1 + · · · + αik , ᾱ − (αi1 + · · · + αik )) is independent of the k-variate Dirichlet vector D(αi1 ,...,αik )
with parameters (αi1 , . . . , αik ).
d
d
Proof of Theorem 1. In order to prove part (a), recall that kXk = R is independent of X/kXk = Dα . Because
R ∈ M(Φρ ), there exists a sequence (bn ) of constants in (0, ∞) such that, for any Borel set B ⊆ Sd and any r > 0,
!
X
lim n Pr kXk > bn r,
∈ B = lim n Pr(R > bn r) Pr(Dα ∈ B) = r−ρ Pr( Dα ∈ B).
n→∞
n→∞
kXk
By Corollary 5.18 in [35], X ∈ M(H0 ) where for all x ∈ Rd+ ,
ρ
Dρd
D1
H0 (x) = exp −E
max xρ , . . . , xρ
.
1
d
Let B(·, ·) denote the Beta function. The univariate margins of H0 are given, for all i = 1, . . . , d and x > 0, by
)
(
)
(
n
o
B(ρ + αi , ᾱ − αi )
Γ(αi + ρ)Γ(ᾱ)
F0i (x) = exp −x−ρ E(Dρi ) = exp −x−ρ
= exp −x−ρ
B(αi , ᾱ − αi )
Γ(ᾱ + ρ)Γ(αi )
for i ∈ {1, . . . , d}. The copula of H0 then satisfies, for all u ∈ [0, 1]d ,
C0 (u) =
−1
−1
H0 {F01
(u1 ), . . . , F0d
(ud )}
"
(
)#!
(− log ui )Γ(αi )Dρi
Γ(ᾱ + ρ)
= exp −
E max
.
1≤i≤d
Γ(ᾱ)
Γ(αi + ρ)
22
L. R. Belzile and J. G. Nešlehová
By Eq. (2), the stable tail dependence function of C0 thus indeed equals, for all x ∈ Rd+ ,
ρ
xd Γ(αd )Dρd
Γ(ᾱ + ρ)
x1 Γ(α1 )D1
E max
,...,
`(x) =
.
Γ(ᾱ)
Γ(α1 + ρ)
Γ(αd + ρ)
The part (b) follows directly from Proposition 2.2 in [19] upon setting p = 1 and taking, for i = 1, . . . , d and
j = 1, . . . , d, λi j = 1 whenever i = j and λi j = 0 otherwise.
To prove part (c), recall first that from Proposition 1, for i = 1, . . . , d, Xi ∈ M(Ψρ+ᾱ−αi ) and hence there exist
sequences (ani ) ∈ (0, ∞), (bni ) ∈ R, such that for all x ∈ R,
lim n Pr(Xi > ani x + bni ) = − log{Ψρ+ᾱ−αi (x)}.
n→∞
Next, observe that as in the proof of Proposition 5.27 in [35], X ∈ M(H0 ) follows if for all 1 ≤ i < j ≤ d and xk such
that Ψρ+ᾱ−αk (xk ) > 0 for k = i, j,
lim n Pr(Xi > ani xi + bni , X j > an j x j + bn j ) = 0.
n→∞
(B.1)
To prove that (B.1) indeed holds, it suffices to assume that d = 2. This is because for arbitrary indices 1 ≤ i <
d
d
j ≤ d, Lemma 2 implies that (Xi , X j ) = R∗ (B, 1 − B), where B ∼ Beta(αi , α j ), R∗ = RY is independent of B and
∗
Y ∼ Beta(αi + α j , ᾱ − αi − α j ) is independent of B and R. Because Pr(R ≤ 0) = 0, Theorem 4.5 in [20] implies that
R∗ ∈ M(Ψρ+ᾱ−αi −α j ) when R ∈ M(Ψρ ) for some ρ > 0. Thus suppose that d = 2 and write (D1 , D2 ) ≡ (B, 1 − B),
where B ∼ Beta(α1 , α2 ). Fix arbitrary x1 , x2 ∈ R are such that Ψρ+ᾱ−αi (xi ) > 0 for i = 1, 2. Then because for any
a, c > 0 and b ∈ (0, 1), max{a/b, c/(1 − b)} ≥ a + c, one has
(
!)
an1 x1 + bn1 an2 x2 + bn2
0 ≤ Pr(X1 > an1 x1 + bn1 , X2 > an2 x2 + bn2 ) = Pr R > max
,
B
1−B
≤ Pr(R > an1 x1 + bn1 + an2 x2 + bn2 ).
In order to prove Eq. (B.1), it thus suffices to show that
lim n Pr(R > an1 x1 + bn1 + an2 x2 + bn2 ) = 0.
n→∞
(B.2)
This however follows immediately from the fact that if R ∈ M(Ψρ ) for some ρ > 0, the upper end-point r of R,
viz. r = sup{x : Pr(R ≤ x) < 1}, is finite. Because for i = 1, 2, r is also the upper endpoint of Xi , ani xi + bni → r
as n → ∞. This means that there exists n0 ∈ N so that for all n ≥ n0 , an1 x1 + bn1 + an2 x2 + bn2 > r and Pr(R >
an1 x1 + bn1 + an2 x2 + bn2 ) = 0. This proves Eq. (B.1) and hence also Theorem 1 (c). Note that alternatively, part (c)
could be proved using Theorem 2.1 in [19] similarly to the proof of Proposition 2.2 therein.
The proof of Theorem 2 requires the following technical lemma.
Lemma 3 Suppose that Dα = (D1 , . . . , Dd ) is a Dirichlet random vector with parameters α. Further let R be a
positive random variable independent of Dα such that Pr(R ≤ 0) = 0, and let X = R Dα . Then for any 1 ≤ i < j ≤ d
and any xi , x j ∈ (0, ∞),
!
1
1
lim n Pr
> ani xi ,
> an j x j = 0
n→∞
Xi
Xj
if either:
(i) 1/R ∈ M(Φρ ) with ρ ∈ [αi ∧ α j , α1 ∨ α2 ], and for k = i, j, (ank ) is a sequence of positive constants such that
n Pr(1/Xk > ank xk ) → xk−(αk ∧ρ) as n → ∞;
(ii) E(1/Rβ ) < ∞ for some β > αi ∨ α j and for k = i, j, (ank ) is a sequence of positive constants such that
n Pr(1/Xk > ank xk ) → xk−αk as n → ∞.
23
Extremal attractors of Liouville copulas
d
Proof of Lemma 3. Observe first that when d > 2, Lemma 2 implies that (Xi , X j ) = R∗ (B, 1 − B), where R∗ ⊥
⊥ B,
B ∼ Beta(αi , α j ) and R∗ = RY, with Y ⊥
⊥ R and Y ∼ Beta(αi + α j , ᾱ − αi − α j ). Now note that 1/Y ∈ M(Φαi +α j ). Thus
if 1/R ∈ M(Φρ ) for ρ ∈ [αi ∧ α j , α1 ∨ α2 ], ρ < αi + α j and Breiman’s Lemma implies that 1/R∗ ∈ M(Φρ ). Further, if
E(1/Rβ ) < ∞ for some β ∈ (αi ∨ α j , αi + α j ), E{1/(R∗ )β } < ∞ given that E(1/Y β ) < ∞. We can thus assume without
loss of generality that d = 2 and α1 ≤ α2 ; we shall also write (D1 , D2 ) ≡ (B, 1 − B), where B ∼ Beta(α1 , α2 ).
To prove part (i), note first that the existence of the sequences (ank ), k = i, j, follows from Proposition 2, by which
1/Xk ∈ M(Φρ∧αk ) for k = i, j, and the Poisson approximation [12, Proposition 3.1.1]. Next, observe that for any
constants a, c > 0 and any b ∈ (0, 1),
ac
≤ ab ∨ c(1 − b) < a ∨ c.
(B.3)
a+c
Indeed, when b < c/(a + c), ab ∨ c(1 − b) = c(1 − b) and c(1 − b) ∈ (ac/(a + c), c), while when b ≥ c/(a + c),
ab ∨ c(1 − b) = ab and ab ∈ [ac/(a + c), a). To show the claim in part (i), distinguish the cases below:
d
Case I. α1 = α2 . Here, ρ = α1 = α2 and X1 = X2 , so that an1 /an2 → 1 by the Convergence to Types Theorem [35].
By Eq. (B.3),
#
!
"
!
1
an1 an2 x1 x2
1
1
1
> max{an1 x1 B, an2 x2 (1 − B)} ≤ n Pr
>
> an1 x1 ,
> an2 x2 = n Pr
. (B.4)
0 ≤ n Pr
X1
X2
R
R an1 x1 + an2 x2
Because (x1 x2 )/{(an1 /an2 )x1 + x2 } → (x1 x2 )/(x1 + x2 ) as n → ∞,
!
!−α1
1
an1 an2 x1 x2
x1 x2
lim n Pr
>
=
.
n→∞
X1 an1 x1 + an2 x2
x1 + x2
Furthermore, by Lemma 1, given that (an1 an2 x1 x2 )/(an1 x1 + an2 x2 ) → ∞ as n → ∞,
Pr 1/R > aan1n1xa1n2+axn21 xx22
= 0,
lim
n→∞ Pr 1/X > an1 an2 x1 x2
1
an1 x1 +an2 x2
so that the right-hand side in Eq. (B.4) tends to 0 as n → ∞, and this implies the claim.
Case II. α1 < α2 and ρ = α2 . Then for i = 1, 2, there exists a slowly varying function Li such that ani = n1/αi Li (n).
Hence an2 /an1 → 0 and (x1 x2 )/{x1 + x2 (an2 /an1 )} → x2 as n → ∞. Consequently,
!
1
an1 an2 x1 x2
lim n Pr
>
= x2−α2 .
n→∞
X2 an1 x1 + an2 x2
Moreover, by Lemma 1, given that (an1 an2 x1 x2 )/(an1 x1 + an2 x2 ) → ∞ as n → ∞,
Pr 1/R > aan1n1xa1n2+axn21 xx22
= 0,
lim
n→∞ Pr 1/X > an1 an2 x1 x2
2
an1 x1 +an2 x2
so that again the right-hand side in Eq. (B.4) tends to 0 as n → ∞.
Case III. α1 < α2 and ρ ∈ [α1 , α2 ). In this case, 1/X1 ∈ M(Φα1 ) and 1/X2 ∈ M(Φρ ). Therefore, either directly
when ρ > α1 or by Lemma 1, one can easily deduce that
lim
x→∞
Pr(1/R > x)
= 0.
Pr(1/X1 > x)
(B.5)
At the same time, Breiman’s Lemma [5] implies that
lim
x→∞
Pr(1/R > x)
1
B(α1 , α2 )
=
=
.
ρ
Pr(1/X2 > x) E{1/(1 − B) } B(α1 , α2 − ρ)
(B.6)
24
L. R. Belzile and J. G. Nešlehová
Hence, for any b ∈ (0, 1), the limit of n Pr {1/R > an2 x2 (1 − b)} as n → ∞ equals
lim n Pr {1/X2 > an2 x2 (1 − b)}
n→∞
B(α1 , α2 )
Pr {1/R > an2 x2 (1 − b)}
= {x2 (1 − b)}−ρ
Pr {1/X2 > an2 x2 (1 − b)}
B(α1 , α2 − ρ)
so that
lim
n→∞
Z
0
1
bα1 −1 (1 − b)α2 −1
db = n Pr(1/X2 > an2 x2 ) = x2−ρ
n Pr{1/R > an2 x2 (1 − b)}
B(α1 , α2 )
Z 1 α1 −1
Z 1
b
(1 − b)α2 −ρ−1
bα1 −1 (1 − b)α2 −1
= x2−ρ
db =
lim n Pr{1/R > an2 x2 (1 − b)}
db. (B.7)
B(α1 , α2 − ρ)
B(α1 , α2 )
0
0 n→∞
Given that for any b ∈ (0, 1), Pr{1/R > an1 x1 b, 1/R > an2 x2 (1 − b)} ≤ Pr{1/R > an2 x2 (1 − b)},
Z 1
bα1 −1 (1 − b)α2 −1
lim inf n Pr{1/R > an2 x2 (1 − b)} − Pr{1/R > an1 x1 b, 1/R > an2 x2 (1 − b)}
db
n→∞
B(α1 , α2 )
0
Z 1
bα1 −1 (1 − b)α2 −1
n Pr{1/R > an2 x2 (1 − b)} − Pr{1/R > an1 x1 b, 1/R > an2 x2 (1 − b)}
≤ lim inf
db
n→∞
B(α1 , α2 )
0
by Fatou’s Lemma. Because of Eq. (B.7), this inequality simplifies to
Z 1
bα1 −1 (1 − b)α2 −1
db
x2−ρ −
lim sup n Pr{1/R > an1 x1 b, 1/R > an2 x2 (1 − b)}
B(α1 , α2 )
n→∞
0
Z 1
bα1 −1 (1 − b)α2 −1
−ρ
≤ x2 − lim sup
n Pr{1/R > an1 x1 b, 1/R > an2 x2 (1 − b)}
db
B(α1 , α2 )
n→∞
0
and hence
0 ≤ lim sup n Pr(1/X1 > an1 x1 , 1/X2 > an2 x2 )
n→∞
Z
≤
0
1
bα1 −1 (1 − b)α2 −1
db.
lim sup n Pr{1/R > an1 x1 b, 1/R > an2 x2 (1 − b)}
B(α1 , α2 )
n→∞
To show the desired claim, it thus suffices to show that for arbitrary b ∈ (0, 1),
lim n Pr{1/R > an1 x1 b, 1/R > an2 x2 (1 − b)} = 0.
(B.8)
n→∞
To this end, fix b ∈ (0, 1) and observe that an1 /an2 → ∞. Indeed, if ρ > α1 , this follows directly from the fact
that an1 = n1/α1 L1 (n) and an2 = n1/ρ L2 (n) for some slowly varying functions L1 , L2 . When ρ = α1 , suppose that
lim inf n→∞ an1 /an2 were finite. Then there exists a subsequence ank 1 /ank 2 such that ank 1 /ank 2 → a as k → ∞ for some
a ∈ [0, ∞). Hence, for a fixed ε > 0 and all k ≥ k0 , ank 1 /ank 2 ≤ a + ε. Using the latter observation and Eq. (B.6),
lim nk Pr(1/R > ank 1 ) ≥ lim nk Pr{1/R > ank 2 (a + ε)}
k→∞
k→∞
= lim nk Pr{1/X2 > ank 2 (a + ε)}
k→∞
Pr{1/R > ank 2 (a + ε)}
B(α1 , α2 )
= (a + ε)−ρ
> 0.
Pr{1/X2 > ank 2 (a + ε)}
B(α1 , α2 − ρ)
At the same time, by Eq. (B.5),
lim nk Pr(1/R > ank 1 ) = lim nk Pr(1/X1 > ank 1 )
k→∞
k→∞
Pr(1/R > ank 1 )
=0
Pr(1/X1 > ank 1 )
and hence a contradiction. Therefore, lim inf n→∞ an1 /an2 = ∞ and hence an1 /an2 → ∞ as n → ∞. Because an1 b >
an2 (1 − b) if and only if b > an2 /(an1 + an2 ) and an2 /(an1 + an2 ) → 0 as n → ∞, there exists n0 such that for all n ≥ n0 ,
n Pr{1/R > an1 x1 b, 1/R > an2 x2 (1 − b)} = n Pr(1/R > an1 x1 b) = n Pr(1/X1 > an1 x1 b)
Pr(1/R > an1 x1 b)
.
Pr(1/X1 > an1 x1 b)
25
Extremal attractors of Liouville copulas
The last expression tends to 0 as n → ∞ by Eq. (B.5) and hence Eq. (B.8) indeed holds.
To prove part (ii), first recall that by Proposition 2 (b), 1/Xi ∈ M(Φαi ), i = 1, 2, and hence the scaling sequences
(an1 ) and (an2 ) indeed exist. Recall that for i = 1, 2, ani = n1/αi Li (n) for some slowly varying function Li . As in
the proof of part (i), n Pr(1/X1 > an1 x1 , 1/X2 > an2 x2 ) can be bounded above by the right-hand side in Eq. (B.4).
Markov’s inequality further implies that for β ∈ (α2 , α1 + α2 ) such that E(1/Rβ ) < ∞,
)β
!
(an1 x1 + an2 x2 )β E 1/Rβ (
x1
an1 an2 x1 x2
x2
1
β
=
>
≤ nE 1/R
+
n Pr
R an1 x1 + an2 x2
(an1 an2 x1 x2 )β
(x1 x2 )β n1/α2 −1/β L2 (n) n1/α1 −1/β L1 (n)
The right-most expression tends to 0 as n → ∞ because for any i = 1, 2 and ρ > 0, nρ Li (n) → ∞.
Proof of Theorem 2. First note that a positive random vector Y is in the maximum domain of attraction of a multivariate
extreme-value distribution H0 with Fréchet margins if and only if there exist sequences of positive constants (ani ) ∈
(0, ∞), i = 1, . . . , d, so that, for all y ∈ Rd+ ,
lim n{1 − Pr(Y1 ≤ an1 y1 , . . . , Yd ≤ and yd )} =
d
X
X
lim n
n→∞
n→∞
k=1 1≤i1 <···<ik ≤d
= − log H0 (y).
(−1)k+1 Pr(Yi1 > ani1 yi1 , . . . , Yik > anik yik )
(B.9)
This multivariate version of the Poisson approximation holds by the same argument as in the univariate case [12,
Proposition 3.1.1].
To prove part (a), suppose that 1/R ∈ M(Φρ ) for some ρ ∈ (0, α M ]. By Proposition 2, one then has that for
any i ∈ I1 , 1/(RDi ) ∈ M(Φαi ). For any i ∈ I1 , let (ani ) be a sequence of positive constants such that, for all
x > 0, n Pr{1/(RDi ) > ani x} → x−αi as n → ∞; such a sequence exists by the univariate Poisson approximation [12,
Proposition 3.1.1]. The same result also guarantees the existence of a sequence (an ) of positive constants such that,
for all x > 0, n Pr(1/R > an x) → x−ρ as n → ∞. Now set, for any i ∈ I2 ,
Γ(αi − ρ)Γ(ᾱ − αi )
Γ(ᾱ)
Γ(ᾱ)/Γ(ᾱ − ρ)
×
=
,
bi = E D−ρ
=
i
Γ(ᾱ − ρ)
Γ(αi )Γ(ᾱ − αi ) Γ(αi )/Γ(αi − ρ)
(B.10)
and define, for any i ∈ I2 and n ∈ N, ani = b1/ρ
i an . As detailed in the proof of Proposition 2 (a), Breiman’s Lemma
then implies that, for all i ∈ I2 and x > 0,
(
)
(
) Pr n 1 > a (b1/ρ x)o
n i
1
1
RD
−ρ
n i
o = x−ρ b−1
lim n Pr
> ani x = lim n Pr
> an (b1/ρ
i bi = x ,
i x)
1
n→∞
n→∞
RDi
R
Pr R > an (b1/ρ
x)
i
given that for all i ∈ I2 , Di ∼ Beta(αi , ᾱ − αi ).
Next, fix an arbitrary x ∈ (0, ∞)d , k ∈ {2, . . . , d} and indices 1 ≤ i1 < · · · < ik ≤ d. To calculate the limit of
n Pr(1/(RDi1 ) > ani1 xi1 , . . . , 1/(RDik ) > anik xik ), two cases must be distinguished:
Case I. {i1 , . . . , ik } ∩ I1 , ∅. In this case, suppose, without loss of generality, that i1 ∈ I1 . Then
!
!
1
1
1
1
0 ≤ n Pr
> ani1 xi1 , . . . ,
> anik xik ≤ n Pr
> ani1 xi1 ,
> ani2 xi2 .
RDi1
RDik
RDi1
RDi2
Now either i2 ∈ I1 , in which case ρ ≥ αi1 ∨ αi2 , or i2 ∈ I2 , so that αi1 ≤ ρ < αi2 . Either way, Lemma 3 implies that
!
1
1
lim n Pr
> ani1 xi1 ,
> ani2 xi2 = 0
n→∞
RDi1
RDi2
and consequently n Pr{1/(RDi1 ) > ani1 xi1 , . . . , 1/(RDik ) > anik xik } → 0 as n → ∞.
26
L. R. Belzile and J. G. Nešlehová
Case II. {i1 , . . . , ik } ∩ I1 = ∅. In this case, let Zi1 ,...,ik = max(xi1 (bi1 )1/ρ Di1 , . . . , xik (bik )1/ρ Dik ) and observe that for
any ε > 0 such that ρ + ε < min(α1 , . . . , αd ),
1
1
−ρ−ε −(ρ+ε)/ρ
E ρ+ε < ∞.
E ρ+ε ≤ xi1 bi1
Zi1 ,...,ik
Di1
Therefore, by Breiman’s Lemma,
lim n Pr
n→∞
!
!
1
1
1
> ani1 xi1 , . . . ,
> anik xik = lim n Pr
> an = E Zi−ρ
,...,i
1
k
n→∞
RDi1
RDik
RZi1 ,...,ik
"(
)−ρ #
1/ρ
= E max xi j bi j Di j
= E min
−ρ
xi j Di j
.
1≤ j≤k
bi j
1≤ j≤k
Putting the above calculations together, one then has, for any x ∈ Rd+ ,
1
1
lim n 1 − Pr
≤ an1 x1 , . . . ,
≤ and xd
n→∞
RD1
RDd
(
!)
=
X
xi−αi +
|I2 |
X
X
k=1 {i1 ,...,ik }⊆I2
i1 <···<ik
i∈I1
−ρ
x
D
i
i
j
j
(−1)k+1 E min
1≤ j≤k
bi j
Furthermore, one can readily establish by induction that for any t ∈ Rd ,
|I2 |
X
X
(−1)k+1 min(ti1 , . . . , tik ) = max(ti ).
i∈I2
k=1 {i1 ,...,ik }⊆I2
i1 <···<ik
Hence, for any x ∈ Rd+ ,
(
lim n 1 − Pr
n→∞
1
1
≤ an1 x1 , . . . ,
≤ and xd
RD1
RDd
!)
=
X
i∈I1
)#
(
"
(xi Di )−ρ
.
xi−αi + E max
i∈I2
bi
By the multivariate Poisson approximation (B.9), 1/X ∈ M(H0 ), where for all x ∈ Rd+ ,
"
)#
−ρ
X
(x
D
)
i
i
−α
.
H0 (x) = exp −
xi i − E max
i∈I2
bi
i∈I1
The univariate margins of H0 are given, for all i ∈ I1 , by F0i (x) = x−αi and for all i ∈ I2 , F0i (x) = exp(−x−ρ ). By
Sklar’s Theorem, the unique copula of H0 is given, for all u ∈ [0, 1]d , by (2), where for all x ∈ Rd+ ,
−ρ
X
xi Di
.
`(x) =
xi + E
max
i∈I2 bi
i∈I1
The first expression for ` follows immediately from Eq. (B.10). The second expression is readily verified using
Lemma 2, given the fact that if B ∼ Beta(ᾱ2 , ᾱ − ᾱ2 ), E(B−ρ ) = Γ(ᾱ2 − ρ)Γ(ᾱ)/Γ(ᾱ − ρ)Γ(ᾱ2 ).
To prove part (b), recall that by Proposition 2 (b), 1/Xi ∈ M(Φαi ). Hence, there exist sequences of positive
constants (ani ), i = 1, . . . , d, such that for all i = 1, . . . , d and all x > 0, n Pr(1/(RDi ) > ani x) → x−αi as n → ∞. By
Lemma 2 (ii), it also follows that for arbitrary x ∈ (0, ∞)d , k ∈ {2, . . . , d} and indices 1 ≤ i1 < · · · < ik ≤ d,
!
!
1
1
1
1
0 ≤ lim n Pr
> ani1 xi1 , . . . ,
> anik xik ≤ lim n Pr
> ani1 xi1 ,
> ani2 xi2 = 0.
n→∞
n→∞
RDi1
RDik
RDi1
RDi2
Thus, by Eq. (B.9), 1/X is in the domain of attraction of the multivariate extreme-value distribution given, for all
x ∈ Rd+ , by H0 (x) = exp(−x1−α1 − · · · − xd−αd ), as was to be showed.
27
Extremal attractors of Liouville copulas
Appendix C. : Proofs from Section 4
Proof of Proposition 3. In view of Corollary 1 and Theorem 2 in [27], it only remains to derive the explicit expression
for `nD . Because 1−ψ(1/·) ∈ R−ρ , there exists a slowly varying function L such that for all x > 0, 1−ψ(1/x) = x−ρ L(x).
Given that the distribution function ψ(1/·) is in the domain of attraction of Φρ , the Poisson approximation implies that
there exists a sequence (an ) of positive constants such that, for all x > 0,
lim n 1 − ψ{1/(an x)} = lim n(an x)−ρ L(an x) = x−ρ .
(C.1)
n→∞
n→∞
Furthermore, by Equation (A6) in the proof of Theorem 2 (a) in [27], one has, for any j = 1, . . . , ᾱ − 2,
(−1) j x− j ψ( j) (1/x)
= 1,
x→∞
κ j x−ρ L(x)
(C.2)
lim
where κ j = ρΓ( j − ρ)/Γ(1 − ρ). Now for all i = 1, . . . , d, Eq. (7) yields, for any x > 0,
!)
!
(
α
i −1
j
− j ( j)
X
1
(−1)
(a
x)
ψ
(1/a
x)
1
n
n
1
−
.
= n(an x)−ρ L(an x)
n Pr
> an x = n 1 − H̄i
−ρ L(a x)
Xi
an x
j!(a
x)
n
n
j=1
Given that an → ∞ as n → ∞, the last expression converges by Equations (C.1) and (C.2) as n → ∞ to
α
α
i −1
i −1
X
X
κ
Γ( j − ρ)
c(αi , −ρ)
j
−ρ
1
−
x−ρ
=
x
1
−
ρ
= x−ρ
.
j!
Γ(
j
+
1)Γ(1
−
ρ)
Γ(1 − ρ)
j=1
j=1
The Poisson approximation thus implies that, as n → ∞, for all i = 1, . . . , d and x > 0,
!
(
)
1
n
−ρ c(αi , −ρ)
H̄i
→ exp −x
.
an x
Γ(1 − ρ)
(C.3)
For any x ∈ (0, ∞)d , let 1/(an x) = {1/(an x1 ), . . . , 1/(an xd )} and denote by x̄H the harmonic mean of x, viz. x̄H =
d/(1/x1 + · · · + 1/xd ). From Eq. (6) one then has
− j1 −···− jd
(
!)
!
d
j1 +···+ jd an x̄H
( j1 +···+ jd )
d
j
i
X
Y
−ρ
(−1)
ψ
1
an x̄H
an x̄H
x̄
d
an x̄H
H
1
−
n 1 − H̄
=n
L
−ρ
a
x̄
a
x̄
n H
n H
an x
d
d
dxi
j
!
·
·
·
j
!
L
(
j
,...,
j
)∈I
i=1
1
d
1
d
α
d
d
( j ,..., j ),0
1
d
d
By Eq. (C.2), the right most expression in the curly brackets converges, as n → ∞, to
1−ρ
X
( j1 ,..., jd )∈Iα
( j1 ,..., jd ),0d
d
Γ( j1 + · · · + jd − ρ) Y x̄H
Γ(1 − ρ) j1 ! · · · jd ! i=1 dxi
! ji
=1−ρ
X
( j1 ,..., jd )∈Iα
( j1 ,..., jd ),0d
d
Γ( j1 + · · · + jd − ρ) Y
1
1/xi
Γ(1 − ρ)
Γ(
j
+
1)
1/x
+
· · · + 1/xd
i
1
i=1
Furthermore, Eq. (C.1) implies that, as n → ∞,
!ρ
a x̄ −ρ a x̄
1
1
n H
n H
n
L
→
+ ··· +
.
d
d
x1
xd
Consequently, as n → ∞, n{1 − H̄(1/an x)} → − log H0 (x), where
j
!ρ
i
d
X Γ( j1 + · · · + jd − ρ) Y
1/xi
1
1
1
− log H0 (x) =
+ ··· +
1
−
ρ
.
P
d
1
x1
xd
Γ(1 − ρ)
Γ( ji + 1)
j=1 x j
i=1
(
j
,...,
j
)∈I
1
d
α
( j ,..., j ),0
1
d
d
! ji
.
28
L. R. Belzile and J. G. Nešlehová
By Eq. (B.9), 1/X ∈ M(H0 ). From Eq. (C.3), the univariate margins of H0 are scaled Fréchet, and Sklar’s theorem
implies that the unique copula of H0 is of the form (2) with stable tail dependence function as in Proposition 3.
Proof of Proposition 4. In view of Corollary 2 and Theorem 1 in [27], it only remains to compute the expression for
`pD given in part (a). Suppose that ψ ∈ R−ρ for some ρ > 0. This means that there exists a slowly varying function
such that for all x > 0, ψ(x) = x−ρ L(x). Because ψ is itself a survival function, ψ ∈ M(Φρ ) and by the univariate
Poisson approximation, there exists a sequence (an ) of strictly positive constants such that, for all x > 0,
lim nψ(an x) = x−ρ .
(C.4)
n→∞
Furthermore, by Equation (A1) in the proof of Theorem 1 (a) in [27], one has, for any j = 1, . . . , ᾱ − 1,
(−1) j x j ψ( j) (x)
= c( j, ρ).
x→∞
ψ(x)
(C.5)
lim
Now let X be the Dirichlet random vector with parameters α and radial part R whose Williamson ᾱ-transform is ψ.
Denote the distribution function of X by H and its univariate margins by Fi , i = 1, . . . , d. Then for all i = 1, . . . , d,
Equations (C.4) and (C.5) imply that
lim nF̄i (an x) = lim n
n→∞
n→∞
α
i −1
X
j=0
α −1
i
X
Γ( j + ρ)
x−ρ c(αi , ρ)
(−1) j (an x) j ψ( j) (an x)
= x−ρ
=
j!
Γ(ρ)Γ( j + 1)
Γ(ρ + 1)
j=0
(C.6)
and hence, by the Poisson approximation, Fin (x) → exp{−x−ρ c(αi , ρ)/Γ(ρ + 1)} as n → ∞.
Next, for arbitrary k = 1, . . . , d and 1 ≤ i1 < · · · < ik ≤ d, let I(αi1 ,...,αik ) = {0, . . . , αi1 − 1} × · · · × {0, . . . , αik − 1}.
For any x ∈ (0, ∞)d , Equations (6), (C.4) and (C.5) imply that
n→∞
n→∞
(−1) j1 +···+ jk
( j1 ,..., jk )∈I(αi
1
,...,αi )
k
= (xi1 + · · · + xik )−ρ
X
(−1)
k+1
k=1 1≤i1 <···<ik ≤d
k
X
( j1 ,..., jk )∈I(αi
Therefore, for any x ∈ (0, ∞)d ,
d
X
lim n
n→∞
ψ( j1 +···+ jk ) {an (xi1 + · · · + xik )} Y
(an xim ) jm
j1 ! · · · jk !
m=1
k
X
lim n Pr(Xi1 > xi1 , . . . , Xik > xik ) = lim n
,...,αi )
1
k
x im
Γ( j1 + · · · + jk + ρ) Y
Γ(ρ) j1 ! · · · jk ! m=1 xi1 + · · · + xik
! jm
.
Pr(Xi1 > an xi1 , . . . , Xik > an xik )
= − log H0 (x),
where
− log H0 (x) =
d
X
X
(−1)k+1 (xi1 + · · · + xik )−ρ
k=1 1≤i1 <···<ik ≤d
k
X
( j1 ,..., jk )∈I(αi
,...,αi )
1
k
xim
Γ( j1 + · · · + jk + ρ) Y
Γ(ρ) j1 ! · · · jk ! m=1 xi1 + · · · + xik
! jm
.
By Eq. (B.9), X ∈ M(H0 ). As argued above, the univariate margins of H0 are given, for all i = 1, . . . , d and x > 0, by
exp{−x−ρ c(αi , ρ)/Γ(ρ + 1)}. Sklar’s theorem thus implies that the unique copula of H0 is of the form (2) with stable
tail dependence function indeed as given by the expression in part (a).
Appendix D. : Proofs from Section 5
Proof of Proposition 5. First, we show that for any ρ > − min(α1 , . . . , αd ), ρ , 0,
d
−ρ−ᾱ d
)#
"
(
Z
Y
X
xi Dρi
Γ(ᾱ)
1/ρ
E max
=
max(xi ti ) {c(αi , ρ)ti }
{c(αi , ρ)}αi /ρ (ti )αi /ρ−1 dt.
Qd
d−1
1≤i≤d c(αi , ρ)
|ρ|
Γ(α
)
S
i
d
i=1
i=1
i=1
(D.1)
29
Extremal attractors of Liouville copulas
d
Indeed, using the fact that (D1 , . . . , Dd ) = Z/kZk, where Zi ∼ Ga(αi , 1), i = 1, . . . , d are independent,
)# Z
)
(
"
(
d
Y
e−zi zαi i −1
xi zρi
xi Dρi
=
(z1 + · · · + zd )−ρ
max
dz.
E max
1≤i≤d c(αi , ρ)
Γ(αi )
Rd+ 1≤i≤d c(αi , ρ)
i=1
P
P
Make a change of variable ti = {zρi /c(αi , ρ)}/ dj=1 zρj /c(α j , ρ) for i = 1, . . . , d − 1 and w = dj=1 zρj /c(α j , ρ). For ease of
P
1/ρ
notation, set also td = 1 − d−1
and the absolute value of the Jacobian is
i=1 ti . Then, for i = 1, . . . , d, zi = {c(αi , ρ)ti w}
d
1 d/ρ−1 Y
c(αi , ρ)1/ρ ti1/ρ−1 .
w
|ρ|d
i=1
|J| =
Therefore,
xi Dρi
E max
1≤i≤d c(αi , ρ)
"
(
)#
−ρ d
d
Y
X
{c(αi , ρ)ti }1/ρ
c(αi , ρ)αi /ρ tiαi /ρ−1
=
max
(x
t
)
Q
i
i
d
d
1≤i≤d
|ρ|
i=1 Γ(αi ) Sd
i=1
i=1
Z ∞
1/ρ Pd
1/ρ
×
wᾱ/ρ−1 e−w i=1 {c(αi ,ρ)ti } dw dt.
1
Z
0
Eq. (D.1) now follows from the fact that
Z
∞
ᾱ/ρ−1 −w1/ρ
w
e
1/ρ
i=1 {c(αi ,ρ)ti }
Pd
0
d
−ᾱ
X
1/ρ
dw = |ρ| Γ(ᾱ) {c(αi , ρ)ti } .
i=1
The expression for hD now follows directly from Eqs. (3) and (D.1), while the formulas for hpD and hnD obtain upon
setting ρ = ρ and ρ = −ρ, respectively.
Appendix E. : Proofs from Section 7
Proof of Proposition 6. For k = 1, . . . , d, the formula for the kth order mixed partial derivatives of `D (1/x) can
be established from Eq. (12). Indeed, if V denotes a random vector with independent scaled Gamma components
Vi ∼ sGa{1/c(αi , ρ), 1/ρ, αi }, then the point process representation Eq. (12) implies that, for all x ∈ Rd+ ,
(
)
Z ∞
Z ∞
d
Y
Vi
1
1
D
1 −
` (1/x) =
Pr
F xi t;
(18)
> xi for at least one i ∈ {1, . . . , d} dt =
, , αi dt.
t
c(αi , ρ) ρ
0
0
i=1
For any k = 1, . . . , d, the expression on the right-hand side of Eq. (18) can be differentiated with respect to x1 , . . . , xk
under the integral sign. This gives the formulas for ∂`D (1/x)/∂x1 . . . ∂xk . When k = d, Eq. (18) implies that
∂d `D (1/x)
=−
∂x1 · · · ∂xd
(
d
Y
t
f xi t;
)
1
1
, , αi dt
c(αi , ρ) ρ
0
i=1
Z
d
d
X
1 Y c(α j , ρ){c(α j , ρ)x j }α j /ρ−1 ∞ α j /ρ
1/ρ
1/ρ
= d
t
exp −t
{c(α j , ρ)x j } dt
Γ(α j )
ρ j=1
0
j=1
=
Z
∞
d
Γ(ᾱ + ρ)
ρd−1
d
Y
c(α j , ρ){c(α j , ρ)x j }α j /ρ−1
iᾱ+ρ
d
1/ρ
j=1
j=1 {c(α j , ρ)x j }
hP
Γ(α j )
,
P
where the last equality follows upon making the change of variable u = dj=1 {c(α j , ρ)x j }1/ρ t1/ρ . Alternatively, Theorem 1 in [7] implies that that the dth order mixed partial derivative of ` D (1/x) equals −dkxk−d−1 hD (x/kxk; ρ, α), which
indeed simplifies to −dhD (x; ρ, α) given that hD (x/kxk; ρ, α) = kxkd+1 hD (x; ρ, α).
Finally, the formulas for F(x; a, b, c) follow immediately from the fact that the scaled Gamma distribution is also
the distribution of the random variable aZ 1/b , where Z is Gamma with shape c and unit scaling.
30
L. R. Belzile and J. G. Nešlehová
Derivation of the gradient score. Straightforward calculations show that
!
(ᾱ + ρ)c(αi , ρ)1/ρ xi1/ρ−1
∂ log dhD (x)
1
αi
= − Pd
−1
+
∂xi
ρ
xi
ρ j=1 {c(α j , ρ)x j }1/ρ
!
!
c(αk , ρ)1/ρ xk1/ρ−1
(ᾱ + ρ)c(αi , ρ)1/ρ xi1/ρ−1 1
αi
Iik
Iik
∂2 log dhD (x)
−1 2.
= − Pd
− Pd
− 1
−
1/ρ
1/ρ
∂xi ∂xk
ρ
xi ρ j=1 {c(α j , ρ)x j }
ρ
xi
ρ j=1 {c(α j , ρ)x j }
| 10math.ST
|
A Unification and Generalization of Exact
Distributed First Order Methods
arXiv:1709.01317v2 [cs.IT] 25 Dec 2017
Dušan Jakovetić
Abstract—Recently, there has been significant progress in
the development of distributed first order methods. (At least)
two different types of methods, designed from very different
perspectives, have been proposed that achieve both exact and
linear convergence when a constant step size is used – a favorable
feature that was not achievable by most prior methods. In this
paper, we unify, generalize, and improve convergence speed of
these exact distributed first order methods. We first carry out
a novel unifying analysis that sheds light on how the different
existing methods compare. The analysis reveals that a major
difference between the methods is on how a past dual gradient of
an associated augmented Lagrangian dual function is weighted.
We then capitalize on the insights from the analysis to derive
a novel method – with a tuned past gradient weighting –
that improves upon the existing methods. We establish for the
proposed generalized method global R-linear convergence rate
under strongly convex costs with Lipschitz continuous gradients.
Index Terms—Distributed optimization, Consensus optimization, Exact distributed first order methods, R-linear convergence
rate.
I. I NTRODUCTION
Context and motivation. Distributed optimization methods
for solving convex optimization problems over networks,
e.g., [1]–[8], have gained a significant renewed and growing
interest over the last decade, motivated by various applications,
ranging from inference problems in sensor networks, e.g., [9],
[10], to distributed learning, e.g., [11], to distributed control
problems, e.g., [12].
Recently, there have been significant advances in the context
of distributed first order methods. A distinctive feature of
the novel methods, proposed and analyzed in [13]–[26], is
that, unlike most of prior distributed first order algorithms,
e.g., [1], [27], [5], [7], they converge to the exact solution
even when a constant (non-diminishing) step size is used.
This property allows the methods to achieve global linear
convergence rates, when the nodes’ local costs are strongly
convex and have Lipschitz continuous gradients. Among the
exact distributed first order methods, (at least) two different
types of methods have been proposed, each designed through
a very different methodology. The method in [13], dubbed
Extra, see also [25], [23], modifies the update of the standard
distributed gradient method, e.g., [1], by introducing two
different sets of weighting coefficients (weight matrices) for
any two consecutive iterations of the algorithm, as opposed
to a single weight matrix with the standard method [1].
The second type of methods, [14], [19], [18], [20], [21],
replaces the nodes’ local gradient with a “tracked” value
D. Jakovetić is with the Department of Mathematics and Informatics,
Faculty of Sciences, University of Novi Sad, Novi Sad, Serbia. The research is
supported by Ministry of Education, Science and Technological Development,
Republic of Serbia, grant no. 174030. Author’s e-mail: [email protected].
of the network-wide average of the nodes’ local gradients.
The method in [14] has been proved to be convergent under
time-varying networks, e.g., [19], node-varying step sizes,
e.g.,[18], and Nesterov acceleration [22], while such studies
have not been provided to date for the method in [13]. Both
references [13] and [14] establish global linear convergence
rates of the exact distributed first order methods that they
study. Further, reference [28] shows that Extra is equivalent
to a primal-dual gradient-like method (see, e.g., [29], [30],
[31], for primal-dual (sub)gradient methods) applied on the
augmented Lagrangian dual problem of a reformulation of the
original problem of interest. Reference [19] demonstrates that
the method therein, equivalent to the method in [14], can be
put in the form of Extra, with a specific choice of the two
Extra’s weight matrices, and it also provides a primal-dual
interpretation of the exact method therein. (A more detailed
review of works [13]–[26] is provided further ahead.)
Contributions. The main contributions of this paper are
to unify, generalize, and improve convergence speed of exact
distributed first order methods. First, with both the methods
in [13] and [14], we provide an augmented Lagrangian-based
analysis. that gives for both methods a characterization of the
(joint) evolution of primal and dual errors along iterations.
This characterization reveals the effect of the difference between the two methods on their performance and sheds light
on understanding of how the two methods compare under
various problem model scenarios. We further provide a generalized method, parameterized with an additional, easy-to-tune
network-wide weight matrix, that determines the weighting
of the term that corresponds to a past dual gradient of the
associated augmented Lagrangian function. The generalized
method subsumes the two known methods in [13] and [14]
upon setting a weighting parameter matrix to appropriate
specific values. We describe how to set the weighting parameter matrix to improve upon both existing methods. The
proposed parameter matrix tuning is based on an insight from
our analysis on how the negative effect of the primal error
on the dual error can be reduced (compensated) through the
introduced parameter matrix.
The paper carries out convergence rate analysis of the
proposed generalized method when nodes’ local costs are
strongly convex, have Lipschitz continuous gradient, and the
underlying network is static. With the proposed generalized
method, we establish a global R-linear convergence rate,
when the algorithm’s step size is appropriately set. Numerical
examples confirm the insights from our analysis on the mutual
comparison of the methods in [13] and [14], as well as the
improvements of the proposed generalized method over the
two existing ones.
2
Brief literature review. Distributed computation and optimization has been studied for a long time, e.g., [32]. More
recently, reference [1] proposes a distributed first order (subgradient) method for unconstrained problems, allowing for
possibly non-differentiable, convex nodes’ local costs and carries out its convergence and convergence rate analysis for deterministically time varying networks. A distributed projected
subgradient method for constrained problems and possibly
non-differentiable local costs has been proposed and analyzed
in [27]. References [7], [17], [13], [14], [15], [16], [18], [19],
[20], [21], [22] study unconstrained distributed optimization
under more structured local costs. In [7], distributed gradient
methods with an acceleration based on the Nesterov (centralized) gradient method [33] have been proposed and analyzed
under differentiable local costs with Lipschitz continuous and
bounded gradients. The methods in [1], [27], [7], [34] converge
to the exact solution only when a diminishing step-size is
used; when a constant step size is used they converge to a
solution neighborhood. References [35], [36] propose different
types of primal-dual methods, prove their convergence to
the exact solution for a wide class of problems assuming
diminishing step-sizes, and are not concerned with establishing
the methods’ convergence rates. The authors of [37] use
insights from control theory to propose a gradient-like algorithm for which they prove exact convergence under certain
conditions, while the paper is not concerned with analyzing the
method’s convergence rate. Reference [17] proposes several
variants of distributed AL methods that converge to the exact
solution under a constant step size and establishes their linear
convergence rates for twice continuously differentiable costs
with bounded Hessian.
References [13], [14], [15], [16], [18], [19], [20], [21], [22]
develop and/or analyze different variants of exact distributed
first order methods under various assumptions on the nodes’
local costs, algorithm step sizes, and the underlying network.
The papers [13], [14] propose two different exact distributed
first order methods and analyze their convergence rates, as
already discussed above. References [15], [16] develop exact
methods based on diffusion algorithms (see, e.g., [3]) and
through a primal-dual type method on an associated AL
function. Under twice differentiable local costs, each node’s
cost having Lipschitz continuous gradient, and at least one
node’s cost being strongly convex, the papers show linear
convergence rates for the methods therein, allowing for different step sizes across nodes and for a wider range of step
sizes and admissible weight matrices with respect to [13]. The
papers [18], [19], [20], [21] consider strongly convex local
costs with Lipschitz continuous gradients. Under this setting,
reference [18] establishes global linear convergence of the
method studied therein when nodes utilize uncoordinated step
sizes. The paper [19] establishes global linear convergence for
time-varying networks. The authors of [21] prove global linear
rates under both time varying networks and uncoordinated step
sizes, while the issue of uncoordinated step-sizes is previously
considered in [20]. Finally, the paper [22] proposes an accelerated exact distributed first order method based on the Nesterov
acceleration [33] and establishes its convergence rates for local
costs with Lipschitz continuous gradients, both in the presence
and in absence of the strong convexity assumption. Under
strongly convex local costs that have Lipschitz continuous
gradients, the authors of [26] develop optimal distributed
methods, where the optimality is in terms of the number of
oracle calls of a therein appropriately defined oracle. However,
their method is of a different type than [18], [19], [20], [21],
[22] and is different from the method proposed here. Namely,
the method in [26] requires evaluation of Fenchel conjugates of
the nodes’ local costs at each iteration, and hence it in general
has a much larger computational cost per iteration than the
methods in [18], [19], [20], [21], [22] and the method proposed
in this paper. To the best of our knowledge, communication
and computation optimality of distributed first order methods
that do not involve Fenchel conjugates has not been studied
to date.
Paper organization. The next paragraph introduces notation. Section II explains the model that we assume and reviews
existing distributed first order methods. Section III presents the
proposed algorithm and relates it with the existing methods.
Section IV establishes global R-linear convergence rate of the
proposed method, while Section V provides simulation examples. Finally, we conclude in Section VI. Certain auxiliary
proofs are provided in the Appendix.
Notation. We denote by: R the set of real numbers; Rd
the d-dimensional Euclidean real coordinate space; Aij the
entry in the i-th row and j-th column of a matrix A; A>
the transpose of a matrix A; ⊗ the Kronecker product of
matrices; I, 0, and 1, respectively, the identity matrix, the
zero matrix, and the column vector with unit entries; J the
N × N matrix J := (1/N )11> ; A 0 (A 0) means
that the symmetric matrix A is positive definite (respectively,
positive semi-definite); k·k = k·k2 the Euclidean (respectively,
spectral) norm of its vector (respectively, matrix) argument;
λi (·) the i-th largest eigenvalue; Diag (a) the diagonal matrix
with the diagonal equal to the vector a; | · | the cardinality
of a set; ∇h(w) and ∇2 h(w), respectively, the gradient and
Hessian evaluated at w of a function h : Rd → R, d ≥ 1.
Finally, for two positive sequences ηn and χn , we have:
ηn = O(χn ) if lim supn→∞ χηnn < ∞; and ηn = Ω(χn ) if
lim inf n→∞ χηnn > 0.
II. M ODEL AND PRELIMINARIES
Subsection II-A describes the optimization and network
models that we assume. Subsection II-B reviews the standard
(inexact) distributed gradient method in [1], as well as the
exact methods in [13] and [14], and it reviews the known
equivalence (see [28]) of the method in [13] and a primaldual gradient-like method.
A. Optimization and network models
We consider distributed optimization where N nodes in a
connected network solve the following problem:
minx∈Rd f (x) :=
N
X
fi (x).
(1)
i=1
Here, fi : Rd → R is a convex function known only by node i.
Throughout the paper, we impose the following assumption on
the fi ’s.
3
Assumption 1 Each function fi : Rd → R, i = 1, ..., N , is
strongly convex with strong convexity parameter µ, and it
has Lipschitz continuous gradient with Lipschitz constant L,
where L ≥ µ > 0. That is, for all i = 1, ..., N , there holds:
fi (y) ≥ fi (x) + ∇fi (x)> (y − x)
µ
+ kx − yk2 , x, y ∈ Rd
2
k∇fi (x) − ∇fi (y)k ≤ L kx − yk, x, y ∈ Rd .
For a specific result (precisely, Lemma 3 ahead), we additionally assume the following.
Assumption 2 Each function fi : Rd → R, i = 1, ..., N , is
twice continuously differentiable.
Under Assumptions 1 and 2, there holds for every x ∈ Rd
that:
µ I ∇2 fi (x) L I.
Further, under Assumption 1, problem (1) is solvable and has
the unique solution x? ∈ Rd .
Nodes i = 1, ..., N constitute an undirected network G =
(V, E), where V is the set of nodes and E is the set of edges.
The presence of edge {i, j} ∈ E means that the nodes i and
j can directly exchange messages through a communication
link. Further, let Ωi be the set of all neighbors of a node i
(including i).
Assumption 3 The network G = (V, E) is connected, undirected and simple (no self-loops nor multiple links).
We associate with network G a N × N symmetric, (doubly)
stochastic weight matrix W . Further, we let: Wij = Wji > 0,
if {i, j} ∈ E,
/ E, i 6= j; and
P i 6= j; Wij = Wji = 0, if {i, j} ∈
Wii = 1 − j6=i Wij > 0, for all i = 1, ..., N . Denote by λi ,
i = 1, 2, ..., N , the eigenvalues of W , ordered in a descending
order; it can be shown that they obey 1 = λ1 > λ2 ≥ ... ≥
λN > −1.
Throughout the paper, we consider several iterative distributed methods to solve (1). An algorithm’s iterations are
(k)
indexed by k = 0, 1, 2, ... Further, we denote by xi ∈ Rd the
estimate of the solution to (1) available to node i at iteration k.
To avoid notational clutter, we will keep the same notation
(k)
xi across different methods, while it is clear from context
which method
is in question. For compact
notation, we use
(k)
(k)
(k)
>
∈ RN d to denote
x(k) = (x1 )> , (x2 )> , ..., (xN )>
the vector that stacks the solution estimates by all nodes at
iteration k. We use analogous notation for certain auxiliary
(k)
sequences that the algorithms maintain (e.g., see ahead si
and s(k) with (14).) Again, to simplify notation, with all
methods to be considered we will assume equal initialization
(0)
(0)
(0)
across all nodes, i.e., we let x1 = x2 = ... = xN ; e.g.,
(0)
nodes can set xi = 0, for all i.
For future reference, we introduce the following quantities.
We let the (N d) × (N d) matrix W = W ⊗ I, where I is the
d × d identity matrix. That is, W is a N × N block matrix
with d × d blocks, such that the block at the (i, j)-th position
equals Wij I.1 Note that the (i, j)-th and (j, i)-th block of W
equal to zero if {i, j} ∈
/ E, i 6= j. In other words, we say that
W respects the sparsity pattern of the underlying graph G.
Further, recall that J = N1 11> is the ideal consensus matrix,2
f = W −J = (W −J)⊗I the
and let J = J ⊗I. Denote by W
matrix that describes how far is W from the ideal matrix J .
f = max{λ2 , −λN } =: σ ∈ [0, 1).
It can be shown that kWk
•
?
Next, let x = 1 ⊗ x , where we recall that 1 is an all-ones
vector (here of size N × 1), and x? is the (d × 1) solution to
(1). In other words, x• concatenates N repetitions of x? on
top of each other; the i-th repetition corresponds to node i in
the network. Our goal is that, with a distributed method, we
(k)
have x(k) → x• , or, equivalently, xi → x? , for all nodes
i = 1, ..., N . Further, we define function F : RN d → R, by
F (x) := F (x1 , ..., xN ) =
N
X
fi (xi ).
(2)
i=1
Note that, under Assumption 1, F is strongly convex with
strong convexity parameter µ, and it has Lipschitz continuous
gradient with Lipschitz constant L.
B. Review of distributed first order methods
We review three existing distributed first order methods
that are of relevance to our studies – the standard distributed
gradient method in [1], the Extra method in [13], and the
method in [14].
Standard distributed gradient method in [1]. The method
(k)
updates the solution estimate xi at each node i by weightaveraging node i’s solution estimate with the estimates of its
immediate neighbors j ∈ Ωi \ {i}, and then by taking a step
in the negative local gradient’s direction. This corresponds to
the following update rule at arbitrary node i:
X
(k+1)
(k)
(k)
xi
=
Wij xj − α ∇fi (xi ), k = 0, 1, ... (3)
j∈Ωi
In matrix format, the network-wide update is as follows:3
x(k+1) = W x(k) − α ∇F (x(k) ), k = 0, 1, ...
(4)
Here, constant α > 0 is the algorithm’s step size. A drawback
of algorithm (4) is that (when constant step size α is used)
it does not converge to the exact solution x• := 1 ⊗ x? ,
but only to a point in a O(α) solution neighborhood; see,
e.g., [39]. The algorithm can be made convergent to x• by
1 We will frequently work with Kronecker products of types A ⊗ B, a ⊗ B,
and a ⊗ b, where A is an N × N matrix, a – N × 1 vector, B – d × d matrix,
and b – d×1 vector. In other words, the Kronecker products throughout always
appear with the first argument of dimension either N × N or N × 1, and the
second argument either d × d or d × 1. As the capital letters denote matrices
and the lower case letters denote vectors, the dimensions of the Kronecker
products arguments will be clear.
2 The consensus algorithm, e.g., [38], computes the global average of nodes’
local quantities through a linear system iteration with a stochastic system
matrix W . When W = J, consensus converges in a single iteration, hence
we name J the ideal consensus matrix. Clearly, J is not realizable over a
generic graph as it is not sparse, but it is usually desirable to have W as
close as possible to J in an appropriate sense, given the constraints on the
network sparsity.
3 To save space, we will present all subsequent algorithms in compact forms
only. From a compact form, it is straightforward to recover local update forms
at any node i.
4
taking an appropriately set diminishing step size (e.g., square
summable, non-summable), but the convergence rate of the
resulting method is sublinear.
Extra [13]. The method modifies the update rule (1) and
achieves exact (global linear) convergence with a fixed step
size α. Extra works as follows. It uses the following update
rule:4
x(1)
x
(k+1)
= W x(0) − α ∇F (x(0) )
(5)
= 2 W x(k) − α ∇F (x(k) ) − W x(k−1)
(6)
+ α ∇F (x
(k−1)
), k = 1, 2, ...
Reference [28] demonstrates that algorithm (5)–(6) is a
primal-dual gradient-like method; see, e.g., [29], [30], [31], for
primal-dual (sub)gradient methods. Denote by L := I − W,
and consider the following constrained problem:
minimize F (x)
1 1/2
L x = 0.
α
subject to
(7)
It can be shown, e.g., [28], that L1/2 x = 0, if and only if x1 =
x2 = ... = xN , where xi ∈ Rd is the i-th consecutive block
of x = ( (x1 )> , ..., (xN )> )> . Therefore, (7) is equivalent to
(1). Introduce the augmented Lagrangian function A : RN d ×
RN d → R (with the penalty parameter equal to α) associated
with (7):
1 >
1
x Lx,
(8)
A(x, µ) = F (x) + µ> L1/2 x +
α
2α
and the corresponding dual problem:
maximizeµ∈RN d
inf A(x, µ).
x∈RN d
(9)
Consider the following primal-dual method to solve (9):5
x(k+1)
(k+1)
µ
=
=
x(k) − α ∇x A(x(k) , µ(k) )
(k)
µ
+ α ∇µ A(x
(k+1)
(0)
(k)
,µ
(10)
=
= x(k) − α
1
L x(k) + ∇F (x(k) ) + u(k) (12)
α
1
L x(k+1) , k = 0, 1, ...
(13)
α
It turns out that (12)–(13) with a proper initialization is
equivalent to (5)–(6).7
u(k+1)
= u(k) +
Lemma 1 ([28]) The sequence of iterates {x(k) } generated by
(0)
(0)
algorithm (5)–(6), with initialization xi = xj , for all i, j,
is the same as the sequence of iterates generated by (12)–(13),
(0)
with the same initialization of xi , i = 1, ..., N , and with u(k)
initialized to zero.
Under Assumptions 1 and 3 an appropriately chosen step size
α, one has that x(k) → x• , and u(k) → −∇F (x• ), at an
R-linear rate [13].
The exact method in [14]. The authors of [14], see
also [18], [19], [20], [21], [22], consider a distributed first
order method that, besides solution estimate x(k) ∈ RN d , also
maintains an auxiliary variable s(k) ∈ RN d . Here, at each node
(k)
i, quantity si ∈ Rd serves to approximate the network-wide
PN
(k)
gradient average N1 i=1 ∇fi (xi ); then, the gradient con(k)
tribution −α∇F (x ) with the standard distributed gradient
method (4) is replaced with s(k) . More precisely, the update
rule for k = 0, 1, ... is as follows:
x(k+1)
=
W x(k) − α s(k)
(k+1)
=
W s(k) + ∇F (x(k+1) ) − ∇F (x(k) ), (15)
s
(14)
with s(0) = ∇F (x(0) ). The method also achieves a global
R-linear convergence under appropriately chosen step-size α,
when Assumptions 1 and 3 are in force.
Nd
III. T HE PROPOSED METHOD
Subsection III-A presents the method that we propose and
explains how to recover the existing methods in [13], [14] by
a particular setting of a proposed method’s parameter matrix.
Subsection III-B gives further insights into the proposed
method and explains how to tune the parameter matrix. Finally,
Subsection III-C provides a primal-dual interpretation of the
proposed method and the methods in [13], [14].
µ(k) + L1/2 x(k+1) , k = 0, 1, ...
Introducing the new variable u(k) :=
4 The
x(k+1)
), k = 0, 1, ...(11)
with step size α > 0, arbitrary x ∈ R , and µ(0) = 0.
Here, ∇x and ∇µ denote the partial derivatives with respect
to x and µ, respectively. Evaluating the partial derivatives, we
arrive at the following method:
1
L x(k)
x(k+1) = x(k) − α
α
L1/2 (k)
+ ∇F (x(k) ) +
µ
α
µ(k+1)
at the following method:6
1 1/2
αL
µ(k) , one arrives
Extra method utilizes two different weight matrices in general. When
these matrices are tuned as it is suggested in [13], Extra can be represented
as in (5)–(6). The formulas here and in [13] appear slightly different due to
f = 1 (I + W ) in [13] corresponds to W here. It is
a different notation: W
2
required in [13] for the analysis of (5)–(6) that (in our notation) (2W − I)
be doubly stochastic and that W be, besides being doubly stochastic, also
positive definite. The latter assumptions are not imposed here when analyzing
the proposed method (16)–(17) (Section IV).
5 More precisely, under appropriate conditions, with (10) one has that
x(k) , µ(k) converges to a saddle point of function A(x, µ), which then
implies that x(k) solves (7) and µ(k) solves (9).
A. The proposed method and its relation with existing algorithms
We now describe the generalized exact first order method
that we propose. The method subsumes the known methods [13] and [14] upon a specific choice of the tuning
parameters, as explained below. The algorithm maintains over
iterations k the primal variable (solution estimate) x(k) ∈ RN d
6 See also [17] for similar methods with multiple primal updates per each
dual update.
7 Reference [28] shows the equivalence under a more general initialization;
we keep the one as in Lemma 1 for simplicity.
5
>
(k)
(k)
(ex )> , (eu )> , for k = 0, 1, ..., satisfies the following
recursion:
"
#
" (k) #
(k+1)
ex
W − α Hk
−α I
ex
(k+1) = (W − I) (H − B) W − J
(k) . (18)
k
eu
eu
and the dual variable u(k) ∈ RN d , initialized with the zero
vector. The update rule is for k = 0, 1, ... given as follows:
x(k+1) = W x(k) − α ∇F (x(k) ) + u(k)
(16)
u(k+1) = u(k) − L ∇F (x(k) ) + u(k) − B x(k) .(17)
Here, quantities W, L, and α are the same as before. We
note that one can use two different (doubly stochastic) weight
matrices W1 and W2 in (16) and (17) above; more precisely,
one can replace W with W1 in (16) and L with I − W2 in
(17). However, throughout we keep a single weight matrix W
for simplicity of the analysis and presentation. Quantity B
is a (N d) × (N d) symmetric matrix that respects the blocksparsity pattern of the underlying graph G and satisfies the
property that, for any y ∈ Rd , there exists some c ∈ R, such
that B (1 ⊗ y) = c (1 ⊗ y). Specifically, we will consider
the following choices (that clearly obey the latter conditions):
1) B = b I, where b ≥ 0 is a scalar parameter; and 2)
B = b0 W, for b0 ≥ 0. These choices are easy to implement
and incur no additional communication overhead while lead
to efficient algorithms (see also Section V). That is, with
the above choices of matrix B, the proposed method (16)–
(17) requires communicating 2 vectors of size d per node,
per iteration. We note that, for a generic choice of matrix B,
method (16)–(17) incurs one additional communication (of a
d-dimensional vector) per node, per iteration, i.e., it requires
communicating 3 vectors of size d per node, per iteration.
The next lemma, proved in the Appendix, explains how
to recover the existing exact distributed first order methods
from (16)–(17).8
Lemma 3 expresses the primal dual error e(k) as a recursion,
guided by a time varying matrix:
W − α Hk
−α I
Mk :=
,
(19)
(W − I) (Hk − B) W − J
Lemma 2 Consider algorithm (16)–(17). Then, the following
holds.
(a) Algorithm (16)–(17) with B = 0 is equivalent to
method (14), proposed in [14].
(b) Algorithm (16)–(17) with B = α1 W is equivalent to
method (5)–(6), proposed in [13].
B. Further insights into the proposed method and parameter
tuning
We give further intuition and insights into the proposed
method, the existing algorithms in [14] and [13], and we also
describe how to improve upon existing methods by appropri(k)
(k)
ately setting matrix B. Denote by ex := x(k) −x• and eu :=
u(k) + ∇F (x• ) the primal and dual errors, respectively. Also,
>
(k)
(k)
let the primal-dual error vector e(k) := (ex )> , (eu )> ,
R1
and Hk := t=0 ∇2 F x• + t (x(k) − x• ) dt. We have the
following Lemma.9
Lemma 3 Let Assumptions 1–3 hold, and consider algorithm (16)–(17). Then, the primal-dual error vector e(k) :=
8 The equivalence claimed in Lemma 2 is in the sense that the methods
generate the same sequence of iterates {x(k) } under the same initialization
x(0) , the appropriate initialization of methods’ auxiliary variables, and the
same step size α.
9 In Section IV, we show that, under Assumptions 1 and 3, e(k) converges
to zero R-linearly.
that we refer to as the error dynamics matrix.10 Equation (19)
shows the partitioning of the error dynamics matrix as a
2 × 2 block matrix with blocks of size (N d) × (N d). The
(1, 1)-th block (W − α Hk ) describes how the current primal
error affects the next primal error, the (1, 2)-th block (−α I)
describes how the current dual error affects the next primal
error, and so on. Specifically, with the methods in [14]
and [13], the blocks on the positions (1, 1), (1, 2), and (2, 2)
are of the same structure for both methods, and are of the
same structure as in (19). For clarity of explanation, assume
that the fi ’s are strongly convex quadratic functions, so that
Hk = H = ∇2 F (x) = const, for any x ∈ RN d , with
µ I H L I, and of course the same H appearing in
the error dynamics matrices for each of the three methods.
Then, the blocks (1, 1), (1, 2), and (2, 2) match completely
for the three methods. However, the error dynamics matrices
for different methods differ in the (2, 1)-th block. Specifically,
with [14], the (2, 1)-th block of the corresponding error
dynamics matrix equals (W − I) H. On the
other hand, with
[13] the block equals (W − I) H − α1 W . Intuitively, one
may expect that if [Mk ]2,1 is smaller (as measured by an
appropriate matrix norm), then the algorithm’s convergence
is likely to be faster.11 This provides an intuition on the
comparison between [14] and [13]. Namely, if H is small
relative to (H − α1 W) (for instance, when α is very small
and so α1 W has a very large norm), then we expect that the
method in [14] is faster than the method in [13], and vice
versa. This intuition is confirmed in Section V by numerical
examples.
We can go one step further and seek to tune matrix B such
that [Mk ]2,1 = (W − I)(H − B) is smallest in an appropriate
sense. We consider separately the cases B = b I and B =
b0 W. For the former, a possible worst case-type approach is as
follows: choose parameter b that solves the following problem:
min b≥0 sup kH − b Ik ,
(20)
H∈H
where H is the set of all (N d) × (N d) symmetric block
diagonal matrices H with arbitrary d × d diagonal blocks that
in addition obey the following condition: µ I H L I. It is
easy to show (see the Appendix for details) that the solution
µ+L
to (20) is b? = µ+L
2 . Note that the choice B = 2 I in (16)–
(17) does not match either [14] or [13] method and thus
10 In Section IV, we show that, under appropriate choice of parameters α
and B, the primal-dual error e(k) converges to zero R-linearly.
11 This intuition is corroborated more formally in Theorem 4 and Remark 4.
6
represents a novel algorithm. For the latter choice B = b0 W,
the analogous problem:
min b0 ≥0 sup kH − b0 Wk
(21)
H∈H
is more challenging. A sub-optimal choice for λN > 0, as
L+µ
shown in the Appendix, is b0 = 1+λ
, where we recall that λN
N
is the smallest eigenvalue of matrix W . Extensive simulations
(see Also Section V) show that the simple choice b0 = L
works well in practice.
Note that, ideally, one would like to minimize with respect
to b the following quantity: supH: µ IHL I kMk k, i.e., one
wants to take into account the full matrix Mk . This problem
is challenging in general and is hence replaced here by
method (20) (or, similarly, (21)), i.e., by considering the
(2, 1)-th block of Mk only. Note that a smaller norm of
the (2, 1)-th block of Mk might not necessarily imply a
smaller norm of the full matrix Mk . However, extensive
numerical experiments on quadratic and logistic losses (see
also Section 5) demonstrate that tuning method (20) yields
fast algorithms while at the same time is very cheap.
C. Primal-dual interpretations
We now provide a primal-dual interpretation of the proposed
method. The interpretation builds on construction (8)–(11)
from [28]. It is worth noting that [19] provides a primal-dual
interpretation of the method therein, equivalent to the method
in [14]. The construction in [19] starts from a different problem
reformulation than (8) and utilizes a different quadratic penalty
term for the Lagrangian function.
To start, we write the methods (5)–(6) and (14)–(15) in
another equivalent form (see the Appendix as to why this
equivalence also holds.) Namely, (5)–(6) can be equivalently
represented as follows (this is essentially a re-write of (12)–
(13)) but is useful to present it here):
x(k+1) = W x(k) − α ∇F (x(k) ) + u(k)
(22)
1
L x(k+1) , k = 0, 1, ...
(23)
α
Similarly, (14) can be, for k = 0, 1, ..., equivalently represented as:
x(k+1) = W x(k) − α ∇F (x(k) ) + u(k)
(24)
u(k+1)
u(k) +
=
1
1
L x(k+1) − W L x(k) . (25)
α
α
We can re-interpret (24) as a primal-dual gradient-like method
for solving (9). Namely, due to the fact that matrices W and
L commute, it is easy to see that (24)–(25) corresponds to the
following method:
u(k+1)
x(k+1)
(k+1)
µ
u(k) +
=
=
=
x(k) − α ∇x A(x(k) , µ(k) )
(k)
µ
+ α ∇µ A(x
(k+1)
(k)
,µ
(26)
)
(27)
−α W ∇µ A(x(k) , µ(k) ).
Hence, (24) is a primal-dual gradient-like method that modifies the dual update step to also incorporate the (weighted)
previous dual gradient term. Clearly, the proposed generalized
method (16)–(17) also incorporates the (weighted) previous
dual gradient term. It is shown in the Appendix that, assuming
that matrices B and L commute (which is the case for the two
specific choices B = b I and B = b0 W considered here), we
have that (16)–(17) is equivalent to the following primal-dual
method:
x(k+1)
(k+1)
µ
= x(k) − α ∇x A(x(k) , µ(k) )
(k)
= µ
(k+1)
+ α ∇µ A(x
,µ
−α (W − α B) ∇µ A(x
(28)
(k)
(k)
)
(29)
(k)
,µ
).
IV. C ONVERGENCE RATE ANALYSIS
This Section presents the results on global R-linear convergence of the proposed method (16)–(17), and provides
the needed intermediate results and proofs. The Section is
organized as follows. First, Subsection IV-A states the result
(Theorem 4) on global R-linear convergence of the proposed
method (16)–(17) and discusses the implications of the result.
Subsection IV-B sets up the analysis and gives preliminary
Lemmas. Finally, Subsection IV-C proves a series of intermediate Lemmas, followed by the proof of Theorem 4.
A. Global R-linear convergence rate: Statement of the result
We show that, under appropriate choice of step size α, the
proposed method (16)–(17) converges to the exact solution at
a global R-linear rate. Recall quantity σ = max{λ2 , −λN } ∈
[0, 1), with λi the i-th largest eigenvalue of W .
Theorem 4 Consider algorithm (16)–(17) with B = b I,
and nlet Assumptions o1 and 3 hold. Further, let α <
1/2
µ (1−σ)2 µ
0
2
2
.
min (1−σ)
19 L2 , 192 L0 L , where L = L + b − 2 b µ
Then, the sequence of iterates x(k) generated by algo•
?
rithm (16)–(17) converges to
x = 1⊗x R-linearly, i.e., there
(k)
•
k
holds kx − x k = O r , with r ∈ (0, 1). The convergence
factor r is at most max{1 − α2µ , 1+σ
2 } + , where > 0 is
arbitrarily small.
Several Remarks on Theorem 4 are now in order.
Remark 1 When B = b I is replaced with a generic symmetric
matrix B that respects the sparsity pattern of graph G and
satisfies the property that, for any y ∈ Rd , there exists some
c ∈ R, such that B (1 ⊗ y) = c (1 ⊗ y), Theorem 4 continues
to hold with L0 replaced with constant (L + kBk); see the
Appendix for the proof.
Remark 2 The maximal admissible step size for which Theorem 4 guarantees R-linear convergence can be very small
for poorly conditioned problems (L/µ large) and/or weekly
connected networks (σ close to one). However, extensive
simulations show that the proposed method converges (Rlinearly) in practice with large step sizes, e.g., α = 31L . Similar
theoretical and practical admissible values for step size α are
reported in earlier works for the methods studied therein [14],
[13].
7
Remark 3 Theorem 4 generalizes existing R-linear convergence rate results of exact distributed first order methods, e.g.,
[14], to a wider class of algorithms. Recall that for b = 0
we recover the method in [14]. Note that for b = 0 we
have L0 = L. Abstracting universal constants, the convergence
factor obtained in [14] (see Theorem 1 and Lemma 2 therein)
and the one obtained here are the same and equal
(1 − σ)2 µ2
.
(30)
1−Ω
L2
This bound is obtained here by setting the maximal
step
size
(1−σ)2 µ
α permitted by Theorem 4, which is α = Ω
.
L2
Remark 4 Adapting the results in [18] to our setting by letting
the nodes’ step-sizes and their strong convexity parameters be
equal, the results from [18] yield the convergence factor:
(1 − σ)2 µ3/2
√
.
1−Ω
N L3/2
Comparing this with bound (30) obtained here, we can see that
our bound exhibits better scaling with respect to the number
of nodes N ; on the other hand, the bounds in [18], [19] exhibit
better scaling in terms of condition number (L/µ).
Remark 5 It is interesting to observe what happens in Theorem 4 when b = µ – the case that corresponds to a novel
1/2
exact method. Then, one has L0 = L2 − µ2
, which is
arbitrarily small when L becomes close to µ. Hence, for wellconditioned problems (L close to µ), the maximal
admissible
step size in Theorem 4 becomes α = Ω (1−σ)µ
, and the
2
L 2
µ
corresponding convergence factor is 1 − Ω (1−σ)
. Hence,
L2
according to the upper bounds derived here and in [14], the
proposed method with
b =2 µ
improvesconvergence
factor
(1−σ) µ2
(1−σ) µ2
over [14] from 1−Ω
to 1−Ω
for wellL2
L2
conditioned problems (L sufficiently close to µ). Simulations
confirm large gains in convergence speed of the new method
over [14] (see Section V).
B. Setting up analysis and preliminary Lemmas
The proof of Theorem 4 is based on the small gain Theorem [40]. It is worth noting that analytical approaches using
small gain theorem have been developed in [18] and [19] prior
to our work and hold for a more general network and stepsize models than what we study here. Namely, reference [19]
carries out analysis under undirected and directed time varying
graphs, while reference [18] allows for node-dependent stepsizes. However, the analysis here is different. First, it is carried
out for a different algorithm in general (the proposed method
(16)–(17) that involves matrix B); as such, it reveals the novel
insight that the negative coupling from the primal to the dual
error can be partially compensated by tuning matrix B; see
also Remark 5. Second, when the results here are specialized
to the method in [18], [19], the obtained convergence factors
are different. (See Remark 4 for details.)
Besides the small gain Theorem, this Subsection also reviews some known results on the convergence of inexact
(centralized) gradient methods that will be used subsequently.
We start by reviewing the setting of the small gain theorem [40]. Denote by a := a(0) , a(1) , ..., a(k) , ... an infinite
sequence of vectors, a(k) ∈ Rp , k = 0, 1, ... For a fixed δ ∈
(0, 1), define the following quantities:
1 (k)
ka
k
(31)
kakδ,K :=
max
k=0,...,K
δk
1 (k)
kakδ := sup
ka
k
.
(32)
δk
k≥0
0
Clearly, we have that kakδ,K ≤ kakδ,K ≤ kakδ , for
K 0 ≥ K ≥ 0. It is also clear that, if kakδ is finite, then the sequence a(k) converges to zero R-linearly. Indeed, provided that
kakδ ≤ Ca < ∞, there holds: ka(k) k ≤ Ca δ k , k = 0, 1, ...
Hence, if for some δ ∈ (0, 1) we have that kakδ is finite,
then the sequence {a(k) } converges to zero R-linearly with
convergence factor at most δ. We state the small gain theorem
for two infinite sequences a and b as this suffices for our
analysis; for the more general Theorem involving an arbitrary
(finite) number of infinite sequences, see, e.g., [40], [18].
Theorem 5 Consider two infinite sequences a = a(0) , a(1) , ...,
and b = b(0) , b(1) , ..., with a(k) , b(k) ∈ Rp , k = 0, 1, ...
Suppose that for some δ ∈ (0, 1), and for all K = 0, 1, ...,
there holds:
kakδ,K
kbk
δ,K
≤ γ1 kbkδ,K + ω1
≤ γ2 kak
δ,K
+ ω2 ,
(33)
(34)
where γ1 , γ2 ≥ 0 and γ1 γ2 < 1. Then, there holds:
kakδ ≤
1
(ω2 γ1 + ω1 ) .
1 − γ1 γ2
(35)
We will frequently use the following simple Lemma.
Lemma 6 Consider two infinite sequences a = a(0) , a(1) , ...,
and b = b(0) , b(1) , ..., with a(k) , b(k) ∈ Rp . Suppose that, for
all k = 0, 1, ..., there holds:
ka(k+1) k ≤ c1 ka(k) k + c2 kb(k) k,
(36)
where ci ≥ 0, i = 1, 2. Then, for all K = 0, 1, ..., for any
δ ∈ (0, 1), we have:
c1
c2
kakδ,K ≤
kakδ,K +
kbkδ,K + ka(0) k.
(37)
δ
δ
1
Proof: Divide inequality (36) by δk+1
, δ ∈ (0, 1). The
resulting inequality implies, for all K = 1, 2, ... that:
c1
1 (k)
(k+1)
ka
k
ka
k
≤
max
k=0,...,K−1
δ k+1
δ k=0,...,K−1 δ k
c2
c1
1 (k)
c2
max
kb k = kakδ,K−1 + kbkδ,K−1
δ k=0,...,K−1 δ k
δ
δ
c1
c2
≤ kakδ,K + kbkδ,K .
(38)
δ
δ
max
+
1
Note that (38) implies that, for all K = 0, 1, ...
1
(k+1)
kakδ,K =
max
ka
k
k=−1,0,...,K−1 δ k+1
c1
c2
≤
kakδ,K + kbkδ,K + ka(0) k,
δ
δ
which is precisely what we wanted to show.
8
The use of the Lemma will be to bound kakδ,K by kbkδ,K .
Namely, whenever c3 := cδ1 < 1, (36) implies the following
bound:
c2 /δ
1
kakδ,K ≤
kbkδ,K +
ka(0) k.
(39)
1 − c3
1 − c3
We will also need the following Lemma from [41] on the
convergence of inexact (centralized) gradient methods.
Lemma 7 Consider unconstrained minimization of function
φ : Rp → R, where φ is assumed to be strongly convex
with strong convexity parameter m, and it also has Lipschitz
continuous gradient with Lipschitz constant M , M ≥ m > 0.
Consider the following inexact gradient method with step size
1
:
γ≤M
y (k+1) = y (k) − γ ∇φ(y (k) ) + (k) , k = 0, 1, ...,
with arbitrary initialization y (0) ∈ Rp and (k) ∈ Rp . Then,
for all k = 0, 1, ..., there holds:
ky (k+1) − y ? k ≤ (1 − γ m) ky (k) − y ? k + γ k(k) k,
Proof: Consider (17). Multiplying the equality from the
left by N1 (1 ⊗ I)> , using (1 ⊗ I)> L = (1> ⊗ I)((I − W ) ⊗ I)
= (1> (I − W )) ⊗ I = 0, we obtain that:
u(k+1) = u(k) , k = 0, 1, ...
(41)
Recall that u(0) = 0, by assumption. Thus, the result.
Lemma 9 Consider algorithm
(16)–(17), with α ≤ 1/L. Then,
for any δ ∈ 1 − α2µ , 1 , there holds:
4L
2
kex kδ,K ≤ √
ke(0) k.
ke
xkδ,K +
αµ x
Nµ
(42)
Proof: Consider (16). Multiplying the equation from the
left by N1 ( 1 ⊗ I )> , using the fact that N1 ( 1 ⊗ I )> W =
1
1
>
> (k)
= u(k) = 0,
N ( 1 ⊗ I ) , and the fact that N ( 1 ⊗ I ) u
for all k (by Lemma 8), we obtain:
x(k+1) = x(k) −
(40)
N
N
α X
α X
(k)
∇fi (xi ) = x(k) −
∇fi (x(k) )
N i=1
N i=1
N
α X
(k)
∇fi (xi ) − ∇fi (x(k) )
N i=1
α
∇f (x(k) ) + (k) , where
= x(k) −
N
N
X
(k)
∇fi (xi ) − ∇fi (x(k) ) .
=
−
where y ? = arg miny∈Rp φ(y).
Quantity (k) in (40) is an inexactness measure that says how
far is the employed search direction from the exact gradient
at the iterate y (k) .
(k)
i=1
(k)
C. Intermediate Lemmas and proof of Theorem 4
We now carry out convergence proof of Theorem 4 through
a sequence of intermediate Lemmas. We first split theprimal
(k)
error as follows: ex = x(k) − x• = x(k) − 1 ⊗ x(k) +1⊗
(k)
(k)
?
(k)
e(k) = x(k) −1⊗x(k)
x − x =: x
e +1⊗ex . Quantity x
(k)
says how mutually different are the solution estimates xi ’s at
(k)
different nodes; quantity ex says how far is the global average
PN (k)
1
(k)
x = N i=1 xi from the solution x? . We decompose the
(k)
dual error eu = u(k) + ∇F (x• ) in the following way:
e(k)
e(k) + 1 ⊗ e(k)
u .
u =u
P
(k)
(k)
(k)
N
Here, eu = N1 (1 ⊗ I)> eu = N1 i=1 [eu ]i , and u
e(k) =
(k)
(k)
(k)
(k)
(I − J )eu = eu − 1 ⊗ eu . Note that eu = u(k) +
PN
PN (k)
1
(k)
?
, where u(k) = N1 i=1 ui .
i=1 ∇fi (x ) = u
N
We will be interested in deriving bounds on kex kδ,K =
(k)
maxk=0,...,K δ1k kex k, for some δ ∈ (0, 1), and on the
analogous quantities that correspond to other primal and dual
errors that we defined above. Specifically, the proof path is as
(k)
follows. First, Lemma 8 shows that eu = 0, for all k, which
simplifies further analysis. Our goal is to apply Theorem 5
e,
with the following identification of infinite sequences: a → x
e . Then, Lemmas 9-11 are devoted to deriving
and b → u
a bound like in (33), while Lemma 12 devises a bound
that corresponds to (34). As shown below, this sequence of
Lemmas will be sufficient to complete the proof of Theorem 4.
(k)
Lemma 8 With algorithm (16)–(17), there holds: eu
u(k) = 0, for all k = 0, 1, ...
=
Now, applying Lemma 7, with ex = x(k) − x? , we obtain:
α (k)
ke(k+1)
k ≤ (1 − α µ) ke(k)
k k.
(43)
x
x k+
N
We next upper bound
α (k)
k k
N
≤
α
N
k(k) k as follows:
N
α X
(k)
∇fi (xi ) − ∇fi (x(k) )
N i=1
≤
N
α X
(k)
L xi − x(k)
N i=1
(44)
αL
≤√
x
e(k) .
(45)
N
Inequality (44) is by the Lipschitz continuity of the ∇fi ’s,
while (45) is by noting that
N
X
(k)
kxi
i=1
− x(k) k =
N
X
(k)
ke
xi k ≤
√
N ke
x(k) k.
i=1
Substituting the last bound in (43), we obtain:
α L (k)
ke(k+1)
k ≤ (1 − α µ) ke(k)
ke
x k.
x
x k+ √
N
Now, applying Lemma 6, we obtain:
(46)
1
αL 1
(1 − α µ) kex kδ,K + √
ke
xkδ,K + ke(0)
x k.
δ
Nδ
(47)
From (47), using α ≤ 1/L, one can verify that, for all δ ≥
1 − α2µ , there holds:
α µ
kex kδ,K ≤
1−
kex kδ,K
2
kex kδ,K ≤
9
αL
2 √ ke
xkδ,K + ke(0)
x k.
N
The last bound yields the desired result.
Lemma 10 Let α <
holds:
ke
xk
δ,K
≤
1−σ
3L ,
and δ ∈ 1 −
αµ
2 ,1
(48)
. Then, there
√
12 α L N
kex kδ,K
5 1−σ
12 α
2
+
ke
ukδ,K +
ke
x(0) k.
5 1−σ
1−σ
Proof: Consider (16). Subtracting x• = 1 ⊗ x? from both
sides of the equation, and noting that W x• = (W ⊗I)(1⊗x? )
= (W 1) ⊗ (I x? ) = 1 ⊗ x? = x• , we obtain:
(k)
(k)
(k)
.
(49)
e(k+1)
=
W
e
−
α
∇F
(x
)
+
u
x
x
Next, note that
∇F (x(k) ) + u(k) = ∇F (x(k) ) − ∇F (x• )
+ ∇F (x• ) + u(k)
(50)
= ∇F (x(k) ) − ∇F (x• ) + u
e(k) .
(51)
(k)
e(k) (by
In (51), we use that ∇F (x• ) + u(k) = eu = u
Lemma 8). Substituting (51) into (49), we get:
(k)
e(k+1)
= W e(k)
) − ∇F (x• ) − α u
e(k) (52)
x
x − α ∇F (x
We next multiply (52) from the left by I − J = (I − J) ⊗ I,
(k)
e(k) . Noting that
and we use that [ (I − J) ⊗ I ]ex = x
[ (I − J) ⊗ I ] W
=
[ (I − J) ⊗ I ] [ W ⊗ I ]
Next, note that for δ ∈ 1 − α2µ , 1 , and α <
holds:
1
σ+1
(σ + α L) <
.
δ
2
2
5 (1−σ)µ
12 α L
Next, note that, for α < 96
L2 , we have that (1−σ) µ <
1/2. Substituting the latter bound in (59) and manipulating the
terms, the desired result follows.
1+σ
Lemma 12 Let δ
∈
, 1 , and recall L0
=
2
1/2
2
2
L + b − 2bµ
. Then, the following holds:
fx
W
e(k) − α (I − J ) ∇F (x(k) )
−
∇F (x• )) − α u
e(k) .
(k)
•
(53)
(k)
ex
(k)
(k)
+1⊗ex ,
Next, use the decomposition x −x =
=x
e
and Lipschitz continuity of ∇F , to note that:
√
k∇F (x(k) ) − ∇F (x• )k ≤ L ke
x(k) k + L N ke(k)
x k.
(54)
Using the latter bound and taking the 2-norm in (53), while
using its sub-additive and sub-multiplicative properties, we
get:
√
u(k) k.
ke
x(k+1) k ≤ (σ + α L) ke
x(k) k + α L N ke(k)
x k + α ke
(55)
Now, similarly to Lemma 6, it is easy to see that the last
equation implies:
1
ke
xk
≤ (σ + α L) ke
xkδ,K
δ
√
1
α
+ α L N kex kδ,K + ke
ukδ,K + ke
x(0) k. (56)
δ
δ
δ,K
≤
40 L0 L
2
ke
xkδ,K +
ke
u(0) k
µ (1 − σ)
1−σ
√
16 L0 N
kex (0) k.
+
1 − σ αµ
Proof: Consider (17). Adding ∇F (x• ) to both sides of
(k)
e(k) ,
the equality, and recalling that eu = u(k) + ∇F (x• ) = u
we obtain:
=
(57)
Proof: We combine Lemmas 9 and 10, to obtain:
√
48 α L2
24
NL
δ,K
δ,K
ke
xk
≤
ke
xk
+
ke(0) k
5 (1 − σ) µ
5 (1 − σ) µ x
12 α
2
+
ke
ukδ,K +
ke
x(0) k.
(59)
5 1−σ
1−σ
= [ (I − J)W ] ⊗ I
f ⊗ I = W,
f
=W
x
e(k+1)
there
1
Also, as α < 1−σ
3L < 3L , we have that 1/δ ≤ 6/5. Substituting
the last two bounds in (56), we obtain:
√
1+σ
6
ke
xkδ,K + α L N kex kδ,K
ke
xkδ,K ≤
2
5
6α
δ,K
+
ke
uk
+ ke
x(0) k.
5
Rearranging terms in the last equality, the desired result
follows.
αµ
5 (1−σ)µ
Lemma 11 Let α < 96
L2 , and δ ∈ 1 − 2 , 1 . Then,
there holds:
4
24 α
ke
ukδ,K +
ke
x(0) k (58)
ke
xkδ,K ≤
5 1−
σ
1
−
σ
√
48 L N
+
ke(0) k.
5 µ (1 − σ) x
kukδ,K
and (I − J )e
u(k) = u
e(k) , we get:
1−σ
3L ,
u
e(k+1)
= u
e(k) − L ( ∇F (x(k) ) − ∇F (x• ) + u(k)
+ ∇F (x• ) − b (x(k) − x• ) )
(60)
= Wu
e(k) − L ( ∇F (x(k) ) − ∇F (x• ) )
+ b L (x(k) − x• )
fu
= W
e(k) − L ( ∇F (x(k) ) − ∇F (x• ) )
+ b L (x(k) − x• ).
(61)
Here, (60) uses the fact that L x• = 0, while (61) holds
fu
because W
e(k) = (W − J ) u
e(k) = W u
e(k) , as J u
e(k) =
J (I − J )eu (k) = (J − J )eu (k) = 0. We nextupper bound
the term ∇F (x(k) ) − ∇F (x• ) − b (x(k) − x• ) as follows:
k∇F (x(k) ) − ∇F (x• ) − b (x(k) − x• )k2
= k∇F (x(k) ) − ∇F (x• )k2 + b2 kx(k) − x• k2
>
−2 b ∇F (x(k) ) − ∇F (x• )
x(k) − x•
10
≤ L2 kx(k) − x• k2 + b2 kx(k) − x• k2
max{ 1+σ
2 , 1−
αµ
2 }, 1
, as desired.
− 2 b µ kx(k) − x• k2 ,
where the last inequality holds by the Lipschitz continuity of
∇F , and by the strong monotonicity of ∇F :
V. S IMULATIONS
This Section provides a simulation example on learning a
linear
classifier via minimization of the `2 -regularized logistic
(∇F (x) − ∇F (y)) (x − y) ≥ µ kx−yk2 , for all x, y ∈ Rd . loss. Simulations confirm the insights gained through the
theoretical analysis and demonstrate that the proposed generHence, we have that:
alized method improves convergence speed over the existing
k∇F (x(k) ) − ∇F (x• ) − b (x(k) − x• )k ≤ L0 kx(k) − x• k.
methods [13], [14].
The simulation setup is as follows. We consider distributed
Next, taking the norm in (61), using kLk ≤ 2, exploiting its
learning
of a linear classifier via the `2 -regularized logistic
sub-additive and sub-multiplicative properties, and using the
loss,
e.g.,
[11]. Each node i has J data samples {aij , bij }Jj=1 .
Lipschitz continuity of ∇F , we obtain:
Here, aij ∈ Rd−1 , d ≥ 2, is a feature vector, and bij ∈
(k+1)
(k)
0
(k)
ke
u
k ≤ σ ke
u k + 2 L kex k.
(62) {−1, +1} is its class label. The goal is to learn a vector x =
>
d−1
(x>
, and xP
0 ∈ R, d ≥ 1, such that the total
(k)
(k)
1 , x0 ) , x1 ∈ R
Decomposing ex = x
e(k) + 1 ⊗ ex , and applying Lemma 6,
N
`2 -regularized surrogate loss i=1 fi (x) is minimized, where,
we obtain:
for i = 1, ..., N , we have:
2 L0
σ
δ,K
δ,K
δ,K
1
ke
uk
+
ke
xk
ke
uk
≤
+ Rkxk2 .
fi (x) = ln 1 + exp −bij ( a>
δ √
δ
ij x1 + x0 )
2
2 L0 N
kex kδ,K + ke
+
u(0) k.
Here, R is a positive regularization parameter. We can take the
δ
strong convexity constant
µ = R, while a Lipschitz constant
Pas
N PJ
Next, applying Lemma 9, we get:
1
>
L
can
be
taken
as
k
i=1
j=1 cij cij k + R, where cij =
4N
0
>
>
σ
2L
4L
(bij aij , bij ) .
ke
ukδ,K ≤
ke
ukδ,K +
1+
ke
xkδ,K
With all experiments, we test the algorithms on a connected
δ
δ
µ
√
network
with N = 30 nodes and 123 links, generated as
0
4 NL
ke(0)
u(0) k.
+
a realization of the random
geometric graph model with
x k + ke
p
αµδ
communication radius ln(N )/N .
From now on, assume that δ ∈ 1+σ
We generate data and set the algorithm parameters as
2 , 1 . Then, it is easy to
.
Also,
note that 1δ ≤ 2. Thus, follows. Each node i has J = 2 data points whose dimension
see that there holds: σδ < 1+σ
2
we have:
is d − 1 = 5. The aij ’s are generated independently over
0
i and j; each entry of aij is drawn independently from the
1
+
σ
20
L
L
ke
ukδ,K ≤
ke
ukδ,K +
ke
xkδ,K
standard normal distribution. We generate the “true” vector
2
µ
√
x? = ((x?1 )> , x?0 )> by drawing its entries independently from
0
8L N
(0) δ,K
(0)
kex k
+ ke
u k.
+
standard normal distribution. The class
labels are generated
αµ
as bij = sign (x?1 )> aij + x?0 + ij , where ij ’s are drawn
After rearranging expressions, the desired result follows.
independently from normal distribution with zero mean and
We are now ready to prove Theorem 4.
variance 0.4. We set the regularization parameter as R = 0.03.
(0)
With all algorithms, we initialize xi to zero for all
Proof of Theorem 4: We apply Theorem 5 with the
e and b → u
e , by utilizing Lemma 11 i = 1, ..., N . The auxiliary variables for each algorithm
identification a → x
and Lemma 12. Assume the algorithm parameters obey the are initialized as described in Subsection II-B. Further, the
1
weight matrix is as follows: Wij = 2 (max{deg(i),deg(j)}+1)
,
conditions of Lemmas 11 and 12, namely that:
for
i
=
6
j,
{i,
j}
∈
E;
W
=
0,
for
i
=
6
j,
{i,
j}
∈
/
E;
and
ij
5 µ (1 − σ)
1+σ
αµ
P
α<
and δ ∈ max{
, 1−
}, 1 . Wii = 1 − j6=i Wij , for i = 1, ..., N . Here, deg(i) is the
2
96
L
2
2
number of neighbors of node i (excluding i).
Then, by the two Lemmas, the product of gains equals:
As an error metric, we use the following quantity:
6α 40 L0 L
?
PN kx(k)
γ1 γ2 = 1−σ
1
i −x k
µ (1−σ) We need that γ1 γ2 < 1 in order for (35)
, x? 6= 0, that we refer to as the relative
i=1
N
kx? k
µ (1−σ)2 µ(1−σ)
?
to hold. Therefore, when α < min{ 192 L0 L , 19 L2 }, we have error. Quantity x is obtained numerically beforehand by a
that ke
xkδ ≤ C < ∞, for a constant C ∈ (0, ∞). Note also centralized Nesterov gradient method [33].
that, by Lemma 9, we have:
We compare four methods: the method in [14], that we
refer
to here as “harnessing”; the Extra method in [13]; the
4L
2
kex kδ ≤ √
ke
xkδ +
ke(0)
(63) proposed method (16)–(17) with B = L+µ I – that we refer to
x k.
2
αµ
Nµ
as the modified “harnessing”; and the proposed method (16)–
(k)
(k)
As ex = x
e(k) +1⊗ex , we have: kex kδ ≤ 1 + √4NLµ ke
xkδ (17) with B = L W – that we refer to as the modified Extra.
Figure 1 plots the relative error versus number of iterations k
(0)
(0)
+ α2µ kex k = 1 + √4NLµ C+ α4µ kex k=: C 0 < +∞. for the four methods, for different values of step sizes: the
(k)
Therefore, kex k ≤ C 0 δ k , for all k, for any δ ∈ top Figure: α = 1/(3L); middle: α = 1/(9L); and bottom:
>
11
α = 1/(15L). First, on the top Figure, we can see that the
proposed modifications yield improvements in the convergence
speed over the respective original methods in [14] and [13].
While the improvement is not very large for [13], it is quite
significant for the method in [14].
As the step size decreases (the middle and bottom Figures),
we can see that the gain of the proposed method is reduced,
and the four methods tend to behave mutually very similarly.
Next, while for the large step size (the top Figure) Extra [13]
performs better than the method in [14], for the small step
size (bottom Figure) the performance of the two methods
is reversed, as predicted by our theoretical considerations.
(Though the difference between the methods is quite small
for the small step size.)
Figure 2 repeats the experiment for a 100-node, 561-link,
connected network (generated also as
p an instance of a random
geometric graph model with radius ln(N )/N ), and for stepsizes α = 1/(6L) (top Figure); α = 1/(18L) (middle); and
α = 1/(54L) (bottom). We can see that a similar behavior of
the four methods can be observed here, as well.
VI. C ONCLUSION
We considered exact first order methods for distributed optimization problems where N nodes collaboratively minimize
the aggregate sum of their local convex costs. Specifically, we
unified, generalized, and improved convergence speed of the
existing methods, e.g., [13], [14]. While it was known that
the method in [13] is equivalent to a primal-dual gradient-like
method, we show here that this is true also with [14], where the
corresponding primal-dual update rule incorporates a weighted
past dual gradient term, in addition to the current dual gradient term. We then generalize the method by proposing an
optimized, easy-to-tune weighting of the past dual gradient
term, and show both theoretically and by simulation that the
modification yields significant improvements in convergence
speed. We establish for the proposed exact method global
R-linear convergence rate, assuming strongly convex local
costs with Lipschitz continuous gradients and static networks.
Possible future work directions include extensions to uncoordinated step-sizes across nodes and time varying, random,
and directed networks. Specifically, with directed networks,
it would be interesting to extend the methods to work with
singly stochastic matrices, i.e., to relax the requirement on
the double stochasticity, as doubly stochastic methods become
undesirable when dealing with time-varying or directed graph
topologies.
.
A PPENDIX
A. Proof of Lemma 2
We first prove part (b), i.e., we set B = α1 W. We must
show that (16)–(17) is equivalent to (5)–(6). It suffices to show
that (16)–(17) is equivalent to (12)–(13), due to Lemma 1.
First, note that, due to identity L = I − W, we have that (16)
and (12) are the same. Next, from (16), we have that:
1
1
∇F (x(k) ) + u(k) = − x(k+1) + W x(k) .
α
α
Fig. 1: Relative error versus number of iterations k, for three
different values of step-size α: Top: α = 31L ; middle: α = 91L ;
and bottom: α = 151L .
12
Substituting this into (17), and using B = α1 W, we recover (13). Hence, the equivalence of (16)–(17) and (5)–(6)
with B = α1 W. Next, we prove part (a). That is, we consider
(14) and (16)–(17) with B = 0. The key is to note that s(k) ,
k = 0, 1, ..., can be written as: s(k) = u(k) +∇F (x(k) ), where
u(k) is defined by the following recursion:
u(k+1)
=
W u(k) + (W − I) ∇F (x(k) )
=
u(k) − L (u(k) + ∇F (x(k) )),
(64)
for k = 0, 1, ..., and u(0) = 0. Substituting (64) into (16),
yields the desired equivalence.
B. Proof of Lemma 3
Consider (16). Subtracting x• from both sides of the equality, noting that W x• = x• , and adding and subtracting
∇F (x• ) to the term in the parenthesis on the right hand side
of the equality, we obtain:
e(k+1)
x
=
(k)
W e(k)
) − ∇F (x• ) + ∇F (x• ) + u(k)
x − α ∇F (x
=
(k)
(k)
W e(k)
x − α Hk ex − α eu ,
(65)
by the
definition of Hk , Hk =
R 1where2 (65)• follows
(k)
•
∇
F
x
+
t
(x
−
x
)
dt, and by the definition of
t=0
(k)
eu . Next, consider (17). Using identity L = I − W, the
equality can be equivalently written as:
u(k+1) = W u(k) − L ∇F (x(k) ) − B x(k) .
(66)
Next, add ∇F (x• ) to both sides of the equality, and express
the quantity on the right hand side as ∇F (x• ) = W ∇F (x• )+
L ∇F (x• ). We obtain:
e(k+1)
= W (u(k) + ∇F (x• )) − L ∇F (x(k) )
u
−
∇F (x• )) + L B x(k)
(k)
(k)
= W e(k)
.
u − L Hk ex + L B x
(67)
Next, by the property B x• = c x• , for some c ∈ R, it follows
that: L B x• = c L x• = c [ (I − W ) ⊗ I ] [1 ⊗ x? ] = c [ (I −
W )1 ] ⊗ [ I ⊗ x? ] = 0. Hence, we can subtract L B x• = 0
from the right hand side of (67) to obtain the following:
e(k+1)
u
(k)
(k)
= W e(k)
u − L Hk ex + L B ex
(k)
= W e(k)
u + L (B − Hk ) ex .
(68)
Finally, note from (68) that:
J e(k+1)
= J e(k)
u
u , k = 0, 1, ...,
because J L = [ J ⊗ I ] [ (I − W ) ⊗ I ] = [ J(I − W ) ] ⊗ I =
(0)
[J − J] ⊗ I = 0. Note that J eu = J (0 + ∇F (x• )) =
P
(k)
N
1
?
i=1 ∇fi (x ) ) = 0. Thus, we conclude that J eu = 0,
N 1(
for all k. Applying the latter fact to (68), we obtain:
(k)
e(k+1)
= (W − J ) e(k)
u
u + L (B − Hk ) ex .
(69)
The relations (65) and (69) yield the claim of the Lemma.
Fig. 2: Relative error versus number of iterations k, for three
different values of step-size α: Top: α = 61L ; middle: α =
1
1
18 L ; and bottom: α = 54 L .
C. Derivation of the solution to (20) and of an approximate
solution to (21)
We first consider (20). Note that, for any H ∈ H,
we have that: kb I − Hk = maxi=1,...,N d |b − hi | =
13
max {|b − hN d |, |h1 − b|} ≤ max {|b − µ|, |L − b|} . Here,
hi denotes the i-th largest eigenvalue of H. In the last
inequality above, we used the fact that µ I H L I, for all
H ∈ H. Therefore, we have that:
max kb I − Hk = max{|b − µ|, |L − b|}.
H∈H
(70)
The maximum in (70) is attained, e.g., for H =
Diag(L, µ, ..., µ), where µ is repeated (N d − 1) times. The
quantity (70) is clearly minimized over b ≥ 0 at b = b? =
L+µ
2 .
Now, consider (21), and assume that λN > 0. Note that
the maximal eigenvalue of W = W ⊗ I equals one, and the
minimal eigenvalue of W equals λN . We have:
kb0 W − Hk ≤ max {|b0 − µ|, |L − b0 λN |} .
(71)
We choose a sub-optimal b0 that minimizes the upper bound
in (71) on the desired function supH∈H kb0 W − Hk. It is easy
L+µ
.
to see that the corresponding value is b0 = 1+λ
N
D. Proof of equivalence of (16)–(17) and (28)–(29)
Consider (16). From the equation,
we have: ∇F (x(k) ) +
1
(k+1)
(k)
u = −α x
−Wx
. Substituting the latter relation
in (17), and using the fact that matrices L and W commute,
as well as that L and B commute, (17) leads to (25). Now,
consider (28). Proceeding by the same steps as in deriving
(12) from (10), it is straightforward to verify that (28) leads
to (24). Thus, the equivalence between (16)–(17) and (28)–
(29). The respective equivalence for the method in [14] follows
by setting B = 0 in (28)–(29).
(k)
E. Proof of Theorem 4 for generic matrices B
We show here that, when B = b I is replaced with a
generic symmetric matrix B that respects the sparsity pattern
of graph G and obeys that for any y ∈ Rd , there exists some
c ∈ R, such that B (1 ⊗ y) = c (1 ⊗ y), Theorem 4 continues
to hold with L0 replaced with constant (L + kBk). Namely,
it is easy to see that Lemma 8 continues to hold unchanged.
Further, Lemmas 9–11 pertain to the update equation (16) that
does not depend on B, and hence they also hold unchanged.
The only modifications occur with Lemma 12. Namely, (61)
fu
becomes: u
e(k+1) = W
e(k) − L ( ∇F (x(k) ) − ∇F (x• ) )
(k)
•
+L B (x − x ). Using Lipschitz continuity of ∇F and
the fact that kLk ≤ 2, the latter equality implies: ke
u(k+1) k
≤ σ ke
u(k) k + 2 L kx(k) − x• k +2kBk kx(k) − x• k. The proof
of the modified Lemma 12 then proceeds in the same way
as the remaining part of the proof of Lemma 12. Finally, the
proof of the modified Theorem 4 then also proceeds in the
same way as the proof of Theorem 4.
R EFERENCES
[1] A. Nedic and A. Ozdaglar, “Distributed subgradient methods for multiagent optimization,” IEEE Transactions on Automatic Control, vol. 54,
no. 1, pp. 48–61, January 2009.
[2] C. Lopes and A. H. Sayed, “Adaptive estimation algorithms over
distributed networks,” in 21st IEICE Signal Processing Symposium,
Kyoto, Japan, Nov. 2006.
[3] F. Cattivelli and A. H. Sayed, “Diffusion LMS strategies for distributed
estimation,” IEEE Trans. Sig. Process., vol. 58, no. 3, pp. 1035–1048,
March 2010.
[4] A. H. Sayed, S.-Y. Tu, J. Chen, X. Zhao, and Z. Towfic, “Diffusion
strategies for adaptation and learning over networks,” IEEE Sig. Process.
Mag., vol. 30, no. 3, pp. 155–171, May 2013.
[5] J. Duchi, A. Agarwal, and M. Wainwright, “Dual averaging for distributed optimization: Convergence and network scaling,” IEEE Trans.
Aut. Contr., vol. 57, no. 3, pp. 592–606, March 2012.
[6] I. Lobel and A. Ozdaglar, “Convergence analysis of distributed subgradient methods over random networks,” in 46th Annual Allerton
Conference onCommunication, Control, and Computing, Monticello,
Illinois, September 2008, pp. 353 – 360.
[7] D. Jakovetic, J. Xavier, and J. M. F. Moura, “Fast distributed gradient
methods,” IEEE Trans. Autom. Contr., vol. 59, no. 5, pp. 1131–1146,
May 2014.
[8] ——, “Convergence rates of distributed Nesterov-like gradient methods
on random networks,” IEEE Transactions on Signal Processing, vol. 62,
no. 4, pp. 868–882, February 2014.
[9] S. Kar, J. M. F. Moura, and K. Ramanan, “Distributed parameter estimation in sensor networks: Nonlinear observation models and imperfect
communication,” IEEE Transactions on Information Theory, vol. 58,
no. 6, pp. 3575–3605, June 2012.
[10] M. Rabbat and R. Nowak, “Distributed optimization in sensor networks,”
in IPSN 2004, 3rd International Symposium on Information Processing
in Sensor Networks, Berkeley, California, USA, April 2004, pp. 20 –
27.
[11] S. Boyd, N. Parikh, E. Chu, B. Peleato, and J. Eckstein, “Distributed
optimization and statistical learning via the alternating direction method
of multipliers,” Foundations and Trends in Machine Learning, Michael
Jordan, Editor in Chief, vol. 3, no. 1, pp. 1–122, 2011.
[12] F. Bullo, J. Cortes, and S. Martinez, Distributed control of robotic
networks: A mathematical approach to motion coordination algorithms.
Princeton University Press, 209.
[13] W. Shi, Q. Ling, G. Wu, and W. Yin, “EXTRA: An exact first-order
algorithm for decentralized consensus optimization,” SIAM J. Optim.,
vol. 25, no. 2, pp. 944–966, 2015.
[14] G. Qu and N. Li, “Harnessing smoothness to accelerate distributed
optimization,” to appear in IEEE Transactions on Control of Network
Systems, 2017, DOI: 10.1109/TCNS.2017.2698261.
[15] K. Yuan, B. Ying, X. Zhao, and A. H. Sayed, “Exact diffusion for
distributed optimization and learning — Part I: Algorithm development,”
2017, arxiv preprint, arXiv:1702.05122.
[16] ——, “Exact diffusion for distributed optimization and learning — Part
II: Convergence analysis,” 2017, arxiv preprint, arXiv:1702.05142.
[17] D. Jakovetic, J. Xavier, and J. M. F. Moura, “Linear convergence rate of
a class of distributed augmented Lagrangian algorithms,” IEEE Trans.
Autom. Contr., vol. 60, no. 4, pp. 922–936, April 2015.
[18] A. Nedic, A. Olshevsky, W. Shi, and C. A. Uribe, “Geometrically convergent distributed optimization with uncoordinated step-sizes,” 2016,
arXiv preprint arXiv:1609.05877.
[19] A. Nedic, A. Olshevsky, and W. Shi, “Achieving geometric convergence
for distributed optimization over time-varying graphs,” 2016, arXiv
preprint arXiv:1607.03218.
[20] J. Xu, S. Zhu, Y. Soh, and L. Xie, “Augmented distributed gradient
methods for multi-agent optimization under uncoordinated constant
stepsizes,” in 54th IEEE Conference on Decision and Control (CDC),
2015, pp. 2055–2060.
[21] Q. Lu and H. Li, “Geometrical convergence rate for distributed optimization with time-varying directed graphs and uncoordinated step-sizes,”
2016, arXiv preprint arXiv:1611.00990.
[22] G. Qu and N. Li, “Accelerated distributed Nesterov gradient descent,”
2017, arxiv preprint arXiv:1705.07176.
[23] C. Xi and U. A. Khan, “Dextra: A fast algorithm for optimization over
directed graphs,” IEEE Transactions on Automatic Control, 2017, to
appear, DOI: 10.1109/TAC.2017.2672698.
[24] J. Zeng and W. Yin, “Extrapush for convex smooth decentralized
optimization over directed networks,” Journal of Computational Mathematics, vol. 35, no. 4, pp. 381–394, 2017.
[25] W. Shi, Q. Ling, G. Wu, and W. Yin, “A proximal gradient algorithm
for decentralized composite optimization,” Journal of Machine Learning
Research, vol. 63, no. 22, pp. 6013–6023, 2015.
[26] K. Scaman, F. Bach, S. Bubeck, Y. T. Lee, and L. Massoulie, “Optimal
algorithms for smooth and strongly convex distributed optimization in
networks,” 2017, arxiv preprint, arXiv:1702.08704.
[27] A. Nedic, A. Ozdaglar, and A. Parrilo, “Constrained consensus and
optimization in multi-agent networks,” IEEE Transactions on Automatic
Control, vol. 55, no. 4, pp. 922–938, April 2010.
14
[28] A. Mokhtari and A. Ribeiro, “DSA: Decentralized double stochastic
averaging gradient algorithm,” Journal of Machine Learning Research,
vol. 17, pp. 1–35, 2016.
[29] A. Nedic and A. Ozdaglar, “Subgradient methods for saddle point
problems,” Journal of Optimization Theory and Applications, vol. 145,
no. 1, pp. 205–228, July 2009.
[30] M. Kallio and C. H. Rosa, “Large-scale convex optimization via saddlepoint computation,” Oper. Res., pp. 93–101, 1999.
[31] H. Uzawa, “Iterative methods in concave programming,” 1958, in Arrow,
K., Hurwicz, L., Uzawa, H. (eds.) Studies in Linear and Nonlinear
Programming, pp. 154-165. Stanford University Press, Stanford.
[32] J. Tsitsiklis, D. Bertsekas, and M. Athans, “Distributed asynchronous
deterministic and stochastic gradient optimization algorithms,” IEEE
Trans. Autom. Contr., vol. 31, no. 9, pp. 803–812, Sep. 1986.
[33] Y. E. Nesterov, “A method for solving the convex programming problem
with convergence rate O(1/k2 ),” Dokl. Akad. Nauk SSSR, vol. 269, pp.
543–547, 1983, (in Russian).
[34] D. Jakovetic, D. Bajovic, N. Krejic, and N. K. Jerinkic, “Distributed
gradient methods with variable number of working nodes,” IEEE Transactions on Signal Processing, vol. 64, no. 15, pp. 4080–4095, August
2016.
[35] M. Zhu and S. Martinez, “On distributed convex optimization under
inequality and equality constraints,” IEEE Transactions on Automatic
Control, vol. 57, no. 1, pp. 151–164, Jan. 2012.
[36] T.-H. Chang, A. Nedic, and A. Scaglione, “Distributed constrained optimization by consensus-based primal-dual perturbation method,” IEEE
Transactions on Automatic Control, vol. 59, no. 6, pp. 1524–1538, June
2014.
[37] J. Wang and N. Elia, “Control approach to distributed optimization,”
in 48th Annual Allerton Conference onCommunication, Control, and
Computing, Monticello, IL, Oct. 2010.
[38] A. Dimakis, S. Kar, J. M. F. Moura, M. Rabbat, and A. Scaglione,
“Gossip algorithms for distributed signal processing,” Proceedings of
the IEEE, vol. 98, no. 11, pp. 1847–1864, 2010.
[39] K. Yuan, Q. Ling, and W. Yin, “On the convergence of decentralized
gradient descent,” SIAM J. Optim., vol. 26, no. 3, pp. 1835–1854, 2016.
[40] C. Desoer and M. Vidyasagar, Feedback Systems: Input-Output Properties. SIAM, 2009.
[41] M. Schmidt, N. L. Roux, and F. Bach, “Convergence rates of inexact
proximal-gradient methods for convex optimization,” in Advances in
Neural Information Processing Systems 24, 2011, pp. 1458–1466.
| 7cs.IT
|
arXiv:1710.10898v1 [cs.CV] 30 Oct 2017
Learning to solve inverse problems
using Wasserstein loss
Jonas Adler1,2 , Axel Ringh1 , Ozan Öktem1 , Johan Karlsson1
1
Department of Mathematics, KTH Royal Institute of Technology
2
Elekta Instrument AB
{ jonasadl, aringh, ozan } @kth.se, [email protected]
Abstract
We propose using the Wasserstein loss for training in inverse problems. In particular,
we consider a learned primal-dual reconstruction scheme for ill-posed inverse
problems using the Wasserstein distance as loss function in the learning. This is
motivated by miss-alignments in training data, which when using standard mean
squared error loss could severely degrade reconstruction quality. We prove that
training with the Wasserstein loss gives a reconstruction operator that correctly
compensates for miss-alignments in certain cases, whereas training with the mean
squared error gives a smeared reconstruction. Moreover, we demonstrate these
effects by training a reconstruction algorithm using both mean squared error and
optimal transport loss for a problem in computerized tomography.
1
Introduction
In inverse problems the goal is to determine model parameters from indirect noisy observations.
Example of such problems arise in many different fields in science and engineering, e.g., in X-ray
computed tomography (CT) [27], electron tomography [28], and magnetic resonance imaging [8].
Machine learning has recently also been applied in this area, especially in imaging applications.
Using supervised machine-learning to solve inverse problems in imaging requires training data where
ground truth images are paired with corresponding noisy indirect observations. The learning provides
a mapping that associates observations to corresponding images. However, in several applications
there are difficulties in obtaining the ground truth, e.g., in many cases it may have undergone a
distortion. For example, a recent study showed that MRI images may be distorted by up to 4 mm
due to, e.g., inhomogeneities in the main magnetic field [36]. If these images are used for training,
the learned MRI reconstruction will suffer in quality. Similar geometric inaccuracies arise in several
other imaging modalities, such as Cone Beam CT and full waveform inversion in seismic imaging.
This work seeks to provide a scheme for learning a reconstruction scheme for an ill-posed inverse
problem with a Wasserstein loss by leveraging upon recent advances in efficient solutions of optimal
transport [10, 22] and learned iterative schemes for inverse problems [3]. The proposed method
is demonstrated on a computed tomography example, where we show a significant improvement
compared to training the same network using mean squared error loss. In particular, using the
Wasserstein loss instead of standard mean squared error gives a result that is more robust against
potential miss-alignment in training data.
2
2.1
Background
Inverse problems
In inverse problems the goal is to reconstruct an estimate of the signal ftrue ∈ X from noisy indirect
measurements (data) g ∈ Y assuming
g = T (ftrue ) + δg.
(1)
In the above X and Y are referred to as the reconstruction and data space, respectively. Both are
typically Hilbert or Banach spaces. Moreover T : X → Y denotes the forward operator, which
models how a given signal gives rise to data in absence of noise. Finally, δg ∈ Y is the noise
component of data. Many inverse problems of interest are ill-posed, meaning that there is no uniques
solution to (1) and hence there is no inverse to T . Typically reconstructions of ftrue are sensitive to
the data and small errors gets amplified. One way to mitigate these effects is to use regularization
[12].
Variational regularization In variational regularization one formulates the reconstruction problem as an optimization problem. To this end, one introduces a data discrepancy functional
f 7→ L(T (f ), g), where L : Y × Y → R, that quantifies the miss-fit in data space, and a regularization functional S : X → R that encodes a priori information about ftrue by penalizing undesirable
solutions. For a given g ∈ Y , this gives an optimization problem of the form
min L(T (f ), g) + λS(f ).
f ∈X
(2)
Here, λ acts as a trade-off parameter between the data discrepancy and regularization functional. In
many cases L is taken to be the negative data log-likelihood, e.g., L(T (f ), g) = k T (f ) − gk22 in
the case of additive white Gaussian noise. Moreover, a typical choice for regularization functional
is total variation (TV) regularization, S(f ) = k∇f k1 [33]. These regularizers typically give rise
to large scale and non-differentiable optimization problems, which requires advanced optimization
algorithms.
Learning for inverse problems In many applications, and so also in inverse problems, data driven
approaches have shown dramatic improvements over the state-of-the-art [24]. Using supervised
learning to solve an inverse problem amounts to finding a parametrized operator T †Θ : Y → X where
the parameters Θ are selected so that
g = T (ftrue ) + δg =⇒ T †Θ (g) ≈ ftrue .
For inverse problems in image processing, such as denoising and deblurring, we have Y = X and
it is possible to apply a wide range of widely studied machine learning techniques, such as fully
convolutional deep neural networks with various architectures, including fully convolutional networks
[18] and denoising auto-encoders [38].
However, in more complicated inverse problems as in tomography, the data and reconstruction spaces
are very different, e.g., their dimension after discretization may differ. For this reason, learning a
mapping from Y to X becomes nontrivial, and classical architectures that map, e.g., images to images
using convolutional networks cannot be applied as-is. One solution is to use fully-connected layers as
in [30] for very small scale tomographic reconstruction problems. A major disadvantage with such a
fully learned approach is that the parameters space has to be very high dimensional in order to be
able to learn both the prior and the data model, which often renders it infeasible due to training time
and lack of training data.
A more successful approach is to first apply some crude reconstruction operator T † : Y → X and then
use machine learning to post process the result. This separates the learning from the complications
of mapping between spaces since the operator T † can be applied off-line, prior to training. Such
an approach has been demonstrated for tomographic reconstruction in [31, 37]. Its drawback for ill
posed inverse problems is that information is typically lost by using T † , and this information cannot
be recovered by post processing.
Finally, another approach is to incorporate the forward operator T and its adjoint T ∗ into the neural
network. In these learned iterative schemes, classical neural networks are interlaced with applications
2
of the forward and backward operator, thus allowing for the learned reconstruction operator to work
directly from data without having to learn the data model. For example, in [39] an alternating direction
method of multipliers (ADMM)-like scheme for Fourier inversion is learned and [32] consider solving
inverse problems typically arising in image restoration by a learned gradient-descent scheme. In [4]
this later approach is shown to be applicable to large scale tomographic inversion. Finally, in [3] they
apply learning in both spaces X and Y , yielding a Learned Primal-Dual scheme, and show that it
outperforms learned post-processing for reconstruction of medical CT images.
Loss functions for learning Once the Θ parametrization of T †Θ is set, the parameters are typically
chosen by minimization of some loss functional L. Without doubt, the most common loss function is
the mean squared error, also called L2 loss, given by
h
i
L(Θ) = Ef,g k T †Θ (g) − fk22 .
(3)
It has however been noted that it is sub-optimal for imaging, and a range of other loss functions have
been investigated. These include the classical `p norms and the structural similarity index (SSIM)
[40], as well as more complex losses such as perceptual losses [20] and adversarial networks [26].
Recently, optimal mass transport has also been considered as loss function for classification [14] and
generative models [5]. In this work we consider using optimal transport for training a reconstruction
scheme for ill-posed inverse problems.
2.2
Optimal mass transport and Sinkhorn iterations
In optimal mass transport the aim is to transform one distribution into another by moving the mass in
a way that minimizes the cost of the movement. For an introduction and overview of the topic, see,
e.g., the monograph [35]. Lately, the area has attracted a lot of research [10, 11, 9] with applications
to, e.g., signal processing [17, 15, 19, 13] and inverse problems [7, 22].
The optimal mass transport problem can be formulated as follows: let Ω ⊂ Rd be a compact set, and
let µ0 and µ1 be two measures, defined on Ω, with the same total mass. Given a cost c : Ω × Ω → R+
that describes the cost for transporting a unit mass from one point to another, find a (mass preserving)
transference plan M that is as cheap as possible. Here, the transference plan characterizes how to
move the mass of µ0 in order to deform it into µ1 . Letting the transference plan be a nonnegative
measure dM on the space Ω × Ω yields a linear programming problem in the space of measures:
Z
T (µ0 , µ1 ) =
min
c(x0 , x1 )dM (x0 , x1 )
(4)
dM ≥0
(x0 ,x1 )∈Ω×Ω
Z
subject to µ0 (x0 )dx0 =
dM (x0 , x1 ),
x ∈Ω
Z 1
µ1 (x1 )dx1 =
dM (x0 , x1 ).
x0 ∈Ω
Although this formulation is only defined for measures µ0 and µ1 with the same total mass, it can also
be extended to handle measures with unbalanced masses [15, 9]. Moreover, under suitable conditions
one can define the Wasserstein metrics Wp using T , by taking c(x0 , x1 ) = d(x0 , x1 )p for p ≥ 1
and where d is a metric on Ω, and Wp (µ0 , µ1 ) := T (µ0 , µ1 )1/p [35, Definition 6.1]. As the name
indicates, Wp is a metric on the set of nonnegative measures on Ω with fixed mass [35, Theorem 6.9],
and T is weak∗ continuous on this set. One important property is that T (and thus also Wp ) does not
only compare objects point by point, as standard Lp metrics, but instead quantifies how the mass is
moved. This makes optimal transport natural for quantifying uncertainty and modelling deformations
[19, 21].
One way to solve the optimal transport problem in applications is to discretize Ω and solve the
corresponding finite-dimensional linear programming problem. In this setting the two measures are
represented by point masses on the discretization grid, i.e., by two vectors µ0 , µ1 ∈ Rn+ where the
element [µk ]i corresponds to the mass in the point x(i) ∈ Ω for i = 1, . . . , n and k = 0, 1. Moreover,
a transference plan is represented by a matrix M ∈ Rn×n
where the value mij := [M ]ij denotes
+
the amount of mass transported from point x(i) to x(j) . The associated cost of a transference plan
Pn
is i,j=1 cij mij = trace(C T M ), where [C]ij = cij = c(x(i) , x(j) ) is the transportation cost from
3
x(i) to x(j) , and by discretizing the constraints we get that M is a feasible transference plan from µ0
to µ1 if the row sums of M is µ0 and the column sums of M is µ1 . The discrete version of (4) thus
takes the form
T (µ0 , µ1 ) =
min
M ≥0
trace(C T M )
subject to µ0 = M 1n
(5)
µ1 = M T 1n ,
where M ≥ 0 denotes element-wise non-negativity of the matrix. However, even though (5) is a
linear programming problem it is in many cases computationally infeasible due to the vast number of
variables. Since M ∈ Rn×n
the number of variables is n2 , and thus if one seek to solve the optimal
+
transport problem between two 512 × 512 images this results in more than 6 · 1010 variables.
One approach for addressingP
this problem was proposed by Cuturi [10] that introduces an entropic
n
regularizing term D(M ) = i,j=1 (mij log(mij ) − mij + 1) for approximating the transference
plan, so the resulting perturbed optimal transport problem reads as
min
M ≥0
trace(C T M ) + εD(M )
subject to µ0 = M 1n
(6)
µ1 = M T 1n .
One can show that an optimal solution to (6) is of the form
M = diag(u)Kdiag(v),
(7)
Rn+
where K = exp(−C/ε) (point-wise exponential) is known, and u, v ∈
are unknown. This shows
that the solution is parameterized by only 2n variables. Moreover, the two vectors can be computed
iteratively by so called Sinkhorn iterations, i.e., alternatingly compute u and v that matches µ0 and
µ1 respectively. This is summarizied in Algorithm 1 where denotes elementwise multiplication
and ./ elementwise division. The procedure has been shown to have a linear convergence rate, see
[10] and references therein.
Moreover, when the underlying cost c(x0 , x1 ) is translation invariant the discretized cost matrix C,
and thus also the transformation K, gets a Toeplitz-block-Toeplitz structure. This structure can be
used in order to compute Kv and K T u efficiently using the fast Fourier transform in O(n log n),
instead of naive matrix-vector multiplication in O(n2 ) [22]. This is crucial for applications in imaging
since for images of size 512×512 pixels one would have to explicitly store and multiply with matrices
of size 262144 × 262144 .
Algorithm 1 Sinkhorn iterations for computing entropy-regularized optimal transport [10]
1:
2:
3:
4:
5:
6:
3
Input C, ε, µ0 , µ1
initialize v0 > 0 and K = exp(−C/ε)
for i = 1, . . . , N do
ui ← µ0 ./(Kvi−1 )
vi ← µ1 ./(K T ui )
return uTN (K C)vN
Learning a reconstruction operator using Wasserstein loss
In this work we propose to use entropy regularized optimal transport (6) to train a reconstruction
operator, i.e., to select the parameters as
h
i
Θ∗ ∈ arg min Ef,g T (T †Θ (g), f) .
(8)
Θ
This should give better results when data g is not aligned with the ground truth f . To see this,
consider the case when f is a point mass. In that case training the network with the L2 loss (3)
will (in the ideal case) result in a perfect reconstruction composed with a convolution that “smears”
the reconstruction over the area of possible miss-alignment. On the other hand since optimal mass
transport does not only compare objects point-wise, the network will (in the ideal case) learn a perfect
reconstruction combined with a movement of the object to the corresponding barycenter (centroid) of
the miss-alignment. These statements are made more precise in the following propositions. Formal
definitions and proofs are deferred to the appendix.
4
Proposition 1. Let g ∈ L2 (Rn ), let τ be a Rn -valued random variable with probability measure
dP (t), and let gτ (x) := g(x − τ ). Then there exists a function f ∈ L2 (Rn ) that minimizes
Eτ [kf − gτ k22 ], and this f has the form
Z
f (x) = (dP ∗ g)(x) :=
g(x − t)dP (t).
Rn
Proposition 2. Let δ(x) be the Dirac delta function on Rn , let τ be a Rn -valued random variable
with probability measure dP (t), and let δτ (x) := δ(x − τ ). Then
Z Z
Z
Eτ [T (δτ , µ)] =
c(t, x)dP (t) dµ(x) for µ ≥ 0 and
dµ(x) = 1
n
Rn
Rn
|R
{z
}
:=F (x)
and Eτ [T (δτ , µ)] = ∞ otherwise. Furthermore, finding a µ that minimizes Eτ [T (δτ , µ)] is equivalent
to finding the global minimizers to F (x). In particular, if (i) the probability measure dP is symmetric
around its mean, (ii) the underlying cost c is of the form c(t, x) = d(x − t), where d is convex and
symmetric, and (iii) dP and d are such that
Z
Z
d(x − t)dP (t)
and
∂d(x − t)dP (t)
Rn
Rn
n
both exist and are finite for all x ∈ R , then µ(x) = δ(x − E[τ ]) is an optimal solution. Furthermore,
if d is also strictly convex, then this is the unique minimizer.
To illustrate Propositions 1 and 2 we consider the following example.
Example 3. Let τ be uniformly distributed on [−1, 1], and let c(x0 , x1 ) = (x0 − x1 )2 . This gives
Z
1 1
1
F (x) =
(x − t)2 dt = + x2 ,
2 −1
3
which has minimum x = 0, and hence the (unique) minimizer to Eτ [T (δτ , µ)] is µ(x) = δ(x). For
the L2 case with the uniform distribution, the minimizer of Eτ [kf − gτ k22 ] is the smoothed function
g ∗ 12 χ[−1,1] .
The most common choice of distance c is to use the squared norm c(x0 , x1 ) = kx0 − x1 k2 , as in
the previous example. In this case the result of Proposition 2 can be strengthened, as shown in the
following example.
Example 4. Let τ be a Rn -valued random variable with probability measure dP (t) with finite first
and second moments, and let c(x0 , x1 ) = kx0 − x1 k2 . This gives
Z
F (x) =
(x − t)2 dP (t) = x2 − 2x E[τ ] + E[τ 2 ],
Rn
which has a unique global minimum in x = E[τ ] and hence µ(x) = δ(x − E[τ ]).
4
Implementation and evaluation
We use the recently proposed learned primal-dual structure in [3] for learning a reconstruction
operator T †Θ for solving the inverse problem in (1). In this algorithm, a sequence of small blocks work
alternatingly in the data (dual) space Y and the reconstruction (primal) space X and are connected
using the forward operator T and its adjoint T ∗ . The algorithm works with any differentiable operator
T , but we state the version for linear operators for simplicity in algorithm 2.
Algorithm 2 Learned Primal-Dual reconstruction algorithm
1: Initialize f0 ∈ X Nprimal , h0 ∈ U Ndual
2: for i = 1, . . . , I do
(2)
3:
hi ← ΓΘd hi−1 , T (fi−1 ), g
i
(1)
fi ← ΛΘpi fi−1 , T ∗ (hi )
(1)
†
5: T Θ (g) := fI
4:
5
7
32
32
5
6
32
32
5
apply
apply
copy
3x3 conv + PReLU
3x3 conv
Figure 1: Network architecture used to solve the inverse problem. Dual and primal iterates are in
blue and red boxes, respectively. Several arrows pointing to the same box indicates concatenation.
The initial values f0 , h0 enter from the left, while the data g is supplied to the dual iterates.
→
−
(a) Phantom
→
−
(b) Translated phantom
(c) Data
Figure 2: Example of data generation process used for training and validation, where 2a shows
an example phantom, 2b is the phantom with a random translation and 2c is the data (sinogram)
corresponding to 2b with additive white noise on top. The pair (gi , fi ) = (2c, 2a) is what is used in
the training.
The method was implemented using ODL [2], ASTRA [34], and TensorFlow [1]. We used the
reference implementation1 with default parameters, i.e., the number of blocks in the primal and dual
space was I = 10, and the number of primal and dual variables was set to Nprimal = Ndual = 5.
Moreover, the blocks used a residual structure and had three layers of 3×3 convolutions with 32 filters.
PReLU nonlinearities were used. Thus, this corresponds to a residual CNN with convolutional depth
of 10 · 2 · 3 = 60, as shown in graphical format in fig. 1. We used zero initial values, f0 = h0 = 0.
We compare a learned reconstruction operator of this form when trained using L2 loss (3) and using
optimal transport loss (8). Moreover, the evaluation is done on a problem similar to the evaluation
problem in [3, 4], i.e., on a problem in computed tomography. More specifically, training is done on
data that consists of randomly generated circles on a domain of 512 × 512 pixel, and the forward
operator T is the ray transform [27]. What makes this an ill-posed problem is that the data acquisition
is done from only 30 views with 727 parallel lines. Moreover, the source of noise is two-fold in
this set-up: (i) the pairs (gi , fi ) of data sets and phantoms are not aligned, meaning that the data is
computed from a phantom with a random change in position. This random change is independent
for the different circles, and for each circle it is a shift which is uniformly distributed over [−40, 40]
pixels, both in up-down and left-right direction. (ii) on the data computed from the shifted phantom,
5% additive Gaussian noise was added. For an example, see fig. 2.
The optimal mass transport distance computed with Sinkhorn iterations was used as loss function,
where we used the transport cost
4
4
c(x1 , x2 ) = 1 − e−kx1 −x2 k /80 .
1
https://github.com/adler-j/learned_primal_dual
6
(a) Phantom
(b) Translated phantom (c) Mean squared error loss (d) Optimal transport loss
Figure 3: In 3a we show the validation phantom, which was generated from the same training set
but not used in training, in 3b the translated phantom from which the validation data was computed,
in 3c a reconstruction with neural network trained using mean squared error loss (3), and in 3d a
reconstruction with neural network trained using optimal mass transport loss (8).
This was chosen since it heavily penalizes large movements, while not diverging to infinity which
causes numerical instabilities. Moreover, c(x1 , x2 )1/4 is in fact a metric on R2 (see lemma 6 in the
appendix) and thus W4 (µ0 , µ1 ) := T (µ0 , µ1 )1/4 gives rise to a Wasserstein metric on the space of
images, where T (µ0 , µ1 ) is the optimal mass transport distance with the transport cost c(x1 , x2 ).
Since this cost is translation invariant, the matrix-vector multiplications Ku and K T v can be done
with fast Fourier transform, as mentioned in section 2.2, and this was implemented in Tensorflow. We
used 10 Sinkhorn iterations with entropy regularization ε = 10−3 , to approximate the optimal mass
transport. Automatic differentiation was used to back-propagate the result during training.
Since the optimal mass transport function (6) is only finite for marginals µ0 and µ1 with the
same total mass, in the training we normalize the output of the reconstruction T †Θ (g) with
mass(f )/mass(T †Θ (g)). This makes T †Θ (g) invariant with respect to the total mass, which is
undesirable. To compensate for this, a small penalization on the error in total mass was added to the
loss function.
The training also followed [3] closely. In particular, we used 2 · 104 batches of size 1, using the ADAM
optimizer [23] with default values except for β2 = 0.99. The learning rate (step length) used was
cosine annealing [25] with initial step length 10−3 . Moreover, in order to improve training stability
we performed gradient norm clipping [29] with norms limited to 1. The convolution parameters
were initialized using Xavier initialization [16], and all biases were initialized to zero. The training
took approximately 3 hours using a single Titan X GPU. The source code used to replicate these
experiments are available online 2
Results are presented in fig. 3. As can be seen, the reconstruction using L2 loss “smears” the reconstruction to an extent where the shape is impossible to recover. On the other hand, the reconstruction
using the Wasserstein loss retains the over-all global shape of the object, although relative and exact
positions of the circles are not recovered.
5
Conclusions and future work
In this work we have considered using Wasserstein loss to train a neural network for solving ill-posed
inverse problems in imaging where data is not aligned with the ground truth. We give a theoretical
motivation for why this should give better results compared to standard mean squared error loss, and
demonstrate it on a problem in computed tomography. In the future, we hope that this method can be
applied to other inverse problems and to other problems in imaging such as segmentation.
2
https://github.com/adler-j/wasserstein_inverse_problems
7
Appendix: Deferred definition and proofs
Proof of Proposition 1. To show that f (x) = (dP ∗ g)(x) ∈ L2 (Rn ) minimizes Eτ [kf − gτ k22 ] we
expand the expression and use Fubini’s theorem to get
Z Z
Z Z
2
2
2
Eτ [kf − gτ k2 ] =
|f (x) − gt (x)| dx dP (t) =
(f (x) − gt (x)) dP (t) dx.
Rn
Rn
Rn
Rn
R
dP (t)dt = 1, this can be written as
2
Z
Z
Eτ [kf − gτ k22 ] =
f (x) −
gt (x)dP (t) dx + c,
Rearranging terms and using that
Rn
Rn
Rn
where c is a constant. Using this it follows that the minimizing f is of the form
Z
f (x) =
gt (x)dP (t).
Rn
To see that f ∈ L2 (Rn ) we note that, by using Fubini’s theorem, we have
2
Z Z
Z Z Z
2
kf k2 =
gt (x)dP (t) dx =
gs (x)gt (x)dx dP (s)dP (t)
Rn
Rn
Rn Rn
Rn
Z Z Z
1
≤
gs (x)2 + gt (x)2 dx dP (s)dP (t) = kgk22 < ∞
2
Rn Rn
Rn
where the first inequality is the arithmetic-geometric mean inequality. This completes the proof.
Definition 5. Let h : Rn → R. A subgradient to h in a point y is a vector v so that
∀ x ∈ Rn .
h(x) ≥ h(y) + hv, x − yi,
The set of all subgradients in a point y is called the subdifferential of h at y, and is denoted by
n
R∂h(y). This is a set-valued operator, and for any measure dν on R we define (dν ∗ ∂h)(y) :=
∂h(t)dν(y
−
t)
to
be
the
set-valued
operator
Rn
Z
y 7→
v(t)dν(y − t) ∈ Rn | v(t) ∈ ∂h(t) .
Rn
Proof of Proposition 2. We consider finding the marginal µ that minimize Eτ [T (δτ , µ)]. Without
loss of generality we assume that τ is zero-mean, since otherwise we simply consider τ − E[τ ] which
is a zero-mean random variable. First we note that T (δt , µ) is only finite for nonegative measures µ
with total mass 1, and hence Eτ [T (δτ , µ)] is only finite for such measures. Second, for such a µ we
have
Z
T (δt , µ) =
c(t, x)dµ(x),
Rn
since one needs to transport all mass in µ into the point t where δt has its mass. Using this and
expanding the expression for the expectation gives that
Z
Z Z
Eτ [T (δτ , µ)] =
T (δt , µ)dP (t) =
c(t, x)dP (t) dµ(x),
Rn
Rn
Rn
where we have used Fubini’s theorem in the last step. This completes the first half of the statement.
To prove the second half of the statement, note that the optimal µ have support only in the global
minimas of the function
Z
Z
F (x) :=
d(x − t)dP (t) =
d(t)dP (x − t),
Rn
Rn
which by assumption exists and is finite. Now, since d is convex we have that
d(x) ≥ d(y) + h∂d(y), x − yi,
8
for all x, y ∈ Rn ,
(9)
and convolving this inequality with dP gives the inequality
Z
F (x) ≥ F (y) + h
∂d(y − t)dP (t), x − yi,
for all x, y ∈ Rn ,
(10)
Rn
where all terms exist and are bounded by assumption. This shows that
Z
∂d(y − t)dP (t) ⊂ ∂F (y).
Rn
Now, since d is symmetric we have that ∂d is anti-symmetric, i.e., that ∂d(x) = −∂d(−x), since
d(x) = d(−x) ≥ d(−y) + h∂d(−y), −x + yi = d(y) + h−∂d(−y), x − yi.
Therefore
Z
∂F (0) ⊃
∂d(−t)dP (t) 3 0,
Rn
where the last inclusion follows since dP is symmetric and ∂d is anti-symmetric. Now, since
0 ∈ ∂F (0) we have that x = 0 is a global minimizer to F (x) [6, Theorem 16.2], and thus one
optimal solution to the problem is µ(x) = δ(x). Now, if d is strictly convex, the inequality (9) is
strict for x 6= y, and thus (10) is also strict, which shows that the optimal solution is unique.
Lemma 6. Let k · k be a norm on Rm . Then
d(x1 , x2 ) = 1 − e−kx1 −x2 k
n
n1
.
is a metric on Rm for n ≥ 1.
Proof. It is easily seen that d(x1 , x2 ) is symmetric, nonnegative, and equal to zero if only if x1 = x2 .
Thus we only need to verify that the triangle inequality holds. To this end we note that if
n 1
n 1
n 1
1 − e−(a+b) n ≤ 1 − e−a n + 1 − e−b n , for all a, b ≥ 0,
(11)
for all n ≥ 1, then by taking a = kx1 − x2 k, b = kx2 − x3 k, and using the triangle inequality for
the norm k · k we have that
n 1
n 1
d(x1 , x3 ) = 1 − e−kx1 −x3 k n ≤ 1 − e−(kx1 −x2 k+kx2 −x3 k) n
n 1
n 1
≤ 1 − e−kx1 −x2 k n + 1 − e−kx2 −x3 k n = d(x1 , x2 ) + d(x2 , x3 ).
Therefore we will show that (11) holds for all n ≥ 1, and to do so we will
(i) show that if a function g : R+ → R+ fulfills g(0) = 0, g(x)0 ≥ 0, g 00 (x) ≤ 0 for all
x ∈ R+ , then g(x1 + x2 ) ≤ g(x1 ) + g(x2 ),
n
1
(ii) show that for x ≥ 0 the map x 7→ (1 − e−x ) n fulfills the assumptions in (i) for any n ≥ 1.
To show (i) we note that
x1 +x2
Z x1
Z x1 +x2
g 0 (t)dt =
g 0 (t)dt +
g 0 (t)dt
0
0
x1
Z x1
Z x2
0
0
≤
g (t)dt +
g (t)dt = g(x1 ) + g(x2 ),
Z
g(x1 + x2 ) =
0
0
where the inequality uses that g 0 (t) ≥ g 0 (x + t) for any x, t ≥ 0 since g 00 (x) ≤ 0 for all x ≥ 0.
n
1
To show (ii), let g(x) := (1 − e−x ) n and observe that g(0) = 0. Differentiating g twice gives
n
g 0 (x) =
n
1
e−x (1 − e−x ) n xn−1
1 − e−xn
=:hn (xn )
z
}|
{
1
xn n
n
xn
xn
−xn n
n−2
(1
−
e
)
x
ne
x
−
x
+
e
−
ne
+
n
−
1
g 00 (x) = −
.
(exn − 1)2
For x ≥ 0 we see that g 0 (x) ≥ 0 for all n ≥ 1. Moreover, for x ≥ 0 we see that g 00 (x) ≤ 0 for all
x ≥ 0 and for all n ≥ 1 if and only if hn (xn ) ≥ 0. With the change of variable xn = y, we thus
want to show that hn (y) ≥ 0 for all y ≥ 0 and all n ≥ 1. To see this we note that hn (0) = 0 and that
h0n (y) = ney y + ey − 1 ≥ 0 for all y ≥ 0 and n ≥ 1.
This shows (ii), and hence completes the proof.
9
References
[1] M. Abadi, A. Agarwal, P. Barham, E. Brevdo, Z. Chen, C. Citro, G. Corrado, A. Davis, J. Dean, M. Devin,
et al. Tensorflow: Large-scale machine learning on heterogeneous distributed systems. arXiv preprint
arXiv:1603.04467, 2016.
[2] J. Adler, H. Kohr, and O. Öktem. ODL - a Python framework for rapid prototyping in inverse problems.
2017. In preparation, KTH Royal Institute of Technology. Code and documentation available online:
https://github.com/odlgroup/odl.
[3] J. Adler and O. Öktem. Learned primal-dual reconstruction. arXiv preprint arXiv:1707.06474, 2017.
[4] J. Adler and O. Öktem. Solving ill-posed inverse problems using iterative deep neural networks. Inverse
Problems, 2017.
[5] M. Arjovsky, S. Chintala, and L. Bottou. Wasserstein GAN. arXiv preprint arXiv:1701.07875, 2017.
[6] H.H. Bauschke and P.L. Combettes. Convex analysis and monotone operator theory in Hilbert spaces.
Springer, New York, 2011.
[7] J.-D. Benamou, G. Carlier, M. Cuturi, L. Nenna, and G. Peyré. Iterative Bregman projections for regularized
transportation problems. SIAM Journal on Scientific Computing, 37(2):A1111–A1138, 2015.
[8] R.W. Brown, Y.-C. N. Cheng, E.M. Haacke, M.R. Thompson, and R. Venkatesan. Magnetic Resonance
Imaging: Physical Principles and Sequence Design. John Wiley & Sons Ltd, 2014.
[9] L. Chizat, G. Peyré, B. Schmitzer, and F.-X. Vialard. Unbalanced optimal transport: geometry and
Kantorovich formulation. arXiv preprint arXiv:1508.05216, 2015.
[10] M. Cuturi. Sinkhorn distances: Lightspeed computation of optimal transport. In Advances in Neural
Information Processing Systems, pages 2292–2300, 2013.
[11] M. Cuturi and G. Peyré. A smoothed dual approach for variational Wasserstein problems. SIAM Journal
on Imaging Sciences, pages 320–343, 2016.
[12] H.W. Engl, M. Hanke, and A. Neubauer. Regularization of inverse problems. Kluwer Academic Publisher,
2000.
[13] B. Engquist and B.D. Froese. Application of the Wasserstein metric to seismic signals. Communications
in Mathematical Sciences, 12(5), 2014.
[14] C. Frogner, C. Zhang, H. Mobahi, M. Araya, and T.A. Poggio. Learning with a Wasserstein loss. In
Advances in Neural Information Processing Systems, pages 2053–2061, 2015.
[15] T.T. Georgiou, J. Karlsson, and M.S. Takyar. Metrics for power spectra: an axiomatic approach. IEEE
Transactions on Signal Processing, 57(3):859–867, 2009.
[16] X. Glorot and Y. Bengio. Understanding the difficulty of training deep feedforward neural networks. In
Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, pages
249–256, 2010.
[17] S. Haker, L. Zhu, A. Tannenbaum, and S. Angenent. Optimal mass transport for registration and warping.
International Journal of computer vision, 60(3):225–240, 2004.
[18] V. Jain and S. Seung. Natural image denoising with convolutional networks. In D. Koller, D. Schuurmans,
Y. Bengio, and L. Bottou, editors, Advances in Neural Information Processing Systems 21, pages 769–776.
Curran Associates, Inc., 2009.
[19] X. Jiang, Z.-Q. Luo, and T.T. Georgiou. Geometric methods for spectral analysis. IEEE Transactions on
Signal Processing, 60(3):1064–1074, 2012.
[20] J. Johnson, A. Alahi, and L. Fei-Fei. Perceptual Losses for Real-Time Style Transfer and Super-Resolution,
pages 694–711. Springer International Publishing, Cham, 2016.
[21] J. Karlsson and T.T. Georgiou. Uncertainty bounds for spectral estimation. IEEE Transactions on Automatic
Control, 58(7):1659–1673, 2013.
[22] J. Karlsson and A. Ringh. Generalized Sinkhorn iterations for regularizing inverse problems using optimal
mass transport. arXiv preprint arXiv:1612.02273, 2016.
[23] D. Kingma and J. Ba. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980, 2014.
[24] Y. LeCun, Y. Bengio, and G. Hinton. Deep learning. Nature, 521:436—444, 2015.
[25] I. Loshchilov and F. Hutter.
arXiv:1608.03983, 2016.
SGDR: stochastic gradient descent with restarts.
arXiv preprint
[26] M. Mardani, E. Gong, J.Y. Cheng, S. Vasanawala, G. Zaharchuk, M.T. Alley, N. Thakur, S. Han, W.J.
Dally, J.M. Pauly, and L. Xing. Deep generative adversarial networks for compressed sensing automates
MRI. CoRR, abs/1706.00051, 2017.
10
[27] F. Natterer and F. Wübbeling. Mathematical methods in image reconstruction. SIAM, 2001.
[28] O. Öktem. Mathematics of electron tomography. In O. Scherzer, editor, Handbook of Mathematical
Methods in Imaging, pages 937–1031. Springer, New York, NY, 2015.
[29] R. Pascanu, T. Mikolov, and Y. Bengio. Understanding the exploding gradient problem. CoRR,
abs/1211.5063, 2012.
[30] P. Paschalis, N. D. Giokaris, A. Karabarbounis, G. K. Loudos, D. Maintas, C. N. Papanicolas,
V. Spanoudaki, Ch. Tsoumpas, and E. Stiliaris. Tomographic image reconstruction using artificial neural
networks. Nuclear Instruments and Methods in Physics Research Section A: Accelerators, Spectrometers,
Detectors and Associated Equipment, 527(1–2):211–215, 2004.
[31] D. M. Pelt and K. J. Batenburg. Fast tomographic reconstruction from limited data using artificial neural
networks. IEEE Transactions on Image Processing, 22(12):5238–5251, 2013.
[32] P. Putzky and M. Welling. Recurrent inference machines for solving inverse problems. Submitted to ICLR
2017, Toulon, France, April 24–26, 2017. Report available from https://openreview.net/pdf?id=HkSOlP9lg,
2017.
[33] L.I. Rudin, S. Osher, and E. Fatemi. Nonlinear total variation based noise removal algorithms. Physica D:
Nonlinear Phenomena, 60(1):259–268, 1992.
[34] W. van Aarle, W.J. Palenstijn, J. Cant, E. Janssens, F. Bleichrodt, A. Dabravolski, J. De Beenhouwer, K.J.
Batenburg, and J. Sijbers. Fast and flexible X-ray tomography using the ASTRA toolbox. Optics express,
24(22):25129–25147, 2016.
[35] C. Villani. Optimal transport: old and new, volume 338. Springer Science & Business Media, 2008.
[36] A. Walker, G. Liney, P. Metcalfe, and L. Holloway. MRI distortion: considerations for MRI based
radiotherapy treatment planning. Australasian Physical & Engineering Sciences in Medicine, 37(1):103–
113, Mar 2014.
[37] T. Würfl, F. C. Ghesu, V. Christlein, and A. Maier. Deep learning computed tomography. In S. Ourselin,
L. Joskowicz, M. Sabuncu, G. Unal, and W. Wells, editors, MICCAI 2016: Medical Image Computing
and Computer-Assisted Intervention – MICCAI 2016, volume 9902 of Lecture Notes in Computer Science,
pages 432–440. Springer-Verlag, 2016.
[38] J. Xie, L. Xu, and E. Chen. Image denoising and inpainting with deep neural networks. In F. Pereira,
C. J. C. Burges, L. Bottou, and K. Q. Weinberger, editors, Advances in Neural Information Processing
Systems 25, pages 341–349. Curran Associates, Inc., 2012.
[39] Y. Yang, J. Sun, H. Li, and Z. Xu. Deep ADMM-Net for compressive sensing MRI. In D. D.
Lee, M. Sugiyama, U. V. Luxburg, I. Guyon, and R. Garnett, editors, Advances in Neural Information Processing Systems, volume 29, pages 10–18. Curran Associates, 2016. Report available from
http://papers.nips.cc/paper/6406-deep-admm-net-for-compressive-sensing-mri.pdf.
[40] H. Zhao, O. Gallo, I. Frosio, and J. Kautz. Loss functions for image restoration with neural networks.
IEEE Transactions on Computational Imaging, 3(1):47–57, March 2017.
11
| 1cs.CV
|
A short characterization of relative entropy
arXiv:1712.04903v1 [cs.IT] 13 Dec 2017
Tom Leinster∗
Abstract
We prove characterization theorems for relative entropy (also known as
Kullback–Leibler divergence), q-logarithmic entropy (also known as Tsallis entropy), and q-logarithmic relative entropy. All three have been characterized axiomatically before, but we show that earlier proofs can be
simplified considerably, at the same time relaxing some of the hypotheses.
1
Introduction
The Shannon entropy of a finite probability distribution p = (p1 , . . . , pn ),
X
H(p) =
i : pi >0
pi log
1
,
pi
is such an important quantity that many authors have sought short lists of
properties that determine H uniquely. Many such characterization theorems
have been found, beginning with one in Shannon’s seminal paper of 1948 ([17],
Theorem 2). For instance, Faddeev [6] proved that up to a constant factor,
H is uniquely characterized by symmetry, continuity, and a certain recursivity
property.
Accompanying Shannon entropy is the concept of relative entropy, defined
as follows. Given probability distributions p and r on n elements, the entropy
of p relative to r is
X
pi
∈ [0, ∞].
pi log
H(p k r) =
ri
i : p >0
i
Relative entropy goes by a multitude of names: Kullback–Leibler divergence,
directed divergence, discrimination information, relative information, information gain, and so on. In information theory, it measures the wastage when a
language whose n letters have frequencies p = (p1 , . . . , pn ) is encoded using
a system optimized for a different language with frequencies r, instead of the
system optimized for the original language. There are other interpretations in
other fields, as the plethora of names suggests.
Axiomatic characterizations of relative entropy have also been sought and
found. One such theorem is implicit in work of Kannappan and Ng [12]. It
states that up to a constant factor, relative entropy is uniquely determined
∗ School of Mathematics, University of Edinburgh, UK; [email protected]. Key words:
relative entropy, Kullback–Leibler divergence, q-logarithm, q-logarithmic entropy, Tsallis entropy, Tsallis relative entropy
1
by measurability in each of p and r separately, invariance under permutations
of {1, . . . , n}, the vanishing property H(p k p) = 0, and a certain recursivity
equation. (Remark 2.7 gives further details.) Their proof was a tour de force of
functional equations, involving the solution of the functional equation
x
y
= h(y) + (1 − y)k
(1)
f (x) + (1 − x)g
1−x
1−y
in four unknown functions, as well as the four-variable functional equation
u
x
v
y
F (x, y) + (1 − x)F
= F (u, v) + (1 − u)F
.
,
,
1−x 1−y
1−u 1−v
We give a much simpler proof, at the same time weakening the measurability
hypothesis. Our proof involves neither of these equations. Instead, it borrows heavily from a categorical characterization of relative entropy by Baez and
Fritz [1]. This is the first main result, Theorem 2.1.
Shannon entropy is just one member (albeit a special one) of a one-parameter
family of entropies (Sq )q∈R , first investigated by Havrda and Charvát [10] and
often misattributed to Tsallis (Remark 3.2(ii)). These entropies Sq , and the
accompanying relative entropies, are defined as follows.
For q ∈ R, the q-logarithm is the function lnq : (0, ∞) → R given by
Z x
t−q dt.
lnq (x) =
1
The q-logarithmic entropy and q-logarithmic relative entropy are defined
by
X
1
pi lnq ,
Sq (p) =
p
i
i : pi >0
X
ri
Sq (p k r) = −
pi lnq ,
p
i
i : p >0
i
for probability distributions p and r on n elements. When q = 1, these reduce
to the ordinary Shannon entropy and relative entropy.
There are several existing theorems characterizing the q-logarithmic entropy
for a given q 6= 1. Up until now, the simplest appears to have been the 1970
result of Daróczy [5]. We simplify further, weakening the hypotheses and shortening the proof to just a few lines (Theorem 3.1).
Finally, we use a similar and equally short argument to characterize the
q-logarithmic relative entropies Sq (− k −) (Theorem 4.1).
It is remarkable that when q 6= 1, the characterizations of q-logarithmic
entropy and q-logarithmic relative entropy need no regularity conditions whatsoever (not even measurability), in contrast to the theorems for q = 1.
The remaining three sections of this paper establish our three theorems in
turn, characterizing first relative entropy, then q-logarithmic entropy, then qlogarithmic relative entropy.
2
Relative entropy
For n ≥ 1, write
n
o
X
∆n = p = (p1 , . . . , pn ) ∈ Rn : pi ≥ 0,
pi = 1
2
for the set of probability distributions on {1, . . . , n}, and write
An = (p, r) ∈ ∆n × ∆n : pi = 0 whenever ri = 0 .
Evidently, (p, r) ∈ An if and only if the relative entropy
H(p k r) =
X
pi log
i : pi >0
pi
ri
is finite. (Viewing p and r as measures on {1, . . . , n}, we have (p, r) ∈ An just
when p is absolutely continuous with respect to r.)
We will characterize the sequence of functions
H(− k −) : An → R n≥1
uniquely up to a constant factor. It is easy to check that this sequence has the
following four properties, as does any scalar multiple cH(− k −) (for c ∈ R).
Measurability in the second argument For each n ≥ 1 and p ∈ ∆n , the
function
{r ∈ ∆n : (p, r) ∈ An } →
R
r
7→ H(p k r)
is Lebesgue measurable.
Symmetry For each n ≥ 1, (p, r) ∈ An and permutation σ of {1, . . . , n},
H(p k r) = H(pσ k rσ),
(2)
where pσ = (pσ(1) , . . . , pσ(n) ).
Vanishing H(p k p) = 0 for all n ≥ 1 and p ∈ ∆n .
Chain rule To state this, we need some notation. Given n, k1 , . . . , kn ≥ 1 and
w ∈ ∆n , p1 ∈ ∆k1 , . . . , pn ∈ ∆kn , and writing pi = (pi1 , . . . , piki ), define
w ◦ (p1 , . . . , pn ) = (w1 p11 , . . . , w1 p1k1 , . . . , wn pn1 , . . . , wn pnkn ) ∈ ∆k1 +···+kn .
The chain rule for relative entropy is that
n
X
e i ) (3)
e ◦ (e
e n ) = H(w k w)
e +
wi H(pi k p
H w ◦ (p1 , . . . , pn ) w
p1 , . . . , p
i=1
e ∈ An and (pi , p
e i ) ∈ Aki . (Under these hypotheses, the
whenever (w, w)
pair of distributions on the left-hand side belongs to Ak1 +···+kn .)
Theorem 2.1 Let I(− k −) : An → R n≥1 be a sequence of functions. The
following are equivalent:
i. I(− k −) satisfies the four properties above: measurability in the second
argument, symmetry, vanishing, and the chain rule;
ii. I(− k −) = cH(− k −) for some c ∈ R.
3
We have just noted that (ii) implies (i). We now embark on the proof of the
converse. For the rest of this section, let I(− k −) : An → R n≥1 be a sequence
of functions satisfying the four conditions. Define a function L : (0, 1] → R by
L(α) = I (1, 0) (α, 1 − α) .
The idea is that if I(− k −) = H(− k −) then L = − log. We will show that in
any case, L is a scalar multiple of log.
Lemma 2.2 Let (p, r) ∈ An with pk+1 = · · · = pn = 0, where 1 ≤ k ≤ n. Then
r1 + · · · + rk > 0 and
I(p k r) = L(r1 + · · · + rk ) + I(p′ k r′ ),
where
p′ = (p1 , . . . , pk ),
r′ =
(r1 , . . . , rk )
.
r1 + · · · + rk
Proof The case k = n reduces to the statement that L(1) = 0, which follows
from the vanishing property. Suppose, then, that k < n.
Since p is a probability distribution with pi = 0 for all i > k, there is some
i ≤ k such that pi > 0, and then ri > 0 as (p, r) ∈ An . Hence r1 + · · · + rk > 0.
Let r′′ ∈ ∆n−k be the normalization of (rk+1 , . . . , rn ) if rk+1 + · · · + rn > 0, or
choose r′′ arbitrarily in ∆n−k otherwise (which is possible since k < n). Then
I(p k r) = I (1, 0) ◦ (p′ , r′′ ) (r1 + · · · + rk , rk+1 + · · · + rn ) ◦ (r′ , r′′ ) .
The result now follows from the chain rule.
Lemma 2.3 L(αβ) = L(α) + L(β) for all α, β ∈ (0, 1].
Proof We evaluate the real number
x := I (1, 0, 0) (αβ, α(1 − β), 1 − α)
in two ways. By Lemma 2.2 with k = 1 and the vanishing property,
x = L(αβ) + I (1) (1) = L(αβ),
where (1) is the unique element of ∆1 . But also, by Lemma 2.2 with k = 2,
x = L(α) + I (1, 0) (β, 1 − β) = L(α) + L(β).
Comparing the two expressions for x gives the result.
Lemma 2.4 There is some c ∈ R such that L(α) = −c log α for all α ∈ (0, 1].
Proof Define f : [0, ∞) → R by f (t) = L(e−t ). By Lemma 2.3, f (t + u) =
f (t) + f (u) for all t, u ∈ [0, ∞). Also, f is measurable, since L is. It is wellknown [2] that these conditions force f (t) = ct for some constant c, giving
L(α) = −c log α.
Our next lemma is an adaptation of the most ingenious part of Baez and
Fritz’s argument ([1], Lemma 4.2).
4
Lemma 2.5 Let (p, r) ∈ An with pi > 0 for all i ∈ {1, . . . , n}. Then I(p k r) =
cH(p k r).
Proof The hypotheses imply that ri > 0 for all i. We can therefore choose
some α ∈ (0, 1] such that ri − αpi ≥ 0 for all i. We will compute the number
x := I (p1 , . . . , pn , 0, . . . , 0) (αp1 , . . . , αpn , r1 − αp1 , . . . , rn − αpn )
| {z }
n
in two ways. First, by Lemma 2.2, Lemma 2.4, and the vanishing property,
x = L(α) + I(p k p) = −c log α.
Second, by symmetry, the chain rule, and Lemma 2.4,
x = I (p1 , 0, . . . , pn , 0) (αp1 , r1 − αp1 , . . . , pn , rn − αpn )
= I p ◦ (1, 0), . . . , (1, 0) r ◦ α pr11 , 1 − α pr11 , . . . , α prnn , 1 − α prnn
= I(p k r) +
n
X
i=1
pi L α prii
= I(p k r) − c log α − cH(p k r).
Comparing the two expressions for x gives the result.
We have now proved that I(p k r) = cH(p k r) when p has full support. It
only remains to prove it for arbitrary p.
Proof of Theorem 2.1 Let (p, r) ∈ An . By symmetry, we can assume that
p1 , . . . , pk > 0 and pk+1 = · · · = pn = 0 for some k ∈ {1, . . . , n}. Writing
R = r1 + · · · + rk , we have R > 0 since (p, r) ∈ An , and t
I(p k r) = L(R) + I (p1 , . . . , pk ) R1 (r1 , . . . , rk )
by Lemma 2.2. Hence by Lemmas 2.4 and 2.5,
I(p k r) = −c log R + cH (p1 , . . . , pk )
.
1
R (r1 , . . . , rk )
But by the same argument applied to cH in place of I (or by direct calculation),
we also have
cH(p k r) = −c log R + cH (p1 , . . . , pk ) R1 (r1 , . . . , rk ) .
The result follows.
Remarks 2.6
i. The vanishing P
axiom cannot be dropped from Theorem 2.1. Indeed, the quantity i : pi >0 pi log r1i satisfies the other three
axioms but not vanishing.
ii. In the literature on information functions, the chain rule is often replaced
by one of two superficially simpler rules. The first is the special case
k1 = 2, k2 = · · · = kn = 1, which is
H (pw1 , (1 − p)w1 , w2 , . . . , wn ) (e
pw
e1 , (1 − pe)w
e1 , w
e2 , . . . , w
en )
e + w1 H (p, 1 − p) (e
=H w w
p, 1 − pe) (4)
5
e ∈ An , ((p, 1 − p), (e
((w, w)
p, 1 − pe)) ∈ A2 ). This is known as recursivity.
The second is the special case n = 2 of the chain rule, which is
we
ep ⊕ (1 − w)e
er
e ) + (1 − w)H(r k e
= H (w, 1 − w) (w,
e 1 − w)
e + wH(p k p
r), (5)
H wp ⊕ (1 − w)r
where
wp ⊕ (1 − w)r = (wp1 , . . . , wpk , (1 − w)r1 , . . . , (1 − w)rℓ )
e ) ∈ Ak , (r, e
and ((w, 1 − w), (w,
e 1 − w))
e ∈ A2 , (p, p
r) ∈ Aℓ . However,
straightforward inductions (similar to those in Feinstein [7], p. 5–6) show
that in the presence of the symmetry axiom, either one of the special
cases (4) or (5) is equivalent to the full chain rule (3). Which to use is,
therefore, simply a matter of taste.
Remark 2.7 Here we compare Theorem 2.1 with some earlier characterizations
of relative entropy. One of the first such theorems was that of Hobson [11], who
used stronger hypotheses for the same conclusion. In common with Theorem 2.1,
he assumed symmetry, vanishing, and the chain rule (in the equivalent form (5)).
But he also assumed continuity in both variables (instead of measurability in
one) and a monotonicity hypothesis unlike anything in Theorem 2.1.
In 1973, Kannappan and Ng [12] proved a result very close to Theorem 2.1.
They did not state that result in [12], but the closing remarks in another paper
by the same authors [13] and the approach of a contemporaneous paper by
Kannappan and Rathie [14] strongly suggest the intent. The result was stated
explicitly by Csiszár ([4], Section 2.1), who attributed it to Kannappan and Ng.
There are some slight differences of hypotheses between Kannappan and
Ng’s theorem and Theorem 2.1. They assumed measurability in both variables,
whereas we only assumed measurability in the second. (In fact, all we used
was that I((1, 0) k −) is measurable.) On the other hand, they only needed the
vanishing condition for (1/2, 1/2), whereas we needed it for all p. They used
the chain rule in the equivalent form (4). And as indicated in the Introduction,
the proofs are entirely different.
3
q-logarithmic entropy
Let q ∈ R. The definition of q-logarithm in the Introduction gives, explicitly,
lnq (x) =
1
(x1−q − 1)
1−q
for x ∈ (0, ∞) and q 6= 1, while ln1 is the natural logarithm log. Hence,
explicitly, the q-logarithmic entropy is given by
!
X q
1
p −1
Sq (p) =
1 − q i : p >0 i
i
for p ∈ ∆n and q 6= 1, while S1 is the Shannon entropy H. We have lnq (x) →
log(x) as q → 1, hence also Sq (p) → H(p) as q → 1.
6
Fix q ∈ R. The q-logarithmic entropy satisfies a chain rule
X
wiq Sq (pi )
Sq w ◦ (p1 , . . . , pn ) = Sq (w) +
(6)
i : wi >0
(w ∈ ∆n , p1 ∈ ∆k1 , . . . , pn ∈ ∆kn ), as is easily checked. In particular, this
holds when p1 = · · · = pn = p, say. For w ∈ ∆n and p ∈ ∆k , write
w ⊗ p = w ◦ (p, . . . , p)
= (w1 p1 , . . . , w1 pk , . . . , wn p1 , . . . , wn pk ) ∈ ∆nk .
In this case, the q-chain rule (6) gives a q-multiplicativity property:
!
X
q
wi Sq (p)
Sq (w ⊗ p) = Sq (w) +
(7)
i : wi >0
(n, k ≥ 1, w ∈ ∆n , p ∈ ∆k ).
Note also that Sq is symmetric in its arguments:
Sq (p) = Sq (pσ)
(8)
for all p ∈ ∆n and permutations σ of {1, . . . , n}.
The left-hand side of equation (7) is symmetric in w and p, but the righthand side is not obviously so. This is the key to our second theorem.
Theorem 3.1 Let 1 6= q ∈ R and let (I : ∆n → R)n≥1 be a sequence of functions. The following are equivalent:
i. I has the q-multiplicativity property (7) and the symmetry property (8)
(both with I in place of Sq );
ii. I = cSq for some c ∈ R.
Proof By the observations just made, (ii) implies (i). Now assume (i). By
symmetry, I(w ⊗ p) = I(p ⊗ w), so
!
!
X q
X
q
pi I(w),
wi I(p) = I(p) +
I(w) +
i : pi >0
i : wi >0
or equivalently
X
wiq
!
− 1 I(p) =
i : wi >0
X
i : pi >0
pqi
!
− 1 I(w),
for all w ∈ ∆n and p ∈ ∆k . Take w = (1/2, 1/2): then for all p ∈ ∆k ,
!
X q
1−q
pi − 1 I(1/2, 1/2).
2
− 1 I(p) =
i : pi >0
Since q 6= 1, we can define c =
1−q
21−q −1
· I(1/2, 1/2), and then I = cSq .
7
Remarks 3.2
i. The q-logarithms were used in Hardy, Littlewood and
Pólya’s classic book on inequalities, first published in 1934 ([9], proof
of Theorem 84). They have been an explicit object of study since at least
a 1964 paper of Box and Cox in statistics ([3], Section 3). The name
‘q-logarithm’ appears to have been introduced by Umarov, Tsallis and
Steinberg in 2008 [20], working in statistical mechanics.
ii. The q-logarithmic entropies have been discovered and rediscovered repeatedly. To my knowledge, they first appeared in a 1967 paper on information
and classification by Havrda and Charvát [10], who used a form adapted
to base 2 logarithms. They were rediscovered in 1970 by Daróczy [5]. The
base e version Sq seems to have first appeared in a 1982 article of Patil and
Taillie ([16], Section 3.2), where it was studied as an index of biodiversity.
In physics, meanwhile, the q-logarithmic entropies appeared in a 1971 article of Lindhard and Nielsen [15] (according to Csiszar [4], Section 2.4), and
in a 1978 survey by Wehrl ([21], p. 247). Finally, they were rediscovered
again in a 1988 paper on statistical physics by Tsallis [19].
Despite the twenty years of active life that the q-logarithmic entropies had
already enjoyed, it is after Tsallis that they are most commonly named.
The term ‘q-logarithmic entropy’ is new, but has the benefits of being
descriptive and of not perpetuating a misattribution.
iii. As in Remark 2.6(ii) or Feinstein [7] (p. 5–6), a simple inductive argument
shows that the q-chain rule of equation (6) follows from the special case
(9)
Sq pw1 , (1 − p)w1 , w2 , . . . , wn = Sq (w) + w1q Sq (p, 1 − p)
(p ∈ [0, 1], n ≥ 1, w ∈ ∆n ).
iv. A characterization of the q-logarithmic entropies similar to Theorem 3.1
was published by Daróczy in 1970 [5]. He assumed the full q-chain rule
for I(w ◦ (p1 , . . . , pn )) (in the equivalent form (9)), rather than just the
special case of I(w ⊗ p) that we used. However, where we assumed that
I : ∆n → R is symmetric for all n ≥ 2, Daróczy only assumed it for n = 3.
The two proofs are very different; the main step in Daróczy’s was the
solution of the functional equation (1) in the case f = g = h = k.
Other characterizations of Sq have been proved, using stronger hypotheses
than Theorem 3.1 to obtain the same conclusion (such as the theorem in
Section 2 of [18], and Theorem V.2 of [8]).
4
q-logarithmic relative entropy
For q 6= 1, the q-logarithmic relative entropy Sq : An → R, defined in the Introduction, is given explicitly by
!
X q 1−q
1
p r
−1 ,
Sq (p k r) =
q − 1 i : p >0 i i
i
for (p, r) ∈ An and q 6= 1. In the case q = 1, it reduces to the ordinary
relative entropy H(p k r). As in that case, restricting the arguments to lie in
An guarantees that Sq (− k −) takes only finite values.
8
Our third and final theorem is a characterization of q-logarithmic relative
entropy, very similar to the characterization of q-logarithmic entropy itself.
We begin by noting two properties of q-logarithmic relative entropy. First,
there is an easily-checked chain rule:
X
ei)
e ◦ (e
e n ) = Sq (w k w)
e +
wiq w
ei1−q Sq (pi k p
p1 , . . . , p
Sq w ◦ (p1 , . . . , pn ) w
i : wi >0
e ∈ An , (pi , p
e i ) ∈ Aki ). This specializes to a q-multiplicativity formula
((w, w)
!
X
q 1−q
e)
e ⊗p
e ) = Sq (w k w)
e +
Sq (p k p
(10)
wi w
ei
Sq (w ⊗ p k w
i : wi >0
e ∈ An , (p, p
e ) ∈ Ak ). Second, q-logarithmic relative entropy has the
((w, w)
same symmetry property as ordinary relative entropy:
Sq (p k r) = Sq (pσ k rσ)
(11)
for all n ≥ 1, (p, r) ∈ An , and permutations σ of {1, . . . , n}.
Theorem 4.1 Let 1 6= q ∈ R and let I(− k −) : An → R n≥1 be a sequence of
functions. The following are equivalent:
i. I(− k −) has the q-multiplicativity property (10) and the symmetry property (11) (both with I in place of Sq );
ii. I(− k −) = cSq (− k −) for some c ∈ R.
Proof It is trivial that (ii) implies (i). Now assume (i). By symmetry,
e ⊗p
e ) = I(p ⊗ w k p
e ⊗ w)
e
I(w ⊗ p k w
e ∈ An , and (p, p
e ) ∈ Ak . So by q-multiplicativity,
for all n, k ≥ 1, (w, w)
!
!
X q 1−q
X
q 1−q
e
e ) = I(p k p
e) +
e +
I(w k w),
pi pei
I(p k p
wi w
ei
I(w k w)
i : pi >0
i : wi >0
or equivalently,
X
i : wi >0
wiq w
ei1−q
!
e ). =
− 1 I(p k p
e = (1/2, 1/2): then
Take w = (1, 0) and w
(2
q−1
e) =
− 1)I(p k p
X
i : pi >0
X
i : pi >0
pqi pe1−q
i
pqi pe1−q
i
!
e
− 1 I(w k w).
!
− 1 I (1, 0) (1/2, 1/2)
e ) ∈ Ak . But q 6= 1, so we can define
for all (p, p
c=
1−q
· I (1, 0) (1/2, 1/2) ,
−1
2q−1
and then I(− k −) = cSq (− k −).
Remarks 4.2 Other characterization theorems for q-logarithmic relative entropy have been proved. For example, Furuichi ([8], Section IV) obtained the
same conclusion, but also assumed continuity and essentially the full chain rule
(that is, an equivalent special case, as in Remarks 2.6(ii) and 3.2(iii)).
9
Acknowledgements I thank John Baez and Tobias Fritz for their comments.
This work was partially supported by a BBSRC FLIP award (BB/P004210/1).
References
[1] J. Baez and T. Fritz. A Bayesian characterization of relative entropy. Theory and
Applications of Categories, 29:421–456, 2014.
[2] S. Banach. Sur l’équation fonctionnelle f (x + y) = f (x) + f (y). Fundamenta
Mathematicae, 1:123–124, 1920.
[3] G. E. P. Box and D. R. Cox. An analysis of transformations. Journal of the Royal
Statistical Society. Series B (Methodological), 26:211–252, 1964.
[4] I. Csiszár. Axiomatic characterizations of information measures. Entropy, 10:261–
273, 2008.
[5] Z. Daróczy. Generalized information functions. Information and Control, 16:36–
51, 1970.
[6] D. K. Faddeev. On the concept of entropy of a finite probabilistic scheme (in
Russian). Uspekhi Matematicheskikh Nauk, 11:227–231, 1956.
[7] A. Feinstein. Foundations of Information Theory. McGraw–Hill, New York, 1958.
[8] S. Furuichi. Uniqueness theorems for Tsallis entropy and Tsallis relative entropy.
IEEE Transactions on Information Theory, 51:3638–3645, 2005.
[9] G. Hardy, J. E. Littlewood, and G. Pólya. Inequalities. Cambridge University
Press, Cambridge, 2nd edition, 1952.
[10] J. Havrda and F. Charvát. Quantification method of classification processes:
concept of structural α-entropy. Kybernetika, 3:30–35, 1967.
[11] A. Hobson. A new theorem of information theory. Journal of Statistical Physics,
1(3):383–391, 1969.
[12] P. Kannappan and C. T. Ng. Measurable solutions of functional equations related
to information theory. Proceedings of the American Mathematical Society, 38:303–
310, 1973.
[13] P. Kannappan and C. T. Ng. On functional equations connected with directed
divergence, inaccuracy and generalized directed divergence. Pacific Journal of
Mathematics, 54(1):157–167, 1974.
[14] P. Kannappan and P. N. Rathie. On a characterization of directed divergence.
Information and Control, 22:163–171, 1973.
[15] J. Lindhard and V. Nielsen. Studies in statistical dynamics. Matematisk-Fysiske
Meddelelser: Kongelige Danske Videnskabernes Selskab, 38:1–42, 1971.
[16] G. P. Patil and C. Taillie. Diversity as a concept and its measurement. Journal
of the American Statistical Association, 77(379):548–561, 1982.
[17] C. E. Shannon. A mathematical theory of communication. Bell System Technical
Journal, 27:379–423, 1948.
[18] H. Suyari. On the most concise set of axioms and the uniqueness theorem for
Tsallis entropy. Journal of Physics A: Mathematical and General, 35:10731–10738,
2002.
[19] C. Tsallis. Possible generalization of Boltzmann–Gibbs statistics. Journal of
Statistical Physics, 52:479–487, 1988.
[20] S. Umarov, C. Tsallis, and S. Steinberg. On a q-central limit theorem consistent
with nonextensive statistical mechanics. Milan Journal of Mathematics, 76:307–
328, 2008.
[21] A. Wehrl. General properties of entropy. Reviews of Modern Physics, 50(2):221–
260, 1978.
10
| 7cs.IT
|
Day-Ahead Solar Forecasting Based on Multi-level
Solar Measurements
Mohana Alanazi, Mohsen Mahoor, Amin Khodaei
Department of Electrical and Computer Engineering
University of Denver
Denver, USA
[email protected], [email protected], [email protected]
Abstract—The growing proliferation in solar deployment,
especially at distribution level, has made the case for power
system operators to develop more accurate solar forecasting
models. This paper proposes a solar photovoltaic (PV) generation
forecasting model based on multi-level solar measurements and
utilizing a nonlinear autoregressive with exogenous input
(NARX) model to improve the training and achieve better
forecasts. The proposed model consists of four stages of data
preparation, establishment of fitting model, model training, and
forecasting. The model is tested under different weather
conditions. Numerical simulations exhibit the acceptable
performance of the model when compared to forecasting results
obtained from two-level and single-level studies.
Keywords—Solar generation forecast, nonlinear autoregressive
with exogenous input (NARX).
NOMENCLATURE
Pactual
Pforecast
Actual solar generation
Forecasted solar generation
P actual
N
Ec
Ef
ES
Average actual solar generation
Number of sample
Calculated error at customer level
Calculated error at feeder level
Calculated error at substation level
I.
S
INTODUCTION
OLAR FORECASTING plays a key role in the planning,
control and operation of power systems. Although this
viable generation technology is making fast inroads in
electricity grids, solar forecasting is still facing various
challenges, due to the inherent variability and uncertainty in
solar photovoltaic (PV) generation [1], [2].
Numerous factors, including but not limited to the dropping
cost of solar technology, environmental concerns, and the state
and governmental incentives, have made the path for a rapid
growth of solar regeneration. More than 2 GW of solar PV
was installed only in the U.S. in the summer of 2016, which is
43% higher compared to the installed capacity in the same
timeframe in 2015, to achieve an accumulated capacity of 31.6
GW [3]. Accordingly, solar forecasting problem has attracted
more attention to properly incorporate solar generation into
power system planning, operation, and control.
Many research studies are carried out on solar forecasting
problem, and several approaches are suggested to improve
forecasting results [4]-[8]. In [9], a short-term one-hour-ahead
Global Horizontal Irradiance (GHI) forecasting framework is
developed using machine learning and pattern recognition
models. This model reduces normalized mean absolute error
and the normalized root mean square error compared to the
commonly-used persistence method by 16% and 25%,
respectively. In [10], an intelligent approach for wind and
solar forecasting is proposed based on linear predictive coding
and digital image processing. It is shown that the model can
outperform conventional methods and neural networks.
Ensemble methods are quite popular in statistics and machine
learning, as they reap the benefit of multiple predictors to
achieve not only an aggregated, but also a better and reliable
decision. A survey paper on using ensemble methods for wind
power forecasting and solar irradiance forecasting is proposed
in [11]. The paper concludes that the ensemble forecasting
methods in general outperform the non-ensemble ones. A
comprehensive review focusing on the state-of-the-art
methods applied to solar forecasting is conducted in [12]. A
variety of topics including the advantages of probabilistic
forecast methods over deterministic ones, and the current
computational approaches for renewable forecasting is
discussed in this paper.
Historical data are of great importance for solar forecasting.
By leveraging historical data, the solar PV generation can be
forecasted for various time horizons as discussed in [13]. This
study investigates least-square support vector machines,
artificial neural network (ANN), and hybrid statistical models
based on least square support vector machines with wavelet
decomposition. In addition, a variety of measures, including
the root mean square error, mean bias error and mean absolute
error, are employed to evaluate the performance of the
aforementioned methods. The hybrid method based on leastsquare support vector machines and wavelet decomposition
surpasses the other methods. A new two-stage approach for
online forecasting of solar PV generation is proposed in [14].
This approach leverages a clear sky model to achieve a
statistical normalization. Normalized power output is further
forecasted by using two adaptive linear time series models;
autoregressive and autoregressive with exogenous input.
Various types of ANN, including but not limited to recurrent
neural network, feed-forward neural network, and radial basis
function neural network are employed for solar forecasting.
Substation
II.
Feeder level
Customer level
Substation level
Fig. 1 Multi-level Solar PVs installed at different locations.
The ANNs not only can process complex and nonlinear
time series forecast problems, but also can learn and figure out
the relationship between the input and the target output. On
the basis of ANN, a statistical method for solar PV generation
forecasting is proposed in [15]. One of the lessons learned
from this paper is that neural networks can be well-trained to
enhance forecast accuracy. In [16], by levering stationary data
and employing post-processing steps, a feed-forward neural
network-based method for day ahead solar forecasting is
studied. A comprehensive review of solar forecasting by using
different ANNs is provided in [17].
Hybrid models are considered highly effective for solar
forecasting in a way that they reinforce capabilities of each
individual method. Hybrid models reap the benefits of two or
more forecasting methods with the objective of achieving a
better forecast result [18]-[21]. In [22], authors present a
hybrid model consisting of various forecasting methods for a
48-hour-ahead solar forecasting in North Portugal. This study
advocates that the hybrid model attains a significant
improvement compared to statistical models. Another hybrid
short-term model to forecast solar PV generation is studied in
[23]. This hybrid model is formed on the basis of both group
method of data handling and least-square support vector
machine, where the performance of the hybrid model
significantly outperforms the other two methods.
The existing literature in this research area lacks studies on
multi-level data measurements for day-ahead solar PV
generation forecasting. Leveraging the multi-level solar
measurements to provide a more accurate forecasting for the
solar PV generation is the primary objective of this paper. The
solar PV generation, which is measured at various locations
including customer, feeder and substation, is utilized for dayahead solar forecasting with the objective of enhancing the
forecast accuracy. These multi-level measurements could play
an instrumental role in enhancing solar forecasting in terms of
reaching lower error values. The proposed forecasting model,
which will be further discussed in details in this paper,
consists of four stages and takes advantage of multiple
datasets related to specific locations.
The rest of the paper is organized as follows: Section II
discusses outline and the architecture of the proposed
forecasting model. Numerical simulations are presented in
Section III. Discussions and conclusions drawn from the
studies are provided in Section IV.
FORECASTING MODEL OUTLINE AND ARCHITECTURE
Fig. 1 depicts the three levels of solar PV measurements:
customer, feeder, and substation. The proposed model aims to
outperform the forecast applied at each solar measurement
level. The forecast in each level is performed using a
nonlinear autoregressive neural network. The mean absolute
percent error MAPE is accordingly calculated as in (3) for
each level, and denoted as EC, EF, and ES for customer, feeder,
and substation, respectively. This model aims to reduce the
forecasting error to be less than the minimum of EC, EF, and
ES. Fig. 2 depicts the three datasets, which are processed under
different stages and explained in the following.
Hourly solar PV generation at customer
(C), feeder (F), and substation (S) levels
Forecast using NARNN
and calculate the errors
EC, EF , ES
Data Preparation
Preprocessed Data at customer, feeder,
and substation level
Fitting Model
Establish a fitting model using NARNN
at customer, feeder and substation level
Forecasting
Select the best fitting model with
2
maximum R
Train the model
based on the
previous
preprocessed data
Forecast the output using NARX
Calculate the new error (En)
NO
En< min (EC , EF , ES )
Yes
Data post-processing and final output
Fig. 2 The flowchart of the multi-level solar PV generation forecasting.
A. Data Preprocessing and Adjusment
The data used in the simulation represent the total solar PV
generation. The data preparation includes removing offset,
normalization,
removing
nighttime
values,
and
stationarization. More detail about data preprocessing can be
found in [16]. The data preparation is to ensure the quality of
dataset before it is inputted to the forecasting model. This step
includes the simulation of maximum power generated from
solar PV at clear sky conditions. This is achieved by
simulating the maximum solar PV generation at clear sky
conditions using the system advisory model (SAM) provided
by National Renewable Energy Laboratory (NREL) [24]. The
maximum solar irradiance along with different metrological
inputs in clear condition are fed to SAM in order to simulate
the maximum solar PV generation. Fig. 3 presents the
flowchart for data preparation.
Benchmark data
Clear sky solar
PV generation
Data
preprocessing
Stationarity
check
Fig. 3 The flowchart for data preparation.
B. Fitting Model
By using NARNN, the fitting model is created for each
level. In this respect, the NARNN model utilizes a large set of
historical data in order to train the model and then forecast the
output. It is applied to the three datasets, including customer,
feeder, and substation in order to establish the three fitting
models. The best fitting model among the three is selected
using the coefficient of determination R2. The coefficient of
determination examines the proportion variance of the
predicted fitting model. The coefficient of determination can
be expressed mathematically as in (1), where P(t)actual is the
average of the actual data over the number of sample. The R2
ranges from 0 to 1, where 0 represents that the fitting model is
not predictable, and 1 means that the NARNN is able to
predict the fitting without any error. So, the best selected
fitting model among the three is the one with maximum R2.
N
( P(t ) actual P(t ) forecast ) 2
2
t 1
R 1 N
2
t1( P(t ) actual P(t ) actual )
(1)
C. Forecasting
NARX is a time series model that predicts the output using
historical values y(t) as well as inputs x(t). The NARX model
is presented in (2), where d is the number of considered
historical values. The fitting model is fed as an input to NARX
along with the previously preprocessed data. The NARX is
trained and the output is forecasted. Fig. 4 depicts the
architecture of the NARX. The goal is to forecast a day-ahead
solar PV generation with a new error En, which is less than the
minimum of the three errors as shown in the flowchart in
terms of a condition.
(2)
y(t) = f (x(t -1),.., x(t - d), y(t -1),.., y(t - d))
D. Data Post-processing
The output from the forecasting model is post-processed by
denormalizing, adding nighttime values, and calculating the
final solar output as explained in detail in [16]. MAPE and the
root mean square error (RMSE) are calculated as in (3) and
(4), respectively.
MAPE
RMSE
1 N P(t ) actual P(t ) forecast
t 1
N
P(t ) actual
1 N
* ( P(t ) actual P(t ) forecast ) 2
N t 1
Hidden Layer
x(t-1)
…
x(t-d)
(3)
neuron
(4)
Output Layer
fn
fn
Σ
y(t-1)
…
y(t-d)
fn
y(t)
fn
Fig. 4 The architecture of the NARX
III.
NUMERICAL SIMULATIONS
The hourly solar PV generation of three levels including
customer (C), feeder (F), and substation (S), for a specific area
in Denver, Colorado are utilized to perform forecasting. The
data used in this model are available in [25]. The customer
level data are considered as the aggregated customers’ solar
PVs generation for a selected area. The feeder level data are
the aggregated solar PVs generation for each feeder, in which
four feeders are considered in this study. Finally, the
substation level data are the solar PV generation measured at
the substation level. In order to demonstrate the merits of the
proposed model, the following three cases with various
weather conditions are investigated:
Case 1: Forecast using NARNN for each level without data
processing.
Case 2: Forecast using NARX with three-level measurements
and data processing.
Case 3: Forecast using NARX with two-level measurements
and data processing.
Case 4: Forecast using NARX with single-level measurement
and data processing.
Case 1: In this case, by leveraging NARNN, day-ahead solar
PV generation is forecasted for all three levels, while ignoring
data processing. The calculated MAPE and RMSE for the
customer, feeder, and substation levels with different weather
conditions are listed in Table I. As highlighted in Table I, the
customer level forecast has achieved the minimum MAPE as
well as RMSE for the selected weather conditions. This case is
considered as a base case, in which the calculated values are
utilized in order to demonstrate the effectiveness of using the
three-level measurements for forecasting. The objective in the
following case is to apply the proposed model in order to get a
new error that is less than the minimum achieved under this
case.
8.29
23.12
7.34
38.59
6.73
Substation
70.77
10.41
43.65
10.13
53.03
10.37
Case 2: In this case, three-level measurements are
preprocessed in order to ensure the quality of the training data
fed to the forecasting model. This case includes three
forecasting stages: establishing the fitting model from each
measurement level using the NARNN, training the NARX
model using the previously preprocessed datasets, and
forecasting the solar PV generation using the three-level
measurements and the fitting model as input. The fitting
model with the minimum MAPE and the maximum R2 is
selected as input to NARX. Table II exhibits how well the
fitting model is established in terms of R2 and MAPE for the
three-level measurements under different weather conditions.
As highlighted in Table II, the fitting model established by
using the customer level measurement outperforms the ones
established by using the feeder and substation measurements.
In order to show the merit of using three-level measurements
for the same location, the three measurements along with the
best fitting model are fed as inputs to NARX to forecast the
solar PV generation. The forecast is simulated for the same
selected days in Case 1. Table III exhibits the MAPE and
RMSE for the selected days. The forecast errors in this case
are less than the minimum achieved in Case 1. Fig. 5, 6 and 7
depict the forecasted and actual solar PV generation for the
considered sunny, cloudy, and partly cloudy days,
respectively.
TABLE II
THE FITTING MODEL MAPE AND R2 FOR THE CONSIDERED LEVELS UNDER
DIFFERENT WEATHER CONDITIONS
Sunny
Cloudy
Partly Cloudy
Dataset
MAPE
MAPE
MAPE
2
2
level
R
R
R2
(%)
(%)
(%)
Customer
2.39
0.9987
2.29
0.9956
3.49
0.99
Feeder
3.78
0.996
2.80
0.9943
4.02
0.988
Substation
5.95
0.9873
4.98
0.9821
5.37
0.986
Case 3: In this case only two measurements at customer and
feeder levels are used for forecasting. The preprocessed data
along with the best selected fitting model are fed to NARX.
The forecasting performance of this case is shown in Table
III.. In sunny day, this case has reduced the MAPE compared
to Case 1 by 47%. In cloudy and partly cloudy weather
conditions, Case 3 has reduced the MAPE compared to Case 1
by 61% and 19%, respectively.
Case 4: To exhibit the effectiveness of the three-level
measurements, Case 2 is repeated, but only one measurement
(customer level) is included as an input to NARX. Similar to
Weather
Condition
Sunny
Cloudy
Partly
Cloudy
2000
PV power output (kW)
48.81
1500
TABLE III
THE MAPE FOR DIFFERENT CASE STUDIES
Minimum
MAPE
MAPE
MAPE
(Using
(Using
(Using
NARX and
NARX and
NARNN
three-level
two-level
without data
processed
processed
processing)
data)
data)
4.47
1.67
2.38
MAPE
(Using
NARX and
single-level
processed
data)
3.14
6.04
2.10
2.36
2.44
4.09
2.69
3.30
3.39
Forecasted
Actual
1000
500
0
1 2 3 4 5 6 7 8 9 101112131415161718192021222324
Time (hour)
Fig. 5 Actual and forecasted solar PV generation in a sunny day
PV power output (kW)
Feeder
the previous case, the best fitting model based on MAPE and
R2 is fed to NARX along with preprocessed customer level
measurement. Table III shows the forecast error using NARX
with single-level measurement comparing to NARX with
three-level measurements, two-level measurements, and the
minimum forecast error among the single-level measurement
using NARNN without data processing. A single-level
measurements considerably improve the results over NARNN
method, however achieve not as good solution as in two
previous cases with three- and two-level measurements.
700
600
500
400
300
200
100
0
Forecasted
Actual
1 2 3 4 5 6 7 8 9 101112131415161718192021222324
Time (hour)
Fig. 6 Actual and forecasted solar PV generation in a cloudy day
1200
PV power output (kW)
TABLE I
CASE 1: MAPE AND RMSE FOR THE CONSIDERED DATASETS UNDER
DIFFERENT WEATHER CONDITIONS
Sunny
Cloudy
Partly Cloudy
Dataset
RMSE
MAPE
RMSE
MAPE
RMSE
MAPE
level
(kW)
(%)
(kW)
(%)
(kW)
(%)
Customer
44.58
4.47
20.54
6.04
36.11
4.09
1000
Forecasted
Actual
800
600
400
200
0
1 2 3 4 5 6 7 8 9 101112131415161718192021222324
Time (hour)
Fig. 7 Actual and forecasted solar PV generation in a partly cloudy day
As shown in Table III, the model minimizes the forecast
error to outperform the minimum error reported at customer
level. The proposed model has reduced the error compared to
the minimum error in Case 1 by 63%, 65%, and 34% for
sunny, cloudy, and partly cloudy weather conditions,
respectively. Moreover, the merit of using three-level
measurements is shown by comparing the forecast error using
the proposed model with applying two-level measurements to
the model as in Case 3. The MAPE is reduced by 30%, 11%,
and 18% for sunny, cloudy, and partly cloudy weather
conditions, respectively. The three-level measurement also
outperforms Case 4 in which only single-level measurement
are included. The three-level measurements model has
reduced the MAPE by 47%, 14%, and 21% for sunny, cloudy,
and partly cloudy weather conditions, respectively. The
previous cases have shown that forecasting performance is
greatly impacted by the historical data used to train the model.
Multiple historical data for a specific location along with an
appropriate data processing will improve the training step and
minimize the forecasting error.
IV.
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
CONCLUSION
In this paper, a day-ahead solar PV generation forecast
model based on multi-level measurements was proposed. The
proposed model demonstrated an improvement in forecasting
accuracy by reducing the MAPE from 14% to 47% for various
weather conditions, compared to the case when only singlelevel measurements were included. It was further seen that the
data preprocessing was an important step to ensure the quality
of the data before it was used in the training process. The
numerical studies revealed that training the forecasting model
without data preprocessing might adversely impact the
forecasting accuracy. The proposed preprocessing model
could potentially reduce the MAPE by 34% to 65%. It was
further shown that the three-level measurements help achieve
a better forecasting accuracy compared to two-level
measurements. The proposed model can be further enhanced
by including multiple meteorological parameters such as cloud
cover, solar irradiance, and temperature along with three-level
measurements as inputs to NARX.
[14]
REFERENCES
[22]
[1]
[2]
[3]
[4]
[5]
H. Sangrody, et al, "Weather forecasting error in solar energy
forecasting," IET Renewable Power Generation, 2017.
S. Watetakarn and S. Premrudeepreechacharn, "Forecasting of solar
irradiance for solar power plants by artificial neural network,” Smart
Grid Technologies-Asia (ISGT ASIA), 2015 IEEE Innovative, 2015.
S. Kann, J. Baca, M. Shiao, C. Honeyman, A. Perea, and S. Rumery,
“US Solar Market Insight - Q3 2016 - Executive Summary,” GTM
Research,Wood Mackenzie Business and the Solar Energy Industries
Association.
S. Akhlaghi, H. Sangrody, M. Sarailoo, and M. Rezaeiahari, "Efficient
operation of residential solar panels with determination of the optimal
tilt angle and optimal intervals based on forecasting model," IET
Renewable Power Generation, 2017.
H. Sangrody, M. Sarailoo, A. Shokrollahzade, F. Hassanzadeh, and E.
Foruzan "On the Performance of Forecasting Models in the Presence of
Input Uncertainty," North American Power Symposium (NAPS),
Morgantown, West Virginia, USA, 2017.
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[23]
[24]
[25]
J. Remund, R. Perez, and E. Lorenz, “Comparison of solar radiation
forecasts for the USA,” in Proc. of the 23rd European PV Conference,
Valencia, Spain. 2008.
G. Reikard, S. E.Haupt, and T. Jensen, “Forecasting ground-level
irradiance over short horizons: Time series, meteorological, and timevarying parameter models,” Renewable Energy, vol. 112, pp.474-485,
Nov. 2017.
G. Reikard, “Predicting solar radiation at high resolutions: A
comparison of time series forecasts,” Solar Energy, vol. 83, no. 3,
pp.342-349, March 2009.
C. Feng, et al, “Short-term Global Horizontal Irradiance Forecasting
Based on Sky Imaging and Pattern Recognition,” IEEE General
Meeting, Chicago, IL, July 2017.
A. A. Moghaddam and A. Seifi, "Study of forecasting renewable
energies in smart grids using linear predictive filters and neural
networks," IET Renewable Power Generation, vol. 5, no.6, pp. 470480, Dec. 2011.
Y. Ren, P. Suganthan, and N. Srikanth, "Ensemble methods for wind
and solar power forecasting-A state-of-the-art review," Renewable and
Sustainable Energy Reviews, vol. 50, pp. 82-91, 2015.
R. Banos, F. Manzano-Agugliaro, F. Montoya, C. Gil, A. Alcayde, and
J. Gómez, "Optimization methods applied to renewable and sustainable
energy: A review," Renewable and Sustainable Energy Reviews, vol. 15,
no.4, pp. 1753-1766, 2011.
M. G. De Giorgi, P. M. Congedo, M. Malvoni, and D. Laforgia, "Error
analysis of hybrid photovoltaic power forecasting models: A case study
of mediterranean climate," Energy Conversion and Management, vol.
100, pp. 117-130, 2015.
P. Bacher, H.Madsen, and H. A. Nielsen, "Online short-term solar
power forecasting," Solar Energy, vol. 83, no.10, pp. 1772-1783, 2009.
C. Chen, S. Duan, T. Cai, and B. Liu, "Online 24-h solar power
forecasting based on weather type classification using artificial neural
network," Solar Energy, vol. 85, no.11, pp. 2856-2870, 2011.
M. Alanazi and A. Khodaei, "Day-ahead Solar Forecasting Using Time
Series Stationarization and Feed-Forward Neural Network," North
American Power Symposium (NAPS), 2016, Denver, CO, USA, 2016.
A. Mellit and S. A. Kalogirou, "Artificial intelligence techniques for
photovoltaic applications: A review," Prog. Energy Combust. Sci., vol.
34, no. 5, pp. 574–632, Oct. 2008.
M. Alanazi, M. Mahoor and A. Khodaei, "Two-stage hybrid day-ahead
solar forecasting," North American Power Symposium (NAPS),
Morgantown, WV, USA, 2017.
J. Wu and C. K. Chan, "Prediction of hourly solar radiation using a
novel hybrid model of ARMA and TDNN," Solar Energy, vol. 85, no. 5,
pp. 808-817, May 20111.
M. Bouzerdoum, A. Mellit, and A. M. Pavan, "A hybrid model
(SARIMA–SVM) for short-term power forecasting of a small-scale
grid-connected photovoltaic plant," Solar Energy, vol. 98, pp. 226-235,
Dec. 2013.
R. Marquez, et al, "Hybrid solar forecasting method uses satellite
imaging and ground telemetry as inputs to ANNs," Solar Energy, vol.
92, pp. 176-188, June 2013.
J. M. Filipe, R. J. Bessa, J. Sumaili, R. Tome, and J. N. Sousa, “A
hybrid short-term solar power forecasting tool,” in Intelligent System
Application to Power Systems (ISAP), 2015 18th International
Conference on, 2015, pp. 1–6.
M. De Giorgi, M. Malvoni, and P. Congedo, "Comparison of strategies
for multi-step ahead photovoltaic power forecasting models based on
hybrid group method of data handling networks and least square support
vector machine," Energy, vol. 107, pp. 360-373, 2016.
“System Advisor Model (SAM) |.” [Online]. Available:
https://sam.nrel.gov/.
S. Pfenninger and I. Staffell, “Long-term patterns of European PV
output using 30 years of validated hourly reanalysis and satellite data,”
Energy, vol. 114, pp. 1251–1265, Nov. 2016.
| 2cs.AI
|
3D Trajectory Reconstruction of Dynamic Objects Using Planarity Constraints
Sebastian Bullinger1 , Christoph Bodensteiner1 , Michael Arens1 and Rainer Stiefelhagen2
1
arXiv:1711.06136v1 [cs.CV] 16 Nov 2017
2
Fraunhofer IOSB
Karslruhe Institute of Technology
{sebastian.bullinger,christoph.bodensteiner,michael.arens}@iosb.fraunhofer.de
[email protected]
Abstract
mented reality applications. There are different platforms
like drones or wearable systems where one wants to achieve
this task with a minimal number of devices in order to reduce weight or lower production costs. We propose an approach to reconstruct three-dimensional object motion trajectories using a single camera as sensor.
The reconstruction of object motion trajectories in monocular video data captured by moving cameras is a challenging
task, since in general it cannot be solely solved exploiting
image observations. Each observed object motion trajectory
is scale ambiguous. Additional constraints are required to
identify a motion trajectory consistent to background structures. [23, 13, 3] assume that the camera is mounted on
a driving vehicle, i.e. the camera has specific height and
a known pose. [16, 28, 17] solve the scale ambiguity by
making assumptions about object and camera motion trajectories. We follow Ozden’s principle of non-accidental
motion trajectories [16] and introduce a new object motion
constraint exploiting semantic segmentation and terrain geometry to compute consistent object motion trajectories.
In many scenarios objects cover only a minority of pixels in
video frames. This increases the difficulty of reconstructing object motion trajectories using image data. In such
cases current state-of-the-art Structure from Motion (SfM)
approaches treat moving object observations most likely as
outliers and reconstruct background structures instead. Previous works, e.g. [11, 12], tackle this problem by considering multiple video frames to determine moving parts in the
video. They apply motion segmentation or keypoint tracking to detect moving objects. These kind of approaches are
vulnerable to occlusion and require objects to move in order
to separate them from background structures.
Our method exploits recent results in instance-aware semantic segmentation and rigid Structure from Motion techniques. Thus, our approach extends naturally to stationary objects. In addition, we do not exploit specific camera
pose constraints like a fixed camera-ground-angle or a fixed
We present a method to reconstruct the threedimensional trajectory of a moving instance of a known
object category in monocular video data. We track the
two-dimensional shape of objects on pixel level exploiting
instance-aware semantic segmentation techniques and optical flow cues. We apply Structure from Motion techniques
to object and background images to determine for each
frame camera poses relative to object instances and background structures. By combining object and background
camera pose information, we restrict the object trajectory to
a one-parameter family of possible solutions. We compute a
ground representation by fusing background structures and
corresponding semantic segmentations. This allows us to
determine an object trajectory consistent to image observations and reconstructed environment model. Our method
is robust to occlusion and handles temporarily stationary
objects. We show qualitative results using drone imagery.
Due to the lack of suitable benchmark datasets we present a
new dataset to evaluate the quality of reconstructed threedimensional object trajectories. The video sequences contain vehicles in urban areas and are rendered using the
path-tracing render engine Cycles to achieve realistic results. We perform a quantitative evaluation of the presented
approach using this dataset. Our algorithm achieves an average reconstruction-to-ground-truth distance of 0.31 meter. The dataset will be publicly available on our website1 .
1. Introduction
1.1. Trajectory Reconstruction
The reconstruction of three-dimensional object motion
trajectories is important for autonomous systems and aug1 Project
page: URL
1
camera-ground-distance. We evaluate the presented object
motion trajectory reconstruction algorithm in UAV scenarios, where such constraints are not valid.
struction related research.
1.4. Paper Overview
The paper is organized as follows. Section 2 describes
the structure and the components of the proposed pipeline.
In section 2.1 we derive an expression for a one-parameter
family of possible object motion trajectories combining object and background reconstruction results. Section 2.2 describes a method to approximate the ground locally. In section 2.3 we describe a method to compute consistent object
motion trajectories. In section 4 we provide an qualitative
and quantitative evaluation of the presented algorithms using drone imagery and rendered video data. Section 5 concludes the paper.
1.2. Related Work
Semantic segmentation or scene parsing is the task of
providing semantic information at pixel-level. Early semantic segmentation approaches using ConvNets, e.g. Farabet
et al. [5], exploit patchwise training. Long et al. [21] applied Fully Convolutinal Networks for semantic segmentation, which are trained end-to-end. Recently, [4, 14, 9] proposed instance-aware semantic segmentation approaches.
The field of Structure from Motion (SfM) can be divided
into iterative and global approaches. Iterative or sequential
SfM methods [22, 27, 15, 24, 20] are more likely to find
reasonable solutions than global SfM approaches [15, 24].
However, the latter are less prone to drift.
The determination of the correct scale ratio between object and background reconstruction requires additional constraints. Ozden et al. [16] exploit the non-accidentalness
principle in the context of independently moving objects.
Yuan et al. [28] propose to reconstruct the 3D object trajectory by assuming that the object motion is perpendicular to the normal vector of the ground plane. Kundu et al.
[11] exploit motion segmentation with multibody VSLAM
to reconstruct the trajectory of moving cars. They use an
instantaneous constant velocity model in combination with
Bearing only Tracking to estimate consistent object scales.
Park et al. propose an approach in [17] to reconstruct the
trajectory of a single 3D point tracked over time by approximating the motion using a linear combination of trajectory
basis vectors. Previous works, like [16, 28, 11, 17] show
only qualitative results.
2. Object Motion Trajectory Reconstruction
The pipeline of our approach is shown in Fig. 1. The
input is an ordered image sequence. We track twodimensional object shapes on pixel level across video sequences following the approach presented in [2]. In contrast
to [2], we identify object shapes exploiting the instanceaware semantic segmentation method presented in [14] and
associate extracted object shapes of subsequent frames using the optical flow approach described in [10]. Without
the loss of generality, we describe motion trajectory reconstructions of single objects. We apply SfM [15, 20] to object and background images as shown in Fig. 1. Object
images denote images containing only color information of
single object instance. Similarly, background images show
only background structures. We combine object and background reconstructions to determine possible, visually identical, object motion trajectories. We compute a consistent
object motion trajectory exploiting constraints derived from
reconstructed terrain ground geometry.
1.3. Contribution
2.1. Object Trajectory Representation
The core contributions of this work are as follows. (1)
We present a new framework to reconstruct the threedimensional trajectory of moving instances of known object categories in monocular video data leveraging sateof-the-art semantic segmentation and structure from motion approaches. (2) We propose a novel method to compute object motion trajectories consistent to image observations and background structures. (3) In contrast to previous work, we quantitatively evaluate the reconstructed object motion trajectories. (4) We created a new object motion trajectory benchmark dataset due to the lack of publicly
available video data of moving objects with suitable ground
truth data. The dataset consists of photo-realistic rendered
videos of urban environments. It includes animated vehicles
as well as set of predefined camera and object motion trajectories. 3D vehicle and environmental models used for rendering serve as ground truth. (5) We will publish the dataset
and evaluation scripts to foster future object motion recon-
In order to estimate a consistent object motion trajectory
we apply SfM simultaneously to object and background images as shown in Fig. 1. We denote the corresponding SfM
(o)
results with sf m(o) and sf m(b) . Let oj ∈ P (o) and
(b)
bk ∈ P (b) denote the 3D points contained in sf m(o) or
(o)
sf m(b) , respectively. The superscripts o and b in oj and
(b)
bk describe the corresponding coordinate frame. The variables j and k are the indices of points in the object or the
background point cloud, respectively. We denote the reconstructed intrinsic and extrinsic parameters of each registered input image as virtual camera. Each virtual camera
in sf m(o) and sf m(b) corresponds to a certain frame from
which object and background images are extracted. We associate virtual cameras in sf m(o) with the corresponding
virtual cameras in sf m(b) and vice versa. In the following, we consider only camera pairs, whose virtual cameras
2
Input Frames
Semantic
Segmentation and
Object Tracking
Object Segmentations
Background
Segmentations
SfM
Ground Segmentations
SfM
Background
SfM Result
Object SfM Result
Object Trajectory Family
Trajectory Family
Computation
Background
SfM Result
Scale Estimation
and Trajectory
Computation
Ground Representation
Consistent Object
Motion Trajectory
Ground
Computation
Figure 1: Overview of the Trajectory Reconstruction Pipeline.
are contained in sf m(o) and sf m(b) . Because of missing
image registrations this may not be the case for all virtual
cameras.
We reconstruct the object motion trajectory by combining
information of corresponding virtual cameras. For any virtual camera pair of an image with index i the object SfM
result sf m(o) contains information of object point positions
(o)
(o)
oj relative to virtual cameras with camera centers ci and
(o)
(o)
rotations Ri . We express each object point oj
(i)
coordinates oj of camera i using equation (1)
(i)
(o)
oj = Ri
(o)
(o)
· (oj − ci ).
described according to equation (3).
(b)
(b)
(b)
T (b)
(i)
· oj .
T (b)
(o)
· Ri
(o)
(o)
· (oj − ci )
:= ci(b) + r · v(b)
j,i
(3)
with
(b)
T (b)
vj,i = Ri
in camera
(o)
· Ri
(o)
(o)
(b)
(b)
· (oj − ci ) = oj,i − ci .
(4)
Given the scale ratio r, we can recover the full object motion
trajectory computing equation (4) for each virtual camera
(b)
pair. We use oj,i of all cameras and object points as object
motion trajectory representation. The ambiguity mentioned
in section 1 is expressed by the unknown scale ratio r.
(1)
The background SfM result sf m(b) contains the camera
(b)
(b)
center ci and the corresponding rotation Ri , which provide pose information of the camera with respect to the reconstructed background. Note, that the camera coordinate
systems of virtual cameras in sf m(o) and sf m(b) are equiv(b)
(b)
alent. We use ci and Ri to transform object points to the
background coordinate system using equation (2)
oj,i = ci + Ri
(b)
oj,i = ci + r · Ri
2.2. Terrain Ground Approximation
Further camera or object motion constraints are required
to determine the scale ratio r introduced in equation (4).
In contrast to previous work [16, 28, 17, 13, 23, 3] we assume that the object category of interest moves on top of
the terrain. We exploit semantic segmentation techniques
to estimate an approximation of the ground surface of the
scene. We apply the ConvNet presented in [21] to determine ground categories like street or grass for all input images on pixel level. We consider only stable background
points, i.e. 3D points that are observed at least four times.
We determine for each 3D point a ground or non-ground
label by accumulating the semantic labels of corresponding
keypoint measurement pixel positions. This allows us to determine a subset of background points, which represent the
ground of the scene. We approximate the ground surface
locally using plane representations. For each frame i we
(2)
In general, the scale ratio of object and background reconstruction does not match due to the scale ambiguity of
SfM reconstructions [8]. We tackle this problem by treating the scale of the background as reference scale and by
introducing a scale ratio factor r to adjust the scale of object point coordinates. The overall transformation of object
(o)
points given in object coordinates oj to object points in
(b)
the background coordinate frame system oj,i of camera i is
3
Equation (8) allows us to determine the scale ratio r
between object and background reconstruction using the
extrinsic parameters of two cameras and corresponding
ground approximations.
use corresponding estimated camera parameters and object
point observations to determine a set of ground points Pi
close to the object. We build a kd-tree containing all ground
measurement positions of the current frame. For each object point observation, we determine the numb closest background measurements. In our experiments, we set numb to
50. Let cardi be the cardinality of Pi . While cardi is less
than numb , we add the next background observation of each
point measurement. This results in an equal distribution of
local ground points around the vehicle. We apply RANSAC
[6] to compute a local approximation of the ground surface
using Pi . Each plane is defined by a corresponding normal
vector ni and an arbitrary point pi lying on the plane.
2.3.2
The accuracy of the estimated scale ratio r in equation (8)
is subject to the condition of the parameters of the particular view pair. For instance, if the numerator or denominator is close to zero, small errors in the camera poses or
ground approximations may result in negative scale ratios.
In addition, wrongly estimated local plane normal vectors
may disturb camera-plane distances. We tackle these problems by combining two different view pair rankings. The
first ranking uses for each view pair the difference of the
camera-plane distances, i.e. the numerator in equation (8).
The second ranking reflects the quality of the local ground
approximation w.r.t. the object reconstruction. For a view
pair with well reconstructed local planes the variance of the
corresponding scale ratios is small. This allows for the determination of ill conditioned view pairs. The second ranking uses the scale ratio difference to order the view pairs.
We sort the view pairs by weighting both ranks equally. Let
vp denote the view pair with the lowest overall rank. The final scale ratio is determined by using a least squares method
w.r.t. all equations of vp.
2.3. Scale Estimation using Constant Distance Constraints
In section 2.3, we exploit priors of object motion to improve the robustness of the reconstructed object trajectory.
We assume that the object of interest moves on a locally
planar surface. In this case the distance of each object point
(b)
oj,i to the ground is constant for all cameras i. The reconstructed trajectory shows this property only for the true
scale ratio and non-degenerated camera motion. For example, a degenerate case occurs when the camera moves exactly parallel to a planar object motion. For a more detailed
discussion of degenerated camera motions see [16].
2.3.1
Scale Ratio Estimation using a Single View Pair
We use the term view to denote cameras and corresponding local ground planes. The signed distance of an object
(b)
point oj,i to the ground plane can be computed according
to equation (5)
(b)
dj,i = ni · (oj,i − pi ),
3. Virtual Object Motion Trajectory Dataset
To quantitatively evaluate the quality of the reconstructed object motion trajectory we require accurate object
and environment models as well as object and camera poses
at each time step. The simultaneous capturing of corresponding ground truth data with sufficient quality is difficult
to achieve. For example, one could capture the environment
geometry with LIDAR sensors and the camera / object pose
with an additional system. However, the registration and
synchronization of all these different modalities is a complex and cumbersome process. The result will contain noise
and other artifacts like drift. To tackle these issues we exploit virtual models. Previously published virtually generated and virtually augmented datasets, like [18, 19, 7, 25],
provide data for different application domains and do not include three-dimensional ground truth information. We build
a virtual world including an urban environment, animated
vehicles as well as predefined vehicle and camera motion
trajectories. This allows us to compute spatial and temporal
error free ground truth data. We exploit procedural generation of textures to avoid artificial repetitions. Thus, our
dataset is suitable for evaluating SfM algorithms.
(5)
where pi is a point on the local ground plane and ni is the
corresponding normal vector. If the object moves on top of
the approximated terrain ground the distance dj,i should be
independent of a specific camera i. We substitute dj,i with
dj in equation (5). This allows us to combine equation (5)
of the same point and different cameras.
(b)
(b)
ni · (oj,i − pi ) = ni0 · (oj,i0 − pi0 ).
(6)
Substituting equation (3) in equation (6) results in (7)
(b)
(b)
(b)
(b)
ni · (ci + r · vj,i − pi ) = ni0 · (ci0 + r · vj,i0 − pi0 ) (7)
Solving equation (7) for r yields equation (8)
(b)
r=
(b)
ni0 · (ci0 − pi0 ) − ni · (ci − pi )
(b)
(b)
(ni · vj,i − ni0 · vj,i0 )
.
Scale Ratio Estimation using View Pair Ranking
(8)
4
(a) Environment Model from (b) Environment Rendered from (c) Car Model with Motion Path
a Bird’s Eye Perspective (in a Bird’s Eye Perspective (Ren- in Street Scene (in Blender)
Blender)
dered)
(d) Rendered Street Scene
Figure 2: Example Scenes from the Virtual Object Trajectory Dataset.
(a) Input Frame 0
(b) Input Frame 100
(c) Input Frame 200
(d) Reconstructed
(Top View)
Trajectory
Figure 3: Car Trajectory Reconstruction using 250 frames with a resolution of 1920 x 1080 pixels captured by a DJI drone.
3.1. Virtual World
quences cover a high variety of object and camera poses.
The object trajectories reflect common vehicle motions include vehicle acceleration, different curve types and motion
on changing slopes. We use the path-tracing render engine
Cycles [1] to achieve photo realistic rendering results. We
observed that the removal of artificial path-tracing artifacts
using denoising is crucial to avoid degenerated SfM reconstructions.
The dataset includes 6D object and camera poses for each
frame as well as ground truth meshes of corresponding vehicle models. In contrast to measured ground truth data, virtual ground truth data is free of noise and shows no spatial
registration or temporal synchronization inaccuracies. The
dataset contains semantic segmentations of objects, ground
and background to separate the reconstruction task from
specific semantic segmentation and tracking approaches. In
addition to the virtual data, the dataset also includes the
computed reconstruction results. We will make our evaluation scripts publicly available to foster future analysis of
object trajectory estimation.
We used Blender [1] to create a virtual world consisting of a city surrounded by a countryside. We exploit procedural generation to compute textures of large surfaces,
like streets and sidewalks, to avoid degenerated Structure
from Motion results caused by artificial texture repetitions.
The virtual world includes different assets like trees, traffic lights, streetlights, phone booths, bus stops and benches.
We collected a set of publicly available vehicle assets to
populate the scenes. We used skeletal animation, also referred to as rigging, for vehicle animation. This includes
wheel rotation and steering w.r.t. the motion trajectory as
well as consistent vehicle placement on uneven ground surfaces. The animation of wheels is important to avoid unrealistic wheel point triangulations. We adjusted the scale of
vehicles and virtual environment using Blender’s unit system. This allows us to set the virtual space in relation to the
real world. The extent of the generated virtual world corresponds to one square kilometer. We exploit environment
mapping to achieve realistic illumination. With Blender’s
built-in tools, we defined a set of camera and object motion
trajectories. This allows us to determine the exact 3D pose
of cameras and vehicles at each time step.
4. Experiments and Evaluation
We show qualitative results and quantitative evaluations
using real drone footage and virtual generated drone imagery, respectively. Fig. 3 shows the reconstruction of a car
motion trajectory using images captured by a DJI drone.
Fig. 4 shows an example of the virtual object trajectory
dataset. Fig. 4(j) and Fig. 4(i) show the object point cloud
transformed into the virtual world coordinate frame system.
3.2. Trajectory Dataset
We use the previously created virtual world to build a
new object trajectory dataset1 . The dataset consists of 35
sequences capturing five vehicles in different urban scenes.
Fig. 2 shows some example images. The virtual video se5
(a) Ground Truth Object Path
(b) Object Model in Blender
(c) Rendered Scene
(d) Object Segmentation
(e) Background Segmentation
(f) Ground Segmentation
(g) Object Reconstruction
(h) Background Reconstruction
(i) Reconstructed Object Motion (j) Reconstructed Object Motion (k) Ground Truth Model at Dif- (l) Ground Truth Model at DifferTrajectory
Trajectory
ferent Frames Overlayed With ent Frames Overlayed With ReReconstruction
construction
Figure 4: Car trajectory reconstruction using 60 virtual frames with a resolution of 1920 x 1080 pixels.
truth coordinates. For each sequence we define the trajectory error as the average trajectory-point-mesh distance.
Fig. 5 shows for each sequence the trajectory error in meter. The average trajectory error per vehicle using the full
dataset is shown in table 1. Overall, we achieve a trajectory
error of 0.31 meter. The error of the object trajectory reconstructions reflects four types of computational inaccuracies:
deviations of camera poses w.r.t. object and background
point clouds, wrong triangulated object points as well as
scale ratio discrepancies. Fig. 6 compares the estimated
scale ratios of the proposed and the baseline method w.r.t.
the reference scale ratio. The reference scale ratio computation is described in section 4.4. The overall estimated scale
ratio deviation w.r.t. the reference scale per vehicle is shown
in table 1. The provided reference scale ratios are subject to
the registration described in section 4.3. Wrongly reconstructed background camera poses may influence the reference scale ratio. The van object reconstruction was only
partial successful on the sequences crossing, overtaking and
steep street. The SfM algorithm registered 19%, 60% and
98% of the images, respectively. The object reconstruction
of the smart model contained 74% of the crossing input object images. Here, we use the subset of registered images to
perform the evaluation. The camera and the object motion
in bumpy road simulate a sequence close to a degenerated
case, i.e. equation (8) is ill conditioned for all view pairs.
Fig. 4(k) and Fig. 4(l) show the overlay result of transformed points and the corresponding virtual ground truth
model. To segment the two-dimensional shape of objects of
interest we follow the approach presented in [2]. In contrast to [2], we used [14] and [10] to segment and track
visible objects, respectively. We considered the following SfM pipelines for object and background reconstructions: Colmap [20], OpenMVG [15], Theia [24] and VisualSfM [27]. Our object trajectory reconstruction pipeline
uses Colmap for object and OpenMVG for background reconstructions, since Colmap and OpenMVG created in our
experiments the most reliable object and background reconstructions.
4.1. Virtual Object Motion Trajectory Evaluation
We use the dataset presented in section 3 to quantitatively evaluate the proposed object motion trajectory reconstruction approach. The evaluation is based on object, background and ground segmentations included in the dataset.
This allows us to show results independent from the performance of specific instance segmentation and tracking approaches. We compare the proposed method with the baseline presented in section 4.2 using 35 sequences contained
in the dataset. We automatically register the reconstructed
object trajectory to the ground truth using the method described in section 4.3. We compute the shortest distance of
each object trajectory point to the object mesh in ground
6
Trajectory Error in meter
Lancer (Baseline)
Lancer (Ours)
2
Lincoln (B.)
Lincoln (O.)
Smart (B.)
Smart (O.)
Golf (B.)
Golf (O.)
Van (B.)
Van (O.)
1
0
Right Curves
Left Curves
Crossing
Overtaking
Bridge
Steep Street
Bumpy Road
Deviation w.r.t. Reference
Figure 5: Quantitative evaluation of the trajectory error in meter computed by the methods constant distance (ours) and
intersection (baseline). We evaluate seven different vehicle trajectories (right curves, left curves, crossing, overtaking, bridge,
steep street and bumpy road) and five different vehicle models (Lancer, Lincoln Navigator, Smart, Golf and Van). The
cropped values of the baseline are 6.3m, 4m and 4.8m.
Lancer (Baseline)
Lancer (Ours)
0.4
Lincoln (B.)
Lincoln (O.)
Smart (B.)
Smart (O.)
Golf (B.)
Golf (O.)
Van (B.)
Van (O.)
0.2
0
Right Curves
Left Curves
Crossing
Overtaking
Bridge
Steep Street
Bumpy Road
Figure 6: Quantitative evaluation of the scale ratio of the methods constant distance (ours) and intersection (baseline). The
provided values are the deviations w.r.t. reference scales.
4.2. Scale Estimation Baseline: Intersection Constraints
The intersection parameter ri corresponds to the point being
closest to the ground surface, i.e. a point at the bottom of the
object. Plugging ri in equation (3) for camera i places the
object point cloud on top of the ground surface. Thus, the
smallest ray-plane-intersection-parameter ri is a value close
to the real object-to-background-scale. Finally, we use the
median s of all image scale ratio factors as scale ratio factor
to reconstruct the trajectory as computed in equation (11)
The baseline is motivated by the fact, that some reconstructed points of the bottom of an object should lie in the
proximity of the ground surface of the environment. Consider for example the reconstructed 3D points corresponding to the wheels of a car. This approach works only if
at least one camera-point-ray of an arbitrary point in the
object point cloud intersects the ground surface. For each
(b)
camera we generate a set of vectors vj,i pointing from the
(b)
r = med({ri |i ∈ {1, . . . , nI }}),
where med denotes the median and nI the number of images. We do not consider invalid image scale ratios ri , i.e.
cameras which have no camera-object-point-rays intersecting the ground representation.
(b)
camera center ci towards each object point oj,i . For non(b)
orthogonal direction vectors vj,i and normal vectors ni
we compute the ray plane intersection parameter for each
camera-object-point-pair according to equation (9)
4.3. Registration of Background Reconstruction
and Virtual Environment
(b)
rj,i =
(pi − ci ) · ni
(b)
vj,i · ni
.
(9)
A common approach to register different coordinate systems is to exploit 3D-3D correspondences. To determine
points in the virtual environment corresponding to background reconstruction points one could create a set of rays
from each camera center to all visible reconstructed back-
We compute the smallest ray-plane-intersection parameter
for each image i.
ri = min({rj,i |j ∈ {1, . . . , |P (o) |}})
(11)
(10)
7
Scale Ratio
Est. Type
Intersection (Baseline)
Constant Distance (Ours)
Average Scale Ratio Deviation w.r.t. Reference
Lancer Lincoln Smart Golf
Van
0.05
0.07
0.01
0.08
0.13
0.04
0.04
0.04
0.06
0.08
Lancer
0.42
0.20
Average Trajectory Error
Lincoln Smart Golf
0.53
0.25
0.95
0.23
0.33
0.33
Van
1.68
0.47
Table 1: Summary of the conducted evaluation. The second column shows the deviation of the estimated scale ratio w.r.t to
the reference scale ratio per vehicle. The third column contains the average distances of the full dataset in meter. Overall, the
trajectory error of the baseline and our approach is 0.77m and 0.31m.
ground points. The corresponding environment points are
defined by the intersection of these rays with the mesh of
the virtual environment. Due to the complexity of our environment model this computation is in terms of memory and
computational effort quite expensive. Instead, we use the
algorithm presented in [26] to estimate a similarity transformation Ts between the cameras contained in the background reconstruction and the virtual cameras used to render the corresponding video sequence. This allows us to
perform 3D-3D-registrations of background reconstructions
and the virtual environment as well as to quantitatively evaluate the quality of the reconstructed object motion trajectory. We use the camera centers as input for [26] to compute an initial reconstruction-to-virtual-environment transformation. Depending on the shape of the camera trajectory
there may be multiple valid similarity transformations using camera center positions. In order to find the semantically correct solution we enhance the original point set
with camera pose information, i.e. we add points reflect(b)
T (b)
ing up vectors ui = Ri · (0, 1, 0)T and forward vectors
(b)
T (b)
f i = Ri · (0, 0, 1)T . For the reconstructed cameras, we
adjust the magnitude of these vectors using the scale computed during the initial similarity transformation. We add
(b)
(b)
the corresponding end points of up ci + m · ui as well
(b)
(b)
as viewing vectors ci + m · f i to the camera center point
set. Here, m denotes the corresponding magnitude.
plicitly contains information about the scale ratio r(bv) between background reconstruction and virtual environment.
To compute r(ov) we use corresponding pairs of object reconstruction and virtual cameras. We use the extrinsic parameters of the object reconstruction camera to transform
all 3D points in the object reconstruction into camera coordinates. Similarly, the object mesh with the pose of the
corresponding frame is transformed into the camera coordinates leveraging the extrinsic camera parameters of the
corresponding virtual camera. The ground truth pose and
shape of the object mesh is part of the dataset. In camera
coordinates we generate rays from the camera center (i.e.
(i)
the origin) to each 3D point oj in the object reconstruc-
4.4. Reference Scale Ratio Computation
ref
Equation (14) shows that r(ob)
depends on the quality of the
cameras in the background reconstruction and may slightly
differ from the true scale ratio.
(i)
tion. We determine the shortest intersection mj of each
ray with the object mesh in camera coordinates. This allows us to compute r(ov) according to equation (13)
(i)
r(ov) = med({med({
kmj k
(i)
koj k
|j ∈ {1, . . . , nJ }}
(13)
|i ∈ {1, . . . , nI }}).
ref
This allows us to compute the reference scale ratios r(ob)
using equation (14)
ref
r(ob)
= r(ov) · r(bv) −1 .
As explained in section 4.1 the presented average trajectory errors in Fig. 5 are subject to four different error
sources. To evaluate the quality of the scale ratio estimation between object and background reconstruction we provide corresponding reference scale ratios. The scale ratios
between object reconstruction, background reconstruction
and virtual environment are linked via the relation shown in
equation (12)
r(ov) = r(ob) · r(bv) ,
(12)
(14)
5. Conclusions
This paper presents a pipeline to reconstruct the threedimensional trajectory of moving objects using monocular
video data. We propose a novel constraint to estimate consistent object motion trajectories. In contrast to previous
approaches, the presented scale estimation constraint is robust to occlusion and extents naturally to stationary objects.
Due to the lack of 3D object motion trajectory benchmark
datasets with suitable ground truth data, we present a new
virtual dataset to quantitatively evaluate object motion trajectories. The dataset contains rendered videos of urban en-
where r(ov) and r(bv) are the scale ratios between object
and background reconstructions and virtual environment,
respectively. The scale ratios r(ob) in Fig. 6 express the
spatial relation of object and background reconstructions.
The similarity transformation Ts defined in section 4.3 im8
vironments and accurate ground truth data including semantic segmentations, object meshes as well as object and camera poses for each frame. The proposed algorithm achieves
an average reconstruction-to-ground-truth distance of 0.31
m evaluating 35 trajectories. In future work, we will analyze
breakdown points of the proposed pipeline in more detail.
This includes minimal object sizes, object occlusions and
degeneracy cases. In addition, we intend to integrate previously published scale estimation approaches. These will
serve together with the dataset1 as benchmark references for
future object motion trajectory reconstruction algorithms.
[14]
[15]
[16]
[17]
References
[1] Blender Online Community. Blender - a 3d modelling and
rendering package, 2016.
[2] S. Bullinger, C. Bodensteiner, and M. Arens. Instance flow
based online multiple object tracking. In IEEE International
Conference on Image Processing (ICIP), 2017.
[3] F. Chhaya, N. D. Reddy, S. Upadhyay, V. Chari, M. Z. Zia,
and K. M. Krishna. Monocular reconstruction of vehicles:
Combining SLAM with shape priors. In 2016 IEEE International Conference on Robotics and Automation, ICRA
2016, Stockholm, Sweden, May 16-21, 2016, pages 5758–
5765, 2016.
[4] J. Dai, K. He, and J. Sun. Instance-aware semantic segmentation via multi-task network cascades. In IEEE Conference
on Computer Vision and Pattern Recognition (CVPR), 2016.
[5] C. Farabet, C. Couprie, L. Najman, and Y. LeCun. Learning
hierarchical features for scene labeling. IEEE Transactions
on Pattern Analysis and Machine Intelligence, August 2013.
[6] M. A. Fischler and R. C. Bolles. Random sample consensus: A paradigm for model fitting with applications to image analysis and automated cartography. Commun. ACM,
24(6):381–395, June 1981.
[7] A. Gaidon, Q. Wang, Y. Cabon, and E. Vig. Virtual worlds as
proxy for multi-object tracking analysis. In IEEE Conference
on Computer Vision and Pattern Recognition (CVPR), 2016.
[8] R. I. Hartley and A. Zisserman. Multiple View Geometry
in Computer Vision. Cambridge University Press, ISBN:
0521540518, second edition, 2004.
[9] K. He, G. Gkioxari, P. Dollar, and R. Girshick. Mask r-cnn.
In The IEEE International Conference on Computer Vision
(ICCV), Oct 2017.
[10] E. Ilg, N. Mayer, T. Saikia, M. Keuper, A. Dosovitskiy, and
T. Brox. Flownet 2.0: Evolution of optical flow estimation
with deep networks. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2017.
[11] A. Kundu, K. M. Krishna, and C. V. Jawahar. Realtime multibody visual slam with a smoothly moving monocular camera. In ICCV, 2011.
[12] K. Lebeda, S. Hadfield, and R. Bowden. 2D or not 2D:
Bridging the gap between tracking and structure from motion. In Proceedings, Asian Conference on Computer Vision
(ACCV), 2014.
[13] B. Lee, K. Daniilidis, and D. D. Lee. Online self-supervised
monocular visual odometry for ground vehicles. In 2015
[18]
[19]
[20]
[21]
[22]
[23]
[24]
[25]
[26]
[27]
[28]
9
IEEE International Conference on Robotics and Automation
(ICRA), pages 5232–5238, May 2015.
Y. Li, H. Qi, J. Dai, X. Ji, and Y. Wei. Fully convolutional
instance-aware semantic segmentation. In The IEEE Conference on Computer Vision and Pattern Recognition (CVPR),
July 2017.
P. Moulon, P. Monasse, R. Marlet, and Others. Openmvg. an
open multiple view geometry library., 2013.
K. E. Ozden, K. Cornelis, L. V. Eycken, and L. J. V. Gool.
Reconstructing 3d trajectories of independently moving objects using generic constraints. Computer Vision and Image
Understanding, 96(3):453–471, 2004.
H. S. Park, T. Shiratori, I. Matthews, and Y. Sheikh. 3d trajectory reconstruction under perspective projection. International Journal of Computer Vision, 115(2):115–135, 2015.
S. R. Richter, V. Vineet, S. Roth, and V. Koltun. Playing
for data: Ground truth from computer games. In B. Leibe,
J. Matas, N. Sebe, and M. Welling, editors, European Conference on Computer Vision (ECCV), volume 9906 of LNCS,
pages 102–118. Springer International Publishing, 2016.
G. Ros, L. Sellart, J. Materzynska, D. Vazquez, and A. M.
Lopez. The synthia dataset: A large collection of synthetic
images for semantic segmentation of urban scenes. In 2016
IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pages 3234–3243, June 2016.
J. L. Schönberger and J.-M. Frahm. Structure-from-motion
revisited. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2016.
E. Shelhamer, J. Long, and T. Darrell. Fully convolutional
networks for semantic segmentation. IEEE Trans. Pattern
Anal. Mach. Intell., 39(4):640–651, 2017.
N. Snavely, S. M. Seitz, and R. Szeliski. Photo tourism:
Exploring photo collections in 3d. ACM Trans. Graph.,
25(3):835–846, July 2006.
S. Song, M. Chandraker, and C. C. Guest. High accuracy
monocular SFM and scale correction for autonomous driving. IEEE Trans. Pattern Anal. Mach. Intell., 38(4):730–743,
2016.
C. Sweeney. Theia Multiview Geometry Library: Tutorial &
Reference. University of California Santa Barbara., 2014.
A. Tsirikoglou, J. Kronander, M. Wrenninge, and J. Unger.
Procedural modeling and physically based rendering for synthetic data generation in automotive applications. CoRR,
abs/1710.06270, 2017.
S. Umeyama. Least-squares estimation of transformation parameters between two point patterns. IEEE Trans. Pattern
Anal. Mach. Intell., 13(4):376–380, 1991.
C. Wu. Visualsfm: A visual structure from motion system,
2011.
C. Yuan and G. G. Medioni. 3d reconstruction of background
and objects moving on ground plane viewed from a moving camera. In 2006 IEEE Computer Society Conference on
Computer Vision and Pattern Recognition (CVPR 2006), 1722 June 2006, New York, NY, USA, pages 2261–2268, 2006.
| 1cs.CV
|
Simultaneous Lightwave Information and Power
Transfer (SLIPT) for Indoor IoT Applications
Panagiotis D. Diamantoulakis∗ and George K. Karagiannidis∗
arXiv:1706.09624v1 [cs.IT] 29 Jun 2017
∗ Department
of Electrical and Computer Engineering, Aristotle University of Thessaloniki, GR-54124 Thessaloniki, Greece
e-mails: {padiaman, geokarag}@auth.gr
Abstract—We present the concept of Simultaneous Lightwave
Information and Power Transfer (SLIPT) for indoor Internet-ofThings (IoT) applications. Specifically, we propose novel and fundamental SLIPT strategies, which can be implemented through
Visible Light or Infrared communication systems, equipped
with a simple solar panel-based receiver. These strategies are
performed at the transmitter or at the receiver, or at both sides,
named Adjusting transmission, Adjusting reception and Coordinated adjustment of transmission and reception, correspondingly.
Furthermore, we deal with the fundamental trade-off between
harvested energy and quality-of-service (QoS), by maximizing the
harvested energy, while achieving the required user’s QoS. To this
end, two optimization problems are formulated and optimally
solved. Computer simulations validate the optimum solutions
and reveal that the proposed strategies considerably increase the
harvested energy, compared to SLIPT with fixed policies.
I. I NTRODUCTION
The era of Internet-of-Things (IoT) opens up the opportunity
for a number of promising applications in smart buildings,
health monitoring, and predictive maintenance. In the context of wireless access to IoT devices, radio frequency (RF)
technology is the main enabler. Furthermore, the exponential
growth in the data traffic puts tremendous pressure on the
existing global telecommunication networks and the expectations from the fifth generation (5G) of wireless networks.
However, it is remarkable that most of the data consumption/generation, which are related to IoT applications, occurs
in indoor environments [1]. Motivated by this, optical wireless
communication (OWC), such as visible light communications
(VLC) or infrared (IR), have been recognized as promising
alternative/complimentary technologies to RF, in order to give
access to IoT devices in indoor applications [1]. The data rates
reported for indoor VLC/IR networking are much higher than
those achieved by WiFi, especially when client and server
are closely located. Apart from the very high data rates [2],
the advantages of OWC technologies include: i) increase of
available bandwidth, ii) easy bandwidth reuse, iii) increase of
energy efficiency and considerable energy savings, iv) no RF
contamination, and v) free from RF interference. Moreover,
nowadays, light emitting diodes (LEDs) and photodetectors
(PDs) tend to be considerably cheaper than their RF counterparts, while the cost-efficiency is further improved due to the
potential to use the existing lighting infrastructure [3]–[5].
Due to the strong dependence of the IoT on wireless
access, their applications are constrained by the finite battery capacity of the involved devices [6]. Therefore, energy
harvesting (EH), which refers to harnessing energy from the
environment or other sources and converting to electrical
energy, is a critical part of the operation and maintain of the
IoT devices. Energy harvesting is regarded as a disruptive
technological paradigm to prolong the lifetime of energyconstrained wireless networks, which apart from offering a
promising solution for energy-sustainability of wireless nodes,
it also reduces the operating expenses (OPEX) [6]. However,
the main disadvantage of traditional EH methods is that they
rely on natural resources, such as solar and wind, which are
uncontrollable. For this reason, harvesting energy from radio
frequency signals, which also transfer information, seems to be
an interesting alternative. In order to enable simultaneous wireless information and power transfer and increase efficiency
of the utilized resources, two strategies have been proposed
named power-splitting, which is based on the division of the
signals power into two streams, and time-splitting, according
to which, during a portion of time, the received signal is used
solely for energy harvesting, instead of decoding [7].
Although RF based wireless power transfer is a well investigated topic in the last five years, optical wireless power
transfer (OWPT) is a new topic and only a few works have
been reported so far in the open literature. In the pioneering
work of Fakidis et. al. [8], the visible and infra-red parts
of the electromagnetic (EM) spectrum was used for OWPT,
through laser or LEDs at the transmitter and solar cells at
the receiver side. Also, in [9] and [10] energy harvesting
was performed by using the existing lighting fixtures for
indoor IoT applications. Regarding the simultaneous optical
wireless information and power transfer, in [11] the sum rate
maximization problem has been optimized in a downlink VLC
system with simultaneous wireless information and power
transfer. However, in this paper the utilized energy harvesting
model does not correspond to that of the solar panel, where
only the direct current DC component of the modulated light
can be used for energy harvesting, in contrast to the alternating
current AC component, which carries the information. The
separation of the DC and AC components was efficiently
achieved by the self-powered solar panel receiver proposed
in [12], [13], where it was proved that the use of the solar
panel for communication purposes does not limit its energy
harvesting capabilities. Thus, the utilization of the powersplitting in the useful recent work [14], where the received
photocurrent is splitted in two parts with each of them to
include both a DC and a AC part, reduces the EH efficiency.
Moreover, in [14] an oversimplified energy harvesting model
was used, assuming that the harvested energy is linearly proportional to the received optical power, while an optimization
of the splitting technique was not presented. Furthermore, in
the significant research works [15], [16], a dual-hop hybrid
VLC/RF communication system is considered, in order to
extend the coverage. In these papers, besides detecting the
information over the VLC link, the relay is also able to harvest
energy from the first-hop VLC link, by extracting the DC
component of the received optical signal. This energy can
be used to re-transmit the data to a mobile terminal over the
second-hop RF link. Also, in [15] the proposed hybrid system
was optimized, in terms of data rate maximization, while in
[16] the packet loss probability was evaluated.
In this paper, we present for first time a framework for
simultaneous optical wireless information and power transfer,
called from now on as Simultaneous Lightwave Information
and Power Transfer (SLIPT), which can be efficiently used
for indoor IoT applications through VLC or IR systems. More
specifically, we propose novel and fundamental strategies in
order to increase the feasibility and efficiency of SLIPT,
when a solar panel-based receiver is used. These strategies
are performed at the transmitter or at the receiver, or at
both sides, named Adjusting transmission, Adjusting reception,
and Coordinated adjustment of transmission and reception.
Regarding adjusting transmission two policies are proposed:
i) Time-splitting (TS), according to which the time frame is
separated in two distinct phases, where in each of them the
main focus is either on communication or energy transfer
and, ii) Time-splitting with DC bias optimization, which is
a generalization of TS. In contrast to RF-based wireless
powered networks, where the TS strategy and adjustment of
the related parameters takes place at the receiver’s side, TS in
SLIPT refers to the adaptation of specific parameters of the
transmitted signal. Regarding adjusting reception, the Fieldof-view (FoV) adjustment policy is proposed, while according
to the coordinated adjustment of transmission and reception
strategy, we propose the simultaneous optimization of the
former policies at both transmitter and receiver, in order to
maximize the harvested energy, while achieving the required
Quality-of-Service (QoS) (e.g. data rate and signal-to-noise
plus interference ratio (SINR)). Finally, the resulting two
optimization problems are formulated and optimally solved.
II. S YSTEM
AND
C HANNEL MODEL
We consider the downlink transmission of an OWC system,
consisting of one LED and a single user. We also assume
that the user is equipped with the functionality of energy
harvesting. The VLC/IR transmitter/receiver design is shown
in Fig. 1, while the VLC/IR downlink communication is
depicted in Fig. 2.
A. Optical Wireless Transmission
Let m(t) denote the modulated electrical signal that corresponds to the bit stream from the information source. A DC
bias B is added to m(t) to ensure that the resulting signal
Fig. 1. SLIPT transceiver design
Fig. 2. VLC/IR downlink communication
is non-negative, before being used to modulate the optical
intensity of the LED and regulate the LED in the proper
operation mode. The transmitted optical signal from the LED
is [15]
Pt (t) = PLED [B + m(t)],
(1)
where PLED is the LED power. The electrical signal varies
around the DC bias B ∈ [IL , IH ] with peak amplitude A,
where IL is the minimum and IH is the maximum input bias
currents, correspondigly. In order to avoid clipping distortion
by the nonlinearity of the LED, by restraining the input
electrical signal to the LED within the linear region of the
LED operation, the following limitation is induced
A ≤ min(B − IL , IH − B),
(2)
where min(z, y) denotes the minimum between z and y.
B. Channel Model
The channel power gain is given by [17]–[19]
h=
Lr
R0 (ϕ)Ts (ψ)g(ψ) cos(ψ),
d2
(3)
where Lr is the physical area of the photo-detector, d is the
transmission distance from the LED to the illuminated surface
of the photo-detector, Ts (ψ) is the gain of the optical filter
and g(ψ) represents the gain of the optical concentrator, given
by [17], [19]
(
ρ2
, 0 ≤ ψ ≤ Ψfov ,
2 (Ψ
sin
fov )
(4)
g(ψ) =
0, ψ > Ψfov .
is due to the dedicated LED, while I2 is due to different light
sources, e.g. neighboring LEDs. Also, Voc is
IDC
Voc = Vt ln(1 +
),
(12)
I0
where Vt is the thermal voltage and I0 is the dark saturation
current of the PD. Moreover, f is the fill factor, defined as the
ratio of the maximum power from the solar cell to the product
of the open-circuit voltage Voc and Isc ,
with ρ and Ψfov being the refractive index and FOV, respectively. Also in (3), R0 (ϕ) is the Lambertian radiant intensity
of the LED, given by
III. SLIPT S TRATEGIES
In this section we propose fundamental SLIPT strategies
for use in VLC/IR communication systems. These strategies
are performed either at the transmitter or at the receiver, or at
both sides: Adjusting transmission, Adjusting reception, and
Coordinated adjustment of transmission and reception.
ξ+1
cosξ ϕ,
(5)
2π
where ϕ is the irradiance angle, ψ is the incidence angle, and
R0 (ϕ) =
ξ=−
1
,
log2 cos(Φ1/2 )
(6)
with Φ1/2 being the semi-angle at half luminance.
C. Received Electrical SINR
The electrical current ir (t) at the output of the PD can be
written as
ir = η(hPt (t) + Po ) + n(t) = IDC (t) + i(t) + n(t),
(7)
where η is the photo-detector responsivity in A/W, Po is
the received optical signal from other sources, e.g. other
neighboring LEDs, IDC is the DC component, i(t) is the
AC component, and n(t) is the additive white Gaussian noise
(AWGN), which is created from background shot noise and
thermal noise.
The AC component i(t) is composed of two terms, i.e.
i(t) = i1 (t) + i2 (t), where
i1 (t) = ηhPLED m(t)
(8)
is due to the dedicated LED, and i2 (t) is due to other
interfering sources. Thus, the received SINR can be written
as
(ηhPLED A)2
,
(9)
γ=
PI + σ 2
where σ 2 is the noise power and PI is the electrical power of
the received interference.
D. Energy Harvesting Model
As it has already been mentioned the photocurrent consistes
of both the DC and AC signals. In order to perform energy
harvesting, the DC component is blocked by a capacitor
and passes through the energy harvesting branch [12]. The
harvested energy is given by [20]
E = f IDC Voc ,
(10)
with f being the fill factor [20] and IDC = I1 + I2 being the
DC component of the output current, where
I1 = ηhn PLED B
(11)
A. Adjusting Transmission
Next, we introduced two policies for the adjusting transmission strategy, named Time-splitting and Time-splitting with
DC Bias Optimization.
1) Time-splitting: According to the Time-splitting policy
the received optical signal is used for a portion of time solely
for energy harvesting, instead of decoding. During this period
of time the LED transmits by using the maximum DC bias,
in order to maximize the harvested energy by the receiver.
Thus, assuming time frames of unitary duration, there are the
following two distinct phases during a time frame:
Phase 1: The AC component of the received signal is
used for information decoding and the DC component for
energy harvesting. Let A1 and B1 ∈ [IL , IH ] denote the
peak amplitude of m(t) and DC bias, respectively. During
Phase 1, the aim is to maximize the received SINR. Since
SINR is an increasing function with respect to A1 , then A1
takes its maximum value, which, considering (2) is given by
L
L
and similarly, B1 = IH +I
. The duration of
A1 = IH −I
2
2
this phase is denoted by 0 ≤ T ≤ 1, which can be optimized
according to the QoS requirements. For a specific value of T ,
the amount of harvested energy is given by
IH + IL
[1]
+ I2 )Vt
ET S = f T (ηhPLED
2
(13)
IH +IL
ηhPLED 2 + I2
).
× ln(1 +
I0
Phase 2: In the time period 1−T , the aim is to maximize the
harvested energy, which is an increasing function with respect
to B. Thus, during Phase 2 the transmitter eliminates the AC
part and maximizes the DC bias, i.e., A = 0 and B = IH ,
where A2 and B2 ∈ [IL , IH ] denote the values of A and B,
respectively. Thus, the amount of harvested energy during this
phase, is given by
[2]
ET S =f (1 − T )(ηhPLED IH + I2 )Vt ×
(14)
ηhPLED IH + I2
ln(1 +
).
I0
Considering both phases, the total harvested energy is given
by
[1]
[2]
ET S = ET S + ET S .
(15)
2) Time-Splitting with DC Bias Optimization: This policy is
a generalization of Time-splitting. During Phase 1, the DC bias
is optimized in order to increase the harvested energy, while
it simultaneously enables information transfer, i.e., A1 > 0.
In this case, the total harvested energy is given by
ETSBO =f T (ηhPLED B1 + I2 )Vt ×
ηhPLED B1 + I2
[2]
) + ET S ,
ln(1 +
I0
(16)
where B1 is the DC bias during Phase 1.
B. Adjusting Reception
We propose the Adjustment of the field of view (FOV) policy
for the adjusting reception strategy, in order to balance the
trade-off between harvested energy and SINR. Controlling
FOV is particularly important especially when, except for
the used VLC/IR LED, there are extra light sources in the
serving area [21], e.g. neighboring LEDs that serve other
users. For the practical and efficient implementation of this
policy, electrically controllable liquid crystal (LC) lenses is a
promising technology [22].
When the aim is to maximize the SINR, the FOV is tuned
up to receive the beam of the dedicated LED only (if possible),
in order to reduce the beam overlapping. This is achieved by
tuning the FOV to the narrowest setting, that allows reception
only from that LED. On the other hand, when the aim is to
achieve a balance between SINR and harvested energy, a wider
FOV setting could be selected.
For the sake of practicality, we assume that the VLC/IR re[1]
[M]
ceiver has discrete FOV settings, i.e. Ψfov ∈ {Ψfov , .., Ψfov }.
Also, note that except for h, both PI and I2 are also discrete
functions of Ψfov , i.e., PI = PI (Ψfov ) and I2 = I2 (Ψfov ).
IV. SLIPT O PTIMIZATION
SLIPT induces an interesting trade-off between harvested
energy and QoS. In this section, we aim to balance this tradeoff by maximizing the harvested energy, while achieving the
required user QoS. In the present work, we focus on the
coordinated adjustment of transmission and reception strategy,
which can be considered as a generalization of the other
SLIPT strategies. The following optimization problems can
be formulated, based on the two techniques presented in
subsection III-C.
Regarding the QoS, two different criteria are taken into
account, namely SINR and information rate. Note that these
two criteria are not equivalent to each other, when either
of the two techniques is used, due to the time-splitting.
More specifically, since only Phase 1 is used for information
transmission (the duration of which is T ), the lower bound of
the capacity is given by [23]
e
γ .
(17)
R = T log2 1 +
2π
A. Time-Splitting with Tunable FOV
The corresponding optimization problem can be expressed
as
max
T,Ψfov,1
s.t.
EhTS
C1
C2
C3
C4
: R ≥ Rth ,
: γ ≥ γth ,
: 0 ≤ T ≤ 1,
[1]
[M]
: Ψfov,1 ∈ {Ψfov , .., Ψfov },
(18)
where Rth and γth denote the information rate SINR and
threshold, respectively.
Theorem 1: The optimal value of T in (18) is given by
Rth
,
T∗ =
(19)
e(ηhPLED (IH −IL ))2
log2 1 + 8π(PI (Ψ∗ )+σ2 )
fov,1
C. Coordinated Transmission and Reception Adjustment
Considering (9), (15), and (16), it is revealed that both
SINR and harvested energy -apart from A1 , B1 and T also depend on the selection of Ψfov , despite the utilized
adjusting transmission technique. This dependence motivates
the coordinated transmission and reception adjustment, i.e. the
coordination between the strategy III-A1 or III-A2 and III-B,
which results in the following two policies, i.e.
•
•
Policy 1: Time-splitting with tunable FOV (III-A1 and
III-B)
Policy 2: Time-splitting with DC bias optimization and
tunable FOV (III-A2 and III-B)
Note that in both policies, during Phase 2, where the aim
is to maximize the harvested energy, the FOV setting that
[2]
maximizes ET S should be used. This is not necessarily the
widest setting, because although it increases the received
beams (if there are neighboring LEDs), it reduces g(ψ). On
the other hand, the preferable FOV setting during phase 1,
denoted by Ψfov,1 , cannot be straightforwardly determined,
since it also depends on the required QoS.
where (·)∗ denotes optimality.
Proof: The optimization problem (18) is a combinatorial
one. In order to find the optimal solution, all possible values
of Ψfov,1 have to be checked before selecting the value that
maximizes the harvested energy, EhTS , while satisfying the
constraints C1 , C2 , and C3 . For a specific specific value of
Ψfov,1 , if
L 2
(ηhPLED IH −I
)
2
< γth ,
(20)
PI (Ψfov,1 ) + σ 2
then the optimization problem is infeasible, since C2 is not
satisfied. Also, due to constraint C1 , the following limitation
is induced for T ,
Rth
.
(21)
T ≥
I −I
e(ηhPLED H 2 L )2
log2 1 + 2π(PI (Ψfov,1 )+σ2 )
Moreover, the harvested energy is decreasing with respect to
T . Thus, the optimal value of T is given by (19) and the proof
is completed.
Note that if T ∗ > 1, the optimization problem in (18) is
infeasible, due to C3 .
B. Time-Splitting with DC Bias Optimization and tunable FOV
The corresponding optimization problem can be formulated
as
Proof: Considering Proposition 1 and for a specific
value of Ψfov,1 the optimization problem in (22) can be reformulated as
EhTSBO
max
B1 ,A1 ,T
C1
C3
C4
C5
C7
s.t.
: R ≥ Rth , C2 : γ ≥ γth ,
: A1 ≤ min(B1 − IL , Ih − B1 ),
: 0 ≤ T ≤ 1,
: A1 ≥ 0, C6 : IL ≤ B1 ≤ IH ,
[1]
[M]
: Ψfov,1 ∈ {Ψfov , .., Ψfov }.
(22)
Proposition
1: The optimal value of B in (22) belongs in
L
the range IH +I
, IH .
2
Proof: The constraint C3 can be rewritten as
C3a : A1 ≤ B1 − IL , C3b : A1 ≤ IH − B1 .
The optimal value Ψfov,1 is calculated similarly to the
solution of (18). Regarding the rest optimization variables of
(22) they are optimized according to the following theorem:
Theorem 2: For a specific value of Ψfov,1 , the optimal value
of T is given by
T ∗ = argmax ẼhTSBO
(24)
K1 ≤T ≤K2
with ẼhTSBO being solely a function of T and given by (16),
by replacing A1 and B1 by
s
Rth
2π(PI (Ψfov,1 ) + σ 2 )(2 T − 1)
1
, (25)
A1 =
nhPLED
e
and
B1 = IH − A1 ,
(26)
respectively. Also,
Rth
log2 1 +
K2 = min
e(ηh1 PLED (IH −IL ))2
2
8π (PI (Ψ∗
fov,1 )+σ )
log2
Rth
1+
!
eγth , 1 .
2π
(29)
The optimization problem in (29) still cannot be easily
solved in its current form, since the objective function as well
as the constraints C1 and C2 are not concave. However, it
can be solved with low complexity by using the following
reformulation.
First, the inequalities in C1 and C3 are replaced by equalities. Then, A1 and B1 are given by (25) and (26), respectively.
By substituting T1 and B1 by (25) and (26), C1 , C3 , and C3
of (29) vanish, and the optimization problem is rewritten as
(23)
For a specific value of B1 , only one of the constraints C3a and
C3b is activated. Now, let assume that the optimal solution is
L
, for which all the constraints are satisfied. In
B1∗ < IH +I
2
L
this case, C3a is activated. However, by setting B1 = IH +I
2
the objective function is increased, while the constraints are
still satisfied. Thus, we can infer that that B1∗ is not optimal.
Consequently, Proposition 1 has been proved by contradiction.
K1 =
C1 : R ≥ Rth , C2 : γ ≥ γth ,
C3 : A1 + B1 ≤ IH , C4 : 0 ≤ T ≤ 1,
L
.
C5 : A1 ≥ 0, C6 : B1 ≥ IH +I
2
s.t.
EhTSBO
max
B1 ,A1 ,T,Ψfov,1
max
B1 ,A,T1 ∀n
s.t.
ẼhTSBO
C2 : T ≤
Rth
eγth ,
log2 (1+ 2π
)
C4 : 0 ≤ T ≤ 1,
C6 : T ≥
log2 1+
Rth
e(ηh1 PLED (IH −IL ))2
8π (PI +σ2 )
(30)
,
which is equivalent to (24), and, thus, the proof is completed.
V. S IMULATIONS
AND DISCUSSION
We assume the downlink VLC/IR system of Fig. 2, where
the user is located in a distance d = 1.5 m from the LED,
ψ = 0, and the transmitter plane is parallel to the receiver one,
i.e., ϕ = ψ. In the same room there are N other LEDs, which
simultaneously use the same frequency band. The distance
between each of them and from the dedicated LED is D = 1.5
m. We also assume f = 0.75, PLED = 20 W/A, Φ1/2 = 60
deg, σ 2 = 10−15 A2 , Lr = 0.04 m2 , η = 0.4 A/W, I0 = 10−9
A, IL = 0 A, IH = 12 mA [15], Ts = 1, ρ = 1.5, γth = 10
dB, and two settings for the FOV, i.e., Ψfov ∈ {30, 50} deg,
are considered.
Regarding the neighboring LEDs, we assume that the DC
bias and the peak amplitude are given by A′n = Bn′ = 6 mA,
∀n ∈ {1, ..., N }, while the rest parameters are equal to those
of the dedicated LED. Furthermore, the channel between them
and the user’s receiver, denoted by hn is modeled according
to (3), using the corresponding parameters. Thus, when the
widest FOV setting is selected, PI and I2 are given by
(27)
PI =
N
X
(ηhn PLED A′n )2
(31)
n=1
and
(28)
Finally, the optimal values of A1 and B1 are given by (25) and
(26), by replacing Ψfov,1 and T by Ψ∗fov,1 and T ∗ , respectively.
I2 =
N
X
ηhn PLED Bn′ ,
(32)
n=1
otherwise their values are zero.
The performance of both optimized policies of Section III-C
are compared for N = 1, while they are also presented against
energy increases with the increase of LEDs.
2.2
Policy 2
2.0
R EFERENCES
Policy 1
A =B =6 mA, T =1,
A =B =6 mA, T =1,
Harvested Energy (mW)
1.8
1.6
1
1
1
fov,1
1
1
1
fov,1
=30 deg
=50 deg
1.4
1.2
1.0
0.8
0.6
0.4
Infeasible for these values of
R
th
0.2
2
4
6
8
R
th
10
12
14
(bps/Hz)
Fig. 3. Harvested energy vs Rth for N = 1.
2.2
Policy 2
Policy 1
2.0
A =B =6 mA, T =1,
Harvested Energy (mW)
1.8
1
1
1
fov,1
=30 deg
1.6
1.4
1.2
1.0
0.8
0.6
0.4
0.2
0.0
2
4
6
8
10
12
14
16
18
20
N
Fig. 4. Harvested energy vs N for Rth = 7 bps/Hz.
the case of fixed A1 , B1 , T1 , and Ψfov,1 , which is considered
as the baseline policy. More specifically, in Fig. 3 the harvested
energy is plotted against the rate threshold. As it is observed,
both policies significantly outperform the baseline for both
values of Ψfov,1 . Regarding the baseline, the value Ψfov,1 = 50
deg reduces the harvested energy compared to Ψfov,1 = 30
deg, because g(ψ) decreases and thus, cancels the benefit
of receiving the beam of the neighboring LED. Also, the
baseline policy with Ψfov,1 = 50 deg is infeasible for medium
and high values of Rth , because the rate threshold cannot be
reached, due to the received interference. Interestingly, Policy
2 outperforms Policy 1, especially for the high region of
Rth , which is due to the extra degrees of freedom. Similar
conclusions can be obtained by Fig. 4, where the harvested
energy is plotted against the number of neighboring LEDS.
For this specific setup, the baseline with Ψfov,1 = 50 deg is not
feasible, and, thus, it is omitted. We notice here that for a small
number of neighboring LEDs, the harvested energy remains
constant, since the receiver prefers the smallest FOV setting.
However, as the number of neighboring LEDs increases, the
receiver prefers the widest FOV setting and the harvested
[1] M. Ayyash, H. Elgala, A. Khreishah, V. Jungnickel, T. Little, S. Shao,
M. Rahaim, D. Schulz, J. Hilt, and R. Freund, “Coexistence of WiFi
and LiFi toward 5G: Concepts, Opportunities, and Challenges,” IEEE
Commun. Mag., vol. 54, no. 2, pp. 64–71, Feb. 2016.
[2] M. S. A. Mossaad, S. Hranilovic, and L. Lampe, “Visible Light Communications Using OFDM and Multiple LEDs,” IEEE Trans. Commun.,
vol. 63, no. 11, pp. 4304–4313, Nov. 2015.
[3] M. Kavehrad, “Sustainable Energy-Efficient Wireless Applications Using Light,” IEEE Commun. Mag., vol. 48, no. 12, pp. 66–73, Dec. 2010.
[4] S. Arnon, Ed., Visible Light Communication. Cambridge University
Press, 2015.
[5] D. Bykhovsky and S. Arnon, “Multiple Access Resource Allocation in
Visible Light Communication Systems,” J. Lightw. Technol., vol. 32,
no. 8, pp. 1594–1600, Apr. 2014.
[6] S. Sudevalayam and P. Kulkarni, “Energy Harvesting Sensor Nodes:
Survey and Implications,” IEEE Commun. Surveys Tuts., vol. 13, no. 3,
pp. 443–461, Jul. 2010.
[7] S. Nikoletseas, Y. Yang, and A. Georgiadis, Eds., Wireless Power
Transfer Algorithms, Technologies and Applications in Ad Hoc Communication Networks. Springer, 2016.
[8] J. Fakidis, S. Videv, S. Kucera, H. Claussen, and H. Haas, “Indoor
Optical Wireless Power Transfer to Small Cells at Nighttime,” J. Lightw.
Technol., vol. 34, no. 13, pp. 3236–3258, Jul. 2016.
[9] C. Carvalho and N. Paulino, “On the Feasibility of Indoor Light
Energy Harvesting for Wireless Sensor Networks,” Procedia Technology,
vol. 17, pp. 343–350, 2014.
[10] A. Nasiri, S. A. Zabalawi, and G. Mandic, “Indoor Power Harvesting
using Photovoltaic Cells for Low-Power Applications,” IEEE Trans. Ind.
Electron., vol. 56, no. 11, pp. 4502–4509, Nov. 2009.
[11] Y. Li, N. Huang, J. Wang, Z. Yang, and W. Xu, “Sum Rate Maximization
for VLC Systems with Simultaneous Wireless Information and Power
Transfer,” IEEE Photon. Technol. Lett., vol. 29, no. 6, pp. 531–534,
Mar. 2017.
[12] Z. Wang, D. Tsonev, S. Videv, and H. Haas, “Towards Self-Powered
Solar Panel Receiver for Optical Wireless Communication,” in Proc.
IEEE International Conference on Communications (ICC), Jun. 2014,
pp. 3348–3353.
[13] ——, “On the Design of a Solar-Panel Receiver for Optical Wireless
Communications with Simultaneous Energy Harvesting,” IEEE J. Sel.
Areas Commun., vol. 33, no. 8, pp. 1612–1623, Aug. 2015.
[14] H. Sandalidis, A. Vavoulas, T. Tsiftsis, and N. Vaiopoulos, “Illumination,
Data Transmission and Energy Harvesting: The Threefold Advantage of
VLC,” 2017.
[15] T. Rakia, H. C. Yang, F. Gebali, and M. S. Alouini, “Optimal Design of
Dual-Hop VLC/RF Communication System with Energy Harvesting,”
IEEE Comm. Lett., vol. 20, no. 10, pp. 1979–1982, Oct. 2016.
[16] ——, “Dual-Hop VLC/RF Transmission System with Energy Harvesting
Relay under Delay Constraint,” in Proc. IEEE Globecom Workshops,
Dec. 2016, pp. 1–6.
[17] T. Komine and M. Nakagawa, “Fundamental Analysis for Visible-Light
Communication System Using LED Lights,” IEEE Trans. Consum.
Electron., vol. 50, no. 1, pp. 100–107, Feb. 2004.
[18] H. Ma, L. Lampe, and S. Hranilovic, “Coordinated Broadcasting for
Multiuser Indoor Visible Light Communication Systems,” IEEE Trans.
Commun., vol. 63, no. 9, pp. 3313–3324, Sep. 2015.
[19] J. M. Kahn and J. R. Barry, “Wireless Infrared Communications,” Proc.
IEEE, vol. 85, no. 2, pp. 265–298, Feb. 1997.
[20] C. Li, W. Jia, Q. Tao, and M. Sun, “Solar Cell Phone Charger Performance in Indoor Environment,” in Proc. IEEE 37th Annual Northeast
Bioengineering Conference (NEBEC), 2011, pp. 1–2.
[21] A. Al-Ghamdi and J. Elmirghani, “Performance and Field of View Optimization of an Optical Wireless Pyramidal Fly-Eye Diversity Receiver,”
Journal of optical communications, vol. 23, no. 6, pp. 215–222, 2002.
[22] Y. S. Tsou, Y. H. Lin, and A. C. Wei, “Concentrating Photovoltaic
System using a Liquid Crystal Lens,” IEEE Photon. Technol. Lett.,
vol. 24, no. 24, pp. 2239–2242, Dec. 2012.
[23] J. B. Wang, Q. S. Hu, J. Wang, M. Chen, and J. Y. Wang, “Tight Bounds
on Channel Capacity for Dimmable Visible Light Communications,” J.
Lightw. Technol., vol. 31, no. 23, pp. 3771–3779, Dec. 2013.
| 7cs.IT
|
Logical Methods in Computer Science
Vol. 13(2:1)2017, pp. 1–57
www.lmcs-online.org
Submitted
Published
Jan. 15, 2016
Apr. 7, 2017
DYNAMIC CHOREOGRAPHIES: THEORY AND IMPLEMENTATION
MILA DALLA PREDA a , MAURIZIO GABBRIELLI b , SAVERIO GIALLORENZO c , IVAN LANESE d ,
AND JACOPO MAURO e
a
b,c,d
e
Department of Computer Science, University of Verona
e-mail address: [email protected]
Department of Computer Science and Engineering, University of Bologna/INRIA
e-mail address: {gabbri, sgiallor, lanese}@cs.unibo.it
Department of Informatics, University of Oslo
e-mail address: [email protected]
Abstract. Programming distributed applications free from communication deadlocks and
race conditions is complex. Preserving these properties when applications are updated at
runtime is even harder. We present a choreographic approach for programming updatable,
distributed applications. We define a choreography language, called Dynamic InteractionOriented Choreography (DIOC), that allows the programmer to specify, from a global
viewpoint, which parts of the application can be updated. At runtime, these parts may
be replaced by new DIOC fragments from outside the application. DIOC programs are
compiled, generating code for each participant in a process-level language called Dynamic
Process-Oriented Choreographies (DPOC). We prove that DPOC distributed applications
generated from DIOC specifications are deadlock free and race free and that these properties
hold also after any runtime update. We instantiate the theoretical model above into a
programming framework called Adaptable Interaction-Oriented Choreographies in Jolie
(AIOCJ) that comprises an integrated development environment, a compiler from an
extension of DIOCs to distributed Jolie programs, and a runtime environment to support
their execution.
1. Introduction
Programming distributed applications is an error-prone activity. Participants send and
receive messages but, if the application is badly programmed, they may get stuck waiting
for messages that never arrive (communication deadlock), or they may receive messages in
an unexpected order, depending on the speed of the other participants and of the network
(races).
Key words and phrases: Choreographies, Adaptable Systems, Deadlock Freedom.
Supported by the EU EIT Digital project SMAll .
d
Supported by the GNCS group of INdAM via project Logica, Automi e Giochi per Sistemi Auto-adattivi.
e
Supported by the EU project FP7-644298 HyVar: Scalable Hybrid Variability for Distributed, Evolving
Software Systems.
c
l
LOGICAL METHODS
IN COMPUTER SCIENCE
©
DOI:10.23638/LMCS-13(2:1)2017
CC
M. Dalla Preda, M. Gabbrielli, S. Giallorenzo, I. Lanese, and J. Mauro
Creative Commons
2
M. DALLA PREDA, M. GABBRIELLI, S. GIALLORENZO, I. LANESE, AND J. MAURO
Recently, language-based approaches have been proposed to tackle the complexity of
programming concurrent and distributed applications. These approaches provide high-level
primitives that avoid by construction some of the risks of concurrent programming. Some
renowned examples are the ownership/borrowing mechanisms of Rust [44] and the separate
keyword of SCOOP [41]. In these settings most of the work needed to ensure a correct
behaviour is done by the language compiler and runtime support. The use of these languages
requires a conceptual shift from traditional ones, but reduces times and costs of development,
testing, and maintenance by avoiding some of the most common programming errors.
We propose an approach based on choreographic programming [12, 13, 30, 47, 34] following
a similar philosophy. A choreography is a global description of a distributed application
expressed as the composition of the expected interactions between its components. Based
on such an abstraction, we present high-level primitives that avoid some of the main errors
linked to programming communication-centred concurrent and distributed applications that
can be updated at run time.
For an informal introduction of our approach, let us consider a simple application where
a Buyer asks the price of some product to a Seller.
priceReq : Buyer(prod) → Seller(order);
2 order price@Seller = getPrice(order);
3 offer : Seller(order price) → Buyer(prod price)
1
A unique choreographic program describes the behaviour of multiple participants, here
the Buyer and the Seller. The first line specifies that the Buyer sends, along channel
priceReq, the name of the desired product prod to the Seller, which stores it in its local
variable order. At Line 2, the Seller computes the price of the product with function
getPrice. Finally, at Line 3 the Seller sends the computed price to the Buyer on channel
offer . The Buyer stores the value in its local variable prod price.
Choreographic languages focus on describing message-based interactions between distributed participants. As shown by the example, the distinctive feature of choreographies is
that communications are atomic entities, i.e., not split into send and receive actions. This
makes impossible to write programs with common errors of concurrent and distributed applications like deadlocks or race conditions. However, a choreographic description is not directly
executable. Indeed, choreographies describe atomic interactions from a global point of view
whilst executable programs are written in lower level languages (like Java or C) that support
only local behaviours and communication/synchronisation primitives such as message send
and message receive. Hence, to run a choreographic description, we have to compile it into a
set of lower level programs. The correct compilation of choreographic descriptions is one of
the main challenges of choreographic languages, yet the ease of development and the strong
guarantees of deadlock and race freedom make it a worth endeavour.
In this work, we take this challenge one step further: we consider updatable distributed
applications whose code can change dynamically, i.e., while the application is running. In
particular, the applications we consider can integrate external code at runtime. Such a
feature, tricky in a sequential setting and even more in a distributed one, has countless
uses: to deal with emergency requirements, to cope with rules and requirements depending
on contextual properties or to improve and specialise the application to user preferences.
We propose a general mechanism to structure application updates. Inside applications, we
delimit blocks of code, called scopes, that may be dynamically replaced by new blocks of
DYNAMIC CHOREOGRAPHIES
3
code, called updates. Updates are loosely related to scopes: it is not necessary to know the
details of the behaviour of updates when writing scopes, and updates may be written while
applications are running.
To illustrate our approach, let us consider the previous example and let us suppose that
we would like to introduce new commercial offers at runtime, e.g., to provide a discount
on the computed prices. Since we want to be able to change how prices are computed, we
enclose Lines 2–3 of the example within a scope, as shown below.
priceReq : Buyer(prod) → Seller(order);
scope @Seller{
3
order price@Seller = getPrice(order);
4
offer : Seller(order price) → Buyer(prod price)
5 }
1
2
In essence, a scope is a delimiter that defines which part of the application can be updated.
Each scope identifies a coordinator of the update, i.e., the participant entitled to ensure that
either none of the participants updates, or they all apply the same update. In the example
above, the coordinator of the update is the Seller (Line 2).
Since now the code includes a scope, we can introduce runtime updates. Let us assume
that the Seller issued a fidelity card to some frequent customers and (s)he wants to update
the application to let Buyers insert their fidelity card to get a discount. The update in
Figure 1 answers this business need. At runtime, if the Seller (which is the coordinator of
the update) applies the update in Figure 1, the code of the update replaces the scope. When
this new code executes, the Buyer sends his/her card id to the Seller. If the card id is
valid, the Seller issues a 10% discount on the price of the selected good, otherwise it reports
the standard price to the Buyer.
We remark that expressing the behaviour described above using lower level languages
that lack a dedicated support for distributed runtime updates (e.g., Java, C, etc.) is extremely
error prone. For instance, in the example above, let us consider the case in which the Buyer
is updated first and it starts the execution whilst the Seller has not been updated yet. The
Buyer waits for a message from the Seller on channel cardReq, whilst the Seller sends a
message on channel offer . Thus, the application is deadlocked. Furthermore, in our setting
the available updates may change at any time, posing an additional challenge. To avoid
1
2
3
4
5
6
7
8
9
cardReq : Seller(null) → Buyer( );
card id@Buyer = getInput();
cardRes : Buyer(card id) → Seller(buyer id);
if isValid(buyer id)@Seller {
order price@Seller = getPrice(order) ∗ 0.9
} else {
order price@Seller = getPrice(order)
};
offer : Seller(order price) → Buyer(prod price)
Figure 1: Fidelity Card Update.
4
M. DALLA PREDA, M. GABBRIELLI, S. GIALLORENZO, I. LANESE, AND J. MAURO
errors, participants must select the same update and, since updates appear and disappear at
runtime, they must also be able to retrieve the same selected update.
Since at choreographic level updates are applied atomically to all the involved participants, these problems cannot arise if both the original application and the updates are
described as choreographies. However, to execute our choreographic specifications we need
to provide a correct compilation from choreographies to lower level, executable programs.
Such task is very challenging and, in particular, we need to make sure that our compilation
generates correct behaviours that avoid inconsistencies on updates.
Contributions. In this paper, we present a correctness-by-construction approach to solve the
problem of dynamic updates of distributed applications. We provide a general solution that
comprises:
• the definition of a Dynamic Interaction-Oriented Choreography language, called DIOC, to
program distributed applications and supporting runtime code update (§ 2);
• the definition of a Dynamic Process-Oriented Choreography language, called DPOC.
DPOCs are based on standard send and receive primitives but they are tailored to program
updatable systems. We introduce DPOCs to describe implementations corresponding to
DIOCs. (§ 3);
• the definition of a behaviour-preserving projection function to compile DIOCs into DPOCs
(§ 4);
• the proof of the correctness of the projection function (§ 7). Correctness is guaranteed
even in a scenario where the set of available updates dynamically changes, at any moment
and without notice;
• one instantiation of our theory into a development framework for adaptive distributed
applications called AIOCJ (§ 8). In AIOCJ updates are embodied into adaptation rules,
whose application is not purely non-deterministic (as in DIOCs), but depends on the
state of the system and of its environment. AIOCJ comprises an Integrated Development
Environment, a compiler from choreographies to executable programs, and a runtime
environment to support their execution and update.
This paper integrates and extends material from [18], which outlines the theoretical aspects,
and [19], which describes the AIOCJ framework. Main extensions include the full semantics
of DIOC and DPOC, detailed proofs and technical definitions, and a thorough description
of the example. Furthermore, both the presentation and the technical development have
been deeply revised and refined.
2. Dynamic Interaction-Oriented Choreographies
In this section we introduce the syntax of DIOCs, we illustrate the constructs of the DIOC
language with a comprehensive example, and we finally present the semantics of DIOCs.
2.1. DIOC Syntax. DIOCs rely on a set of Roles, ranged over by R, S, . . . , to identify the
participants in the choreography. We call them roles to highlight that they have a specific
duty in the choreography. Each role has its local state.
Roles exchange messages over public channels, also called operations, ranged over by o.
We denote with Expr the set of expressions, ranged over by e. We deliberately do not give a
formal definition of expressions and of their typing, since our results do not depend on it.
We only require that expressions include at least values, belonging to a set Val ranged over
DYNAMIC CHOREOGRAPHIES
5
by v, and variables, belonging to a set Var ranged over by x, y, . . . . We also assume a set of
boolean expressions ranged over by b.
The syntax of DIOC processes, ranged over by I, I 0 , . . ., is defined as follows:
I ::=
|
|
|
|
o : R(e) → S(x)
I; I 0
I|I 0
x@R = e
1
(interaction)
(sequence)
(parallel)
(assignment)
(inaction)
|
|
|
|
0
if b@R {I} else {I 0 }
while b@R {I}
scope @R {I}
(end)
(conditional)
(while)
(scope)
Interaction o : R(e) → S(x) means that role R sends a message on operation o to role S (we
require R 6= S). The sent value is obtained by evaluating expression e in the local state of R
and it is then stored in the local variable x of S. Processes I; I 0 and I|I 0 denote sequential
and parallel composition, respectively. Assignment x@R = e assigns the evaluation of
expression e in the local state of R to its local variable x. The empty process 1 defines
a DIOC that can only terminate. 0 represents a terminated DIOC. It is needed for the
definition of the operational semantics and it is not intended to be used by the programmer.
We call initial a DIOC process where 0 never occurs. The conditional if b@R {I} else {I 0 }
and the iteration while b@R {I} are guarded by the evaluation of the boolean expression
b in the local state of R.The construct scope @R {I} delimits a subterm I of the DIOC
process that may be updated in the future. In scope @R {I}, role R is the coordinator
of the update: it ensures that either none of the participants update, or they all apply the
same update.
A Running Example. We report in Figure 2 a running example of a DIOC process that
extends the one presented in the Introduction: the example features a Buyer that orders
a product from a Seller, and a Bank that supports the payment from the Buyer to the
Seller. The DIOC process describes the behaviour of all of them. In this sense, the DIOC
implements a protocol they agreed upon to integrate their business. The DIOC protocol
also interacts with functionalities that are only available at the premises of some of the
participants (for instance, the function getPrice is provided by the Seller IT system and
may be only locally available). For this reason, it is important that the execution of the
DIOC is distributed across the participants.
At Lines 1–2 the Buyer initialises its local variables price ok and continue. These
variables control the while loop used by the Buyer to ask the price of some product to the
Seller. The loop execution is controlled by the Buyer, but it impacts also the behaviour
of the Seller. We will see in § 4 that this is done using automatically generated auxiliary
communications. A similar approach is used to manage conditionals. At Line 4, the
Buyer takes the name of the product from the user with function getInput, which models
interaction with the user, and proceeds to send it to the Seller on operation priceReq (Line
5). The Seller computes the price of the product calling the function getPrice (Line 7)
and, via operation offer , it sends the price to the Buyer (Line 8), that stores it in a local
variable prod price. These last two operations are performed within a scope and therefore
they can be updated at runtime to implement some new business policies (e.g., discounts).
At Lines 10–12 the Buyer checks whether the user is willing to buy the product, and, if
(s)he is not interested, whether (s)he wants to ask prices for other products. If the Buyer
accepts the offer of the Seller, the Seller sends to the Bank the payment details (Line 16),
6
M. DALLA PREDA, M. GABBRIELLI, S. GIALLORENZO, I. LANESE, AND J. MAURO
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
price ok@Buyer = false;
continue@Buyer = true;
while( !price ok and continue )@Buyer{
prod@Buyer = getInput();
priceReq : Buyer(prod) → Seller(order);
scope @Seller{
order price@Seller = getPrice(order);
offer : Seller(order price) → Buyer(prod price)
};
price ok@Buyer = getInput();
if ( !price ok )@Buyer{
continue@Buyer = getInput()
}
};
if ( price ok )@Buyer{
payReq : Seller( payDesc(order price) ) → Bank(desc);
scope @Bank{
pay : Buyer( payAuth(prod price) ) → Bank(auth)
};
payment ok@Bank = makePayment(desc, auth);
if ( payment ok )@Bank{
conf irm : Bank(null) → Seller( )
|
conf irm : Bank(null) → Buyer( )
} else {
abort : Bank(null) → Buyer( )
}
}
Figure 2: DIOC process for Purchase Scenario.
computed using function payDesc. Next, the Buyer authorises the payment via operation
pay, computing the payment authorisation form using function payAuth. Since the payment
may be critical for security reasons, the related communication is enclosed in a scope (Lines
17–19), thus allowing the introduction of more refined procedures later on. After the scope
successfully terminates, at Line 20 the Bank locally executes the actual payment by calling
function makePayment. The function makePayment abstracts an invocation to the Bank IT
system. We show in § 8 that, using functions, one can integrate existing service-oriented
software into a choreographic program.
Finally, the Bank acknowledges the payment to the Seller and the Buyer in parallel
(Lines 22–24). If the payment is not successful, the failure is notified explicitly only to the
Buyer. Note that at Lines 1–2 the annotation @Buyer means that the variables price ok
and continue belong to the Buyer. Similarly, at Line 3, the annotation @Buyer means
that the guard of the while loop is evaluated by the Buyer. The term @Seller at Line 6 is
part of the scope construct and indicates the Seller as coordinator of the update.
DYNAMIC CHOREOGRAPHIES
7
2.2. Annotated DIOCs and their Semantics. In the remainder of the paper, we define
our results on an annotated version of the DIOC syntax.Annotations are numerical indexes
i ∈ N assigned to DIOC constructs. We only require indexes to be distinct. Any annotation
that satisfies this requirement provides the same result. Indeed, programmers do not need
to annotate DIOCs: the annotation with indexes is mechanisable and can be performed
by the language compiler1. Indexes are used both in the proof of our results and in the
projection to avoid interferences between different constructs. From now on we consider
only well-annotated DIOCs, defined as follows.
Definition 2.1 (Well-annotated DIOC). Annotated DIOC processes are obtained by
indexing every interaction, assignment, conditional, while loop, and scope in a DIOC process
with a positive natural number i ∈ N, resulting in the following grammar:
I ::=
|
|
|
|
i: o : R(e) → S(x)
I; I 0
I|I 0
i: x@R = e
1
|
|
|
|
0
i: if b@R {I} else {I 0 }
i: while b@R {I}
i: scope @R {I}
A DIOC process is well annotated if all its indexes are distinct.
DIOC processes do not execute in isolation: they are equipped with a global state Σ
and a set of available updates I, i.e., a set of DIOCs that may replace scopes. Set I may
change at runtime. A global state Σ is a map that defines the value v of each variable x
in a given role R, namely Σ : Roles × Var → Val . The local state of role R is denoted as
ΣR : Var → Val and it verifies that ∀x ∈ Var : Σ(R, x) = ΣR (x). Expressions are always
evaluated by a given role R: we denote the evaluation of expression e in local state ΣR as
[[e]]ΣR . We assume that [[e]]ΣR is always defined (e.g., an error value is given as a result if
evaluation is not possible) and that for each boolean expression b, [[b]]ΣR is either true or
false.
Remark 2.2. The above assumption on expressions is needed for our results. To satisfy
it, when programming, one should prevent runtime errors and notify abnormal events to
partners using normal constructs to guarantee error management or smooth termination
(see e.g., Lines 21–26 in Figure 2). A more elegant way to deal with errors would be to
include in the language well-known constructs, such as try-catch, which are however left as
future work. This could be done by adapting the ideas presented in [9].
Definition 2.3 (DIOC systems). A DIOC system is a triple hΣ, I, Ii denoting a DIOC
process I equipped with a global state Σ and a set of updates I.
Definition 2.4 (DIOC systems semantics). The semantics of DIOC systems is defined
as the smallest labelled transition system (LTS) closed under the rules in Figure 3, where
symmetric rules for parallel composition have been omitted.
The rules in Figure 3 describe the behaviour of a DIOC system by induction on the
structure of its DIOC process, with a case analysis on its topmost operator. We use µ to
range over labels. The possible values for µ are described below.
µ ::=
|
|
o : R(v) → S(x) (interaction)
I
(update)
I
(change updates)
1In fact, the AIOCJ compiler implements such a feature.
|
|
|
τ
(silent)
no-up
(no update)
√
(termination)
8
M. DALLA PREDA, M. GABBRIELLI, S. GIALLORENZO, I. LANESE, AND J. MAURO
[[e]]ΣR = v
bDIOC |Interaction e
o:R(v)→S(x)
hΣ, I, i: o : R(e) → S(x)i −−−−−−−−→ hΣ, I, i: x@S = vi
[[e]]ΣR = v
bDIOC |Assign e
τ
hΣ, I, i: x@R = ei −
→ hΣ[v/x, R], I, 1i
√
µ
hΣ, I, Ii −
→ hΣ, I0 , I 0 i µ 6=
bDIOC |Sequence e
µ
hΣ, I, I; J i −
→ hΣ, I0 , I 0 ; J i
√
µ
hΣ, I, Ii −
→ hΣ, I, I 0 i
hΣ, I, J i −
→ hΣ, I, J 0 i
µ
hΣ, I, I; J i −
→ hΣ, I, J 0 i
µ
hΣ, I, Ii −
→ hΣ, I0 , I 0 i µ 6=
µ
hΣ, I, I k J i −
→
hΣ, I0 , I 0
√
k Ji
bDIOC |Parallel e
√
√
hΣ, I, Ii −
→ hΣ, I, I 0 i
hΣ, I, J i −
→ hΣ, I, J 0 i
√
hΣ, I, I k J i −
→
hΣ, I, I 0
k
bDIOC |Seq-end e
J 0i
[[b]]ΣR = true
bDIOC |Par-end e
τ
bDIOC |If-then e
τ
bDIOC |If-else e
hΣ, I, i: if b@R {I} else {I 0 }i −
→ hΣ, I, Ii
[[b]]ΣR = false
hΣ, I, i: if b@R {I} else {I 0 }i −
→ hΣ, I, I 0 i
[[b]]ΣR = true
τ
hΣ, I, i: while b@R {I}i −
→ hΣ, I, I; i: while b@R {I}i
[[b]]ΣR = false
τ
hΣ, I, i: while b@R {I}i −
→ hΣ, I, 1i
roles(I 0 ) ⊆ roles(I) I 0 ∈ I
bDIOC |While-exit e
connected(I 0 ) freshIndexes(I 0 )
I0
hΣ, I, i: scope @R {I}i −→
hΣ, I, I 0 i
no-up
hΣ, I, i: scope @R {I}i −−−−→ hΣ, I, Ii
bDIOC |End e
√
hΣ, I, 1i −
→ hΣ, I, 0i
bDIOC |While-unfold e
I0
hΣ, I, Ii −
→
bDIOC |Up e
bDIOC |NoUp e
hΣ, I0 , Ii
bDIOC |Change-Updates e
Figure 3: Annotated DIOC system semantics.
Rule bDIOC |Interaction e executes a communication from R to S on operation o, where R
sends to S the value v of an expression e. The communication reduces to an assignment
that inherits the index i of the interaction. The assignment stores value v in variable x
of role S. Rule bDIOC |Assign e evaluates the expression e in the local state ΣR and stores
the resulting value v in the local variable x in role R ([v/x, R] represents the substitution).
DYNAMIC CHOREOGRAPHIES
9
roles(i: o : R(e) → S(x)) = {R, S}
roles(1) = roles(0) = ∅
roles(i: x@R = e) = {R}
roles(I; I 0 ) = roles(I|I 0 ) = roles(I) ∪ roles(I 0 )
roles(i: if b@R {I} else {I 0 }) = {R} ∪ roles(I) ∪ roles(I 0 )
roles(i: while b@R {I}) = roles(i: scope @R {I}) = {R} ∪ roles(I)
Figure 4: Auxiliary function roles.
Rule bDIOC |Sequence e executes a step in the first process of a sequential composition, while
Rule bDIOC |Seq-end e acknowledges the termination of the first process, starting the second
one. Rule bDIOC |Parallel e allows a process in a parallel composition to compute, while Rule
bDIOC |Par-end e synchronises the termination of two parallel processes. Rules bDIOC |If-then e
and bDIOC |If-else e evaluate the boolean guard of a conditional, selecting the “then” and
the “else” branch, respectively. Rules bDIOC |While-unfold e and bDIOC |While-exit e correspond
respectively to the unfolding of a while loop when its condition is satisfied and to its
termination otherwise. Rule bDIOC |Up e and Rule bDIOC |NoUp e deal with updates: the
former applies an update, while the latter allows the body of the scope to be executed
without updating it. More precisely, Rule bDIOC |Up e models the application of the update
I 0 to the scope scope @R {I} which, as a result, is replaced by the DIOC process I 0 .
In the conditions of the rule, we use the function roles and the predicates connected and
freshIndexes. Function roles(I), defined in Figure 4, computes the roles of a DIOC process I.
The condition of the rule requires that the roles of the update are a subset of the roles of
the body of the scope. Predicate connected(I 0 ) holds if I 0 is connected. Connectedness is a
well-formedness property of DIOCs and is detailed in § 6. Roughly, it ensures that roles
involved in a sequential composition have enough information to enforce the correct sequence
of actions. Predicate freshIndexes(I 0 ) holds if all indexes in I 0 are fresh with respect to all
indexes already present in the target DIOC2. This is needed to avoid interferences between
communications inside the update and communications in the original DIOC. This problem
is discussed in more details in § 4, Example 4.3. Rule bDIOC |NoUp e, used when no update is
applied, removes the scope boundaries and starts the execution of the body of the scope.
Rule bDIOC |End e terminates the execution of an empty process. Rule bDIOC |Change-Updates e
allows the set I of available updates to change. This rule is always enabled and models the
fact that the set of available updates is not controlled by the system, but by the external
world: the set of updates can change at any time, the system cannot forbid or delay these
changes, and the system is not notified when they happen. Label I is needed to make the
changes to the set of available updates observable (cf. Definition 7.1).
Remark 2.5. Whether to update a scope or not, and which update to apply if many are
available, is completely non-deterministic. We have adopted this view to maximise generality.
However, for practical applications it is also possible to reduce the non-determinism using
suitable policies to decide when and whether a given update applies. One of such policies is
defined in AIOCJ (see § 8).
2We do not give a formal definition of freshIndexes(I 0 ) to keep the presentation simple. However, freshness
of indexes can be formally ensured using restriction as in π-calculus [46].
10
M. DALLA PREDA, M. GABBRIELLI, S. GIALLORENZO, I. LANESE, AND J. MAURO
We can finally provide the definition of DIOC traces and weak DIOC traces, which
we use to express our results of behavioural correspondence between DIOCs and DPOCs.
Intuitively, in DIOC traces all the performed actions are observed, whilst in weak DIOC
traces silent actions τ are not visible.
Definition 2.6 (DIOC traces). A (strong) trace of a DIOC system hΣ1 , I1 , I1 i is a sequence
(finite or infinite) of labels µ1 , µ2 , . . . such that there is a sequence of DIOC system transitions
µ1
µ2
hΣ1 , I1 , I1 i −→ hΣ2 , I2 , I2 i −→ . . . .
A weak trace of a DIOC system hΣ1 , I1 , I1 i is a sequence of labels µ1 , µ2 , . . . obtained
by removing all silent labels τ from a trace of hΣ1 , I1 , I1 i.
3. Dynamic Process-Oriented Choreographies
In this section we define the syntax and semantics of DPOCs, the target language of our
projection from DIOCs. We remind that DIOCs are not directly executable since their basic
primitives describe distributed interactions. On the contrary, mainstream languages like Java
and C, used for implementation, describe distributed computations using local behaviours
and communication/synchronisation primitives, such as message send and message receive. In
order to describe implementations corresponding to DIOCs we introduce the DPOC language,
a core language based on this kind of primitives, but tailored to program updatable systems.
Indeed, differently from DIOC constructs, DPOC constructs are locally implementable in
any mainstream language. In AIOCJ (see § 8) we implement the DPOC constructs in the
Jolie [36] language.
3.1. DPOC syntax. DPOCs include processes, ranged over by P, P 0 , . . ., describing the
behaviour of participants. (P, Γ)R denotes a DPOC role named R, executing process P in a
local state Γ. Networks, ranged over by N , N 0 , . . ., are parallel compositions of DPOC roles
with different names. DPOC systems, ranged over by S, are DPOC networks equipped with
a set of updates I, namely pairs hI, N i.
DPOCs, like DIOCs, feature operations o. Here we call them programmer-specified
operations to mark the difference with respect to auxiliary operations, ranged over by o∗ .
We use o? to range over both programmer-specified and auxiliary operations. Differently
from communications on programmer-specified operations, communications on auxiliary
operations have no direct correspondent at the DIOC level. Indeed, we introduce auxiliary
operations in DPOCs to implement the synchronisation mechanisms needed to realise the
global constructs of DIOCs (conditionals, while loops, and scopes) at DPOC level.
Like DIOC constructs, also DPOC constructs are annotated using indexes. However,
in DPOCs we use two kinds of indexes: normal indexes i ∈ N and auxiliary indexes of the
forms iT , iF , i? , and iC where i ∈ N. Auxiliary indexes are introduced by the projection,
described in § 4, and are described in detail there. We let ι range over DPOC indexes.
In DPOCs, normal indexes are also used to prefix the operations in send and receive
primitives3. Thus, a send and a receive can interact only if they are on the same operation
and they are prefixed by the same normal index. This is needed to avoid interferences
3In principle, one may use just indexes and drop operations. However, explicit operations are the standard
for communication-based systems, in particular in the area of Web Services, as they come handy to specify
and to debug such systems.
DYNAMIC CHOREOGRAPHIES
11
between concurrent communications, in particular when one of them comes from an update.
We describe in greater detail this issue in § 4, Example 4.3.
The syntax of DPOCs is the following.
P ::=
|
|
|
|
|
ι: i.o? : x from R
ι: i.o? : e to R
i: i.o∗ : X to R
P;P0
P | P0
ι: x = e
X ::=
no
(receive)
(send)
(send-update)
(sequence)
(parallel)
(assignment)
|
P
|
|
|
|
|
|
1
(inaction)
0
(end)
i: if b {P } else {P 0 }
(conditional)
i: while b {P }
(while)
i: scope @R {P } roles {S} (scope-coord)
i: scope @R {P }
(scope)
N ::=
(P, Γ)R
|
N k N0
DPOC processes include receive action ι : i.o? : x from R on a specific operation
(either programmer-specified or auxiliary) of a message from role R to be stored in
variable x, send action ι: i.o? : e to R of the value of an expression e to be sent to role
R, and higher-order send action i : i.o∗ : X to R of the higher-order argument X to be
sent to role R. Here X may be either a DPOC process P , which is the new code for a
scope in R, or a token no, notifying that no update is needed. P ; P 0 and P |P 0 denote
the sequential and parallel composition of P and P 0 , respectively. Processes also feature
assignment ι : x = e of the value of expression e to variable x, the process 1, that can
only successfully terminate, and the terminated process 0. DPOC processes also include
conditionals i: if b {P } else {P 0 } and loops i: while b {P }. Finally, there are two constructs
for scopes. Construct i: scope @R {P } roles {S} defines a scope with body P and set of
participants S, and may occur only inside role R, which acts as coordinator of the update.
The shorter version i: scope @R {P } is used instead inside the code of some role R1 , which
is not the coordinator R of the update. In fact, only the coordinator R needs to know the
set S of involved roles to be able to send to them their updates.
i.o?
3.2. DPOC semantics. DPOC semantics is defined in two steps: we define the semantics
of DPOC roles first, and then we define how roles interact giving rise to the semantics of
DPOC systems.
Definition 3.1 (DPOC roles semantics). The semantics of DPOC roles is defined as the
smallest LTS closed under the rules in Figure 5, where we report the rules dealing with
computation, and Figure 6, in which we define the rules related to updates. Symmetric rules
for parallel composition have been omitted.
DPOC role semantics. We use δ to range over labels. The possible values for δ are as follows:
δ ::= i.o? hvi@S : R
| i.o∗ hXi@S : R
|I
|τ
(send) | i.o? (x ← v)@S : R
(send-update) | i.o∗ (← X)@S : R
(update) | no-up
√
(silent) |
(receive)
(receive-update)
(no-update)
(termination)
12
M. DALLA PREDA, M. GABBRIELLI, S. GIALLORENZO, I. LANESE, AND J. MAURO
[[e]]Γ = v
bDPOC |One e
√
τ
(1, Γ)R −
→ (0, Γ)R
(ι: x = e, Γ)R −
→ (1, Γ[v/x])R
bDPOC |Assign e
[[e]]Γ = v
bDPOC |Send e
? hvi@S:R
i.o
ι: i.o? : e to S, Γ R −−−−−−−→ (1, Γ)R
ι:
i.o?
i.o? (x←v)@S:R
: x from S, Γ R −−−−−−−−−−→ (ι: x = v, Γ)R
bDPOC |Recv e
bDPOC |Send-Up e
? hXi@S:R
i.o
i: i.o? : X to S, Γ R −−−−−−−−→ (1, Γ)R
√
δ
(P, Γ)R →
− (P 0 , Γ0 )R δ 6=
bDPOC |Sequence e
δ
0
0
(P ; Q, Γ)R →
− (P ; Q, Γ )R
√
δ
(P, Γ)R −
→ (P 0 , Γ)R
(Q, Γ)R →
− (Q0 , Γ0 )R
δ
(P ; Q, Γ)R →
−
(Q0 , Γ0 )
δ
(P, Γ)R →
− (P 0 , Γ0 )R
δ
(P | Q, Γ)R →
−
(P 0
(P, Γ)R −
→ (P 0 , Γ)R
√
(P | Q, Γ)R −
→
R
δ 6=
Q, Γ0 )
|
√
√
√
bDPOC |Parallel e
R
(Q, Γ)R −
→ (Q0 , Γ)R
(P 0
|
Q0 , Γ)
bDPOC |Par-end e
R
[[b]]Γ = true
τ
bDPOC |If-Then e
τ
bDPOC |If-Else e
(i: if b {P } else {P 0 }, Γ)R −
→ (P, Γ)R
[[b]]Γ = false
(i: if b {P } else {P 0 }, Γ)R −
→ (P 0 , Γ)R
[[b]]Γ = true
τ
(i: while b {P }, Γ)R −
→ (P ; i: while e {P }, Γ)R
[[b]]Γ = false
τ
bDPOC |Seq-end e
(i: while b {P }, Γ)R −
→ (1, Γ)R
bDPOC |While-unfold e
bDPOC |While-exit e
Figure 5: DPOC role semantics. Computation rules. (Update rules in Figure 6)
The semantics is in the early style. Rule bDPOC |Recv e receives a value v from role S
and assigns it to local variable x of R. Similarly to Rule bDIOC |Interact e (see Figure 3), the
reception reduces to an assignment that inherits the index i from the receive primitive.
Rules bDPOC |Send e and bDPOC |Send-Up e execute send and higher-order send actions,
respectively. Send actions evaluate expression e in the local state Γ. Rule bDPOC |One e
terminates an empty process. Rule bDPOC |Assign e executes an assignment ([v/x] represents
the substitution of value v for variable x). Rule bDPOC |Sequence e executes a step in the first
process of a sequential composition, while Rule bDPOC |Seq-end e acknowledges the termination
of the first process, starting the second one. Rule bDPOC |Parallel e allows a process in a
DYNAMIC CHOREOGRAPHIES
roles(I) ⊆ S
13
freshIndexes(I) connected(I)
bDPOC |Lead-Up e
I
(i: scope @R {P } roles {S}, Γ)R −
→
Q
i: i.sb∗i : π(I, Rj ) to Rj ; π(I, R);
Rj ∈S\{R}
!
Q
i:
Rj ∈S\{R}
i.se∗i
: from Rj , Γ
R
bDPOC |Lead-NoUp e
no-up
(i: scope @R {P } roles {S}, Γ)R −−−−→
Q
Q
i: i.sb∗i : no to Rj ; P ;
Rj ∈S\{R}
Rj ∈S\{R}
0
i.sb∗
i (←P )@S:R
!
i:
i.se∗i
R
bDPOC |Up e
0
(i: scope @S {P }, Γ)R −−−−−−−−−−−→ (P ; i:
i.sb∗
i (←no)@S:R
: from Rj , Γ
(i: scope @S {P }, Γ)R −−−−−−−−−−−→ (P ; i:
i.se∗i
i.se∗i
: ok to S, Γ)R
bDPOC |NoUp e
: ok to S, Γ)R
Figure 6: DPOC role semantics. Update rules. (Computation rules in Figure 5)
parallel composition to compute, while Rule bDPOC |Par-end e synchronises the termination of
two parallel processes. Rules bDPOC |If-then e and bDPOC |If-else e select the “then” and the
“else” branch in a conditional, respectively. Rules bDPOC |While-unfold e and bDPOC |While-exit e
model respectively the unfolding and the termination of a while loop.
The rules reported in Figure 6 deal with code updates. Rules bDPOC |Lead-Up e and
DPOC
b
|Lead-NoUp e specify the behaviour of the coordinator R of the update, respectively
when an update is performed and when no update is performed. In particular, R nondeterministically selects whether to update or not and, in the first case, which update to
apply. The coordinator communicates the selection to the other roles in the scope using
operations sb∗i . The content of the message is either the new code that the other roles need to
execute, if the update is performed, or a token no, if no update is applied. Communications
on operations sb∗i also ensure that no role starts executing the scope before the coordinator
has selected whether to update or not. The communication is received by the other roles
using Rule bDPOC |Up e if an update is selected and Rule bDPOC |NoUp e if no update is selected.
Similarly, communications on se∗i ensure that the updated code has been completely executed
before any role can proceed to execute the code that follows the scope in its original DP OC
process. Communications on se∗i carry no relevant data: they are used for synchronisation
purposes only.
As already discussed, Rule bDPOC |Lead-Up e models the fact that the coordinator R of
the update non-deterministically selects an update I. The premises of Rule bDPOC |Lead-Up e
are similar to those of Rule bDIOC |Up e (see Figure 3). Function roles is used to check that
the roles in I are included in the roles of the scope. Freshness of indexes is checked by
predicate freshIndexes, and well formedness of I by predicate connected (formally defined
later on, in Definition 6.2 in § 6). In particular, the coordinator R generates the processes
to be executed by the roles in S using the process-projection function π (detailed in § 4).
More precisely, π(I, Ri ) generates the code for role Ri . The processes π(I, Ri ) are sent via
auxiliary higher-order communications on sb∗i to the roles that have to execute them. These
14
M. DALLA PREDA, M. GABBRIELLI, S. GIALLORENZO, I. LANESE, AND J. MAURO
communications also notify the other roles that
Q they can start executing the new code. Here,
and in the remainder of the paper, we define
Q Ri ∈S Pi as the parallel composition of DPOC
processes Pi for Ri ∈ S. We assume that
binds more tightly than sequential composition.
After the communication of the updated code to the other participants, R starts its own
updated code π(I, R). Finally, auxiliary communications se∗i are used to synchronise the end
of the execution of the update (here denotes a fresh variable to store the synchronisation
message ok). Rule bDPOC |Lead-NoUp e defines the behaviour of the coordinator R when no
update is applied. In this case, R sends a token no to the other involved roles, notifying
them that no update is applied and that they can start executing their original code. End
of scope synchronisation is the same as that of Rule bDPOC |Lead-Up e. Rules bDPOC |Up e and
bDPOC |NoUp e define the behaviour of the other roles involved in the scope. The scope waits
for a message from the coordinator. If the content of the message is no, the body of the
scope is executed. Otherwise, the content of the message is a process P 0 which is executed
instead of the body of the scope.
We highlight the importance of the coordinator R. Since the set of updates may change
at any moment, we need to be careful to avoid that the participants in the scope get code
projected from different updates. Given that only role R obtains and delivers the new code,
one is guaranteed that all the participants receive their projection of the same update.
DPOC system semantics.
Definition 3.2 (DPOC systems semantics). The semantics of DPOC systems is defined as
the smallest LTS closed under the rules in Figure 7. Symmetric rules for parallel composition
have been omitted.
We use η to range over DPOC systems labels. The possible values of η are as follows:
η ::= o? : R(v) → S(x)
(interaction)
| o∗ : R(X) → S()
(interaction-update)
| δ
(role label)
DPOC
DPOC
Rules b
|Lift e and b
|Lift-Up e lift role transitions to the system level. Rule
bDPOC |Lift-Up e also checks that the update I belongs to the set of currently available updates
I. Rule bDPOC |Synch e synchronises a send with the corresponding receive, producing an
interaction. Rule bDPOC |Synch-Up e is similar, but it deals with higher-order interactions. Note
that Rules bDPOC |Synch e and bDPOC |Synch-Up e remove the prefixes from DPOC operations
in transition labels. The labels of these transitions store the information on the occurred
communication: label o? : R1 (v) → R2 (x) denotes an interaction on operation o? from role
R1 to role R2 where the value v is sent by R1 and then stored by R2 in variable x. Label
o∗ : R1 (X) → R2 () denotes a similar interaction, but concerning a higher-order value X,
which can be either the code used in the update or a token no if no update is performed. No
receiver variable is specified, since the received value becomes part of the code of the receiving
process. Rule bDPOC |Ext-Par e allows a network inside a parallel composition to compute.
Rule bDPOC |Ext-Par-End e synchronises the termination of parallel networks. Finally, Rule
bDPOC |Change-Updates e allows the set of updates to change arbitrarily.
We now define DPOC traces and weak DPOC traces, which we later use, along with
DIOC traces and weak DIOC traces, to define our result of correctness.
DYNAMIC CHOREOGRAPHIES
δ
N →
− N0
δ 6= I
δ
hI, N 0 i
hI, N i →
−
I
N −
→ N0
bDPOC |Lift e
i.o? hvi@S:R
hI, N i −−−−−−−→ hI, N 0 i
I∈I
I
hI, N i −
→ hI, N 0 i
15
bDPOC |Lift-Up e
i.o? (x←v)@R:S
hI, N 00 i −−−−−−−−−−→ hI, N 000 i
o? :R(v)→S(x)
hI, N k N 00 i −−−−−−−−−→ hI, N 0 k N 000 i
i.o∗ (←X)@R:S
i.o∗ hXi@S:R
hI, N i −−−−−−−−→ hI, N 0 i
hI, N k
bDPOC |Synch e
hI, N 00 i −−−−−−−−−→ hI, N 000 i
o∗ :R(X)→S()
N 00 i −−−−−−−−→
η
hI, N i −
→ hI, N 0 i
hI, N 0
η 6=
k
√
η
hI, N k N 00 i −
→ hI, N 0 k N 00 i
bDPOC |Ext-Parallel e
√
√
hI, N i −
→ hI, N 0 i
hI, N 00 i −
→ hI, N 000 i
√
hI, N k N 00 i −
→ hI, N 0 k N 000 i
I0
hI, N i −
→
hI0 , N i
bDPOC |Synch-Up e
N 000 i
bDPOC |Ext-Par-End e
bDPOC |Change-Updates e
Figure 7: DPOC system semantics.
Definition 3.3 (DPOC traces). A (strong) trace of a DPOC system hI1 , N1 i is a sequence
(finite or infinite) of labels η1 , η2 , . . . with
√
ηi ∈ {τ, o? : R1 (v) → R2 (x), o∗ : R1 (X) → R2 (), , I, no-up, I}
η1
η2
such that there is a sequence of transitions hI1 , N1 i −→ hI2 , N2 i −→ . . . .
A weak trace of a DPOC system hI1 , N1 i is a sequence of labels η1 , η2 , . . . obtained by removing
all the labels corresponding to auxiliary communications, i.e., of the form o∗ : R1 (v) → R2 (x)
or o∗ : R1 (X) → R2 (), and the silent labels τ , from a trace of hI1 , N1 i.
DPOC traces do not allow send and receive actions. Indeed these actions represent
incomplete interactions, thus they are needed for compositionality reasons, but they do not
represent relevant behaviours of complete systems. Note also that these actions have no
correspondence at the DIOC level, where only whole interactions are allowed.
Remark 3.4. Contrarily to DIOCs, DPOCs in general can deadlock. For instance,
i: i.o : x from R0 , Γ R
is a deadlocked DPOC network: the process i: i.o : x from R0 is not terminated, and the
only enabled actions are changes of the set of updates (i.e., transitions with label I), which
are not actual system activities, but are taken by the environment. Notably, the DPOC
above cannot be obtained by projecting a DIOC. In fact, DPOCs generated from DIOCs are
guaranteed to be deadlock free.
16
M. DALLA PREDA, M. GABBRIELLI, S. GIALLORENZO, I. LANESE, AND J. MAURO
4. Projection Function
We now introduce the projection function proj. Given a DIOC specification, proj returns a
network of DPOC programs that enact the behaviour defined by the originating DIOC.
We write the projection of a DIOC I as proj(I, Σ), where Σ is a global state. Informally,
the projection of a DIOC is a parallel composition of terms, one for each role of the DIOC.
The body of these roles is computed by the process-projection function π (defined below).
Given a DIOC and a role name R, the process-projection returns the process corresponding
to the local behaviour of role R. Since the roles executing the process-projections are
composed in parallel, the projection of a DIOC program results into the DPOC network of
the projected roles.
To give the formal definition of projection, we first define ki∈I Ni as the parallel
composition of networks Ni for i ∈ I.
Definition 4.1 (Projection). The projection of a DIOC process I with global state Σ is
the DPOC network defined by:
proj(I, Σ) =kS∈roles(I) (π(I, S), ΣS )S
The process-projection function that derives DPOC processes from DIOC processes is
defined as follows.
Definition 4.2 (Process-projection). Given an annotated DIOC process I and a role R
the projected DPOC process π(I, R) is defined as in Figure 8.
With a little abuse of notation, we write roles(I, I 0 ) for roles(I) ∪ roles(I 0 ). We assume
that variables xi are never used in the DIOC to be projected and we use them for auxiliary
synchronisations.
The projection is homomorphic for sequential and parallel composition, 1 and 0. The
projection of an assignment is the assignment on the role performing it and 1 on other roles.
The projection of an interaction is a send on the sender role, a receive on the receiver, and
1 on any other role. The projection of a scope is a scope on all its participants. On its
coordinator it also features a clause that records the roles of the involved participants. On
the roles not involved in the scope the projection is 1. Projections of conditional and while
loop are a bit more complex, since they need to coordinate a distributed computation. To
this end they exploit communications on auxiliary operations. In particular, cnd∗i coordinates
the branching of conditionals, carrying information on whether the “then” or the “else”
branch needs to be taken. Similarly, wb∗i coordinates the beginning of a while loop, carrying
information on whether to loop or to exit. Finally, we∗i coordinates the end of the body of
the while loop. This closing operation carries no relevant information and it is just used for
synchronisation purposes. In order to execute a conditional i: if b@R {I} else {I 0 }, the
coordinator R of the conditional locally evaluates the guard and tells the other roles which
branch to choose using auxiliary communications on cnd∗i . Finally, all the roles involved
in the conditional execute their code corresponding to the chosen branch. Execution of a
loop i: while b@R {I} is similar, with two differences. First, end of loop synchronisation
on operations we∗i is used to notify the coordinator that an iteration is terminated, and a
new one can start. Second, communication of whether to loop or to exit is more tricky than
communication on the branch to choose in a conditional. Indeed, there are two points in
the projected code where the coordinator R sends the decision: the first is inside the body
of the loop and it is used if the decision is to loop; the second is after the loop and it is
DYNAMIC CHOREOGRAPHIES
π(1, S) = 1
0
0
π(I; I , S) = π(I, S); π(I , S)
π(0, S) = 0
π(I|I 0 , S) = π(I, S)|π(I 0 , S)
π(i: x@R = e, R)
= i: x = e
π(i: x@R = e, S) and S 6= R
= 1
π(i: o : R1 (e) → R2 (x), R1 )
= i: i.o : e to R2
π(i: o : R1 (e) → R2 (x), R2 )
= i: i.o : x from R1
π(i: o : R1 (e) → R2 (x), S)
and S 6∈ {R1 , R2 }
= 1
π(i: if b@R {I} else {I 0 }, R)
=
i: if b
17
Q
iT: i.cnd∗i : true to R0
!
;
R0 ∈roles(I,I 0 )\{R}
π(I,
R)
!
Q
iF: i.cnd∗i : false to R0 ;
else
R0 ∈roles(I,I 0 )\{R}
π(I 0 , R)
π(i: if b@R {I} else {I 0 }, S)
and S ∈ roles(I, I 0 ) \ {R}
= i?: i.cnd∗i : xi from R; i: if xi {π(I, S)} else {π(I 0 , S)}
π(i: if b@R {I} else {I 0 }, S)
and S 6∈ roles(I, I 0 ) ∪ {R}
= 1
π(i: while b@R {I}, R)
π(i: while b@R {I}, S)
and S ∈ roles(I) \ {R}
n
i: while b
!
Q
0
∗
iT: i.wbi : true to R ;
R0 ∈roles(I)\{R}
Q
=
iC: i.we∗i : from R0
R0 ∈roles(I)\{R}
o
Q
iF: i.wb∗i : false to R0
;
0 ∈roles(I)\{R}
R
∗
i?: i.wbi : xi from
R;
π(I, S);
=
∗
i: while xi iC: i.wei : ok to R;
i?: i.wb∗i : xi from R
π(i: while b@R {I}, S)
and S 6∈ roles(I) ∪ {R}
= 1
π(i: scope @R {I}, R)
= i: scope @R {π(I, R)} roles {roles(I)}
π(i: scope @R {I}, S)
and S ∈ roles(I) \ {R}
= i: scope @R {π(I, S)}
π(i: scope @R {I}, S)
and S 6∈ roles(I) ∪ {R}
= 1
Figure 8: process-projection function π.
π(I, R);
18
M. DALLA PREDA, M. GABBRIELLI, S. GIALLORENZO, I. LANESE, AND J. MAURO
used if the decision is to exit. Also, there are two points where these communications are
received by the other roles: before their loop at the first iteration, at the end of the previous
iteration of the body of the loop in the others.
One has to keep attention since, by splitting an interaction into a send and a receive
primitive, primitives corresponding to different interactions, but on the same operation, may
interfere.
Example 4.3. We illustrate the issue of interferences using the two DPOC processes below,
identified by their respective roles, R1 (right) and R2 (left), assuming that operations are
not prefixed by indexes. We describe only R1 as R2 is its dual. At Line 1, R1 sends a
message to R2 on operation o. In parallel with the send, R1 had a scope (Lines 3–5) that
performed an update. The new code (Line 4) contains a send on operation o to role R2 .
Since the two sends and the two receives share the same operation o and run in parallel,
they can interfere with each other.
process R1
1. 1: o : e1 to R2
2. |
3. // update auxiliary code
4. 2: o : e2 to R2
5. // update auxiliary code
process R2
1. 1: o : x1 from R2
2. |
3. // update auxiliary code
4. 2: o : x2 from R2
5. // update auxiliary code
Note that, since updates come from outside and one cannot know in advance which
operations they use, this interference cannot be statically avoided.
For this reason, in § 3 we introduced indexes to prefix DPOC operations.
A similar problem may occur also for auxiliary communications. In particular, imagine
to have two parallel conditionals executed by the same role. We need to avoid that, e.g.,
the decision to take the “else” branch on the first conditional is wrongly taken by some
role as a decision concerning the second conditional. To avoid this problem, we prefix
auxiliary operations using the index i of the conditional. In this way, communications
involving distinct conditionals cannot interact. Note that communications concerning the
same conditional (or while loop) may share the same operation name and prefix. However,
since all auxiliary communications are from the coordinator of the construct to the other
roles involved in it, or vice versa, interferences are avoided.
We now describe how to generate indexes for statements in the projection. As a general
rule, all the DPOC constructs obtained by projecting a DIOC construct with index i have
index i. The only exceptions are the indexes of the auxiliary communications of the projection
of conditionals and while loops.
Provided i is the index of the conditional: i ) in the projection of the coordinator we
index the auxiliary communications for selecting the “then” branch with index iT , the
ones for selecting the “else” branch with index iF ; ii ) in the projection of the other roles
involved in the conditional we assign the index i? to the auxiliary receive communications.
To communicate the evaluation of the guard of a while loop we use the same indexing
scheme (iT , iF , and i? ) used in the projection of conditional. Moreover, all the auxiliary
communications for end of loop synchronisation are indexed with iC .
DYNAMIC CHOREOGRAPHIES
19
5. Running Example: Projection and Execution
In this section we use our running example (see Figure 2) to illustrate the projection and
execution of DIOC programs.
5.1. Projection. Given the code in Figure 2, we need to annotate it to be able to project it
(we remind that in § 4 we defined our projection function on well-annotated DIOCs). Since
we wrote one instruction per line in Figure 2, we annotate every instruction using its line
number as index. This results in a well-annotated DIOC.
From the annotated DIOC, the projection generates three DPOC processes for the
Seller, the Buyer, and the Bank, respectively reported in Figures 9, 11, and 10. To improve
readability, we omit some 1 processes. In the projection of the program, we also omit to
write the index that prefixes the operations since it is always equal to the numeric part of
the index of their correspondent construct. Finally, we write auxiliary communications in
grey.
5.2. Runtime Execution. We now focus on an excerpt of the code to exemplify how
updates are performed at runtime. We consider the code of the scope at Lines 6–9 of
Figure 2. In this execution scenario we assume to introduce in the set of available updates
the update presented in Figure 1, which enables the use of a fidelity card to provide a price
discount. Below we consider both the DIOC and the DPOC level, dropping some 1s to
improve readability.
Since we describe a runtime execution, we assume that the Buyer has just sent the
name of the product (s)he is interested in to the Seller (Line 5 of Figure 2). The annotated
DIOCs we execute is the following.
6: scope @Seller{
7: order price@Seller = getPrice(order);
3
8: offer : Seller(order price) → Buyer(prod price)
4 }
1
2
At runtime we apply Rule bDIOC |Up e that substitutes the scope with the new code. The
replacement is atomic. Below we assume that the instructions of the update are annotated
with indexes corresponding to their line number plus 30.
1
2
3
4
5
6
7
8
9
31: cardReq : Seller(null) → Buyer( );
32: card id@Buyer = getInput();
33: card : Buyer(card id) → Seller(buyer id);
34: if isValid(buyer id)@Seller{
35: order price@Seller = getPrice(order) ∗ 0.9
} else {
37: order price@Seller = getPrice(order)
};
39: offer : Seller(order price) → Buyer(prod price)
Let us now focus on the execution at DPOC level, where the application of updates
is not atomic. The scope is distributed between two participants. The first step of the
20
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
M. DALLA PREDA, M. GABBRIELLI, S. GIALLORENZO, I. LANESE, AND J. MAURO
3? : wb∗3 : x3 from Buyer;
3: while(x3 ){
5: priceReq : order from Buyer;
6: scope @Seller{
7: order price = getPrice(order);
8: offer : order price to Buyer
} roles { Seller, Buyer };
3C : we∗3 : ok to Buyer;
3? : wb∗3 : x3 from Buyer
};
15? : cnd∗15 : x15 from Buyer;
15: if (x15 ){
16: payReq : payDesc(order price) to Bank;
21? : cnd∗21 : x21 from Bank;
21: if (x21 ){
22: conf irm : from Bank }
}
Figure 9: Seller DPOC Process.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
15? : cnd∗15
: x15 from Buyer;
15: if (x15 ){
16: payReq : desc from Seller;
17: scope @Bank{
18: pay : auth from Buyer
} roles {Buyer, Bank};
20: payment ok = makePayment(desc, auth);
21: if (payment ok){
{
21T : cnd∗21 : true to Seller
| 21T : cnd∗21 : true to Buyer
} ; {
22: conf irm : null to Seller
| 24: conf irm : null to Buyer
}
} else {
{
21F : cnd∗21 : false to Seller
| 21F : cnd∗21 : false to Buyer
};
26: abort : null to Buyer
}
}
Figure 10: Bank DPOC Process.
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
1: price ok = false;
2: continue = true;
3: while(!price ok and continue){
3T : wb∗3 : true to Seller;
4: prod = getInput();
5: priceReq : prod to Seller;
6: scope @Seller{
7: offer : prod price from Seller
};
10: price ok = getInput();
11: if (!price ok){
12: continue = getInput()
};
3C : we∗3 : from Seller
};
3F : wb∗3 : false to Seller;
15: if (price ok){
{
15T : cnd∗15 : true to Seller
|15T : cnd∗15 : true to Bank
};
17: scope @Bank{
19: pay : payAuth(prod price) to Bank
};
21? : cnd∗21 : x21 from Bank;
21: if (x21 ){
24: conf irm : from Bank
} else {
26: abort : from Bank}
}
}
Figure 11: Buyer DPOC Process.
DYNAMIC CHOREOGRAPHIES
21
update protocol is performed by the Seller, since (s)he is the coordinator of the update.
The DPOC description of the Seller before the update is:
6: scope @Seller{
7: order price = getPrice(order);
8: offer : order price to Buyer
} roles {Seller, Buyer}
When the scope construct is enabled, the Seller non-deterministically selects whether
to update or not and, in the first case, which update to apply. Here, we assume that the
update using the code in Figure 1 is selected. Below we report on the left the reductum of
the projected code of the Seller after the application of Rule bDPOC |Lead-Up e. The Seller
sends to the Buyer the code — denoted as PB and reported below on the right — obtained
projecting the update on role Buyer.
1
2
3
4
5
6
7
8
9
10
6: sb∗6 : PB to Buyer;
31: cardReq : null to Buyer;
33: card : buyer id from Buyer;
34: if isValid(buyer id){
PB := 31: cardReq : null from Seller;
35: order price = getPrice(order) ∗ 0.9
32: card id = getInput();
} else {
33: card : card id to Seller;
37: order price = getPrice(order)
39: offer : prod price from Seller
};
39: offer : order price to Buyer;
6: se∗6 : from Buyer;
Above, at Line 1 the Seller requires the Buyer to update, sending to him the new
DPOC fragment to execute. Then, the Seller starts to execute its own updated DPOC.
At the end of the execution of the new DPOC code (Line 10) the Seller waits for the
notification of termination of the DPOC fragment executed by the Buyer.
Let us now consider the process-projection of the Buyer, reported below.
6: scope @Seller{
8: offer : order price from Seller
}
At runtime, the scope waits for the arrival of a message from the coordinator of the update.
In our case, since we assumed that the update is applied, the Buyer receives using Rule
bDPOC |Up e the DPOC fragment PB sent by the coordinator. In the reductum, PB replaces
the scope, followed by the notification of termination to the Seller.
31: cardReq : null from Seller;
32: card id = getInput();
33: card : card id to Seller;
39: offer : prod price from Seller
6: se∗6 : ok to Seller
22
M. DALLA PREDA, M. GABBRIELLI, S. GIALLORENZO, I. LANESE, AND J. MAURO
Consider now what happens if no update is applied. At DIOC level the Seller applies
Rule bDIOC |NoUp e, which removes the scope and runs its body. At DPOC level, the update
is not atomic. The code of the Seller is the following one.
6: sb∗6 : no to Buyer;
2 7: order price = getPrice(order);
3 8: offer : order price to Buyer;
4 6: se∗6 : from Buyer;
1
Before executing the code inside the scope, the Seller notifies the Buyer that (s)he can
proceed with her execution (Line 1). Like in the case of update, the Seller also waits for
the notification of the end of execution from the Buyer (Line 4).
Finally, we report the DPOC code of the Buyer after the reception of the message that
no update is needed. Rule bDPOC |NoUp e removes the scope and adds the notification of
termination (Line 2 below) to the coordinator at the end.
1
2
7: offer : prod price from Seller;
6: se∗6 : ok to Seller;
6. Connected DIOCs
We now give a precise definition of the notion of connectedness that we mentioned in § 2.2
and § 3.2. In both DIOC and DPOC semantics we checked such a property of updates with
predicate connected, respectively in Rule bDIOC |Up e (Figure 3) and Rule bDPOC |Up-Lead e
(Figure 6).
To give the intuition of why we need to restrict to connected updates, consider the
scenario below of a DIOC (left side) and its projection (right side).
op1 : A(e1 ) → B(x);
op2 : C(e2 ) → D(y)
projection
======⇒
process A
op1 : e1 to B
process B
op1 : x from A
process C
op2 : e2 to D
process D
op2 : y from C
DIOCs can express interactions that, if projected as described in § 4, can behave differently
with respect to the originating DIOC. Indeed, in our example we have a DIOC that composes
in sequence two interactions: an interaction between A and B on operation op1 followed by
an interaction between C and D on operation op2 . The projection of the DIOC produces
four processes (identified by their role): A and C send a message to B and D, respectively.
Dually, B and D receive a message form A and C, respectively. In the example, at the level
of processes we lose the global order among the interactions: each projected process runs its
code locally and it is not aware of the global sequence of interactions. Indeed, both sends
and both receives are enabled at the same time. Hence, the semantics of DPOC lets the two
interactions interleave in any order. It can happen that the interaction between C and D
occurs before the one between A and B, violating the order of interactions prescribed by
the originating DIOC.
Restricting to connected DIOCs avoids this kind of behaviours. We formalise connectedness as an efficient (see Theorem 6.3) syntactic check. We highlight that our definition of
connectedness does not hamper programmability and it naturally holds in most real-world
DYNAMIC CHOREOGRAPHIES
23
scenarios (the interested reader can find in the website of the AIOCJ project [1] several such
scenarios).
Remark 6.1. There exists a trade-off between efficiency and ease of programming with
respect to the guarantee that all the roles are aware of the evolution of the global computation.
This is a common element of choreographic approaches, which has been handled in different
ways, e.g., i ) by restricting the set of well-formed choreographies to only those on which
the projection preserves the order of actions [10]; ii ) by mimicking the non-deterministic
behaviour of process-level networks at choreography level [13]; or iii ) by enforcing the order
of actions with additional auxiliary messages between roles [31].
Our choice of preserving the order of interactions defined at DIOC level follows the same
philosophy of [10], whilst for scopes, conditionals, and while loops we enforce connectedness
with auxiliary messages as done in [31]. We remind that we introduced auxiliary messages
for coordination both in the semantics of scopes at DPOC level (§ 3.2) and in the projection
(§ 4). We choose to add such auxiliary messages to avoid to impose strong constraints on the
form of scopes, conditionals, and while loops, which in the end would pose strong limitations
to the programmers of DIOCs. On the other hand, for sequential composition we choose to
restrict the set of allowed DIOCs by requiring connectedness, which ensures that the order
of interactions defined at DIOC level is preserved by projection.
As discussed above, the execution of conditionals and while loops rely on auxiliary
communications to coordinate the different roles. Some of these communications may be
redundant. For instance, in Figure 9, Line 8, the Seller notifies to the Buyer that (s)he
has completed her part of the while loop. However, since her last contribution to the while
loop is the auxiliary communication for end of scope synchronisation, the Buyer already
has this information. Hence, Line 8 in Figure 9, where the notification is sent, and Line 14
in Figure 11, where the notification is received, can be safely dropped. Removing redundant
auxiliary communications can be automatised using a suitable static analysis. We leave this
topic for future work.
To formalise connectedness we introduce, in Figure 12, the auxiliary functions transI and
transF that, given a DIOC process, compute sets of pairs representing senders and receivers
of possible initial and final interactions in its execution. We represent one such pair as
R → S. Actions located at R are represented as R → R. For instance, given an interaction
i : o : R(e) → S(x) both its transI and transF are {R → S}. For conditional, transI(i :
if b@R {I} else {I 0 }) = {R → R} since the first action executed is the evaluation of the
guard by role R. The set transF(i: if b@R {I} else {I 0 }) is normally transF(I) ∪ transF(I 0 ),
since the execution terminates with an action from one of the branches. If instead the
branches are both empty then transF is {R → R}, representing guard evaluation.
Finally, we give the formal definition of connectedness.
Definition 6.2 (Connectedness). A DIOC process I is connected if each subterm I 0 ; I 00 of
I satisfies
∀ R1 → R2 ∈ transF(I 0 ), ∀ S1 → S2 ∈ transI(I 00 ) . {R1 , R2 } ∩ {S1 , S2 } =
6 ∅
Connectedness can be checked efficiently.
Theorem 6.3 (Connectedness-check complexity).
The connectedness of a DIOC process I can be checked in time O(n2 log(n)), where n is the
number of nodes in the abstract syntax tree of I.
24
M. DALLA PREDA, M. GABBRIELLI, S. GIALLORENZO, I. LANESE, AND J. MAURO
transI(i: o : R(e) → S(x))
= transF(i: o : R(e) → S(x)) = {R → S}
transI(i: x@R = e)
= transF(i: x@R = e) = {R → R}
transI(1)
= transI(0) = transF(1) = transF(0) = ∅
transI(I|I 0 )
= transI(I) ∪ transI(I 0 )
transF(I|I 0 )
= transF(I) ∪ transF(I 0 )
(
transI(I 0 ) if transI(I) = ∅
=
transI(I) otherwise
(
transF(I) if transF(I 0 ) = ∅
=
transF(I 0 ) otherwise
transI(I; I 0 )
transF(I; I 0 )
transI(i: if b@R {I} else {I 0 })
= transI(i: while b@R {I}) = {R → R}
(
{R → R}
if transF(I) ∪ transF(I 0 ) = ∅
transF(i: if b@R {I} else {I 0 }) =
transF(I) ∪ transF(I 0 ) otherwise
if transF(I) = ∅
{R → R}
S
0
transF(i: while b@R {I})
=
{R → R } otherwise
R0 ∈roles(I)r{R}
transI(i: scope @R {I})
= {R → R}
if roles(I) ⊆ {R}
{R → R}
S
0
transF(i: scope @R {I})
=
{R → R} otherwise
R0 ∈roles(I)r{R}
Figure 12: Auxiliary functions transI and transF.
The proof of the theorem is reported in Appendix A.
We remind that we allow only connected updates. Indeed, replacing a scope with a
connected update always results in a deadlock- and race-free DIOC. Thus, one just needs to
statically check connectedness of the starting program and of the updates, and there is no
need to perform expensive runtime checks on the whole application after updates have been
performed.
7. Correctness
In the previous sections we have presented DIOCs, DPOCs, and described how to derive
a DPOC from a given DIOC. This section presents the main technical result of the paper,
namely the correctness of the projection. Moreover, as a consequence of the correctness, in
Section 7.2 we prove that properties like deadlock freedom, termination, and race freedom
are preserved by the projection.
Correctness here means that a connected DIOC and its projected DPOC are weak
system bisimilar. Weak system bisimilarity is formally defined as follows.
Definition 7.1 (Weak System Bisimilarity). A weak system bisimulation is a relation R
between DIOC systems and DPOC systems such that if (hΣ, I, Ii , hI0 , N i) ∈ R then:
DYNAMIC CHOREOGRAPHIES
µ
η1
η
25
µ
k
−
→ hI000 , N 000 i with
• if hΣ, I, Ii −
→ hΣ00 , I00 , I 00 i then hI0 , N i −→, . . . , −→
∗
∗
∀ i ∈ [1 . . . k], ηi ∈ {o : R1 (v) → R2 (x), o : R1 (X) → R2 (), τ } and
(hΣ00 , I00 , I 00 i , hI000 , N 000 i) ∈ R;
√
η
• if hI0 , N i −
→ hI000 , N 000 i with η ∈ {o? : R1 (v) → R2 (x), o∗ : R1 (X) → R2 (), , I,
no-up, I000 , τ } then one of the following two conditions holds:
η
– hΣ, I, Ii −
→ hΣ00 , I0 , I 00 i and (hΣ00 , I00 , I 00 i , hI000 , N 000 i) ∈ R or
– η ∈ {o∗ : R1 (v) → R2 (x), o∗ : R1 (X) → R2 (), τ } and (hΣ, I, Ii , hI000 , N 000 )i ∈ R
A DIOC system hΣ, I, Ii and a DPOC system hI0 , N i are weak system bisimilar iff there
exists a weak system bisimulation R such that (hΣ, I, Ii , hI0 , N i) ∈ R.
In the proof, we provide a relation R which relates each well-annotated connected DIOC
system with its projection and show that it is a weak system bisimulation. Such a relation
is not trivial since events that are atomic in the DIOC, e.g., the evaluation of the guard of a
conditional, including the removal of the discarded branch, are not atomic at DPOC level.
In the case of conditional, the DIOC transition is mimicked by a conditional performed
by the role evaluating the guard, a set of auxiliary communications sending the value of
the guard to the other roles, and local conditionals based on the received value. These
mismatches are taken care by function upd (Definition 7.18). This function needs also to
remove the auxiliary communications used to synchronise the termination of scopes, which
have no counterpart after the DIOC scope has been consumed. However, we have to record
the impact of the mentioned auxiliary communications on the possible executions. Thus we
define an event structure for DIOC (Definition 7.10) and one for DPOC (Definition 7.11)
and we show that the two are related (Lemma 7.15).
Thanks to the existence of a bisimulation relating each well-annotated connected DIOC
system with its projection we can prove that the projection is correct. Formally:
Theorem 7.2 (Correctness). For each initial, connected DIOC process I, each state Σ,
each set of updates I, the DIOC system hΣ, I, Ii and the DPOC system hI, proj(I, Σ)i are
weak system bisimilar.
As a corollary of the result above, a DIOC system and its projection are also trace
equivalent. Trace equivalence is defined as follows.
Definition 7.3 (Trace equivalence). A DIOC system hΣ, I, Ii and a DPOC system hI, N i
are (weak) trace equivalent iff their sets of (weak) traces coincide.
The following lemma shows that, indeed, weak system bisimilarity implies weak trace
equivalence.
Lemma 7.4. Let hΣ, I, Ii be a DIOC system and hI0 , N i a DPOC system.
If hΣ, I, Ii ∼ hI0 , N i then the DIOC system hΣ, I, Ii and the DPOC system hI0 , N i are weak
trace equivalent.
Proof. The proof is by coinduction. Take a DIOC trace µ1 , µ2 , . . . of the DIOC system.
From bisimilarity, the DPOC system has a sequence of transitions with labels η1 , . . . , ηk , µ1
where η1 , . . . , ηk are weak transitions. Hence, the first label in the weak trace is µ1 . After
the transition with label µ1 , the DIOC system and the DPOC system are again bisimilar.
By coinductive hypothesis, the DPOC system has a weak trace µ2 , . . .. By composition the
DPOC system has a trace µ1 , µ2 , . . . as desired. The opposite direction is similar.
26
M. DALLA PREDA, M. GABBRIELLI, S. GIALLORENZO, I. LANESE, AND J. MAURO
Hence the following corollary holds.
Corollary 7.5 (Trace Equivalence). For each initial, connected DIOC process I, each state
Σ, each set of updates I, the DIOC system hΣ, I, Ii and the DPOC system hI, proj(I, Σ)i are
weak trace equivalent.
Proof. It follows from Theorem 7.2 and Lemma 7.4.
The following section presents the details of the proof of Theorem 7.2. The reader not
interested in such details can safely skip § 7.1 and go to § 7.2.
7.1. Detailed Proof of Correctness. In our proof strategy we rely on the distinctness of
indexes of DIOC constructs that, unfortunately, is not preserved by transitions due to while
unfolding.
Example 7.6. Consider the DIOC i : while b@R {j : x@R = e}. If the condition b
evaluates to true, in one step the application of Rule bDPOC |While-unfold e produces the
DIOC I below
j: x@R = e; i: while b@R {j: x@R = e}
where the index j occurs twice.
To solve this problem, instead of using indexes, we rely on global indexes built on top of
indexes. Global indexes can be used both at the DIOC level and at the DPOC level and
their distinctness is preserved by transitions.
Definition 7.7 (Global index). Given an annotated DIOC process I, or an annotated
DPOC network N , for each annotated construct with index ι we define its global index ξ as
follows:
• if the construct is not in the body of a while loop then ξ = ι;
• if the innermost while construct that contains the considered construct has global index
ξ 0 then the considered construct has global index ξ = ξ 0 : ι.
Example 7.8. Consider the DIOC I in Example 7.6. The first assignment with index j
also has global index j, while the second assignment with index j has global index i: j, since
this last assignment is inside a while loop with global index i.
Lemma 7.9 (Distinctness of Global Indexes). Given a well-annotated DIOC I, a global
η1
ηn
state Σ, and a set of updates I, if hΣ, I, Ii −→ . . . −→ hΣ0 , I0 , I 0 i then all global indexes in I 0
are distinct.
Proof. The proof is by induction on the number n of transitions. Details are in Appendix B.
Using global indexes we can now define event structures corresponding to the execution
of DIOCs and DPOCs. We start by defining DIOC events. Some events correspond to
transitions of the DIOC, and we say that they are enabled when the corresponding transition
is enabled, executed when the corresponding transition is executed.
Definition 7.10 (DIOC events). We use ε to range over events, and we write [ε]R to
highlight that event ε is performed by role R. An annotated DIOC I contains the following
events:
DYNAMIC CHOREOGRAPHIES
27
Communication events: a sending event ξ : o@R2 in role R1 and a receiving event
ξ : o@R1 in role R2 for each interaction i: o : R1 (e) → R2 (x) with global index ξ; we also
denote the sending event as fξ or [fξ ]R1 and the receiving event as tξ or [tξ ]R2 . Sending and
receiving events correspond to the transition executing the interaction.
Assignment events: an assignment event εξ in role R for each assignment i: x@R = e
with global index ξ; the event corresponds to the transition executing the assignment.
Scope events: a scope initialisation event ↑ξ and a scope termination event ↓ξ for
each scope i: scope @R {I} with global index ξ. Both these events belong to all the roles
in roles(I). The scope initialisation event corresponds to the transition performing or not
performing an update on the given scope. The scope termination event is just an auxiliary
event (related to the auxiliary interactions implementing the scope termination).
If events: a guard if-event εξ in role R for each construct i: if b@R {I} else {I 0 } with
global index ξ; the guard-if event corresponds to the transition evaluating the guard of the
condition.
While events: a guard while-event εξ in role R for each construct i: while b@R {I}
with global index ξ; the guard-while event corresponds to the transition evaluating the guard
of the while loop.
Function events(I) denotes the set of events of the annotated DIOC I. A sending and a
receiving event with the same global index ξ are called matching events. We denote with ε
an event matching event ε. A communication event is either a sending event or a receiving
event. A communication event is unmatched if there is no event matching it.
As a corollary of Lemma 7.9 events have distinct names. Note also that, for each while
loop, there are events corresponding to the execution of just one iteration of the loop. If
unfolding is performed, new events are created.
Similarly to what we have done for DIOC, we can define events for DPOC as follows.
Definition 7.11 (DPOC events). An annotated DPOC network N contains the following
events:
Communication events: a sending event ξ : o? @R2 in role R1 for each send ι : i.o? :
e to R2 with global index ξ in role R1 ; and a receiving event ξ : o? @R1 in role R2 for
each receive ι: i.o? : x from R1 with global index ξ in role R2 ; we also denote the sending
event as fξ or [fξ ]R1 ; and the receiving event as tξ or [tξ ]R2 . Sending and receiving events
correspond to the transitions executing the corresponding communication.
Assignment events: an assignment event εξ in role R for each assignment i: x = e with
global index ξ; the event corresponds to the transition executing the assignment.
Scope events: a scope initialisation event ↑ξ and a scope termination event ↓ξ for each
i: scope @R {P } roles {S} or i: scope @R {P } with global index ξ. Scope events with
the same global index coincide, and thus the same event may belong to different roles;
the scope initialisation event corresponds to the transition performing or not performing
an update on the given scope for the role leading the update. The scope termination
event is just an auxiliary event (related to the auxiliary interactions implementing the
scope termination).
If events: a guard if-event εξ in role R for each construct i: if b {P } else {P 0 } with global
index ξ; the guard-if event corresponds to the transition evaluating the guard of the
condition.
28
M. DALLA PREDA, M. GABBRIELLI, S. GIALLORENZO, I. LANESE, AND J. MAURO
While events: a guard while-event εξ in role R for each construct i: while b {P } with
global index ξ; the guard-while event corresponds to the transition evaluating the guard
of the while loop.
Let events(N ) denote the set of events of the network N . A sending and a receiving event
with either the same global index ξ or with global indexes differing only for replacing index
i? with iT or iF are called matching events. We denote with ε an event matching event ε.
With a slight abuse of notation, we write events(P ) to denote events originated by
constructs in process P , assuming the network N to be understood. We use the same syntax
for events of DIOCs and of DPOCs. Indeed, the two kinds of events are strongly related (cf.
Lemma 7.15).
We define below a causality relation ≤DIOC among DIOC events based on the constraints
given by the semantics on the execution of the corresponding transitions.
Definition 7.12 (DIOC causality relation). Let us consider an annotated DIOC I. A
causality relation ≤DIOC ⊆ events(I) × events(I) is the minimum reflexive and transitive
relation satisfying:
Sequentiality: let I 0 ; I 00 be a subterm of DIOC I. If ε0 is an event in I 0 and ε00 is an
event in I 00 , then ε0 ≤DIOC ε00 .
Scope: let i: scope @R {I 0 } be a subterm of DIOC I. If ε0 is an event in I 0 then
↑ξ ≤DIOC ε0 ≤DIOC ↓ξ .
Synchronisation: for each interaction the sending event precedes the receiving event.
If: let i: if b@R {I 00 } else {I 00 } be a subterm of DIOC I, let εξ be the guard if-event
in role R, then for every event ε0 in I 0 and for every event ε00 in I 00 we have εξ ≤DIOC ε0
and εξ ≤DIOC ε00 .
While: let i: while b@R {I 0 } be a subterm of DIOC I, let εξ be the guard while-event
in role R, then for every event ε0 in I 0 we have εξ ≤DIOC ε0 .
As expected, the relation ≤DIOC is a partial order.
Lemma 7.13. Let us consider an annotated DIOC I. The relation ≤DIOC among events
of I is a partial order.
Proof. A partial order is a relation which is reflexive, transitive, and antisymmetric. Reflexivity and transitivity follow by definition. We show antisymmetry by showing that ≤DIOC
does not contain any cycle. The proof is by structural induction on the DIOC I. The base
cases are interaction, assignment, 1, and 0, which are all trivial. In the case of sequence,
I 0 ; I 00 , by inductive hypothesis there are no cycles among the events of I 0 nor among events
of I 00 . Since all events of I 0 precede all events of I 00 , there are no cycles among the events
of I 0 ; I 00 . In the case of parallel composition, I 0 |I 00 , there is no relation between events in
I 0 and in I 00 , hence the thesis follows. In the case of conditional i: if b@R {I 0 } else {I 00 }
there are no relations between events in I 0 and in I 00 and all the events follow the guard-if
event. Hence the thesis follows. The cases of while and scope are similar.
We can now define a causality relation ≤DP OC among DP OC events.
Definition 7.14 (DPOC causality relation). Let us consider an annotated DPOC network
N . A causality relation ≤DP OC ⊆ events(N ) × events(N ) is the minimum reflexive and
transitive relation satisfying:
Sequentiality: Let P 0 ; P 00 be a subterm of DPOC network N . If ε0 is an event in P 0
and ε00 is an event in P 00 then ε0 ≤DP OC ε00 .
DYNAMIC CHOREOGRAPHIES
29
Scope: Let i: scope @R {P } roles {S} or i: scope @R {P } be a subterm of DPOC
N with global index ξ. If ε0 is an event in P then ↑ξ ≤DP OC ε0 ≤DP OC ↓ξ .
Synchronisation: For each pair of events ε and ε0 , ε ≤ ε0 implies ε ≤DP OC ε0 .
If: Let i: if b {P } else {P 0 } be a subterm of DPOC network N with global index ξ, let
εξ be the guard if-event, then for every event ε in P and for every event ε0 in P 0 we have
εξ ≤DP OC ε and εξ ≤DP OC ε0 .
While: Let i: while b {P } be a subterm of DPOC network N with global index ξ, let
εξ be the guard while-event, then for every event ε in P we have εξ ≤DP OC ε.
On DP OC networks obtained as projections of well-annotated DIOCs the relation
≤DP OC is a partial order, as expected. However, since this result is not needed in the
remainder of the paper, we do not present its proof.
There is a relation between DIOC events and causality relation and their counterparts
at the DP OC level. Indeed, the events and causality relation are preserved by projection.
Lemma 7.15. Given a well-annotated connected DIOC process I and for each state Σ the
DPOC network proj(I, Σ) is such that:
(1) events(I) ⊆ events(proj(I, Σ));
(2) ∀ ε1 , ε2 ∈ events(I).ε1 ≤DIOC ε2 ⇒ ε1 ≤DP OC ε2 ∨ ε1 ≤DP OC ε2
Proof. The events of a DPOC obtained by projecting a DIOC I are included in the events
of the DIOC I by definition of projection. The preservation of the causality relation can be
proven by a case analysis on the condition used to derive the dependency (i.e., sequentiality,
scope, synchronisation, if and while). Details are in Appendix B.
To complete the definition of our event structure we now define a notion of conflict between
(DIOC and DPOC) events, relating events which are in different branches of the same
conditional.
Definition 7.16 (Conflicting events). Given a DIOC process I, two events ε, ε0 ∈ events(I)
are conflicting if they belong to different branches of the same conditional, i.e., there exists
a subprocess i: if b@R {I 0 } else {I 00 } of I such that ε ∈ events(I 0 ) ∧ ε0 ∈ events(I 00 ) or
ε0 ∈ events(I 0 ) ∧ ε ∈ events(I 00 ).
Similarly, given a DPOC network N , we say that two events ε, ε0 ∈ events(N ) are
conflicting if they belong to different branches of the same conditional, i.e., there exists
a subprocess i : if b {P } else {P 0 } of N such that ε ∈ events(P ) ∧ ε0 ∈ events(P 0 ) or
ε0 ∈ events(P ) ∧ ε ∈ events(P 0 ).
Similarly to what we did for DIOCs, we define below well-annotated DPOCs. Wellannotated DPOCs include all DPOCs obtained by projecting well-annotated DIOCs. As
stated in the definition below, and proved in Lemma 7.20, well-annotated DPOCs enjoy
various properties useful for our proofs.
Definition 7.17 (Well-annotated DPOC). An annotated DPOC network N is well annotated for its causality relation ≤DP OC if the following conditions hold:
C1: for each global index ξ there are at most two communication events on programmerspecified operations with global index ξ and, in this case, they are matching events;
C2: only events which are minimal according to ≤DP OC may correspond to enabled transitions;
30
M. DALLA PREDA, M. GABBRIELLI, S. GIALLORENZO, I. LANESE, AND J. MAURO
C3: for each pair of non-conflicting sending events [fξ ]R1 and [fξ0 ]R1 on the same operation i.o? with the same target R2 such that ξ 6= ξ 0 we have [fξ ]R1 ≤DP OC [fξ0 ]R1 or
[fξ0 ]R1 ≤DP OC [fξ ]R1 ;
C4: for each pair of non-conflicting receiving events [tξ ]R2 and [tξ0 ]R2 on the same operation
i.o? with the same sender R1 such that ξ 6= ξ 0 we have [tξ ]R2 ≤ [tξ0 ]R2 or [tξ0 ]R2 ≤ [tξ ]R2 ;
C5: if ε is an event inside a scope with global index ξ then its matching events ε (if they
exist) are inside a scope with the same global index.
C6: if two events have the same index but different global indexes then one of them, let us
call it ε1 , is inside the body of a while loop with global index ξ1 and the other, ε2 , is not.
Furthermore, ε2 ≤DP OC εξ1 where εξ1 is the guarding while-event of the while loop with
global index ξ1 .
Since scope update, conditional, and iteration at the DIOC level happen in one step, while
they correspond to many steps of the projected DPOC, we introduce a function, denoted
upd, that bridges this gap. More precisely, function upd is obtained as the composition of
two functions, a function compl that completes the execution of DIOC actions which have
already started, and a function clean that eliminates all the auxiliary closing communications
of scopes (scope execution introduces in the DPOC auxiliary communications which have
no correspondence in the DIOC).
Definition 7.18 (upd function). Let N be an annotated DPOC (we drop indexes if
not relevant). The upd function is defined as the composition of a function compl and a
function clean. Thus, upd(N ) = clean(compl(N )). Network compl(N ) is obtained from N
by repeating the following operations while possible.
(1) Performing the reception of the positive evaluation of the guard of a while loop, by
replacing for every i.wb∗i : true to R0 enabled, all the terms
i.wb∗i : xi from R; while xi {P ; i.we∗i : ok to R; i.wb∗i : xi from R}
not inside another while construct, with
P ; i.we∗i : ok to R; i.wb∗i : xi from R; while xi {P ; i.we∗i : ok to R; i.wb∗i : xi from R}
and replace i.wb∗i : true to R0 with 1.
(2) Performing the reception of the negative evaluation of the guard of a while loop by
replacing, for every i.wb∗i : false to R0 enabled, all the terms
i.wb∗i : xi from R; while xi {P ; i.we∗i : ok to R; i.wb∗i : xi from R}
not inside another while construct, with 1, and replace i.wb∗i : false to R0 with 1.
(3) Performing the unfolding of a while loop by replacing every
while xi {P ; i.we∗i : ok to R; i.wb∗i : xi from R}
enabled not inside another while construct, such that xi evaluates to true in the local
state, with
P ; i.we∗i : ok to R; i.wb∗i : xi from R; while xi {P ; i.we∗i : ok to R; i.we∗i : xi from R}
(4) Performing the termination of while loop by replacing every
while xi {P ; i.we∗i : ok to R; i.wb∗i : xi from R}
enabled not inside another while construct, such that xi evaluates to false in the local
state, with 1.
DYNAMIC CHOREOGRAPHIES
31
(5) Performing the reception of the positive evaluation of the guard of a conditional by
replacing, for every i.cnd∗i : true to R0 enabled, all the terms
i.cnd∗i : xi from R; if xi {P 0 } else {P 00 }
not inside a while construct with P 0 , and replace i.cnd∗i : true to R0 with 1.
(6) Performing the reception of the negative evaluation of the guard of a conditional by
replacing, for every i.cnd∗i : false to R0 enabled, all the terms
i.cnd∗i : xi from R; if xi {P 0 } else {P 00 }
not inside a while construct, with P 00 , and replace i.cnd∗i : false to R0 with 1.
(7) Performing the selection of the “then” branch by replacing every
if xi {P 0 } else {P 00 }
enabled, such that xi evaluates to true in the local state, with P 0 .
(8) Performing the selection of the “else” branch by replacing every
if xi {P 0 } else {P 00 }
enabled, such that xi evaluates to false in the local state, with P 00 .
(9) Performing the communication of the updated code by replacing, for every
i.sb∗i : P to S enabled, all the terms
i: scope @R {P 0 }
in role S not inside a while construct with P , and replace i.sb∗i : P to S with 1.
(10) Performing the communication that no update is needed by replacing, for each
i.sb∗i : no to S enabled, all the terms
i: scope @R {P 0 }
in role S not inside a while construct with P 0 , and replace i.sb∗i : P to S with 1.
Network clean(N ) is obtained from N by repeating the following operations while possible:
• Removing the auxiliary communications for end of scope and end of while loop synchronisation by replacing each
i.se∗i : ok to R
i.se∗i : from R
iC : i.we∗i : ok to R
iC : i.we∗i : from R
not inside a while construct with 1.
Furthermore clean may apply 0 or more times the following operation:
• replace a subterm 1; P by P or a subterm 1 | P by P .
Note that function compl does not reduce terms inside a while construct. Assume, for
instance, to have an auxiliary send targeting a receive inside the body of a while loop.
These two communications should not interact since they have different global indexes. This
explains why we exclude terms inside the body of while loops.
We proceed now to prove some of the proprieties of DIOC and DPOC. The first result
states that in a well-annotated DPOC only transitions corresponding to events minimal with
respect to the causality relation ≤DP OC may be enabled.
Lemma 7.19. If N is a DPOC, ≤DP OC its causality relation and ε is an event corresponding
to a transition enabled in N then ε is minimal with respect to ≤DP OC .
32
M. DALLA PREDA, M. GABBRIELLI, S. GIALLORENZO, I. LANESE, AND J. MAURO
Proof. The proof is by contradiction. Suppose ε is enabled but not minimal, i.e., there exists
ε0 such that ε0 ≤DP OC ε. If there is more than one such ε0 consider the one such that the
length of the derivation of ε0 ≤DP OC ε is minimal. This derivation should have length one,
and following Definition 7.14 it may result from one of the following cases:
• Sequentiality: ε0 ≤DP OC ε means that ε0 ∈ events(P 0 ), ε ∈ events(P 00 ), and P 0 ; P 00 is a
subterm of N . Because of the semantics of sequential composition ε cannot be enabled.
• Scope: let i: scope @R {P } roles {S} or i: scope @R {P } be a subprocess of N with
global index ξ. We have the following cases:
– ε0 =↑ξ and ε ∈ events(P ), and this implies that ε cannot be enabled since if ε0 is enabled
then the Rule bDPOC |Up e or Rule bDPOC |NoUp e for starting the execution of the scope
have not been applied yet;
– ε0 =↑ξ and ε =↓ξ , or ε0 ∈ events(P ) and ε =↓ξ : this is trivial, since ↓ξ is an auxiliary
event and no transition corresponds to it;
• If: ε0 ≤DP OC ε means that ε0 is the evaluation of the guard of a subterm
i : if xi {P 0 } else {P 00 } and ε ∈ events(P 0 ) ∪ events(P 00 ). Event ε cannot be enabled
because of the semantics of conditionals.
• While: ε0 ≤DP OC ε means that ε0 is the evaluation of the guard of a subterm
i: while xi {P } and ε ∈ events(P ). Event ε cannot be enabled because of the semantics
of the while loop.
We now prove that all the DPOCs obtained as projection of well-annotated connected DIOCs
are well-annotated.
Lemma 7.20. Let I be a well-annotated connected DIOC process and Σ a state. Then the
projection N = proj(I, Σ) is a well-annotated DPOC network with respect to ≤DP OC .
Proof. We have to prove that proj(I, Σ) satisfies the conditions of Definition 7.17. We have
a case for each condition. Details in Appendix B.
The next lemma shows that for every starting set of updates I the DPOC N and upd(N )
have the same set of weak traces.
Lemma 7.21. Let N be a DPOC. The following properties hold:
√
η
(1) if hI, upd(N )i −
→ hI0 , N 0 i with η ∈ {o? : R1 (v) → R2 (x), o∗ : R1 (X) → R2 (), I0 , , I,
η1
ηk η
no-up, τ } then there exists N 00 such that hI, N i −→ . . . −→
−
→ hI0 , N 00 i where ηi ∈ {o∗ :
∗
R1 (v) → R2 (x), o : R1 (X) → R2 (), τ } for each i ∈ {1, . . . , k} and upd(N 00 ) = upd(N 0 ).
√
η
(2) if hI, N i −
→ hI0 , N 0 i for η ∈ {o? : R1 (v) → R2 (x), o∗ : R1 (X) → R2 (), I0 , , I, no-up, τ },
then one of the following holds:
(a) upd(N ) = upd(N 0 ) and η ∈ {o∗ : R1 (v) → R2 (x), o∗ : R1 (X) → R2 (), τ }, or
η
(b) hI, upd(N )i −
→ hI0 , N 00 i such that upd(N 0 ) = upd(N 00 ).
DYNAMIC CHOREOGRAPHIES
33
Proof.
(1) Applying the upd function corresponds to perform weak transitions, namely transitions
with labels in {o∗ : R1 (v) → R2 (x), o∗ : R1 (X) → R2 (), τ }. Some of such transitions
may not be enabled yet. Hence, N may perform the subset of the weak transitions
above which are or become enabled, reducing to some N 000 . Then, η is enabled also in
η
N 000 and we have hI, N 000 i −
→ hI0 , N 00 i. At this point we have that N 00 and N 0 may differ
only for the weak transitions that were never enabled, which can be executed by upd.
(2) There are two cases. In the first case the transition with label η is one of the transitions
executed by function upd. In this case the condition 2a holds. In the second case, the
transition with label η is not one of the transitions executed by function upd. In this
case the transition with label η is still enabled in upd(N ) and can be executed. This
leads to a network that differs from N 0 only because of transitions executed by the upd
function and case 2b holds.
√
We now prove a property of transitions with label .
√
Lemma 7.22. For each DIOC system hΣ, I, Ii that reduces with a transition labelled
then, for√each role R ∈ roles(I), the DPOC role (π(I, R), ΣR )R can reduce with a transition
labelled
and vice versa.
√
Proof. Note that a DIOC can perform a transition with label only if it is a term obtained
using sequential and/or parallel composition starting from 1 constructs. The projection has
the same shape, hence it can perform the desired transition. The other direction is similar.
We can now prove our main theorem (Theorem 7.2, restated below) for which, given a
connected well-annotated DIOC process I and a state Σ, the DPOC network obtained as
its projection has the same behaviours of I.
Theorem 7.2 (Correctness). For each initial, connected DIOC process I, each state Σ,
each set of updates I, the DIOC system hΣ, I, Ii and the DPOC system hI, proj(I, Σ)i are
weak system bisimilar.
Proof. We prove that the relation R below is a weak system bisimulation.
upd(N ) = proj(I, Σ),
events(I) ⊆ events(compl(N )),
R=
(hΣ, I, Ii , hI, N i)
∀
ε1 , ε2 ∈ events(I) .
ε1 ≤DIOC ε2 ⇒ ε1 ≤DP OC ε2 ∨ ε1 ≤DP OC ε2
where I is obtained from a well-annotated connected DIOC via 0 or more transitions
and upd(N ) is a well-annotated DPOC.
To ensure that proving that the relation above is a weak system bisimulation implies
our thesis, let us show that the pair (hΣ, I, Ii , hI, proj(I, Σ)i) from the theorem statement
belongs to R. Note that here I is well-annotated and connected, and for each such
I we have upd(proj(I, Σ)) = proj(I, Σ). From Lemma 7.20 proj(I, Σ) is well-annotated,
thus upd(proj(I, Σ)) is well-annotated. Observe that compl is the identity on proj(I, Σ),
thus from Lemma 7.15 we have that the conditions events(I) ⊆ events(compl(N )) and
∀ε1 , ε2 ∈ events(I) . ε1 ≤DIOC ε2 ⇒ ε1 ≤DP OC ε2 ∨ ε1 ≤DP OC ε2 are satisfied.
34
M. DALLA PREDA, M. GABBRIELLI, S. GIALLORENZO, I. LANESE, AND J. MAURO
We now prove that R is a weak system bisimulation. To prove it, we show below that
it is enough to consider only the case in which N (and not upd(N )) is equal to proj(I, Σ).
Furthermore, in this case the transition of hΣ, I, Ii is matched by the first transition of
hI, proj(I, Σ)i.
Formally, for each (hΣ, I, Ii , hI, N i) where N = proj(I, Σ) we have to prove the following
simplified bisimulation clauses.
µ
µ
• if hΣ, I, Ii −
→ hΣ00 , I00 , I 00 i then hI, N i −
→ hI00 , N 000 i with (hΣ00 , I00 , I 00 i , hI00 , N 000 i) ∈ R;
√
η
• if hI, N i −
→ hI00 , N 000 i with η ∈ {o : R1 (v) → R2 (x); ; I; no-up; I00 ; τ } then
η
hΣ, I, Ii −
→ hΣ00 , I00 , I 00 i and (hΣ00 , I00 , I 00 i , hI00 , N 000 i) ∈ R.
µ
In fact, consider a general network Ng with upd(Ng ) = proj(I, Σ). If hΣ, I, Ii −
→ hΣ00 , I00 , I 00 i,
µ
then by hypothesis hI, upd(Ng )i −
→ hI00 , N 000 i. From Lemma 7.21 case 1 there exists N 00 such
η1
ηk µ
that hI, Ng i −→ . . . −→−
→ hI00 , N 00 i where ηi ∈ {o∗ : R1 (v) → R2 (x), o∗ : R1 (X) → R2 (), τ }
for each i ∈ {1, . . . , k} and upd(N 00 ) = upd(N 000 ). By hypothesis (hΣ00 , I00 , I 00 i , hI00 , N 000 i) ∈ R,
hence, by definition of R, upd(N 000 ) = proj(I 00 , Σ00 ), and therefore also upd(N 00 ) = proj(I 00 , Σ00 ).
The conditions on events hold by hypothesis since function upd has no effect on DPOC
events corresponding to DIOC events. Furthermore, only enabled interactions have been
executed, hence dependencies between DPOC events corresponding to DIOC events are
untouched.
√
η
If instead hI, Ng i −
→ hI00 , N 000 i with η ∈ {o? : R1 (v) → R2 (x), o∗ : R1 (X) → R2 (), , I,
no-up, I00 , τ } then thanks to Lemma 7.21 we have one of the following: (2a) upd(Ng ) =
η
upd(N 000 ) and η ∈ {o∗ : R1 (v) → R2 (x), o∗ : R1 (X) → R2 (), τ }, or (2b) hI, upd(Ng )i −
→
η
hI00 , N 00 i such that upd(N 000 ) = upd(N 00 ). In case (2b) we have hI, upd(Ng )i −
→ hI00 , N 00 i.
η
Then, by hypothesis, we have hΣ, I, Ii −
→ hΣ00 , I00 , I 00 i and (hΣ00 , I00 , I 00 i , hI00 , N 00 i) ∈ R. To
deduce that (hΣ00 , I00 , I 00 i , hI00 , N 000 i) ∈ R, one can proceed using the same strategy as the
case of the challenge from the DIOC above. In case (2a) the step is matched by the DIOC
by staying idle, following the second option in the definition of weak system bisimulation.
The proof is similar to the one above.
Thus, we have to prove the two simplified bisimulation clauses above. The proof is
by structural induction on the DIOC I. All the subterms of a well-annotated connected
DIOC are well-annotated and connected, thus the induction can be performed. We√consider
both challenges from the DIOC (→) and from the DPOC (←). The case for label follows
from Lemma 7.22. The case for labels I is trivial. Let us consider the other labels, namely
o : R1 (v) → R2 (x), I, no-up, and τ .
Note that no transition (at the DIOC or at the DPOC level) with one of these labels
can change the set of updates I. Thus, in the following, we will not write it. Essentially, we
will use DIOC processes and DPOC networks instead of DIOC systems and DPOC systems,
respectively. Note that DPOC networks also include the state, while this is not the case
for DIOC processes. For DIOC processes, we assume to associate to them the state Σ, and
comment on its changes whenever needed.
Case 1, 0: trivial.
Case i: x@R = e: the assignment changes the global state in the DIOC, and its projection
on the role R changes the local state of the role in the DPOC in a corresponding way.
Case i: o : R1 (e) → R2 (x): trivial. Just note that at the DPOC level the interaction gives
rise to one send and one receive with the same operation and prefixed by the same index.
DYNAMIC CHOREOGRAPHIES
35
Synchronisation between send and receive is performed by Rule bDPOC |Synch e that also
removes the index from the label.
Case I; I 0 : from the definition of the projection function we have that N =kR∈roles(I;I 0 )
(π(I, R); π(I 0 , R), ΣR )R .
µ
→: Assume that I; I 0 −
→ I 00 with µ ∈ {o : R1 (v) → R2 (x); I; no-up, τ }. There are two
µ
possibilities: either (i ) I −
→ I 000 and I 00 = I 000 ; I 0 or (ii ) I has a transition with label
√
µ
and I 0 −
→ I 00 .
In case (i ) by inductive hypothesis
µ
kR∈roles(I) (π(I, R), ΣR )R −
→ N 000 and upd(N 000 ) =kR∈roles(I) π(I 000 , R), Σ0R R
Thus
µ
kR∈roles(I) π(I, R); π(I 0 , R), ΣR R −
→ N and
000
0
upd(N ) =kR∈roles(I) π(I , R); π(I , R), Σ0R R
If roles(I 0 ) ⊆ roles(I) then the thesis follows. If roles(I 0 ) 6⊆ roles(I) then at the DPOC
level the processes in the roles in roles(I 0 ) \ roles(I) are not affected by the transition.
Note however that the projection of I on these roles is a term composed only by 1s,
and the ones corresponding to parts of I that have been consumed can be removed
by the clean part of function upd.
√
µ
In case (ii ), I has a transition with label and I 0 −
→ I 00 . By inductive hypothesis
µ
proj(I 0 , Σ) −
→ N 00 and upd(N 00 ) = proj(I 00 , Σ0 ). The thesis follows since, thanks to
µ
Lemma 7.22, proj(I; I 0 , Σ) −
→ N and upd(N ) = proj(I 00 , Σ0 ), possibly using the clean
part of function upd to remove the 1s which are no more needed.
Note that, in both the cases, conditions on events follow by inductive hypothesis.
←: Assume that
η
N =kR∈roles(I;I 0 ) π(I, R); π(I 0 , R), ΣR R −
→kR∈roles(I;I 0 ) PR , Σ0R R
with η ∈ {o : R1 (v) → R2 (x), I, no-up, τ }. We have a case analysis on η.
If η = o : R1 (v) → R2 (x) then
i.ohvi@R2 :R1
π(I; I 0 , R1 ), ΣR1 R1 −−−−−−−−→ (PR1 , ΣR1 )R1 and
π(I; I 0 , R2 ), ΣR2
i.o(x←v)@R1 :R2
R2
−−−−−−−−−−−→ (PR2 , ΣR2 )R2
The two events have the same global index since they have the same index i (otherwise
they could not synchronise) and they are both outside of any while loop (since they
are enabled), hence the global index coincides with the index. Thus, they are either
both from I or both from I 0 .
In the first case we have also
o:R1 (v)→R2 (x)
00
kR∈roles(I;I 0 ) (π(I, R), ΣR )R −−−−−−−−−−→kR∈roles(I;I 0 ) PR
, ΣR R
o:R1 (v)→R2 (x)
00 ; π(I 0 , R). Thus, by inductive hypothesis, I −
with PR = PR
−−−−−−−−−→ I 00 and
00
00
upd(kR∈roles I;I 0 (PR , ΣR )R ) = proj(I , Σ). Hence, we have that
o:R1 (v)→R2 (x)
I; I 0 −−−−−−−−−−→ I 00 ; I 0
36
M. DALLA PREDA, M. GABBRIELLI, S. GIALLORENZO, I. LANESE, AND J. MAURO
and
00
; π(I 0 , R), ΣR R ) = proj(I 00 ; I 0 , Σ)
upd(kR∈roles I;I 0 PR
The thesis follows.
In the second case, we need to show that the interaction o : R1 (v) → R2 (x) is
enabled. Assume that this is not the case. This means that there is a DIOC event
ε corresponding to some construct in I. Because of the definition of R, ε is also a
DPOC event and ε ≤DP OC ξ : o@R2 ∨ ε ≤DP OC ξ : o@R1 . Hence, at least one of the
two events is not minimal and the corresponding transition cannot be enabled, against
our hypothesis. Therefore the interaction o : R1 (v) → R2 (x) is enabled. Thus, I has
√
o:R1 (v)→R2 (x)
a transition with label and I 0 −−−−−−−−−−→ I 00 . Thanks to Lemma 7.22
√ then both
(π(I, R1 ), ΣR1 )R1 and (π(I, R2 ), ΣR2 )R2 have a transition with label . Thus, we
have
i.ohvi@R2 :R1
π(I 0 , R1 ), ΣR1 R1 −−−−−−−−→ (PR1 , ΣR1 )R1
i.o(x←v)@R1 :R2
π(I 0 , R2 ), ΣR2 R2 −−−−−−−−−−−→ (PR2 , ΣR2 )R2 and thus
o:R1 (v)→R2 (x)
proj(I 0 , Σ) −−−−−−−−−−→kR∈roles(I 0 ) (PR , ΣR )R
The thesis follows by inductive hypothesis.
For the other cases of η, all the roles but one are unchanged. The proof of these cases
is similar to the one for interaction, but simpler.
Note that in all the above cases, conditions on events follow by inductive hypothesis.
Case I|I 0 : from the definition of the projection function we have
N =kR∈roles(I;I 0 ) (π(I, R) | π(I 0 , R), ΣR )R
→: We have a case analysis on the rule used to derive the transition. If the transition
is derived using Rule bDIOC |Parallel e and I|I 0 can perform a transition with label
µ then one of its two components can perform a transition with the same label µ
and the thesis follows by inductive hypothesis. Additional roles not occurring in the
term performing the transition are dealt with by the clean part of function upd. If
instead the transition is derived using Rule bDIOC |Par-end e then the thesis follows
from Lemma 7.22.
←: We have a case analysis on the label η of the transition. If η = o? : R1 (v) → R2 (x)
then a send and a receive on the same operation are enabled. The two events have
the same global index since they have the same index i (otherwise they could not
synchronise) and they are both outside of any while loop (since they are enabled),
hence the global index coincides with the index. Thus, they are either both from I or
both from I 0 . The thesis follows by inductive hypothesis. For the other cases of η,
only the process of one role changes. The thesis follows by inductive hypothesis. In
all the cases, roles not occurring in the term performing the transition are dealt with
by function upd.
DYNAMIC CHOREOGRAPHIES
37
Case i: if b@R {I} else {I 0 }: from the definition of projection
N = kS∈roles(I,I 0 )r{R} i? : i.cnd∗i : xi from R; i: if xi {π(I, S)} else {π(I 0 , S)}, ΣS
k
S
Y
iT : i.cnd∗i : true to R0 ; π(I, R)
i: if b
R0 ∈roles(I,I 0 )r{R}
!
Y
iF : i.cnd∗i : false to R0 ; π(I 0 , R) , ΣR
else
R
R0 ∈roles(I,I 0 )r{R}
Let us consider the case when the guard is true (the other one is analogous).
τ
→: The only possible transition from the DIOC is i: if b@R {I} else {I 0 } −
→ I. The
DPOC can match this transition by reducing to
i? : i.cnd∗i : xi from R;
0
N = kS∈roles(I,I 0 )r{R}
, ΣS
k
i: if xi {π(I, S)} else {π(I 0 , S)}
S
Y
iT : i.cnd∗i : true to R0 ; π(I, R), ΣR
R0 ∈roles(I,I 0 )r{R}
R
By applying function upd we get
upd(N 0 ) = kS∈roles(I,I 0 )r{R} (π(I, S), ΣS )S k (π(I, R), ΣR )R
Concerning events, at the DIOC level events corresponding to the guard and to the
discarded branch are removed. The same holds at the DPOC level, thus conditions
on the remaining events are inherited. This concludes the proof.
←: The only possible transition from the DPOC is the evaluation of the guard from
the coordinator. This reduces N to N 0 above and the thesis follows from the same
reasoning.
Case i: while b@R {I}: from the definition of projection
i? : i.wb∗i : xi from R; i: while xi {π(I, S);
N = kS∈roles(I)r{R}
, ΣS
k
iC : i.we∗i : ok to R; i? : i.wb∗i : xi from R}
S
!
Q
iT : i.wb∗i : true to R0 ; π(I, R);
R0 ∈roles(I)r{R}
;
i: while b
Q
iC : i.we∗i : from R0
R0 ∈roles(I)r{R}
Q
iF : i.wb∗i : false to R0 , ΣR
R0 ∈roles(I)r{R}
R
→: Let us consider the case when the guard is true. The only possible transition from
τ
the DIOC is i: while b@R {I} −
→ I; i: while b@R {I}. The DPOC can match this
38
M. DALLA PREDA, M. GABBRIELLI, S. GIALLORENZO, I. LANESE, AND J. MAURO
transition by reducing to
0
N =kS∈roles(I)r{R}
i? : i.wb∗i : xi from R; i: while xi {π(I, S);
, ΣS
k
iC : i.we∗i : ok to R; i? : i.wb∗i : xi from R}
S
!
Q
iT : i.wb∗i : true to R0 ; π(I, R);
R0 ∈roles(I)r{R}
!
Q
iC : i.we∗i : from R0 ;
R0 ∈roles(I)r{R}
!
Q
∗
0
iT : i.wbi : true to R ; π(I, R);
R0 ∈roles
(I)r{R}
i: while b
Q
iC : i.we∗i : from R0
0
R ∈roles(I)r{R}
Q
iF : i.wb∗i : false to R0 , ΣR
0
R ∈roles(I)r{R}
By applying function upd we get
R0 ∈
;
R
k
π(I, R);
i: while b
Q
π(I, S); i? : i.wb∗i : xi from R;
i: while xi {π(I, S);
, ΣS
iC : i.we∗i : ok to R;
∗
i? : i.wbi : xi from R}
S
upd(N 0 ) =
kS∈roles(I)r{R}
Q
R0 ∈roles
Q (I)r{R}
R0 ∈roles(I)r{R}
roles(I)r{R}
!
iT : i.wb∗i : true to R0 ; π(I, R);
iC : i.we∗i : from R0
iF : i.wb∗i : false to R0
;
, ΣR
R
exactly the projection of I; i: while b@R {I}.
As far as events are concerned, in compl(N 0 ) we have all the needed events since, in
particular, we have already done the unfolding of the while in all the roles. Concerning
the ordering, at the DIOC level, we have two kinds of causal dependencies: (1) events
in the unfolded process precede the guard event; (2) the guard event precedes the
events in the body. The first kind of causal dependency is matched at the DPOC
level thanks to the auxiliary synchronisations that close the unfolded body (which
are not removed by compl) using synchronisation and sequentiality. The second kind
of causal dependency is matched thanks to the auxiliary synchronisations that start
the following iteration using synchronisation, sequentiality and while.
The case when the guard evaluates to false is simpler.
←: The only possible transition from the DPOC is the evaluation of the guard from
the coordinator. This reduces N to N 0 above and the thesis follows from the same
reasoning.
DYNAMIC CHOREOGRAPHIES
39
Case i: scope @R {I}: from the definition of the projection
N = kR0 ∈roles(I)r{R} i: scope @R {π(I, R0 )}, ΣR0 R0 k
(i: scope @R {π(I, R)} roles {roles(I)}, ΣR )R
→: Let us consider the case when the scope is updated. At the DIOC level all the
possible transitions have label of the form I 0 and are obtained by applying Rule
bDIOC |Up e. Correspondingly, at the DPOC level one applies Rule bDPOC |Lead-Up e to
the coordinator of the update, obtaining
N 0 = kR0 ∈roles(I)r{R} i: scope @R {π(I, R0 )}, ΣR0 R0 k
!
Q
∗
0
0
0
i.sbi : π(I , R ) to R ;
R0 ∈roles(I)r{R}
, ΣR
π(I 0 , R);
Q
i.se∗i : from R0
R0 ∈roles(I)r{R}
R
By applying the upd function we get:
upd(N 0 ) = kR0 ∈roles(I)r{R} π(I 0 , R0 ), ΣR0 R0 k π(I 0 , R), ΣR R
This is exactly the projection of the DIOC obtained after applying the rule bDIOC |Up e.
The conditions on events are inherited. Observe that the closing event of the scope is
replaced by events corresponding to the auxiliary interactions closing the scope. This
allows us to preserve the causality dependencies also when the scope is inserted in a
context.
The case of Rule bDIOC |NoUp e is simpler.
←: The only possible transitions from the DPOC are the ones of the coordinator of the
update checking whether to apply an update or not. This reduces N to N 0 above
and the thesis follows from the same reasoning.
7.2. Deadlock freedom, termination, and race freedom. Due to the fact that the
projection preserves weak traces, we have that trace-based properties of the DIOC are
inherited by the DPOC. A first example of such properties is deadlock freedom.
Definition 7.23 (Deadlock freedom). An internal DIOC (resp. DPOC) trace is obtained
by removing transitions labelled I from a DIOC (resp. DPOC) trace. √
A DIOC (resp. DPOC)
system is deadlock free if all its maximal finite internal traces have as last label.
Intuitively, internal traces are needed since labels I do not correspond to activities of
the
application
and may be executed also after application termination. The fact that after
√
a only changes in the set of available updates are possible is captured by the following
lemma.
Lemma √7.24. For each initial, connected DIOC I, state Σ, and set of updates I, if
hΣ, I, Ii −
→ hΣ0 , I0 , I 0 i then each transition of hΣ0 , I0 , I 0 i has label I00 for some I00 .
Proof. The proof is by case analysis on the rules which can derive a transition with label
All the cases are easy.
√
.
40
M. DALLA PREDA, M. GABBRIELLI, S. GIALLORENZO, I. LANESE, AND J. MAURO
Since by construction initial DIOCs are deadlock free we have that also the DPOC
obtained by projection is deadlock free.
Corollary 7.25 (Deadlock freedom). For each initial, connected DIOC I, state Σ, and set
of updates I the DPOC system hI, proj(I, Σ)i is deadlock free.
Proof. Let us first prove that for each initial, connected DIOC I, state Σ, and set of updates
I, the DIOC system hΣ, I, Ii
√ is deadlock free. This amounts to prove that all its maximal
finite internal traces have as last label. For each trace, the proof is by induction on its
length, and for each length by structural induction on I. The proof is based on the fact
that I is initial. The induction considers a reinforced hypothesis, saying also that:
√
•
may occur only as the last label of the internal trace;
• all the DIOC systems in the sequence of transitions generating the trace, but the last one,
are initial.
We have a case analysis on the top-level operator in I. Note that in all the cases, but 0, at
least a transition is derivable.
Case 0: not allowed since we assumed an initial DIOC.
√
Case 1: trivial because by Rule bDIOC |End e and Lemma 7.24 its only internal trace is .
Case x@R = e: the only applicable rule is bDIOC |Assign e that in one step leads to a 1
process. The thesis follows by inductive hypothesis on the length of the trace.
Case o? : R1 (e) → R2 (x): the only applicable rule is bDIOC |Interaction e, which leads to an
assignment. Then the thesis follows by inductive hypothesis on the length of the trace.
Case I; I 0 : the first transition can be derived either by Rule bDIOC |Sequence e or Rule
bDIOC |Seq-end e. In the first case the thesis follows by induction on the length of the
trace. In the second case the trace coincides with a trace of I 0 , and the thesis follows by
structural induction.
Case I|I 0 : the first transition can be derived either by Rule bDIOC |Parallel e or by Rule
[Par-End]. In the first case the thesis follows by induction on the length
√ of the trace.
In the second case the thesis follows by Lemma 7.24, since the label is .
Case if b@R {I} else {I 0 }: the first transition can be derived using either Rule
bDIOC |If-then e or Rule bDIOC |If-else e. In both the cases the thesis follows by induction
on the length of the trace.
Case while b@R {I}: the first transition can be derived using either Rule
bDIOC |While-unfold e or Rule bDIOC |While-exit e. In both the cases the thesis follows by
induction on the length of the trace.
Case scope @R {I}: the first transition can be derived using either Rule bDIOC |Up e or
Rule bDIOC |NoUp e. In both the cases the thesis follows by induction on the length of the
trace.
The weak internal traces of the DIOC coincide with the weak internal traces of the√DPOC
by Theorem 7.2, thus also the finite weak internal traces of √
the DPOC end with . The
same holds for the finite strong internal traces, since label
is preserved when
√ moving
between strong and weak traces, and no transition can be added after the
thanks to
Lemma 7.24.
DPOCs also inherit termination from terminating DIOCs.
Definition 7.26 (Termination). A DIOC (resp. DPOC) system terminates if all its internal
traces are finite.
DYNAMIC CHOREOGRAPHIES
41
Note that if arbitrary sets of updates are allowed, then termination of DIOCs that
contain at least a scope is never granted. Indeed, the scope can always be replaced by a
non-terminating update or it can trigger an infinite chain of updates. Thus, to exploit this
result, one should add constraints on the set of updates ensuring DIOC termination.
Corollary 7.27 (Termination). If the DIOC system hΣ, I, Ii terminates and I is connected
then the DPOC system hI, proj(I, Σ)i terminates.
Proof. It follows from the fact that only a finite number of auxiliary actions are added when
moving from DIOCs to DPOCs.
Other interesting properties derived from weak trace equivalence are freedom from races
and orphan messages. A race occurs when the same receive (resp. send) may interact with
different sends (resp. receives). In our setting, an orphan message is an enabled send that is
never consumed by a receive. Orphan messages are more relevant in asynchronous systems,
where a message may be sent, and stay forever in the network, since the corresponding
receive operation may never become enabled. However, even in synchronous systems
orphan messages should be avoided: the message is not communicated since the receive
is not available, hence a desired behaviour of the application never takes place due to
synchronisation problems. Trivially, DIOCs avoid races and orphan messages since send and
receive are bound together in the same construct. Differently, at the DPOC level, since all
receive of the form ι: i.o? : x from R1 in role R2 may interact with the sends of the form
ι: i.o? : e to R2 in role R1 , races may happen. However, thanks to the correctness of the
projection, race freedom holds also for the projected DPOCs.
Corollary 7.28 (Race freedom). For each initial, connected DIOC I, state Σ, and set
η1
ηn
0
?
∗
of updates I, if hI,
√ proj(I, Σ)i −→ · · · −→ hI , N i, where ηi ∈ {τ, o : R1 (v) → R2 (x), o :
R1 (X) → R2 (), , I, no-up, I} for each i ∈ {1, . . . , n}, then in N there are no two sends
(resp. receives) which can interact with the same receive (resp. send).
Proof. We have two cases, corresponding respectively to programmer-specified and auxiliary
operations.
For programmer-specified operations, thanks to Lemma 7.20, case C1, for each global
index ξ there are at most two communication events with global index ξ. The corresponding
DPOC terms can be enabled only if they are outside of the body of a while loop. Hence,
their index coincides with their global index. Since the index prefixes the operation, then no
interferences with other sends or receives are possible.
For auxiliary operations, the reasoning is similar. Note, in fact, that sends or receives with
the same global index can be created only by a unique DIOC construct, but communications
between the same pair of roles are never enabled together. This can be seen by looking at
the definition of the projection.
As far as orphan messages are concerned, they may appear in infinite DPOC computations since a receive may not become enabled due to an infinite loop. However, as a corollary
of trace equivalence, we have that terminating DPOCs are orphan-message free.
Corollary 7.29 (Orphan-message freedom). For each
initial, connected DIOC I, state Σ,
√
η1
ηn
and set of updates I, if hI,√
proj(I, Σ)i −→ · · · −→−
→ hI0 , N i, where ηi ∈ {τ, o? : R1 (v) →
∗
R2 (x), o : R1 (X) → R2 (), , I, no-up, I}, then N contains no sends.
√
Proof. The proof is by case analysis on the rules which can derive a transition with label .
All the cases are easy.
42
M. DALLA PREDA, M. GABBRIELLI, S. GIALLORENZO, I. LANESE, AND J. MAURO
8. Adaptable Interaction-Oriented Choreographies in Jolie
In this section we present AIOCJ (Adaptable Interaction-Oriented Choreographies in Jolie),
a development framework for adaptable distributed applications [28]. AIOCJ is one of the
possible instantiations of the theoretical framework presented in the previous sections and
it gives a tangible proof of the expressiveness and feasibility of our approach. We say that
AIOCJ is an instance of our theory because it follows the theory, but it provides mechanisms
to resolve the non-determinism related to the choice of whether to update or not and on
which update to select. Indeed, in AIOCJ updates are chosen and applied according to the
state of the application and of its running environment. To this end, updates are embodied
into adaptation rules, which specify when and whether a given update can be applied, and to
which scopes. AIOCJ also inherits all the correctness guarantees provided by our theory, in
particular: i ) applications are free from deadlocks and races by construction, ii ) applications
remain correct after any step of adaptation. As in the theory, adaptation rules can be added
and removed while applications are running.
Remark 8.1. In order for the correctness guarantees to be provided, one needs to satisfy
the required assumptions, in particular the fact that functions never block and always return
a value (possibly an error notification). If this condition is not satisfied, at the theoretical
level, the behaviour of the source DIOC and the behaviour of its projection may differ,
as described in Remark 2.2. The behaviour of the corresponding AIOCJ application can
be different from both of them. Usually, the violation of the assumption above leads the
application to crash. This allows the programmer to realise that the assumption has been
violated.
Below we give a brief overview of the AIOCJ framework by introducing its components:
the Integrated Development Environment (IDE), the AIOCJ compiler, and the Runtime
Environment.
Integrated Development Environment. AIOCJ supports the writing of programs and adaptation rules in the Adaptable Interaction-Oriented Choreography (AIOC) language, an
extension of the DIOC language. We discuss the main novelties of the AIOC language in
§ 8.1. AIOCJ offers an integrated environment for developing programs and adaptation
rules that supports syntax highlighting and on-the-fly syntax checking. Since checking
for connectedness (see § 6) of programs and adaptation rules is polynomial (as proven by
Theorem 6.3), the IDE also performs on-the-fly checks on connectedness of programs and
rules.
Compiler . The AIOCJ IDE also embeds the AIOCJ compiler, which implements the procedure for projecting AIOCs and adaptation rules into distributed executable code. The
implementation of the compiler is based on the rules for projecting DIOCs, described in § 4.
The target language of the AIOCJ compiler is Jolie [26, 35], a Service-Oriented language
with primitives similar to those of our DPOC language. Jolie programs are also called
services. Given an AIOC program, the AIOCJ compiler produces one Jolie service for each
role in the source AIOC. The compilation of an AIOC rule produces one Jolie service for
each role and an additional service that describes the applicability condition of the rule. All
these services are enclosed into an Adaptation Server, described below.
DYNAMIC CHOREOGRAPHIES
43
Runtime Environment. The AIOCJ runtime environment comprises a few Jolie services
that support the execution and adaptation of compiled programs. The main services of
the AIOCJ runtime environment are the Adaptation Manager, Adaptation Servers, and the
Environment. The compiled services interact both among themselves and with an Adaptation
Manager, which is in charge of managing the adaptation protocol. Adaptation Servers
contain adaptation rules, and they can be added or removed dynamically, thus enabling
dynamic changes in the set of rules, as specified by Rule bDIOC |Change-Updates e. When
started, an Adaptation Server registers itself at the Adaptation Manager. The Adaptation
Manager invokes the registered Adaptation Servers to check whether their adaptation rules
are applicable. In order to check whether an adaptation rule is applicable, the corresponding
Adaptation Server evaluates its applicability condition. Applicability conditions may refer
to the state of the role which coordinates the update, to properties of the scope, and to
properties of the environment (e.g., time, temperature, etc.), stored in the Environment
service.
In the remainder of this Section we detail the grammar of the AIOC language used by
AIOCJ in § 8.1, we illustrate the use of AIOCJ on a simple example in § 8.2, we discuss
some relevant implementation aspects of AIOCJ in § 8.3, and we present some guidelines on
how to use scopes in AIOCJ in § 8.4.
8.1. DIOC Language Extensions in AIOCJ. AIOCs extend DIOCs with:
• the definition of adaptation rules, instead of updates, that include the information needed
to evaluate their applicability condition;
• the definition of constructs to express the deployment information needed to implement
real-world distributed applications.
Below we describe in detail, using the Extended Backus-Naur Form [3], the new or refined
constructs introduced by the AIOC language.
Function inclusions. The AIOC language can exploit functionalities provided by external
services via the include construct. The syntax is as follows.
Include ::= include FName [ , FName ]* from " URL " [ with PROTOCOL ]
This allows one to reuse existing legacy code and to interact with third-party external
applications. As an example, the Seller of our running example can exploit an external
database to implement the functionality for price retrieval getPrice, provided that such a
functionality is exposed as a service. If the service is located at "socket://myService:8000"
and accessible via the "SOAP" protocol we enable its use with the following inclusion:
include getPrice from " socket :// myService :8000 " with " SOAP "
Similarly, the Bank IT system is integrated in the example by invoking the function
makePayment, also exposed as a service.
This feature enables a high degree of integration since AIOCJ supports all protocols
provided by the underlying Jolie language, which include TCP/IP, RMI, SOAP, XML/RPC,
and their encrypted correspondents over SSL.
External services perfectly fit the theory described in previous sections, since they are
seen as functions, and thus introduced in expressions. Notice, in particular, that Remark 8.1
applies.
Adaptation rules. Adaptation rules extend DIOC updates, and are a key ingredient of
the AIOCJ framework. The syntax of adaptation rules is as follows:
44
M. DALLA PREDA, M. GABBRIELLI, S. GIALLORENZO, I. LANESE, AND J. MAURO
Rule ::= rule {
[ Include ]*
on { Condition }
do { Choreography }
}
The applicability condition of the adaptation rule is specified using the keyword on,
while the code to install in case adaptation is performed (which corresponds to the DIOC
update) is specified using the keyword do. Optionally, adaptation rules can include functions
they rely on.
The Condition of an adaptation rule is a propositional formula which specifies when the
rule is applicable. To this end, it can exploit three sources of information: local variables of
the coordinator of the update, environmental variables, and properties of the scope to which
the adaptation rule is applied. Environmental variables are meant to capture contextual
information that is not under the control of the application (e.g., temperature, time, available
resources, . . . ). To avoid ambiguities, local variables of the coordinator are not prefixed,
environment variables are prefixed by E, and properties of the scope are prefixed by N.
For example, if we want to apply an adaptation rule only to those scopes whose property
name is equal to the string "myScope" we can use as applicability condition the formula
N.name == "myScope".
Scopes. As described above, scopes in AIOC also feature a set of properties (possibly
empty). Scope properties describe the current implementation of the scope, including both
functional and non-functional properties. Such properties are declared by the programmer,
and the system only uses them to evaluate the applicability condition of adaptation rules,
to decide whether a given adaptation rule can be applied to a given scope. Thus the syntax
for scopes in AIOC is:
scope @ Role { Choreography }
[ prop { Properties } ]?
where clause prop introduces a list of comma-separated assignments of the form
N.ID = Expression.
For instance, the code
scope @ R {
// AIOC code
} prop { N . name = " myScope " }
specifies that the scope has a property name set to the string "myScope", thus satisfying the
applicability condition N.name == "myScope" discussed above.
Programs. AIOC programs have the following structure.
Program ::=
[ Include ]*
preamble {
starter : Role
[ Location ]*
}
aioc { Choreography }
DYNAMIC CHOREOGRAPHIES
45
where Include allows one to include external functionalities, as discussed above, and
keyword aioc introduces the behaviour of the program, which is a DIOC apart for the fact
that scopes may define properties, as specified above.
The keyword preamble introduces deployment information, i.e., the definition of the
starter of the AIOC and the Location of participants.
The definition of a starter is mandatory and designs which role is in charge of waiting
for all other roles to be up and running before starting the actual computation. Any role
can be chosen as starter, but the chosen one needs to be launched first when running the
distributed application.
Locations define where the participants of the AIOC will be deployed. They are specified
using the keyword location:
Location ::= location @ Role : " URL "
where Role is the name of a role (e.g., Role1) and URL specifies where the service
can be found (e.g., "socket://Role1:8001"). When not explicitly defined, the projection
automatically assigns a distinct local TCP/IP location to each role.
8.2. AIOCJ Workflow. Here we present a brief description of how a developer can write
an adaptable distributed system in AIOCJ, execute it, and change its behaviour at runtime
by means of adaptation rules. For simplicity, we reuse here the minimal example presented
in the Introduction, featuring a scope that encloses a price offer from the Seller to the
Buyer and an update — here an adaptation rule — that provides a discount for the Buyer.
We report the AIOC program in the upper part and the adaptation rule in the lower part of
Figure 13.
At Line 1 of the AIOC program we have the inclusion of function getPrice, which is
provided by a service within the internal network of the Seller, reachable as a TCP/IP node
at URL "storage.seller.com" on port "80". At Line 2 of the AIOC program we have the
preamble. The preamble specifies deployment information, and, in particular, defines the
starter, i.e., the service that ensures that all the participants are up and running before
starting the actual computation. No locations are specified, thus default ones are used.
The actual code is at Lines 4–7, where we declare a scope. At Line 7 we define a property
scope_name of this scope with value "price_inquiry".
1 and execution ○
2 of the AIOC. From
Figure 14 depicts the process of compilation ○
left to right, we write the AIOC and we compile it into a set of executable Jolie services
(Buyer service and Seller service). To execute the projected system, we first launch the
Adaptation Manager and then the two compiled services, starting from the Seller, which is
the starter. Since there is no compiled adaptation rule, the result of the execution is the
offering of the standard price to the Buyer.
Now, let us suppose that we want to adapt our system to offer discounts in the Fall
season. To do that, we can write the adaptation rule shown in the lower part of Figure 13.
Since we want to replace the scope for the price_inquiry, we define, at Line 4, that this
rule applies only to scopes with property scope_name set to "price_inquiry". Furthermore,
since we want the update to apply only in the Fall season, we also specify that the environment
variable E.season should match the value "Fall". The value of E.season is retrieved from the
Environment Service.
The rule uses two functions. At Line 2, it includes function getPrice, which is the one
used also in the body of the scope. The other function, isValid, is included at Line 3 and
46
1
2
3
4
5
6
7
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
M. DALLA PREDA, M. GABBRIELLI, S. GIALLORENZO, I. LANESE, AND J. MAURO
include getPrice from " socket :// storage . seller . com :80 "
preamble { starter : Seller }
aioc {
scope @ Seller {
order_price @ Seller = getPrice ( order ) ;
offer : Seller ( order_price ) -> Buyer ( prod_price )
} prop { N . scope_name = " price_inquiry " } }
rule {
include getPrice from " socket :// storage . seller . com :80 "
include isValid from " socket :// discounts . seller . com :80 "
on { N . scope_name == " price_inquiry " and E . season == " Fall " }
do {
cardReq : Seller ( _ ) -> Buyer ( _ ) ;
card_id @ Buyer = getInput ( " Insert your customer card ID " ) ;
cardRes : Buyer ( card_id ) -> Seller ( buyer_id ) ;
if isValid ( buyer_id ) @ Seller {
order_price @ Seller = getprice ( order )*0.9 ;
} else {
order_price @ Seller = getPrice ( order )
};
offer : Seller ( order_price ) -> Buyer ( prod_price )
}
}
Figure 13: An AIOC program (upper part) and an applicable adaptation rule (lower part).
it is provided by a different TCP/IP node, located at URL "discounts.seller.com" on port
"80" within the internal network of the Seller.
The body of the adaptation rule (Lines 6–14) specifies the same behaviour described
in Figure 1 in the Introduction: the Seller asks the Buyer to provide its card_id, which
the Seller uses to provide a discount on the price of the ordered product. We depict
the inclusion of the new adaptation rule (outlined with dashes) and the execution of the
3 of Figure 14. From right to left, we write the rule and we compile
adaptation at point ○
it. The compilation of a (set of) adaptation rule(s) in AIOCJ produces a service, called
Adaptation Server (also outlined with dashes), that the Adaptation Manager can query to
fetch adaptation rules at runtime. The compilation of the adaptation rule can be done while
the application is running. After the compilation, the generated Adaptation Server is started
and registers on the Adaptation Manager. Since the rule relies on the environment to check
its applicability condition, we also need the Environment service to be running. In order for
the adaptation rule to apply we need the environment variable season to have value "Fall".
8.3. Implementation. AIOCJ is composed of two elements: the AIOCJ Integrated Development Environment (IDE), named AIOCJ − ecl, and the adaptation middleware that
enables AIOC programs to adapt, called AIOCJ − mid.
DYNAMIC CHOREOGRAPHIES
47
Runtime Environment
2
Adaptation
Manager
Compilation on
role Buyer
AIOC
Buyer service
3
Adaptation
Server
1
Compilation
Adaptation
Rules
Compilation on
role Seller
AIOC Language
Seller service
Environment
service
Jolie Language
AIOC Language
Figure 14: Representation of the AIOCJ framework — Projection and execution of the
example in Figure 13.
Figure 15: Check for connectedness.
AIOCJ − ecl is a plug-in for Eclipse [21] based on Xtext [49]. Starting from a grammar,
Xtext generates the parser for programs written in the AIOC language. Result of the parsing
is an abstract syntax tree (AST) we use to implement i ) the checker of connectedness for
AIOC programs and adaptation rules and ii ) the generation of Jolie code for each role. Since
the check for connectedness has polynomial computational complexity (cf. Theorem 6.3)
it is efficient enough to be performed while editing the code. Figure 15 shows AIOCJ − ecl
notifying the error on the first non-connected instruction (Line 13).
48
M. DALLA PREDA, M. GABBRIELLI, S. GIALLORENZO, I. LANESE, AND J. MAURO
As already mentioned, we chose Jolie as target language of the compilation of AIOCJ
because its semantics and language constructs naturally lend themselves to translate our
theoretical results into practice. Indeed, Jolie supports architectural primitives like dynamic
embedding, aggregation, and redirection, which ease the compilation of AIOCs.
Each scope at the AIOC level is projected into a specific sub-service for each role. The
roles run the projected sub-services by embedding them and access them via redirection. In
this way, we implement adaptation by disabling the default sub-service and by redirecting
the execution to a new one, obtained from the Adaptation server.
When at runtime the coordinator of the update reaches the beginning of that scope, it
queries the Adaptation Manager for adaptation rules to apply. The Adaptation Manager
queries each Adaptation Server sequentially, based on their order of registration. On its
turn, each Adaptation Server checks the applicability condition of each of its rules. The first
rule whose applicability condition holds is applied. The adaptation manager sends to the
coordinator the updates that are then distributed to the other involved roles. In each role,
the new code replaces the old one.
To improve the performance, differently from the theory, in AIOCJ adaptation rules are
compiled statically, and not by the coordinator of the update when the update is applied.
8.4. AIOCJ Practice. AIOCJ provides scopes as a way to specify which parts of the
application can be updated. As a consequence, deciding which parts of the code to enclose
in scopes is a relevant and non trivial decision. Roughly, one should enclose into scopes parts
of the code that may need to be updated in the future. This includes for instance parts of
the code which model business rules, hence may change according to business needs, parts
of the code which are location dependent, hence may be updated to configure the software
for running in different locations, parts of the code which are relevant for performance or
security reasons, hence may be updated to improve the performance or the security level.
One may think that a simple shortcut would be to have either a big scope enclosing the
whole code of the application or many small scopes covering all the code, but both these
solutions have relevant drawbacks. Indeed, if one replaces a big scope in order to change a
small piece of it, (s)he has to provide again all the code, while one would like to provide only
the part that needs to change. Furthermore, update for the big scope is no more available
as soon as its execution starts, which may happen quite earlier than when the activity to
be updated starts. Using small scopes also is not a solution, since an update may need to
cover more than one such scope, but there is no way to ensure that multiple scopes are
updated in a coordinated way. Also, both the approaches have performance issues: in the
first case large updates have to be managed, in the second case many checks for the updates
are needed, causing a large overhead.
In order to write updates for a given scope, one needs to have some knowledge about
the scope that the update is going to replace, since the update will run in the context where
the scope is. This includes, for instance, knowing which variables are available, their types
and their meaning, and in which variables results are expected. This information can be
either tracked in the documentation of the application, or added to the scope properties.
In this way, the adaptation rule embodying the update can check this information before
applying the update (see for instance the approach of [29]). The fact that this information
is needed for all scopes is another point against the approach of using many small scopes.
DYNAMIC CHOREOGRAPHIES
49
9. Related work and discussion
Recently, languages such as Rust [44] or SCOOP [41] have been defined to provide highlevel primitives to program concurrent applications avoiding by construction some of the
risks of concurrent programming. For instance, Rust ensures that there is exactly one
binding to any given resource using ownership and borrowing mechanisms to achieve memory
safety. SCOOP instead provides the separate keyword to enable programming patterns
that enforce data-race freedom. In industry, Rust has started to be used for the development
of complex concurrent/distributed systems (e.g., the file storage system of Dropbox [33] or
the parallel rendering engine of Mozilla [51]). However, industry has not yet widely adopted
any language-based solution trading expressive power of the language for safety guarantees.
Inspired by the languages above, we have presented high-level primitives for the dynamic
update of distributed applications. We guarantee the absence of communication deadlocks
and races by construction for the running distributed application, even in presence of updates
that were unknown when the application was started. More generally, the compilation of a
DIOC specification produces a set of low-level DPOCs whose behaviour is compliant with
the behaviour of the originating DIOC.
As already remarked, our theoretical model is very general. Indeed, whether to update a
scope or not and which update to apply if many are available is completely non deterministic.
Choosing a particular policy for decreasing the non-determinism of updates is orthogonal
with respect to our results. Our properties are preserved by any such policy, provided that
the same policy is applied both at the DIOC and at the DPOC level. AIOCJ presents
a possible instantiation of our general approach with a concrete mechanism for choosing
updates according to the state of the application and of its running environment.
Our work is on the research thread of choreographies and multiparty session types [12,
24, 13, 14, 5, 45]. One can see [25] for a description of the field. Like choreographies and
multiparty session types, DIOCs target communication-centred concurrent and distributed
applications, avoiding deadlocks and communication races. Thanks to the particular structure
of the language, DIOCs provide the same guarantees without the need of types. Below we
just discuss the approaches in this research thread closest to ours. The two most related
approaches we are aware of are based on multiparty session types, and deal with dynamic
software updates [2] and with monitoring of self-adaptive systems [16]. The main difference
between [2] and our approach is that [2] targets concurrent applications which are not
distributed. Indeed, it relies on a check on the global state of the application to ensure
that the update is safe. Such a check cannot be done by a single role, thus it is impractical
in a distributed setting. Furthermore, the language in [2] is much more constrained than
ours, e.g., requiring each pair of participants to interact on a dedicated pair of channels, and
assuming that all the roles that are not the sender or the receiver within a choice behave
the same in the two branches. The approach in [16] is very different from ours, too. In
particular, in [16], all the possible behaviours are available since the very beginning, both at
the level of types and of processes, and a fixed adaptation function is used to switch between
them. This difference derives from the distinction between self-adaptive applications, as
they discuss, and applications updated from the outside, as in our case.
We also recall [20], which uses types to ensure safe adaptation. However, [20] allows
updates only when no session is active, while we change the behaviour of running DIOCs.
We highlight that, contrarily to our approach, none of the approaches above has been
implemented.
50
M. DALLA PREDA, M. GABBRIELLI, S. GIALLORENZO, I. LANESE, AND J. MAURO
Various tools [17, 4, 8] support adaptation exploiting automatic planning techniques in
order to elaborate, at runtime, the best sequence of activities to achieve a given goal. These
techniques are more declarative than ours, but, to the best of our knowledge, they are not
guaranteed to always find a plan to adapt the application.
[38] presents an approach to safe dynamic software updates for concurrent systems.
According to [38], safe means that all the traces are version consistent, namely that for each
trace there is a version of the application able to produce it. In our case, we want the effects
of the update to be visible during the computation, hence we do not want this property to
hold. Instead, for us safe means that the DIOC and the projected DPOC are weak system
bisimilar, and that they are both free from deadlocks and races.
Among the non-adaptive languages, Chor [13] is the closest to ours. Indeed, like ours,
Chor is a choreographic language that compiles to Jolie. Actually, AIOCJ shares part of
the Chor code base. Our work shares with [37] the interest in choreographies composition.
However, [37] uses multiparty session types and only allows static parallel composition, while
we replace a term inside an arbitrary context at runtime.
Extensions of multiparty session types with error handling [11, 9] share with us the
difficulties in coordinating the transition from the expected pattern to an alternative one, but
in their case the error recovery pattern is known since the very beginning, thus considerably
simplifying the analysis.
We briefly compare to some works that exploit choreographic descriptions for adaptation,
but with very different aims. For instance, [27] defines rules for adapting the specification
of the initial requirements for a choreography, thus keeping the requirements up-to-date in
presence of run-time changes. Our approach is in the opposite direction: we are not interested
in updating the system specification tracking system updates, but in programming and
ensuring correctness of adaptation itself. Other formal approaches to adaptation represent
choreographies as annotated finite state automata. In [43] choreographies are used to
propagate protocol changes to the other peers, while [48] presents a test to check whether
a set of peers obtained from a choreography can be reconfigured to match a second one.
Differently from ours, these works only provide change recommendations for adding and
removing message sequences.
An approach close to ours is multi-tier programming [39, 6, 15], where the programmer
writes a single program that is later automatically distributed to different tiers. This is
similar to what we do by projecting a DIOC on the different roles. In particular, [39]
considers functional programs with role annotations and splits them into different sequential
programs to be run in parallel. Multi-tier approaches such as HipHop [6] or Link [15]
have been implemented and used to develop three tier web applications. Differently from
ours, these works abstract away communication information as much as possible, while
we emphasise this kind of information. Furthermore, they do not take into account code
update. It would be interesting to look for cross-fertilisation results between our approach
and multi-tier programming. For instance, one could export our techniques to deal with
runtime updates into multi-tier programming. In the other direction, we could abstract
away communications and let the compiler manage them according to the programmed flow
of data, as done in multi-tier programming. For instance, in Figure 2 the communications
at Lines 22, 24, and 26 could be replaced by local assignments, since the information on the
chosen branch is carried by the auxiliary communications. In general, communications seem
not strictly needed from a purely technical point of view, however they are relevant for the
systems we currently consider. Furthermore, the automatic introduction of communications
DYNAMIC CHOREOGRAPHIES
51
in an optimised way is not always trivial since the problem is NP-hard even for languages
that do non support threads [40].
On a broader perspective, our theory can be used to inject guarantees of freedom
from deadlocks and races into many existing approaches to adaptation, e.g., the ones in
the surveys [32, 22]. However, this task is cumbersome, due to the huge number and
heterogeneity of those approaches. For each of them the integration with our techniques is
far from trivial. Nevertheless, we already started it. Indeed, AIOCJ follows the approach to
adaptation described in [29]. However, applications in [29] are not distributed and there
are no guarantees on the correctness of the application after adaptation. Furthermore, in
the website of the AIOCJ project [1], we give examples of how to integrate our approach
with distributed [42] and dynamic [50] Aspect-Oriented Programming (AOP) and with
Context-Oriented Programming (COP) [23]. In general, we can deal with cross-cutting
concerns like logging and authentication, typical of AOP, viewing pointcuts as empty scopes
and advices as updates. Layers, typical of COP, can instead be defined by updates which can
fire according to contextual conditions. As future work, besides applying the approach to
other adaptation mechanisms, we also plan to extend our techniques to deal with multiparty
session types [12, 24, 13, 14]. The main challenge here is to deal with multiple interleaved
sessions whilst each of our choreographies corresponds to a single session. An initial analysis
of the problem is presented in [7].
Also the study of more refined policies for rule selection, e.g., based on priorities, is a
topic for future work.
References
[1] AIOCJ website. http://www.cs.unibo.it/projects/jolie/aiocj.html.
[2] G. Anderson and J. Rathke. Dynamic software update for message passing programs. In APLAS, volume
7705 of LNCS, pages 207–222. Springer, 2012.
[3] J. W. Backus. The syntax and semantics of the proposed international algebraic language of the zurich
ACM-GAMM conference. In IFIP Congress, pages 125–131, 1959.
[4] L. Baresi, A. Marconi, M. Pistore, and A. Sirbu. Corrective Evolution of Adaptable Process Models. In
BMMDS/EMMSAD, volume 147 of LNBIP, pages 214–229. Springer, 2013.
[5] S. Basu, T. Bultan, and M. Ouederni. Deciding choreography realizability. In POPL, pages 191–202.
ACM, 2012.
[6] G. Berry and M. Serrano. Hop and HipHop: Multitier Web Orchestration. In ICDCIT, volume 8337 of
LNCS, pages 1–13. Springer, 2014.
[7] M. Bravetti et al. Towards global and local types for adaptation. In SEFM Workshops, volume 8368 of
LNCS, pages 3–14. Springer, 2013.
[8] A. Bucchiarone, A. Marconi, C. A. Mezzina, M. Pistore, and H. Raik. On-the-fly adaptation of dynamic
service-based systems: Incrementality, reduction and reuse. In ICSOC, volume 8274 of LNCS, pages
146–161. Springer, 2013.
[9] S. Capecchi, E. Giachino, and N. Yoshida. Global Escape in Multiparty Sessions. In Proc. of FSTTCS
2010, volume 8 of LIPIcs, pages 338–351. Schloss Dagstuhl, 2010.
[10] M. Carbone, K. Honda, and N. Yoshida. Structured Communication-Centred Programming for Web
Services. In ESOP, volume 4421 of LNCS, pages 2–17. Springer, 2007.
[11] M. Carbone, K. Honda, and N. Yoshida. Structured Interactional Exceptions in Session Types. In Proc.
of CONCUR’08, volume 5201 of LNCS, pages 402–417. Springer, 2008.
[12] M. Carbone, K. Honda, and N. Yoshida. Structured communication-centered programming for web
services. ACM Trans. Program. Lang. Syst., 34(2):8, 2012.
[13] M. Carbone and F. Montesi. Deadlock-Freedom-by-Design: Multiparty Asynchronous Global Programming. In POPL, pages 263–274. ACM, 2013.
52
M. DALLA PREDA, M. GABBRIELLI, S. GIALLORENZO, I. LANESE, AND J. MAURO
[14] G. Castagna, M. Dezani-Ciancaglini, and L. Padovani. On global types and multi-party session. Logical
Methods in Computer Science, 8(1), 2012.
[15] E. Cooper, S. Lindley, P. Wadler, and J. Yallop. Links: Web Programming Without Tiers. In FMCO,
volume 4709 of LNCS, pages 266–296. Springer, 2006.
[16] M. Coppo, M. Dezani-Ciancaglini, and B. Venneri. Self-adaptive multiparty sessions. Service Oriented
Computing and Applications, 9(3-4):249–268, 2015.
[17] G. Cugola, C. Ghezzi, and L. S. Pinto. DSOL: a declarative approach to self-adaptive service orchestrations. Computing, 94(7):579–617, 2012.
[18] M. Dalla Preda, M. Gabbrielli, S. Giallorenzo, I. Lanese, and J. Mauro. Dynamic choreographies - safe
runtime updates of distributed applications. In COORDINATION, volume 9037 of LNCS, pages 67–82.
Springer, 2015.
[19] M. Dalla Preda, S. Giallorenzo, I. Lanese, J. Mauro, and M. Gabbrielli. AIOCJ: A choreographic
framework for safe adaptive distributed applications. In SLE, volume 8706 of LNCS, pages 161–170.
Springer, 2014.
[20] C. Di Giusto and J. A. Pérez. Disciplined structured communications with consistent runtime adaptation.
In SAC, pages 1913–1918. ACM, 2013.
[21] Eclipse website. http://www.eclipse.org/.
[22] C. Ghezzi, M. Pradella, and G. Salvaneschi. An evaluation of the adaptation capabilities in programming
languages. In SEAMS, pages 50–59. ACM, 2011.
[23] R. Hirschfeld, P. Costanza, and O. Nierstrasz. Context-oriented Programming. Journal of Object
Technology, 7(3):125–151, 2008.
[24] K. Honda, N. Yoshida, and M. Carbone. Multiparty Asynchronous Session Types. In POPL, pages
273–284. ACM, 2008.
[25] H. Hüttel et al. Foundations of session types and behavioural contracts. ACM Computing Surveys, 2016.
[26] Jolie website. http://www.jolie-lang.org/.
[27] I. Jureta, S. Faulkner, and P. Thiran. Dynamic requirements specification for adaptable and open
service-oriented systems. In ICSOC, volume 4749 of LNCS, pages 270–282. Springer, 2007.
[28] J. O. Kephart and D. M. Chess. The vision of autonomic computing. Computer, 36(1):41–50, 2003.
[29] I. Lanese, A. Bucchiarone, and F. Montesi. A Framework for Rule-Based Dynamic Adaptation. In TGC,
volume 6084 of LNCS, pages 284–300. Springer, 2010.
[30] I. Lanese, C. Guidi, F. Montesi, and G. Zavattaro. Bridging the Gap between Interaction- and ProcessOriented Choreographies. In SEFM, pages 323–332. IEEE, 2008.
[31] I. Lanese, F. Montesi, and G. Zavattaro. Amending choreographies. In WWV, volume 123, pages 34–48.
EPTCS, 2013.
[32] L. A. F. Leite et al. A systematic literature review of service choreography adaptation. Service Oriented
Computing and Applications, 7(3):199–216, 2013.
[33] C. Metz. The epic story of dropbox’s exodus from the amazon cloud empire. Wired, http://www.wired.
com/2016/03/epic-story-dropboxs-exodus-amazon-cloud-empire/.
[34] F. Montesi. Kickstarting choreographic programming. In WS-FM, pages 3–10. Springer, 2015.
[35] F. Montesi, C. Guidi, and G. Zavattaro. Composing services with JOLIE. In ECOWS, pages 13–22.
IEEE, 2007.
[36] F. Montesi, C. Guidi, and G. Zavattaro. Service-oriented programming with Jolie. In Web Services
Foundations, pages 81–107. Springer, 2014.
[37] F. Montesi and N. Yoshida. Compositional choreographies. In CONCUR, volume 8052 of LNCS, pages
425–439. Springer, 2013.
[38] I. Neamtiu and M. W. Hicks. Safe and timely updates to multi-threaded programs. In PLDI, pages
13–24. ACM, 2009.
[39] M. Neubauer and P. Thiemann. From sequential programs to multi-tier applications by program
transformation. In POPL, pages 221–232. ACM, 2005.
[40] M. Neubauer and P. Thiemann. Placement inference for a client-server calculus. In ICALP, volume 5126
of LNCS, pages 75–86. Springer, 2008.
[41] P. Nienaltowski. Practical framework for contract-based concurrent object-oriented programming. PhD
thesis, ETH Zurich, 2007.
[42] R. Pawlak et al. JAC: an aspect-based distributed dynamic framework. Software: Practice and Experience,
34(12):1119–1148, 2004.
DYNAMIC CHOREOGRAPHIES
53
[43] S. Rinderle, A. Wombacher, and M. Reichert. Evolution of Process Choreographies in DYCHOR. In
OTM Conferences (1), volume 4275 of LNCS, pages 273–290. Springer, 2006.
[44] Rust website. http://www.rust-lang.org/.
[45] G. Salaün, T. Bultan, and N. Roohi. Realizability of choreographies using process algebra encodings.
IEEE T. Services Computing, 5(3):290–304, 2012.
[46] D. Sangiorgi and D. Walker. The pi-calculus: a Theory of Mobile Processes. Cambridge university press,
2003.
[47] Scribble website. http://www.jboss.org/scribble.
[48] A. Wombacher. Alignment of choreography changes in BPEL processes. In IEEE SCC, pages 1–8. IEEE,
2009.
[49] Xtext website. http://www.eclipse.org/Xtext/.
[50] Z. Yang, B. H. C. Cheng, R. E. K. Stirewalt, J. Sowell, S. M. Sadjadi, and P. K. McKinley. An
aspect-oriented approach to dynamic adaptation. In WOSS, pages 85–92. ACM, 2002.
[51] S. Yegulalp. Mozilla’s Rust-based Servo browser engine inches forward. InfoWorld, http://www.infoworld.
com/article/2905688/applications/mozillas-rust-based-servo-browser-engine-inches-forward.
html.
54
M. DALLA PREDA, M. GABBRIELLI, S. GIALLORENZO, I. LANESE, AND J. MAURO
Appendix A. Proof of Theorem 6.3
In order to prove the bound on the complexity of the connectedness check we use the lemma
below, showing that the checks to verify the connectedness for a single sequence operator
can be performed in linear time on the size of the sets generated by transI and transF.
Lemma A.1. Given S, S 0 sets of multisets of two elements, checking if ∀ s ∈ S . ∀s0 ∈
S 0 . s ∩ s0 6= ∅ can be done in O(n) steps, where n is the maximum of |S| and |S 0 |.
Proof. Without loss of generality, we can assume that |S| ≤ |S 0 |. If |S| ≤ 9 then the check
can be performed in O(n) by comparing all the elements in S with all the elements in S 0 . If
|S| > 9 then at least 4 distinct elements appear in the multisets in S since the maximum
number of multisets with cardinality 2 obtained by 3 distinct elements is 9. In this case the
following cases cover all the possibilities:
• there exist distinct elements a, b, c, d s.t. {a, b}, {a, c}, and {a, d} belong to S. In this case
for the check to succeed all the multisets in S 0 must contain a, otherwise the intersection
of the multiset not containing a with one among the multisets {a, b}, {a, c}, and {a, d}
is empty. Similarly, since |S 0 | > 9, for the check to succeed all the multisets in S must
contain a. Hence, if {a, b}, {a, c}, and {a, d} belong to S then the check succeeds iff a
belongs to all the multisets in S and in S 0 .
• there exist distinct elements a, b, c, d s.t. {a, b} and {c, d} belong to S. In this case the
check succeeds only if S 0 is a subset of {{a, c}, {a, d}, {b, c}, {b, d}}. Since |S 0 | > 9 the
check can never succeed.
• there exist distinct elements a, b, c s.t. {a, a} and {b, c} belong to S. In this case the
check succeeds only if S 0 is a subset of {{a, b}, {a, c}}. Since |S 0 | > 9 the check can never
succeed.
• there exist distinct elements a, b s.t. {a, a} and {b, b} belong to S. In this case the check
succeeds only if S 0 is a subset of {{a, b}}. Since |S 0 | > 9 the check can never succeed.
Summarising, if |S| > 9 the check can succeed iff all the multisets in S and in S 0 share a
common element. The existence of such an element can be verified in time O(n).
Theorem 6.3 (Connectedness-check complexity).
The connectedness of a DIOC process I can be checked in time O(n2 log(n)), where n is the
number of nodes in the abstract syntax tree of I.
Proof. To check the connectedness of I we first compute the values of the functions transI
and transF for each node of the abstract syntax tree (AST). We then check for each sequence
operator whether connectedness holds.
The functions transI and transF associate to each node a set of pairs of roles. Assuming an
implementation of the data set structure based on balanced trees (with pointers), transI and
transF can be computed in constant time for interactions, assignments, 1, 0, and sequence
constructs. For while and scope constructs computing transF(I 0 ) requires the creation of
balanced trees having an element for every role of I 0 . Since the roles are O(n), transF(I 0 )
can be computed in O(n log(n)). For parallel and if constructs a union of sets is needed. The
union costs O(n log(n)) since each set generated by transI and transF contains at maximum
n elements.
Since the AST contains n nodes, the computation of the sets generated by transI and
transF can be performed in O(n2 log(n)).
To check connectedness we have to verify that for each node I 0 ; I 00 of the AST ∀R1 →
R2 ∈ transF(I 0 ), ∀S1 → S2 ∈ transI(I 00 ) . {R1 , R2 } ∩ {S1 , S2 } 6= ∅. Since transF(I 0 ) and
DYNAMIC CHOREOGRAPHIES
55
transI(I 00 ) have O(n) elements, thanks to Lemma A.1, checking if I 0 ; I 00 is connected costs
O(n). Since in the AST there are less than n sequence operators, checking the connectedness
on the whole AST costs O(n2 ).
The complexity of checking the connectedness of the entire AST is therefore limited by
the cost of computing functions transI and transF and of checking the connectedness. All
these activities have a complexity of O(n2 log(n)).
Appendix B. Proofs of Section 7.1
Lemma 7.9 (Distinctness of Global Indexes). Given a well-annotated DIOC I, a global
η1
ηn
state Σ, and a set of updates I, if hΣ, I, Ii −→ . . . −→ hΣ0 , I0 , I 0 i then all global indexes in I 0
are distinct.
Proof. The proof is by induction on the number n of transitions, using a stronger inductive
hypothesis: indexes are distinct but, possibly, inside DIOC subterms of the form I; i :
while b@R {I 0 }. In this last case, the same index can occur both in I and in I 0 , attached
to constructs with different global indexes. The statement of the Lemma follows directly:
first, distinct indexes imply distinct global indexes; second, global indexes of I and of I 0 are
distinct, since I 0 is inside the while loop whilst I is not.
In the base case (n = 0), thanks to well annotatedness, indexes are
√ always distinct. The
inductive case follows directly by induction for transitions with label . Otherwise, we √
have
a case analysis on the only axiom which derives a transition with label different from .
The only difficult cases are bDIOC |While-unfold e and bDIOC |Up e.
In the case of Rule bDIOC |While-unfold e, note that the while is enabled, hence it cannot
be part of a term of the form I; i: while b@R {I 0 }. Hence, indexes of the body of the while
loop do not occur elsewhere. As a consequence, after the transition no clashes are possible
with indexes in the context. Note also that indexes of the body of the loop are duplicated,
but the resulting term has the form I; i: while b@R {I 0 }, thus global indexes are distinct
by construction.
The case bDIOC |Up e follows thanks to the condition freshIndexes(I 0 ).
Lemma 7.15. Given a well-annotated connected DIOC process I and for each state Σ the
DPOC network proj(I, Σ) is such that:
(1) events(I) ⊆ events(proj(I, Σ));
(2) ∀ ε1 , ε2 ∈ events(I).ε1 ≤DIOC ε2 ⇒ ε1 ≤DP OC ε2 ∨ ε1 ≤DP OC ε2
Proof.
(1) By definition of projection.
(2) Let ε1 ≤DIOC ε2 . We have a case analysis on the condition used to derive the dependency.
Sequentiality: Consider I = I 0 ; I 00 . If events are in the same role the implication
follows from the sequentiality of the ≤DP OC .
Let us show that there exists an event ε00 in an initial interaction of I 00 such that either
ε00 ≤DP OC ε2 or ε00 ≤DP OC ε2 . The proof is by induction on the structure of I 00 . The
only difficult case is sequential composition. Assume I 00 = I1 ; I2 . If ε2 ∈ events(I1 )
the thesis follows from inductive hypothesis. If ε2 ∈ events(I2 ) then by induction
there exists an event ε3 in an initial interaction of I2 such that ε3 ≤DP OC ε2 or
ε3 ≤DP OC ε2 . By synchronisation (Definition 7.14) we have that ε3 ≤DP OC ε2 or
ε3 ≤DP OC ε2 . By connectedness we have that ε3 or ε3 are in the same role of an
56
M. DALLA PREDA, M. GABBRIELLI, S. GIALLORENZO, I. LANESE, AND J. MAURO
event ε4 in I 0 . By sequentiality (Definition 7.14) we have that ε4 ≤DP OC ε3 or
ε4 ≤DP OC ε3 . By synchronisation we have that ε4 ≤DP OC ε3 or ε4 ≤DP OC ε3 . The
thesis follows from the inductive hypothesis on ε4 and by transitivity of ≤DP OC .
Let us also show that there exists a final event ε000 ∈ events(I 0 ) such that ε1 ≤DP OC ε000
or ε1 ≤DP OC ε000 . The proof is by induction on the structure of I 0 . The only difficult
case is sequential composition. Assume I 0 = I1 ; I2 . If ε1 ∈ events(I2 ) the thesis
follows from inductive hypothesis. If ε1 ∈ events(I1 ) then the proof is similar to the
one above, finding a final event in I1 and applying sequentiality, synchronisation,
and transitivity.
The thesis follows from the two results above again by sequentiality, synchronisation,
and transitivity.
Scope: it means that either (a) ε1 =↑ξ and ε2 is an event in the scope or (b) ε1 =↑ξ and
ε2 =↓ξ , or (c) ε1 is an event in the scope and ε2 =↓ξ . We consider case (a) since case
(c) is analogous and case (b) follows by transitivity. If ε2 is in the coordinator then
the thesis follows easily. Otherwise it follows thanks to the auxiliary synchronisations
with a reasoning similar to the one for sequentiality.
Synchronisation: it means that ε1 is a sending event and ε2 is the corresponding
receiving event, namely ε1 = ε2 . Thus, since ε2 ≤DP OC ε2 then ε2 ≤DP OC ε2 .
If: it means that ε1 is the evaluation of the guard and ε2 is an event in one of the two
branches. Thus, if ε2 is in the coordinator then the thesis follows easily. Otherwise it
follows thanks to the auxiliary synchronisations with a reasoning similar to the one
for sequentiality.
While: it means that ε1 is the evaluation of the guard and ε2 is in the body of the
while loop. Thus, if ε2 is in the coordinator then the thesis follows easily. Otherwise
it follows thanks to the auxiliary synchronisations with a reasoning similar to the
one for sequentiality.
Lemma 7.20. Let I be a well-annotated connected DIOC process and Σ a state. Then the
projection N = proj(I, Σ) is a well-annotated DPOC network with respect to ≤DP OC .
Proof. We have to prove that proj(I, Σ) satisfies the conditions of Definition 7.17 of wellannotated DPOC:
C1: For each global index ξ there are at most two communication events on programmerspecified operations with global index ξ and, in this case, they are matching events.
The condition follows by the definition of the projection function, observing that in
well-annotated DIOCs, each interaction has its own index, and different indexes are
mapped to different global indexes.
C2: Only events which are minimal according to ≤DP OC may correspond to enabled
transitions. This condition follows from Lemma 7.19.
C3: For each pair of non-conflicting sending events [fξ ]R and [fξ0 ]R on the same operation
o? and with the same target R0 such that ξ =
6 ξ 0 we have [fξ ]R ≤DP OC [fξ0 ]R or
[fξ0 ]R ≤DP OC [fξ ]R . Note that the two events are in the same role R, thus without loss of
generality we can assume that there exist two processes P, P 0 such that [fξ ]R ∈ events(P )
and [fξ0 ]R ∈ events(P 0 ) and there is a subprocess of N of one of the following forms:
• P ; P 0 : the thesis follows by sequentiality (Definition 7.14);
• P |P 0 : this case can never happen for the reasons below. For events on programmerspecified operations this follow by the definition of projection, since the prefixes of
the names of operations are different. For events on auxiliary operations originated
DYNAMIC CHOREOGRAPHIES
57
by the same construct this follows since all the targets are different. For events on
auxiliary operations originated by different constructs this follows since the prefixes of
the names of the operations are different.
• if b {P } else {P 0 }: this case can never happen since the events are non-conflicting
(Definition 7.16).
C4: Similar to the previous case, with receiving events instead of sending events.
C5: If ε is an event inside a scope with global index ξ then its matching events ε (if they
exist) are inside a scope with the same global index. This case holds by definition of the
projection function.
C6: If two events have the same index but different global indexes then one of them, let us
call it ε1 , is inside the body of a while loop with global index ξ1 and the other, ε2 , is not.
Furthermore, ε2 ≤DP OC εξ1 where εξ1 is the guarding while-event of the while loop with
global index ξ1 . By definition of well-annotated DIOC and of projection the only case
where there are two events with the same index but different global indexes is for the
auxiliary communications in the projection of the while construct, where the conditions
hold by construction.
This work is licensed under the Creative Commons Attribution-NoDerivs License. To view a
copy of this license, visit http://creativecommons.org/licenses/by-nd/2.0/ or send a letter
to Creative Commons, 171 Second St, Suite 300, San Francisco, CA 94105, USA, or Eisenacher Strasse 2, 10777 Berlin, Germany
| 2cs.AI
|
Quasi-isometries Between Groups with Two-Ended
Splittings
Christopher H. Cashen and Alexandre Martin
arXiv:1601.07147v1 [math.GR] 26 Jan 2016
April 10, 2018
Abstract
We construct ‘structure invariants’ of a one-ended, finitely presented group that
describe the way in which the factors of its JSJ decomposition over two-ended subgroups fit together.
For groups satisfying two technical conditions, these invariants reduce the problem of quasi-isometry classification of such groups to the problem of relative quasiisometry classification of the factors of their JSJ decompositions. The first condition
is that their JSJ decompositions have two-ended cylinder stabilizers. The second
is that every factor in their JSJ decompositions is either ‘relatively rigid’ or ‘hanging’. Hyperbolic groups always satisfy the first condition, and it is an open question
whether they always satisfy the second.
The same methods also produce invariants that reduce the problem of classification of one-ended hyperbolic groups up to homeomorphism of their Gromov boundaries to the problem of classification of the factors of their JSJ decompositions up
to relative boundary homeomorphism type.
1
Introduction
Gromov proposed a program of classifying finitely generated groups up to the geometric
equivalence relation of quasi-isometry [20]. A natural approach to this problem is to
first try to decompose the group into “smaller” pieces by means of a graph of groups
decomposition, and then reduce the quasi-isometry classification problem to the problem
of understanding the quasi-isometry types of the various vertex groups and the way these
subgroups fit together.
The simplest such decomposition is the decomposition of a group as a graph of groups
over finite subgroups. Stallings’s Theorem [42, 43] asserts that a finitely generated group
splits as an amalgamated product or an HNN extension over a finite group if and only if
it has more than one end. In particular, the existence of a splitting as a graph of groups
with finite edge groups is a quasi-isometry invariant. Finitely presented groups admit a
maximal splitting over finite subgroups [16], and a theorem of Papasoglu and Whyte [37]
says that the collection of quasi-isometry types of one-ended vertex groups of a maximal
decomposition of an infinite-ended, finitely presented group is a complete quasi-isometry
invariant. This reduces the quasi-isometry classification problem to one-ended groups.
1
We push this program to its next logical step, which is to decompose one-ended groups
over two-ended subgroups. Papasoglu [36] shows that the existence of a splitting of a
finitely presented one-ended group over two-ended subgroups is quasi-isometry invariant,
provided that the group is not commensurable to a surface group. Moreover, such a
group admits a maximal decomposition as a graph of groups over two-ended subgroups,
known as a JSJ decomposition, and Papasoglu’s results imply that quasi-isometries respect (in a certain sense that will be made precise in Section 2.3.2) the JSJ decomposition. In particular, the quasi-isometry types of the non-elementary vertex groups of the
JSJ decomposition are invariant under quasi-isometries. Even more is true: In a nonelementary vertex group of the JSJ we see the collection of conjugates of the two-ended
subgroups corresponding to incident edges of the JSJ decomposition. Quasi-isometries
of the group must preserve the vertex groups together with their patterns of conjugates
of incident edge subgroups. We say a quasi-isometry must preserve the relative quasiisometry type of the vertex. Such patterns have been exploited before [5, 13, 32, 33] to
produce quasi-isometry invariants from various ‘pattern rigidity’ phenomena. However,
the quasi-isometry types, or relative quasi-isometry types, of the vertex groups alone
do not give complete quasi-isometry invariants, because not all vertex groups have the
same coarse intersections: Vertices that are adjacent in the Bass-Serre tree of the decomposition have vertex groups that intersect in two-ended subgroups, while the coarse
intersection of non-adjacent vertices may or may not be bounded.
In this paper, we produce further quasi-isometry invariants of a finitely presented
one-ended group from an appropriate JSJ decomposition over two-ended subgroups. Under a mild technical restriction, which is known to hold for large classes of groups (see
Section 5.2 for a discussion), we show that our invariants give complete quasi-isometry
invariants, and thus reduce the quasi-isometry classification problem for such groups to
relative versions of these problems in the vertex groups of their JSJ decomposition.
In the case of one-ended hyperbolic groups, a weaker classification is possible, namely
the classification up to homeomorphisms of Gromov boundaries. Indeed, recall that
quasi-isometric hyperbolic groups have homeomorphic Gromov boundaries at infinity,
but there are examples of hyperbolic groups with homeomorphic boundary that are
not quasi-isometric. For a hyperbolic group, the existence of a splitting over a finite
subgroup amounts to having a disconnected Gromov boundary, and is thus detected
by the homeomorphism type of the boundary. Paralleling the results of Papasoglu and
Whyte for quasi-isometries, Martin and Świątkowski [31] show that hyperbolic groups
with infinitely many ends have homeomorphic boundaries if and only if they have the
same sets of homeomorphism types of boundaries of one-ended factors, reducing the
classification problem to the case of one-ended hyperbolic groups.
For a one-ended hyperbolic group G whose boundary is not a circle, Bowditch shows
that the there exists a splitting over a two-ended subgroup if and only if there exists
a cut pair in the boundary [9]. From the structure of cut pairs in the boundary, he
deduces the existence of a simplicial tree on which Homeo(∂G) acts by isomorphisms.
Paralleling the quasi-isometry case, the action of Homeo(∂G) on this tree preserves the
2
relative boundary homeomorphism types of vertex stabilizers in G.
Using the same approach as for our quasi-isometry classification, we construct a
complete system of invariants of the homeomorphism type of the Gromov boundary of
a hyperbolic group, which completely reduces the classification problem for hyperbolic
groups to relative versions of this problem in the vertex groups of their JSJ decomposition.
Our results rely heavily on the existence of a canonical choice of tree that is preserved
by quasi-isometries, respectively, homeomorphisms of the boundary, with the additional
property that any such map induces maps of the same nature at the level of the vertex
groups.
In the case of hyperbolic groups, the tree is Bowditch’s canonical JSJ tree constructed
from cut pairs in the boundary. For a more general finitely presented one-ended group
G, let Γ be a JSJ decomposition over two-ended subgroups. Let T := T (Γ) be the
Bass-Serre tree of Γ. Commensurability of stabilizers defines an equivalence relation on
edges of T whose equivalence classes are called cylinders. Guirardel and Levitt [23] show
that the dual tree to the covering of T by cylinders defines a new tree Cyl(T ), the tree
of cylinders of T , with a cocompact G–action, and, in fact, this tree is independent of
Γ, so it makes sense to call it the tree of cylinders of G, and denote it Cyl(G). It follows
from Papasoglu’s results, see Theorem 2.9, that a quasi-isometry between finitely presented one-ended groups induces an isomorphism between their trees of cylinders, and
restricts to give a quasi-isometry of each vertex group Gv of the tree of cylinders that
coarsely preserves the pattern Pv of edge groups Ge , for edges e incident to v. When the
edge stabilizer of Cyl(G) in G are two-ended then the quotient graph of groups gives a
canonical decomposition of G over two-ended subgroups. Our results are strongest when
additionally the cylinder stabilizers are two-ended. This is the case, in particular, when
G is hyperbolic, in which case Cyl(G) is equivariantly isomorphic to Bowditch’s tree.
Before giving more details about the ideas behind our classifications, we restrict to
the case that G is a one-ended hyperbolic group, and we adopt some notation that will
allow us to to discuss simultaneously the quasi-isometry and boundary homeomorphism
cases. Let Map((X, P X ), (Y, P Y )) denote alternately:
• The set of quasi-isometries from X to Y taking the collection of coarse equivalence
classes of subsets P X to the collection of coarse equivalence classes of subsets P Y .
• The set of boundary homeomorphisms from ∂X to ∂Y taking the collection of
subsets ∂P X to the collection of subsets ∂P Y .
Similarly, Map(G) is either QI(G) or Homeo(∂G). An element of Map(· · · ) will be
referred to as a Map–equivalence.
The idea behind our classification result is the following. First remark that a finitely
presented one-ended group is quasi-isometric to a complex of spaces over the JSJ tree
of cylinders (this will be recalled in Section 2.4). Moreover, such a decomposition as
a complex of spaces is compatible with Map-equivalences, in that a Map-equivalence
3
between two finitely presented one-ended groups coarsely preserves the structure of complex of spaces, as follows from the aforementioned results of Papasoglu and Bowditch.
To determine whether two groups are Map-equivalent, we thus want to decide whether
their JSJ trees of cylinders are isomorphic and then try to promote such an isomorphism
to a Map-equivalence between the complexes of spaces, hence, between the groups. In
full generality, a Map-equivalence not only induces a simplicial isomorphism between the
trees of cylinders, but also preserves extra information about the vertex groups that we
want to take into account: Map–class of vertex groups, relative Map–class with respect to
incident edge groups, etc. In other words, we decorate the vertices of the trees of cylinders
with these additional pieces of information. What we then want is to understand when
there exists a decoration-preserving isomorphism between the tree of cylinders of two
groups. We want to add enough additional information so that a decoration-preserving
isomorphism between the trees of cylinders can be promoted to a Map–equivalence between the associated groups. Moreover, we would like to have an algorithm telling us
when two such decorated trees of cylinders are isomorphic.
This latter point will be dealt with by generalizing to cocompact decorated trees a
theorem from graph theory giving a necessary and sufficient condition for the universal
covers of two graphs to be isomorphic [27], see Section 4.2. To such a decorated tree we
will associate a structure invariant that completely determines the tree up to decorationpreserving isomorphism.
To now get an intuition of the decorations we consider in this article, let us start
from the decoration of the tree of cylinders that associates to each vertex v the relative
Map-equivalence Map(Gv , Pv ) mentioned earlier, where Pv is the peripheral structure
coming from the incident edge groups, and let us try to promote a decoration-preserving
isomorphism χ between trees of cylinders to a Map-equivalence between groups. The
goal is to choose, for each vertex v, a Map–equivalence between v and χ(v), and piece
them together to get Map-equivalence between groups.
The first potential problem is a realization problem. We know that v and χ(v) are
Map–equivalent, but we also need to know that there is such a Map–equivalence that
matches up peripheral subsets in the same way that χ matches up edges incident to v
and χ(v).
The second potential problem is that the vertex Map–equivalences must agree when
their domains overlap. For boundary homeomorphisms the overlap is just the boundary
of an edge space, which is a pair of points, so this a matter of choosing consistent
orientations on the edge spaces.
Roughly, this is the phenomenon underlying the fact that two HNN extensions of the
form
G+ := hG, t|tut̄ = vi and G− := hG, t|tut̄ = v̄i
might not be Map-equivalent in general, for a group G and elements u, v of G.
It is worth noting that the orientation obstruction automatically disappears if all the
edge groups contain an infinite dihedral group.
For the classification up to boundary homeomorphisms, these three obstructions,
4
relative type, realizability, and orientation, are essentially the only obstructions to constructing a Map–equivalence between the groups. We use these considerations to produce
a finer decoration that yields a structure invariant that is a complete invariant for boundary homeomorphism type, see Theorem 7.1.
In the case of quasi-isometries, orientation of the edge spaces is not enough; we must
choose Map–equivalence of the vertex spaces that agree all along the length of shared
edge spaces. There are two cases in which we can decide if this is possible. The first
is that vertex spaces are extremely flexible so that we have a lot of freedom to choose
Map–equivalences and make them agree on edge spaces. This is the case for the socalled ‘hanging’ vertices. The other case is the opposite one, in which the vertex space
is extremely ‘rigid’ and we have very little choice about how to choose the maps. In
this case we define an invariant called a stretch factor that we then incorporate into
the decoration. If all vertices are either rigid or hanging then the decoration that takes
into account vertex relative quasi-isometry type, realizability, orientation, and stretch
factors yields a complete quasi-isometry invariant, see Theorem 8.5. This notion of relative quasi-isometric rigidity is known to hold for many classes of groups, see Section 5.2.
The classifications we provide are inherently more technical than the classifications for
splittings over finite subgroups by Papasoglu and Whyte and Martin and Świątkowski.
Underlying those theorems is the fact that in splittings over finite groups the vertex
groups of the canonical decomposition are essentially independent of one another, so
only the pieces of the decomposition matter. Our classification must handle not just the
pieces, but also their complex interactions.
1.1
Applications
Our main results give invariants that reduce classification problems for finitely presented,
one-ended groups to a relative version of the classification problem on the vertex groups
of a JSJ decomposition.
Note that vertex groups of a two-ended JSJ decomposition of a one-ended group
are not necessarily one-ended, but we really have achieved a significant reduction of
the classification problem because the problem of classification of relative quasi-isometry
types is far more constrained than the general problem. The most striking example of
this phenomenon is a theorem of Cashen and Macura [14] that says that if a free group
appears as a vertex group of a JSJ decomposition then it is either hanging or it is quasiisometrically rigid relative to the peripheral structure induced by incident edge groups.
Moreover, in the rigid case the relative quasi-isometry question reduces to a relative
isometry question in certain associated cube complexes, which seems far more tractable.
A sample application of our main results is a complete description, in terms of [14], of
the quasi-isometry and boundary homeomorphism types of one-ended hyperbolic groups
that split as graphs of groups1 with free vertex groups and cyclic edge groups.
Consider the following example:
1
Such a decomposition can be algorithmically improved to a JSJ decomposition of the same type [12].
5
Example 1.1. Let Gi = a, b, t | tui t = vi , where ui and vi are words in ha, bi given
below. In each case Gi should be thought of as an HNN extension of ha, bi over Z with
stable letter t.
Let u0 := a, v0 := abab2 , u1 := ab, v1 := a2 b2 , u2 := ab2 , and v2 := a2 b.
Then G0 , G1 , and G2 are pairwise non-quasi-isometric, but have homeomorphic Gromov boundaries.
The quasi-isometry claim follows because the vertex groups in each case are quasiisometrically rigid relative to the incident edge groups, and the stretch factor for Gi is
the ratio of the word lengths of ui and vi , which are different for each i; see see Section 3
and Section 5.7. The groups have homeomorphic boundaries because the stretch factors
are the only difference, and boundary homeomorphism is not sensitive to stretch factors;
see Section 3 and Example 7.2.
Our methods produce interesting invariants even in cases that the groups are not
hyperbolic or that the relative problems for the vertex groups is not be completely understood:
Example 1.2. Let M be the mapping class group of a non-sporadic hyperbolic surface,
with a fixed finite generating set. Let g0 , g1 , g00 , g10 ∈ M be pseudo-Anosov elements
that are not proper powers. Let G := M ∗Z M and G0 := M ∗Z M be the amalgamated
product groups obtained by identifying g0 with g1 and g00 with g10 , respectively. Then G
and G0 are not quasi-isometric if the ratio of translation lengths of g0 and g1 is different,
up to inversion, from the ratio of translation lengths of g00 and g10 .
This follows because mapping class groups are quasi-isometrically rigid and the ratios
of the translation lengths in this example are the stretch factors; see Section 5.2 and
Section 5.
Acknowledgements
The first author thanks Mladen Bestvina, Jason Behrstock, and Gilbert Levitt for interesting conversations related to this work. In particular, the idea that a version of
Leighton’s Theorem would provide a concise description of our structure invariants was
suggested by Bestvina, and Example 1.2 was suggested by Behrstock.
Both authors were supported by the European Research Council (ERC) grant of
Goulnara Arzhantseva, grant agreement #259527 and the Erwin Schrödinger Institute
workshop “Geometry of Computation in Groups”. The first author is partially supported
by the Austrian Science Fund (FWF):M1717-N25. The second author is partially supported by the Austrian Science Fund (FWF):M1810-N25.
2
Preliminaries
We assume familiarity with standard concepts such as Cayley graphs, ends of spaces,
and (Gromov) hyperbolic geometry. See [10] for background.
6
A group is virtually cyclic if it has an infinite cyclic subgroup of finite index. A group
is non-elementary is it is neither finite nor virtually cyclic. A standard exercise is to
show that a finitely generated, two-ended group is virtually cyclic.
2.1
Coarse geometry
Throughout the paper the qualifier ‘coarse’ is used to indicate ‘up to additive error’.
Let (X, dX ) and (Y, dY ) be metric spaces. Subsets of X are coarsely equivalent if they
are bounded Hausdorff distance from one another. A subset A is coarsely contained in B
if A is coarsely equivalent to a subset of B. Two maps φ and φ0 from X to Y are said to be
coarsely equivalent or bounded distance from each other if supx∈X dY (φ(x), φ0 (x)) < ∞.
A map φ : X → Y is coarsely surjective if its image is coarsely equivalent to Y .
A map φ : X → Y is a controlled embedding 2 if there exist unbounded, non-decreasing
real functions ρ0 and ρ1 such that for all x and x0 in X we have:
ρ0 (dX (x, x0 )) ≤ dY (φ(x), φ(x0 )) ≤ ρ1 (dX (x, x0 ))
There are several classes of controlled embeddings that have special names. If ρi (r) :=
Mi r for i ∈ {0, 1} then φ is
• an isometric embedding if M0 = 1 = M1 ,
• an M –similitude if M0 = M = M1 ,
• an M –biLipschitz embedding if M0−1 = M = M1 .
If such a map is surjective then it is called, respectively, an isometry, similarity, or
biLipschitz equivalence.
For each of these, we can add the qualifier ‘coarse’ and allow an additive error, so that
ρ0 (r) := M0 r − A and ρ1 (r) := M1 r + A. For instance, φ is an (M, A)–coarse biLipschitz
embedding if ρi is as above with M0 = M −1 and M1 = M . In the ‘coarse’ cases we drop
the term ‘embedding’ if the map is coarsely surjective.
An (M, A)–coarse biLipschitz embedding is more commonly called an (M, A)–quasiisometric embedding.
Let QIsom(X, Y ) denote the set of quasi-isometries from X to Y , and let CIsom(X, Y )
denote the set of coarse isometries from X to Y . For a coarsely surjective map φ : X → Y ,
a coarse inverse is a map φ : Y → X such that φ ◦ φ is coarsely equivalent to IdX and
φ ◦ φ is coarsely equivalent to IdY . If φ ∈ QIsom(X, Y ) then all coarse inverses of φ are
coarsely equivalent and belong to QIsom(Y, X). If φ ∈ CIsom(X, Y ) then every coarse
inverse of φ belongs to CIsom(Y, X).
Let I(X, Y ), CI(X, Y ), and QI(X, Y ) denote, respectively, the sets Isom(X, Y ),
CIsom(X, Y ), and QIsom(X, Y ), modulo coarse equivalence. When Y = X we shorten
the notation to I(X), CI(X), QI(X), and each of these form a group under composition.
2
This is more commonly called a ‘coarse embedding’.
7
A subset of CI(X, Y ) or QI(X, Y ) is said to be uniform if there exists a C such
that every element of the subset is an equivalence class of maps containing a C–coarse
isometry or a (C, C)–quasi-isometry, respectively.
Quasi-isometries respect coarse equivalence of subsets. If P is a set of coarse equivalence classes of subsets of X, and P 0 is a set of coarse equivalence classes of subsets of
Y , let QI((X, P), (Y, P 0 )) be the subset of QI(X, Y ) consisting of quasi-isometries that
induce bijections between P and P 0 . Similarly, QI((X, P)) := QI((X, P), (X, P)) is a
subgroup of QI(X).
If φ : X → Y is a quasi-isometry, define φ∗ : QI(X) → QI(Y ) by φ∗ (ψ) := φ ◦ ψ ◦ φ.
A subset Y ⊂ X is coarsely connected if there exists some A such that for every y
and y 0 ∈ Y there is, for some k, a chain y0 := y, y1 , . . . , yk := y 0 of (k + 1) points yi ∈ Y
such that d(yi , yi+1 ) ≤ A.
A geodesic is an isometric embedding of a connected subset of R. A coarse geodesic
is a coarse geodesic embedding of a coarsely connected subset of R. A quasi-geodesic is
a quasi-isometric embedding of a coarsely connected subset of R.
The space X is said to be geodesic, A–coarse geodesic, or (M, A)–quasi-geodesic if
for every pair of points in X there exists, respectively, a geodesic, A–coarse geodesic, or
(M, A)–quasi-geodesic connecting them.
Let JXK denote the set of proper geodesic metric spaces quasi-isometric to X. If P
is a set of coarse equivalence classes of subsets of X, let J(X, P)K denote the set of pairs
(Y, P 0 ) where Y is a geodesic metric space and P 0 is a collection of coarse equivalence
classes of subsets of Y such that there exists a quasi-isometry from X to Y that induces
a bijection from P to P 0 . We call JXK the quasi-isometry type of X and J(X, P)K the
relative quasi-isometry type of (X, P).
If L is a path connected subset of a geodesic metric space (X, dX ), let dL denote
the induced length metric on L. A quasi-line in X is a path connected subset L such
that (L, dL ) is quasi-isometric to R and the inclusion map of L into X is a controlled
embedding.
We define a peripheral structure P on geodesic metric space X to be a collection of
coarse equivalence classes of quasi-lines. In particular, if G is a finitely generated group
and H is a finite collection of two-ended subgroups of G, then H induces a peripheral
structure consisting of distinct coarse equivalence classes of conjugates of elements of H.
2.2
Graphs of groups
Let Γ be a finite oriented graph. Let VΓ be the set of vertices of Γ, and let E + Γ be the set
of oriented edges. For e ∈ E + Γ, let ι(e) be its initial vertex, and let τ (e) be its terminal
vertex. For each e ∈ E + Γ formally define e to be an inverse edge to e with ι(v) := τ (e),
τ (e) := ι(e), and ē¯ := e. The inverse edge e should be thought of as e traversed against
its given orientation. Let E − Γ denote the set of inverse edges, and EΓ := E + Γ ∪ E − Γ.
A graph of groups Γ := (Γ, {Gγ }γ∈VΓ∪E + Γ , {εe }e∈E + Γ ) consists of a finite directed
graph Γ, groups Gγ for γ ∈ VΓ ∪ E + Γ such that Ge < Gι(e) for e ∈ E + Γ, and injections
εe : Ge ,→ Gτ (e) for e ∈ E + Γ.
8
For symmetry in the notation it is convenient to define Gē := Ge for each e ∈ E − Γ
and let εē denote the inclusion of Gē := Ge into Gτ (ē) := Gι(e) .
A graph of groups Γ has an associated fundamental group G = G(Γ) obtained by
amalgamating the vertex groups over the edge groups [41]. We say that Γ is a graph of
groups decomposition of G.
The Bass-Serre tree T := T (Γ) of Γ is the tree on which G acts without edge inversions, such that G\T = Γ and such that the stabilizer Gt of t ∈ VT ∪ ET is a conjugate
in G of the group Gt , where t is the image of t under the quotient map T → Γ.
Throughout we use the notation t to denote the image of t in Γ. Conversely, for each
γ ∈ VΓ ∪ EΓ we choose some lift γ
e of γ to T . Given a maximal subtree in Γ we can, and
do, choose lifts of vertices and edge in the subtree to get a subtree in T .
Definition 2.1. Given a vertex group Gv of Γ, the peripheral structure coming from
incident edge groups, Pv , is the set of distinct coarse equivalence classes in Gv of Gv –
conjugates of the images of the edge injections εe : Ge ,→ Gv for edges e ∈ EΓ with
τ (e) = v.
Definition 2.2. Given a vertex v of T (Γ), the peripheral structure coming from incident
edge groups, Pv , is the set of distinct coarse equivalence classes in the stabilizer subgroup
Gv of v of stabilizers of incident edge groups.
It is immediate from the definitions that the quotient by the G–action identifies
(Gv , Pv ) and (Gv , Pv ).
We are interested in graphs of groups in which the edge groups are two-ended, hence
virtually cyclic. Commensurability of edge stabilizers defines an equivalence relation on
the edges of the Bass-Serre tree T of such a splitting. The equivalence classes of edges
are called cylinders. Every cylinder is a subtree of T [23, Lemma 4.2]. It follows that we
get another tree Cyl(T ), called the tree of cylinders of T , by taking the dual tree to the
covering of T by cylinders.
Definition 2.3. A graph of groups with two-ended edge groups is k–acylindrical if the
cylinders of its Bass-Serre tree have diameter at most k. It is acylindrical if there exists
k such that it is k–acylindrical.
Let C be a cylinder in T and let Stab(C) be the stabilizer of C in G. Choose an
infinite order element z in Ge for some edge e ∈ C. For any element g ∈ Stab(C), Ge and
Gge are commensurable, virtually cyclic groups. Since hzi is a finite index subgroup of
Ge , there exist non-zero a and b such that gz a g −1 = z b . Define ∆(g) = ab . This defines
a homomorphism ∆ : Stab(C) → Q∗ , called the modular homomorphism of C, that is
independent of the choice of z.
Definition 2.4. A cylinder is called unimodular if the image of its modular homomorphism is in {−1, 1}.
A graph of groups with two-ended edge groups is unimodular if all of its cylinders
are unimodular.
9
ˆ on pairs of edges of a cylinder C:
We also define a modulus ∆
Definition 2.5. Let e0 and e1 be edges in C. Let hz0 i < Ge0 and hz1 i < Ge1 be infinite
ˆ 0 , e1 ) = [hz1 i:hz0 i∩hz1 i] .
cyclic subgroups of minimal index. Define ∆(e
[hz0 i:hz0 i∩hz1 i]
ˆ does not depend on the choice of minimal index infinite
It is easy to check that ∆
ˆ ge) = |∆(g)|.
cyclic subgroups, and that ∆(e,
2.3
2.3.1
The JSJ tree of cylinders
Definitions
A JSJ decomposition of a finitely presented, one-ended group G over two-ended subgroups
is a graph of groups with two-ended edge groups that encodes all splittings of G over twoended subgroups. Equivalent descriptions of such decompositions appear in Dunwoody
and Sageev [17], Fujiwara and Papasoglu [19], and Guirardel and Levitt [22]. See also
Rips and Sela [39].
Following Papasoglu [36], we will give a geometric description of JSJ decompositions.
First, we need some terminology.
A quasi-line L is separating if its complement has at least two essential components,
that is, components that are not contained in any finite neighborhood of L. In particular,
if G splits over a two-ended subgroup then that two-ended subgroup is bounded distance
from a separating quasi-line. Separating quasi-lines cross if each travels arbitrarily deeply
into two different essential complementary components of the other.
Let Gv be a vertex group in a graph of groups decomposition. Let Pv be the peripheral
structure on Gv coming from incident edge groups. Let Σ be a hyperbolic pair of pants.
Let P∂Σ be the peripheral structure on the universal cover Σ̃ of Σ consisting of the coarse
equivalence classes of the components of the preimages of the boundary curves.
Definition 2.6. We say v is hanging 3 if (Gv , Pv ) is quasi-isometric to (Σ̃, P∂Σ ). We
say v is rigid if it is not two-ended, not hanging, and does not split over a two-ended
subgroup relative to its incident edge groups.
The rigid and hanging terminology extends to vertices in T (Γ) in the obvious way.
Definition 2.7. Let G be a finitely presented one-ended group that is not commensurable
to a surface group. A JSJ decomposition of G is a (possibly trivial) graph of groups
decomposition Γ with two-ended edge groups satisfying the following conditions:
(a) Every vertex group is either two-ended, hanging, or rigid.
(b) If v is a valence one vertex with two-ended vertex group then the incident edge group
does not surject onto Gv .
(c) Every cylinder in the Bass-Serre tree of Γ that contains exactly two hanging vertices
also contains a rigid vertex.
3
After the ‘quadratically hanging’ vertex groups of Rips and Sela [38].
10
This definition is equivalent to those cited above. The essential facts are that:
1. Hanging vertices contain crossing pairs of separating quasi-lines.
2. Every pair of crossing separating quasi-lines is coarsely contained in a conjugate of
a hanging vertex group.
3. A separating quasi-line that is not crossed by any other separating quasi-line is
coarsely equivalent to a conjugate of an edge group.
4. Every edge group is coarsely equivalent to a separating quasi-line that is not crossed
by any other separating quasi-line.
Remark. Condition (c) implies that the hanging vertex groups are maximal hanging,
which is necessary for item 4.
Remark. The case that a vertex group is the fundamental group of a pair of pants and
the incident edge groups glue on to the boundary curves is called ‘rigid’ in the usual
JSJ terminology because there are no splittings of the pair of pants group relative to
the boundary subgroups. Algebraically, such a vertex behaves like our rigid vertices, but
geometrically this is a hanging vertex.
In general a group does not have a unique JSJ decomposition, but rather a deformation space of JSJ decompositions [18, 22]. Furthermore, all JSJ decompositions are in
the same deformation space, which means any one can be transformed into any other by
meas of a finite sequence of moves of a prescribed type. The tree of cylinders of a decomposition depends only on the deformation space [23, Theorem 1], up to G–equivariant
isomorphism, so there is a unique JSJ tree of cylinders.
Definition 2.8. Let G be a finitely presented one-ended group. The JSJ tree of cylinders
Cyl(G) of G is the tree of cylinders of the Bass-Serre tree of any JSJ decomposition of
G over two-ended subgroups.
The quotient graph of groups G\Cyl(G) gives a canonical decomposition of G. It is
canonical in the sense that its Bass-Serre tree is G–equivariantly isomorphic to the tree
of cylinders of any JSJ decomposition of G over two-ended subgroups. However, such
a graph of cylinders is not necessarily a JSJ decomposition, and it does not even have
two-ended edge groups, in general. We return to this issue in Section 2.3.4.
2.3.2
Quasi-isometry invariance of the JSJ tree of cylinders
Since quasi-isometries coarsely preserve quasi-lines, and preserve the crossing and separating properties of quasi-lines, the following version of quasi-isometry invariance of JSJ
decompositions follows from Papasoglu’s work:
Theorem 2.9 (cf [36, Theorem 7.1]). Let G and G0 be finitely presented one-ended
groups. Suppose φ : G → G0 is a quasi-isometry. Then there is a constant C such that φ
induces an isomorphism φ∗ : Cyl(G) → Cyl(G0 ) that preserves vertex type — cylinder,
hanging, or rigid — and for v ∈ V Cyl(G) takes Gv to within distance C of G0φ∗ (v) .
11
Proof. Two-ended subgroups of G are bounded distance from each other if and only if
they are commensurable, so cylinders are coarse equivalence classes of edge and twoended vertex stabilizers. These are exactly the coarse equivalence classes of separating
quasi-lines that are not crossed by other separating quasi-lines, so quasi-isometries induce
a bijection between cylinders. The remaining statements are from Papasoglu [36, Theorem 7.1] for the rigid and hanging vertex stabilizers and Vavrichek [45] for the cylinder
stabilizers.
Corollary 2.10. If v is a rigid or hanging vertex in Cyl(G) then
φv := πφ∗ (v) ◦ φ|Gv ∈ QI((Gv , Pv ), (G0φ∗ (v) , Pφ∗ (v) ))
where πφ∗ (v) takes the image of φ|Gv to G0φ∗ (v) by closest point projection.
Remark. πφ∗ (v) is coarsely well defined since φ(Gv ) is within distance C of G0φ∗ (v) .
2.3.3
Boundary homeomorphism invariance of the JSJ tree of cylinders
In the case of a one-ended hyperbolic group that is not cocompact Fuchsian, Bowditch
constructed a canonical JSJ splitting of the group directly from the combinatorics of the
local cut points of the Gromov boundary of the group [9]. In this case, he proves that
the JSJ tree is unique, and such a tree is thus equivariantly isomorphic to the JSJ tree
of cylinders of the group. As a homeomorphism between the Gromov boundaries of two
hyperbolic groups preserves the topology, we get the following:
Theorem 2.11 (cf [9]). Let G and G0 be one-ended hyperbolic groups that are not cocompact Fuchsian. Suppose ρ : ∂G → ∂G0 is a homeomorphism between their Gromov
boundaries. Then ρ induces an isomorphism ρ∗ : Cyl(G) → Cyl(G0 ) that preserves vertex type — cylinder, hanging, or rigid — and for v ∈ V Cyl(G) the homeomorphism ρ
restricts to a homeomorphism ρ|∂Gv : ∂Gv → ∂G0ρ∗ (v) .
Corollary 2.12. For every vertex v ∈ Cyl(G):
ρv := ρ|∂Gv ∈ Homeo((∂Gv , ∂Pv ), (∂G0ρ∗ (v) , ∂Pρ0 ∗ (v) ))
2.3.4
Improved invariants from restrictions on the JSJ tree of cylinders
The JSJ tree of cylinders Cyl(G) of a finitely presented one-ended group G suffices for
the definition of the basic quasi-isometry invariants of Section 4. These are far from
complete invariants, however.
We can refine the invariants in restricted classes of groups. For instance, if the edges of
Cyl(G) have two-ended stabilizers in G then we can define stretch factors as in Section 5.
When the cylinder stabilizers are two-ended then the full power of Section 6 can be
brought to bear. In this case the graph of cylinders is a canonical JSJ decomposition of
G over two-ended subgroups. This is the case of chief interest for this paper, and this is
always the case if G is hyperbolic.
12
If the cylindrical vertices of Cyl(G) have two-ended stabilizers then they are all finite valence in Cyl(G). Furthermore, if Γ is a JSJ decomposition of G over two-ended
subgroups and v ∈ T (Γ) is a vertex whose stabilizer is rigid or hanging then v belongs
to more than one cylinder, so Cyl(G) has a vertex corresponding to v with the same
stabilizer subgroup in G. Thus, Cyl(G) is bipartite, with one part, VC , consisting of
finite valence cylindrical vertices, one for each cylinder of T (Γ), and the other part consisting of the sets of vertices VH and VR , which are all of infinite valence, corresponding
to hanging and rigid vertices of T (Γ), respectively.
See [23, Proposition 5.2] for a general result about when the tree of cylinders gives a
JSJ decomposition.
2.4
Trees of spaces
Let T be an oriented simplicial tree. For each vertex v ∈ T let Xv be a metric space. For
each edge e ∈ E + T let Xe be a subspace of Xι(e) , and let αe : Xe → Xτ (e) be a map such
that for Xē := αe (Xe ) there exists a map αē : Xē → Xι(e) such that αē ◦ αe is bounded
distance from IdXe and αe ◦ αē is bounded distance from IdXē .
Let X be the quotient of the set
a
a a
Xv t
{x} × e
v∈VT
e∈E + T x∈Xe
by the identifications x ∼ (x, ι(e)) and αe (x) ∼ (x, τ (e)). We call
X := X(T, {Xt }t∈VT ∪ET , {αe }e∈ET )
a tree of spaces over T . The Xv are called vertex spaces and the Xe are called edge
spaces. The sets {x} × e we call rungs, and metrize them as unit intervals. The maps αe
are called attaching maps.
We say X has locally finite edge patterns if for every vertex v, every x ∈ Xv , and
v
every R ≥ 0, there are finitely many e ∈ ET such that Xe intersects B R (x) := {y ∈ Xv |
dXv (x, y) ≤ R}.
A k–chain is a sequence of points x0 , x00 , x1 , . . . , x0k such that xi and x0i are contained
in a common vertex space or rung for all 0 ≤ i ≤ k and x0i and xi+1 are contained in
0
aPcommon vertex space or rung
for 0 ≤ i < k. The length of a k–chain is d(x0 , x0 ) +
0
0
0<i≤k d(xi−1 , xi ) + d(xi , xi ) , where the distance terms are interpreted in the vertex
space or rung containing the pair. The quotient pseudo-metric on X defines the distance
between two points to be the infinum of lengths of chains joining them. When x and x0
are points in vertex spaces then for a k–chain joining them we have that x0i and xi+1 are
the endpoints of a rung for each 0 ≤ i < k, so the length of the chain is at least k. The
following properties follow easily from this observation.
Lemma 2.13. For a tree of spaces X:
• The quotient pseudo-metric is a metric.
13
• A ball of radius at most 1 in a vertex space is isometrically embedded in X.
• The rungs are isometrically embedded.
Lemma 2.14. If X is a tree of spaces over T such that each vertex space is proper and
geodesic, each edge space is closed and discrete, and edge patterns are locally finite in
each vertex space, then X is a proper geodesic space.
Proof. For properness it suffices to show a closed ball centered at a point in a vertex
space is compact, since a ball centered at an interior point in a rung is contained in the
union of balls of radius 1 larger centered at the endpoints of the rung.
v
Take R > 0 and a point x ∈ Xv for some vertex v. Let N0 := B R (x). Since edge
v
patterns are locally finite, there are finitely many edges e such that Xe intersects B R (x).
v
v
For Xe ∩ B R (x) 6= ∅, the set Xe ∩ B R (x) is finite, since Xe is closed and discrete and
v
τ (e)
v
B R (x) is compact, so B R−1 (αe (Xe ∩ B R (x))) is compact.
Let N1,1 , . . . , N1,k1 be these finitely many compact sets. For each N1,i there are finitely
many e such that Xe intersects N1,i . Let N1,i,1 , . . . , N1,i,k1,i be the finitely many closed
R − 2 balls about the sets αe (Xe ∩ N1,i ) in their respective vertex spaces. Continue in
this way for R steps. Let N be the union of the finitely many N∗ , along with the finitely
many rungs connecting them. This is a finite union of compact sets, so it is compact,
and it contains B R (x), since it contains every chain of length less than or equal to R
starting from x. Thus, X is proper.
To see that X is geodesic, first consider two points x and x0 contained in vertex
spaces. By definition of the metric, there exists a sequence of chains joining x and x0
with length decreasing to d(x, x0 ). Since x and x0 are in vertex spaces, the length of a
k–chain joining them is at least k, so there is a subsequence of approximating chains
that are all k–chains for some fixed k ≤ d(x, x0 ). Let x0,i := x, x00,i , . . . , x0k,i := x0 be
the i–th k–chain in the sequence. Set x0 := x. Now, (x00,i ) is a bounded sequence in
Xv0 . Since edge spaces are closed and discrete and edge patterns are locally finite, (x00,1 )
contains a constant subsequence. Pass to a subsequence of chains such that (x00,i ) is
constant and define x00 to be its value. Since edge patterns are locally finite, x00 belongs
to finitely many Xe . Since attaching maps are coarsely invertible and edge spaces are
closed and discrete, there are only finitely many rungs with x00 as an endpoint. Therefore,
the sequence (x1,i ) takes only finitely many values. Choose one, define it to be x1 , and
pass to the subsequence with x1,i = x1 . Repeat this process k − 1 times, passing each
time to a subsequence of chains with one additional constant coordinate. We are left with
a constant sequence of chains with length decreasing to d(x, x0 ), so the length is equal to
d(x, x0 ). Each vertex space and rung are geodesic spaces, so we connect successive points
in the chain by geodesics in the vertex space or rung containing them to get a path with
length equal to length of the chain, which is therefore a geodesic from x to x0 .
If x0 is an interior point of a rung and x is in a vertex space then find geodesics from
x to the two endpoints of the rung and concatenate with the subsegment of the rung
leading to x0 . The shorter of these two paths is a geodesic. A similar argument works if
both x and x0 are interior points of rungs.
14
2.5
Algebraic trees of spaces
Let Γ be a graph of finitely generated groups. In this section we construct a tree of spaces
over T := T (Γ) that is quasi-isometric to G := G(Γ). The idea is to take the vertex
spaces to be Cayley graphs of the vertex stabilizers and use the edge injections of Γ to
define the attaching maps. The construction is standard, but there is some bookkeeping
involved that will be useful in Section 8.2.
For each v ∈ VΓ, choose a finite generating set for Gv and coset representatives h(v,i)
for G/Gv . For each e ∈ EΓ choose coset representatives g(e,i) of Gι(e) /Ge .
For each v ∈ VΓ, choose a lift ve ∈ VT . For each edge e ∈ EΓ, choose a lift ee ∈ ET
g Define fe := h
¯e = ē
with ι(e
e) = ι(e).
e. Given a maximal
(ι(e),j) g(e,i) for i and j such that fe e
subtree of Γ it is possible to choose lifts so that fe = 1 for all edges e such that e or e
belongs to the maximal subtree.
For t ∈ VT ∪ ET , let t ∈ Γ denote the image of t under the quotient by the G–action.
e ∈ T.
Let v be a vertex of T . There is a representative h(v,i) such that v = h(v,i) v
Define Yv to be a copy of the Cayley graph of Gv with respect to the chosen generating
set, which we identify with the coset h(v,i) Gv via left multiplication by h(v,i) .
Take the edge spaces to be cosets of the edge stabilizers of Γ, and define attaching
maps via containment. Specifically, for an edge e = h(v,i) g(e,j) ee ∈ T with ι(e) = v we
define Ye := h(v,i) g(e,j) Ge ⊂ h(v,i) Gv = Yv with attaching map:
−1
αe (x) := h(v,i) g(e,j) fe εe (g(e,j)
h−1
(v,i) x) ⊂ Yτ (e)
Let Y := Y (T, {Yt }, {αe }) be the resulting tree of spaces over T , which we call an
algebraic tree of spaces for Γ.
Lemma 2.15. An algebraic tree of spaces Y for Γ is quasi-isometric to G(Γ).
Proof. By Lemma 2.14, Y is a proper geodesic metric space. The group G(Γ) acts by left
multiplication, properly discontinuously and cocompactly by isometries on Y , so they are
quasi-isometric, by the Milnor-Švarc Lemma.
2.6
2.6.1
Trees of maps
Trees of quasi-isometries
Proposition 2.16. Suppose X and X 0 are trees of spaces over T and T 0 , respectively.
Suppose that χ : T → T 0 is an isomorphism. Suppose there exists M ≥ 1 and A ≥ 0 such
that:
0
• For each v ∈ VT there is an (M, A)–quasi-isometry φv : Xv → Xχ(v)
and a quasi0
isometry inverse φ̄v : Xχ(v) → Xv .
0
0
• For every e ∈ ET , the space φι(e) (Xe ) is A–coarsely equivalent to Xχ(e)
in Xχ(ι(e))
,
0
and the space φ̄ι(e) (Xχ(e) ) is A–coarsely equivalent to Xe in Xι(e) .
15
0
• For every e ∈ ET and every x ∈ Xe there exists a point x0 ∈ Xχ(e)
such that
0
0
0
d(φι(e) (x), x ) ≤ A and d(φτ (e) (αe (x)), αe (x )) ≤ A.
0
• For every e ∈ ET and every x0 ∈ Xχ(e)
there exists a point x ∈ Xe such that
0
0
0
d(φ̄ι(e) (x ), x) ≤ A and d(φ̄τ (e) (αχ(e) (x )), αe (x)) ≤ A.
Then there is a quasi-isometry φ : X → X 0 with φ|Xv = φv for each vertex v ∈ T .
Definition 2.17. A collection of quasi-isometries (φv ) satisfying the conditions given in
Proposition 2.16 is called a tree of quasi-isometries over χ compatible with X and X 0 .
Proof of Proposition 2.16. It suffices to consider the unions of the vertex spaces, which
form coarsely dense subsets of X and X 0 , and define φ by φ|Xv := φv . Define a coarse
inverse φ̄ to φ by φ̄|X 0 := φ̄v .
χ(v)
Suppose x and x0 are points in vertex spaces of X, and let x0 , x00 , x1 , . . . , x0k be a
k–chain joining them with length at most d(x, x0 ) + 1. Let Xvi be the vertex space
containing xi and x0i , and let ei be the edge such that x0i−1 and xi are endpoints of a
rung over ei .
Let y0 := φv0 (x0 ) and yk0 := φvk (x0k ). By hypothesis, for each x0i there exists a
0
0
yi ∈ Xχ(e
such that d(φι(e) (x0i ), yi0 ) ≤ A and d(φτ (e) (xi+1 ), yi+1 ) ≤ A, where yi+1 :=
i)
0
αχ(e)
(yi0 ). This gives a k–chain y0 , y00 , . . . , yk0 joining φ(x) and φ(x0 ) whose length is:
dX 0
χ(v0 )
(y0 , y00 ) +
X
0
d(yi−1
, yi ) + dX 0
χ(vi )
0<i≤k
(yi , yi0 )
≤ dX 0
(φv0 (x0 ), φv0 (x00 )) + A+
χ(v0 )
X
1 + 2A + dX 0 (φvi (xi ), φvi (x0i ))
χ(vi )
0<i≤k
≤ M dXv0 (x0 , x00 ) + 2A +
X
1 + 3A + M dXvi (xi , x0i )
0<i≤k
= 2A + k(1 + 3A) + M
X
dXvi (xi , x0i )
0≤i≤k
X
≤ 2A + max{1 + 3A, M } k +
dXvi (xi , x0i )
0≤i≤k
≤ 2A+
max{1 + 3A, M } dXv0 (x0 , x00 ) +
X
d(x0i−1 , xi ) + dXvi (xi , x0i )
0<i≤k
0
≤ 2A + max{1 + 3A, M }(d(x, x ) + 1)
Therefore, d(φ(x), φ(x0 )) ≤ max{1 + 3A, M }d(x, x0 ) + (2A + max{1 + 3A, M }), so φ
is coarsely Lipschitz. A similar computation shows φ̄ is coarsely Lipschitz, so φ is a
quasi-isometry.
16
Xι(e)
φι(e)
O
?
Xe
φe
?
/ X0
χ(e)
α0χ(e)
αe
Xτ (e)
/ X0
ι(χ(e))
O
φτ (e)
/ X0
τ (χ(e))
Figure 1: Commuting diagram for Corollary 2.18.
Corollary 2.18. Suppose χ : T → T 0 is an isomorphism of trees and X and X 0 are trees
of spaces over T and T 0 , respectively. Suppose there are M ≥ 1 and A ≥ 0 and (M, A)–
0
0
quasi-isometries φv : Xv → Xχ(v)
for each vertex and φe : Xe → Xχ(e)
for each edge such
that the diagram in Figure 1 commutes up to uniformly bounded error. Then (φv ) is a
tree of quasi-isometries over χ compatible with X and X 0 , so X is quasi-isometric to X 0 .
2.6.2
Gromov boundaries and trees of homeomorphisms
In this section, let X be a proper geodesic hyperbolic tree of spaces over a tree T ,
such that the vertex spaces are proper geodesic hyperbolic spaces, the edge spaces are
uniformly quasi-convex in X, and the attaching maps are uniform quasi-isometries.
For example, if Γ is a finite acylindrical graph of hyperbolic groups such that the
edge injections are quasi-isometric embeddings then the algebraic tree of spaces has this
structure [4, 24]. If, moreover, the edge groups are two-ended then the edge injections
are automatically quasi-isometric embeddings.
Quasi-convexity of edge spaces implies quasi-convexity of vertex spaces, so the Gromov boundary of each vertex space and
` edge space embeds into the boundary of X.
Consider the space ∂X := ∂T t v∈VT ∂Xv modulo identifying ∂X
` e ⊂ ∂Xι(e) with
∂Xē ⊂ ∂Xτ (e) via ∂ψe for each edge e. Let ∂Stab denote the image of v∈VT ∂Xv in ∂X.
Lemma 2.19. The inclusion of ∂X into the Gromov boundary of X is a surjection.
Proof. Pick a basepoint p ∈ X and let ζ : [0, ∞] → X̄ be a geodesic ray based at p.
Consider the projection π(p) of p to T .
If π ◦ζ crosses some edge e infinitely many times then there is an unbounded sequence
of times t1 , t2 , . . . such that ζ(ti ) ∈ Xe . Since the edge space is quasi-convex, ζ stays
bounded distance from Xe , so converges to a point in ∂Xe .
A similar argument shows that if π ◦ ζ visits a vertex v infinitely many times or is
eventually constant at v then ζ converges to a point in ∂Xv .
The remaining possibility is that π ◦ ζ limits to a point of ∂T . We claim there is a
unique asymptotic class of geodesic rays in X with π ◦ζ → η ∈ ∂T . Suppose ζ 0 is another
17
such ray. Let v0 be the vertex such that p ∈ Xv0 . Let e be an edge in T on the geodesic
from v0 to η. Let e0 be another edge on the geodesic from v0 to η that is distance at least
δ + Q from e, where δ is the hyperbolicity constant for X and Q is the quasi-convexity
constant for edge spaces. Let x be a point of ζ ∩ Xe and y a point of ζ ∩ Xe0 . Let x0 be
a point of ζ 0 ∩ Xe and y 0 a point of ζ 0 ∩ Xe0 . Consider a geodesic triangle whose sides
are ζ|[p,y] , ζ 0 |[p,y0 ] , and a geodesic ζ 00 from y to y 0 . By quasi-convexity, d(x, ζ 00 ) > δ and
d(x0 , ζ 00 ) > δ. Therefore, hyperbolicity implies d(x, ζ 0 ) ≤ δ and d(x0 , ζ) ≤ δ. This implies
ζ and ζ 0 are asymptotic.
Now we define a topology on ∂X and show it is equivalent to the Gromov topology.
Definition 2.20 (domains). The domain D(η) of a point η ∈ ∂T is the singleton {η}.
The domain D(ξ) of a point ξ of ∂Stab X is the subtree of T spanned by those vertices v
of T such that ∂Xv contains a point in the equivalence class ξ.
Remark 2.21. It can be proved that domains of points of ∂Stab X have a uniformly
bounded number of edges, see [30].
We can now define neighborhoods of points of ∂X, starting with points of ∂T .
Definition 2.22 (neighborhoods of points of ∂T ). Let η be a point of ∂T , and U be a
neighborhood of η in T ∪ ∂T . We define the neighborhood VU (η) as the set of points of
∂X whose domain is contained in U .
Before moving to neighborhoods of points of ∂Stab X, we need a definition.
Definition 2.23 (ξ-family, cone). Let ξ be a point of ∂Stab X. For every vertex v of D(ξ),
choose a neighborhood Uv of ξ in Xv ∪ ∂Xv . Let U be the collection of sets Uv , v ∈ D(ξ),
which we call a ξ-family. We define the set ConeU (ξ), called a cone, as the set of points
w ∈ (T ∪ ∂T ) \ D(ξ) such that if e is the last edge of the geodesic from w to D(ξ) in T ,
we have ∂αe (∂Xe ) ⊂ Uτ (e) .
Definition 2.24 (neighborhoods of points of ∂Stab X). Let ξ be a point of ∂Stab X, and
U be a ξ-family. We define the neighborhood VU (ξ) as the set of points η of ∂X such
that the following holds:
• D(η) \ D(ξ) is contained in ConeU (ξ),
• for every vertex v of D(ξ) ∩ D(η), we have η ∈ Uv .
Theorem 2.25 ( [30, Corollary 9.19]). With the topology described above, the inclusion
of ∂X into the Gromov boundary of X is a homeomorphism.
Definition 2.26. Let X and X 0 be proper geodesic hyperbolic trees of quasi-convex
spaces over a trees T and T 0 , respectively. A tree of boundary homeomorphisms compatible
with X and X 0 over an isomorphism χ : T → T 0 consists of homeomorphisms ρv : ∂Xv →
0
∂Xχ(v)
for every vertex v ∈ T such that for ξ ∈ ∂Xv ∩ ∂Xw we have ρv (ξ) = ρw (ξ) ∈
0
0
−1
∂Xχ(v) ∩∂Xχ(w)
, and for ξ ∈ ∂Xv0 ∩∂Xw0 we have ρ−1
v (ξ) = ρw (ξ) ∈ ∂Xχ−1 (v) ∩∂Xχ−1 (w) .
18
Proposition 2.27. Let X and X 0 be proper geodesic hyperbolic trees of quasi-convex
spaces over trees T and T 0 , respectively, with a compatible tree of boundary homeomorphisms (ρv ) over χ ∈ Isom(T, T 0 ). Then there is a homeomorphism ρ : ∂X → ∂Y defined
by ρ|∂Xv := ρv and ρ|∂T := ∂χ.
Proof. We have a well defined map ρ and its inverse ρ−1 is defined by ρ−1 |∂Xv0 := ρ−1
χ−1 (v)
and ρ−1 |∂T := ∂χ−1 . It clear that ρ and ρ−1 are continuous with respect to the topology
given in Definition 2.22 and Definition 2.24, which is equivalent to the standard topology
by Theorem 2.25.
Theorem 2.28. Let G and G0 be one-ended hyperbolic groups with non-trivial two-ended
JSJ decompositions. Let X and X 0 be algebraic trees of spaces over the respective JSJ
trees of cylinders T := Cyl(G) and T 0 := Cyl(G0 ). Every homeomorphism ρ : ∂X → ∂X 0
splits as a tree of compatible boundary homeomorphisms over the isomorphism ρ∗ : T →
T 0 . Every tree of boundary homeomorphisms (ρv ) compatible with X and X 0 over an
isomorphism χ : T → T 0 patches together to give a homeomorphism ρ : ∂X → ∂X 0 with
ρ∗ = χ and ρ|∂Xv = ρv .
Proof. Since the edge groups are two-ended they are virtually cyclic, hence quasi-convex.
Therefore, the boundary of each vertex space embeds into the boundary of its tree of
spaces. By Theorem 2.11, ρ induces an isomorphism ρ∗ : T → T 0 and ρ(∂Xv ) = ∂Xρ0 ∗ (v) .
Since these spaces are embedded, ρ|∂Xv ∈ Homeo((∂Xv , ∂Pv ), (∂Xρ0 ∗ (v) , ∂Pρ0 ∗ (v) )), so ρ
splits as a tree of boundary homeomorphisms over ρ∗ .
The converse is Proposition 2.27.
3
Distinguishing orbits: Basic examples
Given a group G, a common strategy in understanding groups quasi-isometric to G is
to first understand self-quasi-isometries of G. We explained in the previous section that
QI(G) acts on Cyl(G), preserving the relative quasi-isometry types of vertices. A first
step towards understanding QI(G) is to understand its action on Cyl(G). In particular,
we would like to determine the QI(G)–orbits of vertices in Cyl(G). We know that there
are finitely many G–orbits of vertices in Cyl(G), and that QI(G)–orbits are unions of
G–orbits, so the problem reduces to distinguishing G–orbits that are not contained in a
common QI(G)–orbit.
In this section we show on some particular examples how one may distinguish G–
orbits. These examples motivate the technical machinery of the following sections, in
which we combine and iterate the considerations presented here.
Our examples are hyperbolic, so, as usual, we consider the cases of quasi-isometry
and boundary homeomorphism simultaneously by letting Map(G) mean either QI(G) or
Homeo(∂G), as appropriate.
In general our techniques reduce questions about graphs of groups to questions about
the vertex groups, so our results are strongest, and the examples are most illuminating,
19
when the vertex groups are well understood. First we establish such a well understood
vertex group, and then we use it to construct graph of group examples.
Consider the free group F2 = ha, bi. Let X be the Cayley graph of F2 with respect to
the generating set {a, b}. Recall that if H is a finite collection of two-ended subgroups
of F2 then there is a corresponding peripheral structure P on X consisting of distinct
coarse equivalence classes of conjugates of elements of H. Since X is a tree, the coarse
equivalence class of a two-ended subgroup contains a unique bi-infinite geodesic, so we
can think of P as an F2 –invariant collection of bi-infinite geodesics.
We claim that J(X, Pi )K = J(X, Pj )K for all i and j where Pi is the peripheral structure
induced by Hi defined as follows:
• H0 = {ha2 b2 abi}
• H3 = {hai, habab2 i}
• H1 = {hab2 i, ha2 bi}
• H4 = {hai, hbi, hababi}
• H2 = {habi, ha2 b2 i}
• H5 = {hai, hbi, habi, habi}
This follows from [14, Theorem 6.3]. The reason is that the Whitehead graph for
each of these examples is the complete graph on four vertices. For each i, there are
exactly 6 bi-infinite geodesics representing elements of Pi passing through the vertex of X
corresponding to the identity element of F2 . Given i and j, any choice of bijection between
these six elements of Pi and the six corresponding elements of Pj extends uniquely to an
element of QI((X, Pi ), (X, Pj )). Conversely, every element of QI((X, Pi ), (X, Pj )) is of
this form, up to pre- and post-composition with the F2 –action.
When F2 is a vertex group of a graph of groups and the peripheral structure coming
from incident edge groups is one of the Pi above then the vertex is rigid.
For variety, we give two more rigid examples.
• F3 = ha, b, ci relative to the peripheral structure induced by ha2 b2 c2 acbi. The
Whitehead graph for this example is the complete bipartite graph with parts of
three vertices each. This peripheral structure is not quasi-isometrically equivalent
to the Pi given above.
• π1 (M ), for M a closed hyperbolic 3–manifold, relative to the peripheral structure
induced by hgi, where g is a non-trivial, indivisible element of π1 (M ).
3.1
First example: wrong type, bad neighbors, stretch factors
Consider the graph of groups Γ shown in Figure 2. It is the graph of cylinders for the
one-ended hyperbolic group G := G(Γ), so T := T (Γ) = Cyl(G). The label below a
vertex is its name, and the label above a vertex is the associated vertex group. All of the
edge groups are infinite cyclic. Suppose that we have chosen a generator for each infinite
cyclic vertex and edge group. Each end of an edge is labelled to indicate the image of
this generator in the incident vertex group. For cyclic vertices we give a non-zero integer
indicating that the image of the edge generator is that power of the vertex generator.
20
2
ab
ab2
Z
a2 b̄2
F2 ab̄2
Z
r1
c2
F2 ab̄2
Z
r2
c3
F2 ab
Z
r3
c1
ab2
ab2
g
a2 b2 āb̄
F2 ab̄2
Z
a2 b2 āb̄
F2 ab̄2
Z
c6
F2
r8
abāb̄
c5
r5
F2
r7
c4
r4
π1 (M )
r6
F2
h
a2 b2 c2 acb
F3
r9
Figure 2: First example Γ
This label is omitted when it is equal to 1, which is the case for all edges in this particular
graph of groups.
For non-cyclic vertices we indicate the element that is the image of the chosen generator of the edge group. For economy of notation we reuse a and b as generators of all
the F2 vertex groups. These are distinct subgroups of G, so more properly we would say,
for instance, that Gr1 = ha1 , b1 i and the two incident edge injections send the generators
of their respective edge groups to a1 b21 and a1 b21 .
In this section we describe the Map(G)–orbits of vertices in T .
3.1.1
Wrong type
The vertex h is the only hanging vertex, so Ge
h is a Map(G)–orbit.
The vertices labelled ci are cylindrical, while the vertices labelled ri are rigid, so there
are no i and j such that rei and cej are in the same Map(G)–orbit.
The vertex group of r6 is not quasi-isometric or boundary homeomorphic to any of
the other vertex groups, so Gre6 is a Map(G)–orbit.
The vertex group of r9 relative to the peripheral structure induced by the incident
edge is not the same relative quasi-isometry or boundary homeomorphism type of any
other vertex, so Gre9 is a Map(G)–orbit.
3.1.2
Bad neighbors
The cylindrical vertices have finite valence in T . The valence of vertices in Gce1 is 5, while
for all other cylindrical vertices it is 2. Thus, Gce1 is a Map(G)–orbit.
Vertices in Gce2 are the only ones adjacent to vertices in the Map(G)–orbit Gre6 , so
Gce2 is a Map(G)–orbit.
21
Vertices in Gce2 are adjacent only to vertices in Gre1 and Gre6 , but we already know
that Gre6 is a Map(G)–orbit, so Gre1 is a Map(G)–orbit as well.
By the same sort of argument, we quickly conclude that Gce5 , Gre4 , Gce6 , and Gre5 are
distinct Map(G)–orbits.
Such arguments based on distinguishing vertices by their neighbors are the contents
of Section 4.
3.1.3
Stretch factors
It remains to differentiate the second and third branches of Γ. This is more subtle, as the
only difference is at vertices r2 and r3 , which do have the same relative quasi-isometry
type.
Notices that the generator of Gc3 is identified with an element of word length 6 in
Gr7 , and length 3 in Gr2 , whereas the generator of Gc4 is identified with elements of
word lengths 6 and 2. It is not at all obvious that these lengths are preserved by quasiisometries. Nevertheless, we will show that in this particular example ce3 and ce4 can be
distinguished up to quasi-isometry by the fact that the ratios 63 and 62 are not equal.
These ratios correspond to an invariant called the ‘stretch factor’, which is developed in
Section 5.
By neighbor arguments as above we can then conclude that QI(G)–orbits of T are
the same as G–orbits.
The stretch factor is only an invariant for quasi-isometries, not boundary homeomorphism. In this example we cannot, in fact, distinguish the second and third branch of Γ
up to boundary homeomorphism, which is to say, Gre2 ∪Gre3 is a single Homeo(∂G)–orbit,
as are Gce3 ∪ Gce4 and Gre7 ∪ Gre8 .
3.2
Second example: unbalanced cylinders
In general, if L is an element of a peripheral structure P on X, there is no reason to believe
that there is an element of Map((X, P)) that preserves L and reverses its orientation.
We briefly give an idea how one may construct such an example. Consider the genus
7 surface Σ in Figure 3, with a hyperbolic metric.
Let f ∈ π1 (Σ) be the element represented by the curve running around the central
e = H2 . The figure shows
hole. Let L be a component of the preimage of this curve in Σ
three curves the separate Σ into subsurfaces Σ1 , Σ2 , and Σ3 , each of which is a genus
two surface with two boundary components. Suppose each Σi contains a collection of
curves that is complicated enough so that all the complementary components are discs,
and different enough so that there does not exist a crossing-preserving bijection between
the components of the preimages of the curves of Σi contained in one component of the
e and the components of the preimages of the curves of Σj contained in
preimage of Σi in Σ
e induced by
one component of the preimage of Σj . Let P be the peripheral structure on Σ
all of the above curves in Σ, which is to say, each element of P is the coarse equivalence
e of one of the curves in Σ.
class of a component of the preimage in Σ
22
Figure 3: The surface Σ
Then there is no element of Map(π1 (Σ), P) that reverses L. The reason is that L
passes through components of the preimages of Σ1 , Σ2 , and Σ3 in order. If this order
were reversible by an element of Map((π1 (Σ), P)) we would contradict the restriction
that the pattern of curves in Σ1 , Σ2 , and Σ3 were chosen to be ‘different’.
Now consider the graph of groups Γ of Figure 4, where Σ and f are as above, and
g is a non-trivial, indecomposable element of a closed hyperbolic 3–manifold M . Then
G := G(Γ) is a one-ended hyperbolic group with T := T (Γ) = Cyl(G).
r4
π1 (M )
g
c2
r1
Z
π1 (Σ)
f
Z
−1
r3
c1
π1 (Σ)
f
r2
f
π1 (Σ)
Figure 4: Second example Γ
The graph of groups Γ has a central cylindrical vertex c1 that attaches to three rigid
vertices r1 , r2 , and r3 , each of which has local group π1 (Σ), with each attachment along a
copy of f . For each ri there are some number of other incident edges, each corresponding
to one of the curves in Σ described above, so that the peripheral structure on Gri induced
e Each of these
by edge inclusions is the peripheral structure P described above for Σ.
edges we attach to another cylindrical vertex, and then to a rigid vertex carrying a copy
of π1 (M ).
23
We consider a kind of ‘f –parity’ by counting the number of vertices adjacent to ce1
for which the generator of Gce1 is identified with f minus the number of vertices adjacent
to ce1 for which the generator of Gce1 is identified with f . Since ce1 has non-zero f –parity,
we call it an unbalanced cylinder. We claim that there is not an element of Map(G) that
reverses the orientation of an unbalanced cylinder. In this example, we then conclude
that Gre3 is a Map(G)–orbit and Gre1 ∪ Gre2 is a different Map(G)–orbit.
The proof is as follows. Since Gce1 is the only G–orbit of cylindrical vertices in T of
valence 3, if there were an element of Map(G) taking re3 to, say, re1 , then it would fix
ce1 . There is clearly an element of Map((Gr3 , Pr3 ), (Gr1 , Pr1 )) taking f to f , but, since f
is not reversible, if such a map extended to an element of Map(G) it would necessarily
reverse the orientation of Gce1 . Since f is not reversible, this would mean that every
vertex in which f is identified with the generator of Gce1 must be sent to a vertex in
which f is identified with the generator of Gce1 . This means that both re1 and re2 are sent
to re3 , contradicting the fact that Map(G) acts by isomorphisms on T .
Dealing with issues of orientation and unbalanced cylinders is the focus of Section 6.2.
4
Decorated trees and structure invariants
Let G be a group and let T be a simplicial tree of countable valence upon which G
acts cocompactly and without inverting an edge. In this section, we explain how to
associate to T an invariant, the structure invariant, that completely characterizes it up
to decoration-preserving isomorphism. The construction of this invariant generalizes the
‘degree refinement’ invariant of graph theory, which is an invariant that determines when
two finite graphs have isomorphic universal covers.
Definition 4.1. A decoration is a G–invariant map δ : T → O that assigns to each
vertex of T an ornament o ∈ O.
For simplicity, in this section we decorate only vertices. In the next section we will
also decorate edges, with the condition that δ(e) = δ(ē) for every edge. Formally, this
can be accomplished by subdividing each edge of T and decorating
` the new vertices.
Corresponding to a decoration there is a partition of T as o∈O δ −1 (o). We say
that a decoration δ 0 : T → O0 is a refinement of δ if the δ 0 –partition is finer than the
δ–partition. Equivalently, a decoration δ 0 : T → O0 is a refinement of δ : T → O if there
exists a surjective map π : Im δ 0 → Im δ such that π ◦ δ 0 = δ. We say δ 0 is a strict
refinement if the δ 0 –partition is strictly finer than the δ–partition. A refinement that is
not strict is a trivial refinement.
In this section, we will define a structure invariant for a decorated tree, such that we
can reconstruct the tree, up to decoration-preserving tree automorphism, from the data
of the structure invariant. In order to do so, we want to identify orbits in T under the
action of the group Aut(T, δ) := {χ ∈ Aut(T ) | δ ◦ χ = δ}, and then to say how they fit
together. In a nutshell, the idea is as follows.
Suppose v and w are two vertices. If there is a χ ∈ Aut(T, δ) with χ(v) = w, then,
of course, δ(v) = δ(w). Additionally, χ gives a decoration-preserving bijection from the
24
neighbors of v to the neighbors of w. Thus, for each ornament o, the number of neighbors
of v bearing o must be equal to the number of neighbors of w bearing o.
Conversely, if δ(v) = δ(w), but for some ornament o there are differing numbers
of neighbors of v bearing o and neighbors of w bearing o, then there is no decorationpreserving automorphism taking v to w, so we ought refine the decoration to distinguish
v from w. We then repeat this refinement process until vertices with the same ornament
can no longer be distinguished by the ornaments of their neighbors. This happens after
finitely many steps because G\T is compact, see Proposition 4.3. Section 4.1 formalizes
this process, which we call neighbor refinement.
4.1
Neighbor refinement
Let N := N ∪ {0, ∞}. Call O0 := O and δ0 := δ the ‘initial set of ornaments’ and the
‘initial decoration’, respectively. Beginning with i = 0, for each v ∈ VT define:
fv,i : Oi → N : o 7→ #{w ∈ δi−1 (o) | w is adjacent to v}
O
Define Oi+1 := O0 × N i , and define δi+1 (v) := (δ0 (v), fv,i ).
Lemma 4.2. For all i, the map δi+1 : T → Oi+1 is a decoration that refines δi : T → Oi .
Proof. Let v be a vertex, and let g ∈ G. Suppose δi is G–invariant. Then, δi+1 (gv) =
(δi (gv), fgv,i ) = (δi (v), fv,i ) = δi+1 (v). Since δ0 is G–invariant, all the δi are decorations
by induction.
For each i, let N (v, i, o) denote the number of neighbors of v in δi−1 (o).
Clearly, δ1 refines δ0 , since δ0 is the composition of δ1 with projection to the first
coordinate of theP
image. Suppose that δi refines δi−1 . Then for every o0 ∈ Oi−1 , we have
0
N (v, i − 1, o ) = o∈δi ◦δ−1 (o0 ) N (v, i, o).
i−1
If δi+1 (v) = δi+1 (w) then δ0 (v) = δ0 (w) and N (v, i, o) = N (w, i, o) for each o ∈ Oi .
Thus, for all o0 ∈ Oi−1 ,
X
X
N (v, i − 1, o0 ) =
N (v, i, o) =
N (w, i, o) = N (w, i − 1, o0 ),
−1
o∈δi ◦δi−1
(o0 )
−1
o∈δi ◦δi−1
(o0 )
so δi (v) = δi (w). Hence δi+1 refines δi . The lemma follows by induction.
Proposition 4.3. There exists an s ≥ 0 such that δi+1 is a strict refinement of δi for
all i + 1 ≤ s and δi+1 is a trivial refinement of δi for all i ≥ s.
−1
: Im δi+1 ⊂ Oi+1 → Oi . The
Proof. Since δi+1 refines δi there is a function δi ◦ δi+1
refinement is trivial precisely when this function is injective.
Suppose there exists an s such that δs+1 is a trivial refinement of δs . For every
−1
o ∈ Im δs+1 ⊂ Os+1 we have fv,s+1 (o) = fv,s ◦ δs ◦ δs+1
(o), and fv,s+1 (o) = 0 otherwise.
Therefore, δs+1 (v) = δs+1 (w) implies fv,s = fw,s , which implies fv,s+1 = fw,s+1 , which
implies δs+2 (v) = δs+2 (w). Thus, once one refinement in the sequence is trivial so are all
further refinements.
25
To see that eventually some refinement`is trivial, note that G–invariance implies that
for all i we have a partition of T by T = o∈Oi δi−1 (o) in which each part is a union of
G–orbits. A refinement is strict if and only if the new partition has strictly more parts
than the previous one. However, the number of parts is bounded above by the number
of G–orbits, which is finite.
Definition 4.4. The neighbor refinement of δ is the decoration δs : T → Os at which
the neighbor refinement process stabilizes.
Proposition 4.5. Let δ 0 : T → O0 be the neighbor refinement of δ : T → O. The δ 0 –
partition of T is equal to the partition into Aut(T, δ)–orbits and to the partition into
Aut(T, δ 0 )–orbits.
Proof. The partition into Aut(T, δ)–orbits is finer than the δ 0 –partition because each
refinement step is Aut(T, δ)–equivariant. The Aut(T, δ 0 )–orbit partition is finer than
the Aut(T, δ)–orbit partition since δ 0 is a refinement of δ. We show the δ 0 –partition
is finer than the Aut(T, δ 0 )–orbit partition by supposing δ 0 (v) = δ 0 (w) and producing
χ ∈ Aut(T, δ 0 ) with χ(v) = w.
The automorphism χ is constructed inductively. Start by defining χ(v) := w. Since
0
δ is stable under neighbor refinement, for every o ∈ O0 we have # lk(v) ∩ (δ 0 )−1 (o) =
# lk(w)∩(δ 0 )−1 (o). Extend χ by choosing any bijection between these sets. This extends
χ to the 1–neighborhood of v.
Now suppose χ is defined on a subtree T 0 of T such that for every v 0 ∈ VT 0 , either v 0 is
a leaf or T 0 contains every edge incident to v 0 . Let v 0 be a leaf, and let u be the vertex of
T 0 adjacent to v 0 . For δ 0 (u)
χ via a bijection between lk(v) \ {u} ∩ (δ 0 )−1 (δ 0 (u))
extend
0
0
−1
and lk(χ(v )) \ {χ(u)} ∩ (δ ) (δ 0 (u)). For o 6= δ 0 (u) extend χ just as in the base
case.
4.2
Structure invariants
Let δs : T → Os be a neighbor refinement of δ as in Proposition 4.3. As defined, δs
actually encodes the history of the refinement process, not just the structure of T . We
define the structure invariant by forgetting this extraneous history. Let π0 : Os → O be
projection to the first coordinate. Choose an ordering of Im δ and let O[j] denote the
j–th ornament in the image. Similarly, for each 1 ≤ j ≤ # Im δ, choose an ordering of
π0−1 (O[j]) ∩ Im δs . Order Im δs lexicographically, and let Os [i] denote the i–th ornament.
Definition 4.6. The structure invariant S(T, δ, O) is the # Im δs ×# Im δs matrix whose
j, k–entry is the tuple consisting of the number of vertices in δs−1 (Os [j]) adjacent to each
vertex of δs−1 (Os [k]), the O–ornament π0 (Os [j]) and the O–ornament π0 (Os [k]). The
last two coordinates are called respectively the row and column ornament of the entry.
S(T, δ, O) can be seen as a block matrix, with blocks consisting of entries with the
same row ornaments and the same column ornaments. The structure invariant is well
defined up to permuting the O–blocks and permuting rows and columns within O–blocks,
ie, up to the choice of orderings of O and the π0−1 (O[j]).
26
Proposition 4.7. Let δ : T → O be a G–invariant decoration of a cocompact G–tree.
Let δ 0 : T 0 → O be a G0 –invariant decoration of a cocompact G0 –tree. There exists a
decoration-preserving isomorphism φ : T → T 0 if and only if S(T, δ, O) = S(T 0, δ 0, O), up
to permuting rows and columns within O–blocks.
In particular, with the above notations, T and T 0 must have the same sets of ornaments for a decoration-preserving isomorphism φ to exist.
Proof. It is clear that isomorphic decorated trees have the same structure invariants,
up to choosing the orderings of the ornaments. For the converse, assume that we have
reordered within O–blocks so that S(T, δ, O) = S(T 0, δ 0, O) = S. Construct a decorationpreserving tree isomorphism exactly as in the proof of Proposition 4.5.
Remark. When T is the universal cover of a finite graph Γ and the initial set of ornaments
is trivial then the structure invariant we have defined is just the well known degree
refinement of Γ. The lemma says that two graphs have the same degree refinement if
and only if they have isomorphic universal covers. A theorem of Leighton [27] says that
such graphs in fact have a common finite cover. There are also decorated versions of
Leighton’s Theorem, eg [34].
Observation. We get a quasi-isometry invariant of a group G by taking the structure
invariant of a cocompact QI(G)-tree with a QI(G)–invariant decoration.
This is a simple observation, but it does not seem to have appeared in the literature
in this generality.
Behrstock and Neumann [2, 3] have used special cases of this type of invariant, in a
different guise, to classify fundamental groups of some families of compact irreducible
3–manifolds of zero Euler characteristic. In both papers the tree is the Bass-Serre tree
for the geometric decomposition of such a 3–manifold along tori and Klein bottles, which
is the higher dimensional antecedent of the JSJ decompositions considered in this paper.
When the geometric decomposition has only Seifert fibered pieces the vertices are
decorated by the quasi-isometry type of the universal cover of the corresponding Seifert
fibered manifold. There are only two possible quasi-isometry types, according to whether
or not the Seifert fibered piece has boundary. Every vertex in the Bass-Serre tree has
infinite valence, so each entry of the structure invariant is either 0 or ∞.
Behrstock and Neumann [2] state their result in terms of ‘bi-similarity’4 classes of
bi-colored graphs. They show that each bi-similarity class is represented by a unique
minimal graph, and that two such 3–manifolds are quasi-isometric if and only if the bicolored Bass-Serre tree of their geometric decompositions have the same representative
minimal graph. Their minimal bi-colored graphs carry exactly the same information as
the structure invariant of the decorated Bass-Serre tree. One can construct their graph
by taking the vertex set to be the stable decoration set Os and connecting vertex Os [j]
to vertex Os [k] by an edge if and only if the j, k–entry of S is ∞. The vertices of the
graph are ‘bi-colored’ by the projection π0 : Os → O. Conversely, S can be recovered by
4
Their meaning of ‘similarity’ is different than in this paper.
27
replacing each edge in the graph by infinitely many edges, lifting the bi-coloring to the
universal covering tree, and calculating the structure invariant.
The second paper [3] extends their results to cases where the decomposition involves
some hyperbolic pieces. The decorations there are more complex.
4.3
Structure invariants for the JSJ tree of cylinders
Combining Proposition 4.7 with Theorem 2.9 and Corollary 2.10 proves:
Theorem 4.8. If G is a finitely presented one-ended group not commensurable to a
surface group, then the structure invariant for the JSJ tree of cylinders is a quasi-isometry
invariant of G, with respect to any of the following initial decorations:
1. Vertex type: rigid, hanging, or cylinder.
2. Vertex type and, if v is rigid, JGv K.
3. Vertex type and, if v is rigid, J(Gv , Pv )K.
Theorem 4.9. If G is hyperbolic and the JSJ decomposition of G has no rigid vertices
then the invariant of Theorem 4.8 is a complete quasi-isometry invariant.
Later we will prove a more general result, Theorem 8.5, that includes Theorem 4.9
as a special case. A brief sketch of a direct proof of Theorem 4.9 goes like this: Given
two hyperbolic groups as in Theorem 4.9, the structure invariants of Theorem 4.8 are
equivalent if and only if the groups have isomorphic decorated JSJ trees of cylinders.
Since all non-cylindrical vertices are hanging, it follows, using techniques of of Behrstock
and Neumann [2], that the groups are quasi-isometric if and only if they have isomorphic
decorated JSJ trees of cylinders. Details of the last claim can be found in Dani and
Thomas [15, Section 4]. The torsion-free case was previously written up in the thesis of
Malone [28].
4.4
4.4.1
Examples
An example with symmetry
Consider the graph of groups Γ in Figure 5, for which T (Γ) = Cyl(G(Γ)). Let G := G(Γ)
and T := T (Γ).
ha, bi
r0
a2 b2 āb̄
Z
c0
xy x̄z̄
hx, y, zi zy
h
Z
c
a2 b2 āb̄
ha, bi
r
Figure 5: Symmetric example
Take the initial decoration be vertex type, so δ0 (r), δ0 (r0 ) := ‘rigid’; δ0 (c), δ0 (c0 ) :=
‘cylindrical’; and δ0 (h) := ‘hanging’.
Let us compute the first neighbor refinement: The image of an edge injection into
a rigid vertex group is an infinite index subgroup, so rigid vertices of T are infinite
28
valence, and adjacent only to cylindrical vertices. Since δ0 does not distinguish between
cylindrical vertices, we have:
‘cylindrical’ 7→ ∞
fre,0 , fre0 ,0 := ‘rigid’
7→ 0
‘hanging’
7→ 0
In this example each edge group surjects onto its adjacent cylindrical vertex group,
so cylindrical vertices of T have valence 2. One neighbor is rigid and one is hanging, and
δ0 does not distinguish between the rigid vertices, so we have:
‘cylindrical’ 7→ 0
fec,0 , fce0 ,0 := ‘rigid’
7→ 1
‘hanging’
7→ 1
Finally, the image of an edge injection into a hanging vertex group is an infinite index
subgroup, so hanging vertices of T are infinite valence, and adjacent only to cylindrical
vertices. Since δ0 does not distinguish between cylindrical vertices, we have:
‘cylindrical’ 7→ ∞
:=
feh,0
‘rigid’
7→ 0
‘hanging’
7→ 0
The first refinement is therefore:
δ1 (e
r), δ1 (re0 ) := (‘rigid’, fre,0 )
δ1 (e
c), δ1 (ce0 ) := (‘cylindrical’, fec,0 )
δ1 (e
h) := (‘hanging’, feh,0 )
This is a trivial refinement, so δ0 is stable, and the structure invariant is given in Table 1.
‘cylindrical’ ‘rigid’ ‘hanging’
‘cylindrical’
0
1
1
‘rigid’
∞
0
0
‘hanging’
∞
0
0
Table 1: Structure invariant for symmetric example
Notice that we get the same structure invariant for the group G0 := G(Γ0 ) defined by
the graph of groups in Figure 6. This is expected, as the groups are quasi-isometric. In
fact, G is isomorphic to an index 2 subgroup of G0 .
29
hp, qi
Z
pq p̄q̄
h
Figure 6:
4.4.2
a2 b2 āb̄
c
ha, bi
r
Γ0
The example of Section 3.1
Let Γ be the graph of groups of Figure 2, for which T (Γ) = Cyl(G(Γ)). Let G := G(Γ)
and T := T (Γ). In this example we take the initial decoration to be by vertex type and
quasi-isometry type of vertex stabilizer. The vertices of T carry four possible ornaments,
(r, Jπ1 (M )K), (r, JF2 K), (h, JF2 K), and (c, JZK), where in the first coordinate r, h, and c
stand for ‘rigid’, hanging’, and ‘cylindrical’, respectively.
In the first refinement step, observe that each rigid and hanging vertex of T is adjacent
to infinitely many cylindrical vertices. The initial decoration does not distinguish any of
the cylindrical vertices, so δ1 does not give any new information about rigid and hanging
vertices.
On the other hand, we do distinguish some of the cylindrical vertices. This is because
δ0 does distinguish between three different kinds of rigid and hanging vertex, so we can
distinguish cylindrical vertices according to the number and kind of their neighbors.
re6
re1 , re2 , re3 , re4 , re5 , re7 , re8 , re9
e
h
ce1
ce2
ce3 , ce4 , ce6
ce5
(r, Jπ1 (M )K) (r, JF2 K) (h, JF2 K) (c, JZK)
(r, Jπ1 (M )K)
0
0
0
∞
(r, JF2 K)
0
0
0
∞
(h, JF2 K)
0
0
0
∞
0
5
0
0
1
1
0
0
(c, JZK)
0
2
0
0
0
1
1
0
Table 2: First refinement
Table 2 shows δ1 . In the first column, for convenience, we give representatives of
G–orbits of vertex v in T with a given ornament in O1 . The second column contains
δ0 (v). The remaining columns in each row give a row vector encoding fv,0 . For instance,
the last row says that a vertex v ∈ Gce5 has δ0 (v) = (c, JZK) and is adjacent to one vertex
in δ0−1 ((r, JF2 K)) and one vertex in δ0−1 ((h, JF2 K)).
Table 3 shows δ2 . The (c, JZK) columns are listed in the same order as the (c, JZK)
rows of Table 2. For instance, the fourth row says that for any given vertex in Gre2 , Gre3 ,
or Gre5 in T , it has infinitely many neighbors in Gce1 and infinitely many neighbors in
Gce3 ∪ Gce4 ∪ Gce6 and no other neighbors.
We can again count neighbors according to the new decoration, but we see in Table 4
that this does not distinguish any additional vertices. Thus, the refinement process has
stabilized, and Table 4 is the structure invariant. Up to permuting the ordering on O0
and the ordering of rows and columns within each O0 –block, this structure invariant
30
re6
re1
re4
re2 , re3 , re5
re7 , re8 , re9
e
h
ce1
ce2
ce3 , ce4 , ce6
ce5
(r, Jπ1 (M )K) (r, JF2 K) (h, JF2 K)
(c, JZK)
(r, Jπ1 (M )K)
0
0
0
0 ∞ 0 0
0
0
0
∞ ∞ 0 0
0
0
0
∞ 0 0 ∞
(r, JF2 K)
0
0
0
∞ 0 ∞ 0
0
0
0
0 0 ∞ 0
(h, JF2 K)
0
0
0
0 0 0 ∞
0
5
0
0 0 0 0
1
1
0
0 0 0 0
(c, JZK)
0
2
0
0 0 0 0
0
1
1
0 0 0 0
Table 3: Second refinement
re6
re1
re4
re2 , re3 , re5
re7 , re8 , re9
e
h
ce1
ce2
ce3 , ce4 , ce6
ce5
(r, Jπ1 (M )K)
(r, Jπ1 (M )K)
0
0
0
(r, JF2 K)
0
0
0
(h, JF2 K)
0
1
(c, JZK)
0
0
(r, JF2 K)
(h, JF2 K)
(c, JZK)
0 0 0 0
0
0 ∞ 0 0
0 0 0 0
0
∞ ∞ 0 0
0 0 0 0
0
∞ 0 0 ∞
0 0 0 0
0
∞ 0 ∞ 0
0 0 0 0
0
0 0 ∞ 0
0 0 0 0
0
0 0 0 ∞
1 1 3 0
0
0 0 0 0
1 0 0 0
0
0 0 0 0
0 0 1 1
0
0 0 0 0
0 1 0 0
1
0 0 0 0
Table 4: Structure invariant
completely determines T up to δ0 –preserving tree isomorphism.
5
5.1
A new decoration: Stretch factors
Relative quasi-isometric rigidity
In this section, we associate to the JSJ tree of a cylinders of a group new quasi-isometry
invariants that take into account the metric information carried by the various two-ended
edge groups. Indeed, consider an infinite order element of an edge stabilizer. Its image
in each of the adjacent vertex groups has some translation length, and the ratio of these
translation lengths gives a stretch factor that describes how the amalgamation distorts
distance as measured in the vertex groups. This stretch factor clearly depends on the
31
choice of metrics of the vertex groups, so it is not an intrinsic invariant of the group,
and, in general, it is not preserved by quasi-isometries. However, we show that when
the vertex groups satisfy an appropriate notion of quasi-isometric rigidity—a notion that
is satisfied by many interesting classes of groups—then such stretch factors are indeed
quasi-isometry invariants.
Definition 5.1. A finitely generated group G is quasi-isometrically rigid relative to the
peripheral structure P, or (G, P) is quasi-isometrically rigid, if there exists a proper
geodesic metric space X with peripheral structure P 0 and a quasi-isometry µ : (G, P) →
(X, P 0 ) such that
1. µ∗ (QI(G, P)) is a uniform subgroup of CI((X, µ(P))).
2. If g ∈ G is an infinite order element fixing an element of P then i 7→ µ(g i ) is a
coarse similitude.
The pair (X, P 0 ) is called a rigid model for (G, P).
Remark. In Proposition 5.7 we prove that 1 implies 2 if G is hyperbolic.
Lemma 5.2. If (X, P 0 ) is a rigid model for (G, P) then µ0 ◦ µ ∈ CIsom((X, P 0 )) for any
µ, µ0 ∈ QIsom((G, P), (X, P 0 )).
This fact motivates the terminology ‘rigid’.
Proof. For µ, µ0 ∈ QIsom((G, P), (X, P 0 )) we have µ0 ◦ µ ∈ QIsom((X, P 0 ), (X, P 0 )). For
any µ ∈ QIsom((G, P), (X, P 0 )) we have CI((X, P 0 )) < QI((X, P 0 )) = µ∗ (QI((G, P))),
so if µ∗ (QI((G, P))) < CI((X, P 0 )) then QI((X, P 0 )) = CI((X, P 0 )).
Definition 5.3. Let (X, P 0 ) be a rigid model for (G, P), and let g be an infinite order
element of G that fixes an element of P. Define the X–length of g, `X (g), to be the
multiplicative constant of the coarse similitude from Z to X defined by i 7→ µ(g i ), where
µ ∈ QIsom((G, P), (X, P 0 )).
If a positive power g k of an infinite order element g fixes an element of P define
`X (g) := k1 `X (g k ).
Lemma 5.2 implies that `X (g) is independent of the choice of quasi-isometry µ ∈
QIsom((G, P), (X, P 0 )).
We remark in the second case that if π : Z → kZ is a closest point projection then
i 7→ µ(g π(i) ) is a coarse similitude from Z to X with multiplicative constant k1 `X (g k ), so
this is a sensible definition for `X (g).
5.2
Examples of relative quasi-isometric rigidity
Let G be a finitely presented group. Let H be a finite collection of two-ended subgroups
of G. Let P be the peripheral structure consisting of distinct coarse equivalence classes
of conjugates of elements of H.
32
1. If G is quasi-isometric to a space X such that I(X) = QI(X) then (G, P) is rigid.
The peripheral structure plays no role in this case. Examples include:
(a) Irreducible symmetric spaces other than real or complex hyperbolic space;
thick Euclidean buildings; and products of such [26, 35].
(b) The ‘topologically rigid’ hyperbolic groups of Kapovich and Kleiner [25].
(c) Certain Fuchsian buildings [7, 46].
(d) Mapping class groups of non-sporadic hyperbolic surfaces [1].
2. If G is quasi-isometric to a space X such that CI(X) = QI(X) then (G, P) is rigid.
Again, the peripheral structure plays no role in this case. Xie gives an example of
a certain solvable Lie group with this property [47].
3. If X is a real or complex hyperbolic space of dimension at least 3 and G is quasiisometric to X then (G, P) is quasi-isometrically rigid whenever H is non-empty,
by a theorem of Schwartz [40].
4. If X 0 is the 3-valent tree, G is quasi-isometric to X 0 (so G is virtually free), and
G does not virtually split over 0 or 2–ended subgroups relative to H, then (G, P)
is quasi-isometrically rigid [12, 14]. In this case the model space X depends on P,
and is not necessarily isometric to X 0 .
5. If X = H2 , φ : G → X is a quasi-isometry, and G does not virtually split over 2–
ended subgroups relative to H, then (G, P) is quasi-isometrically rigid, as follows.
A result of Kapovich and Kleiner [25] shows that G has finite index in QI((G, P)).
Therefore, QI((G, P)) is a finitely generated group quasi-isometric to X. This
quasi-isometry induces a cobounded quasi-action of QI((G, P)) on X. Such a
quasi-action is quasi-isometrically conjugate to an isometric action on X, by a
theorem of Markovic [29].
The first four cases actually satisfy the following stronger version of quasi-isometric
rigidity:
Definition 5.4. We say G is strongly quasi-isometrically rigid relative to P, or (G, P)
is strongly quasi-isometrically rigid, if there is a proper geodesic space X such that if
(X, P 0 ) and (X, P 00 ) are rigid models for (G, P), then there is a coarse isometry φ of X
such that φ(P 0 ) = P 00 .
By contrast, the last case only satisfies the weaker version of rigidity.
For a non-example, consider G := Zn and X := Rn . For any H the group QI((G, P))
contains maps conjugate to homotheties of Rn . This implies that the multiplicative
constants in QI((G, P)) are unbounded, so QI((G, P)) cannot be conjugate into some
coarse isometry group.
It is also easy to find non-examples of relative rigidity via splittings: If G virtually
splits over a zero or two-ended group relative to H then (G, P) is not quasi-isometrically
33
rigid. In such an example there are generalized Dehn twist quasi-isometries preserving
P, powers of which again produce unbounded multiplicative constants in QI((G, P)).
The previous examples and non-examples naturally lead to the following question:
Question 1. If G is a hyperbolic group that is not quasi-isometric to H2 and does not virtually split over a zero or two-ended subgroup relative to H, is (G, P) quasi-isometrically
rigid? Strongly quasi-isometrically rigid?
5.3
Relative quasi-isometric rigidity for hyperbolic groups
In Theorem 5.6 we give a characterization of relative quasi-isometric rigidity for hyperbolic groups. This combines with Proposition 5.7 to show that the first condition of
Definition 5.1 implies the second for hyperbolic groups. Theorem 5.6 also provides an
alternative viewpoint that may be useful for resolving Question 1.
A space X is called visual if there exists an A ≥ 0 and x ∈ X such that for every
y ∈ X there exists an A–coarse-geodesic ray starting at x and passing within distance A
of y. It follows from [6, Proposition 5.2 and Proposition 5.6] that if X is quasi-isometric
to a visual hyperbolic space then X is a visual hyperbolic space.
Definition 5.5. A map φ : X → Y is an (α, M )–power-quasi-symmetric embedding if
for all distinct x, y, z ∈ X
dY (φ(x), φ(z))
dX (x, z)
≤η
,
dY (φ(x), φ(y))
dX (x, y)
where
(
M r1/α
η(r) =
M rα
for 0 < r < 1,
for 1 ≤ r.
Let PQS((X, dX ), (Y, dY )) denote the set of power-quasi-symmetric homeomorphisms,
and abbreviate PQS(X, dX ) := PQS((X, dX ), (X, dX )), which is a group. If Z is a collection of subsets of X, define:
PQS(X, d, Z) := {φ ∈ PQS((X, d)) | ∀Z ∈ Z, φ(Z) ∈ Z and ∃!Z 0 ∈ Z, φ(Z 0 ) = Z}
Theorem 5.6. Let G be a non-elementary hyperbolic group with a peripheral structure
P consisting of coarse equivalence classes of conjugates of finitely many two-ended subgroups. Fix, arbitrarily, a word metric d on G, a basepoint p ∈ G, and a visual metric
d∞ on ∂G. The following are equivalent:
1. (G, P) is quasi-isometrically rigid.
2. There exists a proper, geodesic, visual hyperbolic space X and a quasi-isometry
µ : G → X such that µ∗ (QI((G, P))) is a uniform subgroup of CI((X, µ(P))).
3. There exists a visual metric d0∞ on ∂G such that PQS(∂G, d∞ , ∂P) is power-quasisymmetrically conjugate to a uniform subgroup of BiLip(∂G, d0∞ ).
34
Proof. Since G is a visual hyperbolic space, so is X. Thus, equivalence of 1 and 2 is
immediate from the definition of relative rigidity.
Item 2 implies item 3 by taking d0∞ to be a visual metric on ∂X = ∂G and applying [6,
Theorem 6.5], which shows that µ extends to a power-quasi-symmetry of ∂G, and a
uniform subgroup of CI(X) extends to a uniform subgroup of BiLip(∂G, d0∞ ).
Conversely, there are several ‘hyperbolic cone’ constructions in the literature [6,8,11,
21] that take a metric space Z and produce a hyperbolic metric space Con(Z) such that
a visual metric on ∂ Con(Z) recovers Z with the given metric. We take Conr (Z) be the
‘truncated hyperbolic approximation with parameter r’ of Buyalo and Schroeder [11].
Item 3 implies item 2 by taking X to be the hyperbolic cone Conr (∂G, d0∞ ) for r
sufficiently small.
Let g be an infinite order element of a hyperbolic group G with a fixed word metric.
The isometry Lg defined by left multiplication by g has a well defined translation length,
which is positive. If µ : G → X is a quasi-isometry such that µ∗ (Lg ) is a coarse isometry,
it is not true in general that µ∗ (Lg ) has a well defined translation length. The next
proposition shows that we do still get a positive translation length for µ∗ (Lg ) in the
special case of relative rigidity.
Proposition 5.7. Let G be a hyperbolic group and P a peripheral structure such that
there exists a proper geodesic space X and a quasi-isometry µ : G → X such that
µ∗ (QI((G, P))) is a uniform subgroup of CI((X, µ(P))). For every infinite order element g ∈ G the map i 7→ µ(g i ) is a coarse similitude.
Before proving the proposition we need a few lemmas.
Lemma 5.8. Let X be proper geodesic space quasi-isometric to a non-elementary hyperbolic group. For i ∈ {0, 1}, let φi be a quasi-isometry of X, with [φ0 ] = [φ1 ] ∈ QI(X).
The distance between φ0 and φ1 is bounded in terms of the quasi-isometry constants of
φ0 and φ1 and the constants of X.
Proof. The following argument is standard, see for instance [44]. We briefly outline the
proof.
Since X is quasi-isometric to a visual hyperbolic space, it is a visual hyperbolic space.
Furthermore, every point x ∈ X can be realized as a quasi-center of an ideal geodesic
triangle ∆. Since φ0 and φ1 are coarsely equivalent, ∂φ0 = ∂φ1 , so φ0 (∆) and φ1 (∆) are
ideal quasi-geodesic triangles with the same ideal vertices, and quasi-geodesic constants
depending on those of φ0 and φ1 , respectively. The set of quasi-centers of uniformly
quasi-geodesic triangles with the same vertices is bounded in terms of the quasi-geodesic
constants and the hyperbolicity constant of X, and φ0 (x) and φ1 (x) both lie in this
set.
Corollary 5.9. If φ is an (M, A)–quasi-isometry and ψ is an A0 –coarse isometry with
[φ] = [ψ] ∈ QI(X) then there is an A00 depending only on M , A, A0 and X such that φ
is an A00 –coarse isometry.
35
Lemma 5.10. Let µ : Y → X be a quasi-isometry between visual hyperbolic spaces.
Suppose that φ is a loxodromic isometry of Y with translation length τ . Let y0 be a
point on an axis of φ, and set yi = φi (y0 ) and xi = µ(yi ). Suppose that {µ∗ (φi )}i∈Z are
uniform coarse isometries. Then
d(x0 , xi )
i→∞
i
L := lim
exists, and there exists an A such that i 7→ µ(φi (y0 )) is an (L, 2A)–coarse similitude.
Proof. The fact that {µ∗ (φi )}i∈Z are uniform coarse isometries implies that the difference
|d(xi , xj )−d(x0 , xj−i )| is uniformly bounded. Quasi-geodesic stability further implies that
|d(x0 , xi+j ) − d(x0 , xi ) − d(x0 , xj )| is uniformly bounded. Let A be the greater of these
two bounds.
Suppose L+ := lim sup d(x0 , xi )/i and L− := lim inf d(x0 , xi )/i are different. Note L− >
−
)/3. Choose some i such that
0 since i 7→ xi is a quasi-geodesic. Take := (L+ − Lq
d(x0 , xi )/i
< L− + and such that α :=
d(x0 ,xi )+2A
d(x0 ,xi )
q
+
<
2L+ +L−
.
L+ +2L−
Choose some j such
−
2L +L
, where q is the integer such that
that d(x0 , xi )/i > L+ − and such that q+1
q <
L+ +2L−
qi ≤ j < (q + 1)i.
The previous inequalities, together with the triangle inequality to decompose d(x0 , xj )
along x0 , xi , . . . , xqi , xj , yields:
L+ − <
d(x0 , xj )
d(x0 , xj )
(q + 1)(d(x0 , xi ) + 2A)
≤
≤
j
qi
qi
α(q + 1)d(x0 , xi )
α(q + 1)
=
≤
· (L− + )
qi
q
2L+ + L− L+ + 2L−
·
= L+ −
< +
L + 2L−
3
This is a contradiction, so L+ = L− = L.
Suppose there exists an i such that d(x0 , xi ) < Li − 2A. Then L = limj→∞
d(x0 ,xij )
ij
<
limj→∞ Lij
ij
= L, which is a contradiction.
If there exists an i such that d(x0 , xi ) > Li + 2A, then a similar computation leads
to a contradiction. Therefore, |d(x0 , xi ) − Li| ≤ 2A, which means i 7→ xi = µ(φi (y0 )) is
an (L, 2A)–coarse similitude.
Proof of Proposition 5.7. Let Lg be left multiplication on G by an infinite order element.
For all n ∈ Z the map Lng is an isometry, so µ∗ (Lng ) is a quasi-isometry whose constants
depend only on those of µ. By hypothesis, there exists an A such that for each n there
exists an A–coarse isometry cn ∈ CI(X) with [cn ] = [µ∗ (Lng )]. By Corollary 5.9, there
exists an A0 independent of n such that µ∗ (Lng ) is an A0 –coarse isometry. Now apply
Lemma 5.10.
36
5.4
Stretch factors
Let G be a finitely presented, one-ended group such that T := Cyl(G) has two-ended
edge stabilizers. Let Γ := G\Cyl(G). Let Y be an algebraic tree of spaces for G over T .
Vertices v0 and v1 of T that belong to a common cylinder have stabilizer groups that
intersect in a virtually cyclic subgroup.
ˆ denotes the modulus of Definition 2.5.
Recall that ∆
Definition 5.11. Let v0 and v1 be distinct quasi-isometrically rigid vertices of T contained in a common cylinder c. For i ∈ {0, 1}, choose a rigid model (Xvi , Pvi ) for
(Gvi , PvΓi ). Let hzi be an infinite cyclic subgroup of Gv0 ∩ Gv1 , and define the relative
stretch from v0 to v1 to be:
relStr(v0 , v1 , (Xv0 , Pv0 ), (Xv1 , Pv1 )) :=
`Xv1 (z)
`Xv0 (z)
Clearly, relStr(v0 , v1 , (Xv0 , Pv0 ), (Xv1 , Pv1 )) depends on the choices of (Xvi , Pvi ). Recall, by Lemma 5.2, it does not depend on the choice of quasi-isometries (Gv0 , PvΓ0 ) →
(Xv0 , Pv0 ) and (Gv1 , PvΓ1 ) → (Xv1 , Pv1 ).
Lemma 5.12. relStr(v0 , v1 , (Xv0 , Pv0 ), (Xv1 , Pv1 )) does not depend on the choice of hzi <
Gv0 ∩ Gv1 .
Proof. For i ∈ {0, 1}, let ei be an edge on the geodesic in T between v0 and v1 , with
ι(ei ) = vi . Let hz0 i < Ge0 and hz1 i < Ge1 be infinite cyclic subgroups of minimal index.
Since Ge0 and Ge1 are virtually cyclic, hzi has finite index in each of them.
`Xv1 (z1 ) ·
`Xv1 (z)
=
`Xv0 (z)
`Xv0 (z0 ) ·
[hz1 i:hz1 i∩hzi]
[hzi:hz1 i∩hzi]
[hz0 i:hz0 i∩hzi]
[hzi:hz0 i∩hzi]
=
`Xv1 (z1 ) [hz1 i : hz0 i ∩ hz1 i]
`Xv1 (z1 )
ˆ 0 , e1 )
·
=
· ∆(e
`Xv0 (z0 ) [hz0 i : hz0 i ∩ hz1 i]
`Xv0 (z0 )
The right-hand side is independent of the choice of z0 and z1 , since if, say, hz00 i is another
infinite cyclic subgroup of minimal index in Ge0 then:
`Xv0 (z00 ) = `Xv0 (z0 ) ·
[hz0 i : hz0 i ∩ hz00 i]
= `Xv0 (z0 )
[hz00 i : hz0 i ∩ hz00 i]
Corollary 5.13. If v0 , v1 , and v2 are quasi-isometrically rigid vertices in a common
cylinder then:
relStr(v0 , v1 , (Xv0 , Pv0 ), (Xv1 , Pv1 )) · relStr(v1 , v2 , (Xv1 , Pv1 ), (Xv2 , Pv2 ))
= relStr(v0 , v2 , (Xv0 , Pv0 ), (Xv2 , Pv2 ))
Proposition 5.14. Let φ be a quasi-isometry between finitely presented, one-ended groups
G and G0 whose JSJ trees of cylinders have two-ended edge stabilizers. Let Γ := G\Cyl(G)
and Γ0 := G0 \Cyl(G0 ). Suppose that v0 and v1 are distinct quasi-isometrically rigid vertices of T (Γ) contained in a cylinder c. Choose rigid models (Xv0 , Pv0 ) and (Xv1 , Pv1 )
for (Gv0 , PvΓ0 ) and (Gv1 , PvΓ1 ), respectively. Then:
relStr(v0 , v1 , (Xv0 , Pv0 ), (Xv1 , Pv1 )) = relStr(φ∗ (v0 ), φ∗ (v1 ), (Xv0 , Pv0 ), (Xv1 , Pv1 ))
37
Proof. Let Y be an algebraic tree of spaces for Γ, and let Y 0 be an algebraic tree of
spaces for Γ0 . For v ∈ {v0 , v1 } choose µv ∈ QIsom((Yv , PvΓ ), (Xv , Pv )). Note that
0
µv ◦ φv ∈ QIsom((Yφ0∗ (v) , PφΓ∗ (v) ), (Xv , Pv )). Define:
R := relStr(v0 , v1 , (Xv0 , Pv0 ), (Xv1 , Pv1 ))
R0 := relStr(φ∗ (v0 ), φ∗ (v1 ), (Xv0 , Pv0 ), (Xv1 , Pv1 ))
Choose two points x0 and x1 in µv0 (Ye0 ) such that dXv0 (x0 , x1 ) 0. The idea of the
proof is to approximate R by a quantity Q(x0 , x1 ) depending on x0 and x1 , and similarly
approximate R0 by Q0 (x0 , x1 ), and then show:
R=
lim
d(x0 ,x1 )→∞
Q(x0 , x1 ) =
lim
d(x0 ,x1 )→∞
Q0 (x0 , x1 ) = R0
In the following, quantities are ‘coarsely well defined’ if they are well defined up to
additive error independent of the choice of x0 and x1 .
By construction, Ye0 is a coset of Ge0 , and hze0 i is an infinite cyclic subgroup of
minimal index in Ge0 . Let g0 ∈ G such that Ye0 = g0 Ge0 . Since g0 hze0 i is coarsely dense
in Ye0 , there exist integers ki such that dYv0 (µ−1 (xi ), g0 zek0i ) is small.
Ye0 and Ye1 are coarsely equivalent, so closest point projection π : Ye0 → Ye1 is
coarsely well defined. Moreover, since Ge0 and Ge1 are commensurable, there exist
ˆ 0 ,e1 )+l
j ∆(e
∈ {±1} and l ∈ Z such that π(g0 zej 0 ) is bounded distance from g1 ze1
ˆ
j ∆(e
,e )+l
ze1 0 1
, where
is to be interpreted as ze1 raised to the greatest integer less than or equal to
ˆ
j ∆(e0 , e1 ) + l. Now we have the following string of relations, where ∼ indicates equality
up to additive error in the numerator and denominator, independent of x0 and x1 .
R=
`Xv1 (g1 ze1 g1−1 )
`Xv0 (g0 ze0 g0−1 )
ˆ 0 , e1 )
· ∆(e
ˆ
k ∆(e
,e )+l
ˆ
k ∆(e
,e1 )+l
0 1
0
),µv1 (g1 ze11
dXv (µv1 (g1 ze10
1
ˆ 0 ,e1 )+l)−(k0 ∆(e
ˆ 0 ,e1 )+l)|
|(k1 ∆(e
∼
k
k
dXv (µv0 (g0 ze00 ),µv0 (g0 ze01 ))
0
|k1 −k0 |
ˆ 0 ,e1 )+l
k ∆(e
!
ˆ 0 ,e1 )+l
k ∆(e
=
dXv1 (µv1 (g1 ze10
∼
dXv1 (µv1 (π(g0 zek00 )), µv1 (π(g0 zek01 )))
∼
))
), µv1 (g1 ze11
ˆ 0 , e1 )
· ∆(e
))
dXv0 (µv0 (g0 zek00 ), µv0 (g0 zek01 ))
dXv0 (µv0 (g0 zek00 ), µv0 (g0 zek01 ))
−1
dXv1 (µv1 ◦ π ◦ µ−1
v0 (x0 ), µv1 ◦ π ◦ µv0 (x1 ))
=: Q(x0 , x1 )
dXv0 (x0 , x1 )
We conclude R = limd(x0 ,x1 )→∞ Q(x0 , x1 ).
38
Similarly, if π 0 is closest point projection from φ(Ye0 ) to φ(Ye1 ) define:
Q0 (x0 , x1 ) :=
0
−1
dXv1 (µv1 ◦ φ ◦ π 0 ◦ φ ◦ µ−1
v0 (x0 ), µv1 ◦ φ ◦ π ◦ φ ◦ µv0 (x1 ))
dXv0 (x0 , x1 )
We have R0 = limd(x0 ,x1 )→∞ Q0 (x0 , x1 ). However, since Ye0 and Ye1 are coarsely equivalent, φ ◦ π 0 ◦ φ is coarsely equivalent to π, so Q(x0 , x1 ) ∼ Q0 (x0 , x1 ). We conclude:
R=
lim
d(x0 ,x1 )→∞
5.5
Q(x0 , x1 ) =
lim
d(x0 ,x1 )→∞
Q0 (x0 , x1 ) = R0
Uniformization
The stretch factors defined in the previous section depend on the choice of rigid model
for the vertex groups. We suppress this dependence by choosing models uniformly:
Definition 5.15. Let QItypes := {J(G, P)K} be the set of quasi-isometry classes of
finitely presented groups relative to peripheral structures. For each Q ∈ QItypes choose
a proper, geodesic space ZQ with peripheral structure PQ such that Q = J(ZQ , PQ )K.
Define Model(Q) := (ZQ , PQ ). If (ZQ , PQ ) is quasi-isometrically rigid then we choose
(ZQ , PQ ) to be a rigid model as in Section 5.1. We choose ZJR,RK = R.
Definition 5.16. If v0 and v1 are quasi-isometrically rigid vertices in a cylinder, define:
relStr(v0 , v1 ) = relStr(v0 , v1 , Model(Gv0 , PvΓ0 ), Model(Gv1 , PvΓ1 ))
5.6
Normalization for unimodular graphs of groups
Suppose that T := Cyl(G) has two-ended edge stabilizers and c is a unimodular cylinder
in T . Suppose that c contains some quasi-isometrically rigid vertices. Unimodularity
implies {relStr(v0 , v1 ) | v0 , v1 ∈ c are qi rigid} is bounded. Since stretch factors multiply
by Corollary 5.13, there exists a quasi-isometrically rigid v0 such that for every other
quasi-isometrically rigid vertex v1 in c we have relStr(v0 , v1 ) ≥ 1. Define relStr(c, v1 ) :=
relStr(v0 , v1 ).
Definition 5.17. Suppose that T := Cyl(G) has two-ended edge stabilizers. Let e be an
edge of T connecting a cylindrical vertex c to a quasi-isometrically rigid vertex v. Define
relStr(e) := relStr(c, v).
5.7
An example
Recall Example 1.1: Let Gi := a, b, t | tui t = vi , where ui and vi are words in ha, bi
given below. In each case Gi should be thought of as an HNN extension of ha, bi over Z
with stable letter t. Subdividing the edge gives a unimodular JSJ decomposition Γi of
Gi whose Bass-Serre Ti is equal to its tree of cylinders.
Let u0 := a, v0 := abab2 , u1 := ab, v1 := a2 b2 , u2 := ab2 , and v2 := a2 b.
39
The methods of [14] show that for each i, the pair {ui , vi } is Whitehead minimal,
with Whitehead graph equal to the complete graph on 4 vertices, so ha, bi is quasiisometrically rigid relative to the peripheral structure Pi coming from incident edge
groups, and the rigid model space is just the Cayley graph for ha, bi with respect to
{a, b}, ie, the 4–valent tree. Furthermore, QI((ha, bi , Pi )) is transitive on Pi , and
J(ha, bi , P1 )K = J(ha, bi , P2 )K = J(ha, bi , P3 )K. Therefore, Theorem 4.8 cannot distinguish G1 , G2 , and G3 .
In Ti , VC is a single orbit, and each vertex c ∈ VC has valence two. Fix some c ∈ VC ,
and suppose Rig(c) = {e, e0 }. Let us assume that e is an edge that attaches to Xτ (e)
along the image of a conjugate of hvi i and e0 is an edge that attaches to Xτ (e0 ) along
the image of a conjugate of hui i. The stabilizers of e and e0 are equal to the stabilizer
of c, which is infinite cyclic. This, together with the fact that the rigid model vertex
space is the Cayley graph (tree) for ha, bi with respect to {a, b}, and the fact that each ui
and vi is cyclically reduced with respect to {a, b}, means that Str(e) is the word length
of vi in ha, bi, and Str(e0 ) is the word length of ui in ha, bi. Thus, relStr(e0 ) = 1 and
relStr(e) = |vi |/|ui | = 5, 2, or 1, as i = 0, 1 or 2, respectively. By Proposition 5.14, no
one of these groups is quasi-isometric to the other.
6
Vertex constraints
In this section we assume that G is a one-ended, finitely presented group such that
T := Cyl(G) has two-ended cylinder stabilizers. Let Γ be the quotient graph of cylinders,
which is therefore a canonical JSJ decomposition of G over two-ended subgroups; recall
Section 2.3.4.
We suppose that X is a tree of spaces over T , quasi-isometric to G.
In Section 4 we saw how to decide if two vertices of T are in the same Aut(T, δ)–
orbit. In this section we would like to restrict further to subgroups of Aut(T, δ) induced
by QI(X), or, in the case that G is hyperbolic, by Homeo(∂X). We will actually do
something that is weaker in the quasi-isometry case, but has the advantage that the same
approach works for both quasi-isometries and boundary homeomorphisms. What we do
is restrict to elements of Aut(T, δ) that at each vertex look like they are induced by a
quasi-isometry or boundary homeomorphism of the appropriate vertex space. We also
add a compatibility condition below. First we explain the notation.
For [φ] ∈ QI(X) we can choose a representative φ that induces an automorphism φ∗
of T and splits as a tree of quasi-isometries φv := φ|Xv ∈ QI((Xv , Pv ), (Xφ∗ (v) , Pφ∗ (v) ))
over T .
Similarly, if G is hyperbolic, then X is hyperbolic and φ ∈ Homeo(∂X) induces an
automorphism φ∗ of T and splits as a tree of boundary homeomorphisms φv := φ|∂Xv ∈
Homeo((∂Xv , ∂Pv ), (∂Xφ∗ (v) , ∂Pφ∗ (v) )) over T .
Since cylinders are two-ended, each edge space is a quasi-line L in its respective
vertex space. Recall this means that there is a controlled embedding Ξ of R with image
L. In the hyperbolic case Ξ is actually a quasi-isometric embedding, and L has distinct
endpoints at infinity in the boundary of the vertex space containing it. In this case we
40
define an orientation of L to be a choice of one of these boundary points, and a boundary
homeomorphism of the vertex space that preserves ∂L is said to be orientation preserving
if it fixes ∂L and orientation reversing if it exchanges the two points of ∂L.
In the quasi-isometry case we know that Ξ([0, ∞)) and Ξ([0, −∞)) are not coarsely
equivalent. We define an orientation of L to be a choice of coarse equivalence class of
either Ξ([0, ∞)) or Ξ([0, −∞)). A quasi-isometry that coarsely preserves L is said to
be orientation preserving on L if it fixes the coarse equivalence classes of Ξ([0, ∞)) and
Ξ([0, −∞)), and orientation reversing if it exchanges them.
We seek χ ∈ Aut(T, δ) such that for every v ∈ VT there exists an element φv ∈
Map((Xv , Pv ), (Xχ(v) , Pχ(v) )) such that (φv )∗ = χ|lk(v) , subject to the following compatibility condition. In the quasi-isometry case we require that (αχ(e) ◦ φι(e) ) ◦ (φτ (e) ◦ αe )−1
is orientation preserving on Xχ(e) . In the boundary homeomorphism case we require that
(∂αχ(e) ◦ φι(e) ) ◦ (φτ (e) ◦ ∂αe )−1 is the identity on ∂Xχ(e) for every edge e. For brevity,
we say “(αχ(e) ◦ φι(e) ) ◦ (φτ (e) ◦ αe )−1 is orientation preserving on Xχ(e) ” in both cases.
In the boundary homeomorphism case we conclude, in Theorem 7.1, that such a
collection of φv patch together to give φ ∈ Homeo(∂X) with φ∗ = χ.
The analogous statement is not true for quasi-isometries. To patch together quasiisometries we need αχ(e) ◦φι(e) and φτ (e) ◦αe to be coarsely equivalent as maps, but we have
only assumed that they have coarsely equivalent image sets with the same orientations.
We also need to know that the φv have uniform quasi-isometry constants. These points
will be addressed in subsequent sections.
6.1
Partial Orientations
A partial orientation ζ of X assigns to each cylindrical vertex space and to each peripheral
set in each non-elementary vertex space either an orientation of that space or the value
‘NULL’.
A cylindrical vertex space or peripheral set is said to be ζ–oriented if its ζ value is
not ‘NULL’, and ζ–unoriented otherwise.
A cylindrical vertex is said to be ζ–oriented or ζ–unoriented if its vertex space is.
An edge e ∈ T is said to be ζ–oriented or ζ–unoriented if the corresponding edge
space in its incident non-elementary vertex is.
The sign of a map φ that takes an oriented space A to an oriented space B is 1
if the map is orientation preserving and −1 if it is orientation reversing. For a partial
orientation ζ we define signζ φ as usual when A and B are both ζ–oriented, and we define
signζ φ := 0 if either of them is ζ–unoriented.
One partial orientation, ζ 0 , extends another, ζ, if they agree on all ζ–oriented sets.
6.2
Cylindrical vertices
Definition 6.1. Let ζ be a partial orientation. Let c be a cylindrical vertex. The orientation imbalance at c with respect to a decoration δ : T → O and a partial orientation ζ is
O
the function Ωδ,ζ
c : O → Z /{−1, 1}, with the action by coordinate-wise multiplication,
defined as follows. Choose an orientation of Xc and for each e ∈ lk(c) let sign αe denote
41
the sign of αe with respect to the chosen orientation of Xc and the ζ–orientation of Xē ,
which we take to be 0 if e is ζ–unoriented. Define:
X
Ωδ,ζ
c (o) := [
sign αe ]
e∈lk(c)∩δ −1 (o)
If Ωδ,ζ
c is non-zero we call c an unbalanced cylinder.
Taking an equivalence class of function in the definition eliminates the dependence
on the arbitrary choice of orientation of Xc .
Proposition 6.2. Suppose δ and ζ are Map(X)–invariant. If there exists φ ∈ Map(X)
such that φ∗ fixes a cylindrical vertex c and reverses the orientation of Xc then Ωδ,ζ
c is
identically zero.
Proof. Suppose o ∈ O is such that there exists a ζ–oriented edge e ∈ lk(c) ∩ δ −1 (o). Let
v := τ (e). By Map(X)–invariance, ζ(Xφ∗ (e) ) = φv (ζ(Xē )) = αφ∗ (e) ◦ φc ◦ αe−1 (ζ(Xē )).
Since φc is orientation reversing, αe and αφ∗ (e) have opposite signs. Therefore, (φ)∗ |lk(c)
gives a bijection between edges in lk(c) ∩ δ −1 (o) whose attaching map have positive sign
and edges in lk(c) ∩ δ −1 (o) whose attaching map have negative sign. Since this is true
for every o ∈ O such that lk(c) ∩ δ −1 (o) is non-empty, Ωδ,ζ
c is identically zero.
Corollary 6.3. Suppose δ and ζ are Map(X)–invariant. If Gc contains an infinite
dihedral group then Ωδ,ζ
c is identically zero.
Proposition 6.4. Suppose δ and ζ are Map(X)–invariant. For every φ ∈ Map(X) we
δ,ζ
have Ωδ,ζ
c = Ωφ∗ (c) .
Proof. Choose some orientation on Xc and Xφ∗ (c) .
If no edge in lk(c)∩δ −1 (o) is ζ–oriented then Ωδ,ζ
c (o) = 0, and, by Map(X)–invariance,
the same are true for φ∗ (c).
Now consider o ∈ O such that there exists an edge e ∈ lk(c) ∩ δ −1 (o) such that e
is ζ–oriented. Let v := τ (e). By Map(X)–invariance, φ∗ (e) ∈ lk(φ∗ (c)) ∩ δ −1 (o) with
ζ(Xφ∗ (e) ) = φv (ζ(Xē )) = αφ∗ (e) ◦ φc ◦ αe−1 (ζ(Xē )). If φc is orientation reversing then αe
and αφ∗ (e) have opposite signs, so that:
X
X
sign αφ (e) = −
sign αe
∗
φ∗ (e)∈lk(φ∗ (c))∩δ −1 (o)
e∈lk(c)∩δ −1 (o)
If φc is orientation preserving then αe and αφ∗ (e) have the same signs, so that:
X
X
sign αφ∗ (e) =
sign αe
φ∗ (e)∈lk(φ∗ (c))∩δ −1 (o)
e∈lk(c)∩δ −1 (o)
The previous proposition shows we can use cylinder imbalances to distinguish different
cylinders. The following lemma shows this holds up under refinement of the decoration.
42
Lemma 6.5. Suppose δ 0 : T → O0 is a refinement of δ and ζ 0 is an extension of ζ.
Suppose that the δ–partition of edges of T is finer than the partition into ζ–oriented
δ 0 ,ζ 0
edges and ζ–unoriented edges. Let c be a cylindrical vertex. If Ωδ,ζ
c is non-zero then Ωc
is non-zero.
Let c0 be a cylindrical vertex distinct from c. If for every o ∈ O there exist ζ–oriented
edges in lk(c) ∩ δ −1 (o) if and only if there exist ζ–oriented edges in lk(c0 ) ∩ δ −1 (o) then
0 0
δ,ζ
δ 0 ,ζ 0
Ωδ,ζ
6= Ωδc0 ,ζ .
c 6= Ωc0 implies Ωc
Proof. If c is unbalanced then there exists an o ∈ O such that Ωδ,ζ
c (o) 6= 0, which implies
that there are ζ–oriented edges in lk(c) ∩ δ −1 (o). Since the δ–partition of edges of T
is finer than the partition into ζ–oriented edges and ζ–unoriented edges, all edges in
lk(c) ∩ δ −1 (o) are ζ–oriented. Since ζ 0 extends ζ, all edges in lk(c) ∩ δ −1 (o) are ζ 0 –
oriented, and since δ 0 refines δ, we have, with respect to ζ 0 and some fixed orientation of
Xc , that:
X
X
X
sign αe
sign αe =
o0 ∈δ 0 ◦δ −1 (o) e∈lk(c)∩δ −1 (o0 )
e∈lk(c)∩δ −1 (o)
The left hand side is non-zero, so one of the terms of the outer sum on the right hand
0 0
side must be non-zero. Thus, Ωδc ,ζ is not identically zero.
0 0
0 0
For the second statement, suppose, for contraposition, that Ωδc ,ζ = Ωδc0 ,ζ . Having
chosen orientations on Xc and Xc0 , there is an ∈ ±1 such that for all o0 ∈ O0 :
X
X
sign αe =
sign αe
e∈lk(c)∩(δ 0 )−1 (o0 )
e∈lk(c0 )∩(δ 0 )−1 (o0 )
If o ∈ O is such that there are no ζ–oriented edges in either lk(c) ∩ δ −1 (o) or lk(c0 ) ∩
δ −1 (o) then:
X
X
sign αe = 0 =
sign αe
e∈lk(c)∩δ −1 (o)
e∈lk(c0 )∩δ −1 (o)
Otherwise, by hypothesis, there are ζ–oriented edges in both lk(c)∩δ −1 (o) and lk(c0 )∩
δ,ζ
δ −1 (o). We conclude that Ωδ,ζ
c = Ωc0 from the following computation, in which the first
and third equalities are from the facts that the δ–partition of edges of T is finer than
the partition into ζ–oriented edges and ζ–unoriented edges and that δ 0 refines δ, and the
0 0
0 0
second equality is from the hypothesis that Ωδc ,ζ = Ωδc0 ,ζ .
X
X
X
o0 ∈δ 0 ◦δ −1 (o)
e∈lk(c)∩(δ 0 )−1 (o0 )
sign αe =
e∈lk(c)∩δ −1 (o)
sign αe
=
X
o0 ∈δ 0 ◦δ −1 (o)
X
sign αe =
e∈lk(c0 )∩(δ 0 )−1 (o0 )
X
sign αe
e∈lk(c0 )∩δ −1 (o)
Given δ and ζ that are both Map(X)–invariant we define the process of cylinder
refinement as follows.
43
1. By passing to the coarsest common refinement, we may assume that the δ–partition
of edges of T is finer than the partition into ζ–oriented edges and ζ–unoriented
edges. The refined δ is still Map(X)–invariant.
2. Consider the ζ–unoriented, unbalanced cylinders. It is possible to choose orientaδ,ζ
tions of their vertex spaces P
so that if c and c0 are twoP
such cylinders with Ωδ,ζ
c = Ωc0
then for all o ∈ O we have e∈lk(c)∩δ−1 (o) sign αe = e∈lk(c0 )∩δ−1 (o) sign αe . Extend
ζ to ζ 0 by taking these orientations of the unbalanced cylindrical vertex spaces.
3. If e is a ζ–unoriented edge such that c := ι(e) is cylindrical and ζ 0 –oriented, define
ζ 0 (Xē ) = αe (ζ 0 (Xc )).
4. Define O0 := O × {−1, 0, 1}. Define δ 0 (e) := (δ(e), signζ 0 (e)) for each edge and
δ 0 (v) := (δ(v), 0) for each vertex.
Lemma 6.6. Suppose that δ and ζ are both Map(X)–invariant and that the δ–partition
of edges of T is finer than the partition into ζ–oriented edges and ζ–unoriented edges.
Let δ 0 and ζ 0 be constructed via cylinder refinement, as above. Then δ 0 is a Map(X)–
invariant refinement of δ and ζ 0 is a Map(X)–invariant extension of ζ. Moreover, the
δ 0 –partition on edges is finer than the partition into ζ 0 –oriented and ζ 0 –unoriented edges.
Proof. Suppose e is a ζ–unoriented edge with ι(e) := c cylindrical and unbalanced. Then
e is ζ 0 –oriented and signζ 0 αe = 1, so δ 0 (e) = (δ(e), 1).
By invariance of δ and ζ, Proposition 6.4, and our choice of orientation on Xc and
Xφ∗ (c) , if φ ∈ Map(X) then φ∗ (c) is unbalanced, and φ∗ (e) is ζ–unoriented but ζ 0 oriented
with signζ 0 αφ∗ (e0 ) = 1. Moreover, φc is orientation preserving, so φ(ζ 0 (Xē )) = ζ 0 (Xφ∗ (e) ).
It also means that δ 0 (φ∗ (e)) = (δ(φ∗ (e)), 1) = (δ(e), 1) = δ 0 (e).
Now suppose e is ζ–oriented and ι(e) := c is cylindrical and unbalanced. Invariance
of ζ 0 on e is inherited from invariance of ζ. From the proof of Proposition 6.4, since φc
is orientation preserving, signζ 0 αe = signζ 0 αφ∗ (e) . Along with invariance of δ, this gives
us δ 0 (e) = δ 0 (φ∗ (e)).
For vertices and remaining edges, δ 0 (t) = (δ(t), 0) = (δ(φ∗ (t)), 0) = δ 0 (φ∗ (t)).
For the final claim, suppose e is ζ 0 –oriented and e0 is ζ 0 –unoriented. Since ζ 0 extends
ζ, e0 is also ζ–unoriented. If e is ζ–oriented then δ(e) 6= δ(e0 ) because the δ–partition
of edges of T is finer than the partition into ζ–oriented edges and ζ–unoriented edges.
Thus, δ 0 (e) 6= δ 0 (e0 ), since δ 0 refines δ.
If e is ζ–unoriented then δ 0 (e) = (δ(e), signζ 0 αe ) and δ 0 (e0 ) = (δ(e0 ), 0) differ in the
second coordinate.
Lemma 6.7. Suppose that δ and ζ are Map(X)–invariant and stable under cylinder
refinement. If c is an unbalanced cylindrical vertex and o ∈ O such that δ −1 (o)∩lk(c) 6= ∅
then either every edge in δ −1 (o) ∩ lk(c) has orientation preserving attaching map or every
edge in δ −1 (o) ∩ lk(c) has orientation reversing attaching map.
Proof. Cylinder refinement orients every edge in an unbalanced cylinder and distinguishes
edges with orientation preserving attaching map from those with orientation reversing
attaching map.
44
6.3
Non-elementary vertices
Given a tree of spaces whose underlying tree is decorated δ : T → O, we get a decoration
on the peripheral structure of each vertex space via mapping to the tree and composing
with δ.
Throughout this subsection we assume that δ : T → O is a Map(X)–invariant decoration and ζ is a Map(X)–invariant partial orientation.
Define:
a
PQ
PQ
O0 = O×
Map(ZQ , PQ )\(O × (∪x∈∂PQ x q {‘NULL’}) × (PQ q {‘NULL’}))
Q∈Maptypes
The left action of Map(ZQ , PQ ) is given by φ.(χ, ζ, e) := (χ ◦ φ−1 , ζ ◦ φ−1 , φ∗ (e)).
If e ∈ T is an edge with non-elementary terminus v := τ (e), Q = J(Xv , Pv )K, µv ∈
Map((Xv , Pv ), (ZQ , PQ )), and ζv is a partial orientation on Pv , define:
−1
δ 0 (v) := δ(v), Map(ZQ , PQ ).(δ|Pv ◦ µ−1
v , ζv ◦ µv , ‘NULL’)
−1
δ 0 (e) := δ(e), Map(ZQ , PQ ).(δ|Pv ◦ µ−1
v , ζv ◦ µv , (µv )∗ (e))
Note that the image is independent of the choice of µv ∈ Map((Xv , Pv ), (ZQ , PQ )).
Composition of δ 0 with projection to the first factor of O0 recovers δ, so δ 0 is a
refinement of δ.
Proposition 6.8. The refinement δ 0 of δ defined above is Map(X)–invariant.
Proof. Take φ ∈ Map(X). If e is an edge with v := τ (e) non-elementary, Q := JXv , Pv K,
and χ := µφ∗ (v) ◦ φv ◦ µ−1
v ∈ Map(ZQ , PQ ), then:
−1
δ 0 (φ∗ (e)) = δ(φ∗ (e)), Map(ZQ , PQ ).(δ|Pφ∗ (v) ◦ µ−1
,
ζ
◦
µ
,
(µ
)
(φ
(e)))
∗
∗
φ
(v)
φ
(v)
∗
∗
φ∗ (v)
φ∗ (v)
−1
−1
−1
= δ(e), Map(ZQ , PQ ).(δ|Pv ◦ φv ◦ µφ∗ (v) , ζv ◦ φv ◦ µ−1
,
(µ
)
(φ
(e)))
φ∗ (v) ∗ ∗
φ∗ (v)
−1
−1
−1
= δ(e), Map(ZQ , PQ ).(δ|Pv ◦ µ−1
v ◦ χ , ζv ◦ µv ◦ χ , (χ ◦ µv )∗ (e))
−1
= δ(e), Map(ZQ , PQ ).(δ|Pv ◦ µ−1
v , ζv ◦ µv , (µv )∗ (e))
= δ 0 (e)
Thus, δ 0 is Map(X)–invariant.
Proposition 6.9. For vertices v, w ∈ T , δ 0 (v) = δ 0 (w) if and only if there exists φ ∈
Map((Xv , Pv , δ, ζ), (Xw , Pw , δ, ζ)).
For edges e, f ∈ T with v := τ (e) and w := τ (f ) both non-elementary, δ 0 (e) = δ 0 (f )
if and only if there exists φ ∈ Map((Xv , Pv , δ, ζ), (Xw , Pw , δ, ζ)) with φ∗ (e) = f .
Proof. We give the proof for edges. The proof for vertices is similar.
Let Q = JXv , Pv K. By definition, δ 0 (e) = δ 0 (f ) if and only if δ(e) = δ(f ) and there
exists χ ∈ Map(ZQ , PQ ) such that
45
−1 = δ|
−1
1. δ|Pv ◦ µ−1
Pw ◦ µw
v ◦χ
−1 = ζ ◦ µ−1
2. ζv ◦ µ−1
w
v ◦χ
w
3. (χ ◦ µv )∗ (e) = (µw )∗ (f )
Define φ := µ−1
w ◦ χ ◦ µv ∈ Map((Xv , Pv ), (Xw , Pw )). Item 1 is equivalent to δ|Pv ◦
−1
φ = δ|Pw . Item 2 is equivalent to ζv ◦ φ−1 = ζw . Item 3 is equivalent to φ∗ (e) = f .
Corollary 6.10. There exists a Map(X)–invariant extension ζ 0 of ζ such that for any
edge e with v := τ (e) non-elementary, e is ζ 0 –unoriented if and only if the stabilizer of
Xē in Map(Xv , Pv , δ, ζ) contains an infinite dihedral group.
Proof. If e ζ–unoriented and the stabilizer of Xē in Map(Xv , Pv , δ, ζ) does not contain
an infinite dihedral group then define an extension ζ 0 of ζ on (δ 0 )−1 (δ 0 (e)) as follows.
Choose an orientation of Xē . If f is an edge with δ 0 (f ) = δ 0 (e) then, by Proposition 6.9,
there exists φ ∈ Map((Xv , Pv , δ, ζ), (Xw , Pw , δ, ζ)) with φ∗ (e) = f . This means that f is
ζ–unoriented, so we extend ζ by defining ζ 0 (Xf¯) := φ(ζ 0 (Xē )).
The orientation of Xf¯ is independent of the choice of φ because of the stabilizer
condition on Xē .
Definition 6.11. Given Map(X)–invariant decoration δ and partial orientation ζ, the
process of vertex refinement produces the Map(X)–invariant δ 0 and partial orientation
ζ 0 defined above.
6.4
Combining the local restrictions
In this section we have our main technical tools. Theorem 6.12 identifies Aut(T, δ)
orbits. Theorem 6.13 leverages this information to understand decoration preserving
isomorphisms between two different trees. Theorem 6.13 provides a blueprint for the
main classification theorems in the next two sections.
Theorem 6.12. Suppose δ : T → O is a Map(X)-invariant decoration and ζ is a
Map(X)-invariant partial orientation. Suppose δ and ζ are stable under neighbor, cylinder, and vertex refinement.
For edges e, f ∈ T we have δ(e) = δ(f ) if and only if there exists χ ∈ Aut(T, δ) such
that
• χ(e) = f
• For every u ∈ T there exists φu ∈ Map((Xu , Pu , δ, ζ), (Xχ(u) , Pχ(u) , δ, ζ)), such that
χ|lk(u) = (φu )∗ .
• For every edge e0 the map (αχ(e0 ) ◦ φι(e0 ) ) ◦ (φτ (e0 ) ◦ αe0 )−1 is orientation preserving
on Xχ(e0 ) .
46
Proof. If there exists χ ∈ Aut(T, δ) such that χ(e) = f then δ(e) = δ(f ). Conversely,
supposing δ(e) = δ(f ), we construct χ.
Define χ(e) := f .
By Proposition 6.9, there exists φτ (e) ∈ Map((Xτ (e) , Pτ (e) , δ, ζ), (Xτ (f ) , Pτ (f ) , δ, ζ))
with (φτ (e) )∗ (e) = f . Define χ|lk(τ (e)) := (φτ (e) )∗ .
Now, suppose that we have χ satisfying the desired properties defined on a subtree
0
T of T such that every leaf is non-elementary and T 0 contains every edge incident to
every non-leaf. Given an edge e0 with c := ι(e0 ) ∈
/ T 0 and τ (e0 ) ∈ T 0 , we show how to
extend χ to lk(c0 ), satisfying the desired properties. Then, by induction, we can extend
χ to all of T .
−1
Let χ(e0 ) := (φτ (e0 ) )∗ (e0 ). Define φc := αχ(e
◦ φτ (e0 ) ◦ αe0 so that (αχ(e0 ) ◦ φc ) ◦
0)
−1
(φτ (e0 ) ◦ αe0 ) is orientation preserving on Xχ(e0 ) .
Case 1: c is unbalanced. Extend χ to lk(c) by choosing a bijection between lk(c) \
{e0 }∩δ −1 (o) and lk(χ(c))\{χ(e0 )}∩δ −1 (o) for each o ∈ O. For each o these sets have the
same cardinality by neighbor stability. Since c is unbalanced, cylindrical stability implies
that c and all edges in lk(c) are ζ–oriented, and, for each o ∈ O, all edges in δ −1 (o) have
attaching maps with the same sign; recall Lemma 6.7. By Map(X)–invariance, the same
is true for χ(c), and for each e1 ∈ lk(c) we have signζ αe1 = signζ αχ(e1 ) .
By Proposition 6.9, there exists
φτ (e1 ) ∈ Map((Xτ (e1 ) , Pτ (e1 ) , δ, ζ), (Xτ (χ(e1 )) , Pτ (χ(e1 )) , δ, ζ))
with (φτ (e1 ) )∗ (e1 ) = χ(e1 ). Define φ|Xτ (e1 ) := φτ (e1 ) and χ|lk(τ (e1 )) := (φτ (e1 ) )∗ . By
construction, (αχ(e1 ) ◦ φc ) ◦ (φτ (e1 ) ◦ αe1 )−1 is orientation preserving on Xχ(e1 ) .
In the balanced cases, choose some orientation of Xc and Xχ(c) .
Case 2: c is balanced and o ∈ O is such that δ −1 (o) ∩ lk(c) 6= ∅ consists of ζ–
oriented edges. By neighbor stability, the total number, n, of edges in lk(c) ∩ δ −1 (o)
is equal to the total number of edges in lk(χ(c)) ∩ δ −1 (o). Since c is balanced, the
number of edges in lk(c) ∩ δ −1 (o) with orientation preserving attaching map is equal to
the number of edges in lk(c) ∩ δ −1 (o) with orientation reversing attaching map, so there
are n/2 of each. Cylinder stability implies χ(c) is also balanced, so there are n/2 edges
in lk(χ(c)) ∩ δ −1 (o) with orientation preserving attaching map and n/2 with orientation
reversing attaching map.
If sign αe0 = sign αχ(e0 ) then φc is orientation preserving. Define χ on δ −1 (o) ∩ lk(c) \
{e0 } by choosing any bijection with δ −1 (o) ∩ lk(χ(c)) \ {e0 } that preserves the signs of
the attaching maps.
If sign αe0 6= sign αχ(e0 ) then φc is orientation reversing. Define χ on δ −1 (o) ∩ lk(c) \
{e0 } by choosing any bijection with δ −1 (o) ∩ lk(χ(c)) \ {e0 } that exchanges the signs of
the attaching maps.
Extend φ and χ as in the previous case.
47
Case 3: c is balanced and o ∈ O is such that δ −1 (o) ∩ lk(c) 6= ∅ consists
of ζ–unoriented edges. By neighbor stability, lk(c) \ {e0 } ∩ δ −1 (o) and lk(χ(c)) \
{e0 } ∩ δ −1 (o) have the same cardinality, and we extend χ by an arbitrary bijection
between them. Take e1 ∈ δ −1 (o) ∩ lk(c) \ {e0 }. By Proposition 6.9, there exists
φ0τ (e1 ) ∈ Map((Xτ (e1 ) , Pτ (e1 ) , δ, ζ), (Xτ (χ(e1 )) , Pτ (χ(e1 )) , δ, ζ)) with (φ0τ (e1 ) )∗ (e1 ) = χ(e1 ).
Since e1 is ζ–unoriented and ζ is stable under vertex refinement, by Corollary 6.10 there
exists an element of Map(Xτ (e1 ) , Pτ (e1 ) , δ, ζ) reversing Xē1 . Define φτ (e1 ) := φ0τ (e1 ) if
(αχ(e1 ) ◦ φc ) ◦ (φ0τ (e1 ) ◦ αe1 )−1 is orientation preserving on Xχ(e1 ) , and define φτ (e1 ) to be
φ0τ (e1 ) precomposed with a Xτ (e1 ) –flip otherwise. Extend χ to lk(τ (e1 )) by (φτ (e1 ) )∗ .
Let ζ0 be the trivial partial orientation on X with constant value ‘NULL’. Let
δ0 : T → O0 be any Map(X)–invariant decoration of T . Perform neighbor, cylinder,
and vertex refinement repeatedly until all three stabilize, and let δ : T → O be the
resulting decoration and ζ the resulting partial orientation.
Now suppose X 0 is a tree of spaces over T 0 with finite cylinders and such that every
φ ∈ Map(X 0 ) splits as a tree of maps over T 0 . Let ζ00 be the trivial partial orientation,
and let δ00 : T 0 → O0 be a Map(X 0 )–invariant decoration of T 0 . (Note that δ0 and δ00
map to the same set of ornaments!) Let ζ 0 and δ 0 be the partial orientation extending ζ00
and the decoration refining δ00 that result from performing neighbor, cylinder, and vertex
refinement repeatedly until all three stabilize.
Recall that the process of cylinder refinement involved choosing Map(X)–invariant
orientations. We will need to account for the fact that these choices can be made differently in X and X 0 . Let ξ ∈ {−1, 1}O . Define ξ · ζ to be the partial orientation:
if ζ(Xt ) = ‘NULL’
‘NULL’
ξ · ζ(Xt ) = ζ(Xt )
if ξ(δ(t)) = 1
opposite of ζ(Xt ) if ξ(δ(t)) = −1
Theorem 6.13. With the above notation, the following are equivalent:
1. There exists χ ∈ Isom((T, δ0 ), (T 0 , δ00 )) such that:
0
0
(a) For every vertex v ∈ T there exists φv ∈ Map((Xv , Pv ), (Xχ(v)
, Pχ(v)
)), such
that χ|lk(v) = (φv )∗ .
(b) For every edge e ∈ T we have (αχ(e) ◦ φι(e) ) ◦ (φτ (e) ◦ αe )−1 is orientation
preserving on X 0 .
χ(e)
2. There exists a bijection β : Im δ → Im δ 0 and ξ ∈ {−1, 1}O such that:
(a) δ0 ◦ δ −1 = δ00 ◦ (δ 0 )−1 ◦ β
(b) When the rows and columns of S(T 0 , δ 0 , O0 ) are given the β–induced ordering
from S(T, δ, O), we have S(T, δ, O) = S(T 0 , δ 0 , O0 ).
(c) For every o ∈ Im δ such that δ −1 (o) consists of non-elementary vertices there
exists (equivalently, for every) v ∈ δ −1 (o) and v 0 ∈ (δ 0 )−1 (β(o)) so that
Map((Xv , Pv , β ◦ δ, ξ · ζ), (Xv0 0 , Pv0 0 , δ 0 , ζ 0 )) is nonempty.
48
(d) For every o ∈ Im δ such that δ −1 (o) consists of cylindrical vertices there exists
(equivalently, for every) c ∈ δ −1 (o) and χ(c) ∈ (δ 0 )−1 (β(o)) so that Ωδ,ξ·ζ
=
c
δ 0 ,ζ 0
Ωχ(c) ◦ β.
Proof. If item 1 is true then δ0 = δ00 ◦ χ and ζ0 = ζ00 ◦ χ. Perform the same sequence of
refinements on δ0 and δ00 . Each time the partial orientation on X is extended by choosing
some orientation, push that choice forward to X 0 using the appropriate φc or φv . We get
the claims of item 2 with β the identity and ξ the constant map sending O to 1.
We complete the proof by showing that the hypotheses of item 2 allow us to build
a isomorphism χ ∈ Isom((T, β ◦ δ), (T 0 , δ 0 )) and a collection of maps φv satisfying the
conditions of item 1. Condition 2a implies χ ∈ Isom(T, δ0 ), (T 0 , δ00 )). The construction
is along the lines of that in the proof of Theorem 6.12: we inductively construct χ and
0
0
maps φv ∈ Map((Xv , Pv , β ◦ δ, ξ · ζ), (Xχ(v)
, Pχ(v)
, δ 0 , ζ)) with χ|lk(v) = (φv )∗ .
To begin, pick a non-elementary vertex v0 ∈ T and a vertex v00 ∈ (δ 0 )−1 (β ◦ δ(v0 )).
Define χ(v0 ) := v00 . By 2c and Theorem 6.12, there exists:
φv0 ∈ Map((Xv0 , Pv0 , β ◦ δ, ξ · ζ), (Xv0 0 , Pv0 0 , δ 0 , ζ 0 ))
0
0
Define φ|Xv0 := φv0 and χ|lk(v0 ) := (φv0 )∗ .
Let e0 be an edge in lk(v0 ) with cylindrical initial vertex c := ι(e0 ). Define φc :=
(αe00 )−1 ◦ φv0 ◦ αe0 .
For the induction step we extend χ to lk(c). When c is balanced the construction is
virtually the same as that of Theorem 6.12, so we omit those cases. The remaining case
is that c is unbalanced.
Extend χ to lk(c) by choosing a bijection between lk(c) \ {e0 } ∩ δ −1 (o) and lk(χ(c)) \
{χ(e0 )} ∩ δ −1 (β(o)) for each o ∈ O. These sets have the same cardinality by condition
2b. Since c is unbalanced, cylindrical stability implies that c and all edges in lk(c) are
ζ–oriented, and, for each o ∈ O, all edges in δ −1 (o) have attaching maps with the same
sign; recall Lemma 6.7. This implies that for each o ∈ O, Ωδ,ξ·ζ
(o) = ±Ωδ,ζ
c
c (o), so, in
is
not
identically
zero.
Condition
2d
then
implies
χ(c)
is
unbalanced,
so
particular Ωδ,ξ·ζ
c
0
χ(c) and all of the edges in lk(χ(c)) are ζ –oriented, and edges with the same ornament
have attaching maps with the same sign.
0
We may choose the orientations on Xc and Xχ(c)
to be those given by ξ · ζ and ζ 0 ,
respectively. Together with condition 2d, this implies there exists ∈ ±1 such that for
all o ∈ O:
X
X
signξ·ζ αe =
signζ 0 αe0 0
e∈lk(c)∩δ −1 (o)
e0 ∈lk(χ(c))∩(δ 0 )−1 (β(o))
Since all the edges with a particular ornament have attaching maps of the same sign, this
0
means that for all e1 ∈ lk(c) we have signξ·ζ αe1 = signζ 0 αχ(e
. Therefore, the sign of
1)
0
0
0
αχ(e
◦ φc ◦ αe−1
= αχ(e
◦ (αχ(e
)−1 ◦ φv0 ◦ αe0 ◦ αe−1
1
1
1)
1)
0)
on Xē1 with respect to ξ · ζ and ζ 0 is ( · signξ·ζ αe0 · signξ·ζ αe1 )2 = +1.
49
By Proposition 6.9 and condition 2c, there exists
φτ (e1 ) ∈ Map((Xτ (e1 ) , Pτ (e1 ) , β ◦ δ, ξ · ζ), (Xτ0 (χ(e1 )) , Pτ0 (χ(e1 )) , δ 0 , ζ 0 ))
with (φτ (e1 ) )∗ (e1 ) = χ(e1 ). Define φ|Xτ (e1 ) := φτ (e1 ) and χ|lk(τ (e1 )) := (φτ (e1 ) )∗ . We know
(αχ(e1 ) ◦ φc ) ◦ (φτ (e1 ) ◦ αe1 )−1 is orientation preserving on X 0
because:
χ(e1 )
0
0
◦ φc ◦ αe−1
(ξ · ζ(Xē1 )) = ζ 0 (Xχ(e
αχ(e
) = φτ (e1 ) (ξ · ζ(Xē1 ))
1
1)
)
1
0
We remark that it is not required that φc (ξ · ζ(Xc )) = ζ 0 (Xχ(c)
), but this can easily
be arranged by redefining ξ(δ(c)) to be · ξ(δ(c)).
7
Classification of hyperbolic groups up to boundary homeomorphism from their two-ended JSJ splittings
We are now ready to prove our first classification theorem, characterizing the homeomorphism type of the Gromov boundary of a one-ended hyperbolic group from its JSJ tree
of cylinders.
Theorem 7.1. Let G be a one-ended hyperbolic group with non-trivial JSJ decomposition
over two-ended subgroups, with T := Cyl(G). Let X be an algebraic tree of spaces for
G over T . Let ζ0 be the trivial partial orientation on X. Take the initial decoration
δ0 on T to be by vertex type (‘cylindrical’, ‘rigid’, or ‘hanging’) and relative boundary
homeomorphism type. Perform neighbor, cylinder, and vertex refinement until all three
stabilize to give a decoration δ : T → O and a partial orientation ζ of X.
Let G0 be another one-ended hyperbolic group with non-trivial JSJ decomposition over
two-ended subgroups. Define T 0 , X 0 , δ00 , ζ00 , δ 0 : T 0 → O0 , and ζ 0 as we did for G. Then
∂G is homeomorphic to ∂G0 if and only if there exists a bijection β : Im δ → Im δ 0 and a
ξ ∈ {−1, 1}O such that:
1. δ0 ◦ δ −1 = δ00 ◦ (δ 0 )−1 ◦ β
2. When the rows and columns of S(T 0 , δ 0 , O0 ) are given the β–induced ordering from
S(T, δ, O), we have S(T, δ, O) = S(T 0 , δ 0 , O0 ).
3. For every o ∈ Im δ such that δ −1 (o) consists of non-elementary vertices there exists
(equivalently, for every) v ∈ δ −1 (o) and v 0 ∈ (δ 0 )−1 (β(o)) so that
Homeo((∂Xv , ∂Pv , β ◦ δ, ξ · ζ), (∂Xv0 0 , ∂Pv0 0 , δ 0 , ζ 0 ))
is nonempty.
4. For every o ∈ Im δ such that δ −1 (o) consists of cylindrical vertices there exists
0 0
(equivalently, for every) c ∈ δ −1 (o) and c0 ∈ (δ 0 )−1 (β(o)) such that Ωδ,ξ·ζ
= Ωδc0 ,ζ ◦β.
c
50
Proof. Since the initial decorations δ0 and δ00 are trivial, the given conditions are equivalent, by Theorem 6.13 for boundary homeomorphism, to the existence of χ ∈ Isom(T, T 0 )
such that:
0
0
1. For every vertex v ∈ T there exists φv ∈ Homeo((∂Xv , ∂Pv ), (∂Xχ(v)
, ∂Pχ(v)
)),
such that χ|lk(v) = (φv )∗ .
2. For every edge e ∈ T we have ∂αχ(e) ◦ φι(e) = φτ (e) ◦ ∂αe .
These conditions say there exists an isomorphism χ : T → T 0 and a tree of boundary
homeomorphisms over χ compatible with X and X 0 . By Theorem 2.28, this is equivalent
to the existence of a boundary homeomorphism between ∂X and ∂X 0 , hence between
∂G and ∂G0 .
Example 7.2. Recall the example of Section 5.7. The trees of cylinders of these groups
are isomorphic: they are bipartite with one orbit of valence 2 cylindrical vertex and one
orbit of infinite valence relatively rigid vertex. Recall also that the rigid vertices were discussed in Section 3, and the relative quasi-isometry (hence, boundary homeomorphism)
types of these three examples are the same.
There are two Gi –orbits of edge in Cyl(Gi ), so the only remaining question about
Homeo(∂Gi )–orbits is whether there are one or two orbits of edges. For boundary homeomorphism we do not care about stretch factors on the edges, so the edges have trivial
initial decoration.
The quasi-isometry group of the vertex stabilizer preserving the peripheral structure
coming from incident edge groups is transitive on peripheral sets, so the vertex refinement
is a trivial refinement of the initial decoration.
Moreover, the quasi-isometry group of the vertex stabilizer preserving the peripheral structure coming from incident edge groups contains and infinite dihedral group in
the stabilizer of each peripheral subset, so all cylinders are balanced, and the cylinder
refinement is a trivial refinement of the initial decoration.
We conclude there is only one Homeo(∂Gi ) orbit of edges in Cyl(Gi ), so the initial decoration and initial (trivial) partial orientation are stable. Since the structure
invariants are the same for the three Gi , they have homeomorphic boundaries.
8
Quasi-isometry classification of groups from their twoended JSJ splittings
We are now almost ready to prove our second main theorem, characterizing the quasiisometry type of a finitely presented one-ended group from its JSJ tree of cylinders.
Before doing so, we explain the extreme flexibity provided by the hanging vertices of the
tree.
51
8.1
Quasi-isometric flexibility of hanging spaces
Recall that the fixed model space for hanging vertices is the universal cover of a fixed
hyperbolic pair of pants Σ, with peripheral structure consisting of the coarse equivalence
classes of the boundary components of Σ̃.
Proposition 8.1 (cf [2, Theorem 1.2]). Let G be a finitely presented, one-ended group
admitting a JSJ decomposition over two-ended subgroups with two-ended cylinder stabilizers. Let Γ := G\Cyl(G) and T := Cyl(G) = T (Γ). Let X be an algebraic tree of spaces
for G over T . Let v be a hanging vertex in Γ. Let δ : T → O be a QI(X)–invariant decoration and let ζ be a QI(X)–invariant partial orientation. For each edge e ∈ Γ incident
to v, choose a positive real parameter σe . Let δ 0 : ∂ Σ̃ → O be a decoration of the peripheral structure of Σ̃ and let ζ 0 be a partial orientation of ∂Σ such that QI(Σ̃, ∂ Σ̃, δ 0 , ζ 0 )
acts coboundedly on Σ̃.
Suppose that for some e0 ∈ lk(e
v ) we are given a coarse similitude φ|Xe0 from Xe0 to a
component B0 of ∂ Σ̃ that respects the decoration and partial orientations. Suppose further
that there exists a φ0 ∈ QIsom((Xv , Pv , δ, ζ), (Σ̃, ∂ Σ̃, δ 0 , ζ 0 )) such that φ0 (Xe ) = B0 . Then
there exists φ ∈ QIsom((Xv , Pv , δ, ζ), (Σ̃, ∂ Σ̃, δ 0 , ζ)) extending φ|Xe0 that, for each edge
e ∈ lk(v) \ {e0 }, restricts to be a coarse similitude with multiplicative constant σe on Xe .
The quasi-isometry constants of φ can be bounded in terms of Gv , Pv , the coboundedness constant for QI(Σ̃, ∂ Σ̃, δ 0 , ζ 0 ) y Σ̃, the constants of φ|Xe0 , and the σv .
Sketch. The proof follows the same argument as [2, Theorem 1.2]. The idea is to build
φ inductively, peripheral set by peripheral set. We start with φXe0 . Let σ0 be the
multiplicative constant of φXe0 . Then we want to extend φ to peripheral sets that come
close to Xe0 in Xv , sending these to components of ∂ Σ̃ that come close to φ(Xe0 ).
For another peripheral set Xe , the number of peripheral sets in the QI(Xv , Pv , δ, ζ)–
orbit of Xe that come within some fixed distance K of a subsegment of Xe0 of length l
is coarsely dl for some d > 0.
Let d0r be such that there are coarsely d0r l peripheral sets in the QI(Σ̃, ∂ Σ̃, δ 0 , ζ 0 )–
orbit of φ0 (Xe ) that come within r of a subsegment of B0 of length l. The fact that
QI(Σ̃, ∂ Σ̃, δ 0 , ζ 0 ) y Σ̃ is C–cobounded for some C says that d0C > 0, and, in fact, d0r
grows exponentially in r. This means that there is a logarithmically growing function
whose value R at σd0 is such that d0R ≥ σd0 . Thus, for any l there is a way to send the
dl elements in the QI(Xv , Pv , δ, ζ)–orbit of Xe that come within distance K of a length
l subsegment S of Xe0 injectively to the peripheral sets in the QI(Σ̃, ∂ Σ̃, δ 0 , ζ 0 )–orbit of
φ0 (Xe ) that come within R of the length approximately σ0 l subsegment φ|Xe (S) of B0 .
In this way one builds a matching between the peripheral sets that come close to
Xe0 and the peripheral sets that come close to B0 , respecting decorations and partial
orientations. Then φ is defined along such a matched pair to be a coarse similarity with
the appropriate σe as multiplicative constant, and the neighbor-matching is repeated for
each such pair.
52
8.2
Geometric trees of spaces for groups with two-ended cylinders stabilizers
Let G be a finitely presented, one-ended group admitting a JSJ decomposition over twoended subgroups with two-ended cylinder stabilizers. Let Γ := G\Cyl(G) and T :=
Cyl(G) = T (Γ).
Recall that in Section 2.5 we built an algebraic tree of spaces Y quasi-isometric to
G, and gave conditions for a collection of quasi-isometries of the vertex spaces to patch
together to give a quasi-isometry of Y . Now we will construct a geometric tree of spaces
X by uniformizing the vertex spaces, that is, replacing each vertex space by its uniform
model from Section 5.5. The quasi-isometries between vertex spaces and their uniform
models will patch together to give a quasi-isometry from Y to X. Therefore, X will
be quasi-isometric to G. The price to pay for uniformizing the vertex spaces is that in
general G only admits a cobounded quasi-action on X, not a cocompact action, but this
will not affect us.
We use the same notation as in Section 2.5. Let Y be the algebraic tree of spaces
constructed there. For a relatively rigid vertex v ∈ Γ, fix a quasi-isometry νv : (Gv , Pv ) →
(ZJ(Gv ,Pv )K , PJ(Gv ,Pv )K ) from Gv to the chosen model space for the relative quasi-isometry
type of (Gv , Pv ).
If Gv is virtually cyclic choose a cyclic subgroup hzv i < Gv of minimal index. Define
νv by sending Gv onto hzv i by closest point projection and sending zvk to kσv ∈ R, where
σv is a positive real parameter chosen as follows. If v is not adjacent to any quasiisometrically rigid vertices then choose σv := 1. Otherwise, choose σv := min `Xw (zv ),
where the minimum is taken over quasi-isometrically rigid vertices w adjacent to v.
Remark 8.2. This choice of σv ’s is convenient because it will imply, for an edge e with
ι(e) cylindrical and τ (e) rigid, that the attaching map αeX constructed below is a coarse
similitude whose multiplicative constant is equal to the stretch factor relStr(e) defined
in Section 5.6.
For a hanging vertex v ∈ Γ we define νv as follows. For each edge e ∈ lk(v) choose a
cyclic subgroup hze i < Ge of minimal index. Define
νv : (Gv , Pv ) → (ZJ(Gv ,Pv )K , PJ(Gv ,Pv )K )
to be a quasi-isometry such that for each e ∈ lk(v), each coset of Ge , which is a peripheral
set in Pv , is sent to a peripheral set in PJ(Gv ,Pv )K by a coarse similitude with multiplicative
constant:
[hzτ (e) i:hzτ (e) i∩hze i]
[hze i:hz
i∩hze i] · στ (e)
τ (e)
`Gv (ze )
Here, `Gv (ze ) is the translation length of ze in the Cayley graph of Gv , which is non-zero
since Gv is hyperbolic, and στ (e) is the parameter for Gτ (e) chosen above. Such a quasiisometry can be constructed using Proposition 8.1. These particular values are chosen
to make Lemma 8.3, below, true.
53
Now, for each vertex v ∈ VT define Xv to be a copy of ZJ(Gv ,Pv )K with isometry
−1
µv : Xv → ZJ(Gv ,Pv )K . Define φv : Yv → Xv by x 7→ µ−1
v ◦ νv (h(v,i) x).
We define edge spaces and attaching maps in X to be compatible with those of Y ,
as follows. Consider an edge e with v := ι(e) and w := τ (e). There are h(v,i) and g(e,j)
e and e = h(v,i) g(e,j) ee. Define αeX := φw ◦ αeY ◦ πYe ◦ φ−1
such that v = h(v,i) v
v , where πYe
denotes closest point projection to Ye . The map αeX is coarsely well defined, since πYe
X
Y
−1
moves points of φ−1
v (Xe ) bounded distance. Define αē := φv ◦ αē ◦ πYē ◦ φw , where
πYē is closest point projection from Yw to the coarsely dense subset Yē . This map is well
defined, and is a quasi-isometry inverse to αeX , since πYē moves points bounded distance.
Chasing through these definitions on easily demonstrates:
Lemma 8.3. If c = ι(e) is cylindrical and v = τ (e) is hanging then αeX : Xc → Xv is a
coarse isometric embedding.
Proposition 8.4. With notation as above, G, X, and Y are quasi-isometric to one
another.
Proof. G is quasi-isometric to Y by Lemma 2.15. Proposition 2.16 implies X and Y are
quasi-isometric, since (φv ) is a tree of quasi-isometries over the identity on T compatible
with X and Y .
8.3
Quasi-isometries
Let G be a finitely presented, one-ended group with non-trivial JSJ decomposition over
two-ended subgroups such that:
• Every non-elementary vertex is either hanging or quasi-isometrically rigid relative
to the peripheral structure coming from incident edge groups.
• Cylinder stabilizers are two-ended.
If Question 1 has positive answer then every one-ended hyperbolic group with a nontrivial JSJ decomposition is of this form.
Theorem 8.5. Let G and G0 be finitely presented, one-ended groups with non-trivial JSJ
decompositions over two-ended subgroups with two-ended cylinder stabilizers.
Let T := Cyl(G). Let X be a geometric tree of spaces for G over T , as in Section 8.2.
Let ζ0 be the trivial partial orientation on X. Let δ0 the decoration on T that sends an
edge e incident to a rigid vertex to its relative stretch factor relStr(e) as in Definition 5.17,
sends other edges to ‘NULL’, and sends vertices to their vertex type (‘cylindrical’, ‘rigid’,
or ‘hanging’) and relative quasi-isometry type. Let ζ0 be the trivial partial orientation on
X. Perform neighbor, cylinder, and vertex refinement until all three stabilize to give a
decoration δ : T → O and a partial orientation ζ of X.
Define T 0 , X 0 , δ00 , ζ00 , δ 0 : T 0 → O0 , and ζ 0 for G0 as we did for G. In particular, X 0
is uniformized with respect to the same choice of model spaces from Definition 5.15.
Then G and G0 are quasi-isometric if and only if there exists a bijection β : Im δ →
Im δ 0 and ξ ∈ {−1, 1}O such that:
54
1. δ0 ◦ δ −1 = δ00 ◦ (δ 0 )−1 ◦ β
2. When the rows and columns of S(T 0 , δ 0 , O0 ) are given the β–induced ordering from
S(T, δ, O), we have S(T, δ, O) = S(T 0 , δ 0 , O0 ).
3. For every o ∈ Im δ such that δ −1 (o) consists of non-elementary vertices there exists
(equivalently, for every) v ∈ δ −1 (o) and v 0 ∈ (δ 0 )−1 (β(o)) so that
QIsom((Xv , Pv , β ◦ δ, ξ · ζ), (Xv0 0 , Pv0 0 , δ 0 , ζ 0 ))
is nonempty.
4. For every o ∈ Im δ such that δ −1 (o) consists of cylindrical vertices, there exists
0 0
(equivalently, for every) c ∈ δ −1 (o) and c0 ∈ (δ 0 )−1 (β(o)) such that Ωδ,ξ·ζ
= Ωδc0 ,ζ ◦β.
c
The construction is a modification of the proof of Theorem 6.13. Recall in that case
we inductively built χ ∈ Isom((T, δ), (T, δ 0 )) and quasi-isometries
0
0
, δ 0 , ζ 0 ))
, Pχ(v)
φv ∈ QIsom((Xv , Pv , β ◦ δ, ξ · ζ), (Xχ(v)
such that (φv )∗ = χ|lk(v) . The proof of Theorem 6.13 mainly focuses on the inductive
step in the link of a cylindrical vertex, and chooses any φv as above such that (φv )∗
agrees with χ on the incoming edge to v.
In the present context we must be more careful about the choices of the φv . The proof
in Theorem 6.13 gives us a collection of quasi-isometries (φv ) such that for every edge e ∈
T with ι(e) cylindrical we have that (αχ(e) ◦ φι(e) ) ◦ (φτ (e) ◦ αe )−1 is orientation preserving
on X 0 , but now we require it to be coarsely the identity on X 0 . Furthermore, we
χ(e)
χ(e)
need the quasi-isometry constants of the φv to be uniformly bounded.
Here is how we achieve these requirements. Hanging vertices present no obstacles,
since by Proposition 8.1 they are so flexible. The real work is in dealing with the rigid
vertices. For these we choose in advance a finite number of quasi-isometries to use as
building blocks. Since the collection is finite, the constants are uniformly bounded. We
will choose the maps on cylinder spaces to be coarse isometries. It then remains to see that
if e ∈ ET is an edge with c := ι(e) cylindrical and v := τ (e) relatively rigid, that we can
make φc agree with a map φv constructed from the pre-chosen building blocks. We assume
we have chosen enough building blocks so that we can make (φv )∗ (e) = (φc )∗ (e), with the
correct orientation on Xē . This is handled by the same considerations as Theorem 6.13.
Additionally, we have set up the geometric tree of spaces so that the edge inclusion into
a rigid vertex is a coarse similitude whose multiplicative constant is the stretch factor
of the edge. Since we have incorporated the stretch factors into the decorations, we are
guaranteed that the stretch factor on e matches the stretch factor on χ(e). It follows
that (αχ(e) ◦ φc ) ◦ (φv ◦ αe )−1 is a coarse isometry that is orientation preserving. Finally,
we make it coarsely the identity by adjusting φv using the group action.
Proof of Theorem 8.5. By Theorem 2.9, Corollary 2.10, Proposition 2.16, and Proposition 5.14, X and X 0 are quasi-isometric if and only if there exists a tree of quasi-isometries
over an element of Isom((T, δ0 ), (T 0 , δ00 )) compatible with X and X 0 .
55
The existence of a tree of quasi-isometries over an element of Isom((T, δ0 ), (T 0 , δ00 ))
compatible with X and X 0 implies the above conditions. Our goal is to show the converse.
Suppose o ∈ O is an ornament such that δ −1 (o) consists of vertices that are relatively
quasi-isometrically rigid. Choose representatives vo,1 , . . . , vo,io of the G–orbits contained
in δ −1 (o). Suppose o0 ∈ O is an ornament such that δ −1 (o0 ) consists of edges incident
to v ∈ δ −1 (o). For each 1 ≤ i ≤ io choose representatives eo,i,o0 ,1 , . . . , eo,i,o0 ,jo0 of the
Gvo,i –orbits in δ −1 (o0 ) ∩ lk(vo,i ). For each i and j choose
Φo,i,o0 ,j ∈ QIsom((Xvo,i , Pvo,i , δ, ξ · ζ), (Xvo,1 , Pvo,1 , δ, ξ · ζ))
such that (Φo,i,o0 ,j )∗ (eo,i,o0 ,j ) = eo,1,o0 ,1 . Such quasi-isometries exist by Proposition 6.9.
0
0
Similarly choose representatives vβ(o),1
, . . . , vβ(o),i
of the G0 –orbits contained in
0
β(o)
(δ 0 )−1 (β(o)) and representatives e0β(o),i,β(o0 ),1 , . . . , e0β(o),i,β(o0 ),j 0
β(o0 )
of the G0vβ(o),i –orbits in
0
(δ 0 )−1 (β(o0 )) ∩ lk(vβ(o),i
) and quasi-isometries Φ0β(o),i,β(o0 ),j .
Choose a quasi-isometry Φo,o0 ∈ QIsom((Xvo,1 , Pvo,1 , δ, ξ · ζ), (Xv0 0
β(o),1
, Pv0 0
, δ 0 , ζ 0 ))
β(o),1
that takes eo,1,o0 ,1 to e0β(o),1,β(o0 ),1 . Such a quasi-isometry exists by condition 3 and Proposition 6.9. If eo,1,o0 ,1 is ζ–unoriented then we also choose
0
Φ−
o,o0 ∈ QIsom((Xvo,1 , Pvo,1 , δ, ξ · ζ), (Xv 0
β(o),1
, Pv0 0
, δ 0 , ζ 0 ))
β(o),1
−1 orientation reversing on
0
that takes eo,1,o0 ,1 to e0β(o),1,β(o0 ),1 such that Φ−
o,o0 ◦ (Φo,o )
Xē0 0
. Such a quasi-isometry exists by Corollary 6.10.
β(o),1,β(o0 ),1
We have chosen finitely many quasi-isometries Φ, so they have uniformly bounded
quasi-isometry constants.
Induction base case Begin the induction by choosing a cylindrical vertex c ∈ T and
a cylindrical vertex c0 ∈ (δ 0 )−1 (β(δ(c))). Define χ(c) := c0 . By construction Xc and Xc0 0
are copies of R. Define φc : Xc → Xc0 0 to be an isometry. If c is ζ–oriented we choose φc
so that φc (ξ · ζ(Xc )) = ζ 0 (Xc0 0 ). Extend χ to lk(c) as in Theorem 6.13.
Inductive steps for non-elementary vertices Suppose v = τ (e) is a non-elementary
0
vertex such that for c = ι(e) we have already defined a coarse isometry φc : Xc → Xχ(c)
0
0
and χ|lk(c) . Suppose further that if c is ζ–oriented then φc (ξ · ζ(Xc )) = ζ (Xχ(c) ). Let
c0 := χ(c) and e0 := χ(e).
Suppose v is rigid. Now gv = vδ(v0 ),i for some g ∈ G and some i, and hge =
eδ(v),i,δ(e),j for some j and some h ∈ Gvδ(v),i . Similarly, there are g 0 ∈ G0 and i0 such that
0
0
0
0
g 0 v 0 = vβ(δ(v)),i
such that h0 g 0 e0 = e0β(δ(v)),i0 ,β(δ(e)),j 0 .
0 , and j and h ∈ Gv 0
The map
β(δ(v)),i0
(h0 g 0 )−1 ◦ (Φ0β(δ(v0 )),i0 ,β(δ(e)),j 0 )−1 ◦ Φδ(v0 ),δ(e) ◦ Φδ(v0 ),i,δ(e),j ◦ hg
56
is an element of QIsom(Xv0 , Pv0 , β ◦ δ, ξ · ζ), (Xv0 0 , Pv0 0 , δ 0 , ζ 0 )) taking e to e0 .
0
0
If e is ζ–unoriented then we also have that the map
(h0 g 0 )−1 ◦ (Φ0β(δ(v0 )),i0 ,β(δ(e)),j 0 )−1 ◦ Φ−
δ(v0 ),δ(e) ◦ Φδ(v0 ),i,δ(e),j ◦ hg
is an element of QIsom(Xv0 , Pv0 , β ◦ δ, ξ · ζ), (Xv0 0 , Pv0 0 , δ 0 , ζ 0 )) taking e to e0 . For one of
0
0
these two, the composition with αe ◦ (φc )−1 ◦ (αe0 0 )−1 is orientation preserving on Xē .
Choose this one as φ0v .
Finally, choose a point x ∈ Xē . Since edge stabilizers act uniformly coboundedly on
their corresponding peripheral sets, we can choose an element k ∈ G0ē0 that is orientation
preserving on Xē0 0 and such that kφ0v (x) is boundedly close to αe0 0 ◦ φc ◦ (αe )−1 (x). Define
φv := kφ0v .
We have:
• φv ∈ QIsom((Xv0 , Pv0 , β ◦ δ, ξ · ζ), (Xv0 0 , Pv0 0 , δ 0 , ζ 0 ))
0
0
• (φv )∗ (e) = e0
• φv (x) is boundedly close to αe0 0 ◦ φc ◦ (αe )−1 (x).
• φv ◦ (αe0 0 ◦ φc ◦ (αe )−1 )−1 is orientation preserving on Xē0 0 .
• φv is a composition of three of the pre-chosen Φ with multiplication by five group
elements, so the quasi-isometry constants of φv are bounded in terms of those of
the Φ and the constants for the group action.
By relative quasi-isometric rigidity, φv is a coarse isometry.
We also claim that αe0 0 ◦ φc ◦ (αe )−1 is a coarse isometry. This is because φc is a
coarse isometry, by the induction hypothesis, and αe and αe0 0 are, by construction (recall
Remark 8.2), coarse similitudes with multiplicative constants relStr(e) and relStr(e0 ),
which are equal, since:
relStr(e) = δ0 ◦ δ −1 (δ(e)) = δ00 ◦ (δ 0 )−1 ◦ β(δ(e)) = δ00 ◦ (δ 0 )−1 (δ 0 (e0 )) = δ00 (e0 ) = relStr(e0 )
Thus, φv ◦ (αe0 0 ◦ φc ◦ (αe )−1 )−1 is orientation preserving coarse isometry on Xē0 0 that
coarsely fixes a point. It follows that φv |X ē and αe0 0 ◦ φc ◦ (αe )−1 are coarsely equivalent.
Define χ|lk(v) := (φv )∗ .
0
−1 . Since φ is a
For each edge e00 ∈ lk(v) \ {ē} define φτ (e00 ) := αχ(e
00 ) ◦ φv ◦ (αe00 )
v
0
coarse isometry and αe00 and αχ(e00 ) are coarse similitudes with the same multiplicative
constant, as above, we have that φτ (e00 ) is a coarse isometry.
Suppose v is hanging. The map αe0 0 ◦ φc ◦ (αe )−1 : Xē → Xē0 0 is a coarse isometry,
since attaching maps to hanging vertex spaces are coarse isometries by Lemma 8.3 and
φc is a coarse isometry by the induction hypothesis.
Use condition 3 and Proposition 8.1 to produce a quasi-isometry
φv ∈ QIsom((Xv , Pv , β ◦ δ, ξ · ζ), (Xv0 0 , Pv0 0 , δ 0 , ζ 0 ))
57
that is a coarse isometry along each peripheral subset and that coarsely agrees with
αe0 0 ◦ φc ◦ (αe )−1 on Xē .
Define χ|lk(v) := (φv )∗ .
0
−1 is a coarse isometry,
For each e00 ∈ lk(v) \ {ē} the map φτ (e00 ) := αχ(e
00 ) ◦ φv ◦ (αe00 )
since attaching maps to hanging vertex spaces are coarse isometries by Lemma 8.3, and
φv is a coarse isometry along peripheral sets by construction.
Inductive step for cylindrical vertices Suppose c = ι(e) is cylindrical, χ is defined
on e, φτ (e) is defined, and φc is a coarse isometry such that φc is coarsely equivalent to
0
(αχ(e)
)−1 ◦ φτ (e) ◦ αe . Extend χ to lk(c) \ {e} as in Theorem 6.13.
This completes the induction. The result is χ ∈ Isom((T, δ), (T 0 , δ 0 )) and uniform
quasi-isometries (φv ) satisfying the conditions of Corollary 2.18, so (φv ) is a tree of
quasi-isometries over χ compatible with X and X 0 , as desired.
References
[1] Jason A. Behrstock, Bruce Kleiner, Yair N. Minsky, and Lee Mosher, Geometry and
rigidity of mapping class groups, Geom. Topol. 16 (2012), no. 2, 781–888.
[2] Jason A. Behrstock and Walter D. Neumann, Quasi-isometric classification of graph
manifold groups, Duke Math. J. 141 (2008), no. 2, 217–240.
[3] Jason A. Behrstock and Walter D. Neumann, Quasi-isometric classification of nongeometric 3-manifold groups, J. Reine Angew. Math. 669 (2012), 101–120.
[4] M. Bestvina and M. Feighn, A combination theorem for negatively curved groups, J.
Differential Geom. 35 (1992), no. 1, 85–101.
[5] Kingshook Biswas and Mahan Mj, Pattern rigidity in hyperbolic spaces: duality and
PD subgroups, Groups Geom. Dyn. 6 (2012), no. 1, 97–123.
[6] M. Bonk and O. Schramm, Embeddings of Gromov hyperbolic spaces, Geom. Funct.
Anal. 10 (2000), no. 2, 266–306.
[7] Marc Bourdon and Hervé Pajot, Rigidity of quasi-isometries for some hyperbolic
buildings, Comment. Math. Helv. 75 (2000), no. 4, 701–736.
[8] Marc Bourdon and Hervé Pajot, Cohomologie lp et espaces de Besov, J. Reine
Angew. Math. 558 (2003), 85–108.
[9] Brian H. Bowditch, Cut points and canonical splittings of hyperbolic groups, Acta
Math. 180 (1998), no. 2, 145–186.
[10] Martin R. Bridson and André Haefliger, Metric spaces of non-positive curvature,
Grundlehren der mathematischen Wissenschaften, vol. 319, Springer, Berlin, 1999.
58
[11] Sergei Buyalo and Viktor Schroeder, Elements of asymptotic geometry, EMS Monographs in Mathematics, European Mathematical Society (EMS), Zürich, 2007.
[12] Christopher H. Cashen, Splitting line patterns in free groups, Algebr. Geom. Topol.,
in press, arXiv:1009.2492.
[13] Christopher H. Cashen, Quasi-isometries between tubular groups, Groups Geom.
Dyn. 4 (2010), no. 3, 473–516.
[14] Christopher H. Cashen and Nataša Macura, Line patterns in free groups, Geom.
Topol. 15 (2011), no. 3, 1419–1475.
[15] Pallavi Dani and Anne Thomas, Quasi-isometry classification of certain right-angled
coxeter groups, preprint (2014), arXiv:1402.6224v4.
[16] Martin J. Dunwoody, The accessibility of finitely presented groups, Invent. Math. 81
(1985), no. 3, 449–457.
[17] Martin J. Dunwoody and Michah E. Sageev, JSJ-splittings for finitely presented
groups over slender groups, Invent. Math. 135 (1999), no. 1, 25–44.
[18] Max Forester, On uniqueness of JSJ decompositions of finitely generated groups,
Comment. Math. Helv. 78 (2003), no. 4, 740–751.
[19] Koji Fujiwara and Panos Papasoglu, JSJ-decompositions of finitely presented groups
and complexes of groups, Geom. Funct. Anal. 16 (2006), 70–125.
[20] Mikhael Gromov, Infinite groups as geometric objects, Proceedings of the International Congress of Mathematicians, Vol. 1, 2 (Warsaw, 1983) (Warsaw), PWN, 1984,
pp. 385–392.
[21] Mikhael Gromov, Hyperbolic groups, Essays in group theory, Math. Sci. Res. Inst.
Publ., vol. 8, Springer, New York, 1987, pp. 75–263.
[22] Vincent Guirardel and Gilbert Levitt, JSJ decompositions: definitions, existence,
uniqueness. I: The JSJ deformation space, preprint (2009), arXiv:0911.3173.
[23] Vincent Guirardel and Gilbert Levitt, Trees of cylinders and canonical splittings,
Geom. Topol. 15 (2011), no. 2, 977–1012.
[24] Ilya Kapovich, The combination theorem and quasiconvexity, Internat. J. Algebra
Comput. 11 (2001), no. 2, 185–216.
[25] Michael Kapovich and Bruce Kleiner, Hyperbolic groups with low-dimensional boundary, Ann. Sci. École Norm. Sup. (4) 33 (2000), no. 5, 647–669.
[26] Bruce Kleiner and Bernhard Leeb, Rigidity of quasi-isometries for symmetric spaces
and Euclidean buildings, Inst. Hautes Études Sci. Publ. Math. (1997), no. 86, 115–
197 (1998).
59
[27] Frank Thomson Leighton, Finite common coverings of graphs, J. Combin. Theory
Ser. B 33 (1982), no. 3, 231–238.
[28] William Malone, Topics in geometric group theory, Ph.D. thesis, University of Utah,
Salt Lake City, UT, 2010.
[29] Vladimir Markovic, Quasisymmetric groups, J. Amer. Math. Soc. 19 (2006), no. 3,
673–715.
[30] Alexandre Martin, Non-positively curved complexes of groups and boundaries, Geom.
Topol. 18 (2014), no. 1, 31–102.
[31] Alexandre Martin and Jacek Świątkowski, Infinitely-ended hyperbolic groups with
homeomorphic Gromov boundaries, J. Group Theory 18 (2015), no. 2, 273–289.
[32] Mahan Mj, Pattern rigidity and the Hilbert-Smith conjecture, Geom. Topol. 16
(2012), no. 2, 1205–1246.
[33] Lee Mosher, Michah Sageev, and Kevin Whyte, Quasi-actions on trees II: Finite
depth Bass-Serre trees, Mem. Amer. Math. Soc. 214 (2011), no. 1008, vi+105.
[34] Walter D. Neumann, On Leighton’s graph covering theorem, Groups Geom. Dyn. 4
(2010), no. 4, 863–872.
[35] Pierre Pansu, Métriques de Carnot-Carathéodory et quasiisométries des espaces
symétriques de rang un, Ann. of Math. (2) 129 (1989), no. 1, 1–60.
[36] Panos Papasoglu, Quasi-isometry invariance of group splittings, Ann. of Math. (2)
161 (2005), no. 2, 759–830.
[37] Panos Papasoglu and Kevin Whyte, Quasi-isometries between groups with infinitely
many ends, Comment. Math. Helv. 77 (2002), no. 1, 133–144.
[38] E. Rips and Z. Sela, Structure and rigidity in hyperbolic groups. I, Geom. Funct.
Anal. 4 (1994), no. 3, 337–371.
[39] E. Rips and Z. Sela, Cyclic splittings of finitely presented groups and the canonical
JSJ decomposition, Ann. of Math. (2) 146 (1997), no. 1, 53–109.
[40] Richard Evan Schwartz, Symmetric patterns of geodesics and automorphisms of surface groups, Invent. Math. 128 (1997), no. 1, 177–199.
[41] Jean-Pierre Serre, Trees, Springer Monographs in Mathematics, Springer-Verlag,
Berlin, 2003, Translated from the French original by John Stillwell, Corrected 2nd
printing of the 1980 English translation.
[42] John R. Stallings, On torsion-free groups with infinitely many ends, Ann. of Math.
(2) 88 (1968), 312–334.
60
[43] John R. Stallings, Group theory and three-dimensional manifolds, Yale University
Press, New Haven, Conn., 1971, A James K. Whittemore Lecture in Mathematics
given at Yale University, 1969, Yale Mathematical Monographs, 4.
[44] Pekka Tukia, Quasiconformal extension of quasisymmetric mappings compatible with
a Möbius group, Acta Math. 154 (1985), no. 3-4, 153–193.
[45] Diane M. Vavrichek, The quasi-isometry invariance of commensurizer subgroups,
Groups Geom. Dyn. 7 (2013), no. 1, 205–261.
[46] Xiangdong Xie, Quasi-isometric rigidity of Fuchsian buildings, Topology 45 (2006),
no. 1, 101–169.
[47] Xiangdong Xie, Quasisymmetric maps on the boundary of a negatively curved solvable Lie group, Math. Ann. 353 (2012), no. 3, 727–746.
Fakultät für Mathematik, Universität Wien, Oskar-Morgenstern-Platz 1, 1090 Wien,
Österreich
[email protected]
[email protected]
61
| 4math.GR
|
Neuronal Circuit Policies
Mathias Lechner * 1 Ramin M. Hasani * 1 Radu Grosu 1
arXiv:1803.08554v1 [q-bio.NC] 22 Mar 2018
Abstract
We propose an effective way to create interpretable control agents, by re-purposing the function of a biological neural circuit model, to govern simulated and real world reinforcement learning (RL) test-beds. We model the tap-withdrawal
(TW) neural circuit of the nematode, C. elegans,
a circuit responsible for the worm’s reflexive response to external mechanical touch stimulations,
and learn its synaptic and neuronal parameters as
a policy for controlling basic RL tasks. We also
autonomously park a real rover robot on a predefined trajectory, by deploying such neuronal
circuit policies learned in a simulated environment. For reconfiguration of the purpose of the
TW neural circuit, we adopt a search-based RL
algorithm. We show that our neuronal policies
perform as good as deep neural network policies
with the advantage of realizing interpretable dynamics at the cell level.
1. Introduction
Through natural evolution, the nervous system of the nematode, C. elegans, structured a near optimal wiring diagram
(White et al., 1986). Its stereotypic brain composed of 302
neurons connected through approximately 8000 chemical
and electrical synapses (Chen et al., 2006). C. elegans exhibits distinct behavioral mechanisms to process complex
chemical stimulations (Bargmann, 2006), avoid osmotic regions (Culotti & Russell, 1978), sleep (Nichols et al., 2017),
show adaptive behavior (Ardiel & Rankin, 2010), perform
mechanosensation (Chalfie et al., 1985b), and to control
muscles (Wen et al., 2012).
The functions of many neural circuits within its brain have
been identified (Wicks & Rankin, 1995; Chalfie et al.,
1985a; Li et al., 2012; Nichols et al., 2017). In particular, a neural circuit which is responsible for inducing a
forward/backward locomotion reflex when the worm is
*
Equal contribution 1 Cyber Physical Systems, TU Wien,
Austria.
Correspondence to: Mathias Lechner <[email protected]>, Ramin Hasani <[email protected]>.
mechanically exposed to touch stimulus on its body, has
been well-characterized (Chalfie et al., 1985a). The circuit
is called tap-withdrawal (TW) and it comprises 9 neuron
classes which are wired together by means of chemical and
electrical synapses. Synaptic polarities (either being excitatory or inhibitory) of the circuit have then been predicted,
suggesting that the circuit realizes a competitive behavior between forward and backward reflexes, in presence of touch
stimulations (Wicks & Rankin, 1995; Wicks et al., 1996).
Behavior of the tap-withdrawal (TW) reflexive response is
substantially similar to the control agent’s reaction in some
standard control settings such as the impulse response of
a controller operating on an Inverted Pendulum (Widrow,
1964; Doya, 2000; Russell & Norvig, 2010), a controller
acting on driving an under-powered car, to go up on a steep
hill, known as the Mountain Car (Moore, 1990; Singh &
Sutton, 1996), and a controller acting on the navigation of a
rover robot that plans to go from point A to B, on a planned
trajectory, with two control commands of angular and linear
velocity.
We intend to take advantage of the similarity and reconfigure the synaptic and neuronal parameters of a deterministic
dynamic model of the TW neural circuit, in each of the
mentioned control settings. We use publicly available reinforcement learning toolkits, to evaluate the performance
of our neuronal circuit policies. The environments include
the inverted pendulum (Schulman et al., 2017), the continuous mountain car of OpenAI Gym1 and rllab 2 , and the
Cart-pole of rllab (Duan et al., 2016). In a real robotic setting, We also determine a control task for a rover robot to
park autonomously in a specific parking spot, by a learned
TW neuronal policy. For all three control challenges, we
preserve the near-optimal wiring structure of the TW circuit
and adopt a search-based reinforcement learning (RL) algorithm for synaptic parametrization of the network. The
approach is named as neuronal circuit policies.
Our principle contribution in this work is to demonstrate the
performance of a compact neuronal circuit model from the
brain of the C. elegans worm, as an interpretable continuous
time recurrent neural network, in standard control and RL
settings. In our experimental evaluations, we demonstrate
1
2
https://github.com/openai/gym
https://github.com/rllab/rllab
Neuronal Circuit Policies
that our control agent can achieve the performance of the
conventional and the state-of-the-art artificial intelligence
(AI) control agents, by solving five RL tasks. We show how
a learned neuronal circuit policy in a simulated environment,
can be transferred to a real robotic environment. We also
demonstrate that the function of the neurons in a learned
neuronal network is interpretable.
2. Preliminaries
In this section, we first briefly describe the structure and
dynamics of the tap-withdrawal neural circuit. We then
introduce the mathematical neuron and synapse models utilized to build up the model of the circuit.
2.1. Tap-Withdrawal Neural Circuit Revisit
A mechanically exposed stimulus (i.e. tap) to the petri dish
in which the worm inhabits, results in the animal’s reflexive
response in the form of a forward or backward movement.
This response has been named as the tap-withdrawal reflex, and the circuit identified to underly such behavior is
known as the tap-withdrawal (TW) neural circuit (Rankin
et al., 1990). The circuit is shown in Figure 1. It is composed of four sensory neurons, PVD and PLM (posterior
touch sensors), AVM and ALM (anterior touch sensors),
four interneuron classes (AVD, PVC, AVA and AVB), and
two subgroup of motor neurons which are abstracted as a
forward locomotory neurons, FWD, and backward locomotory neurons, REV. Neurons recurrently synapse into each
other with excitatory and inhibitory synaptic links. It has
been shown that sensory neurons of the TW circuit get acA
B
tivated as a result of an input tap, and transfer the stimulus
through the modulatory interneurons PVC and AVD to the
command neurons AVA and AVB (Wicks et al., 1996). The
TW reflex is then modulated by a competition between these
two command neurons, either resulting in a forward scape
p ))
p ))
response (AVB’s activation
(( Tadominates AVA’s) or a reversal
(( Ta
scape response. Throughout the paper, we illustrate how
such recurrent neuronal network can be deployed in standard RL settings. We first sketch how we modeled neurons
and synapses to build up the TW circuit.
brane equation (Koch & Segev, 1998):
Cm
n
X
dvi
(i)
= GLeak VLeak − vi (t) +
Iin ,
dt
i=1
where Cm , GLeak and VLeak are parameters of the neuron
(i)
and Iin , stands for the external currents to the cell. We
adopted Eq. (1) to govern interneurons’ dynamics.
For interacting with the environment, We introduced sensory and motor neuron models, separately. A sensory component consists of two neurons Sp , Sn and a measurable
dynamic system variable, x. Sp gets activated when x has a
positive value, whereas Sn fires when x is negative. Mathematically, the potential of the neurons Sp , and Sn , as a
function of x, can be expressed as
if x ≤ 0
−70mV
50mV
Sp (x) := −70mV + xmax x if 0 < x ≤ xmax (2)
−20mV
if x > xmax
if x ≥ 0
−70mV
50mV
Sn (x) := −70mV + xmin x if 0 > x ≥ xmin (3)
−20mV
if x < xmin .
This maps the region [xmin , xmax ] of system variable x, to a
membrane potential range of [−70mV, −20mV ]. Note that
the potential range is selected to be close to the biophysics
of the nerve cells, where the resting potential is usually set
around -70 mV and a neuron can be considered to be active
when it has a potential around -20 mV (Hasani et al., 2017).
C
REV
PVD
PLM
AVA
AVD
PVC
AVB
AVM
ALM
DVA
2.2. Neuron Model
Most of the neurons in C. elegans are observed to exhibit
electrotonic dynamics (Kato et al., 2015), meaning that elecResponse
Response
tric charges spread passively inside a neuron creating graded
potentials. This implies that the neurons are non-spiking.
Dynamics of the neurons’ membrane potential therefore,
were modeled by the well-known, deterministic ordinary
differential equation (ODE), the single-compartment mem-
(1)
FWD
Legend:
Sensory neuron
Excitatory synapse
Inter neuron
Inhitory synapse
Motor neuron
Gap Junction
Figure 1. Tap-Withdrawal neural circuit schematic.
Neuronal Circuit Policies
Similar to sensory neurons, a motor component is composed of two neurons Mn , Mp and a controllable motor
variable y. Values of y is computed by y := yp + yn and
if Mp > −20mV
ymax ,
p +70mV )
yp (Mp ) := ymax (M
,
if Mp ∈ [−70, −20]mV
50mV
0,
if Mp < −70mV
(4)
if Mn > −20mV
ymin ,
n +70mV )
yn (Mn ) := ymin (M
,
if Mn ∈ [−70, −20]mV
50mV
0,
if Mn < −70mV
(5)
This maps the neuron potentials Mn and Mp , to the range
[ymin , ymax ]. FWD and REV motor classes in Figure 1, are
modeled in this fashion.
Chemical synapses are points at which two neurons trade
information by the release of neurotransmitters. The chemical synaptic current depends on a non-linear component
standing for their conductance strength, which is a function
of the presynaptic neurons’ potential, Vpre , and have a maximum weight of w,(standing for the maximum conductance
of the synapse) as, (Koch & Segev, 1998):
(6)
Moreover, the synaptic current linearly depends on the postsynaptic neuron’s membrane potential, Vpost , and therefore
can be formulated as, (Koch & Segev, 1998):
Is = g(Vpre )(E − Vpost ),
Input: A stochastic objective indicator f ,
a starting parameter θ
Input: Optimized parameter θ
fθ ← f (θ)
for k ← 1 to maximum iterations do
θ0 ← θ + rand()
fθ0 ← f (θ0 )
if fθ0 < fθ then
Set θ ← θ0
fθ ← fθ0
i←0
end if
i←i+1
if i > N then
fθ ← f (θ)
end if
end for
return θ
concrete discussion on the model implementation, and the
choice of parameters.
2.3. Synapse Model
g(Vpre ) = w/1 + eσ(Vpre +µ)
Algorithm 1 Random Search + Objective Indicator
(7)
where by varying E, the reversal potential of the synapse, it
realizes inhibitory or excitatory connection to their postsynaptic neurons.
An electrical synapse (gap-junction), which is a physical
junction between two neurons, was modeled by a constant
conductance, ω̂, where based on the Ohm’s law their bidirectional current between neurons j and i, can be computed
as
Iˆi,j = ω̂ vj (t) − vi (t) .
(8)
For simulating neural networks composed of such dynamic
models, we adopted a implicit numerical solver (Press et al.,
2007). Formally, we realized the ODE models in a hybrid
fashion which combine both implicit and explicit Euler’s
method. See supplementary materials, Section 2, for a
Note that one objective of the solver is to be employed
in a real-time control system. For reducing the complexity therefore, our method realizes a fixed-step solver. The
solver’s complexity for each time step ∆t is O(|# neurons|+
|# synapses|). The solver is implemented in C++ in which
we construct the TW circuit for performing specific control
tasks. We now need to formalize a learning platform to tune
the parameters of the circuit for the desired control problem.
3. Search-based Reinforcement Learning
In this section we formulate an RL setting for training the
parameters of the neural circuit to perform the balancing
of the inverted pendulum, control the mountain car, and to
park the rover robot.
The behavior of a neural circuit can be expressed as a policy
πθ (oi , si ) 7→ hai+1 , si+1 i, that maps an observation oi , and
an internal state si of the circuit, to an action ai+1 , and a
new internal state si+1 . This policy acts upon a possible
stochastic environment Env(ai+1 ), that provides an observation oi+1 , and a reward, ri+1 . The stochastic return is
PT
given by R(θ) := t=1 rt .
Objective of the Reinforcement
learning is to find a θ that
maximizes E R(θ) .
Approaches to find such optimal θ, can be categorized into
two major groups, based on how randomness is formulated
for the environment explorations (Schulman et al., 2015;
Salimans et al., 2017): I-Gradient-based and II-search-based
methods. The principle of gradient-based RL is to perform
random sampling for generating ai , and use the action’s
influence on the return value, to improve θ (Williams, 1992).
Search-based methods directly randomly sample parame-
Neuronal Circuit Policies
ters and estimate how good these random parameters are,
to update θ (Salimans et al., 2017; Szita & Lörincz, 2006).
Here, we adopted such search-based optimization which can
be applied in any control setting, regardless of the internal
structure of the policy, (black-box optimization). One major obstacle for search-based optimization is the stochastic
nature of the RL environment, which makes the objective
function, f (θ) = E(Rθ ), a probability distribution and the
underlying optimization problem an instance of Stochastic Optimization (Spall, 2003). Samples of the objective
distribution can be generated by running rollouts with πθ
on the environment. A possible solution to overcome a
high variance when estimating E(Rθ ), is to rely on a very
large number of samples (Salimans et al., 2017; Duan et al.,
2016), which nonetheless comes with high computational
costs. Our approach is based on a Random Search (RS)
(Rastrigin, 1963) optimization, combined with an Objective
Estimate (OE) as an objective function f : θ 7→ R+ .
The OE generates N rollouts with πθ on the environment
and computes an estimate of E(Rθ ) based on a filtering
mechanism on these N samples. We compared two filtering
strategies in this context; I-Taking the average of the N
samples, and II: taking the average of the worst k samples
out of N samples. The first strategy is equivalent to the
Sample Mean estimator, whereas the second strategy aims
to avoid getting mislead by outlying high samples of E(Rθ ).
Our objective for realizing the second strategy was the fact
that a suitable parameter θ makes the policy πθ , control the
environment in a decent way even in difficult situations (i.e.
rollouts with the lowest return).
In both strategies, to ensure that a single outlying high OE
for some θ does not hinder the algorithm to find a legitimately good parameter, the OE is reevaluated after it is
utilized M times, within the algorithm. The full algorithm
is outlined in Algorithm 1.
4. Experiments
The goal of our experiments is to answer the following
questions: 1) How would a neural circuit policy perform
in a basic standard control setting? 2) When possible, how
would the performance of our learned circuit compare to the
other methods? 3) Can we transfer a policy from a simulated
environment to a real environment? 4) Can we interpret the
behavior of the neural circuit policies?
We prepared five environmental settings for the TW sensory/motor neurons and then deployed our RL algorithm to
learn the parameters of the TW circuit to realize the given
control objective. Environments include I) Inverted pendulum of Roboschool (Schulman et al., 2017), II) Mountain
car of OpenAI Gym, III) Mountain car of rllab, IV) cart-pole
balancing of rllab and V) Parking a real rover robot from
A
- !̇
-"̇
+Control
- ! +!
B
+!̇
+"̇
-Control
Sensory Inputs
- ! +! +" -"
Tap-withdrawal
neural circuit
- Control + Control
Motor outputs
Figure 2. Inverted Pendulum setting for the TW circuit. A) observations and control variables in the inverted pendulum balance
problem. B) observation and control signals mapping of the pendulum to the TW circuit.
a learned policy in a simulated environment. The code is
available online 1 .
The major constraint that prevents the TW neural circuit
(shown in Figure 1) to be tested on arbitrary tasks, is its
limited number of sensory and motor neurons. As the TW
circuit allows us to incorporate only two input and one output variables, we selected tasks that can be solved with only
two observations. We chose environments from different
toolkits to evaluate our neural circuit policies on a variety of
dynamics, interactions and reward settings. For instance, the
two mountain car suites of OpenAI Gym and rllab realize
different positive rewards functions as explained in section
4.3.
4.1. Inverted pendulum with the TW neural circuit
The TW neural circuit shown in Figure 1, contains four
sensory neurons. It therefore, allows us to map the circuit
to only two input variables. Note that as we discussed in
section 2.2, a sensory component expressed in the form of
Eq. (2) and Eq. (3), consists of two neurons for incorporating positive and negative values of the dynamic system
variable. The inverted pendulum environment provides four
observation variables as shown in Figure 2A. The position
of the cart x, together with its velocity ẋ, the angle of the
pendulum ϕ2 along with its angular velocity ϕ̇.
Since the main objective of the controller is to balance the
pendulum in an upward position and make the car stay
within the horizontal borders, we fed ϕ, and x, as the inputs
to the sensors of the TW circuit, as illustrated in Figure 2B.
Control commands to the pendulum were originated by the
abstract motor neuron classes, FWD and REV components.
The activity of these components are governed by Eq. (4)
1
Code for all experiments is available online at:
https://github.com/mlech26l/neuronal_
circuit_policies
2
Remark: The environment further splits ϕ into sin(ϕ) and
cos(ϕ) to avoid the 2π → 0 discontinuity
Neuronal Circuit Policies
Table 1. Mapping the environmental variables to the sensory and motor neurons of the TW circuit, in different experiments
Experiment
Environment variable
Type
Positive neuron Negative neuron
ϕ
Sensor (pendulum angle)
PLM
AVM
Inverted Pendulum
x
Sensor (cart position)
ALM
PVD
a (Control)
Motor (move right/left)
FWD
REV
x
Sensor (car position)
PLM
AVM
ẋ
Sensor (car’s linear velocity)
ALM
PVD
Mountain Car
(OpenAI Gym)
a (Control)
Motor (move right/left)
FWD
REV
x
Sensor (car position)
PLM
AVM
Mountain Car
ẋ
Sensor (car’s linear velocity)
ALM
PVD
(rllab)
a (Control)
Motor (move right/left)
FWD
REV
ϕ
Sensor (pole angle)
PLM
AVM
ϕ̇
Sensor (pole angular velocity)
ALM
PVD
Cart-Pole
a (Control)
Motor (move right/left)
FWD
REV
x
Sensor (estimated x position)
PVD
y
Sensor (estimated y position)
PLM
Parking of a Rover
s
Sensor(start signal)
AVM
θ
Sensor (estimated angular pose)
ALM
a1 (Control)
Motor (angular velocity)
FWD
REV
a2 (Control)
Motor (linear velocity)
FWD/REV
We set up the search-based RL algorithm to
optimize the neurons and synapses parameters
ω, ω̂, σ, Cm , VLeak and GLeak in the Roboschool
RoboschoolInvertedPendulum-v1 environment
with an slight modification (Schulman et al., 2017) in
the reward calculation. It is desirable for the cart to
stay in the center of the horizontal space. Therefore,
we incorporated an additional axillary reward; if the
pendulum is in the up-right position and in the center, an
additional 20% reward is collected. This bonus linearly
decreased. For instance the bonus reward is 10% if the
cart is halfway to the end. Right at the borders the bonus
reward vanishes. A video of different stages of the learned
neuronal circuit policy for the inverted pendulum can be
viewed at https://youtu.be/iOHeQ7DhQv8
Note that we were also able the train the TW circuit to solve
original version of the inverted pendulum task when feeding
ϕ, and ϕ̇ into the circuit. However, we observed a slow drift
of the pendulum toward one of the two ends in final policy,
which we wished to eliminate.
Similar to configuration of the inverted pendulum, we set the
observational and motor variables for the tap withdrawal, as
illustrated in Figure 3B. The circuit was then learned by the
search-based RL algorithm. A video illustrating the control
of the car at various episodes during the learning process can
be viewed at https://youtu.be/lMrP1sXp3jk.
4.3. The mountain car (rllab) control with the TW
neural circuit
The environmental observations and motor actions for the
mountain car are the same in rllab and OpenAI Gym. Therefore, we set up the TW circuit the same way we did for the
mountain car in the Gym.
The major difference of the two environments are in the
way the reward is computed. The environment of rllab has
a graded continuous reward which is directly associated
with the position of the car, whereas in the OpenAI Gym
implementation, reward is sparse and gets allocated only
once the car reaches a certain altitude. Furthermore, in both
A
B
+!̇
4.2. The mountain car (OpenAI Gym) control with the
TW neural circuit
+C
on
tro
l
In this experiment we trained the TW circuit to drive the car
shown in Figure 3A uphill to the right-hand side, by generating gravitational momentum. The observation variables are
the car’s position (on the horizontal axis, x) together with
its linear velocity. The control signal applies force to the car
to move it to the right- and left-hand side, periodically, to
finally bring the car up on the hill.
-!̇
-C
on
tro
l
and Eq. (5), respectively, and represented in Figure 2B,
graphically.
0
!
Sensory Inputs
-! +! -!̇ +!̇
Tap-withdrawal
neural circuit
- Control + Control
Motor outputs
Figure 3. The Mountain car setup. A) observations and control
variables in the mountain car environment. B) mapping of the
observation and control signals to TW circuit.
Neuronal Circuit Policies
frameworks, reward is subjected to a penalty as follows;
in rllab the penalty is constant, whereas in the Gym the
amount of the penalty varies depending on the amplitude
of the performed action. Consequently, energy efficient
solutions achieve a higher score, in the Gym environment,
in contrast to the rllab version, where the highest scoring
solutions bring the car uphill as fast as possible.
4.4. Cart-pole (rllab) control with the TW circuit
The Cart-pole environmental setting is substantially similar
to that of the inverted pendulum. In contrast to the inverted
pendulum experiment, here we mapped the observation
variables, pole angle, ϕ and the pole’s angular velocity ϕ̇
to the sensor. As a result, the controller is not aware of
the position of the cart, x, and whether the boundary of the
movable space is nearby or not. An intuitive solution for
handling more control variables would be to add sensory
neurons to the TW circuit. However, in the present work
we intended to maintain the structure of the TW circuit
constant, and test its capabilities in control scenarios with
the resulting partial observability. Environmental variables
for the cart-pole suite were mapped to the circuit elements
as denoted in Table 1.
4.5. Autonomous parking of the rover with the TW
neural circuit
In this experiment, we generalized our TW neuronal circuit
policy to a real-world control setting. We let the TW circuit
learn to park a rover robot on a determined spot, given a set
of checkpoints which form a trajectory, in a deterministic
simulated environment. We then deployed the learned policy
on a mobile robot in a real environment shown in Figure
4A. The key objective here was to show the capability of the
method to perform well in a transformation from a simulated
environment to a real setting. For doing this, we developed
a custom deterministic simulated RL environment1 .
The rover robot provides four observational variables (Starting signal, position of the rover, x, y and its angular pose, θ),
together with two motor actions (linear and angular velocity,
v and w). We mapped all four observatory variables, as
illustrated in Figure 4B, to the sensors of the TW. Note that
here the geometric reference of the surrounding space is set
at the initial position of the robot. Therefore, observation
variables are only positive.
We mapped the linear velocity (which is a positive variable
throughout the parking task) to one motor neuron and the
same variable to another motor neuron. We determined two
motor neurons for the positive and negative angular velocity.
The mapping details are provided in Table 1. This configu1
https://github.com/mlech26l/neuronal_
circuit_policies
A
B
+𝑦
Sensory Inputs
+𝑥 +𝑦 𝜃
Start
I
+𝑥
IV
II
V
Tap-withdrawal
neural circuit
VI
+𝑤 -𝑤
+𝑣
Motor outputs
𝜃
III
Figure 4. Parking setup. A) Environmental setting for the parking
task. B) Mapping of the observations and control commands from
the environment to the TW circuit.
ration implies that the command neuron, AVA, controls two
motor neurons responsible for the turn-right and forward
motion-primitives, and AVB to control the turn-left and
forward motor neurons. Therefore, the TW circuit is able
to govern the robot’s locomotion in three different directions, forward, left- and right-turns, which are sufficient to
perform a parking trajectory. Furthermore, each command
neuron is able to move the rover forward and turn it to the
left or right.
4.5.1. RL SETTING FOR THE PARKING TASK
A set of checkpoints on a pre-defined parking trajectory
were determined in the custom simulated environment. For
every checkpoint, a deadline was assigned. At each deadline
a reward was given as the negative distance of the rover
to the current checkpoint. The checkpoints are placed to
resemble a real parking trajectory composed of a sequence
of motion primitives: Forward, turn left, forward, turn right,
forward and stop. We then learned the TW circuit, by the
RL algorithm. The learned policy has been mounted on
a Pioneer AT-3 mobile robot and performed a reasonable
parking performance. The Video of the performance of
the TW neuronal circuit policy on the parking task can be
viewed at https://youtu.be/Vwydc2ez9Wc.
5. Experimental Evaluation
In this section, we thoroughly assess the results of our experimentation. We qualitatively and quantitatively explain
the performance of our neuronal circuit policies. We then
benchmark our results where possible, with the existing
methods and describe the main attributes of our methodology. We finally illustrate how the activity of the learned
neuronal circuits can be interpretable.
5.1. Performance
The training algorithm was able to solve all five tasks, after
a reasonable number of iterations as shown in Figure 5. All
learning curves reached a stable state after the given number
of iterations.
Neuronal Circuit Policies
A
B
C
D
E
F
Figure 5. Performance as a function of the number of iterations. A) Inverted pendulum B) Mountain car (OpenAI Gym) C) Mountain car
(rllab) D) Cart-pole (rllab) E) parking trajectory of the rover robot F) Influence of filter size on training performance
Jumps in the learning curves of the mountain car in OpenAI
Gym (Figure 5B) are the consequence of the sparse reward.
The inverted pendulum of the Roboschool and the cartpole of rllab, realized substantially similar learning curves
(Figure 5A and 5D) . This indicates the robustness of the
policy and the learning algorithm to different frameworks for
a given control task. For the deterministic parking trajectory,
the learning curve approaches a stable state, exponentially
fast.
The final return values for the basic standard RL tasks (provided in Table 2), matches that of conventional policies
(Heidrich-Meisner & Igel, 2008), and the state-of-the-art
deep neural network policies learned by many RL algorithms (de Froissard de Broissia & Sigaud, 2016; Schulman
et al., 2017; Berkenkamp et al., 2017). Table 2, also depicts the average return over the entire training iterations.
The average return is not significant compared to the other
algorithms applied to the artificial neural network policies
(Duan et al., 2016), due to the smaller number of training
iterations. Training curves in our case however, reaches an
stable state reasonably fast in all tasks even with a fewer
number of epochs.
To take advantage of parallel hardware resources and to
further increase the performance of our training algorithm,
we deployed an ensemble of TW agents which were trained
independently in parallel. Depending on the difficulty of the
Table 2. Training results. Return value ± standard deviation. Performance of the learned neuronal circuit policies in terms of final
return and average return over all training iterations.
Environment
Final return
Average return
Inverted pendulum 1168.5 ± 21.7 394.1 ± 80.9
Mountain car (Gym) 91.5 ± 6.6
28.1 ± 9.6
Mountain car (rllab) −61.3 ± 1.4 −196.3 ± 78.0
Cart-pole balancing 3716.1 ± 240.1 1230.3 ± 272.2
Parking
−0.49 ± 0.63 −6.13 ± 1.41
task, between 100% (e.g. Roboschool’s inverted pendulum)
and 25% (e.g. in Gym’s Mountaincar) of the ensembles
were able to solve the task within the reported time frame.
The values reported in table 2, and Fig5, correspond to the
successful cases of the ensemble.
5.2. Effect of filter size on the training performance
Fig 2F shows how the choice of the objective-estimate, affects the training performance. The objective-estimate is
defined as the mean of the k (=filter size) returns out of 20
rollouts. When k = 20, the estimation is equal to the sample
mean. We tested two environments with different reward
settings: The mean return of Mountaincar (OpenAI Gym)
after 50,000 training iterations to represent a sparse reward
scenario and the mean return of our modified inverted pendulum task after 15,000 training iterations as an example of
a gradual reward setting. The results denote that in a sparse
reward setting, filtering of the high-outliers tend to degrade
the training performance while in a gradual reward setup,
filtering of the outliers improves the performance. The reported values in Fig2F, correspond to the average, when
running this experiment 10 times. Further discussions about
this can be found in the supplementary materials Section 4.
5.3. Interpretability of the neuronal circuit policies
Interpretability of neural network policies is still a challenge to be solved (Heess et al., 2016; Bacon et al., 2017).
Successful attempts on the development of interpretable
representation learning have been provided where the latent
space of the learned policies demonstrate interpretable skills
(Chen et al., 2016; Florensa et al., 2017). A neuronal circuit
policy has the distinct attribute of being interpretable at the
cell level. Here, we show how the activity of the learned TW
neuronal policies, in different domains is auditable. Figure
6A to 6C represent the normalized membrane potential of
neurons in learned policies for the inverted pendulum, the
Neuronal Circuit Policies
A
B
C
Figure 6. Neuronal activity of the Learned neuronal policies. A) The inverted pendulum circuit B) The mountain car (OpenAI Gym)
circuit C) The parking circuit. Individual neuron’s resting potential, Vleak , is mapped to 0, neuron’s maximum potential is mapped to 1
and neuron’s minimum potential is mapped to -1.
mountain car and the parking task. We describe the global
neuronal dynamics in these scenarios.
Inverted Pendulum - Activity of the learned Tapwithdrawal’s neurons in a successful episode of the inverted
pendulum control, is shown in Figure 6A. The learned circuit surprisingly realized a competitive behavior between
two sub-circuits within the network, similar to the reflexive
behavior observed in the worm (Wicks et al., 1996). Neurons AVM, AVD, AVA, and REV control the pendulum not
to fall on the left side, whereas a circuit composed of PLM,
PVC, AVB and FWD, controls the other side of the balance.
The antagonistic behavior between the command neurons
AVA and AVB balances the pendulum in the middle. Note
that DVA neuron acts as a mediator which couples the kinetics of the two sub-circuits. Note that Neurons’ dynamics
are realized with a variety of time-constants during the balancing control episodes. For instance PVC modulates fast
undulations while the motor neurons work with a slower
dynamic.
Mountain Car - As illustrated in Figure 6B, a gradual increase in the amplitude of the overall periodic dynamic of
the neurons is observed due to the alternation of the direction of movement to bring the car uphill. Sensory neurons
linearly transform the environmental observations to the
global activity of the system, forming a phase-shifted highly
synchronized behavior. In every episode, by the rising of
PDV (higher negative velocity) or PLM (be at a positive x),
all neurons approach their resting potential. This feedback
mechanism which prevents unstable behavior, originated
from inhibition of PVC and AVD by the ALM sensory neuron. At every period in which the car reaches the maximum
position on the left-hand side, a circuit composed of AVM,
AVD, AVB and FWD applies a force-pulse which pushes
the car to get closer to the target. AVA and AVB retained
their objective as in the TW actual circuit, as the command
neurons which enforce the network’s decision to the motor neurons REV and FWF. However their activity is not
fully antagonistic in this learned network. This is where the
competition "A more active command neuron, gives rise to
a more active downstream motor neuron, and as a results
winning the competition", is still present.
Parking of the rover - Figure 6C shows the activity of the
learned TW policy on the parking task. AVM receives the
starting signal and accordingly, a left turn together with
moving forward are initiated by the motor neuron FWD and
LFT. This is governed by the command neuron AVB. The
rover continues moving forward and initializes a right turn
by the motor neurons FWD and RGT. This is controlled by
AVA. AVD learned to control the turning-phases of the rover
by moderating its state, (a higher potential during right turns
and a lower membrane state during left turns). PVC and
DVA function as the pre-command neurons which incorporate the sensory and the network inputs, into a readable
action for the command neuron AVB.
6. Conclusions
In this work, we showed that a neuronal circuit policy can be
adopted to function as a controller for standard control tasks
expressing similar characteristics to the original purpose of
the circuit. We illustrated the performance of such policies
learned by a search-based RL algorithm, in standard basic
RL domains. We also generalized the use of such policies in
a real-domain robot control. More importantly, for various
domains we showed that our learned policies developed
interpretable skills at the neuron level.
Our neuronal policies are limited to the domains in which
the sensory observations and motor actions are as many
as the available sensory and motor neurons of the neural
circuit. Implementation of larger neural circuits to build
interpretable controllers for tasks with higher degrees of
freedom will be the focus of our continued effort. Moreover,
a policy gradient algorithm may significantly enhance the
performance of our policies. We open-sourced our policies, to encourage other researchers to further explore the
attributes of neuronal circuit policies and apply them to
other control and reinforcement learning domains.
Neuronal Circuit Policies
Acknowledgements
Authors would like to thank Jean V. De Carvalho for providing constructive feedbacks on the manuscript. This work
was supported with computation resources by Microsoft
Azure via the Microsoft Azure for Research Award program.
References
Ardiel, Evan L and Rankin, Catharine H. An elegant mind:
learning and memory in caenorhabditis elegans. Learning
& memory, 17(4):191–201, 2010.
Bacon, Pierre-Luc, Harb, Jean, and Precup, Doina. The
option-critic architecture. In AAAI, pp. 1726–1734, 2017.
Bargmann, Cornelia I. Chemosensation in c. elegans. WormBook, pp. 1–29, 2006.
Berkenkamp, Felix, Turchetta, Matteo, Schoellig, Angela,
and Krause, Andreas. Safe model-based reinforcement
learning with stability guarantees. In Advances in Neural
Information Processing Systems 30, pp. 908–919. Curran
Associates, Inc., 2017.
Chalfie, M, Sulston, JE, White, JG, Southgate, E, Thomson,
JN, and Brenner, S. The neural circuit for touch sensitivity
in Caenorhabditis elegans. Journal of Neuroscience, 5
(4):956–964, 1985a.
Chalfie, Martin, Sulston, John E, White, JOHN G, Southgate, Eileen, Thomson, J Nicol, and Brenner, Sydney.
The neural circuit for touch sensitivity in caenorhabditis
elegans. Journal of Neuroscience, 5(4):956–964, 1985b.
Chen, Beth L., Hall, David H., and Chklovskii, Dmitri B.
Wiring optimization can relate neuronal structure and
function. Proceedings of the National Academy of Sciences of the United States of America, 103(12):4723–
4728, 2006.
Chen, Xi, Duan, Yan, Houthooft, Rein, Schulman, John,
Sutskever, Ilya, and Abbeel, Pieter. Infogan: Interpretable
representation learning by information maximizing generative adversarial nets. In Advances in Neural Information
Processing Systems, pp. 2172–2180, 2016.
Culotti, Joseph G and Russell, Richard L. Osmotic avoidance defective mutants of the nematode caenorhabditis
elegans. Genetics, 90(2):243–256, 1978.
de Froissard de Broissia, Arnaud and Sigaud, Olivier. Actorcritic versus direct policy search: a comparison based on
sample complexity. CoRR, abs/1606.09152, 2016.
Doya, Kenji. Reinforcement learning in continuous time
and space. Neural computation, 12(1):219–245, 2000.
Duan, Yan, Chen, Xi, Houthooft, Rein, Schulman, John, and
Abbeel, Pieter. Benchmarking deep reinforcement learning for continuous control. In International Conference
on Machine Learning, pp. 1329–1338, 2016.
Florensa, Carlos, Duan, Yan, and Abbeel, Pieter. Stochastic
neural networks for hierarchical reinforcement learning.
arXiv preprint arXiv:1704.03012, 2017.
Hasani, Ramin M, Beneder, Victoria, Fuchs, Magdalena,
Lung, David, and Grosu, Radu. Sim-ce: An advanced
simulink platform for studying the brain of caenorhabditis
elegans. arXiv preprint arXiv:1703.06270, 2017.
Heess, Nicolas, Wayne, Greg, Tassa, Yuval, Lillicrap, Timothy, Riedmiller, Martin, and Silver, David. Learning
and transfer of modulated locomotor controllers. arXiv
preprint arXiv:1610.05182, 2016.
Heidrich-Meisner, Verena and Igel, Christian. Variable
metric reinforcement learning methods applied to the
noisy mountain car problem. In European Workshop on
Reinforcement Learning, pp. 136–150. Springer, 2008.
Kato, Saul, Kaplan, Harris S., Schrödel, Tina, Skora, Susanne, Lindsay, Theodore H., Yemini, Eviatar, Lockery,
Shawn, and Zimmer, Manuel. Global brain dynamics
embed the motor command sequence of Caenorhabditis
elegans. Cell, 163:656–669, October 2015.
Koch, Christof and Segev, Koch. Methods in Neuronal
Modeling - From Ions to Networks. MIT press, second
edition, 6 1998.
Li, Zhaoyu, Li, Yidong, Yi, Yalan, Huang, Wenming, Yang,
Song, Niu, Weipin, Zhang, Li, Xu, Zijing, Qu, Anlian,
Wu, Zhengxing, and Xu, Tao. Dissecting a central flipflop circuit that integrates contradictory sensory cues in
C. elegans feeding regulation. 3:776 EP –, Apr 2012.
Moore, Andrew William. Efficient memory-based learning
for robot control. 1990.
Nichols, Annika LA, Eichler, Tomáš, Latham, Richard, and
Zimmer, Manuel. A global brain state underlies c. elegans
sleep behavior. Science, 356(6344):eaam6851, 2017.
Press, William H., Teukolsky, Saul A., Vetterling,
William T., and Flannery, Brian P. Numerical Recipes
3rd Edition: The Art of Scientific Computing. Cambridge
University Press, New York, NY, USA, 3 edition, 2007.
Rankin, Catherine H, Beck, Christine DO, and Chiba,
Catherine M. Caenorhabditis elegans: a new model system for the study of learning and memory. Behavioural
brain research, 37(1):89–92, 1990.
Neuronal Circuit Policies
Rastrigin, L. A. About convergence of random search
method in extremal control of multi-parameter systems.
Avtomat. i Telemekh., 24:1467–1473, 1963.
Russell, Stuart J. and Norvig, Peter. Artificial Intelligence:
A Modern Approach. Pearson Education, 3 edition, 2010.
Salimans, Tim, Ho, Jonathan, Chen, Xi, and Sutskever,
Ilya. Evolution strategies as a scalable alternative to
reinforcement learning. 2017.
Schulman, John, Levine, Sergey, Moritz, Philipp, Jordan,
Michael I., and Abbeel, Pieter. Trust region policy optimization. CoRR, abs/1502.05477, 2015.
Schulman, John, Wolski, Filip, Dhariwal, Prafulla, Radford,
Alec, and Klimov, Oleg. Proximal policy optimization
algorithms. arXiv preprint arXiv:1707.06347, 2017.
Singh, Satinder P and Sutton, Richard S. Reinforcement
learning with replacing eligibility traces. Recent Advances in Reinforcement Learning, pp. 123–158, 1996.
Spall, James C. Introduction to Stochastic Search and Optimization. John Wiley & Sons, Inc., New York, NY, USA,
1 edition, 2003.
Szita, I. and Lörincz, A. Learning tetris using the noisy
cross-entropy method. Neural Computation, 18(12):2936–
2941, 2006. ISSN 0899-7667.
Wen, Quan, Po, Michelle D, Hulme, Elizabeth, Chen, Sway,
Liu, Xinyu, Kwok, Sen Wai, Gershow, Marc, Leifer, Andrew M, Butler, Victoria, Fang-Yen, Christopher, et al.
Proprioceptive coupling within motor neurons drives c.
elegans forward locomotion. Neuron, 76(4):750–761,
2012.
White, J. G., Southgate, E., Thomson, J. N., and Brenner,
S. The structure of the nervous system of the nematode
Caenorhabditis elegans. Philosophical Transactions of
the Royal Society of London B: Biological Sciences, 314
(1165):1–340, 1986.
Wicks, SR and Rankin, CH. Integration of mechanosensory
stimuli in Caenorhabditis elegans. Journal of Neuroscience, 15(3):2434–2444, 1995.
Wicks, Stephen R., Roehrig, Chris J., and Rankin,
Catharine H. A dynamic network simulation of the nematode tap withdrawal circuit: Predictions concerning
synaptic function using behavioral criteria. Journal of
Neuroscience, 16(12):4017–4031, 1996.
Widrow, Bernard. Pattern recognition and adaptive control.
IEEE Transactions on Applications and Industry, 83(74):
269–277, 1964.
Williams, Ronald J. Simple statistical gradient-following algorithms for connectionist reinforcement learning. Mach.
Learn., 8(3-4):229–256, May 1992.
000
001
002
003
004
005
006
007
008
009
010
011
012
013
014
015
016
017
018
019
020
021
022
023
024
025
026
027
028
029
030
031
032
033
034
035
036
037
038
039
040
041
042
043
044
045
046
047
048
049
050
051
052
053
054
Supplementary Materials
1. Videos of the performance of the learned neuronal circuit policies
Description
TW circuit controls an inverted pendulum
at different stages of the training process
TW circuit controls a mountain car
at different stages of the training process
TW circuit performs the parking task
Parking task with four
degrees-of-freedom
URL
https://youtu.be/iOHeQ7DhQv8
https://youtu.be/lMrP1sXp3jk
https://youtu.be/Vwydc2ez9Wc
https://youtu.be/jVQqKoHopTU
Table S1. Videos
2. Neural Circuit Implementation and Setup
In this section we describe how to integrate the neuron and synapse equations into a computational framework to build up
the TW circuit. Due to non-linearity of the sigmoid function in Eq. (7)Main-text, the neuron’s differential equation, Eq.
(1)Main-text, becomes non-linear. Unfortunately, there are no complete theory of solving problems of this class, explicitly
(Gerald, 2012). Thus, for simulating neural networks composed of such dynamic neuron models, we adopted a numerical
implicit solver.
When a network structure is dense and full of synaptic pathways, the set of ODEs (neuron potentials), defined in Eq.
(1)Main-text, becomes stiff (Press et al., 2007). Therefore, in order to overcome stability issues we used an implicit
derivation approximation method as follows (Press et al., 2007):
dv
v(t) − v(t − ∆t )
≈
dt
∆t
for some small ∆t .
(1)
In this way, we discretize the time variable and transform the set of ODEs into a set of iterative equations.
For each neuron, Eq. (1)Main-text, exposed to chemical synaptic currents in the form of Eq. (7)Main-text, and gap
junction currents in the form of Eq. (8)Main-text, if we apply approximation of the Eq. (1)supplementary and assume
vpre (t) ≈ vpre (t − ∆t ), we can show that the membrane potential of that neuron at time t, is computable by:
v(t) =
[
Cm
v(t − ∆t ) + GLeak VLeak +
∆
Xt
X
ωex,i ERev,ex +
ωinh,i ERev,inh +
i∈Ex
X
i∈GJ
[
i∈Inh
ωgj,i vpre (t − ∆t )]/
X
Cm
+ GLeak +
ωex,i +
∆t
i∈Ex
X
X
ωinh,i +
ωgj,i ]
i∈Inh
i∈GJ
(2)
Supplementary Materials
055
056
057
058
059
060
061
062
063
064
065
066
067
068
069
070
071
072
073
074
075
076
077
078
079
080
081
082
083
084
085
086
087
088
089
090
091
092
093
094
095
096
097
098
099
100
101
102
103
104
105
106
107
108
109
In Eq. (2)Supplementary, ωex,i , ωinh,i , ωgj,i , respectively stand for the overall conductance of the excitatory synapse,
inhibitory synapse and the gap junction, where ωex,i = gex,i (vpre ), ωinh,i = ginh,i (vpre ), and ωgj,i = ω̂. Variables together
with their boundaries, and constants in Eq. (2)Supplementary, are summarized in the Table 2.
Parameter
Cm
GLeak
Erev excitatory
Erev inhibitory
VLeak
µ
σ
ω
ω̂
Value
Variable
Variable
0mV
-90mV
Variable
-40mV
Variable
Variable
Variable
Lower bound
1mF
50mS
Upper bound
1F
5S
-90mV
0mV
0.05
0S
0S
0.5
3S
3S
Table S2. Parameters and their bounds of a neural circuit
Formally, Eq. (2)Supplementary, was realized in a hybrid fashion which combine both implicit and explicit Euler’s method;
The overall neuron equation, Eq. (1)Main-text is approximated by the implicit Euler’s method while the parts substituted
from Eq. (7)Main-text and Eq. (8)Main-text, were estimated by an explicit Euler’s method.
The motivation for implementing such hybrid solver, was to make the resulting algorithm of simulating the neuronal network
be separable into the following steps:
(i)
1. Compute all the incoming currents, Iin , form all synapses to the cell using the most recent values of v(t)
2. Update all v(t) by Eq. (2)Supplementary
This is significantly effective when implementing a neural network on a real-time controller.
3. Experimental Setup Parameters
3.1. Experimental setup table
Iterations
Horizon
Sample size
Filter size
Inverted Pendulum
25,000
1000
20
10
Mountaincar (OpenAI Gym)
50,000
1000
20
20
Mountaincar (rllab)
50,000
500
20
20
Cart-pole
50,000
500
20
10
Parking
20,000
320
1
1
Table S3. Experiment Parameters
With the aim of gaining a better performance, and utilizing parallel hardware resources and to increase the statistical
confidence, all experiments are performed by an ensemble of 12 agents. Due to the stochasticity of the training algorithm,
not all agents were able to solve the tasks in the given time frame. The observed success-rates are: Mountaincar (OpenAI
gym) 25%, Mountaincar (rllab) 42%, Cart-pole 42%, Inverted Pendulum 100% and Parking 100%.
3.2. Neuron’s and synapse’s parameter-boundaries in the optimization setting
Type
ω
σ
Cm
GLeak
VLeak
Lower bound
0
0.05
0.001
0.05
-90
Upper bound
3
0.5
1
5
0
Table S4. Types of parameters that are optimized and range of valid values
Supplementary Materials
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
3.3. Sensory neuron mappings
As introduced in section 2.2, input and output values are mapped to the potential of sensory respectively motor neurons by
an affine mapping. This affine mapping is defined by the minimum and maximum value of the particular input or output
value. For each of the five RL environments we set these boundary values separately, according to the following table:
Environment
Inverted pendulum
Mountaincar (OpenAI Gym)
Mountaincar (rllab)
Cart-pole
Parking
Variable
x
ϕ
a
x
ẋ
a
x
ẋ
a
ϕ
ϕ̇
a
x
y
θ
Start signal
Linear velocity
Angular velocity
Minimum
-1
-0.12
-0.3
-0.02
-0.12
-1
-0.8
-1.5
-1
-0.15
-1
-1
-1
Maximum
+1
+0.12
+0.3
+0.02
+0.12
+1
+0.8
+1.5
+1
+0.15
+1
+1
+1
+1
+1
+1
+1
+1
Table S5. Input and output boundary values used to define the affine sensory and motor mappings
4. Discussion on the influence of the filtering on the training performance
We experienced that a large filter size, i.e an objective estimate, which filters out only few outlying samples, performs better
when the reward is sparse. We observed that learning curve of such environments usually has the shape of a series of step
functions. One example is the Mountaincar (OpenAI Gym) environment, where a positive reward is only given once at the
end, when the entire task has been solved. A large filter size performs better, in such tasks, because the episodes that have
been solved by luck, are not filtered out and instead, have a large effect on the estimate. This is crucial for the training in a
sparse reward setting, since during the learning phase, we observed that the agent first is unable to solve the task, then is
able to solve only a few cases (e.g. when the car starts somewhere uphill) and so on, until the final agent solves the task even
in the difficult scenarios.
Furthermore, we observed that a small filter size, i.e. an objective-estimate which is computed only from the lowest samples,
performs slightly better in tasks with gradually increasing reward. Learning curve of such environments are usually shaped
smoother. An example of such task is the inverted pendulum (Roboschool), where a positive reward is given all the time
when the pendulum is still facing upwards. Our filtering strategy performs slightly better here, because, as originally
intended, the estimate is not influenced by outlying high samples. In the inverted pendulum task, such samples occur when
the pendulum start in an almost straight pose and a high return can be collected without any specific action.
5. TW circuit can realize more degrees of freedom
In our first parking experiment, the TW circuit is able to make a turn left and move the rover forward with only one command
neuron being active. This means that the circuit is able to solve the task with having binary activation states (active, not
active) of the command neuron. To test the flexibility of the TW circuit and underlying neuron model, we set up a second
parking experiment. In this experimental setup, we connected the command neuron AVA to two motor neurons responsible
for turning right and moving backwards, and AVB to two motor neurons responsible for turning left and moving forward.
In this setup, the controller is principally able to move the robot to 4 different directions: Forward, Backward, turn left
Supplementary Materials
and turn right. Furthermore, the TW circuit is not able to move the rover forward and turn right with only command
neuron being active. If the TW circuit tends to make a right turn and move the rover forward at the same time, (which is
necessary to solve this task), the circuit must be able to do this via a synchronized cooperation of the two command neurons.
With this configuration, our goal was to test whether the TW circuit can express multiple output primitives with only two
command neurons, by operating them in more than two potential states. We conclude that the training algorithm was able to
parametrize the TW circuit, such that the agent can keep the trajectory checkpoints, correctly. A video on this scenario can
be viewed at https://youtu.be/jVQqKoHopTU.
6. Neuron traces of figure 6
Time (s)
20
25
PVD (mV)
15
Time (s)
PLM (mV)
10
AVA (mV)
5
AVD (mV)
0
PVC (mV)
50
AVB (mV)
25
25
50
75
AVM (mV)
25
50
25
50
75
25
50
75
ALM (mV)
70
80
25
50
75
25
50
75
DVA (mV)
50
0
50
25
50
50
75
LFT (mV)
10 15 20 25 30 35 40 45
0
25
50
75
80
50
60
70
25
50
75
RGT (mV)
5
25
50
60
25
50
25
50
FWD (mV)
0
PVD (mV)
40
PLM (mV)
20
AVA (mV)
25
50
75
AVD (mV)
40
50
PVC (mV)
70
60
AVB (mV)
60
40
60
AVM (mV)
AVM (mV)
40
60
ALM (mV)
40
60
DVA (mV)
60
FWD (mV)
AVB (mV)
40
40
60
ALM (mV)
50
60
70
40
DVA (mV)
60
50
0
50
FWD (mV)
40
C
REV (mV)
PVD (mV)
PLM (mV)
50
60
70
PVC (mV)
60
70
AVA (mV)
B
AVD (mV)
A
REV (mV)
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
25
50
75
0
5
10
Time (s)
15
Figure S1. Neuron activity represented in figure 6. A) Inverted pendulum, B) Mountain car C) Parking
References
Gerald, Teschl. Ordinary Differential Equations and Dynamical Systems, volume 140 of Graduate Studies in Mathematics.
American Mathematical Society, 2012.
Press, William H., Teukolsky, Saul A., Vetterling, William T., and Flannery, Brian P. Numerical Recipes 3rd Edition: The
Art of Scientific Computing. Cambridge University Press, New York, NY, USA, 3 edition, 2007.
| 9cs.NE
|
Sensor Array Design Through Submodular
Optimization
Gal Shulkind, Student Member, IEEE, Stefanie Jegelka, Gregory W. Wornell, Fellow, IEEE
arXiv:1705.06616v2 [cs.IT] 28 Dec 2017
Abstract
We consider the problem of far-field sensing by means of a sensor array. Traditional array geometry design techniques are
agnostic to prior information about the far-field scene. However, in many applications such priors are available and may be utilized
to design more efficient array topologies.
We formulate the problem of array geometry design with scene prior as one of finding a sampling configuration that enables
efficient inference, which turns out to be a combinatorial optimization problem. While generic combinatorial optimization problems
are NP-hard and resist efficient solvers, we show how for array design problems the theory of submodular optimization may be
utilized to obtain efficient algorithms that are guaranteed to achieve solutions within a constant approximation factor from the
optimum. We leverage the connection between array design problems and submodular optimization and port several results of
interest. We demonstrate efficient methods for designing arrays with constraints on the sensing aperture, as well as arrays respecting
combinatorial placement constraints.
This novel connection between array design and submodularity suggests the possibility for utilizing other insights and
techniques from the growing body of literature on submodular optimization in the field of array design.
Index Terms
Array design, Submodular optimization, Far field sensing
I. I NTRODUCTION
Sensor arrays for spatial sensing are widely deployed in a wide range of applications including radar, sonar, medical imaging
and radio astronomy and there is a vast literature on the topics of array design and array processing from the last century [1],
[2].
A major goal in designing arrays is efficiently meeting sensing specifications with a limited budget of sensing elements,
which is often a main determinant of system cost in terms of dimensions, weight, complexity and manufacturing cost. However,
traditionally most studies assume a uniform and linear design, often a truncated half-wavelength array, or restrictions thereof.
Indeed, the problem of designing non-uniform arrays hints at combinatorial optimization and is computationally intractable as
we discuss later.
In beamforming arrays attaining a desired resolution level is often a primary concern, achieved by means of manipulating
beam pattern parameters such as lobe widths and positions. The problem of designing efficient array geometries that facilitate
desired beam patterns has been widely studied in the past. Techniques involving array thinning start with a dense uniform
geometry, removing elements while maintaining performance within specified bounds [3]. Other approaches consider various
methods such as swarm optimization [4], dynamic programming [5], genetic algorithms [6], inversion [7] and Bayesian
compressive sampling [8].
In direction-of-arrival estimation applications other specialized techniques have emerged for finding efficient array designs,
such as optimizing the corresponding Cramer-Rao error bound [9], or designing according to the nested array methodology
for increasing the available number of degrees of freedom [10], and theoretical results for estimation performance in these
settings have been developed [24], [25], [26]. Alternatively, other studies have addressed array design from the point of view
of performing efficient compressive sampling of a Wide Sense Stationary (WSS) process, e.g. for a setting with a parametrized
covariance matrix [11], for wide-band power spectrum estimation [12] and evaluating performance in the presence of modeling
errors [13]. However, these samplers are optimized for reconstructing the second order statistics of the scene and not the actual
scene realization.
In virtually all design methodologies some assumptions are made on the scene of interest. These represent beliefs, constraints
or knowledge that hold over the unobserved scene. A favorable design is one meeting requirements while taking into account
these assumptions. For example, in direction of arrival applications we may assume some limit on the number of point targets
present in the scene [9]. In beamforming we assume some separation level between objects of interest that implies a certain
resolution level is required [1], or some scene sparsity structure [14], [15].
In this paper we study the problem of inference on a scene of interest through measurements collected by an array of sensors.
The approach we take for designing array geometries is novel in that we consider settings where some Bayesian prior on the
This work was supported, in part, by NSF CAREER Award 1553284.
This work was supported, in part, by DARPA under Contract No. HR0011-16-C-0030, and by NSF under Grant No. CCF-1319828.
The authors are with the Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, Cambridge, MA 02139 USA
(e-mail: {shulkind,stefje,gww}@mit.edu).
1
scene is available at the time of design and propose exploiting this knowledge by adapting the array geometry accordingly to
achieve efficient inference with a limited budget for sensors.
Prior knowledge is in fact not a rarity at all. Frequently, the same device is used to sense multiple similar scenes, where past
examples are indicative. A medical imaging device, for instance, is typically used to image the same organ across different
patients. In other cases, we may have prior knowledge in the form of scene properties such as smoothness or adherence to
spatial constraints. We incorporate such knowledge as a prior in a Bayesian model, such that sensing the scene is equivalent
to performing inference in this model, and the problem of array geometry design asks to select a geometry that optimizes the
quality of inference. This naturally turns out to be a combinatorial optimization problem, which can be extremely hard to solve
even approximately without exploiting additional structure.
We show how to choose a cost function for the array geometry design problem that holds the property of submodularity
[16]. A submodular set function is one that exhibits diminishing marginal gains, i.e. adding additional elements results in
diminishing benefit. Recently, there has been significant progress on the theory of optimizing submodular functions [17], [18],
[19], [20]. In particular, these results state that, while NP-hard, submodular maximization admits variants of greedy algorithms
that are guaranteed to achieve near-optimal solutions, i.e. within a constant factor. Submodularity has been used in connection
with sensor placement problems, for example in [21], [22], [23], however these works are not tailored to the far field scenes
and models that we focus on here.
Our connections and formulations open avenues for leveraging those results for efficient array design with strong guarantees.
We demonstrate this by showcasing the design of array geometries in settings with arbitrary apertures and settings where sensor
placement respects matroid combinatorial constraints by porting results from the growing body of literature on submodular
optimization. We demonstrate that together with our new adaptive formulations, the exploitation of prior knowledge leads to
higher quality inference at lower cost in terms of the number of sensing elements.
The paper is structured as follows: In Section II, we review far-field sensing and introduce a statistical framework for
modeling a-priori scene distributions. In Section III, we define a cost-function to quantify the inference loss associated with
array configurations and derive a corresponding array design optimization problem. We show that this optimization problem
belongs to the class of submodular optimization problems and adapt established algorithms and guarantees to our setting. In
Section IV, we review the theory of matroids and showcase its use in designing array geometries with combinatorial placement
constraints. Finally, in Section V we summarize numerical experiments exemplifying and validating our theory. The appendix
provides proofs for some of our claims.
II. P ROBLEM FORMULATION
In this section we formulate the array design problem. We focus on far-field sensing applications, although, as will become
apparent, the same techniques could also be generalized to other settings where the measurement process is linear. For simplicity
we consider a one dimensional setting as the extension to multiple dimensions is straightforward. We begin with a review of
the far-field sensing model to establish notation, and then pose the sensing problem as a Bayesian inference problem.
A. Far-Field Sensing
The far-field sensing setup is depicted in Fig. 1. At a distance from an observation axis x we have a scene of interest,
characterized by an illumination function β̃(θ) that depends on the angle θ∈[− π2 , + π2 ] between the direction of observation
and the axis of measurement broadside. We are to place N sensors along the observation axis at positions S ≡ {x1 , . . . , xN }.
Fig. 1. Far-field sensing. Antenna elements are depicted as blue dots.
The passive sensors pick up the radiation emitted from the scene, which is assumed to be narrow-band around a fixed
wavelength λ. Recall that in an ideal noiseless setting, r(x), the reading collected at position x, is given according to [1]:
1
π
Z+ 2
r(x)=
β̃(θ)ej
2π
λ x sin(θ)
Z+ 2
cos(θ)dθ=
−π
2
β(ψ)ej
4π
λ xψ
dψ,
(1)
− 21
where we have introduced ψ ≡ sin2 θ such that ψ ∈ [− 12 , + 21 ] and β(ψ) ≡ β̃(sin−1 (2ψ)).
Eq. (1) bears close resemblance to the definition of the Fourier transform. Namely, defining f (t) to be the Fourier transform
pair of β(ψ)
Z
Z
F
j2πtψ
f (t) = β(ψ)e
dψ β(ψ)= f (t)e−j2πtψ dt
(2)
F −1
2
2
we immediately identify, comparing (1)
2 and (2) that r(x) = f ( λ x). That is, collecting measurements at x ∈ 1{xn }1 is equivalent
to sampling the function f (t) at t ∈ λ xn . Notice that since the support of β(ψ) is restricted to ψ ∈ [− 2 , + 2 ] we observe
that f (t) is band-limited with bandwidth 1. Thus, as a consequence of the Whittaker-Kotelnikov-Shannon sampling theorem
we have that perfect reconstruction of f (t), and subsequently the scene β(ψ), is possible from an infinite set of samples taken
at t ∈ {. . . , −1, 0, +1, . . .} which are exactly the samples collected by an infinite λ2 -spaced array.
Finally, we consider the effect of noise by introducing the vector of N noisy measurements f˜ = [f˜1 , . . . , f˜N ]> modelled
according to:
2
˜
xn + wn
n = 1, . . . , N
(3)
fn ≡ r(xn ) + wn = f
λ
where wn are additive noise components. Stacked into a vector w = [w1 , . . . , wN ]> , we assume throughout that the noise is
a complex, circular, Gaussian random vector w ∼ CN (0, Σww ) [27]. We assume the noise to be independent across different
2
sensors, i.e., Σww = σw
IN , where IN is an N ×N identity matrix such that the noise is i.i.d. across different sensors.
B. Bayesian Formulation
The sensing problem we consider in this paper entails the estimation of the illumination function β(ψ) or equivalently its
inverse Fourier transform f (t) from the set of noisy measurements f˜. Even in the noiseless setting this problem is gravely
ill-posed as infinitely many wildly varying scenes map to any given finite set of observations1 .
To cope with this ill-posedness, some prior belief or knowledge pertaining to β(ψ) (or equivalently f (t)) must hence be
incorporated into the model, and this could be achieved in several ways. Wingham [29] proposed selecting one specific f (t) of
the multiple such functions consistent with the samples, namely the minimum norm solution. Alternatively, some constraints
or other preferences may be imposed on the solution by penalizing the inversion. For example one may require the solution
to satisfy some constraints, e.g. lie in some pre-specified sub-space of the function space, or regularize the inversion, e.g. to
promote smoothness or low total variation [30].
In this study we take a Bayesian approach and impose a prior distribution on the scene β(ψ). Subsequently, sensing is
equivalent to performing inference in this model. The prior may be assigned based on past observations over the distribution
of scenes or based on a-priori knowledge of scene properties.
We conceptually think of our scene as a natural image, and as such, our Bayesian formulation entails posing a prior that is
consistent with its expected characteristics, tailored to the specific application that is of interest to the user. Utilizing Gaussian
distributions as priors for natural scenes and images has been successfully applied in the past [31], [32], [33] and our work
uses similar notions, with the Gaussian prior specifically expressed in the frequency domain (e.g., as in [9]). We note that this
Gaussian description naturally captures the statistics of spread-out scenes and is not immediately suitable for serving as a prior
for point-source target models. The formulations and methods that we develop in subsequent sections can be adapted for use
with other scene priors in lieu of the Gaussian one we focus on for this study. In particular, our formulations may account for
settings with point-source scenes by posing a point-process prior (e.g. a determinantal point process, DPP [34]) that is better
suited for capturing priors of point-targets in specific environments. With this alternative prior we could follow similar steps to
develop efficient array designs for those applications. Studying such alternative priors and resulting formulations is a possible
interesting extension to our work.
In what follows, to be concrete we detail one specific choice for the form of the scene prior, expressed as a Gaussian
distribution in the frequency domain:
1) Discrete Representation: Assigning a prior on a continuous function β(ψ) may seem like a daunting task. However, in
many scenarios this can be considerably simplified if the scene may be efficiently expanded in a countable basis of functions
such that the prior may be imposed in thediscrete domain of expansion coefficients. In what follows, we consider expanding
β(ψ) by means of Fourier basis functions ej2πmψ |m = . . . , −1, 0, +1, . . . in ψ ∈ [− 21 , + 12 ]. Alternatively, other expansions
may be used with similar results. We write:
X
1 1
β(ψ) =
βm ej2πmψ ,
ψ ∈ [− , + ]
(4)
2 2
m
1
Z+ 2
βm ≡
β(ψ)e−j2πmψ dψ
(5)
− 12
where {βm } are the Fourier expansion coefficients. The usual Parseval relation holds:
Z
X
|β(ψ)|2 dψ =
|βm |2
m
1 The
mapping between a band-limited function f (t) and a finite set of its (generally non-uniform) samples {f (tn )} is not bijective [28].
(6)
3
In lieu of the prior on β(ψ) we will impose a prior distribution over {βm }. As will become evident such a description is
especially suited for applications involving real world smooth scenes β(ψ) as suggested by the following properties of the
Fourier series expansion [35]:
|m|→∞
(a) (Riemann-Lebesgue lemma) Let β(ψ) be any integrable function. Then |βm | −→ 0.
α
(b) Let β(ψ) ∈ C r where C r is the space of r-times continuously differentiable functions over some domain. Then |βm | ≤ |m|
r
∂r
with α = supψ | ∂ψr β(ψ)| [35].
Thus, for any nicely behaved scene β(ψ) the high frequency Fourier expansion coefficients diminish to zero with an
asymptotically polynomial rate determined by the level of smoothness.
2) Prior: In the sequel we use Gaussian priors on the coefficients {βm }:
2
βm ∼ CN (0, σm
)
(7)
2
where βm are independent, complex, circular and Gaussian, and σm
are the corresponding variances, which are assumed known
in advance. Using (6) we define the expected scene power:
Z
X
2
P ≡ E |β(ψ)|2 dψ =
σm
(8)
m
2
The σm
can be set following some initial measurements of sample functions β(ψ) or taking into account prior knowledge.
For example if we have a-priori knowledge that β(ψ) ∈ C r we may use
1
m=0
2
(9)
σm
=
1
m
6= 0
2r
m
which is a very simple distribution respecting the polynomial variance decay. For the rest of the paper we adopt the prior in
(9) and take r = 1 to promote continuously differentiable functions. Also notice that the resulting prior distribution on β(ψ) is
2
Wide Sense Stationary (WSS), with the coefficients σm
determining the shape of the power spectrum, based on the available
prior information we have on the scene.
C. Observation Model
With the prior stated in the discrete {βm } domain as described above, our next goal is to circumvent β(ψ) by directly
stating the problem in terms of the measurements f˜n and the coefficients βm , replacing the continuous representation with
manageable discrete counterparts. Substituting the sum (4) into Equation (1) we have:
1
r(xn ) =
Z+ 2 X
− 12
m
βm ej2πmψ ej
4π
λ xn ψ
dψ =
X
Knm βm
(10)
m
where
1
Z+ 2
Knm ≡
2
2
ej2π( λ xn +m)ψ dψ = sinc(m+ xn )
λ
(11)
− 21
with sinc(x) ≡
sin(πx)
πx .
Plugging this into (3) we finally have the full observation model
X
n = 0, . . . , N − 1
f˜n =
Knm βm + wn
(12)
m
and the sensing problem amounts to estimating the coefficients {βm } given the observation vector f˜. As we have assumed a
Gaussian distribution for the noise vector w as well as for the prior over {βm } the posterior distribution p({βm } |f˜) turns out
to be Gaussian with a convenient analytic expression, as we detail in Section III-D.
III. A RRAY D ESIGN W ITH AN A PERTURE C ONSTRAINT
In the previous section we formulated the problem of far-field sensing in a Bayesian setting with a prior on the distribution
of the underlying scene. In this section we design corresponding array geometries to facilitate efficient sensing that exploit the
prior knowledge and model. Initially we consider simple constraints on the total number of sensors we can place and on the
aperture where these can be situated. Specifically, we assume that up to N sensors are free to be placed over some aperture
A on the real line, e.g. for simplicity we can consider A ≡ {x| − a ≤ x ≤ a} , a ∈ R+ . In Section IV we consider more
sophisticated combinatorial placement constraints and show that the same formulations we develop here may be adapted to
those more challenging use cases.
4
A. Formulating a Cost Function
In order to make the problem of optimal array design well-posed in our Bayesian setting we need to specify a performance
measure that will be used as a cost function to compare different designs and choose the best one. Revisiting our observation
model (12) we notice that the array design determines the coefficients Kmn through the set of sensor positions S, as defined in
Section II-A. With any given design the sensing problem amounts to inferring the posterior p({βm } |f˜). A natural performance
measure in this setting quantifies the quality of inference, i.e., the information gained by performing the sensing experiments
which results in updating our beliefs about the coefficients {βm } from the prior p({βm }) to the posterior p({βm } |f˜). This
problem has been extensively studied in the context of statistical inference and experimental design [36], [37]. If we are
interested in making general inference to learn the state of the world (represented by the posterior distribution of the Fourier
coefficients) then the natural performance measure, which is referred to as Bayes D-optimality is the mutual information
between the expansion coefficients and the collected measurements [36], [37]:
I(f˜S ; {βm }) = H({βm }) − H({βm } |f˜S )
(13)
where I(·; ·) is the mutual information and H(·) the Shannon entropy. The subscript S explicitly emphasizes the dependence
of the measurements on the set of sensor positions S. Notice that this cost function measures the reduction in uncertainty of
the scene expansion coefficients before and after measurements are made. The larger the mutual information the more we trust
the values of the coefficients {βm } |f˜S .
With the cost function in place the array design problem becomes
S ? = argmax I(f˜S ; {βm }),
(14)
S⊆A,|S|≤N
which is an NP-hard combinatorial optimization problem. However, we will show later that we can obtain a constant-factor
approximation for (14) using efficient computational techniques.
B. Finite Dimensional Approximation
Solving (14) under our model (12) involves manipulations of the infinite sequence {βm } which may not be amenable to
computer representation. To make our formulation tractable we approximate the infinite sequence {βm } with a finite truncated
set of coefficients {βm |m ∈ M}, where M is some finite set. Stacked in vector form β, we consider the simplified finite
dimensional approximation of (12):
fˆS = KS β + w
(15)
where KS is an N ×|M| matrix formed by restricting Knm on m ∈ M and the dependency on the sampling set S again
made explicit. Notice that hat notation is replacing the previous tilde.
We show that the approximate finite-dimensional model (15) is a good proxy for the original infinite-dimensional model
(12) for a suitably selected M. Indeed, if M is chosen to only exclude those βm coefficients that in expectation contribute a
marginally small part of the energy of the full infinite sequence {βm } then the mutual information derived from the approximate
model (15) will closely track that of the infinite dimensional model in (12). More precisely we have the following result:
P 2
3
2
2
Lemma III.1. Let the prior on {βm } be i.i.d. according to βm ∼ CN (0, σm
), M fixed, and ≡
σm satisfies < σw
N−2 .
m∈M
/
We have:
3
−N log(1+
3
N 2
N 2
)≤I(f˜S ; {βm })−I(fˆS ; β)≤−N log(1− 2 )
2
σw
σw
Proof. See Appendix A.
3
→0
2
ˆ
˜
By virtue of the last lemma and N log(1± N
2 ) −→ 0 we have that I(fS ; β) is an arbitrarily accurate proxy for I(fS ; {βm })
σw
for small enough, such that in lieu of problem (14) we now continue with the simplified finite dimensional approximation:
S ? = argmax I(fˆS ; β)
S⊆A,|S|≤N
and the results will be accurate to within the approximation bounds from Lemma III.1.
(16)
5
C. Grid Discretization
Next we turn to discretizing the aperture A to cast the array design problem in the form of a generic finite selection problem.
We thus restrict the choice of sampling positions to the finite set
o
n
(17)
V ≡ x1 , . . . , x|V| ⊂ A
For the sequel we take V to be a uniform δ-spaced grid of positions in A. We adapt the array design problem (16) accordingly
as:
Sd? = argmax I(fˆS ; β)
(18)
S⊆V,|S|≤N
with the subscript d implying discretization. The next result can be used to quantify the level of discretization δ necessary to
guarantee performance close to optimum within some specified error bound:
Lemma III.2. With V a uniform grid of sampling positions with distance δ between adjacent positions we have:
3
I(fˆSd? ; β) ≤ I(fˆS ? ; β) ≤ I(fˆSd? ; β)+N log(1+
4δP (1+δ)N 2
)
2
λσw
Proof. See Appendix B.
With this last lemma in place the array design problem (16) may be further approximated in the more convenient finite
combinatorial problem form of (18) with guarantees on the accuracy of the resulting designs. In the sequel we assume that
δ is chosen such as to meet desired accuracy levels, as prescribed in Lemma III.2, and work with the simplified formulation
(18).
D. Sensing
With the observation model of (15), coupled with a Gaussian distribution for the noise vector w and a Gaussian prior for the
coefficients vector β, calculation of the posterior distribution β|fˆS is particularly simple and can be performed analytically.
Concretely, we have as a result of all random variables being Gaussian β|fˆS ∼ CN (µ̂, Σ̂) and the parameters are given
according to the conventional Gaussian conditional parameters:
fˆ
µ̂ = Σβ fˆΣ−1
fˆfˆ S
Σ†
Σ̂ = Σββ − Σβ fˆΣ−1
fˆfˆ β fˆ
where Σβ fˆ = Σββ KS† ,
(19)
2
Σfˆfˆ = KS Σββ KS† + Σww and Σββ = diag[σ12 , . . . , σM
].
E. Submodular Optimization
The next step is to prescribe an efficient algorithm for the solution of (18). As we will show shortly (18) is an instance of
a known NP-hard problem such that it is widely believed that no efficient algorithm for its solution exists. However, due to
the structure of the cost function an efficient approximation algorithm is known to exist with strong theoretical guarantees. In
this subsection we survey the relevant results and adapt them to our needs.
1) Submodularity: We begin by invoking the submodularity property of set functions [16]:
Definition III.1. Let G : 2V → R be a set function.
(a) G is submodular if it satisfies the property of decreasing marginals: ∀S, T ⊆ V such that S ⊆ T and x ∈ V\T it holds
that G(S ∪ {x}) − G(S) ≥ G(T ∪ {x}) − G(T ).
(b) G is monotonic (increasing) if ∀S, T ⊆ V s.t. S ⊆ T we have G(S) ≤ G(T ).
As it turns out, our cost function is monotonic and submodular as the next result shows (this is almost identical to corollary
4 in [38]. We reproduce it here with adaptations to our setting for completeness):
Lemma III.3. Let V be defined as before, and define the set function G : 2V → R according to G(S) = I(fˆS ; β). Then G is
submodular and monotonic (increasing).
Proof. Expanding the mutual information according to I(x; y) = H(x)−H(x|y) we have:
G(S∪ {x})−G(S) = H(fˆS∪{x} )−H(fˆS )
−[H(fˆS∪{x} |β)−H(fˆS |β)] = H(fˆ{x} |fˆS )−H(fˆ{x} |β)
(20)
6
where in the last equality we used the conditional independence of the components of fˆS∪{x} given β. Substituting T for S
we immediately get:
[G(S∪ {x})−G(S)]−[G(T ∪ {x})−G(T )]
= H(fˆ{x} |fˆS )−H(fˆ{x} |fˆT )
(21)
Using S ⊆ T we have H(fˆ{x} |fˆS ) ≥ H(fˆ{x} |fˆT ) such that G(S∪ {x})−G(S) ≥ G(T ∪ {x})−G(T ) and G is submodular.
To prove monotonicity it is enough to show G(S∪ {x})−G(S) ≥ 0. This time expand the mutual information according to
I(x; y) = H(y)−H(y|x):
G(S∪ {x})−G(S) = H(β|fˆS )−H(β|fˆS∪{x} )
(22)
Conditioning can never increase entropy so H(β|fˆS )≥H(β|fˆS∪{x} ) and the result follows.
2) Efficient Solvers: Our optimization problem (18) is the maximization of a monotonic submodular function. A greedy
algorithm, shown as Algorithm 1, solves this problem to within the best possible approximation factor, as the following
fundamental theorem states.
Algorithm 1 Greedy Submodular Maximization
1: function G REEDY M AX (G(·), V, N )
2:
S←∅
3:
for i = 1 to N do
4:
x? = argmaxx∈V\S G(S ∪ {x})
5:
S ← S ∪ {x? }
6:
Return S
The following theorem guarantees that the greedy algorithm achieves approximately optimal performance:
Theorem III.1. (Nemhauser [16]) Let G be a monotonic, submodular set function and S ? = argmax G(S).
S⊆V,|S|≤N
Let S gr be the set retrieved by the greedy maximization Algorithm 1. We have the following guarantee for the performance of
the greedy algorithm:
1
1
G(S gr ) ≥ (1 − (1 − )N )G(S ? ) ≥ (1 − )G(S ? )
N
e
Moreover, no polynomial time algorithm can provide a better approximation guarantee unless P=NP [39].
Combining the guarantees of Theorem III.1, Lemma III.1 and III.2 we derive an approximation bound on the original
problem (14):
Corollary III.1.
"
#
3
2
2
1
λσ
+4δP
(1+δ)N
w
(1− ) I(f˜S ? ; {βm })−N log
≤I(fˆS gr ; β)
2 −λN 23
e
λσw
(23)
We hence apply Algorithm 1 to solve our optimization problem (18). The algorithm runs in time O(|V|N ), linear in the
size of the set V and the number of selected elements N [40] such that it is easily implementable for problems of large size.
However, as it turns out even more efficient variants of the algorithm have been introduced and studied. One such variant
commonly referred to as the ’lazy greedy’ algorithm was studied in [40] and it was shown to offer substantial running-time
improvements in practice (with an unlikely worst-case theoretical performance upper bounded by that of the conventional
greedy algorithm). Our numerical experiments described in Section V implement this more efficient variant to reduce running
time.
3) Improved Approximation Bounds: While Theorem III.1 guarantees an approximation bound of (1 − 1e ) ≈ 63% for the
efficient greedy algorithm this guarantee is not tight. It is possible to derive a tighter data-dependent online bound on the gap
between the cost of the greedy solution G(S gr ) and that of the optimal solution G(S ? ) [41]. Specifically, we have:
X
G(S gr )≥G(S ? )− max
(G(S gr ∪ {e})−G(S gr ))
(24)
B:|B|≤N
e∈B
which takes O(|V| log |V|) evaluations of G(S) to compute and sort. We use (24) to improve the distance from optimality
bound in some of our numerical solutions in Section V.
7
F. Design Example: A Simple Ideal Setting
In the previous subsections we formulated the array design problem in a setting with constraints on the aperture A and
the number of sensors N and showed how a greedy algorithm (Algorithm 1) is guaranteed to efficiently find an approximate
solution.
Here, we study a particular instance of that problem, where the Signal to Noise Ratio (SNR) is high, and the aperture is
effectively unconstrained (the N sensors may be placed anywhere on the real line). Under these conditions a truncated λ2 -spaced
array is traditionally considered the design of choice in the conventional non-Bayesian setting (this is a truncated version of
the infinite λ2 -spaced design mentioned in Section II-A). We show next that the truncated λ2 -spaced design naturally emerges as
the approximately optimal solution as retrieved by our schemes in Bayesian settings where the a-priori β distribution satisfies
some conditions. Specifically, we have the following result:
Theorem III.2. Consider the high SNR regime σP2 → ∞ and assume the prior from (7) takes a symmetric, monotonically
w
2
2
2
2
decreasing form, i.e. σm
= σ−m
and σm
≥ σm
whenever 0 ≤ m1 < m2 . In addition, take V as an arbitrarily dense set of
1
2
sampling points on R, and M = −M, . . . , M with M → ∞.
We then have that a greedy solver on (18) will return a length N , λ2 -spaced truncated uniform array centered around x = 0.
Proof. See Appendix C.
The last theorem studies one class of simple idealized problems where the greedy solution is reminiscent of generic nonBayesian array designs. However, notice that our formalism is also useful in more challenging design problems such as when
the aperture A takes on arbitrary forms, and the effects of noise and application-tailored priors are considered. Furthermore, in
Section IV we demonstrate that additional combinatorial constraints may be naturally incorporated into our formulation such
that even more challenging problems become manageable.
IV. A RRAY D ESIGN WITH M ATROID C ONSTRAINTS
In Section III we formalized the array design problem in a setting where we imposed constraints on the aperture and the
number of sensors. Specifically, the constraints were S ⊆ V, |S| ≤ N . In many practical scenarios these may be too simplistic
to accurately represent real world design constraints. For example in applications where sensors are heavy and mounted on
support beams we may want to restrict the number of sensors in specific sections of the aperture.
In this section we briefly review key elements from matroid theory which is a branch in combinatorics [42] and survey
results from submodular optimization with matroid constraints guaranteeing the existence of efficient approximate solvers for
this class of problems. We continue to show that these mathematical structures may be utilized to impose constraints of interest
in array design enriching the set of problems our Bayesian formulation can describe and solve.
A. Submodular Optimization with Matroid Constraints
We begin by defining matroids and their corresponding independent sets [16]:
Definition IV.1. A finite matroid M is a pair (V, I) where V is a ground set and I is a collection of subsets of V (the
independent sets) that satisfies the following properties:
1) The empty set is independent: ∅ ∈ I
2) A subset of an independent set is independent:
X ⊂ Y, Y ∈ I ⇒ X ∈ I
3) If X is an independent set and Y is a larger indepedent set, X can be augmented to a larger independent set by adding
an element from Y \X:
X, Y ∈I, |X|<|Y | ⇒ ∃e ∈ Y \X s.t. X∪ {e} ∈ I
A matroid structure may be used to classify subsets of a ground set V into permissible subsets which belong to I and
non permissible subsets which do not belong to I. In the next subsection we show that using this formalism we can express
interesting array design constraints.
From the theory of submodular optimization we have the following results for submodular optimization with matroid
constraints [43], [44]. Let M = (V, I) be a matroid and G(S) a monotonic, submodular set function. There exists an efficient
approximate solver for the problem argmaxS∈I G(S). Specifically, a greedy solver (maximizing the immediate marginal benefit
at each step) taking the form
(
)
S gr ←S gr ∪
argmax
[G(S gr ∪ {e})−G(S gr )]
(25)
e:e∈S
/ gr ,S gr ∪{e}∈I
and stopping when no more elements e can be added is guaranteed to achieve a half-approximation bound:
1
G(S gr ) ≥ max G(S).
2 S∈I
1
The constant factor may be tightened to 1 − e by utilizing specialized randomized algorithms [44].
(26)
8
B. Combinatorial Constraints in Array Design
Here we invoke one specific well known matroid structure and show its application in expressing useful array design
constraints. Let V be a ground
S set of gridTpoints where sensors are allowed to be placed as before. Let V1 , . . . , VK be a
partition of the set V, i.e.
Vk = V, Vi Vj = ∅, ∀i 6= j, and let N, n1 , . . . , nK be a set of integers.
k
We define the (cardinality constrained) partition matroid [44] M = (V, I) with the following definition for the collection
of independent sets: a subset S⊆V is an independent subset S∈I if it holds |S∩V| ≤ N, |S∩Vj | ≤ nj , ∀j.
In the context of array design the partition matroid may be useful in expressing practical constraints over sensor placement
configurations. For example if the subsets Vi represent closed line sections, e.g. a physical partitioning of the aperture into
zones, and I represents the collection of all permissible designs then the structure of the matroid limits the number of sensors
that may be placed in the ith zone to ni which may be an important engineering constraint coupled with some specific
application. We solve:
S ? = argmaxS∈I I(fˆS ; β)
(27)
Applying the results from the previous subsection we immediately have an efficient approximate solver for the array design
problem coupled with a partition matroid constraint. In Section V we detail such a design for one numerical example.
V. N UMERICAL E XPERIMENTS
In this section we perform numerical experiments validating our theoretical results and exemplifying them. We showcase
an array design with cardinality and aperture constraints as prescribed in Section III and design arrays adhering to matroid
constraints as prescribed in Section IV.
Our initial setting is as follow. We fix λ = 1 throughout as the wavelength only serves to scale the x axis. The aperture is set
as A = {x| − 3.5 ≤ x ≤ 3.5} and the selection set V is chosen as a uniform grid of 113 positions from A spaced δ = 0.0625
apart. We set out to design an array consisting of N = 11 sensor locations. The prior for {βm } is set as per (9) with r = 1
and normalized to sum to P = 1. For the simulations we consider the truncated vector β formed when restricting the set of m
coefficients to 901 consecutive elements centered around the origin, i.e., we set M = {−450, . . . , +450}. For the preliminary
design we implement the lazy greedy algorithm of Section III and plot the results in the left column of Fig. 2 as a function
of the SNR which we define here as NPσ2 . Blue markers denote the full selection set V and red markers delineate the active
w
S selected by the algorithm.
In the high SNR regime (SNR = 10dB or higher values) the resulting design is a truncated λ2 uniform array as predicted
according to Theorem III.2. As the SNR decreases the reliability of the measurements deteriorates and the algorithm prefers
locating samplers right next to each other on expense of widening the array as this serves to average out the noise.
The performance in terms of mutual information I(fˆS ; β) for the selected locations S appears in the title of the plots (in
natural units). Notice for example that for the 5dB SNR design the achieved mutual information is 12.54. Using Theorem
III.1 we have that the optimal design cannot achieve mutual information better than 1−1 1 12.54 = 19.83. This bound can be
e
improved using the improved bounding method briefly described following Theorem III.1 to show that the optimal performance
is not greater than 17.45.
The truncation level dictated by our choice of M translates to ∼
= 1e−4 and the truncation bounds from Lemma III.1 read
(for the lower, extreme SNR case): −0.45≤I(f˜S ; {βm })−I(fˆS ; β)≤0.47. We find empirically that these bounds are extremely
loose and M can be shrunk considerably without substantially compromising accuracy. To achieve a similar upper bound on
I(fˆS ? ; β) − I(fˆSd? ; β) as per Lemma III.2 a discretization level of δ ∼
= 2e−4 is needed. However, we empirically find that
our choice of δ = 0.0625 is accurate enough as further refining the grid does not significantly change the design. Our lemmas
prove to be extremely pessimistic as is expected given that the proofs take into account worst-case scenarios.
The array geometries above, derived according to the formulations of Section III, are designed to optimize the quality
of inference between the measurements and the scene expansion coefficients β. Many sensing applications of interest
specifically involve imaging the scene, that is reconstructing β(ψ) from the measurements. Our next experiment was designed
to empirically evaluate the Mean Square Error (MSE) performance in scene reconstruction from measurements collected using
the prescribed designs. First, we designed five array geometries as described above, optimized for several target SNR levels
{30dB, 12dB, 10dB, 5dB, 0dB}. We set up a Monte-Carlo experiment where 1000 scenes were randomly drawn from the
distribution of Section II-B2. For each scene, noisy measurements were collected by each of the five optimized arrays. The
measurements were repeated with five different synthetic noise levels corresponding to the five target SNR levels.
We repeatedly performed maximum likelihood estimation [45] of the expansion coefficients β, and synthesized an estimated
scene β̂(ψ) according to (4). The MSE discrepancy between β̂(ψ) and the true scene is depicted in Fig. 3. It is evident that
the quality of inference criterion is indicative of MSE performance, as each of the five geometries yielded the best MSE
performance at its specified target SNR level.
Next we solve a corresponding set of design problems with matroid constraints installed to limit the number of sensors in given
aperture segments. Specifically, we use the (cardinality constrained) partition matroid from Section IV-B with N = 11, ni =
1, ∀i and Vi spanning consecutive line segments of length 0.5: Vi =[−0.25+0.5·i, +0.25+0.5·i). The matroid constraints limits
9
Fig. 2. (left) Array designs with an aperture constraint and various SNR levels. (right) Array designs with combinatorial placement constraints and various
SNR levels.
Fig. 3. Reconstruction MSE for various arrays designed for fixed SNR levels, with actual SNR levels swept.
the proximity between sensor elements, which may be useful in real world use cases. We plot the results for the matroid
constrained designs in the right column of Fig. 2. Notice that while the theoretical guarantees pertaining to the greedy matroid
optimization scheme of Section IV is 0.5 compared to 1− 1e with the cardinality constraints of Section III, the actual performance
achieved in the constrained design instances is not far from those achieved with the simple cardinality constraints.
VI. C ONCLUDING REMARKS
We introduced a novel framework for designing sensor arrays. Our setting is Bayesian in the sense that our model incorporates
the notion of prior beliefs about the scene of interest. Our goal is designing arrays that are adapted to the scene and perform
efficient inference. We showed that this NP-hard combinatorial selection problem may be efficiently approximated by porting
results from the theory of submodular set function optimization.
10
Initially, we showed how to apply our formalism in design problems with straightforward cardinality and aperture constraints.
Later we showed that more challenging combinatorial constraints may be enforced by utilizing results and concepts from the
field of matroids and submodular optimization with matroid constraints.
Our formulation connecting the array design problem and submodularity may further be extended to reap additional benefits,
namely tackling problems such as robust array design or adaptive design that evolve as the scene is learned. We leave the
treatment of some of these and other problems to separate study [46].
A PPENDIX A
P ROOF OF L EMMA III.1
For simplicity of notation, we suppress the subscript S throughout. Begin by expanding the mutual information expressions:
I(f˜; {βm }) = H(f˜) − H(f˜| {βm })
I(fˆ; β) = H(fˆ) − H(fˆ|β)
(28)
Examining (12) and (15) we have H(f˜| {βm }) = H(fˆ|β) = H(w) and so:
I(f˜; {βm }) − I(fˆ; β) = H(f˜) − H(fˆ)
(29)
Next, notice that f˜ and fˆ are both circular, complex, Gaussian random N -length vectors, such that their entropies are given
according to [27]:
H(f˜) = log((πe)N det(Σ̃))
H(fˆ) = log((πe)N det(Σ̂))
Σ̃ij = E[f˜i f˜j∗ ]
Σ̂ij = E[fˆi fˆ∗ ]
j
(30)
∗
2
Further expand using the independence between w and βm and E[βm βm
0 ] = δmm0 σm :
X
X
∗
∗
∗
Σ̃ij = E[(
Kim βm + wi )(
Kjm
0 βm0 + wj )]
m
= [Σww ]ij +
X
m0
∗
2
Kim Kjm σm
(31)
m
Σ̂ij = E[(
X
Kim βm + wi )(
X
∗
∗
∗
Kjm
0 βm0 + wj )]
m0 ∈M
m∈M
X
= [Σww ]ij +
∗
2
Kim Kjm
σm
(32)
m∈M
Comparing (31) and (32) and using:
X
∗
2
Kim Kjm
σm
≤
m∈M
/
X
∗
2
Kim Kjm
σm
≤
X
2
σm
=
(33)
m∈M
/
m∈M
/
we have |Σ̃ij − Σ̂ij | ≤ such that we may write:
Σ̂ = Σ̃ + X
(34)
for some N × N matrix X satisfying |Xij | ≤ 1. We use (34) to bound the determinants. Σ̃ is positive-definite and invertible
such that we can write:
det(Σ̂) = det(Σ̃ + X) = det(Σ̃)det(IN + Σ̃−1 X)
(35)
H(fˆ)−H(f˜) = log(det(IN +Σ̃−1 X))= log(det(X̃))
(36)
Substituting (35) in (30) we have:
with X̃ ≡ IN + Σ̃−1 X. We turn next to bounding the term log(det(X̃)). First notice:
[Σ̃−1 X]ij =
X
Σ̃−1
im Xmj ≤
m
≤
X
Σ̃−1
im Xmj
m
√
−1
Σ̃−1
k∞ ≤ N kΣ̃−1 k2
im ≤ kΣ̃
m
√
X
√
= N σmax (Σ̃−1 ) = N
√
1
N
≤ 2
σw
σmin (Σ̃)
(37)
11
√
Where we have used the matrix norm equivalence kAk∞ ≤ N kAk2 (for N ×N matrices) and σmax (·) (σmin (·)) is the
2
maximal (minimal)
singular value such that σmin (Σ̃) ≥ σw
. Thus we have that X̃ has
√ diagonal elements centered around 1:
√
P
−1)
N
X̃im ≤ Nσ(N
.
X̃ii − 1 ≤ σ2 and the row-sums over non-diagonal entries satisfy
2
w
w
m6=i
Applying the Gershgorin circle theorem we have for the eigenvalues of X̃:
√
√
NN
NN
1−
≤
|λ
|
≤
1
+
i
2
2
σw
σw
det(X̃) is a positive real number as the quotient of the determinants of two positive definite matrices det(X̃) =
Q
Q
that we can write det(X̃) = i λi = i |λi | and consequently:
3
N log(1 −
det(Σ̂)
det(Σ̃)
such
3
N 2
N 2
) ≤ log(det(X̃)) ≤ N log(1 + 2 )
2
σw
σw
(38)
This finally leads to:
3
−N log(1+
3
N 2
N 2
) ≤ I(f˜; {βm })−I(fˆ; β) ≤ −N log(1− 2 )
2
σw
σw
(39)
A PPENDIX B
P ROOF OF L EMMA III.2
The left inequality is trivial. We have I(fˆSd? ; β) ≤ I(fˆS ? ; β) as the second optimization is over a larger set.
To prove the right inequality we show that for every S ⊆ A there is Sd ⊆ V such that
3
I(fˆS ; β) ≤ I(fˆSd ; β)+N log(1+
4δP (1+δ)N 2
)
2
λσw
we will show this for |S|=N but the proof for other cardinalities is identical.
With distance δ between adjacent elements of V, for every S= {x1 , . . . , xN } ⊂ A there is a set Sd = xd1 , . . . , xdN
that Sd ⊆ V and |xi − xdi | ≤ 2δ for all i. We have, similarly to Appendix A:
(40)
such
I(fˆS ; β) − I(fˆSd ; β) = H(fˆS ) − H(fˆSd )
(41)
H(fˆS ) = log((πe)N det(Σ̂S ))
H(fˆS ) = log((πe)N det(Σ̂Sd ))
(42)
Using the model (15):
d
where:
Σ̂S ≡ E[fˆS fˆS† ] = KS Σββ KS† + Σww
Σ̂Sd ≡ E[fˆS fˆ† ] = KS Σββ K † + Σww
d
Sd
d
Sd
†
Σββ ≡ E[ββ ]
(43)
and H(fˆS ) − H(fˆSd ) = log(det(Σ̂S )) − log(det(Σ̂Sd )).
Both KS and KSd are size N × |M| matrices defined as per the definition in (11), such that:
2
2
|[KS ]nm −[KSd ]nm | = |sinc(m+ xn )−sinc(m+ xdn )|
λ
λ
2
2
≤ 2 |xq −xdq | ≤ δ
λ
λ
(44)
where for the first inequality we have used the fact that sinc(·) is Lipschitz with constant smaller than 2. We can thus define
∆ ≡ KS − KSd and we have |∆nm | ≤ λ2 δ. Substitution in (43) yields:
Σ̂S = Σ̂Sd + ∆Σββ ∆† + ∆Σββ KS† d + KSd Σββ ∆†
(45)
12
We bound the perturbation terms by noticing:
X
[∆Σββ ∆† ]ij =
∆im [Σββ ]mm ∆jm
m
X
2
4
≤ ( δ)2
[Σββ ]mm ≤ 2 δ 2 P
λ
λ
m
[∆Σββ KS† d ]ij =
X
∆im [Σββ ]mm [KSd ]jm
m
≤
X
2
2
δ·1·
[Σββ ]mm ≤ δP
λ
λ
m
(46)
and overall we have:
|Σ̂Sij − Σ̂Sijd | ≤
4
4
4
δP + 2 δ 2 P = δP (1 + δ)
λ
λ
λ
(47)
define: 0 ≡ λ4 δP (1 + δ) and we have
Σ̂S = Σ̂Sd + 0 X
(48)
with N × N matrix X satisfying |Xij | ≤ 1 which is akin to (34). We thus port the results from Appendix A here (we only
need the lower bound):
3
0 N 2
−N log(1 + 2 ) ≤ I(fˆSd ; β) − I(fˆS ; β)
σw
(49)
which, upon substitution of 0 is equivalent to (40).
A PPENDIX C
P ROOF OF T HEOREM III.2
The greedy algorithm sequentially selects elements according to the rule x? = argmaxx∈V\S I(fˆS∪{x} ; β) where S is the
set of elements selected so far. We recursively show that the added elements can be selected on a λ2 -spaced grid centered
around x = 0. Expanding the mutual information as in Appendix A we have:
argmaxx∈V\S I(fˆS∪{x} ; β)=argmaxx∈V\S H(fˆS∪{x} )
(50)
We begin by showing that the first selected element is x1 = 0. Indeed, using the results from Appendix A:
argmax H(fˆ{x} ) = argmax det(Σ̂11 ) = argmax Σ̂11
x∈V
x∈V
where again using Appendix A and under the assumptions of the theorem (high SNR):
X
X
2
∗
2
2
Σ̂11 =
K1m K1m
σm
=
sinc2 (m+ x)σm
λ
m
m
X
2
2
2
≤ σ0
sinc (m+ x) = σ02
λ
m
2
where we used σm
≤ σ02 ,
(51)
x∈V
∀m 6= 0 and the identity:
X
sinc(m+a)sinc(m+b) = sinc(b−a)
(52)
(53)
m
It easy to see that in (52) equality is achieved for the choice x1 = 0 which
is the claim.
Next, assume that the greedy algorithm has already picked a set S = x1 , . . . , x|S| of adjacent elements on a λ2 -spaced
grid centered around x = 0 and show that the next element to be added is an adjacent location on the same λ2 -spaced grid.
We have using H(x, y)=H(x)+H(y|x):
2
argmax H(fˆS∪{x} )=argmax H(fˆ{x} |fˆS )=argmax σx|S
x∈V\S
x∈V\S
(54)
x∈V\S
2
where σx|S
is the conditional variance of the Gaussian observation collected at x given the Gaussian observations made at the
set S:
†
2
σx|S
= σx2 − ΣxS Σ−1
SS ΣxS
(55)
13
with the usual definitions for the covariance matrices (as in Appendix A):
X
2
2
2
2
2
[ΣxS ]1i =
sinc(m+ x)sinc(m+ xi )σm
=sinc(m(i)+ x)σm(i)
λ
λ
λ
m
X
2
2
2
2
[ΣSS ]ij =
sinc(m+ xi )sinc(m+ xj )σm
=δii σm(i)
λ
λ
m
where in the last equations almost all sinc(·) functions nulled out as the xi ’s are situated on a
m(i)≡− λ2 xi , such that I ≡ {m(i)} is a set of consecutive integers. Additionally, we have:
X
2
2
σx2 =
sinc2 (m+ x)σm
λ
m
(56)
λ
2
grid, and we have defined
(57)
Substituting back into (55) we have:
2
σx|S
=
X
=
X
m
m∈I
/
X
2
2
2
2
sinc2 (m+ x)σm
−
sinc2 (m(i)+ x)σm(i)
λ
λ
i∈I
2
2
sinc (m+ x)σm
λ
2
(58)
and this is similar to the optimization over the selection of the first location in (52) with the optimum achieved by selecting
/ I which is the next adjacent location on the λ2 grid which completes the proof.
x such that λ2 x = m for the first m ∈
R EFERENCES
[1] H. L. Van Trees, Detection, estimation, and modulation theory, optimum array processing. John Wiley & Sons, 2004.
[2] H. Krim and M. Viberg, “Two decades of array signal processing research: the parametric approach,” Signal Processing Magazine, IEEE, vol. 13, no. 4,
pp. 67–94, 1996.
[3] R. L. Haupt, “Thinned arrays using genetic algorithms,” Antennas and Propagation, IEEE Transactions on, vol. 42, no. 7, pp. 993–999, 1994.
[4] M. M. Khodier and C. G. Christodoulou, “Linear array geometry synthesis with minimum sidelobe level and null control using particle swarm
optimization,” Antennas and Propagation, IEEE Transactions on, vol. 53, no. 8, pp. 2674–2679, 2005.
[5] M. Skolnik, G. Nemhauser, and J. Sherman, “Dynamic programming applied to unequally spaced arrays,” IEEE Transactions on Antennas and
Propagation, vol. 12, no. 1, pp. 35–43, 1964.
[6] R. L. Haupt and D. H. Werner, Genetic algorithms in electromagnetics. John Wiley & Sons, 2007.
[7] B. P. Kumar and G. Branner, “Design of unequally spaced arrays for performance improvement,” IEEE Transactions on Antennas and Propagation,
vol. 47, no. 3, pp. 511–523, 1999.
[8] G. Oliveri, M. Carlin, and A. Massa, “Complex-weight sparse linear array synthesis by bayesian compressive sampling,” Antennas and Propagation,
IEEE Transactions on, vol. 60, no. 5, pp. 2309–2326, 2012.
[9] H. Gazzah and S. Marcos, “Cramer-rao bounds for antenna array design,” IEEE Transactions on Signal Processing, vol. 54, no. 1, pp. 336–345, 2006.
[10] P. P. Vaidyanathan and P. Pal, “Sparse sensing with co-prime samplers and arrays,” IEEE Transactions on Signal Processing, vol. 59, no. 2, pp. 573–586,
2011.
[11] D. Romero, R. Lopez-Valcarce, and G. Leus, “Compression limits for random vectors with linearly parameterized second-order statistics,” IEEE
Transactions on Information Theory, vol. 61, no. 3, pp. 1410–1425, 2015.
[12] D. D. Ariananda and G. Leus, “Compressive wideband power spectrum estimation,” IEEE Transactions on signal processing, vol. 60, no. 9, pp.
4775–4789, 2012.
[13] A. Koochakzadeh and P. Pal, “Performance of uniform and sparse non-uniform samplers in presence of modeling errors: A cramér-rao bound based
study,” IEEE Transactions on Signal Processing, vol. 65, no. 6, pp. 1607–1621, 2017.
[14] J. D. Krieger, Y. Kochman, and G. W. Wornell, “Design and analysis of multi-coset arrays,” in 2013 IEEE International Conference on Acoustics, Speech
and Signal Processing. IEEE, 2013, pp. 3781–3785.
[15] ——, “Multi-coset sparse imaging arrays,” IEEE Transactions on Antennas and Propagation, vol. 62, no. 4, pp. 1701–1715, 2014.
[16] G. L. Nemhauser, L. A. Wolsey, and M. L. Fisher, “An analysis of approximations for maximizing submodular set functions,” Mathematical Programming,
vol. 14, no. 1, pp. 265–294, 1978.
[17] S. Fujishige, Submodular functions and optimization. Elsevier, 2005, vol. 58.
[18] N. Buchbinder, M. Feldman, J. Seffi, and R. Schwartz, “A tight linear time (1/2)-approximation for unconstrained submodular maximization,” SIAM
Journal on Computing, vol. 44, no. 5, pp. 1384–1402, 2015.
[19] J. Vondrák, “Symmetry and approximability of submodular maximization problems,” SIAM Journal on Computing, vol. 42, no. 1, pp. 265–304, 2013.
[20] B. Mirzasoleiman, A. Karbasi, R. Sarkar, and A. Krause, “Distributed submodular maximization: Identifying representative elements in massive data,”
in Advances in Neural Information Processing Systems, 2013, pp. 2049–2057.
[21] A. Krause, A. Singh, and C. Guestrin, “Near-optimal sensor placements in gaussian processes: Theory, efficient algorithms and empirical studies,” Journal
of Machine Learning Research, vol. 9, no. Feb, pp. 235–284, 2008.
[22] M. Shamaiah, S. Banerjee, and H. Vikalo, “Greedy sensor selection: Leveraging submodularity,” in 49th IEEE conference on decision and control (CDC).
IEEE, 2010, pp. 2572–2577.
[23] A. Krause and C. Guestrin, “Submodularity and its applications in optimized information gathering,” ACM Transactions on Intelligent Systems and
Technology (TIST), vol. 2, no. 4, p. 32, 2011.
[24] P. Stoica and A. Nehorai, “Performance study of conditional and unconditional direction-of-arrival estimation,” IEEE Transactions on Acoustics, Speech,
and Signal Processing, vol. 38, no. 10, pp. 1783–1795, 1990.
[25] M. Wang and A. Nehorai, “Coarrays, music, and the cramér–rao bound,” IEEE Transactions on Signal Processing, vol. 65, no. 4, pp. 933–946, 2017.
[26] A. Koochakzadeh and P. Pal, “Cramér–rao bounds for underdetermined source localization,” IEEE Signal Processing Letters, vol. 23, no. 7, pp. 919–923,
2016.
[27] F. D. Neeser and J. L. Massey, “Proper complex random processes with applications to information theory,” Information Theory, IEEE Transactions on,
vol. 39, no. 4, pp. 1293–1302, 1993.
[28] J. L. Yen, “On nonuniform sampling of bandwidth-limited signals,” Circuit Theory, IRE Transactions on, vol. 3, no. 4, pp. 251–257, 1956.
14
[29] D. J. Wingham, “The reconstruction of a band-limited function and its fourier transform from a finite number of samples at arbitrary locations by singular
value decomposition,” Signal Processing, IEEE Transactions on, vol. 40, no. 3, pp. 559–570, 1992.
[30] Y. C. Eldar, Sampling Theory: Beyond Bandlimited Systems. Cambridge University Press, 2015.
[31] M. K. Mihcak, I. Kozintsev, K. Ramchandran, and P. Moulin, “Low-complexity image denoising based on statistical modeling of wavelet coefficients,”
IEEE Signal Processing Letters, vol. 6, no. 12, pp. 300–303, 1999.
[32] A. Levin, R. Fergus, F. Durand, and W. T. Freeman, “Image and depth from a conventional camera with a coded aperture,” ACM transactions on graphics
(TOG), vol. 26, no. 3, p. 70, 2007.
[33] A. Levin, Y. Weiss, F. Durand, and W. T. Freeman, “Understanding and evaluating blind deconvolution algorithms,” in Computer Vision and Pattern
Recognition, 2009. CVPR 2009. IEEE Conference on. IEEE, 2009, pp. 1964–1971.
[34] A. Kulesza, B. Taskar et al., “Determinantal point processes for machine learning,” Foundations and Trends R in Machine Learning, vol. 5, no. 2–3,
pp. 123–286, 2012.
[35] G. Friesecke, “Lecture notes in fourier analysis [MA4064],” 2013.
[36] K. Chaloner and I. Verdinelli, “Bayesian experimental design: A review,” Statistical Science, pp. 273–304, 1995.
[37] J. M. Bernardo, “Expected information as expected utility,” The Annals of Statistics, pp. 686–690, 1979.
[38] A. Krause and C. E. Guestrin, “Near-optimal nonmyopic value of information in graphical models,” Proceedings of the Twenty-First Conference on
Uncertainty in Artificial Intelligence, 2012.
[39] U. Feige, “A threshold of ln n for approximating set cover,” Journal of the ACM (JACM), vol. 45, no. 4, pp. 634–652, 1998.
[40] M. Minoux, “Accelerated greedy algorithms for maximizing submodular set functions,” in Optimization Techniques. Springer, 1978, pp. 234–243.
[41] J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. VanBriesen, and N. Glance, “Cost-effective outbreak detection in networks,” in Proceedings of the
13th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 2007, pp. 420–429.
[42] J. G. Oxley, Matroid theory. Oxford University Press, USA, 2006, vol. 3.
[43] A. Krause and D. Golovin, “Submodular function maximization,” Tractability: Practical Approaches to Hard Problems, vol. 3, p. 19, 2012.
[44] G. Calinescu, C. Chekuri, M. Pál, and J. Vondrák, “Maximizing a monotone submodular function subject to a matroid constraint,” SIAM Journal on
Computing, vol. 40, no. 6, pp. 1740–1766, 2011.
[45] T. Adali, P. J. Schreier, and L. L. Scharf, “Complex-valued signal processing: The proper way to deal with impropriety,” IEEE Transactions on Signal
Processing, vol. 59, no. 11, pp. 5101–5125, 2011.
[46] G. Shulkind, S. Jegelka, and G. W. Wornell, “Multiple wavelength sensing array design,” in Acoustics, Speech and Signal Processing (ICASSP), 2017
IEEE International Conference on. IEEE, 2017, pp. 3424–3428.
| 7cs.IT
|
Mining Process Model Descriptions of Daily Life
through Event Abstraction
arXiv:1705.10202v1 [cs.LG] 25 May 2017
N. Tax, N. Sidorova, R. Haakma, W.M.P. van der Aalst
Abstract Process mining techniques focus on extracting insight in processes from
event logs. Process mining has the potential to provide valuable insights in (un)healthy
habits and to contribute to ambient assisted living solutions when applied on data
from smart home environments. However, events recorded in smart home environments are on the level of sensor triggers, at which process discovery algorithms
produce overgeneralizing process models that allow for too much behavior and that
are difficult to interpret for human experts. We show that abstracting the events to
a higher-level interpretation can enable discovery of more precise and more comprehensible models. We present a framework for the extraction of features that can
be used for abstraction with supervised learning methods that is based on the XES
IEEE standard for event logs. This framework can automatically abstract sensorlevel events to their interpretation at the human activity level, after training it on
training data for which both the sensor and human activity events are known. We
demonstrate our abstraction framework on three real-life smart home event logs and
show that the process models that can be discovered after abstraction are more precise indeed.
Niek Tax
Eindhoven University of Technology, e-mail: [email protected]
Natalia Sidorova
Eindhoven University of Technology e-mail: [email protected]
Reinder Haakma
Philips Research e-mail: [email protected]
Wil M.P. van der Aalst
Eindhoven University of Technology e-mail: [email protected]
1
2
N. Tax, N. Sidorova, R. Haakma, W.M.P. van der Aalst
1 Introduction
Process mining is a fast growing discipline that combines methods from computational intelligence, data mining, process modeling and process analysis [1]. Process discovery, the task of extracting process models from logs, plays an important role in process mining. There are many different process discovery algorithms
([2, 7, 37, 36, 18]), which can discover many different types of process models, including BPMN models, Petri nets, process trees, UML activity diagrams, and statecharts.
While originally the scope of process mining has been on business processes, it
has broadened in recent years towards other application areas, including the analysis
of human behavior [29, 31, 32]. Process model descriptions of human behavior can
be used amongst others to aid lifestyle coaching for healthy living, or to asses the
ability of independent living of elderly or people with illness.
Events in the event log are generated by e.g. motion sensors placed in the home,
power sensors placed on appliances, open/close sensors placed on closets and cabinets, etc. This clearly distinguishes process mining for smart homes from the traditional application domain of business processes, where events in the log are logged
by IT systems when an business tasks are performed.
In event logs from business processes the event labels generally have a clear
semantic meaning, like register mortgage request. In the smart home domain the
events are on the sensor level, while the human expert is interested in analyzing the
behavior in terms of activities of daily life. Additionally, simply using the sensor that
generated the event as the event label has been shown to result in non-informative
process models that overgeneralize the event log and allow for too much behavior [34]. In the field of process mining such overgeneralizing process models are
generally referred to as being imprecise.
In our earlier work [31] we showed how to discover more precise process models
by taking the name of the sensor as a starting point for the event label and then refine
the labels using the time of the day at which the event occurred. However, labels in
such process models still represent sensors, and they have no direct interpretation
on the human activity level. In this paper we leverage diary style annotations of
the activities performed on a human activity level and use them learn a mapping
from sensor-level events to human activity events. This enables discovery of process
models that describe the human activities directly, leading to more comprehensible
and more precise descriptions of human behavior. Often it is infeasible or simply too
expensive to obtain such diaries for periods of time longer than a couple of weeks.
To mine a process model of human behavior more than a couple of weeks of data is
needed. Therefore, there is a need to infer human level interpretations of behavior
from sensors.
With supervised learning techniques the mapping from sensor-level events to
human activity level events can be learned through examples, without requiring a
hand-made ontology of how human activities relate to sensors. Similar approaches
have been explored in the activity recognition field, where continuous-valued time
series from sensors are mapped to time series of human activity. Change points in
Mining Process Model Descriptions of Daily Life through Event Abstraction
3
these time series are triggered by sensor-level events like opening/closing the fridge
door, and the annotations of the higher level events (e.g. cooking) are often obtained
through manual activity diaries. However, in contrast to techniques from the activity recognition field, we operate on discrete events on the sensor-level instead of
continuous time series.
In this paper we extend the work started in [33]. We describe a framework for
supervised abstraction of events that enables the discovery of more precise process
models from smart home event logs. Additionally, the process models obtained represent human activity directly, thereby enabling direct analysis of human behavior
itself, instead of indirect analysis through sensor-level models. In Section 2 we give
an overview of the related work from the activity recognition field. Basic concepts,
notations, and definitions that we use throughout the rest of the paper are introduced
in Section 3. In Section 4 we explain conceptually why abstraction from sensor-level
to human activity level events can help to the process discovery step to find more
precise process models. In Section 5 we describe a framework for retrieving useful
features for abstraction from event logs using specific concepts of the IEEE XES
standard for event logs [12]. Section 6 demonstrates the added value of supervised
event abstraction for process mining in the smart home domain and show that it
enables discovery of more precise models on three real life smart home event logs.
Section 7 concludes the paper and identifies some areas of future work.
2 Related Work
Event abstraction based on supervised learning is an unexplored problem in process
mining. Most related work for abstracting from sensor-level to human activity level
events can be found in the field of activity recognition, which focuses on the task
of detecting different types of human activity from either passive sensors [14, 30],
wearable sensors [3, 16], or cameras [22].
Activity recognition methods generally operate on discrete time windows over
the time series of continuous-valued sensor values and aim to map each time window onto the correct type of human activity, e.g. eating or sleeping. Activity recognition methods can be classified into probabilistic approaches [14, 30, 3, 16] and ontological reasoning approaches [5, 25]. The advantage of probabilistic approaches
over ontological reasoning approaches is their ability to handle noisy, uncertain and
incomplete sensor data [5].
Tapia [30] was the first to explore supervised learning for inference of human
activities from passive sensors, using a naive Bayes classifier. Many more recent
activity recognition approaches use probabilistic graphical models [14, 13]: Van
Kasteren et al. [14] explored Conditional Random Fields [17] and Hidden Markov
Models [23], and Van Kasteren and Kröse [13] applied Bayesian Networks [10]
on the activity recognition task. Kim et al. [15] found Hidden Markov Models to
be unable to capture long-range or transitive dependencies between observations,
4
N. Tax, N. Sidorova, R. Haakma, W.M.P. van der Aalst
which results in difficulties recognizing multiple interacting activities (concurrent
or interwoven). Conditional Random Fields do not possess these limitations.
Our work differentiates itself from existing activity recognition work in the form
of the input data on which they operate and in the goal that it aims to achieve. On the
input side, activity recognition techniques consider the data to be a multidimensional
time series of the sensor values over time, based on which time windows are mapped
onto human activities. An appropriate time window size is determined using domain
knowledge of the data set. Instead, we aim for a generic method that does not require
this domain knowledge, and that works in general for any event log. An approach
based on time windows contrasts with our aim for generality, as no single time
window size exists that is suitable for all event logs. The durations of the events
within a single event log might differ drastically (e.g. one event might take seconds,
while another event takes months), in which case time window based approaches
will either miss short events in case of larger time windows or resort to very large
numbers of time windows resulting in very long computational time. Therefore, we
map each individual sensor-level event to a human activity level event and do not
use time windows. In a smart home environment context with passive sensors, each
change in a binary sensor value can be considered to be a low-level event. A second
difference with existing activity recognition techniques is that our framework aims
to find an abstraction of the data that enables discovery of more precise process
models, where classical activity recognition methods do not have a link with the
application of process mining.
Other related work can be found in the area of process mining, where several
techniques address the challenge of abstracting low-level (e.g. sensor-level) events
to high level (e.g. human activity level) events ([4, 11, 9]). Most existing event
abstraction methods rely on clustering methods, where each cluster of low-level
events is interpreted as one single high-level event. However, using unsupervised
learning introduces two new problems. First, it is unclear how to label high-level
events that are obtained by clustering low-level events. Current techniques require
the user / process analyst to provide high-level event labels themselves based on
domain knowledge. Secondly, unsupervised learning gives no guidance with respect
to the desired level of abstraction. Many existing event abstraction methods contain
one or more parameters to control the size the clusters, and finding the right level of
abstraction providing meaningful results is often a matter of trial-and-error.
One abstraction technique from the process mining field that does not rely on
unsupervised learning is proposed by Mannhardt et al. [20]. This approach relies on
domain knowledge to abstract low-level events into high-level events, requiring the
user to specify a low-level process model for each high-level activity. However, in
the context of human behavior it is unreasonable to expect the user to provide the
process model in sensor terms for each human activity from domain knowledge.
Mining Process Model Descriptions of Daily Life through Event Abstraction
5
3 Preliminaries
In this section we introduce basic concepts and notation used throughout the paper.
We use the standard sequence definition, and denote a sequence by listing its
elements, e.g. we write ha1 , a2 , . . . , an i for a (finite) sequence s : {1, . . . , n} → S of
elements from some alphabet S, where s(i) = ai for any i ∈ {1, . . . , n}.
3.1 Petri nets
A process modeling notation that is commonly used in process mining is the Petri
net. Petri nets are directed bipartite graphs consisting of transitions and places, connected by arcs. Transitions represent activities, while places represent the state of
the system before and after execution of a transition. Labels are assigned to transitions to indicate the type of activity that they represent. A special label τ is used to
represent invisible transitions, which are only used for routing purposes and do not
represent any real activity.
Definition 1 (Labeled Petri net). A labeled Petri net is a tuple N = (P, T, F, R, ℓ)
where P is a finite set of places, T is a finite set of transitions such that P ∩ T = 0,
/
and F ⊆ (P × T ) ∪ (T × P) is a set of directed arcs, called the flow relation, R is
/ R is a label representing an
a finite set of labels representing event types, with τ ∈
invisible action, and ℓ : T → R ∪ {τ } is a labeling function that assigns a label to
each transition.
The state of a Petri net is defined w.r.t. the state that a process instance can be in
during its execution. A state of a Petri net is captured by the marking of its places
with tokens. In a given state, each place is either empty, or it contains a certain
number of tokens. A transition is enabled in a given marking if all places with an
outgoing arc to this transition contain at least one token. Once a transition fires (i.e.
is executed), a token is removed from all places with outgoing arcs to the firing transition and a token is put to all places with incoming arcs from the firing transition,
leading to a new state.
Definition 2 (Marking, Enabled transitions, and Firing). A marked Petri net is
a pair (N, M), where N = (P, T, F, L, ℓ) is a labeled Petri net and M ∈ NP denotes
the marking of N. For n ∈ (P ∪ T ) we use •n and n• to denote the set of inputs and
outputs of n respectively. Let C(s, e) indicate the number of occurrences (count) of
element e in multiset s. A transition t ∈ T is enabled in a marking M of net N if
∀p ∈ •t : C(M, p) > 0. An enabled transition t may fire, removing one token from
each of the input places •t and producing one token for each of the output places t•.
Figure 1 shows four Petri nets, with the circles representing places, the squares
representing transitions. The gray rectangles represent (invisible) τ -transitions.
belong to the final marking, indicating that the process exPlaces depicted as
ecution can terminate in this marking.
6
N. Tax, N. Sidorova, R. Haakma, W.M.P. van der Aalst
The Petri net shown in Figure 1c initially has one token in the place p1, indicated
by the dot. Firing the enabled silent transition takes the token from p1 and puts a
token in both p2 and p3, enabling both MC and DCC. When MC fires, it takes the
token from p2 and puts a token in p4. When DCC fires, it takes the token from p3
and puts a token in p5. After MC and DCC have both fired, resulting in a token in
both p4 and p5, W is enabled. Executing W takes the token from both p4 and p5,
and puts a token in p6, which is a place that belongs to the final marking, indicates
that the process execution can stop here. Alternatively, it can fire the silent transition, taking the token from p6 and placing a token in p2 and p5, which allows for
execution of MC and W to reach the marking consisting of p6 again. We refer the
interested reader to [24] for an extensive review of Petri nets.
3.2 Conditional Random Field
We consider the recognition of human activity level events as a sequence labeling
task in which each sensor-level event is classified into one of the human activity
level events. Linear-chain Conditional Random Fields (CRFs) [17] are a type of
probabilistic graphical model which has shown to perform well on many sequence
labeling tasks in the fields of language processing and computer vision. Conceptually CRFs can be regarded as a sequential version of multiclass logistic regression,
i.e., the predictions in the prediction sequence are dependent on each other. A CRF
models the conditional probability distribution of the label sequence given an observation sequence using a log-linear model. Linear-chain CRFs take the following
form:
p(y|x) =
1
exp( ∑ ∑ λk fk (t, yt−1 , yt , x))
Z(x)
t=1 k
(1)
where Z(x) is the normalization factor which makes sure that the values of the probability distribution range from zero to one. X = hx1 , . . . , xn i is an observation sequence (the sensor-level events), Y = hy1 , . . . , yn i is the associated label sequence
(the human activity level events), fk and λk respectively are feature functions and
their weights. Feature functions, which can be binary or real valued, are defined
on the observations and are used to compute label probabilities. In contrast to Hidden Markov Models [23], CRFs do not assume the feature functions to be mutually
independent.
4 Motivating Example
Figure 1 shows a simplistic example demonstrating how a process can seem unstructured at the sensor level of events, while being structured at a human behavior level.
Petri net 1c shows the process at the human activity level. The Taking medicine hu-
Mining Process Model Descriptions of Daily Life through Event Abstraction
DCC
MC
p2
7
CD
p4
W
p1
p6
DCC
p3
p5
DCC = Dishes & Cups Cabinet
MC = Medicine Cabinet
W = Water
CD = Cutlery Drawer
D = Dishwasher
DCC = Dishes & Cups Cabinet
D
(b)
(a)
Taking Medicine
Eating
(c)
(d)
Fig. 1 A human activity level process model (c) where the two transitions themselves are defined
as process models (shown in a and b), and the Inductive Miner result on the sensor-level traces
generated from this model (d).
man activity level activity is itself defined as a process, which is shown in Figures
1a to 1c. Eating is also defined as a process, which is shown in Figure 1b. When we
apply the Inductive Miner process discovery algorithm [18] to sensor-level traces
generated by the hierarchical process of Figure 1c, we obtain the process model
shown in Figure 1d. This process model allows for almost all possible sequences
over the alphabet {CD, D, DCC, MC,W }, with the only constraint introduced by the
model being that if a W occurs, then it has to be preceded by a DCC event. Firing
of all other transitions in the model can be skipped. Behaviorally this model is very
close to the so called ”flower” model [1], the model that allows for all behavior over
its alphabet. The alternating structure between Taking medicine and Eating that was
present in the human activity level process in Figure 1c cannot be observed in the
process model in Figure 1d. This is caused by high variance in start and end events
of the sensor-level subprocesses of Taking medicine and Eating as well as by the
overlap in types of activities between these two subprocesses. Both subprocesses
contain DCC, and the miner cannot see that there are actually two different contexts
for the DCC activity to split the label in the model. Abstracting the sensor-level
events to their respective human activity level events before applying process discovery to the resulting human activity log unveils the alternating structure between
Eating and Taking medicine as shown in Figure 1c.
8
N. Tax, N. Sidorova, R. Haakma, W.M.P. van der Aalst
Fig. 2 XES event log meta-model, as defined in [12].
5 Event Abstraction as a Sequence Labeling Task
In this section we describe the framework for supervised abstraction of events based
on Conditional Random Fields (CRFs). Additionally, we describe feature functions
for event logs in a general way by using the IEEE XES standard [12]. XES, which is
an abbreviation for eXtensible Event Stream, is the IEEE standard for process mining event logs. An overview of the XES file structure which is shown in Figure 2.
An event log is defined as a set of traces, which in itself are a sequences of events.
The log, traces and events can all contain one or more attributes, which consist of
a key and a value of a certain type. Event or trace attributes may be global, which
indicates that the attribute needs to be defined for each event or trace respectively.
A log contains one or more classifiers, which can be seen as labeling functions on
the events of a log, defined on global event attributes. Extensions define a set of
attributes on log, trace, or event level, in such a way that the semantics of these
attributes are clearly defined. One can view XES extensions as a specification of attributes that events, traces, or event logs themselves frequently contain. XES defines
the following standard extensions:
Mining Process Model Descriptions of Daily Life through Event Abstraction
9
Concept Specifies the generally understood name of the event/trace/log (attribute
’Concept:name’).
Lifecycle Specifies the lifecycle phase (attribute ’Lifecycle:transition’) that the
event represents in a transactional model of their generating activity. The Lifecycle extension also specifies a standard transactional model for activities.
Organizational Specifies three attributes for events, which identify the actor having caused the event (attribute ’Organizational:resource’), his role in the organization (attribute ’Organizational:role’), and the group or department within the
organization where he is located (attribute ’Organizational:group’).
Time Specifies the date and time at which an event occurred (attribute ’Time:timestamp’).
We introduce a special attribute of type String with key label, which represents
the human activity level activity. The concept name of an event is then considered to
be a sensor-level name of an event. The label attribute specifies the human activity
level label for each event individually, allowing for example one sensor-level event
of type Dishes & cups cabinet to be of human activity level type Taking medicine,
and another sensor-level event of the same type to be of human level activity type
Eating. Note that for some traces human level activity annotations might be available, in which case its events contain the label attribute, while other traces might not
be annotated. Human activity level interpretations of unannotated traces, obtained
by inferring the label attribute based on information that is present in the annotated
traces, allow the use of unannotated traces for process discovery and conformance
checking on a human activity level.
Figure 3 provides a conceptual overview of the supervised event abstraction
method. The approach takes two inputs: 1) a set of annotated traces, which are traces
where the human activity level event that each sensor level event belongs to (the label attribute of the sensor-level event) is known, and 2) a set of unannotated traces,
which are traces where only the sensor-level events known. Conditional Random
Fields (CRFs) are trained of the annotated traces to create a probabilistic mapping
from sensor-level events to human activity level events. This mapping, once obtained, can be applied to the unannotated traces in order to estimate the corresponding human activity level event for each sensor-level event (its label attribute). Often
multiple consecutive sensor-level events will have the same label attribute. We assume that multiple human activity level events cannot occur in parallel. This enables
us to interpret a sequence of events with identical label values as a single human activity level event. To obtain a final human activity level log, we collapse sequences
of events with the same value for the label attribute into two events with this value
as concept name, where the first event has a lifecycle ’start’ and the second has the
lifecycle ’complete’. Table 1 and Table 2 illustrate this collapsing procedure through
an input and output event log.
The method described in this section is implemented and available for use as
package AbstractEventsSupervised in the ProM 6 [35] process mining toolkit and
makes use of the GRMM [28] implementation of CRFs.
We now show for each XES extension how it can be translated into useful feature
functions for event abstraction. Note that we do not limit ourselves to XES logs that
10
N. Tax, N. Sidorova, R. Haakma, W.M.P. van der Aalst
Table 1 A trace with predicted human activity level annotations (label)
Case Time:timestamp
Concept:name
label
1
1
1
1
1
1
1
1
Medicine cabinet
Dishes & cups cabinet
Water
Dishes & cups cabinet
Dishwasher
Dishes & cups cabinet
Medicine cabinet
Water
Taking medicine
Taking medicine
Taking medicine
Eating
Eating
Taking medicine
Taking medicine
Taking medicine
03/11/2015 08:45:23
03/11/2015 08:46:11
03/11/2015 08:46:45
03/11/2015 08:47:59
03/11/2015 08:47:89
03/11/2015 17:10:58
03/11/2015 17:10:69
03/11/2015 17:11:18
Table 2 The resulting human activity level log after collapsing the consecutive identical label
values of the trace in Table 1.
Case Time:timestamp
Concept:name
Lifecycle:transition
1
1
1
1
1
1
Taking medicine
Taking medicine
Eating
Eating
Taking medicine
Taking medicine
Start
Complete
Start
Complete
Start
Complete
03/11/2015 08:45:23
03/11/2015 08:46:45
03/11/2015 08:47:59
03/11/2015 08:47:89
03/11/2015 17:10:58
03/11/2015 17:11:18
Fig. 3 Conceptual overview
of Supervised Event Abstraction.
Annotated traces
Learn
Sensor-level to
Activity-level
Mapping
Activity-level
log
Unannotated traces
Apply
Traces with
predicted
annotations
contain all XES extensions; when a log contains a subset of the extensions, a subset of the feature functions will be available for the supervised learning step. This
approach leads to a feature space of unknown size, potentially causing problems related to the curse of dimensionality. To address this we use L1-regularized CRFs. In
the training phase we search for values of weight vector λ that minimize the cross
entropy between the ground truth target and the predicted label on the training data.
L1-regularization adds a λ penalty terms to this minimization function that is proportionate to the size of the weight vector, giving the model an incentive not to use
all of the available features (i.e., setting some features to zero weight). This results
in prediction models that are sparse and therefore simpler, which helps to prevent
overfitting.
Mining Process Model Descriptions of Daily Life through Event Abstraction
11
Fig. 4 The histogram
representation and a Gaussian
Mixture Model fitted to
timestamps values of the
plates cupboard sensor in the
Van Kasteren data set.
5.1 From a XES Log to a Feature Space
We now discuss per XES extension how feature functions can be obtained.
Concept extension The sensor-level labels (concept names) of the preceding
events in a trace can contain useful contextual information for classification into
the correct human activity level event type. Based on the n-gram ha1 , a2 , . . . , an i
consisting of the sensor-level labels of the n last-seen events in a trace, we can
estimate a categorical probability distribution over the classes of human activity
level activities from the training log, such that the probability of class l is equal to the
number of times that the n-gram was observed while the n-th event was annotated
with class l, divided by the total number of times that the n-gram was observed.
The CRF model requires feature functions with numerical range. A feature function
based on the concept extension has two parameters, n and l, and is valued with the
estimated categorical probability density of the current sensor-level event having
human activity level label l given the n-gram with the last n sensor-level event labels.
It can be useful to combine multiple features that are based on the concept extension,
where the features have different values for n and l.
Organizational extension Similar to the concept extension feature functions,
categorical probability distributions can be estimated on the training set for ngrams of resource, role, or group attributes of the last n events. Likewise, an organizational extension based feature function with three parameters, n-gram size
n, o ∈ {resource, role, group}, and label l, is valued with the probability density
according to the estimated categorical probability distribution of label l given the
n-gram of the last n event resources/roles/groups.
Time extension In terms of time, there are several potentially existing patterns.
A certain type of human activity might for example be concentrated in a certain
parts of a day, of a week, or of a month. This concentration can however not be
modeled with a single Gaussian distribution, as it might be the case that a type of
human activity has high probability to occur in the morning or in the evening, but
low probability to occur in the afternoon in-between. A mixture distribution consisting of multiple components is therefore needed to model the probability distri-
12
N. Tax, N. Sidorova, R. Haakma, W.M.P. van der Aalst
bution over timestamps. The most well-known mixture distribution is the Gaussian
Mixture Model (GMM), where each component of the mixture is defined by a normal distribution. The circular, non-Euclidean, nature of the data space of time-ofthe-day, time-of-the-week, or time-of-the-month however introduces problems for
the GMM, as, using time-of-the-day as an example, 00:00 is actually very close
to 23:59. Figure 4 illustrates this problem. The Gaussian component with a mean
around 10 o’clock has a standard deviation that is much higher than what one would
expect when looking at the histogram, as the GMM tries to explain the data points
just after midnight with this component. These data points just after midnight would
however have been much better explained with the Gaussian component with the
mean around 20 o’clock, which is much closer in time. Alternatively, we use a
mixture model with components of the von Mises distribution, which is a close
approximation of a normal distribution wrapped around the circle. To determine the
correct number of components of such a von Mises Mixture Model (VMMM) we
use Bayesian Information Criterion (BIC) [27], choses the number of components
which explains the data with the highest likelihood, while adding a penalty for the
number of model parameters. A VMMM is estimated on training data, modeling the
probabilities of each type of human activity based on the time passed since the start
of the day, week or month. A time extension feature function with two parameters,
t ∈ {day, week, month, . . .} and label l, is valued with the VMMM-estimated probability of label l given the t view on the event timestamp. An alternative approach to
estimate the probability density on data that lies on a manifold, such as a circle, is
described by Cohen and Welling [6].
Lifecycle extension & Time extension The XES standard [12] defines several
lifecycle stages of process activities, which represent the transactional model of their
generating activity. Lifecycle values that are commonly found in real life logs are
start and complete which respectively represent when this activity started and ended
However, a larger set of lifecycle values is defined in the XES standard, including
schedule, suspend, and resume. The time differences between different stages of an
activity lifecycle can be calculated when an event log possesses both the lifecycle
extension and the time extension. For example, when observing the complete of an
activity, the time between this complete and the corresponding start of this activity
can contain useful information for predicting the correct human activity label. Finding the associated start event becomes nontrivial when multiple instances of the
same activity are in parallel, as it is then unknown which complete event belongs
to which start event. We assume consecutive lifecycle steps of activities running
in parallel to occur in the same order as the preceding lifecycle step. For example,
when we observe two start events of an activity of type A in a row, followed by two
complete events of type A, we assume the first complete to belong to the first start,
and the second complete to belong to the second start.
The XES standard defines an ordering over the lifecycle values. For each type
of human activity, we fit a Gaussian Mixture Model (GMM) to the set of time differences between each two consecutive lifecycle steps. A feature based on both the
combination of the lifecycle and the time extension with activity label parameter
l and lifecycle c is valued the probability density of activity l as estimated by the
Mining Process Model Descriptions of Daily Life through Event Abstraction
13
GMM given the time between the current event and lifecycle value c. Bayesian Information Criterion (BIC) [27] is again used to determine the number of components
of the GMM. Note that while these features are time-based, regular GMMs can be
used instead of VMMMs since time duration is a Euclidean, non-circular, space.
5.2 Evaluating Human Activity Level Event Predictions for
Process Mining Applications
Existing approaches in the field of activity recognition take as input time windows
where each time window is represented by a feature vector that describes the sensor
activity or status during that time window. Hence, evaluation methods in the activity
recognition field are window-based, using evaluation metrics like the percentage of
correctly classified time slices [30, 13, 14]. There are two reasons to deviate from
this evaluation methodology in a process mining setting. First, our method operates
on events instead of time windows. Second, the accuracy of the resulting high level
sequences is much more important for many process mining techniques (e.g. process
discovery, conformance checking) than the accuracy of predicting each individual
minute of the day.
A well-known metric for the distance of two sequences is the Levenshtein distance [19]. However, Levenshtein distance is not suitable to compare sequences of
human actions, as human behavior sometimes includes branches in which it does
not matter in which order two activities are performed. For example, most people
shower and have breakfast after waking up, but people do not necessarily always
perform the two in the same order. Indeed, when ha, bi is the sequence of predicted
human activities, and hb, ai is the actual sequence of human activities, we consider
this to be only a minor error, since it is often not relevant in which order two parallel
activities are executed. Levenshtein distance would assign a cost of 2 to this abstraction, as transforming the predicted sequence into the ground truth sequence would
require one deletion and one insertion operation. For example, most people shower
and have breakfast after waking up, but people do not necessarily always perform
the two in the same order. An evaluation measure that better reflects the prediction
quality of event abstraction is the Damerau-Levenstein distance [8], which adds a
swapping operation to the set of operations used by Levenshtein distance. DamerauLevenshtein distance would assign a cost of 1 to transform ha, bi into hb, ai. To obtain comparable numbers for different numbers of predicted events we normalize the
Damerau-Levenshtein distance by the maximum of the length of the ground truth
trace and the length of the predicted trace and subtract the normalized DamerauLevenshtein distance from 1 to obtain Damerau-Levenshtein Similarity (DLS).
14
N. Tax, N. Sidorova, R. Haakma, W.M.P. van der Aalst
6 Case Studies
In this section we evaluate the supervised event abstraction framework on three case
studies on real life smart home data sets.
6.1 Experimental setup
We include three real life smart home event logs in the evaluation: the Van Kasteren
event log [14], and two event logs from a smart home experiment conducted by MIT
[30]. All three event logs used in for the evaluation consist of multidimensional time
series data with all dimensions binary, where each binary dimension represents the
state of one in-home sensor. These sensors include motion sensors, open/close sensors, and power sensors (discretized to 0/1 states). We transform the multidimensional time series data from sensors into events by regarding each sensor change
point as an event. Cases are created by grouping events together that occurred in the
same day, with a cut-off point at midnight. High-level labels are provided for the
event logs.
The following XES extensions can be used for these event logs:
Concept The sensor that generated the event.
Time The time stamp of the sensor change point.
Lifecycle Start when the event represents a sensor value change from 0 to 1 and
Complete when it represents a sensor value change from 1 to 0.
Note that human activity level annotations are provided for all traces in the three
event logs. To evaluate how well the supervised event abstraction method generalized to unannotated traces, we artificially use a part of the traces to train the abstraction model and apply them on a test set where we regard the annotations to
be non-existent. We evaluate the obtained human activity labels against the ground
truth labels in a Leave-One-Trace-Out-Cross-Validation setup where we iteratively
leave out one trace to evaluate how well this mapping generalizes to unseen events
and cases. We measure the accuracy of the human activity level traces compared
to the ground truth human activity level traces in terms of Damerau-Levenshtein
similarity [8].
Additionally, we evaluate the quality of the process model that can be discovered from the human activity level traces. To discover a process model from the
human activity level event log we use the Inductive Miner [18]. There are several
criteria to express the fit between a process model and an event log in the area of
process mining. Two of those criteria are fitness [26], which measures the degree to
which the behavior that is observed in the event log can be replayed on the process
model, and precision [21], which measures the degree to which the behavior that
was never observed in the event log cannot be replayed on the process model. Low
precision typically is indicates an overly general process model, that allows for too
Mining Process Model Descriptions of Daily Life through Event Abstraction
15
much behavior. We compare the fitness and precision of the models produced by the
Inductive Miner on the sensor-level log and the human activity level log.
6.2 Case Study 1: Van Kasteren Event Log
For the first case study we use the smart home environment log described in Van
Kasteren et al. [14]. The Van Kasteren log contains 1285 events divided over fourteen different sensors. The log contains 23 days of data.
The average Damerau-Levenshtein similarity between the predicted human activity level traces in the Leave-One-Trace-Out-Cross-Validation experimental setup
and the ground truth human activity level traces is 0.7516, which shows that the
supervised event abstraction method produces traces which are fairly similar to the
ground truth.
Figure 5 shows the result of the Inductive Miner [18] for the sensor-level events
in the Van Kasteren data set. The resulting process model starts with a choice between four activities: hall-toilet door, hall-bedroom door, hall-bathroom door, and
frontdoor. After this choice the model branches into three parallel blocks, where the
upper block consists of a large choice between eight different activities. The other
two parallel blocks respectively contain a loop of the cups cupboard and the fridge.
This model closely resembles the flower model, which allows for all behavior in any
arbitrary order. There seems to be very little structure on this sensor level of event
granularity.
Figure 6 shows the result of the Inductive Miner on the aggregated set of predicted test traces. We can see that the main daily routine starts with breakfast, after
which the subject leaves the house to go to work. After work the subject prepares
dinner and goes to bed. The activities use toilet and take shower are put in parallel
to this sequence of activities, indicating that they occur at different places in the
sequences of activities.
Table 3 shows the effect of the abstraction on the fitness and precision of the
models discovered by the Inductive Miner. It shows that the precision of the model
discovered on the abstracted log is much higher than the precision of the model
discovered on the sensor data, indicating that the abstraction helps discovering a
model that is more behaviorally constrained and more specific.
6.3 Case Study 2: MIT Household A Event Log
For the second case study we use the data of household A of a smart home experiment conducted by MIT [30]. Household A contains data of 16 days of living, 2701
sensor-level events registered by 26 different sensors. The human level activities are
provided in the form of a taxonomy of activities on three levels, called heading, category and subcategory. On the heading level the human activities are very general in
16
N. Tax, N. Sidorova, R. Haakma, W.M.P. van der Aalst
Fig. 5 Inductive Miner result on the sensor-level events of the Van Kasteren event log.
Fig. 6 Inductive Miner result on the human activity level events discovered from the Van Kasteren
event log.
Table 3 Effect of abstraction on fitness and precision of the process model discovered by the
Inductive Miner.
Event log
Abstraction
Fitness
precision
Van Kasteren
Van Kasteren
No (Figure 5)
Yes (Figure 6)
0.9111
0.7918
0.3308
0.7804
MIT household A
MIT household A
No (Figure 7)
Yes (Figure 8)
0.9916
0.9880
0.2289
0.3711
MIT household B
MIT household B
No (Figure 9)
Yes (Figure 10)
1.0
0.9305
0.2389
0.4319
nature, such as the activity personal needs. The eight different activities on the heading level branch into 19 different activities on the category level, where personal
needs branches into e.g. eating, sleeping, and personal hygiene. The 19 categories
are divided over 34 subcategories, which contain very specific human activities. At
the subcategory level the category meal cleanup is for example divided into washing dishes and putting away dishes. At the subcategory level there are more types of
Mining Process Model Descriptions of Daily Life through Event Abstraction
17
Fig. 7 Inductive Miner result on the sensor-level MIT household A event log.
Fig. 8 Inductive Miner result on the discovered human activity level events on the MIT household
A log.
human activities than there are sensors-level activities, which makes the abstraction
task very hard. Therefore, we set the target label to the category level.
Figure 7 shows the model discovered with the Inductive Miner on the sensor-level
events of the MIT household A log. The model obtained allows for too much behavior, as it contains two large choice blocks. We found a Damerau-Levenshtein similarity of 0.6348 in the Leave-One-Trace-Out-Cross-Validation experiment. Note
that the abstraction accuracy on this log is lower than the abstraction accuracy on
the Van Kasteren event log. However, the MIT household A log contains more different types of human activity, resulting in a more difficult prediction task with a
higher number of possible target classes. Figure 10 shows the process model discovered from the human activity level traces that we predicted from the sensor-level
events. Even though the model is too large to print in a readable way, from its shape
it is clear that the abstracted model is much more behaviorally constrained than the
sensor-level model. The precision and fitness values in Table 3 show that indeed the
process model after abstraction has become behaviorally more specific while the
portion of behavior of the data that fits the process model remains more or less the
same.
18
N. Tax, N. Sidorova, R. Haakma, W.M.P. van der Aalst
Fig. 9 Inductive Miner result on the sensor-level MIT household B event log.
Fig. 10 Inductive Miner result on the discovered human activity level events on the MIT household
B log
6.4 Case Study 3: MIT Household B Event Log
For the third case study we use the data of household B of the MIT smart home
experiment [30]. Household B contains data of 17 days of living, 1962 sensorlevel events registered by 20 different sensors. Identically to MIT household A the
human-level activities are provided as a three-level taxonomy. Again, we use the
subcategory level of this taxonomy as target activity label.
The model discovered with the Inductive Miner [18] from the sensor-level events
is shown in Figure 9. The model obtained allows for too much behavior, as it
contains two large choice blocks. We found a Damerau-Levenshtein similarity of
0.5865 in the Leave-One-Trace-Out-Cross-Validation experiment, which is lower
than the similarity found on the MIT A data set while the target classes of the abstraction are the same for the two data sets. This can be explained by the fact that
there is less training data for this event log, as household B contains 1932 sensorlevel events where household A contains 2701 sensor-level events. Figure 10 shows
the process model discovered from abstracted log. Again this model is not readable
due to its size, but its shape shows it to be behaviorally quite specific. The precision
and fitness values in Table 3 also that process model after abstraction has indeed
Mining Process Model Descriptions of Daily Life through Event Abstraction
19
become behaviorally more specific while the portion of behavior of the data that fits
the process model decreased only slightly.
7 Conclusion
In this paper we presented a framework to abstract events using supervised learning
which has been implemented in the ProM process mining toolkit. An important
part of the framework is a generic way to extract useful features for abstraction
from the extensions defined in the XES IEEE standard for event logs. We propose
the Damerau-Levenshtein Similarity for evaluation of the abstraction results, and
motivate why it fits the application of process mining. Finally, we showed on three
real life smart home data sets that application of the supervised event abstraction
framework enables us to mine more precise process model description of human
life compared to what could be mined from the original data on the sensor-level.
Additionally, these process models contain interpretable event labels on the human
behavior activity level.
References
[1] van der Aalst WMP (2016) Process Mining: Data Science in Action. Springer
[2] van der Aalst WMP, Weijters T, Maruster L (2004) Workflow mining: Discovering process models from event logs. IEEE Transactions on Knowledge and
Data Engineering 16(9):1128–1142
[3] Bao L, Intille SS (2004) Activity recognition from user-annotated acceleration
data. In: Pervasive Computing, LNCS, Springer, pp 1–17
[4] Bose RPJC, van der Aalst WMP (2009) Abstractions in process mining: A
taxonomy of patterns. In: Business Process Management, LNCS, Springer, pp
159–175
[5] Chen L, Nugent C (2009) Ontology-based activity recognition in intelligent
pervasive environments. International Journal of Web Information Systems
5(4):410–430
[6] Cohen T, Welling M (2015) Harmonic exponential families on manifolds.
In: Proceedings of The 32nd International Conference on Machine Learning,
JMLR Workshop & Conference Proceedings, pp 1757–1765
[7] Conforti R, Dumas M, Garcı́a-Bañuelos L, La Rosa M (2016) BPMN miner:
Automated discovery of bpmn process models with hierarchical structure. Information Systems 56:284–303
[8] Damerau FJ (1964) A technique for computer detection and correction of
spelling errors. Communications of the ACM 7(3):171–176
20
N. Tax, N. Sidorova, R. Haakma, W.M.P. van der Aalst
[9] van Dongen BF, Adriansyah A (2010) Process mining: Fuzzy clustering and
performance visualization. In: Business Process Management Workshops,
Springer, LNBIP, pp 158–169
[10] Friedman N, Geiger D, Goldszmidt M (1997) Bayesian network classifiers.
Machine Learning 29(2-3):131–163
[11] Günther CW, Rozinat A, van der Aalst WMP (2010) Activity mining by global
trace segmentation. In: Business Process Management Workshops, Springer,
LNBIP, pp 128–139
[12] IEEE (2016) IEEE standard for eXtensible Event Stream (XES) for achieving
interoperability in event logs and event streams. IEEE Std 1849-2016 pp 1–50,
DOI 10.1109/IEEESTD.2016.7740858
[13] van Kasteren T, Kröse B (2007) Bayesian activity recognition in residence for
elders. In: Proceedings of the 3rd IET International Conference on Intelligent
Environments, IEEE, pp 209–212
[14] van Kasteren T, Noulas A, Englebienne G, Kröse B (2008) Accurate activity
recognition in a home setting. In: Proceedings of the 10th International Conference on Ubiquitous Computing, ACM, pp 1–9
[15] Kim E, Helal S, Cook D (2010) Human activity recognition and pattern discovery. Pervasive Computing 9(1):48–53
[16] Kwapisz JR, Weiss GM, Moore SA (2011) Activity recognition using cell
phone accelerometers. ACM SIGKDD Explorations Newsletter 12(2):74–82
[17] Lafferty J, McCallum A, Pereira FCN (2001) Conditional random fields: probabilistic models for segmenting and labeling sequence data. In: Proceedings of
the 18th International Conference on Machine Learning, Morgan Kaufmann
[18] Leemans SJJ, Fahland D, van der Aalst WMP (2013) Discovering blockstructured process models from event logs - a constructive approach. In: Application and Theory of Petri Nets and Concurrency, LNCS, Springer, pp 311–
329
[19] Levenshtein VI (1966) Binary codes capable of correcting deletions, insertions, and reversals. Soviet Physics Doklady 10:707–710
[20] Mannhardt F, de Leoni M, Reijers HA, van der Aalst WMP, Toussaint PJ
(2016) From low-level events to activities - a pattern-based approach. In: International Conference on Business Process Management, Springer, pp 125–141
[21] Munoz-Gama J, Carmona J (2010) A fresh look at precision in process conformance. In: International Conference on Business Process Management,
Springer, pp 211–226
[22] Poppe R (2010) A survey on vision-based human action recognition. Image
and Vision Computing 28(6):976–990
[23] Rabiner LR, Juang BH (1986) An introduction to hidden Markov models.
ASSP Magazine 3(1):4–16
[24] Reisig W (2012) Petri nets: an introduction, vol 4. Springer Science & Business Media
[25] Riboni D, Bettini C (2011) OWL 2 modeling and reasoning with complex
human activities. Pervasive and Mobile Computing 7(3):379–395
Mining Process Model Descriptions of Daily Life through Event Abstraction
21
[26] Rozinat A, van der Aalst WMP (2008) Conformance checking of processes
based on monitoring real behavior. Information Systems 33(1):64–95
[27] Schwarz G (1978) Estimating the dimension of a model. The Annals of Statistics 6(2):461–464
[28] Sutton C (2006) GRMM: Graphical models in Mallet. Implementation available at http://mallet{}cs{}umass{}edu/grmm
[29] Sztyler T, Carmona J, Völker J, Stuckenschmidt H (2016) Self-tracking
reloaded: applying process mining to personalized health care from labeled
sensor data. In: Transactions on Petri Nets and Other Models of Concurrency
XI, Springer Berlin Heidelberg, pp 160–180
[30] Tapia EM, Intille SS, Larson K (2004) Activity recognition in the home using
simple and ubiquitous sensors. In: Pervasive Computing, LNCS, Springer, pp
158–175
[31] Tax N, Alasgarov E, Sidorova N, Haakma R (2016) On generation of timebased label refinements. In: Proceedings of the 25th International Workshop
on Concurrency, Specification and Programming, CEUR-WS.org, pp 25–36
[32] Tax N, Sidorova N, van der Aalst WMP, Haakma R (2016) Heuristic approaches for generating local process models through log projections. In: Proceedings of IEEE Symposium on Computational Intelligence and Data Mining, To appear.
[33] Tax N, Sidorova N, Haakma R, van der Aalst WMP (2016) Event abstraction
for process mining using supervised learning techniques. In: Proceedings of
the SAI Intelligent Systems Conference, IEEE, pp 161–170
[34] Tax N, Sidorova N, Haakma R, van der Aalst WMP (2016) Log-based evaluation of label splits for process models. Procedia Computer Science 96:63–72
[35] Verbeek HMW, Buijs JCAM, Van Dongen BF, van der Aalst WMP (2010)
ProM 6: The process mining toolkit. In: Proceedings of the Business Process
Management Demonstration Track, CEUR-WS.org, pp 34–39
[36] Weijters AJMM, Ribeiro JTS (2011) Flexible heuristics miner (FHM). In: Proceedings of the IEEE Symposium on Computational Intelligence and Data
Mining, IEEE, pp 310–317
[37] van Zelst SJ, van Dongen BF, van der Aalst WMP (2015) Avoiding over-fitting
in ILP-based process discovery. In: International Conference on Business Process Management, Springer International Publishing, pp 163–171
| 2cs.AI
|
ACCEPTED TO IEEE TRANSACTIONS ON IMAGE PROCESSING
1
Skeleton Based Human Action Recognition with
Global Context-Aware Attention LSTM Networks
arXiv:1707.05740v5 [cs.CV] 11 Jan 2018
Jun Liu, Student Member, IEEE, Gang Wang, Senior Member, IEEE,
Ling-Yu Duan, Member, IEEE, Kamila Abdiyeva, Student Member, IEEE, and Alex C. Kot, Fellow, IEEE
Abstract—Human action recognition in 3D skeleton sequences
has attracted a lot of research attention. Recently, Long ShortTerm Memory (LSTM) networks have shown promising performance in this task due to their strengths in modeling the
dependencies and dynamics in sequential data. As not all skeletal
joints are informative for action recognition, and the irrelevant
joints often bring noise which can degrade the performance, we
need to pay more attention to the informative ones. However,
the original LSTM network does not have explicit attention
ability. In this paper, we propose a new class of LSTM network, Global Context-Aware Attention LSTM (GCA-LSTM), for
skeleton based action recognition, which is capable of selectively
focusing on the informative joints in each frame by using a
global context memory cell. To further improve the attention
capability, we also introduce a recurrent attention mechanism,
with which the attention performance of our network can be
enhanced progressively. Besides, a two-stream framework, which
leverages coarse-grained attention and fine-grained attention, is
also introduced. The proposed method achieves state-of-the-art
performance on five challenging datasets for skeleton based action
recognition.
Index Terms—Action Recognition, Long Short-Term Memory,
Global Context Memory, Attention, Skeleton Sequence.
I. I NTRODUCTION
CTION recognition is a very important research problem
owing to its relevance to a wide range of applications, such as video surveillance, patient monitoring, robotics,
human-machine interaction, etc [1], [2], [3]. With the development of depth sensors, such as RealSense and Kinect [4], [5],
[6], 3D skeleton based human action recognition has received
much attention, and a lot of advanced methods have been
proposed during the past few years [7], [8], [9], [10].
Human actions can be represented by a combination of the
motions of skeletal joints in 3D space [11], [12]. However,
this does not indicate all joints in the skeleton sequence
are informative for action recognition. For instance, the hand
joints’ motions are quite informative for the action clapping,
while the movements of the foot joints are not. Different action
sequences often have different informative joints, and in the
same sequence, the informativeness degree of a body joint
may also change over the frames. Thus, it is beneficial to
selectively focus on the informative joints in each frame of the
A
J. Liu, K. Abdiyeva, and A. C. Kot are with School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore, 639798.
E-mail: {jliu029, abdi0001, eackot}@ntu.edu.sg.
G. Wang is with Alibaba Group, Hangzhou, 310052, China. Email: [email protected].
L.-Y. Duan is with National Engineering Lab for Video Technology, Peking
University, Beijing, 100871, China. Email: [email protected].
Manuscript received July 1, 2017.
sequence, and try to ignore the features of the irrelevant ones,
as the latter contribute very little for action recognition, and
even bring noise which corrupts the performance [13]. This
selectively focusing scheme can also be called attention, which
has been demonstrated to be quite useful for various tasks,
such as speech recognition [14], image caption generation
[15], machine translation [16], and so on.
Long Short-Term Memory (LSTM) networks have strong
power in handling sequential data [17]. They have been
successfully applied to language modeling [18], RGB based
video analysis [19], [20], [21], [22], [23], [24], [25], [26], [27],
and also skeleton based action recognition [12], [28], [29].
However, the original LSTM does not have strong attention
capability for action recognition. This limitation is mainly
owing to LSTM’s restriction in perceiving the global context
information of the video sequence, which is, however, often
very important for the global classification problem – skeleton
based action recognition.
In order to perform reliable attention over the skeletal joints,
we need to assess the informativeness degree of each joint in
each frame with regarding to the global action sequence. This
indicates that we need to have global contextual knowledge
first. However, the available context information at each evolution step of LSTM is relatively local. In LSTM, the sequential
data is fed to the network as input step by step. Accordingly,
the context information (hidden representation) of each step
is fed to the next one. This implies the available context at
each step is the hidden representation from the previous step,
which is quite local when compared to the global information
1
.
In this paper, we extend the original LSTM model and
propose a Global Context-Aware Attention LSTM (GCALSTM) network which has strong attention capability for
skeleton based action recognition. In our method, the global
context information is fed to all evolution steps of the GCALSTM. Therefore, the network can use it to measure the
informativeness scores of the new inputs at all steps, and adjust
the attention weights for them accordingly, i.e., if a new input
is informative regarding to the global action, then the network
takes advantage of more information of it at this step, on the
contrary, if it is irrelevant, then the network blocks the input
at this step.
1 Though in LSTM, the hidden representations of the latter steps contain
wider range of context information than that of the initial steps, their context
is still relatively local, as LSTM has trouble in remembering information too
far in the past [30].
ACCEPTED TO IEEE TRANSACTIONS ON IMAGE PROCESSING
2
Second LSTM Layer
Refine
Attention Iteration #1
Attention Iteration #2
Global
Context
Memory
Informativeness Gate
Softmax
Classifier
First LSTM Layer
Initialize
Fig. 1: Skeleton based human action recognition with the Global Context-Aware Attention LSTM network. The first LSTM
layer encodes the skeleton sequence and generates an initial global context representation for the action sequence. The second
layer performs attention over the inputs by using the global context memory cell to achieve an attention representation for the
sequence. Then the attention representation is used back to refine the global context. Multiple attention iterations are performed
to refine the global context memory progressively. Finally, the refined global context information is utilized for classification.
Our proposed GCA-LSTM network for skeleton based
action recognition includes a global context memory cell and
two LSTM layers, as illustrated in Fig. 1. The first LSTM
layer is used to encode the skeleton sequence and initialize
the global context memory cell. And the representation of the
global context memory is then fed to the second LSTM layer to
assist the network to selectively focus on the informative joints
in each frame, and further generate an attention representation
for the action sequence. Then the attention representation is
fed back to the global context memory cell in order to refine
it. Moreover, we propose a recurrent attention mechanism
for our GCA-LSTM network. As a refined global context
memory is produced after the attention procedure, the global
context memory can be fed to the second LSTM layer again
to perform attention more reliably. We carry out multiple
attention iterations to optimize the global context memory
progressively. Finally, the refined global context is fed to the
softmax classifier to predict the action class.
In addition, we also extend the aforementioned design of our
GCA-LSTM network in this paper, and further propose a twostream GCA-LSTM, which incorporates fine-grained (jointlevel) attention and coarse-grained (body part-level) attention,
in order to achieve more accurate action recognition results.
The contributions of this paper are summarized as follows:
• A GCA-LSTM model is proposed, which retains the
sequential modeling ability of the original LSTM, meanwhile promoting its selective attention capability by introducing a global context memory cell.
• A recurrent attention mechanism is proposed, with which
the attention performance of our network can be improved
progressively.
• A stepwise training scheme is proposed to more effectively train the network.
• We further extend the design of our GCA-LSTM model,
and propose a more powerful two-stream GCA-LSTM
network.
The proposed end-to-end network yields state-of-the-art
performance on the evaluated benchmark datasets.
This work is an extension of our preliminary conference
paper [31]. Based on the previous version, we further propose
a stepwise training scheme to train our network effectively and
efficiently. Moreover, we extend our GCA-LSTM model and
further propose a two-stream GCA-LSTM by leveraging finegrained attention and coarse-grained attention. Besides, we
extensively evaluate our method on more benchmark datasets.
More empirical analysis of the proposed approach is also
provided.
The rest of this paper is organized as follows. In Section
II, we review the related works on skeleton based action
recognition. In Section III, we introduce the proposed GCALSTM network. In Section IV, we introduce the two-stream
attention framework. We provide the experimental results in
Section V. Finally, we conclude the paper in Section VI.
•
II. R ELATED W ORK
In this section, we first briefly review the skeleton based
action recognition methods which mainly focus on extracting
hand-crafted features. We then introduce the RNN and LSTM
based methods. Finally, we review the recent works on attention mechanism.
A. Skeleton Based Action Recognition with Hand-crafted Features
In the past few years, different feature extractors and classifier learning methods for skeleton based action recognition
have been proposed [32], [33], [34], [35], [36], [37], [38], [39],
[40], [41], [42], [43], [44].
Chaudhry et al. [45] proposed to encode the skeleton
sequences to spatial-temporal hierarchical models, and then
use linear dynamical systems (LDSs) to learn the dynamic
structures. Vemulapalli et al. [46] represented each action as
ACCEPTED TO IEEE TRANSACTIONS ON IMAGE PROCESSING
a curve in a Lie group, and then utlized a support vector
machine (SVM) to classify the actions. Xia et al. [47] proposed
to model the temporal dynamics in action sequences with
the Hidden Markov models (HMMs). Wang et al. [48], [49]
introduced an actionlet ensemble representation to model the
actions meanwhile capturing the intra-class variances. Chen
et al. [50] designed a part-based 5D feature vector to explore
the relevant joints of body parts in skeleton sequences. Koniusz
et al. [51] introduced tensor representations for capturing the
high-order relationships among body joints. Wang et al. [52]
proposed a graph-based motion representation in conjunction
with a SPGK-kernel SVM for skeleton based activity recognition. Zanfir et al. [53] developed a moving pose framework
together with a modified k-NN classifier for low-latency action
recognition.
B. Skeleton Based Action Recognition with RNN and LSTM
Models
Very recently, deep learning, especially recurrent neural
network (RNN), based approaches have shown their strength in
skeleton based action recognition. Our proposed GCA-LSTM
network is based on the LSTM model which is an extension
of RNN. In this part, we review the RNN and LSTM based
methods as below, since they are relevant to our method.
Du et al. [12] introduced a hierarchical RNN model to
represent the human body structure and temporal dynamics
of the joints. Veeriah et al. [54] proposed a differential
gating scheme to make the LSTM network emphasize on the
change of information. Zhu et al. [28] proposed a mixednorm regularization method for the LSTM network in order to
drive the model towards learning co-occurrence features of the
skeletal joints. They also designed an in-depth dropout mechanism to effectively train the network. Shahroudy et al. [55]
introduced a part-aware LSTM model to push the network
towards learning long-term context representations of different
body parts separately. Liu et al. [29], [56] designed a 2D
Spatio-Temporal LSTM framework to concurrently explore the
hidden sources of action related context information in both
temporal and spatial domains. They also introduced a trust gate
mechanism [29] to deal with the inaccurate 3D coordinates of
skeletal joints provided by the depth sensors.
Beside action recognition, RNN and LSTM models have
also been applied to skeleton based action forecasting [57]
and detection [58], [57].
Different from the aforementioned RNN/LSTM based approaches, which do not explicitly consider the informativeness
of each skeletal joint with regarding to the global action sequence, our proposed GCA-LSTM network utilizes the global
context information to perform attention over all the evolution
steps of LSTM to selectively emphasize the informative joints
in each frame, and thereby generates an attention representation for the sequence, which can be used to improve the
classification performance. Furthermore, a recurrent attention
mechanism is proposed to iteratively optimize the attention
performance.
3
C. Attention Mechanism
Our approach is also related to the attention mechanism
[14], [16], [59], [60], [61], [62], [63] which allows the
networks to selectively focus on specific information. Luong
et al. [62] proposed a network with attention mechanism for
neural machine translation. Stollenga et al. [64] designed a
deep attention selective network for image classification. Xu
et al. [15] proposed to incorporate hard attention and soft attention for image caption generation. Yao et al. [65] introduced
a temporal attention model for video caption generation.
Though a series of deep learning based models have been
proposed for video analysis in existing works [66], [67], most
of them did not consider the attention mechanism. There are
several works which explored attention, such as the methods in
[60], [68], [69]. However, our method is significantly different
from them in the following aspects: These works use the
hidden state of the previous time step of LSTM, whose context
information is quite local, to measure the attention scores for
the next time step. For the global classification problem action recognition, the global information is crucial for reliably
evaluating the importance (informativeness) of each input to
achieve a reliable attention. Therefore, we propose a global
context memory cell for LSTM, which is utilized to measure
the informativeness score of the input at each step. Then the
informativeness score is used as a gate (informativeness gate,
similar to the input gate and forget gate) inside the LSTM
unit to adjust the contribution of the input data at each step
for updating the memory cell. To the best of our knowledge,
we are the first to introduce a global memory cell for LSTM
network to handle global classification problems. Moreover,
a recurrent attention mechanism is proposed to iteratively
promote the attention capability of our network, while the
methods in [60], [68], [69] performed attention only once.
In addition, a two-stream attention framework incorporating
fine-grained attention and coarse-grained attention is also
introduced. Owing to the new contributions, our proposed
network yields state-of-the-art performance on the evaluated
benchmark datasets.
III. GCA-LSTM N ETWORK
In this section, we first briefly review the 2D SpatioTemporal LSTM (ST-LSTM) as our base network. We then introduce our proposed Global Context-Aware Attention LSTM
(GCA-LSTM) network in detail, which is able to selectively
focus on the informative joints in each frame of the skeleton
sequence by using global context information. Finally, we
describe our approach to training our network effectively.
A. Spatio-Temporal LSTM
In a generic skeleton based human action recognition problem, the 3D coordinates of the major body joints in each
frame are provided. The spatial dependence of different joints
in the same frame and the temporal dependence of the same
joint among different frames are both crucial cues for skeleton
based action analysis. Very recently, Liu et al. [29] proposed a
2D ST-LSTM network for skeleton based action recognition,
which is capable of modeling the dependency structure and
ACCEPTED TO IEEE TRANSACTIONS ON IMAGE PROCESSING
4
(J,T)
Second ST-LSTM Layer
Temporal (frame)
(J,T)
(n)
0.0
hj,t
(j-1,t) (j,t)
0.3
0.0
r j,t(n)
0.1
0.4
0.0
(j,t-1)
Refine
Global Context
Memory (n)
Initialize
(0)
Spatial (joint)
j,t
Fig. 2: Illustration of the ST-LSTM network [29]. In the spatial
direction, the body joints in each frame are arranged as a
chain and fed to the network as a sequence. In the temporal
dimension, the body joints are fed over the frames.
context information in both spatial and temporal domains
simultaneously.
As depicted in Fig. 2, in ST-LSTM model, the skeletal
joints in a frame are arranged and fed as a chain (the spatial
direction), and the corresponding joints over different frames
are also fed in a sequence (the temporal direction).
Specifically, each ST-LSTM unit is fed with a new input
(xj,t , the 3D location of joint j in frame t), the hidden
representation of the same joint at the previous time step
(hj,t−1 ), and also the hidden representation of the previous
joint in the same frame (hj−1,t ), where j ∈ {1, ..., J} and
t ∈ {1, ..., T } denote the indices of joints and frames, respectively. The ST-LSTM unit has an input gate (ij,t ), two forget
gates corresponding to the two sources of context information
(T )
(S)
(fj,t for the temporal dimension, and fj,t for the spatial
domain), together with an output gate (oj,t ).
The transition equations of ST-LSTM are formulated as
presented in [29]:
ij,t
σ
f (S)
σ
xj,t
j,t
(T )
hj−1,t (1)
fj,t =
σ W
σ
hj,t−1
oj,t
tanh
uj,t
cj,t
= ij,t
+
+
hj,t
uj,t
(S)
fj,t
(T )
fj,t
= oj,t
cj−1,t
(2)
cj,t−1
tanh(cj,t )
(3)
where cj,t and hj,t denote the cell state and hidden representation of the unit at the spatio-temporal step (j, t), respectively,
uj,t is the modulated input,
denotes the element-wise
product, and W is an affine transformation consisting of model
parameters. Readers are referred to [29] for more details about
the mechanism of ST-LSTM.
B. Global Context-Aware Attention LSTM
Several previous works [13], [50] have shown that in each
action sequence, there is often a subset of informative joints
which are important as they contribute much more to action
analysis, while the remaining ones may be irrelevant (or even
First ST-LSTM Layer
Fig. 3: Illustration of our GCA-LSTM network. Some arrows
are omitted for clarity.
noisy) for this action. As a result, to obtain a high accuracy of
action recognition, we need to identify the informative skeletal
joints and concentrate more on their features, meanwhile trying
to ignore the features of the irrelevant ones, i.e., selectively
focusing (attention) on the informative joints is useful for
human action recognition.
Human action can be represented by a combination of
skeletal joints’ movements. In order to reliably identify the
informative joints in an action instance, we can evaluate the informativeness score of each joint in each frame with regarding
to the global action sequence. To achieve this purpose, we need
to obtain the global context information first. However, the
available context at each evolution step of LSTM is the hidden
representation from the previous step, which is relatively local
when compared to the global action.
To mitigate the aforementioned limitation, we propose to
introduce a global context memory cell for the LSTM model,
which keeps the global context information of the action
sequence, and can be fed to each step of LSTM to assist the
attention procedure, as illustrated in Fig. 3. We call this new
LSTM architecture as Global Context-Aware Attention LSTM
(GCA-LSTM).
1) Overview of the GCA-LSTM network: We illustrate
the proposed GCA-LSTM network for skeleton based action
recognition in Fig. 3. Our GCA-LSTM network contains three
major modules. The global context memory cell maintains an
overall representation of the whole action sequence. The first
ST-LSTM layer encodes the skeleton sequence, and initializes
the global context memory cell. The second ST-LSTM layer
performs attention over the inputs at all spatio-temporal steps
to generate an attention representation of the action sequence,
which is then used to refine the global context memory.
The input at the spatio-temporal step (j, t) of the first STLSTM layer is the 3D coordinates of the joint j in frame t.
The inputs of the second layer are the hidden representations
from the first layer.
Multiple attention iterations (recurrent attention) are performed in our network to refine the global context memory
iteratively. Finally, the refined global context memory can be
used for classification.
To facilitate our explanation, we use hj,t instead of hj,t to
ACCEPTED TO IEEE TRANSACTIONS ON IMAGE PROCESSING
5
denote the hidden representation at the step (j, t) in the first
ST-LSTM layer, while the symbols, including hj,t , cj,t , ij,t ,
and oj,t , which are defined in Section III-A, are utilized to
represent the components in the second layer only.
2) Initializing the Global Context Memory Cell: Our GCALSTM network performs attention by using the global context
information, therefore, we need to obtain an initial global
context memory first.
A feasible scheme is utilizing the outputs of the first layer
to generate a global context representation. We can average
the hidden representations at all spatio-temporal steps of the
first layer to compute an initial global context memory cell
(IF(0) ) as follows:
IF(0) =
J
T
1 XX
hj,t
JT j=1 t=1
(4)
We may also concatenate the hidden representations of the
first layer and feed them to a feed-forward neural network, then
use the resultant activation as IF(0) . We empirically observe
these two initialization schemes perform similarly.
3) Performing Attention in the Second ST-LSTM Layer:
By using the global context information, we evaluate the
informativeness degree of the input at each spatio-temporal
step in the second ST-LSTM layer.
In the n-th attention iteration, our network learns an in(n)
formativeness score (rj,t ) for each input (hj,t ) by feeding
the input itself, together with the global context memory cell
(IF(n−1) ) generated by the previous attention iteration to a
network as follows:
hj,t
(n)
ej,t = We1 tanh We2
(5)
IF(n−1)
(n)
rj,t =
J
P
(n)
exp(ej,t )
T
P
(6)
(n)
exp(eu,v )
u=1 v=1
(n)
where rj,t ∈ (0, 1) denotes the normalized informativeness
score of the input at the step (j, t) in the n-th attention
iteration, with regarding to the global context information.
(n)
The informativeness score rj,t is then used as a gate of the
ST-LSTM unit, and we call it informativeness gate. With the
assistance of the learned informativeness gate, the cell state of
the unit in the second ST-LSTM layer can be updated as:
cj,t
=
(n)
rj,t
ij,t
+ (1 −
+ (1 −
(n)
rj,t )
(n)
rj,t )
uj,t
fj,t
(S)
cj−1,t
(T )
fj,t
cj,t−1
(7)
The cell state updating scheme in Eq. (7) can be explained
as follows: (1) if the input (hj,t ) is informative (important)
with regarding to the global context representation, then we
let the learning algorithm update the cell state of the second
ST-LSTM layer by importing more information of it; (2) on
the contrary, if the input is irrelevant, then we need to block
the input gate at this step, meanwhile relying more on the
history information of the cell state.
4) Refining the Global Context Memory Cell: We perform
attention by adopting the cell state updating scheme in Eq. (7),
and thereby obtain an attention representation of the action
sequence. Concretely, the output of the last spatio-temporal
step in the second layer is used as the attention representation
(F (n) ) for the action. Finally, the attention representation F (n)
is fed to the global context memory cell to refine it, as
illustrated in Fig. 3. The refinement is formulated as follows:
F (n)
(n)
IF(n) = ReLu WF
(8)
IF(n−1)
(n)
where IF(n) is the refined version of IF(n−1) . Note that WF
is not shared over different iterations.
Multiple attention iterations (recurrent attention) are carried
out in our GCA-LSTM network. Our motivation is that after
we obtain a refined global context memory cell, we can use
it to perform the attention again to more reliably identify
the informative joints, and thus achieve a better attention
representation, which can then be utilized to further refine the
global context. After multiple iterations, the global context can
be more discriminative for action classification.
5) Classifier: The last refined global context memory cell
IF(N ) is fed to a softmax classifier to predict the class label:
ŷ = softmax Wc IF(N )
(9)
The negative log-likelihood loss function [70] is adopted to
measure the difference between the true class label y and the
prediction result ŷ. The back-propagation algorithm is used to
minimize the loss function. The details of the back-propagation
process are described in Section III-C.
C. Training the Network
In this part, we first briefly describe the basic training
method which directly optimizes the parameters of the whole
network, we then propose a more advanced stepwise training
scheme for our GCA-LSTM network.
1) Directly Train the Whole Network: Since the classification is performed by using the last refined global context,
to train such a network, it is natural and intuitive to feed the
action label as the training output at the last attention iteration,
and back-propagate the errors from the last step, i.e., directly
optimize the whole network as shown in Fig. 4(a).
2) Stepwise Training: Owing to the recurrent attention
mechanism, there are frequent mutual interactions among
different modules (the two ST-LSTM layers and the global
context memory cell, see Fig. 3) in our network. Moreover,
during the progress of multiple attention iterations, new parameters are also introduced. Due to these facts, it is rather
difficult to simply optimize all parameters and all attention
iterations of the whole network directly as mentioned above.
Therefore, we propose a stepwise training scheme for our
GCA-LSTM network, which optimizes the model parameters
incrementally. The details of this scheme are depicted in
Fig. 4(b) and Algorithm 1.
The proposed stepwise training scheme is effective and
efficient in optimizing the parameters and ensuring the convergence of the GCA-LSTM network. Specifically, at each
ACCEPTED TO IEEE TRANSACTIONS ON IMAGE PROCESSING
(N)
6
(N)
(N)
(N)
Softmax
(N)
Softmax
(N)
(1)
(1)
(1)
(1)
(0)
(0)
(0)
(1)
(0)
Softmax
(0)
(0)
(0)
Training Step #0
(a)
(1)
Softmax
(1)
(0)
Training Step #1
Training Step #N
(b)
Fig. 4: Illustration of the two network training methods. (a) Directly train the whole network. (b) Stepwise optimize the network
parameters. In this figure, the global context memory cell IF(n) is unfolded over the attention iterations. The training step #n
corresponds to the n-th attention iteration. The black and red arrows denote the forward and backward passes, respectively.
Some passes, such as those between the two ST-LSTM layers, are omitted for clarity. Better viewed in colour.
Algorithm 1 Stepwise train the GCA-LSTM network.
1:
2:
3:
4:
5:
6:
7:
Randomly initialize the parameters of the whole network
with zero-mean Gaussian.
for n = 0 to N do // n is the training step
Feed the action label as the training output at the
attention iteration n.
do
Training an epoch: optimizing the parameters used
in the iterations 0 to n via back-propagation.
while Validation error is decreasing
end for
training step n, we only need to optimize a subset of parameters and modules which are used by the attention iterations 0
to n. 2 Training this shrunken network is more effective and
efficient than directly training the whole network. At the step
n + 1, a larger scale network needs to be optimized. However,
the training at step n + 1 is also very efficient, as most of
the parameters and passes have already been optimized (pretrained well) by its previous training steps.
IV. T WO - STREAM GCA-LSTM N ETWORK
In the aforementioned design (Section III), the GCA-LSTM
network performs action recognition by selectively focusing on
the informative joints in each frame, i.e., the attention is carried
out at joint level (fine-grained attention). Beside fine-grained
attention, coarse-grained attention can also contribute to action
analysis. This is because some actions are often performed
at body part level. For these actions, all the joints from the
same informative body part tend to have similar importance
degrees. For example, the postures and motions of all the
joints (elbow, wrist, palm, and finger) from the right hand
are all important for recognizing the action salute in the NTU
RGB+D dataset [55], i.e., we need to identify the informative
2 Note
that #0 is not an attention iteration, but the process of initializing
the global context memory cell (IF(0) ). To facilitate the explantation of the
stepwise training, we here temporally describe it as an attention iteration.
body part “right hand” here. This implies coarse-grained (body
part-level) attention is also useful for action recognition.
As suggested by Du et al. [12], the human skeleton can
be divided into five body parts (torso, left hand, right hand,
left leg, and right leg) based on the human physical structure.
These five parts are illustrated as the right part of Fig. 5.
Therefore, we can measure the informativeness degree of each
body part with regarding to the action sequence, and then
perform coarse-grained attention.
Specifically, we extend the design of out GCA-LSTM
model, and introduce a two-stream GCA-LSTM network here,
which jointly takes advantage of a fine-grained (joint-level) attention stream and a coarse-grained (body part-level) attention
stream.
The architecture of the two-stream GCA-LSTM is illustrated in Fig. 5. In each attention stream, there is a global
context memory cell to maintain the global attention representation of the action sequence, and also a second STLSTM layer to perform attention. This indicates we have
two separated global context memory cells in the whole
architecture, which are respectively the fine-grained attention
(n)
memory cell (IF(F ) ) and the coarse-grained attention memory
(n)
cell (IF(C) ). The first ST-LSTM layer, which is used to encode
the skeleton sequence and initialize the global context memory
cells, is shared by the two attention streams.
The process flow (including initialization, attention, and
refinement) in the fine-grained attention stream is the same
as the GCA-LSTM model introduced in Section III. The
operation in the coarse-grained attention stream is also similar.
The main difference is that, in the second layer, the coarsegrained attention stream performs attention by selectively
focusing on the informative body parts in each frame.
Concretely, in the attention iteration n, the network learns
(n)
an informativeness score (rP,t ) for each body part P (P ∈
{1, 2, 3, 4, 5}) as:
(n)
eP,t
= W e3
tanh We4
h̄P,t
(n−1)
IF(C)
!!!
(10)
ACCEPTED TO IEEE TRANSACTIONS ON IMAGE PROCESSING
7
Fine-Grained Attention Stream
Second ST-LSTM Layer (Fine-Grained)
hj,t
(F)
r j,t(n)
0.0
0.3
0.0
0.1
Classifier
(n)
(F)
(J,T)
0.4
Coarse-Grained Attention Stream
(n)
(C)
Refine
0.0
Second ST-LSTM Layer (Coarse-Grained)
(J,T)
Refine
hj,t
(C)
Fine-Grained
Attention (n)
Memory (F)
Coarse-Grained
Attention
(n)
Memory (C)
Initialize
Initialize
0.1
0.2
3
2
4
3
7
8
5
1
6
10
0.1
0.3
2
4
7
8
5
9
1
6
13
10
9
13
j,t
14
11
11
First ST-LSTM Layer
15
12
12
14
15
Fig. 5: Illustration of the two-stream GCA-LSTM network, which incorporates fine-grained (joint-level) attention and coarsegrained (body part-level) attention. To perform coarse-grained attention, the joints in a skeleton are divided into five body parts,
and all the joints from the same body part share a same informative score. In the second ST-LSTM layer for coarse-grained
attention, we only show two body parts at each frame, and other body parts are omitted for clarity.
(n)
(n)
rP,t =
exp(eP,t )
5 P
T
P
(n)
exp(eu,v )
(11)
u=1 v=1
where h̄P,t is the representation of the body part P at frame
t, which is calculated based on the hidden representations of
all the joints that belong to P , with average pooling as:
1 X
h̄P,t =
hj,t
(12)
JP
and Berkeley MHAD [73] datasets. To investigate the effectiveness of our approach, we conduct extensive experiments
with the following different network structures:
•
j∈P
where JP denotes the number of joints in body part P .
To perform coarse-grained attention, we allow each joint j
in body part P to share the informativeness degree of P , i.e.,
at frame t, all the joints in P use the same informativeness
(n)
score rP,t , as illustrated in Fig. 5. Hence, in the coarse-grained
attention stream, if j ∈ P , then the cell state of the second
ST-LSTM layer is updated at the spatio-temporal step (j, t)
as:
cj,t
=
(n)
rP,t
ij,t
+ (1 −
+ (1 −
(n)
rP,t )
(n)
rP,t )
uj,t
•
•
(S)
cj−1,t
(T )
cj,t−1
fj,t
fj,t
(13)
Multiple attention iterations are also performed in the proposed two-stream GCA-LSTM network. Finally, the refined
(N )
fine-grained attention memory IF(F ) and coarse-grained at-
“ST-LSTM + Global (1)”. This network architecture
is similar to the original two-layer ST-LSTM network
in [29], but the hidden representations at all spatiotemporal steps of the second layer are concatenated and
fed to a one-layer feed-forward network to generate a
global representation of the skeleton sequence, and the
classification is performed on the global representation;
while in [29], the classification is performed on single
hidden representation at each spatio-temporal step (local
representation).
“ST-LSTM + Global (2)”. This network structure is
similar to the above “ST-LSTM + Global (1)”, except
that the global representation is obtained by averaging
the hidden representations of all spatio-temporal steps.
“GCA-LSTM”. This is the proposed Global ContextAware Attention LSTM network. Two attention iterations
are performed by this network. The classification is
performed on the last refined global context memory cell.
The two training methods (direct training and stepwise
training) described in Section III-C are also evaluated for
this network structure.
(N )
tention memory IF(C) are both fed to the softmax classifier,
and the prediction scores of these two streams are averaged
for action recognition.
The proposed step-wise training scheme can also be applied
to this two-stream GCA-LSTM network, and at the training step #n, we simultaneously optimize the two attention
streams, both of which correspond to the n-th attention iteration.
V. E XPERIMENTS
We evaluate our proposed method on the NTU RGB+D [55],
SYSU-3D [71], UT-Kinect [47], SBU-Kinect Interaction [72],
In addition, we also adopt the large scale NTU RGB+D and
the challenging SYSU-3D as two major benchmark datasets
to evaluate the proposed “two-stream GCA-LSTM” network.
We use Torch7 framework [74] to perform our experiments.
Stochastic gradient descent (SGD) algorithm is adopted to
train our end-to-end network. We set the learning rate, decay
rate, and momentum to 1.5×10−3 , 0.95, and 0.9, respectively.
The applied dropout probability [75] in our network is set to
0.5. The dimensions of the global context memory representation and the cell state of ST-LSTM are both 128.
ACCEPTED TO IEEE TRANSACTIONS ON IMAGE PROCESSING
8
TABLE II: Performance of the two-stream GCA-LSTM network on the NTU RGB+D dataset.
A. Experiments on the NTU RGB+D Dataset
The NTU RGB+D dataset [55] was collected with Kinect
(V2). It contains more than 56 thousand video samples. A
total of 60 action classes were performed by 40 different
subjects. To the best of our knowledge, this is the largest
publicly available dataset for RGB+D based human action
recognition. The large variations in subjects and viewpoints
make this dataset quite challenging. There are two standard
evaluation protocols for this dataset: (1) Cross subject (CS):
20 subjects are used for training, and the remaining subjects
are used for testing; (2) Cross view (CV): two camera views
are used for training, and one camera view is used for testing.
To extensively evaluate the proposed method, both protocols
are tested in our experiment.
We compare the proposed GCA-LSTM network with stateof-the-art approaches, as shown in TABLE I. We can observe
that our proposed GCA-LSTM model outperforms the other
skeleton-based methods. Specifically, our GCA-LSTM network outperforms the original ST-LSTM network in [29] by
6.9% with the cross subject protocol, and 6.3% with the cross
view protocol. This demonstrates that the attention mechanism
in our network brings significant performance improvement.
Both “ST-LSTM + Global (1)” and “ST-LSTM + Global
(2)” perform classification on the global representations, thus
they achieve slightly better performance than the original STLSTM [29] which performs classification on local representations. We also observe “ST-LSTM + Global (1)” and “STLSTM + Global (2)” perform similarly.
The results in TABLE I also show that using the stepwise
training method can improve the performance of our network
in contrast to using the direct training method.
Method
GCA-LSTM (coarse-grained only)
GCA-LSTM (fine-grained only)
Two-stream GCA-LSTM
Two-stream GCA-LSTM with stepwise training
CS
74.1%
74.3%
76.2%
77.1%
CV
81.6%
82.8%
84.7%
85.1%
B. Experiments on the SYSU-3D Dataset
The SYSU-3D dataset [71], which contains 480 skeleton
sequences, was collected with Kinect. This dataset includes
12 action classes which were performed by 40 subjects. The
SYSU-3D dataset is very challenging as the motion patterns
are quite similar among different action classes, and there are
lots of viewpoint variations in this dataset.
We follow the standard cross-validation protocol in [71]
on this dataset, in which 20 subjects are adopted for training
the network, and the remaining subjects are kept for testing.
We report the experimental results in TABLE III. We can
observe that our GCA-LSTM network surpasses the stateof-the-art skeleton-based methods in [80], [71], [29], which
demonstrates the effectiveness of our approach in handling the
task of action recognition in skeleton sequences. The results
also show that our proposed stepwise training scheme is useful
for our network.
TABLE III: Experimental results on the SYSU-3D dataset.
Method
LAFF (SKL) [80]
Dynamic Skeletons [71]
ST-LSTM [56]
ST-LSTM + Global (1)
ST-LSTM + Global (2)
GCA-LSTM (direct training)
GCA-LSTM (stepwise training)
Accuracy
54.2%
75.5%
76.5%
76.8%
76.6%
77.8%
78.6%
TABLE I: Experimental results on the NTU RGB+D dataset.
Method
Skeletal Quads [76]
Lie Group [46]
Dynamic Skeletons [71]
HBRNN [12]
Deep RNN [55]
Deep LSTM [55]
Part-aware LSTM [55]
JTM CNN [77]
STA Model [68]
SkeletonNet [78]
Visualization CNN [79]
ST-LSTM [29]
ST-LSTM + Global (1)
ST-LSTM + Global (2)
GCA-LSTM (direct training)
GCA-LSTM (stepwise training)
CS
38.6%
50.1%
60.2%
59.1%
56.3%
60.7%
62.9%
73.4%
73.4%
75.9%
76.0%
69.2%
70.5%
70.7%
74.3%
76.1%
CV
41.4%
52.8%
65.2%
64.0%
64.1%
67.3%
70.3%
75.2%
81.2%
81.2%
82.6%
77.7%
79.5%
79.4%
82.8%
84.0%
Using this challenging dataset, we also evaluate the performance of the two-stream attention model. The results in
TABLE IV show that the two-stream GCA-LSTM network is
effective for action recognition.
TABLE IV: Performance of the two-stream GCA-LSTM network on the SYSU-3D dataset.
Method
GCA-LSTM (coarse-grained only)
GCA-LSTM (fine-grained only)
Two-stream GCA-LSTM
Two-stream GCA-LSTM with stepwise training
Accuracy
76.9%
77.8%
78.8%
79.1%
C. Experiments on the UT-Kinect Dataset
We also evaluate the performance of the two-stream GCALSTM network, and report the results in TABLE II. The results
show that by incorporating fine-grained attention and coarsegrained attention, the proposed two-stream GCA-LSTM network achieves better performance than the GCA-LSTM with
fine-grained attention only. We also observe the performance
of two-stream GCA-LSTM can be improved with the stepwise
training method.
The UT-Kinect dataset [47] was recorded with a stationary
Kinect. The skeleton sequences in this dataset are quite noisy.
A total of 10 action classes were performed by 10 subjects,
and each action was performed by the same subject twice.
We follow the standard leave-one-out-cross-validation protocol in [47] to evaluate our method on this dataset. Our
approach yields state-of-the-art performance on this dataset,
as shown in TABLE V.
ACCEPTED TO IEEE TRANSACTIONS ON IMAGE PROCESSING
TABLE V: Experimental results on the UT-Kinect dataset.
Method
Grassmann Manifold [81]
Histogram of 3D Joints [47]
Riemannian Manifold [82]
Key-Pose-Motifs Mining [83]
Action-Snippets and Activated Simplices [84]
ST-LSTM [29]
ST-LSTM + Global (1)
ST-LSTM + Global (2)
GCA-LSTM (direct training)
GCA-LSTM (stepwise training)
Accuracy
88.5%
90.9%
91.5%
93.5%
96.5%
97.0%
97.0%
97.5%
98.5%
99.0%
D. Experiments on the SBU-Kinect Interaction Dataset
The SBU-Kinect Interaction dataset [72] includes 8 action
classes for two-person interaction recognition. This dataset
contains 282 sequences corresponding to 6822 frames. The
SBU-Kinect Interaction dataset is challenging because of (1)
the relatively low accuracies of the coordinates of skeletal
joints recorded by Kinect, and (2) complicated interactions
between two persons in many action sequences.
We perform 5-fold cross-validation evaluation on this
dataset by following the standard protocol in [72]. The experimental results are depicted in TABLE IX. In this table,
HBRNN [12], Deep LSTM [28], Co-occurrence LSTM [28],
and ST-LSTM [29] are all LSTM based models for action
recognition in skeleton sequences, and are very relevant to our
network. We can see that the proposed GCA-LSTM network
achieves the best performance among all of these methods.
9
the recurrent attention mechanism proposed by us is useful
for the GCA-LSTM network.
Specifically, we also evaluate the performance of 3 attention
iterations by using the large scale NTU RGB+D dataset, and
the results are shown in TABLE VIII. We find the performance
of 3 attention iterations is slightly better than 2 iterations
if we share the parameters over different attention iterations
(see columns (a) and (b) in TABLE VIII). This consistently
shows using multiple attention iterations can improve the
performance of our network progressively. We do not try more
iterations due to the GPU’s memory limitation.
We also find that if we do not share the parameters over
different attention iterations (see columns (c) and (d) in
TABLE VIII), then too many iterations can bring performance
degradation (the performance of using 3 iterations is worse
than that of using 2 iterations). In our experiment, we observe
the performance degradation is caused by over-fitting (increasing iteration number will introduce new parameters if we do
not share parameters). But the performance of two iterations is
still significantly better than one iteration in this case. We will
also give the experimental analysis of the parameter sharing
schemes detailed in Section V-G.
G. Evaluation of Parameter Sharing Schemes
The Berkeley MHAD dataset was recorded by using a
motion capture system. It contains 659 sequences and 11
action classes, which were performed by 12 different subjects.
We adopt the standard experimental protocol on this dataset,
in which 7 subjects are used for training and the remaining
5 subjects are held out for testing. The results in TABLE X
show that our method achieves very high accuracy (100%) on
this dataset.
As the Berkeley MHAD dataset was collected with a motion
capture system rather than a Kinect, thus the coordinates of
the skeletal joints are relatively accurate. To evaluate the robustness with regarding to the input noise, we also investigate
the performance of our GCA-LSTM network on this dataset
by adding zero mean input noise to the skeleton sequences,
and show the results in TABLE VI. We can see that even if we
add noise with the standard deviation (σ) set to 12cm (which
is significant noise in the scale of human body), the accuracy
of our method is still very high (92.7%). This demonstrates
that our method is quite robust against the input noise.
As formulated in Eq. (5), the model parameters We1 and
We2 are introduced for calculating the informativeness score
at each spatio-temporal step in the second layer. Also multiple
attention iterations are carried out in this layer. To regularize
the parameter number inside our network and improve the
generalization capability, we investigate two parameter sharing
strategies for our network: (1) Sharing within iteration: We1
and We2 are shared by all spatio-temporal steps in the same
attention iteration; (2) Sharing cross iterations: We1 and We2
are shared over different attention iterations. We investigate
the effect of these two parameter sharing strategies on our
GCA-LSTM network, and report the results in TABLE VIII.
In TABLE VIII, we can observe that: (1) Sharing parameters
within iteration is useful for enhancing the generalization
capability of our network, as the performance in columns (b)
and (d) of TABLE VIII is better than (a) and (c), respectively.
(2) Sharing parameters over different iterations is also helpful
for handling the over-fitting issues, but it may limit the
representation capacity, as the network with two attention
iterations which shares parameters within iteration but does
not share parameters over iterations achieves the best result
(see column (d) of TABLE VIII). As a result, in our GCALSTM network, we only share the parameters within iteration,
and two attention iterations are used.
F. Evaluation of Attention Iteration Numbers
H. Evaluation of Training Methods
We also test the effect of different attention iteration numbers on our GCA-LSTM network, and show the results in
TABLE VII. We can observe that increasing the iteration
number can help to strength the classification performance
of our network (using 2 iterations obtains higher accuracies
compared to using only 1 iteration). This demonstrates that
The previous experiments showed that using the stepwise
training method can improve the performance of our network
in contrast to using direct training (see TABLE I, V, III, IX).
To further investigate the performance of these two training
methods, we plot the convergence curves of our GCA-LSTM
network in Fig. 6.
E. Experiments on the Berkeley MHAD Dataset
ACCEPTED TO IEEE TRANSACTIONS ON IMAGE PROCESSING
10
TABLE VI: Evaluation of robustness against the input noise. Gaussian noise N (0, σ 2 ) is added to the 3D coordinates of the
skeletal joints.
Standard deviation (σ) of noise
Accuracy
0.1cm
100%
1cm
99.3%
2cm
98.5%
4cm
97.5%
8cm
95.6%
12cm
92.7%
16cm
80.4%
32cm
61.5%
TABLE VII: Performance comparison of different attention iteration numbers (N ).
#Attention Iteration
1
2
NTU RGB+D (CS)
72.9%
76.1%
NTU RGB+D (CV)
81.8%
84.0%
UT-Kinect
98.0%
99.0%
SYSU-3D
77.8%
78.6%
Berkeley MHAD
100%
100%
TABLE VIII: Performance comparison of different parameter sharing schemes.
#Attention Iteration
1
2
3
(a)
w/o sharing within iteration
w/ sharing cross iterations
71.0%
73.0%
73.1%
(b)
w/ sharing within iteration
w/ sharing cross iterations
72.9%
74.3%
74.4%
(c)
w/o sharing within iteration
w/o sharing cross iterations
71.0%
73.4%
69.3%
(d)
w/ sharing within iteration
w/o sharing cross iterations
72.9%
76.1%
73.2%
We analyze the convergence curves (Fig. 6) of the stepwise
training method as follows. By using the proposed stepwise
training method, at the training step #0, we only need to train
the subnetwork for initializing the global context (IF(0) ), i.e.,
only a subset of parameters and modules need to be optimized,
thus the training is very efficient and the loss curve converges
very fast. When the validation loss stops decreasing, we start
the next training step #1. Step #1 contains new parameters
and modules for the first attention iteration, which have not
been optimized yet, therefore, loss increases immediately at
this epoch. However, most of the parameters involved at this
step have already been pre-trained well by the previous step
#0, thus the network training is quite effective, and the loss
drops to a very low value after only one training epoch.
By comparing the convergence curves of the two training
methods, we can find (1) the network converges much faster if
we use stepwise training, compared to directly train the whole
network. We can also observe that (2) the network is easier
to get over-fitted by using direct training method, as the gap
between the train loss and validation loss starts to rise after the
20th epoch. These observations demonstrate that the proposed
stepwise training scheme is quite useful for effectively and
efficiently training our GCA-LSTM network.
TABLE X: Experimental results on the Berkeley MHAD
dataset
I. Evaluation of Initialization Methods and Attention Designs
Fig. 6: Convergence curves of the GCA-LSTM network with
two attention iterations by respectively using stepwise training
(in red) and direct training (in green) on the NTU RGB+D
dataset. Better viewed in colour.
In Section III-B2, we introduce two methods to initialize
the global context memory cell (IF(0) ). The first is averaging
TABLE IX: Experimental results on the SBU-Kinect Interaction dataset.
Method
Yun et al. [72]
CHARM [85]
Ji et al. [86]
HBRNN [12]
Deep LSTM [28]
Co-occurrence LSTM [28]
SkeletonNet [78]
ST-LSTM [29]
GCA-LSTM (direct training)
GCA-LSTM (stepwise training)
Accuracy
80.3%
83.9%
86.9%
80.4%
86.0%
90.4%
93.5%
93.3%
94.1%
94.9%
Method
Ofli et al. [43]
Vantigodi et al. [87]
Vantigodi et al. [88]
Kapsouras et al. [89]
ST-LSTM [29]
GCA-LSTM (direct training)
GCA-LSTM (stepwise training)
Accuracy
95.4%
96.1%
97.6%
98.2%
100%
100%
100%
Training step #0
5
Training step #1
4.5
Training step #2
4
3.5
3
2.5
2
1.5
1
0.5
Epoch
0
1
8
15
22
29
36
43
50
Stepwise training (train loss)
Stepwise training (validation loss)
Direct training (train loss)
Direct training (validation loss)
the hidden representations of the first layer (see Eq. (4)),
and the second is using a one-layer feed-forward network to
obtain IF(0) . We compare these two initialization methods in
TABLE XI. The results show that these two methods perform
similarly. In our experiment, we also find that by using feedforward network, the model converges faster, thus the scheme
of feed-forward network is used to initialize the global context
memory cell in our GCA-LSTM network.
(n)
In the GCA-LSTM network, the informativeness score rj,t
is used as a gate within LSTM neuron, as formulated in Eq.
ACCEPTED TO IEEE TRANSACTIONS ON IMAGE PROCESSING
TABLE XI: Performance comparison of different methods of
initializing the global context memory cell.
Method
Averaging
Feed-forward network
NTU RGB+D (CS)
73.8%
74.3%
NTU RGB+D (CV)
83.1%
82.8%
(7). We also explore to replace this scheme with soft attention
method [15], [62], i.e., the attention representation F (n) is
PJ PT
(n)
calculated as
j=1
t=1 rj,t hj,t . Using soft attention, the
accuracy drops about one percentage point on the NTU
RGB+D dataset. This can be explained as equipping LSTM
(n)
neuron with gate rj,t provides LSTM better insight about
when to update, forget or remember. In addition, it can keep
the sequential ordering information of the inputs hj,t , while
soft attention loses ordering and positional information.
J. Visualizations
To better understand our network, we analyze and visualize
the informativeness score evaluated by using the global context
information on the large scale NTU RGB+D dataset in this
section.
We analyze the variations of the informativeness scores
over the two attention iterations to verify the effectiveness
of the recurrent attention mechanism in our method, and
show the qualitative results of three actions (taking a selfie,
pointing to something, and kicking other person) in Fig. 7.
The informativeness scores are computed with soft attention
for visualization. In this figure, we can see that the attention
performance increases between the two attention iterations. In
the first iteration, the network tries to identify the potential
informative joints over the frames. After this attention, the
network achieves a good understanding of the global action.
Then in the second iteration, the network can more accurately
focus on the informative joints in each frame of the skeleton
sequence. We can also find that the informativeness score of
the same joint can vary in different frames. This indicates that
our network performs attention not only in spatial domain, but
also in temporal domain.
In order to further quantitatively evaluate the effectiveness
of the attention mechanism, we analyze the classification
accuracies of the three action classes in Fig. 7 among all the
actions. We observe if the attention mechanism is not used, the
accuracies of these three classes are 67.7%, 71.7%, and 81.5%,
respectively. However, if we use one attention iteration, the
accuracies rise to 67.8%, 72.4%, and 83.4%, respectively. If
two attention iterations are performed, the accuracies become
67.9%, 73.6%, and 86.6%, respectively.
To roughly explore which joints are more informative for
the activities in the NTU RGB+D dataset, we also average
the informativeness scores of the same joint in all the testing
sequences, and visualize it in Fig. 8. We can observe that
averagely, more attention is assigned to the hand and foot
joints. This is because in the NTU RGB+D dataset, most of the
actions are related to the hand and foot postures and motions.
We can also find that the average informativeness score of the
right hand joint is higher than that of left hand joint. This
indicates most of the subjects are right-handed.
11
VI. C ONCLUSION
In this paper, we have extended the original LSTM network
to construct a Global Context-Aware Attention LSTM (GCALSTM) network for skeleton based action recognition, which
has strong ability in selectively focusing on the informative joints in each frame of the skeleton sequence with the
assistance of global context information. Furthermore, we
have proposed a recurrent attention mechanism for our GCALSTM network, in which the selectively focusing capability
is improved iteratively. In addition, a two-stream attention
framework is also introduced. The experimental results validate the contributions of our approach by achieving state-ofthe-art performance on five challenging datasets.
ACKNOWLEDGEMENT
This work was carried out at the Rapid-Rich Object Search
(ROSE) Lab at Nanyang Technological University (NTU), Singapore. The ROSE Lab is supported by the National Research
Foundation, Singapore, under its Interactive Digital Media
(IDM) Strategic Research Programme. We acknowledge the
support of NVIDIA AI Technology Centre (NVAITC) for the
donation of the Tesla K40 and K80 GPUs used for our research
at the ROSE Lab. Jun Liu would like to thank Qiuhong Ke
from University of Western Australia for helpful discussions.
R EFERENCES
[1] J. Zheng, Z. Jiang, and R. Chellappa, “Cross-view action recognition
via transferable dictionary learning,” IEEE Transactions on Image Processing, 2016.
[2] F. Liu, X. Xu, S. Qiu, C. Qing, and D. Tao, “Simple to complex
transfer learning for action recognition,” IEEE Transactions on Image
Processing, 2016.
[3] Y.-G. Jiang, Q. Dai, W. Liu, X. Xue, and C.-W. Ngo, “Human action
recognition in unconstrained videos by explicit motion modeling,” IEEE
Transactions on Image Processing, 2015.
[4] J. Han, L. Shao, D. Xu, and J. Shotton, “Enhanced computer vision with
microsoft kinect sensor: A review,” IEEE transactions on cybernetics,
2013.
[5] G. Zhang, J. Liu, H. Li, Y. Q. Chen, and L. S. Davis, “Joint human
detection and head pose estimation via multistream networks for rgb-d
videos,” IEEE Signal Processing Letters, 2017.
[6] G. Zhang, L. Tian, Y. Liu et al., “Robust real-time human perception
with depth camera,” in ECAI, 2016.
[7] L. L. Presti and M. La Cascia, “3d skeleton-based human action
classification: A survey,” Pattern Recognition, 2016.
[8] F. Han, B. Reily, W. Hoff, and H. Zhang, “Space-time representation of
people based on 3d skeletal data: a review,” arXiv, 2016.
[9] J. K. Aggarwal and L. Xia, “Human activity recognition from 3d data:
A review,” Pattern Recognition Letters, 2014.
[10] J. Zhang, W. Li, P. O. Ogunbona, P. Wang, and C. Tang, “Rgb-d-based
action recognition datasets: A survey,” Pattern Recognition, 2016.
[11] M. Ye, Q. Zhang, L. Wang, J. Zhu, R. Yang, and J. Gall, “A survey
on human motion analysis from depth data,” in Time-of-flight and depth
imaging. sensors, algorithms, and applications, 2013.
[12] Y. Du, W. Wang, and L. Wang, “Hierarchical recurrent neural network
for skeleton based action recognition,” in CVPR, 2015.
[13] M. Jiang, J. Kong, G. Bebis, and H. Huo, “Informative joints based
human action recognition using skeleton contexts,” Signal Processing:
Image Communication, 2015.
[14] J. K. Chorowski, D. Bahdanau, D. Serdyuk, K. Cho, and Y. Bengio,
“Attention-based models for speech recognition,” in NIPS, 2015.
[15] K. Xu, J. Ba, R. Kiros, K. Cho, A. Courville, R. Salakhudinov, R. Zemel,
and Y. Bengio, “Show, attend and tell: Neural image caption generation
with visual attention,” in ICML, 2015.
[16] D. Bahdanau, K. Cho, and Y. Bengio, “Neural machine translation by
jointly learning to align and translate,” in ICLR, 2015.
ACCEPTED TO IEEE TRANSACTIONS ON IMAGE PROCESSING
Action
12
Attention iteration #1
Attention iteration #2
(1)
Taking
a
selfie
(2)
Pointing
to
something
(3)
Kicking
other
person
Fig. 7: Examples of qualitative results on the NTU RGB+D dataset. Three actions (taking a selfie, pointing to something, and
kicking other person) are illustrated. The informativeness scores of two attention iterations are visualized. Four frames are
shown for each iteration. The circle size indicates the magnitude of the informativeness score for the corresponding joint in a
frame. For clarity, the joints with tiny informativeness scores are not shown.
[26]
[27]
Right hand
Left hand
[28]
[29]
Fig. 8: Visualization of the average informativeness gates for
all testing samples. The size of the circle around each joint
indicates the magnitude of the corresponding informativeness
score.
[30]
[31]
[32]
[33]
[17] S. Hochreiter and J. Schmidhuber, “Long short-term memory,” Neural
computation, 1997.
[18] M. Sundermeyer, R. Schlüter, and H. Ney, “Lstm neural networks for
language modeling.” in INTERSPEECH, 2012.
[19] M. Ibrahim, S. Muralidharan, Z. Deng, A. Vahdat, and G. Mori, “A
hierarchical deep temporal model for group activity recognition,” in
CVPR, 2016.
[20] S. Yeung, O. Russakovsky, G. Mori, and L. Fei-Fei, “End-to-end learning
of action detection from frame glimpses in videos,” in CVPR, 2016.
[21] J. Yue-Hei Ng, M. Hausknecht, S. Vijayanarasimhan, O. Vinyals,
R. Monga, and G. Toderici, “Beyond short snippets: Deep networks
for video classification,” in CVPR, 2015.
[22] Z. Wu, X. Wang, Y.-G. Jiang, H. Ye, and X. Xue, “Modeling spatialtemporal clues in a hybrid deep learning framework for video classification,” in ACM MM, 2015.
[23] J. Donahue, L. Anne Hendricks, S. Guadarrama, M. Rohrbach, S. Venugopalan, K. Saenko, and T. Darrell, “Long-term recurrent convolutional
networks for visual recognition and description,” in CVPR, 2015.
[24] Q. Ke, M. Bennamoun, S. An, F. Sohel, and F. Boussaid, “Leveraging
structural context models and ranking score fusion for human interaction
prediction,” arXiv, 2017.
[25] Q. Ke, M. Bennamoun, S. An, F. Bossaid, and F. Sohel, “Spatial, struc-
[34]
[35]
[36]
[37]
[38]
[39]
[40]
[41]
tural and temporal feature learning for human interaction prediction,”
arXiv, 2016.
N. Srivastava, E. Mansimov, and R. Salakhutdinov, “Unsupervised
learning of video representations using lstms,” in ICML, 2015.
S. Ma, L. Sigal, and S. Sclaroff, “Learning activity progression in lstms
for activity detection and early detection,” in CVPR, 2016.
W. Zhu, C. Lan, J. Xing, W. Zeng, Y. Li, L. Shen, and X. Xie, “Cooccurrence feature learning for skeleton based action recognition using
regularized deep lstm networks,” in AAAI, 2016.
J. Liu, A. Shahroudy, D. Xu, and G. Wang, “Spatio-temporal lstm with
trust gates for 3d human action recognition,” in ECCV, 2016.
J. Weston, S. Chopra, and A. Bordes, “Memory networks,” in ICLR,
2015.
J. Liu, G. Wang, P. Hu, L.-Y. Duan, and A. C. Kot, “Global contextaware attention lstm networks for 3d action recognition,” in CVPR, 2017.
J. Luo, W. Wang, and H. Qi, “Group sparsity and geometry constrained
dictionary learning for action recognition from depth maps,” in ICCV,
2013.
A. Shahroudy, T.-T. Ng, Q. Yang, and G. Wang, “Multimodal multipart
learning for action recognition in depth videos,” IEEE Transactions on
Pattern Analysis and Machine Intelligence, 2016.
M. Meng, H. Drira, M. Daoudi, and J. Boonaert, “Human-object
interaction recognition by learning the distances between the object and
the skeleton joints,” in FG, 2015.
X. Yang and Y. Tian, “Effective 3d action recognition using eigenjoints,”
Journal of Visual Communication and Image Representation, 2014.
J. Wang and Y. Wu, “Learning maximum margin temporal warping for
action recognition,” in ICCV, 2013.
I. Lillo, J. Carlos Niebles, and A. Soto, “A hierarchical pose-based approach to complex action understanding using dictionaries of actionlets
and motion poselets,” in CVPR, 2016.
H. Rahmani, A. Mahmood, D. Q. Huynh, and A. Mian, “Real time action
recognition using histograms of depth gradients and random decision
forests,” in WACV, 2014.
C. Chen, R. Jafari, and N. Kehtarnavaz, “Fusion of depth, skeleton, and
inertial data for human action recognition,” in ICASSP, 2016.
L. Tao and R. Vidal, “Moving poselets: A discriminative and interpretable skeletal motion representation for action recognition,” in
ICCVW, 2015.
A. Shahroudy, G. Wang, and T.-T. Ng, “Multi-modal feature fusion for
action recognition in rgb-d sequences,” in ISCCSP, 2014.
ACCEPTED TO IEEE TRANSACTIONS ON IMAGE PROCESSING
[42] P. Wang, W. Li, P. Ogunbona, Z. Gao, and H. Zhang, “Mining mid-level
features for action recognition based on effective skeleton representation,” in DICTA, 2014.
[43] F. Ofli, R. Chaudhry, G. Kurillo, R. Vidal, and R. Bajcsy, “Sequence
of the most informative joints (smij): A new representation for human
skeletal action recognition,” Journal of Visual Communication and
Image Representation, 2014.
[44] R. Anirudh, P. Turaga, J. Su, and A. Srivastava, “Elastic functional
coding of human actions: from vector-fields to latent variables,” in
CVPR, 2015.
[45] R. Chaudhry, F. Ofli, G. Kurillo, R. Bajcsy, and R. Vidal, “Bioinspired dynamic 3d discriminative skeletal features for human action
recognition,” in CVPRW, 2013.
[46] R. Vemulapalli, F. Arrate, and R. Chellappa, “Human action recognition
by representing 3d skeletons as points in a lie group,” in CVPR, 2014.
[47] L. Xia, C.-C. Chen, and J. Aggarwal, “View invariant human action
recognition using histograms of 3d joints,” in CVPRW, 2012.
[48] J. Wang, Z. Liu, Y. Wu, and J. Yuan, “Mining actionlet ensemble for
action recognition with depth cameras,” in CVPR, 2012.
[49] J. Wang, Z. Liu, Y. Wu, and J. S. Yuan, “Learning actionlet ensemble for
3d human action recognition,” IEEE Transactions on Pattern Analysis
and Machine Intelligence, 2014.
[50] H. Chen, G. Wang, J.-H. Xue, and L. He, “A novel hierarchical
framework for human action recognition,” Pattern Recognition, 2016.
[51] P. Koniusz, A. Cherian, and F. Porikli, “Tensor representations via kernel
linearization for action recognition from 3d skeletons,” in ECCV, 2016.
[52] P. Wang, C. Yuan, W. Hu, B. Li, and Y. Zhang, “Graph based skeleton
motion representation and similarity measurement for action recognition,” in ECCV, 2016.
[53] M. Zanfir, M. Leordeanu, and C. Sminchisescu, “The moving pose: An
efficient 3d kinematics descriptor for low-latency action recognition and
detection,” in ICCV, 2013.
[54] V. Veeriah, N. Zhuang, and G.-J. Qi, “Differential recurrent neural
networks for action recognition,” in ICCV, 2015.
[55] A. Shahroudy, J. Liu, T.-T. Ng, and G. Wang, “Ntu rgb+d: A large scale
dataset for 3d human activity analysis,” in CVPR, 2016.
[56] J. Liu, A. Shahroudy, D. Xu, A. C. Kot, and G. Wang, “Skeleton-based
action recognition using spatio-temporal lstm network with trust gates,”
IEEE Transactions on Pattern Analysis and Machine Intelligence, 2017.
[57] A. Jain, A. R. Zamir, S. Savarese, and A. Saxena, “Structural-rnn: Deep
learning on spatio-temporal graphs,” in CVPR, 2016.
[58] Y. Li, C. Lan, J. Xing, W. Zeng, C. Yuan, and J. Liu, “Online human
action detection using joint classification-regression recurrent neural
networks,” in ECCV, 2016.
[59] C. Xiong, S. Merity, and R. Socher, “Dynamic memory networks for
visual and textual question answering,” in ICML, 2016.
[60] S. Sharma, R. Kiros, and R. Salakhutdinov, “Action recognition using
visual attention,” in ICLRW, 2016.
[61] A. Kumar, O. Irsoy, P. Ondruska, M. Iyyer, J. Bradbury, I. Gulrajani,
V. Zhong, R. Paulus, and R. Socher, “Ask me anything: Dynamic
memory networks for natural language processing,” in ICML, 2016.
[62] M.-T. Luong, H. Pham, and C. D. Manning, “Effective approaches to
attention-based neural machine translation,” in EMNLP, 2015.
[63] S. Sukhbaatar, A. Szlam, J. Weston, and R. Fergus, “End-to-end memory
networks,” in NIPS, 2015.
[64] M. F. Stollenga, J. Masci, F. Gomez, and J. Schmidhuber, “Deep
networks with internal selective attention through feedback connections,”
in NIPS, 2014.
[65] L. Yao, A. Torabi, K. Cho, N. Ballas, C. Pal, H. Larochelle, and
A. Courville, “Describing videos by exploiting temporal structure,” in
ICCV, 2015.
[66] K. Simonyan and A. Zisserman, “Two-stream convolutional networks
for action recognition in videos,” in NIPS, 2014.
[67] A. Shahroudy, T.-T. Ng, Y. Gong, and G. Wang, “Deep multimodal feature analysis for action recognition in rgb+ d videos,” IEEE Transactions
on Pattern Analysis and Machine Intelligence, 2017.
[68] S. Song, C. Lan, J. Xing, W. Zeng, and J. Liu, “An end-to-end spatiotemporal attention model for human action recognition from skeleton
data.” in AAAI, 2017.
[69] Y. Wang, S. Wang, J. Tang, N. O’Hare, Y. Chang, and B. Li, “Hierarchical attention network for action recognition in videos,” arXiv, 2016.
[70] A. Graves, “Supervised sequence labelling,” in Supervised Sequence
Labelling with Recurrent Neural Networks, 2012.
[71] J.-F. Hu, W.-S. Zheng, J. Lai, and J. Zhang, “Jointly learning heterogeneous features for rgb-d activity recognition,” in CVPR, 2015.
13
[72] K. Yun, J. Honorio, D. Chattopadhyay, T. L. Berg, and D. Samaras,
“Two-person interaction detection using body-pose features and multiple
instance learning,” in CVPRW, 2012.
[73] F. Ofli, R. Chaudhry, G. Kurillo, R. Vidal, and R. Bajcsy, “Berkeley
mhad: A comprehensive multimodal human action database,” in WACV,
2013.
[74] R. Collobert, K. Kavukcuoglu, and C. Farabet, “Torch7: A matlab-like
environment for machine learning,” in NIPSW, 2011.
[75] N. Srivastava, G. Hinton, A. Krizhevsky, I. Sutskever, and R. Salakhutdinov, “Dropout: A simple way to prevent neural networks from overfitting,” Journal of Machine Learning Research, 2014.
[76] G. Evangelidis, G. Singh, and R. Horaud, “Skeletal quads: Human action
recognition using joint quadruples,” in ICPR, 2014.
[77] P. Wang, Z. Li, Y. Hou, and W. Li, “Action recognition based on joint
trajectory maps using convolutional neural networks,” in ACM MM,
2016.
[78] Q. Ke, S. An, M. Bennamoun, F. Sohel, and F. Boussaid, “Skeletonnet:
Mining deep part features for 3-d action recognition,” IEEE Signal
Processing Letters, 2017.
[79] M. Liu, H. Liu, and C. Chen, “Enhanced skeleton visualization for view
invariant human action recognition,” Pattern Recognition, 2017.
[80] J.-F. Hu, W.-S. Zheng, L. Ma, G. Wang, and J. Lai, “Real-time rgb-d
activity prediction by soft regression,” in ECCV, 2016.
[81] R. Slama, H. Wannous, M. Daoudi, and A. Srivastava, “Accurate 3d
action recognition using learning on the grassmann manifold,” Pattern
Recognition, 2015.
[82] M. Devanne, H. Wannous, S. Berretti, P. Pala, M. Daoudi, and
A. Del Bimbo, “3-d human action recognition by shape analysis of
motion trajectories on riemannian manifold,” IEEE Transactions on
Cybernetics, 2015.
[83] C. Wang, Y. Wang, and A. L. Yuille, “Mining 3d key-pose-motifs for
action recognition,” in CVPR, 2016.
[84] C. Wang, J. Flynn, Y. Wang, and A. L. Yuille, “Recognizing actions in
3d using action-snippets and activated simplices,” in AAAI, 2016.
[85] W. Li, L. Wen, M. Choo Chuah, and S. Lyu, “Category-blind human
action recognition: A practical recognition system,” in ICCV, 2015.
[86] Y. Ji, G. Ye, and H. Cheng, “Interactive body part contrast mining for
human interaction recognition,” in ICMEW, 2014.
[87] S. Vantigodi and R. V. Babu, “Real-time human action recognition from
motion capture data,” in NCVPRIPG, 2013.
[88] S. Vantigodi and V. B. Radhakrishnan, “Action recognition from motion
capture data using meta-cognitive rbf network classifier,” in ISSNIP,
2014.
[89] I. Kapsouras and N. Nikolaidis, “Action recognition on motion capture
data using a dynemes and forward differences representation,” Journal
of Visual Communication and Image Representation, 2014.
| 1cs.CV
|
Ising Processing Units:
Potential and Challenges for
Discrete Optimization
Carleton Coffrin, Harsha Nagarajan, and Russell Bent
arXiv:1707.00355v1 [math.OC] 2 Jul 2017
Los Alamos National Laboratory, Los Alamos, New Mexico, USA
Abstract. The recent emergence of novel computational devices, such
as adiabatic quantum computers, CMOS annealers, and optical parametric oscillators, presents new opportunities for hybrid-optimization algorithms that leverage these kinds of specialized hardware. In this work, we
propose the idea of an Ising processing unit as a computational abstraction for these emerging tools. Challenges involved in using and benchmarking these devices are presented, and open-source software tools are
proposed to address some of these challenges. The proposed benchmarking tools and methodology are demonstrated by conducting a baseline
study of established solution methods to a D-Wave 2X adiabatic quantum computer, one example of a commercially available Ising processing
unit.
1
Introduction
As the challenge of scaling traditional transistor-based Central Processing Unit
(CPU) technology continues to increase, experimental physicists and high-tech
companies have begun to explore radically different computational technologies,
such as adiabatic quantum computers (AQCs) [29], gate-based quantum computers [28,43], CMOS annealers [52,53], neuromorphic computers [42], and optical
parametric oscillators [40,27,30]. The goal of all of these technologies is to leverage the dynamical evolution of a physical system to perform a computation that
is challenging to emulate using traditional CPU technology (e.g., the simulation
of quantum physics) [19]. Despite their entirely disparate physical implementations, AQCs, CMOS annealers, and optical parametric oscillators are unified by
a common mathematical abstraction known as the Ising model, which has been
widely adopted by the physics community for the study of naturally occurring
discrete optimization [12]. Furthermore, this kind of “Ising machine” [40,27] is
already commercially available with more than 2000 decision variables in the
form of AQCs developed by D-Wave Systems [16].
The emergence of physical devices that can quickly solve Ising models is
particularly relevant to the optimization and operations research communities,
because the core purpose of these devices is to perform discrete optimization.
As this technology matures, it may be possible for this specialized hardware to
2
Carleton Coffrin, Harsha Nagarajan, and Russell Bent
rapidly solve classical combinatorial problems, such as Max-Cut [24] or MaxClique [37]. Preliminary studies have even suggested that some classes of Constraint Satisfaction Problems may be effectively encoded in such devices because
of their combinatorial structure [6,5,47,50]. Furthermore, an Ising model coprocessor could have significant impacts on solution methods for a variety of fundamental combinatorial problem classes, such as MAX-SAT [21,44] and integer
programming [46]. At this time, however, it remains unclear how established
optimization algorithms should leverage this emerging technology.
Similar to an arithmetic logic unit or a graphics processing unit (GPU), we
propose the idea of an Ising processing unit (IPU) as the computational abstraction for physical devices that perform optimization of Ising models. This
work first provides a brief introduction to the IPU abstraction and develops the
mathematical foundations and real-world considerations of this novel hardware.
Second, it conducts a baseline benchmarking study of an IPU to demonstrate
the current capabilities of such a device. Hence, this work makes both literature
survey and technical contributions. The survey contributions include (1) presenting foundational Ising model results from other disciplines in terminology
that is familiar to the optimization community (Section 2), and (2) highlighting key features of IPUs to provide context for future algorithmic developments
utilizing these analog devices (Section 3). The technical contributions include
(1) developing a benchmarking methodology for IPUs, which is enabled by proposed open-source software tools (Section 4); and (2) demonstrating the proposed benchmarking tools by conducting a baseline evaluation of a D-Wave 2X
IPU to support future work in the area (Section 5). To the best of our knowledge,
this is the first benchmarking study to use an integer programming solver for
identifying challenging IPU test cases. Because of the maturity and commercial
availability of the D-Wave IPU, this work often refers to that architecture as an
illustrative example. However, based on our understanding of other IPU technologies, the methods and tools proposed herein are applicable to all emerging
IPU hardware realizations.
2
A Brief Introduction to Ising Models
This section introduces the notations of the paper and provides a brief introduction to Ising models because they are the core mathematical abstraction of
IPUs. The Ising model refers to the class of graphical models where the nodes,
N , represent spin variables (i.e., σi ∈ {−1, 1} ∀i ∈ N ) and the edges, E, represent interactions of spin variables (i.e., σi σj ∀i, j ∈ E). A local field hi ∀i ∈ N
can be specified for each node, and an interaction strength Jij ∀i, j ∈ E can be
specified for each edge. Given these data, the energy of the Ising model is defined
as
X
X
E(σ) =
Jij σi σj +
hi σi
(1)
i,j∈E
i∈N
Applications of the Ising model typically consider one of two tasks. Some applications focus on finding the lowest possible energy of the Ising model, namely
Ising Processing Units: Potential and Challenges for Discrete Optimization
3
finding the globally optimal solution of the following binary quadratic optimization problem:
min : E(σ)
(2)
s.t.: σi ∈ {−1, 1} ∀i ∈ N
Other applications are interested in sampling from the Boltzmann distribution
of the Ising model’s states:
P r(σ) ∝ e
−E(σ)
τ
(3)
where τ is a parameter representing the effective temperature of the Boltzmann
distribution [54]. It is valuable to observe that in the Boltzmann distribution, the
lowest energy states have the highest probability. Hence, the task of sampling
from a Boltzmann distribution is similar to the task of finding the lowest energy
of the Ising model. Indeed, as τ approaches 0, the sampling task smoothly transforms into the aforementioned optimization task. This paper focuses exclusively
on the mathematical program presented in (2), the optimization task.
Frustration The notion of frustration is common in the study of Ising models
and refers to any instance of (2) where the optimal solution, σ ∗ , satisfies the
property
X
X
E(σ ∗ ) >
−|Jij | −
|hi |
(4)
i,j∈E
i∈N
A canonical example is the following three node problem:
h1 = 0, h2 = 0, h3 = 0
(5a)
J12 = −1, J23 = −1, J13 = 1
(5b)
Observe that, in this case, there are a number
of optimal solutions such that
P
E(σ ∗ ) = −2 but none such that E(σ) = i,j∈E −|Jij | = −3.
Gauge Transformations A valuable property of the Ising model is the gauge
transformation, which characterizes an equivalence class of Ising models. For
illustration, consider the optimal solution of Ising model S, σ s∗ . One can construct a new Ising model T where the optimal solution is the same, except that
σit∗ = −σis∗ for a particular node i ∈ N is as follows:
t
s
Jij
= −Jij
∀i, j ∈ E(i)
hti
=
−hsi
(6a)
(6b)
where E(i) indicates the neighboring edges of node i. This S-to-T manipulation
is referred to as a gauge transformation. Given a complete source state σ s and
a complete target state σ t , this transformation is generalized to all of σ by
t
s s s t t
Jij
= Jij
σi σj σi σj ∀i, j ∈ E
hti
=
hsi σis σit
∀i ∈ N
(7a)
(7b)
4
Carleton Coffrin, Harsha Nagarajan, and Russell Bent
It is valuable to observe that by using this gauge transformation property, one
can consider the class of Ising models where the optimal solution is σi∗ = −1 ∀i ∈
N or any arbitrary vector of −1, 1 values without loss of generality.
Bijection of Ising and Boolean Optimization It is also useful to observe that
there is a bijection between Ising optimization (i.e., σ ∈ {−1, 1}) and Boolean
optimization (i.e., x ∈ {0, 1}). The transformation of σ ⇒ x is given by
σi + 1
∀i ∈ N
2
σi σj + σi + σj + 1
xi xj =
∀i, j ∈ E
4
xi =
(8a)
(8b)
and the inverse x ⇒ σ is given by
σi = 2xi − 1 ∀i ∈ N
(9a)
σi σj = 4xi xj − 2xi − 2xj + 1 ∀i, j ∈ E
(9b)
Consequently, any results from solving Ising models are also immediately applicable to the following class of Boolean optimization problems:
X
X
min :
cij xi xj +
ci x i
(10)
i,j∈E
i∈N
s.t.: xi ∈ {0, 1} ∀i ∈ N
The Ising model provides a clean mathematical abstraction for understanding
the computation of IPUs. However, in practice, a number of hardware implementation factors present additional challenges for computing with IPUs.
3
Features of Ising Processing Units
The core inspiration for developing IPUs is to take advantage of the natural
evolution of a discrete physical system to find high-quality solutions to an Ising
model (2) [29,40,53]. Consequently, to the best of our knowledge, all IPUs developed to date are analog machines, which present a number of challenges that
the optimization community is not accustomed to considering.
Effective Temperature The ultimate goal of current IPUs is to solve the optimization problem (2) and determine the globally optimal solution to the input Ising
model. In practice, however, a variety of analog factors preclude IPUs from reliably finding globally optimal solutions. As a first-order approximation, current
IPUs behave like a Boltzmann sampler (3) with some hardware-specific effective
temperature, τ [7]. It has also been observed that the effective temperature of
an IPU can vary around a nominal value based on the Ising model that is being
executed [4]. This suggests that the IPU’s performance can change based on the
structure of the problem input.
Ising Processing Units: Potential and Challenges for Discrete Optimization
σ4
σ5
σ6
σ7
σ12
σ13
σ14
σ15
σ0
σ1
σ2
σ3
σ8
σ9
σ10
σ11
σ20
σ21
σ22
σ23
σ28
σ29
σ30
σ31
σ16
σ17
σ18
σ19
σ24
σ25
σ26
σ27
5
Fig. 1. A 2-by-2 Chimera Graph Illustrating the Variable Product Limitations of a
D-Wave 2X IPU.
Environmental Noise One of the primary contributors to the sampling nature
of IPUs is environmental factors. All analog machines are subject to faults due
to environmental noise; for example, even classical computers can be affected by
cosmic rays. However, given the relative novelty of IPUs, the effects of environmental noise are noticeable in current hardware. The effects of environmental
noise contribute to the perceived effective temperature τ of the IPU.
Problem Coefficients In traditional optimization applications, the problem coefficients are often rescaled to best suit floating-point arithmetic. Similarly, IPUs
have digital-to-analog converters that can encode a limited number of values;
typically these values are represented as numbers in the range of -1 to 1. Some
IPUs allow for hundreds of steps within this range, [29,53] whereas others support only the discrete set of {-1, 0, 1} [40]. In either case, the Ising model must
be rescaled into the IPU’s operating range. The values of the coefficients used
in the IPU are critically important because these values are often perturbed by
environmental noise and hardware biases.
Coefficient Biases Once an Ising model is input into an IPU, its coefficients
are subject to at least two sources of bias. The first source of bias is a model
programming error that occurs independently each time the IPU is configured for
a computation. This bias is often mitigated by programming the IPU multiple
times with an identical input and combining the results from all executions.
The second source of bias is a persistent coefficient error, which is an artifact of
the IPU manufacturing and calibration process. Because this bias is consistent
across multiple IPU executions, this source bias is often mitigated by performing
multiple gauge transformations on the input and combining the results from all
executions.
Topological Limitations Another significant feature of IPUs is a restricted topology for variable products. In classical optimization (e.g., (2)), it is assumed that
every variable can interact with every other variable, that is, an Ising model
6
Carleton Coffrin, Harsha Nagarajan, and Russell Bent
where an edge connects every pair of variables. However, because of the hardware implementation of an IPU, it may not be possible for some variables to
interact. For example, the current D-Wave IPUs are restricted to the chimera
topology, which is a two-dimensional lattice of unit cells, each of which consist
of a 4-by-4 bipartite graph (e.g., see Figure 1). In addition to these restrictions,
fabrication errors can also lead to random failures of nodes and edges in the IPU
hardware. Indeed, as a result of these minor imperfections, every D-Wave IPU
developed to date has a unique topology [9,18,32]. Research and development
of algorithms for embedding various kinds of Ising models into a specific IPU
topology is still an active area of research [6,11,13,34].
3.1
Challenges of Benchmarking Ising Processing Units
These novel IPU features present unique challenges for benchmarking these devices. These challenges fall into roughly two categories: finding interesting Ising
models for testing and comparing with classical methods.
Standardized Benchmark Libraries Research and development in optimization
algorithms has benefited greatly from standardized benchmark libraries [35,20,26].
However, direct application of these libraries to IPUs is out of scope for the near
term for the following reasons: (1) the Ising model is a binary quadratic program,
which is sufficiently restrictive to preclude the use of many standard problem
libraries; (2) even in cases where the problems of interest can be mapped directly
to the Ising model (e.g., Max-Cut, Max-Clique), the task of embedding the given
problems onto the IPU’s hardware graph can be prohibitive; and (3) even if an
embedding can be found, it is not obvious that the problem’s coefficients will be
amenable to the IPU’s operating range [14].
Another option is to build a new standardized benchmark library specifically
for the evaluation of IPUs. However, given that every IPU is unique and within
an IPU each variable also has individual properties (e.g., persistent bias), it is
not immediately clear that a new static benchmark library could be applied to
multiple IPUs.
Comparison with Classical Algorithms Because of the radically different hardware of CPUs vs IPUs and the sampling nature of the IPUs, how to conduct a
fair comparison of these two technologies is not immediately clear [38,39,33]. For
example, is the comparison more fair or less fair if classical algorithms utilize
multiple cores or GPUs? Indeed, comparisons of D-Wave’s IPU with classical
algorithms have resulted in vigorous discussion about what algorithms and metrics should be used to make such comparisons [1,32,2]. It is widely accepted that
IPUs do not provide optimality guarantees and should be compared to classical
heuristic methods rather than methods providing optimality proofs. However,
it is less clear whether heuristics should be specialized to solve problems for a
specific IPU architecture (e.g., [49,48]) or whether classical methods should be
designed for the most general form of the Ising model (2). This debate will most
likely continue for several years. In this work, our goal is not to answer these
Ising Processing Units: Potential and Challenges for Discrete Optimization
7
challenging questions but rather to develop benchmarking tools that will assist
researchers in exploring these questions and replicating previous results as the
subject of IPUs evolves.
4
Tools for Benchmarking Ising Processing Units
To help address a number of the previously discussed challenges, in this work
we propose three open-source tools for assisting in benchmarking IPUs:
– bqpjson: a language-independent json-based test case exchange format designed with IPUs in mind1
– dwig: a collection of algorithms for IPU test case generation2
– bqpsolvers: a collection of tools for encoding bqpjson data into various
optimization solvers3
We now review the design motivations and core features of each of these tools.
4.1
Data Management
The primary design goals of bqpjson are to (1) encode all of the information
required to replicate the exact execution that was performed on a specific IPU
hardware; (2) allow the IPU test case to be transformed back to the original problem domain, if one exists; and (3) not be prescriptive about the mathematical
representation of the test case (i.e., (2) or (10)). To that end, bqpjson encodes
the following class of binary quadratic programs, which is a generalization of (2)
and (10):
X
X
min : s
cij bi bj +
ci bi + o
(11)
i,j∈E
i∈N
s.t.: bi ∈ {0, 1} ∀i ∈ N or bi ∈ {−1, 1} ∀i ∈ N
The key features of this model are (1) the decision variables can be represented as
either spin (i.e., {−1, 1}) or Boolean (i.e., {0, 1}) values; (2) the objective offset
term, o, is required in order to ensure an idempotent transformation between
the spin and Boolean variable domains; (3) the explicit scaling term, s, allows
for the problem coefficients (i.e., c) to be specified within an IPU’s operating
range while preserving the units of the problem’s original objective function;
and (4) the collection of decision variables N allows the variable identifiers to
have arbitrary values, such as the names used by specific IPU hardware (unlike
traditional test case formats, where the variables are numbered from 1 to n).
1
2
3
The source code is available at https://github.com/lanl-ansi/bqpjson
The source code is available at https://github.com/lanl-ansi/dwig
The source code is available at https://github.com/lanl-ansi/bqpsolvers
8
Carleton Coffrin, Harsha Nagarajan, and Russell Bent
In addition to these problem specification features, bqpjson also has extensive support for documenting test cases. A description section provides humanreadable information about the test case, whereas a metadata section is used
to encode useful machine-readable information. bqpjson also supports encoding solutions so that test cases can include details about target or best-known
solutions to specific cases.
Implementation and Tools The current implementation of bqpjson is provided
as a free and open-source Python package that can be installed from the source
code repository or from the Python Package Index (PyPI). This package includes
(1) detailed documentation of the bqpjson file format; (2) tools for validation of
JSON data to ensure they conform to the bqpjson specification; (3) bqpjsonto-bqpjson idempotent transformations between the spin and Boolean variable
domains; (4) translation of bqpjson data into other established problem formats, such as QUBO [10] and MiniZinc [45]; and (5) a collection of command
line tools for bash script processing of bqpjson data.
4.2
Case Generation
Because of the challenges associated with mapping established optimization test
cases to the IPU hardware, the IPU benchmarking community has adopted the
practice of generating tests on a case-by-case basis for specific IPUs [32,25,33,18].
This practice amounts to finding interesting values for h and J in (1). In some
cases the procedures for generating these values are elaborate [18,31] and are
designed to leverage theoretical results about Ising models [25]. To ensure the
experimental reproducibility in the context of IPU-specific case generation, in
this paper we developed the D-Wave Instance Generator (dwig). dwig represents a collection of algorithms that generate well-studied random Ising models.
Our hope is that as long as the same test case generation algorithm is used, the
average values of previous experimental results will be replicable across multiple
IPUs. The dwig script currently implements five problem classes proposed in
the literature [32,31,33,18], each of which we will briefly introduce. For a detailed
description, please refer to the source publication of the problem class.
Random (RAN-k and RANF-k) To the best of our knowledge, the RAN-k problem was first proposed in [32] and consists simply of assigning each value of h
to 0 and each value of J uniformly at random from the set
{−k, −k + 1, . . . , −2, −1, 1, 2, . . . , k − 1, k}
(12)
The RANF-k problem is a simple variant of RAN-k where the values of h are
also selected uniformly at random from (12). As we will later see, RAN-1 and
RANF-1, where h, J ∈ {−1, 1}, are an interesting subclass of this problem.
Frustrated Loops (FL-k and FCL-k) The frustrated loop problem was originally
proposed in [25] and then later refined to the FL-k problem in [31]. It consists
Ising Processing Units: Potential and Challenges for Discrete Optimization
9
of generating a collection of random cycles in the IPU graph. In each cycle,
all of the edges are set to −1 except one random edge, which is set to 1 to
produce frustration. A scaling factor α is used to control how many random cycles
should be generated, and the parameter k determines how many cycles each edge
can participate in. A key property of the FL-k generation procedure is that a
globally optimal solution is maintained at σi = −1 ∀i ∈ N and σi = 1 ∀i ∈ N
[31]. However, by default, dwig uses a gauge transformation to obfuscate this
solution pair to a random assignment of σ.
A variant of the frustrated loop problem is the frustrated cluster loop problem, FCL-k [33]. The FCL-k problem is inspired by the chimera network topology
(i.e., Figure 1). The core idea is that tightly coupled variables (e.g., σ1 ..σ7 in
Figure 1) should form a cluster where all of the variables take the same value.
This is achieved by setting all of the values of J within the cluster to −1. For
the remaining edges between clusters, the previously described frustrated cycles generation scheme is used. It is important to note that a polynomial time
algorithm is known for solving the FCL-k problem class on chimera graphs [39].
It is worthwhile to mention that the FL-k and FCL-k case generators are
effectively solving a cycle packing problem on the IPU graph. Hence, the randomized algorithm implemented in dwig is not guaranteed to find a solution if
one exists, and in practice it fails for the highly constrained settings of α and k.
Weak-Strong Cluster Networks (WSCNs) The WSCN problem was proposed in
[18] and is highly specialized to the chimera network topology. The basic building
block of a WSCN is a pair of spin clusters in the chimera graph (e.g., σ1 ..σ7 and
σ8 ..σ15 in Figure 1). In the strong cluster the values of h are set to the strong
force parameter sf and in the weak cluster the values of h are set to the weak
force parameter wf. All of the values of J within and between this cluster pair
are set to −1. Once a number of weak-strong cluster pairs have been placed, the
strong clusters are connected to each other using random values of J ∈ {−1, 1}.
The values of sf = −1.0 and wf = 0.44 are recommended by [18]. The motivation
for the WSCN design is that the clusters create many deep local minima that
are difficult for local search methods to escape.
Implementation The current implementation of dwig is provided as a Python
script. The implementation takes an IPU hardware specification as input and
produces bqpjson test cases for each of the problem classes described above.
4.3
Baseline Solution Methods
Because of the novelty of bqpjson, solvers do not currently support loading
bqpjson cases directly. Hence, to make bqpjson usable we provide the bqpsolvers code base, which includes a collection of simple tools for running
bqpjson data on a variety of established Ising model optimization algorithms.
bqpsolvers is designed as a collaborative space where state-of-the-art bqpjson solvers can be community-curated and leveraged for future IPU evaluations.
10
Carleton Coffrin, Harsha Nagarajan, and Russell Bent
At this time, bqpsolvers includes connections to the following solution
methods: (1) mixed integer programming (MIP) [17,8], (2) large neighborhood
search (LNS) via the Hamze-Freitas-Selby (HFS) algorithm [23,49], and (3) adiabatic quantum computation (AQC) via the D-Wave IPU [29]. Each of these is
briefly introduced.
Mixed Integer Programming Modern MIP solvers are highly optimized for Boolean
variables, so we choose to develop a MIP model based on the Boolean optimization variant of the Ising model, (10), as follows:
X
X
min : s
cij xij +
ci xi + o
(13a)
i,j∈E
i∈N
s.t.:
xij ≥ xi + xj − 1 ∀i, j ∈ E
(13b)
xij ≤ xi ∀i, j ∈ E
(13c)
xij ≤ xj ∀i, j ∈ E
(13d)
xij ∈ {0, 1} ∀i, j ∈ E
xi ∈ {0, 1} ∀i ∈ N
In this formulation we convert the binary quadratic program defined in (10) to
a binary linear program by lifting the variable products xi xj into a new variable
xij and adding linear constraints to capture the xij = xi ∧xj ∀i, j ∈ E constraints
[8]. This formulation was implemented using Gurobi [22].
Large Neighborhood Search The state-of-the-art heuristic for solving Ising models on the chimera graphs is an LNS-based method called HFS [23,49]. The core
idea of this algorithm is to extract low treewidth subgraphs of the given Ising
model and then use dynamic programming to compute the optimal configuration
of these subgraphs. This extract and optimize process is repeated until a specified time limit is reached. This solver utilizes a highly optimized open-source C
implementation of HFS [48] and leverages the bqpjson tools to convert bqpjson data into the HFS’s proprietary data format.
Adiabatic Quantum Computation The AQC solver runs the provided bqpjson model natively on a D-Wave IPU. This solver assumes that the bqpjson model was generated on the specified IPU and that the variable identifiers
used in the bqpjson model will map directly to the IPU hardware. No attempt
is made to transform a general bqpjson model into the specified IPU hardware.
Recalling that the IPU behaves like a Boltzmann sampler rather than a classical
optimization solver, this code takes a number of samples from the IPU (typically
10,000) and reports the best solution found among all of the samples, making
the IPU’s output consistent with the other optimization tools considered here.
Implementation All of the bqpsolvers are provided as independent Python
scripts with consistent input and output interfaces.
Ising Processing Units: Potential and Challenges for Discrete Optimization
5
11
A Study of Established Methods
In this section we conduct an in-depth computational study of the IPU instance
generation procedures and possible solution methods. The first goal of this study
is to understand what classes of problems are most useful for the study of IPUs.
The second goal is to provide a baseline of comparison for future works in this
area. This computational study is divided into two phases. First, we focus on a
broad parameter sweep of all possible instance generation procedures and use a
MIP solver to determine which of the problem classes are most challenging. Second, after the most challenging problem classes have been identified, a detailed
study is conducted to compare and contrast the MIP, LNS, and AQC solution
methods.
Throughout this section, the following notations are used to describe the
runtime analysis of the algorithms: U B denotes the objective value of the best
feasible solution produced by the algorithm within the time limit, LB denotes the
value of the best lower bound produced by the algorithm within the time limit,
T denotes the algorithm runtime in seconds, T O denotes that the algorithm hit
a time limit of 600 seconds, µ(·) denotes the mean of a collection of values, sd(·)
denotes the standard deviation of a collection of values, and max(·) denotes the
maximum of a collection of values.
Computation Environment The IPU computation is conducted on a D-Wave 2X
AQC [15]. This computer is a 12-by-12 chimera topology with random omissions;
in total, the IPU has 1095 qubits and 3061 couplers and an effective temperature
of τ ∈ (0.091, 0.053) depending on the problem being solved [51,36]. Unless
otherwise noted, the AQC is configured to produce 10,000 samples using a 5microsecond annealing time per sample and a random gauge transformation
every 100 samples. The reported runtime of the AQC reflects the amount of time
used on the IPU hardware; it does not include the overhead of communication
or scheduling of the computation.
The classical computing algorithms are run on HPE ProLiant XL170r servers
with dual Intel 2.10GHz CPUs and 128GB memory. Gurobi 7.0.2 [22] is used as
the MIP solver and is configured to use one thread. The highly specialized and
optimized HFS algorithm [48] is used as an LNS-based heuristic and also uses
one thread.
5.1
Identifying Challenging Cases
Broad Parameter Sweep In this first experiment, we conduct a parameter sweep
of all the inputs to the problem generation algorithms described in Section 4.2.
Table 1 provides a summary of the input parameters for each problem class.
The values of each parameter are encoded with the following triple: (start..stop :
step size). When two parameters are required for a given problem class, the cross
product of all parameters is used. For each problem class and each combination
of parameter settings, 250 random problems are generated in order to produce a
reasonable estimate of the average difficulty of that configuration. Each problem
12
Carleton Coffrin, Harsha Nagarajan, and Russell Bent
Problem
RAN-k
RANF-k
FL-k
FCL-k
WSCN
First Param.
k ∈ (1..5 : 1)
k ∈ (1..5 : 1)
k ∈ (1..5 : 1)
k ∈ (1..5 : 1)
wf ∈ (−1..1 : 0.2)
Second Param.
NA
NA
α ∈ (0..1 : 0.1)
α ∈ (0..1 : 0.1)
sf ∈ (−1..1 : 0.2)
Table 1. Parameter Settings of Various Problems.
Problem # Cases µ(|N |)
RAN
1250 1095
RANF
1250 1095
FL
6944 1008
FCL
8347
888
WSCN
30250
949
µ(|E|)
3061
3061
2126
2282
2313
µ(T ) sd(T ) max(T )
TO
—
TO
TO
—
TO
1.82 1.06
16.80
4.19 2.81
41.40
0.25 0.87
17.90
Table 2. MIP Runtime on Various IPU Benchmark Problems (seconds).
is generated using all of the decision variables available on the IPU. The results
of this parameter sweep are summarized in Table 2. It is important to note
that the FL and FCL generation methods are randomized algorithms and are
not guaranteed to succeed. This explains why the number of cases for these
problems is not a multiple of 250.
The results presented in Table 2 indicate that, at this problem size, all variants of the FL, FCL, and WSCN problems are easy for modern MIP solvers. This
suggests that these problems are not ideal candidates for benchmarking IPUs.
In contrast, the RAN and RANF cases consistently hit the runtime limit of the
MIP solver, suggesting that these problems are more challenging optimization
tasks. This result is consistent with a similar observation in the SAT community,
where random SAT problems are known to be especially challenging [41,3]. To
get a better understanding of these RAN problem classes, we next perform a
detailed study of these problems for various values of the parameter k.
The RAN and RANF Problems In this second experiment, we focus on the
RAN-k and RANF-k problems and conduct a detailed parameter sweep of k ∈
(1..10 : 1). To accurately measure the runtime difficulty of the problem, we also
reduce the size of the problem from 1095 variables to 194 variables so that the
MIP solver can reliably terminate within a 600-second time limit. The results of
this parameter sweep are summarized in Table 3.
The results presented in Table 3 indicate that (1) as the value of k increases,
both the RAN and RANF problems become easier; and (2) the RANF problem is
easier than the RAN problem. The latter is not surprising because the additional
linear coefficients in the RANF problem break many of the symmetries that exist
in the RAN problem. These results suggest that it is sufficient to focus on the
RAN-1 and RANF-1 cases for a more detailed study of IPU performance. This
is a serendipitous outcome for IPU benchmarking because restricting the problem coefficients to {−1, 0, 1} reduces artifacts caused by noise and the numeral
precision of the analog hardware.
Ising Processing Units: Potential and Challenges for Discrete Optimization
13
k # Cases µ(|N |) µ(|E|) µ(T ) sd(T ) max(T ) µ(T ) sd(T ) max(T )
Problems of Increasing k
RAN-k
RANF-k
1
250
194 528 340.0 195.0
TO 14.10 15.20
82.70
2
250
194 528 89.3 64.3
481 2.97 3.41
22.70
3
250
194 528 64.8 28.3
207 1.67 1.48
10.70
4
250
194 528 58.0 29.5
250 1.25 0.83
6.10
5
250
194 528 49.0 23.0
131 1.12 0.77
6.98
6
250
194 528 49.0 22.4
119 1.05 0.59
4.47
7
250
194 528 45.0 22.8
128 1.04 0.75
7.60
8
250
194 528 44.8 23.7
121 1.01 0.62
5.43
9
250
194 528 42.3 22.3
110 0.98 0.60
5.08
10
250
194 528 39.8 22.1
107 0.91 0.43
3.09
Table 3. MIP Runtime on RAN-k and RANF-k IPU Benchmark Problems (seconds)
5.2
An IPU Evaluation using RAN-1 and RANF-1
Now that the RAN-1 and RANF-1 problem classes have been identified as the
most challenging IPU test cases, we perform two detailed studies on these problems using all three algorithmic approaches (i.e., AQC, LNS, and MIP). The first
study focuses on the scalability trends of these solution methods as the problem
size increases, whereas the second study focuses on a runtime analysis of the
largest cases that can be evaluated on our IPU hardware.
Scalability Analysis In this experiment, we increase the problem size gradually
to understand the scalability profile of each of the solution methods (AQC,
LNS, and MIP). The results are summarized in Table 4. Focusing on the smaller
problems, where the MIP solver provides an optimality proof, we observe that
both the AQC and the LNS methods find the optimal solution in all of the
sampled test cases, suggesting that both heuristic solution methods are of high
quality. Focusing on the larger problems, we observe that, in just a few seconds,
both AQC and LNS find feasible solutions that are of higher quality than what
the MIP solver can find in 600 seconds. This suggests that both methods are
producing high-quality solutions at this scale. As the problem size grows, a slight
quality discrepancy emerges favoring LNS over AQC; however, this discrepancy
in average solution quality is less than 1% of the best known value.
Detailed Runtime Analysis Given that both the AQC and the LNS solution
methods have very similar solution qualities, it is prudent to perform a detailed
runtime study to understand the quality vs runtime tradeoff. To develop a runtime profile of the LNS algorithm, the solver’s runtime limit is set to values
ranging from 0.01 to 10.00 seconds. In the case of the AQC algorithm, the number of requested samples is set to values ranging from 10 to 10,000, which has
the effect of scaling the runtime of the IPU process.4 The results of this study
4
It is important to emphasize that the IPU runtime does not include any communication or scheduling overheads.
14
Carleton Coffrin, Harsha Nagarajan, and Russell Bent
AQC
LNS
# Cases µ(|N |) µ(|E|) µ(U B) µ(T ) µ(U B) µ(T ) µ(U B)
RAN-1 Problems of Increasing Size
250
30
70
-44 3.53
-44 10
-44
250
69 176
-110 3.57
-110 10
-110
250
122 321
-199 3.60
-199 10
-199
250
194 528
-325 3.64
-325 10
-325
250
275 751
-462 3.68
-462 10
-461
250
375 1030
-633 3.73
-633 10
-629
250
486 1337
-821 3.77
-822 10
-814
250
613 1689 -1038 3.77 -1039 10 -1021
250
761 2114 -1296 3.76 -1297 10 -1262
250
923 2578 -1574 3.77 -1576 10 -1525
250 1095 3061 -1870 3.80 -1873 10 -1806
RANF-1 Problems of Increasing Size
250
30
70
-53 3.53
-53 10
-53
250
69 176
-127 3.56
-127 10
-127
250
122 321
-229 3.61
-229 10
-229
250
194 528
-370 3.66
-370 10
-370
250
275 751
-526 3.71
-526 10
-526
250
375 1030
-719 3.76
-719 10
-719
250
486 1337
-934 3.81
-934 10
-933
250
613 1689 -1179 3.82 -1179 10 -1178
250
761 2114 -1472 3.82 -1472 10 -1470
250
923 2578 -1786 3.82 -1787 10 -1778
250 1095 3061 -2121 3.86 -2122 10 -2110
MIP
µ(LB)
µ(T )
-44 0.05
-110 0.48
-199 15.90
-327 340.00
-483
TO
-673
TO
-881
TO
-1116
TO
-1401
TO
-1713
TO
-2045
TO
-53
-127
-229
-370
-527
-727
-954
-1211
-1520
-1856
-2212
0.02
0.13
0.67
14.10
128.00
471.00
588.00
TO
TO
TO
TO
Table 4. A Comparison of Solution Quality and Runtime as Problem Size Increases
on RAN-1 and RANF-1.
are summarized in Figure 2. Note that the stochastic sampling nature of the
IPU results in some noise for small numbers of samples. However, the overall
trend is still clear.
The results presented in Figure 2 further illustrate that (1) the RAN problem class is more challenging than the RANF problem class, and (2) regardless
of the runtime configuration used, the LNS heuristic slightly outperforms the
AQC; however, the average solution quality is always within 1% of each other.
Combining all of the results from this section suggests that the D-Wave 2X IPU
is comparable to state-of-the-art optimization methods on commodity classical
computing hardware.
6
Conclusion
In this work we have introduced the idea of an IPU as a computational abstraction for emerging physical devices that optimize Ising models. We have
demonstrated a number of unexpected challenges in benchmarking such devices
and have proposed bqpjson , dwig , and bqpsolvers to help address these
Ising Processing Units: Potential and Challenges for Discrete Optimization
1e−02
1e−01
1e+00
Runtime (seconds, log)
1e+01
−2119
−2117
AQC
LNS
−2121
−1870
−1865
−1860
AQC
LNS
Average Objective Value (n = 200)
RANF−1 Runtime Trend
−1875
Average Objective Value (n = 200)
RAN−1 Runtime Trend
15
1e−02
1e−01
1e+00
1e+01
Runtime (seconds, log)
Fig. 2. Detailed Runtime Analysis of the AQC (D-Wave 2X) and LNS Heuristic (HFS)
on the RAN-1 (left) and RANF-1 (right) Problem Classes.
challenges. We hope that these tools will assist the research community in developing novel algorithms that leverage IPUs.
The baseline study of the D-Wave 2X IPU suggests that averaging over collections of randomly generated test cases is a reasonable strategy for benchmarking
IPUs. However, finding a class of challenging randomly generated test cases is
not trivial. The study verified that at least one commercially available IPU is
comparable to current state-of-the-art classical methods. However, a detailed
runtime analysis did not demonstrate any time vs quality configuration where
the IPU outperformed a state-of-the-art classical method. That said, the IPU
hardware seems to be largely invariant in quality and runtime across a wide
variety of problem classes and instance sizes. If this trend continues as the IPU’s
hardware increases in size, one would expect the IPU to overtake the current
state-of-the-art classical methods because of its parallel computational nature.
Overall, we conclude that the emergence of IPUs is an interesting development for the optimization community and warrants continued study. Considerable work remains to determine the best classes of test cases for benchmarking
IPUs and to develop a better understanding of how to fairly compare this heterogeneous hardware to established classical computing methods.
Acknowledgments
We gratefully acknowledge Denny Dahl for his feedback on the tools proposed
herein and the U.S. Department of Energy for supporting this work through Los
Alamos National Laboratory’s LDRD Program.
16
Carleton Coffrin, Harsha Nagarajan, and Russell Bent
References
1. Aaronson, S.: D-wave: Truth finally starts to emerge. Published online at http:
//www.scottaaronson.com/blog/?p=1400 (May 2013), accessed: 04/28/2017
2. Aaronson, S.: Insert d-wave post here. Published online at http://www.
scottaaronson.com/blog/?p=3192 (Mar 2017), accessed: 04/28/2017
3. Balyo, T., Heule, M.J.H., Jarvisalo, M.: Sat competition 2016: Recent developments. In: Proceedings of the Thirty-First National Conference on Artificial Intelligence. pp. 5061–5063. AAAI’17, AAAI Press (2017)
4. Benedetti, M., Realpe-Gómez, J., Biswas, R., Perdomo-Ortiz, A.: Estimation of
effective temperatures in quantum annealers for sampling applications: A case
study with possible applications in deep learning. Phys. Rev. A 94, 022308 (Aug
2016), https://link.aps.org/doi/10.1103/PhysRevA.94.022308
5. Bian, Z., Chudak, F., Israel, R., Lackey, B., Macready, W.G., Roy, A.: Discrete
optimization using quantum annealing on sparse ising models. Frontiers in Physics
2, 56 (2014), http://journal.frontiersin.org/article/10.3389/fphy.2014.
00056
6. Bian, Z., Chudak, F., Israel, R.B., Lackey, B., Macready, W.G., Roy, A.: Mapping constrained optimization problems to quantum annealing with application
to fault diagnosis. Frontiers in ICT 3, 14 (2016), http://journal.frontiersin.
org/article/10.3389/fict.2016.00014
7. Bian, Z., Chudak, F., Macready, W.G., Rose, G.: The ising model: teaching an
old problem new tricks. Published online at https://www.dwavesys.com/sites/
default/files/weightedmaxsat_v2.pdf (2010), accessed: 04/28/2017
8. Billionnet, A., Elloumi, S.: Using a mixed integer quadratic programming solver
for the unconstrained quadratic 0-1 problem. Mathematical Programming 109(1),
55–68 (2007), http://dx.doi.org/10.1007/s10107-005-0637-9
9. Boixo, S., Ronnow, T.F., Isakov, S.V., Wang, Z., Wecker, D., Lidar, D.A., Martinis, J.M., Troyer, M.: Evidence for quantum annealing with more than one hundred qubits. Nat Phys 10(3), 218–224 (Mar 2014), http://dx.doi.org/10.1038/
nphys2900, article
10. Booth, M.: qbsolv. https://github.com/dwavesystems/qbsolv (2017)
11. Boothby, T., King, A.D., Roy, A.: Fast clique minor generation in chimera qubit
connectivity graphs. Quantum Information Processing 15(1), 495–508 (Jan 2016),
http://dx.doi.org/10.1007/s11128-015-1150-6
12. Brush, S.G.: History of the lenz-ising model. Rev. Modern Phys. 39, 883–893 (Oct
1967), https://link.aps.org/doi/10.1103/RevModPhys.39.883
13. Cai, J., Macready, W.G., Roy, A.: A practical heuristic for finding graph minors
(2014), https://arxiv.org/abs/1406.2741
14. Coffrin, C., Nagarajan, H., Bent, R.: Challenges and Successes of Solving Binary
Quadratic Programming Benchmarks on the DW2X QPU. Tech. rep., Los Alamos
National Laboratory (LANL) (2016)
15. D-Wave Systems Inc.: The d-wave 2x quantum computer technology overview.
Published online at https://www.dwavesys.com/sites/default/files/D-Wave%
202X%20Tech%20Collateral_0915F.pdf (2015), accessed: 04/28/2017
16. D-Wave Systems Inc.: Customers. Published online at https://www.dwavesys.
com/our-company/customers (2017), accessed: 04/28/2017
17. Dash, S.: A note on qubo instances defined on chimera graphs. arXiv preprint
arXiv:1306.1202 (2013), https://arxiv.org/abs/1306.1202
Ising Processing Units: Potential and Challenges for Discrete Optimization
17
18. Denchev, V.S., Boixo, S., Isakov, S.V., Ding, N., Babbush, R., Smelyanskiy, V.,
Martinis, J., Neven, H.: What is the computational value of finite-range tunneling? Phys. Rev. X 6, 031015 (Aug 2016), https://link.aps.org/doi/10.1103/
PhysRevX.6.031015
19. Feynman, R.P.: Simulating physics with computers. International Journal of Theoretical Physics 21(6), 467–488 (1982)
20. Gent, I.P., Walsh, T.: CSPlib: A Benchmark Library for Constraints, pp. 480–
481. Springer Berlin Heidelberg, Berlin, Heidelberg (1999), http://dx.doi.org/
10.1007/978-3-540-48085-3_36
21. de Givry, S., Larrosa, J., Meseguer, P., Schiex, T.: Solving Max-SAT as Weighted
CSP, pp. 363–376. Springer Berlin Heidelberg, Berlin, Heidelberg (2003), http:
//dx.doi.org/10.1007/978-3-540-45193-8_25
22. Gurobi Optimization, Inc.: Gurobi optimizer reference manual. Published online
at http://www.gurobi.com (2014)
23. Hamze, F., de Freitas, N.: From fields to trees. In: Proceedings of the 20th Conference on Uncertainty in Artificial Intelligence. pp. 243–250. UAI ’04, AUAI Press,
Arlington, Virginia, United States (2004), http://dl.acm.org/citation.cfm?id=
1036843.1036873
24. Haribara, Y., Utsunomiya, S., Yamamoto, Y.: A Coherent Ising Machine for MAXCUT Problems: Performance Evaluation against Semidefinite Programming and
Simulated Annealing, pp. 251–262. Springer Japan, Tokyo (2016), http://dx.doi.
org/10.1007/978-4-431-55756-2_12
25. Hen, I., Job, J., Albash, T., Rønnow, T.F., Troyer, M., Lidar, D.A.: Probing for
quantum speedup in spin-glass problems with planted solutions. Phys. Rev. A 92,
042325 (Oct 2015), https://link.aps.org/doi/10.1103/PhysRevA.92.042325
26. Hoos, H.H., Stutzle, T.: Satlib: An online resource for research on sat (2000)
27. Inagaki, T., Haribara, Y., Igarashi, K., Sonobe, T., Tamate, S., Honjo, T., Marandi,
A., McMahon, P.L., Umeki, T., Enbutsu, K., Tadanaga, O., Takenouchi, H., Aihara, K., Kawarabayashi, K.i., Inoue, K., Utsunomiya, S., Takesue, H.: A coherent
ising machine for 2000-node optimization problems. Science 354(6312), 603–606
(2016), http://science.sciencemag.org/content/354/6312/603
28. International Business Machines Corporation: Ibm building first universal quantum
computers for business and science. Published online at https://www-03.ibm.com/
press/us/en/pressrelease/51740.wss (2017), accessed: 04/28/2017
29. Johnson, M.W., Amin, M.H.S., Gildert, S., Lanting, T., Hamze, F., Dickson, N.,
Harris, R., Berkley, A.J., Johansson, J., Bunyk, P., Chapple, E.M., Enderud, C.,
Hilton, J.P., Karimi, K., Ladizinsky, E., Ladizinsky, N., Oh, T., Perminov, I., Rich,
C., Thom, M.C., Tolkacheva, E., Truncik, C.J.S., Uchaikin, S., Wang, J., Wilson,
B., Rose, G.: Quantum annealing with manufactured spins. Nature 473(7346),
194–198 (May 2011), http://dx.doi.org/10.1038/nature10012
30. Kielpinski, D., Bose, R., Pelc, J., Vaerenbergh, T.V., Mendoza, G., Tezak, N.,
Beausoleil, R.G.: Information processing with large-scale optical integrated circuits. In: 2016 IEEE International Conference on Rebooting Computing (ICRC).
pp. 1–4 (Oct 2016)
31. King, A.D., Lanting, T., Harris, R.: Performance of a quantum annealer on rangelimited constraint satisfaction problems. arXiv preprint arXiv:1502.02098 (2015)
32. King, J., Yarkoni, S., Nevisi, M.M., Hilton, J.P., McGeoch, C.C.: Benchmarking a quantum annealing processor with the time-to-target metric. arXiv preprint
arXiv:1508.05087 (2015)
18
Carleton Coffrin, Harsha Nagarajan, and Russell Bent
33. King, J., Yarkoni, S., Raymond, J., Ozfidan, I., King, A.D., Nevisi, M.M., Hilton,
J.P., McGeoch, C.C.: Quantum annealing amid local ruggedness and global frustration (2017), https://arxiv.org/abs/1701.04579
34. Klymko, C., Sullivan, B.D., Humble, T.S.: Adiabatic quantum programming: minor embedding with hard faults. Quantum Information Processing 13(3), 709–729
(2014), http://dx.doi.org/10.1007/s11128-013-0683-9
35. Koch, T., Achterberg, T., Andersen, E., Bastert, O., Berthold, T., Bixby, R.,
Danna, E., Gamrath, G., Gleixner, A., Heinz, S., Lodi, A., Mittelmann, H., Ralphs,
T., Salvagnin, D., Steffy, D., Wolter, K.: Miplib 2010: Mixed integer programming
library version 5. Mathematical Programming Computation 3(2), 103–163 (2011)
36. Lokhov, A.Y., Vuffray, M., Misra, S., Chertkov, M.: Optimal structure and parameter learning of ising models (2016), https://arxiv.org/abs/1612.05024
37. Lucas, A.: Ising formulations of many np problems. Frontiers in Physics 2, 5
(2014), http://journal.frontiersin.org/article/10.3389/fphy.2014.00005
38. Mandrà, S., Zhu, Z., Wang, W., Perdomo-Ortiz, A., Katzgraber, H.G.: Strengths
and weaknesses of weak-strong cluster problems: A detailed overview of state-ofthe-art classical heuristics versus quantum approaches. Phys. Rev. A 94, 022337
(Aug 2016), https://link.aps.org/doi/10.1103/PhysRevA.94.022337
39. Mandr, S., Katzgraber, H.G., Thomas, C.: The pitfalls of planar spin-glass benchmarks: Raising the bar for quantum annealers (again) (2017), https://arxiv.org/
abs/1703.00622
40. McMahon, P.L., Marandi, A., Haribara, Y., Hamerly, R., Langrock, C., Tamate, S.,
Inagaki, T., Takesue, H., Utsunomiya, S., Aihara, K., et al.: A fully-programmable
100-spin coherent ising machine with all-to-all connections. Science p. aah5178
(2016)
41. Mitchell, D., Selman, B., Levesque, H.: Hard and easy distributions of sat problems.
In: Proceedings of the Tenth National Conference on Artificial Intelligence. pp.
459–465. AAAI’92, AAAI Press (1992), http://dl.acm.org/citation.cfm?id=
1867135.1867206
42. Modha, D.S.: Introducing a brain-inspired computer. Published online at
http://www.research.ibm.com/articles/brain-chip.shtml (2017), accessed:
04/28/2017
43. Mohseni, M., Read, P., Neven, H., Boixo, S., Denchev, V., Babbush, R.,
Fowler, A., Smelyanskiy, V., Martinis, J.: Commercialize quantum technologies in five years. Nature 543, 171174 (2017), http://www.nature.com/news/
commercialize-quantum-technologies-in-five-years-1.21583
44. Morgado, A., Heras, F., Liffiton, M., Planes, J., Marques-Silva, J.: Iterative and
core-guided maxsat solving: A survey and assessment. Constraints 18(4), 478–534
(2013), http://dx.doi.org/10.1007/s10601-013-9146-2
45. Nethercote, N., Stuckey, P.J., Becket, R., Brand, S., Duck, G.J., Tack, G.:
MiniZinc: Towards a Standard CP Modelling Language, pp. 529–543. Springer
Berlin Heidelberg, Berlin, Heidelberg (2007), http://dx.doi.org/10.1007/
978-3-540-74970-7_38
46. Nieuwenhuis, R.: The IntSat Method for Integer Linear Programming, pp. 574–589.
Springer International Publishing, Cham (2014), http://dx.doi.org/10.1007/
978-3-319-10428-7_42
47. Rieffel, E.G., Venturelli, D., O’Gorman, B., Do, M.B., Prystay, E.M., Smelyanskiy, V.N.: A case study in programming a quantum annealer for hard operational planning problems. Quantum Information Processing 14(1), 1–36 (2015),
http://dx.doi.org/10.1007/s11128-014-0892-x
Ising Processing Units: Potential and Challenges for Discrete Optimization
19
48. Selby, A.: Qubo-chimera. https://github.com/alex1770/QUBO-Chimera (2013)
49. Selby, A.: Efficient subgraph-based sampling of ising-type models with frustration
(2014), https://arxiv.org/abs/1409.3934
50. Venturelli, D., Marchand, D.J.J., Rojo, G.: Quantum annealing implementation of
job-shop scheduling (2015), https://arxiv.org/abs/1506.08479
51. Vuffray, M., Misra, S., Lokhov, A., Chertkov, M.: Interaction screening: Efficient
and sample-optimal learning of ising models. In: Lee, D.D., Sugiyama, M., Luxburg,
U.V., Guyon, I., Garnett, R. (eds.) Advances in Neural Information Processing
Systems 29, pp. 2595–2603. Curran Associates, Inc. (2016)
52. Yamaoka, M., Yoshimura, C., Hayashi, M., Okuyama, T., Aoki, H., Mizuno, H.:
24.3 20k-spin ising chip for combinational optimization problem with cmos annealing. In: 2015 IEEE International Solid-State Circuits Conference - (ISSCC) Digest
of Technical Papers. pp. 1–3 (Feb 2015)
53. Yoshimura, C., Yamaoka, M., Aoki, H., Mizuno, H.: Spatial computing architecture
using randomness of memory cell stability under voltage control. In: 2013 European
Conference on Circuit Theory and Design (ECCTD). pp. 1–4 (Sept 2013)
54. Zdeborova, L., Krzakala, F.: Statistical physics of inference: thresholds and algorithms. Advances in Physics 65(5), 453–552 (2016), http://dx.doi.org/10.1080/
00018732.2016.1211393
LA-UR-17-23494
| 2cs.AI
|
arXiv:1408.1675v3 [cs.PL] 12 Aug 2014
Database Queries that Explain their Work
James Cheney
Amal Ahmed
Umut A. Acar
University of Edinburgh
[email protected]
Northeastern University
[email protected]
Carnegie Mellon University &
INRIA-Rocquencourt
[email protected]
Abstract
promising results have been identified, a scientist may want to
extract just that information that is needed to explain the result,
without showing all of the intermediate search steps or uninteresting results. Conversely, if the results are counterintuitive, the
scientist may want to identify the underlying data that contributed
to the anomalous result. Missier et al. [24] introduced the idea of
a “golden trail”, or a subset of the provenance trace that explains,
or allows reproduction of, a high-value part of the output. They
proposed techniques for extracting “golden trails” using recursive
Datalog queries over provenance graphs; however, they did not
propose definitions of correctness or reproducibility.
It is a natural question to ask how we know when a proposed
solution, such as Missier et al.’s “golden trail” queries, correctly
explains or can be used to correctly reproduce the behavior of the
original computation. It seems to have been taken for granted that
simple graph traversals suffice to at least overapproximate the desired subset of the graph. As far as we know, it is still an open
question how to define and prove such correctness properties for
most provenance techniques. In fact, these properties might be defined and formalized in a number of ways, reflecting different modeling choices or requirements. In any case, in the absence of clear
statements and proofs of correctness, claims that different forms
of provenance “explain” or allow “reproducibility” are difficult to
evaluate objectively.
The main contribution of this paper is to formalize and prove the
correctness of an approach to fine-grained provenance for database
queries. We build on our approach developed in prior work, which
we briefly recapitulate. Our approach is based on analogies between the goals of provenance tracking for databases and workflows, and those of classical techniques for program comprehension and analysis, particularly program slicing [31] and information flow [28]. Both program slicing and information flow rely critically on notions of dependence, such as the familiar control-flow
and data-flow dependences in programming languages.
We previously introduced a provenance model for NRC (including difference and aggregation operations) called dependency
provenance [12], and showed how it can be used to compute data
slices, that is, subsets of the input to the query that include all of
the information relevant to a selected part of the output. Some other
forms of provenance for database query languages, such as howprovenance [20], satisfy similar formal guarantees that can be used
to predict how the output would change under certain classes of input changes, specifically those expressible by semiring homomorphisms. For example, Amsterdamer et al.’s system [3] is based on
the semiring provenance model, so the effects of deletions on parts
of the output can be predicted by inspecting their provenance, but
other kinds of changes are not supported.
More recently, we proposed an approach to provenance called
self-explaining computation [11] and explored it in the context
of a general-purpose functional programming language [1, 27].
In this approach, detailed execution traces are used as a form of
Provenance for database queries or scientific workflows is often
motivated as providing explanation, increasing understanding of
the underlying data sources and processes used to compute the
query, and reproducibility, the capability to recompute the results
on different inputs, possibly specialized to a part of the output.
Many provenance systems claim to provide such capabilities; however, most lack formal definitions or guarantees of these properties, while others provide formal guarantees only for relatively limited classes of changes. Building on recent work on provenance
traces and slicing for functional programming languages, we introduce a detailed tracing model of provenance for multiset-valued
Nested Relational Calculus, define trace slicing algorithms that extract subtraces needed to explain or recompute specific parts of the
output, and define query slicing and differencing techniques that
support explanation. We state and prove correctness properties for
these techniques and present a proof-of-concept implementation in
Haskell.
Keywords
provenance, database queries, slicing
1. Introduction
Over the past decade, the use of complex computer systems in science has increased dramatically: databases, scientific workflow systems, clusters, and cloud computing based on frameworks such as
MapReduce [16] or PigLatin [26] are now routinely used for scientific data analysis. With this shift to computational science based
on (often) unreliable components and noisy data comes decreased
transparency, and an increased need to understand the results of
complex computations by auditing the underlying processes.
This need has motivated work on provenance in databases, scientific workflow systems, and many other settings [7, 25]. There is
now a great deal of research on extending such systems with rich
provenance-tracking features. Generally, these systems aim to provide high-level explanations intended to aid the user in understanding how a computation was performed, by recording and presenting
additional “trace” information.
Over time, two distinct approaches to provenance have emerged:
(1) the use of annotations propagated through database queries to
illustrate where-provenance linking results to source data [7], lineage or why-provenance linking result records to sets of witnessing input records [15], or how-provenance describing how results
were produced via algebraic expressions [20], and (2) the use of
graphical provenance traces to illustrate how workflow computations construct final results from inputs and configuration parameters [5, 21, 29]. However, to date few systems formally specify the
semantics of provenance or give formal guarantees characterizing
how provenance “explains” results.
For example, scientists often conduct parameter sweeps to
search for interesting results. The provenance trace of such a computation may be large and difficult to navigate. Once the most
1
In general, we use sequences of natural numbers [i1 , . . . , in ] ∈ N∗
as indices, and we maintain a stronger invariant: the set of indexes
used in a multiset must form a prefix code. We define a semantics
for NRC expressions over such collections that is fully deterministic and does not resort to generation of fresh intermediate labels;
in particular, the union operation adjusts the labels to maintain distinctness.
The second technical challenge involves extending patterns for
partial collections. In our previous work, any subexpression of a
value can be replaced by a hole. This works well in a conventional functional language, where typical values (such as lists and
trees) are essentially initial algebras built up by structural induction.
However, when we consider unordered collections such as bags,
our previous approach becomes awkward.
For example, if we want to use a pattern to focus on only the
B field of the second record in query result Q(R), we can only
do this by deleting the other record values, and the smallest such
pattern is {[1, r1 ].✷, [2, r2 ].hA:✷, B:3, C:✷i, [2, r3 ].✷}. This is
tolerable if there are only a few elements, but if there are hundreds
or millions of elements and we are only interested in one, this is
a significant overhead. Therefore, we introduce enriched patterns
that allow us to replace entire subsets with holes, for example,
p′ = {[2, r2 ].hB:3; ✷i} ∪˙ ✷. Enriched patterns are not just a
convenience; we show experimentally that they allow traces and
slices to be smaller (and computed faster) by an order of magnitude
or more.
provenance. Traces explain results in the sense that they can be
replayed to recompute the results, and they can be sliced to obtain
smaller traces that provide more concise explanations of parts of
the output. Trace slicing also produces a slice of the input showing
what was needed by the trace to compute the output. Moreover,
other forms of provenance can be extracted from traces (or slices),
and we also showed that traces can be used to compute program
slices efficiently through lazy evaluation. Finally, we showed how
traces support differential slicing techniques that can highlight the
differences between program runs in order to explain and precisely
localize bugs in the program or errors in the input data.
Our long-term vision is to develop self-explaining computation
techniques covering all components used in day-to-day scientific
practice. Databases are probably the single most important such
component. Since our previous work already applies to a generalpurpose programming language, one way to proceed would be to
simply implement an interpreter for NRC in this language, and inherit the slicing behavior from that. However, without some further
inlining or optimization, this naive strategy would yield traces that
record both the behavior of the NRC query and its interpreter, along
with internal data structures and representation choices whose details are (intuitively) irrelevant to understanding the high-level behavior of the query.
1.1 Technical overview
In this paper, we develop a tracing semantics and trace slicing techniques tailored to NRC (over a multiset semantics). This semantics evaluates a query Q over an input database (i.e. environment γ
mapping relation names to table values), yielding the usual result
value v as well as a trace T . Traces are typically large and difficult
to decipher, so we consider a scenario where a user has run Q, inspected the results v, and requests an explanation for a part of the
result, such as a field value of a single record. As in our previous
work for functional programs, we use partial values with “holes” ✷
to describe parts of the output that are to be explained. For example, if the result of a program is just a pair (1, 2) then the pattern
(1, ✷) can be used to request an explanation for just the first component. Given a partial value p matching the output, our approach
computes a “slice” consisting of a partial trace and a partial input
environment, where components not necessary for recomputing the
explained output part p have been deleted.
The main technical contribution of this paper over our previous
work [1, 27] is its treatment of tracing and slicing for collections.
There are two underlying technical challenges; we illustrate both
(and our solutions) via a simple example query Q = σA<B (R) ∪
ρA7→B,B7→A (σA≥B (R)) over a table R with attributes A, B. Here,
σφ is relational selection of all tuples satisfying a predicate φ
and ρA7→B,B7→A is renaming. Thus, Q simply swaps the fields of
records where A ≥ B, and leaves other records alone.
The first challenge is how to address elements of multisets
reliably across different executions and support propagation of
addresses in the output backwards towards the input. Our solution
is to use a mildly enriched semantics in which multiset elements
carry explicit labels; that is, we view multisets of elements from X
as functions I → X from some index set to X. For example, if R
is labeled as follows and we use this enriched semantics to evaluate
the above query Q on R, we get a result:
id
[r1 ]
R=
[r2 ]
[r3 ]
A
1
2
4
B
2
3
3
C
7
8
9
id
[1, r1 ]
Q(R) =
[1, r2 ]
[2, r3 ]
A
1
2
3
B
2
3
4
1.2 Outline
The rest of this paper is structured as follows. Section 2 reviews the
(multiset-valued) Nested Relational Calculus and presents our tracing semantics and deterministic labeling scheme. Section 3 presents
trace slicing, including a simple form of patterns. Section 4 shows
how to enrich our pattern language to allow for partial record and
partial set patterns, which considerably increase the expressiveness
of the pattern language, leading to smaller slices. Section 5 presents
the query slicing algorithm and shows how to compute differential
slices. Section 6 presents additional examples and discussion. Section 7 presents our implementation demonstrating the benefits of
laziness and enriched patterns for trace slicing. Section 8 discusses
related and future work and Section 9 concludes.
Due to space limitations, and in order to make room for examples and high-level discussion, some (mostly routine) formal details
and proofs are relegated to the appendix.
2. Traced Evaluation for NRC
The nested relational calculus [9] is a simply-typed core language
with collection types that can express queries on nested data similar
to those of SQL on flat relations, but has simpler syntax and cleaner
semantics. In this section, we show how to extend the ideas and
machinery developed in our previous work on traces and slicing for
functional languages [27] to NRC. Developing formal foundations
for tracking provenance in the presence of unordered collections
presents a number of challenges not encountered in the functional
programming setting, as we will explain.
2.1 Syntax and Dynamic Semantics
Figure 1 presents the abstract syntax of NRC expressions, values,
and traces. The expression ∅ denotes the empty collection, {e} constructs a singleton collection, and e1 ∪ e2 takes the (multiset) union
of two collections. The operation sum e computes the sum of a collection of integers, while the predicate empty e tests whether the
collection denoted by e is empty. Additional aggregation operations
such as count, maximum and average can
S easily be accommodated.
Finally, the comprehension operation {e′ | x ∈ e} iterates over
C
7
8
9
where in each case the id column contains a distinct index ri . In
Q(R), the first ‘1’ or ‘2’ in each index indicates whether the row
was generated by the left or right subexpression in the union (’∪’).
2
γ, e ⇓ v, T
γ, c ⇓ c, c
γ, e1 ⇓ c1 , T1
···
γ, en ⇓ cn , Tn
γ, f(e1 , . . . , en ) ⇓ f̂(c1 , . . . , cn ), f(T1 , . . . , Tn )
γ, e1 ⇓ v1 , T1
···
γ, x ⇓ γ(x), x
γ, e ⇓ hA1 :v1 , . . . , An :vn i, T
γ, en ⇓ vn , Tn
γ, hA1 :e1 , . . . , An :en i ⇓ hA1 :v1 , . . . , An :vn i, hA1 :T1 , . . . , An :Tn i
γ, e ⇓ true, T
γ, e1 ⇓ v1 , T1
γ, if(e, e1 , e2 ) ⇓ v1 , if(T, e1 , e2 ) ⊲true T1
γ, e1 ⇓ v1 , T1
γ, e2 ⇓ v2 , T2
γ, e1 ∪ e2 ⇓ 1 · v1 ⊎ 2 · v2 , T1 ∪ T2
γ, e ⇓ false, T
γ, e2 ⇓ v2 , T2
γ, if(e, e1 , e2 ) ⇓ v2 , if(T, e1 , e2 ) ⊲false T2
γ, e ⇓ v, T
γ, x ∈ v, e′ ⇓∗ v′ , Θ
[
[
γ, {e′ | x ∈ e} ⇓ v′ , {e′ | x ∈ T } ⊲ Θ
γ, e ⇓ v, T
v=∅
γ, empty e ⇓ true, empty T
γ, x ∈ v, e ⇓∗ v, Θ
∗
γ, x ∈ ∅, e ⇓ ∅, ∅
γ, e1 ⇓ v1 , T1
γ[x 7→ v1 ], e2 ⇓ v2 , T2
γ, let x = e1 in e2 ⇓ v2 , let x = T1 in T2
γ, e.Ai ⇓ vi , T.Ai
γ, ∅ ⇓ ∅, ∅
γ, e ⇓ v, T
γ, {e} ⇓ {ǫ.v}, {T }
γ, e ⇓ {ℓ1 .v1 , . . . , ℓn .vn }, T
γ, sum e ⇓ v1 +̂ . . . +̂vn , sum T
γ, e ⇓ v, T
v 6= ∅
γ, empty e ⇓ false, empty T
γ, x ∈ v1 , e ⇓∗ v1′ , Θ1
γ, x ∈ v2 , e ⇓∗ v2′ , Θ2
∗ ′
γ, x ∈ v1 ⊎ v2 , e ⇓ v1 ⊎ v2′ , Θ1 ⊎ Θ2
γ[x 7→ v], e ⇓ v′ , T
γ, x ∈ {ℓ.v}, e ⇓∗ ℓ · v′ , {ℓ.T }
Figure 2. Traced evaluation.
Other operations on labels and labeled collections will be introduced in due course.
The labels on the elements of a collection provide us with a persistent address for a particular element of the collection. This capability is essential when asking and answering provenance queries
about parts of the source or output data, and when tracking finegrained dependencies.
Both expressions and traces are subject to a type system. NRC
types include collection types {τ } which are often taken to be sets,
bags (multisets), or lists, though in this paper, we consider multiset
collections only. However, types do not play a significant role in
this paper so the typing rules are omitted. For expressions, the
typing judgment Γ ⊢ e : τ is standard and the typing rules for
trace well-formedness Γ ⊢ T : τ are presented in Appendix A.
f ::= + | − | ∗ | / | = | < | ≤ | · · ·
e ::= c | f(e1 , . . . , en ) | x | let e = x in e′
| hA1 : e1 , . . . , An : en i | e.A | if(e, e′ , e′′ )
S
| ∅ | {e} | e1 ∪ e2 | {e′ | x ∈ e}
| empty e | sum e | · · ·
Labels
ℓ ::= ℓ.ℓ′ | ǫ | n
Values
v ::= c | hA1 : v1 , . . . An : vn i
| ∅ | {ℓ1 .v1 , . . . , ℓn .vn }
Environments γ ::= [x1 7→ v1 , . . . , xn 7→ vn ]
Traces
T ::= · · · | if(T, e′ , e′′ ) ⊲true T | if(T, e′ , e′′ ) ⊲false T
S
|
{e | x ∈ T } ⊲ Θ
Trace Sets
Θ ::= {ℓ1 .T1 , . . . , ℓn .Tn }
Types
τ ::= int | bool | hA1 : τ1 , . . . , An : τn i | {τ }
Type Contexts Γ ::= x1 : τ1 , . . . , xn : τn
Operations
Expressions
Traced evaluation NRC traces include a trace form corresponding to each of the expressions described above. The structure of the
traces is best understood by inspecting the typing rules (Figure 12)
and the traced evaluation rules (Figure 2), which define a judgment
γ, e ⇓ v, T indicating that evaluating an expression e in environment γ yields a value v and a trace T . We assume an environment
Σ associating constants and function symbols with their types, and
write f̂ or +̂ for the semantic operations corresponding to f or +,
and so on. In most cases, the trace form is similar to the expression
form; for example the trace of a constant or variable is a constant
trace c, the trace of a primitive operation f(e1 , . . . , en ) is a primitive operation trace f(T1 , . . . , Tn ) applied to the traces Ti of the
arguments ei , the trace of a record expression is a trace record constructor hA1 : T1 , . . . , An : Tn i, and the trace of a field projection
e.A is a trace T.A. Also, the trace of a let-binding is a let-binding
trace let x = T1 in T2 , where x is bound in T2 . In these cases,
the traces mimic the expression structure.
The traced evaluation rules for conditionals illustrate that traces
differ from expressions in recording control flow decisions. The
trace of a conditional is a conditional trace if(T, e1 , e2 ) ⊲b T ′
where T is the trace of the conditional test, b is the Boolean
value of the test e1 , and T ′ is the trace of the taken branch. The
expressions e1 and e2 are not strictly necessary but retained to
preserve structural similarity to the original expression.
The trace of ∅ is a constant trace ∅. To evaluate a singletoncollection constructor {e}, we evaluate e to obtain a value v and
return the singleton {ǫ.v} with empty label ǫ. We return the sin-
Figure 1. NRC expressions, values, traces, and types.
the collection obtained by evaluating e, evaluating e′ (x) with x
bound to each element of the collection in turn, and returning a
collection containing the union of all of the results. We sometimes
consider pairs (e1 , e2 ), a special case of records h#1 : e1 , #2 : e2 i
using two designated field names #1 and #2 . Many trace forms are
similar to those for expressions; only the differences are shown.
Labels are sequences ℓ = [ii , . . . , in ] ∈ N∗ , possibly empty.
The empty sequence is written ǫ, and labels can be concatenated
ℓ · ℓ′ ; concatenation is associative. Record field names are written
A, B, A1 , A2 , . . ..
Values in NRC include constants c, which we assume include at least booleans and integers. Record values are essentially partial functions from field names to values, written hA1 :
v1 , . . . , An : vn i. Collection values are essentially partial, finitedomain functions from labels in N∗ to values, which we write
{ℓ1 .v1 , . . . , ℓn .vn }. Since they denote functions, collections and
records are identified up to reordering of their elements, and their
field names or labels are always distinct. We write ℓ · v for the
operation that prepends ℓ to each of the labels in a set v, that is,
ℓ · {ℓ1 .v1 , . . . , ℓn .vn } = {ℓ · ℓ1 .v1 , . . . , ℓ · ℓn .vn } .
3
gleton trace {T } recording the trace for the evaluation of the element. To evaluate the union of two expressions, we evaluate each
one and take the semantic union (written ⊎) of the resulting collections, with a ‘1’ or ‘2’ concatenated onto the beginning of each
label to reflect whether each element came from the first or second
part of the union; the union trace T1 ∪ T2 records the traces for the
evaluation of the two subexpressions. For sum e, evaluating e yields
a collection of numbers whose sum we return, together with a sum
trace sum T recording the trace for evaluation of e. Evaluation of
emptiness tests empty e is analogous,
S yielding a trace empty T .
To evaluate a comprehension {e′ | x ∈ e}, we first evaluate e,
which yields a collection v and trace T , and then (using auxiliary
judgment γ, x ∈ v, e′ ⇓∗ v ′ , Θ) evaluate e′ repeatedly with
x bound to each element vi of the collection v to get resulting
values vi′ and corresponding traces Ti′ . We return a new collection
v ′ = {ℓ1 · v1′ , . . . , ℓn · vn′ }; similarly we return a labeled set of
traces Θ = {ℓ1 .T1 , . . . , ℓn .Tn }. (Analogously to values, trace sets
are essentially finite partial functions from labels to traces). For
each of these collections, we prepend the appropriate label ℓi of the
corresponding input element.
A technical point of note is that the resulting trace Ti may contain free occurrences of x. As in our trace semantics for functional
programs, these variables serve as markers in Ti that will be critical
for the trace replaySsemantics. The comprehension trace records,
using the notation {e′ | x ∈ T } ⊲ {ℓ1 .T1 , . . . , ℓn .Tn }, that the
trace T was used to compute a multiset v, and x was bound to
each element ℓi .vi in v in turn, with trace Ti showing how the corresponding subset of the result was computed. The comprehension
trace also records the expression e′ and bound variable x, which are
again not strictly necessary but preserve the structural similarity to
the original expression.
At this point it is useful to provide some informal motivation
for the labeling semantics, compared for example to other semantics that use annotations or labels as a form of provenance. We do
not view the labels themselves as provenance; instead, they provide a useful infrastructure for traces, which do capture a form of
provenance. Moreover, by calculating the label of each part of an
intermediate or final result deterministically (given the labels on
the input), we provide a way to reliably refer to parts of the output,
which otherwise may be unaddressable in a multiset-valued semantics. This is essential for supporting compositional slicing for operations such as let-binding or comprehension, where the output of
one subexpression becomes a part of the input for another.
A central point of our semantics is that evaluation preserves the
property that labels uniquely identify the elements of each multiset.
This naturally assumes that the labels on the input collections
are distinct. In fact, a stronger property is required: evaluation
preserves the property that set labels form a prefix code. In the
following, we write x ≤ y to indicate that sequence x is a prefix of
sequence y.
γ, T y v
···
γ, T1 y c1
γ, c y c
γ, Tn y cn
γ, f(T1 , . . . , Tn ) y f̂(c1 , . . . , cn )
γ, T1 y v1
γ, x y γ(x)
γ[x 7→ v1 ], T2 y v2
γ, let x = T1 in T2 y v2
γ, T1 y v1
···
γ, Tn y vn
γ, hA1 :T1 , . . . , An :Tn i y hA1 :v1 , . . . , An :vn i
γ, T y hA1 :v1 , . . . , An :vn i
γ, T.Ai y vi
γ, T y false
γ, T y true
γ, T1 y v1
γ, if(T, e1 , e2 ) ⊲true T1 y v1
γ, T y v
γ, T2 y v2
γ, if(T, e1 , e2 ) ⊲false T2 y v2
γ, T1 y v1
γ, T2 y v2
γ, T1 ∪ T2 y 1 · v1 ⊎ 2 · v2
γ, T y v
v=∅
γ, empty T y true
γ, ∅ y ∅
γ, {T } y {ǫ.v}
γ, T y {ℓ1 .v1 , . . . , ℓn .vn }
γ, sum T y v1 +̂ . . . +̂ vn
γ, T y v
v 6= ∅
γ, empty T y false
γ, T y v
γ, x ∈ v, Θ y∗ v′
[
γ, {e | x ∈ T } ⊲ Θ y v′
γ, x ∈ v, Θ y∗ v ′
∗
γ, x ∈ ∅, Θ y ∅
γ, x ∈ v1 , Θ y∗ v1′
γ, x ∈ v2 , Θ y∗ v2′
γ, x ∈ v1 ⊎ v2 , Θ y∗ v1′ ⊎ v2′
ℓi ∈ dom(Θ)
γ[x 7→ vi ], Θ(ℓi ) y vi′
γ, x ∈ {ℓi .vi }, Θ y∗ ℓi · vi′
Figure 3. Trace replay.
Theorem 2.2. If γ is prefix-labeled and γ, e ⇓ v, T then v and
T are both prefix-labeled. Moreover, if γ and v are prefix-labeled
and γ, x ∈ v, e ⇓∗ v ′ , Θ then v ′ and Θ are prefix-labeled, and in
addition dom(Θ) = dom(v) ≤ dom(v ′ ).
Proof. By induction on derivations. The key cases are those for
union, which is straightforward, and for comprehensions. For the
latter case we need the second part, to show that whenever γ and
v are prefix-labeled, if γ, x ∈ v, e ⇓∗ v ′ , Θ then v ′ and Θ are
prefix-labeled, and in addition dom(Θ) = dom(v) and dom(v) is
a sub-prefix code of dom(v ′ ).
The prefix code property is needed later in the slicing algorithms, when we will need it to match elements of collections produced by comprehensions with corresponding elements of the trace
set Θ. From now on, we assume that all values, environments, and
traces are prefix-labeled, so any labeled set is assumed to have the
prefix code property.
We will use the following query as a running example.
[
Q = {if(x.B = 3, {hA:x.A, B:x.Ci}, {}) | x ∈ R}
Definition 2.1. A prefix code over Σ is a set of sequences L ⊆ Σ∗
such that for every x, y ∈ L, if x ≤ y then x = y. A sub-prefix
code of a prefix code L is a prefix code L′ such that for all x ∈ L
there exists y ∈ L′ such that y ≤ x. We write L′ ≤ L to indicate
that L′ is a sub-prefix code of L. We say that L and L′ are prefixdisjoint when no element of L is a prefix of an element of L′ and
vice versa.
This is a simple selection query; it identifies records in R that have
B-value of 3, and returns record hA:x.A, B:x.Ci containing x’s A
value and its C value renamed to B. The result of Q on the input R
in the introduction is Q(R) = {[r2 ].hA:2, B:8i, [r3 ].hA:4, B:9i},
and the trace is:
S
T = { | x ∈ R} ⊲ { [r1 ].if(x.B = 3, , ) ⊲false {},
[r2 ].if(x.B = 3, , ) ⊲true { },
[r3 ].if(x.B = 3, , ) ⊲true { } }
Let v be a collection v = {ℓ1 .v1 , . . . , ℓn .vn }. We define the
domain of v to be dom(v) = {ℓ1 , . . . , ℓn }. . We say that a value
or value environment is prefix-labeled if for every collection v
occurring in it, the labels ℓ1 , . . . , ℓn are distinct and dom(v) is a
prefix code. Similarly, we say that a trace is prefix-labeled if every
labeled trace set Θ = {ℓ1 .T1 , . . . , ℓn .Tn } is prefix-labeled.
4
where indicates omitted (easily inferrable) subexpressions.
Proposition 2.6 (Consistency). If γ, e ⇓ v, T then γ, T y v.
Replay We introduce a judgment γ, T y v for replaying a
trace on a (possibly different) environment γ. The rules for replaying NRC traces are presented in Figure 3. Many of the rules are
straightforward or analogous to the corresponding evaluation rules.
Here we only discuss the replay rules for conditional and comprehension traces.
For the conditional rules, the basic idea is as follows. If replaying the trace T of the test yields the same boolean value b as
recorded in the trace, we replay the trace of the taken branch. If the
test yields a different value, then replay fails.
S
To replay a comprehension trace {e | x ∈ T } ⊲ Θ, rule
RC OMP first replays trace T to update the set of elements v
over which we will iterate. We define a separate judgment γ, x ∈
v, Θ y∗ v ′ to iterate over set v and replay traces on the corresponding elements. For elements ℓi ∈ dom(Θ), we replay the
corresponding trace Θ(ℓi ). Replay fails if v contains any labels not
present in Θ.
Replaying a trace can fail if either the branch taken in a conditional test differs from that recorded in the trace, or the intermediate
set obtained from rerunning a comprehension trace includes values
whose labels are not present in the trace. This means, in particular,
that changes to the input can be replayed if they only change base
values or delete set elements, but changes leading to additions of
new labels to sets involved in comprehensions typically cannot be
replayed.
Returning to the running example, suppose we change field B
of row r1 of R from 2 to 5. This change has no effect on the
control flow choice taken in Q, and replaying the trace T succeeds.
Likewise, changing the A or C field of any column of R has no
effect, since these values do not affect the control flow choices in
T . However, changing the B field of a row to 3 (or changing it from
3 to something else) means that replay will fail.
Finally, trace replay is faithful to ordinary evaluation in the following sense: if T is generated by running e in γ and we successfully replay T on γ ′ then we obtain the same value (and same trace)
as if we had rerun e from scratch in γ ′ , and vice versa:
Proposition 2.7 (Fidelity). If γ, e ⇓ v, T , then for any γ ′ , v ′ we
have γ ′ , e ⇓ v ′ , T if and only if γ ′ , T y v ′ .
Observe that consistency is a special case of fidelity (with γ ′ =
γ, v ′ = v. Moreover, the “if” direction of fidelity holds even though
replay can fail, because we require that γ ′ , e ⇓ v ′ , T holds for the
same trace T . If γ ′ , e ⇓ v ′ , T ′ is derivable but only for a different
trace T ′ , then replay fails.
3. Trace Slicing
The goal of the trace slicing algorithm we consider is to remove
information from a trace and input that is not needed to recompute a part of the output. To accommodate these requirements, we
introduce traces and values with holes and more generally, we consider patterns that represent relations on values capturing possible
changes. In this section, we limit attention to pairs, and consider
slicing for a class of simple patterns. We consider records and more
expressive enriched patterns in the next section.
We extend traces with holes ✷
T
::=
··· | ✷
and define a subtrace relation ⊑ that is essentially a syntactic
precongruence on traces and trace sets such that ✷ ⊑ T holds
and Θ ⊆ Θ′ implies Θ ⊑ Θ′ . (The definition of ⊑ is shown in
full in the companion technical report.) Intuitively, holes denote
parts of traces we do not care about, and we can think of a trace
T with holes as standing for a set of possible complete traces
{T ′ | T ⊑ T ′ } representing different ways of filling in the holes.
The syntax of simple patterns p, set patterns sp, and pattern
environments ρ is:
2.2 Key properties
Before moving on to consider trace slicing, we identify some properties that formalize the intuition that traces are consistent with and
faithfully record execution.
Evaluation and traced evaluation are deterministic:
p
sp
ρ
Proposition 2.3 (Determinacy). If γ, e ⇓ v, T and γ, e ⇓ v ′ , T ′
then v = v ′ and T = T ′ . If γ, T y v and γ, T y v ′ then v = v ′ .
::=
::=
::=
✷ | ✸ | c | (p1 , p2 ) | sp
∅ | {ℓ1 .p1 , . . . , ℓn .pn }
[x1 7→ p1 , . . . , xn 7→ pn ]
Essentially, a pattern is a value with holes in some positions. The
meaning of each pattern is defined through a relation hp that says
when two values are equivalent with respect to a pattern. This relation is defined in Figure 5. A hole ✷ indicates that the part of
the value is unimportant, that is, for slicing purposes we don’t care
about that part of the result. Its associated relation h✷ relates any
two values. An identity pattern ✸ is similar to a hole: it says that
the value is important but its exact value is not specified, and its
associated relation h✸ is the identity relation on values. Complete
set patterns {ℓ1 .p1 , . . . , ℓn .pn } specify the labels and patterns for
all of the elements of a set; that is, such a pattern relates only sets
that have exactly the labeled elements specified and whose corresponding values match according to the corresponding patterns.
We define the union of two set patterns as {ℓi .pi } ⊎ {ℓ′i .p′i } =
{ℓi .pi , ℓ′i .p′i } provided their domains ℓ~i and ℓ~′i are prefix-disjoint.
We define a (partial) least upper bound operation on patterns p ⊔ p′
such that for any v, v ′ we have v hp⊔p′ v ′ if and only if v hp v ′
and v hp′ v ′ ; the full definition is shown in Figure 4. We define
the partial ordering p ⊑ p′ as p ⊔ p′ = p′ . We say that a value v
matches pattern p if p ⊑ v. Observe that this implies v hp v. We
extend the ⊔ and ⊑ operations to pattern environments ρ pointwise,
that is, (ρ ⊔ ρ′ )(x) = ρ(x) ⊔ ρ(x′ ).
We define several additional operations on patterns that are
needed for the slicing algorithm. Consider the following singleton
When the trace is irrelevant, we write γ, e ⇓ v to indicate that
γ, e ⇓ v, T for some T .
Traced evaluation is type-safe and produces well-typed traces,
and trace replay is also type-safe.
Theorem 2.4. If γ : Γ and Γ ⊢ e : τ and γ, e ⇓ v, T then v : τ
and Γ ⊢ T : τ . If γ : Γ and Γ ⊢ T : τ and γ, T y v then v : τ .
Traces can be represented using pointers to share common
subexpressions; using this DAG representation, traces can be stored
in space polynomial in the input. (This sharing happens automatically in our implementation in Haskell.)
Proposition 2.5. For a fixed e, if γ, e ⇓ v, T then the sizes of v
and of the DAG representation of T are at most polynomial in |γ|.
Proof. Most cases are straightforward. The only non-trivial case is
for comprehensions, where we need a stronger induction hypothesis: if γ, x ∈ v, e ⇓∗ v ′ , Θ then the sizes of v ′ and of the DAG
representation of Θ are at most polynomial in |γ|.
Furthermore, traced evaluation produces a trace that replays
to the same value as the original expression run on the original
environment. We call this property consistency.
5
✷⊔p=p⊔✷
✸⊔p=p⊔✸
c⊔c
(p1 , p2 ) ⊔ (p′1 , p′2 )
{ℓi .pi } ⊔ {ℓi .p′i }
=
=
=
=
=
p
p[✸/✷]
c
(p1 ⊔ p′1 , p2 ⊔ p′2 )
{ℓi .pi ⊔ p′i }
✸[✸/✷] = ✷[✸/✷]
c[✸/✷]
(p1 , p2 )[✸/✷]
{ℓi .pi }[✸/✷]
=
=
=
=
✸
c
(p1 [✸/✷], p2 [✸/✷])
{ℓi .pi [✸/✷]}
patterns describing the subsets obtained from the first and second
subtraces in the union pattern, respectively.
The rule SC OMP uses a similar idea to let-binding. We slice the
trace set Θ using an auxiliary judgment p, x.Θ ց∗ ρ, Θ0 , p0 , obtaining a sliced input environment, sliced trace set Θ0 , and pattern
p0 describing the set of values to which x was bound. We then use
p0 to slice backwards through the subtrace T that constructed the
set. The auxiliary slicing judgment for trace sets has three rules:
a trivial rule SE MPTY∗ when the set is empty, rule SS NG∗ that
uses label projection p[ℓ] to handle a singleton trace set, and a rule
SU NION∗ handling larger trace sets by decomposing them into subsets. This is essentially a structural recursion over the trace set, and
is deterministic even though the rules can be used to decompose the
trace sets in many different ways, because ⊎ is associative. Rule
SU NION∗ also requires that we restrict the set pattern to match the
domains of the corresponding trace patterns.
The slicing rules SS UM and SE MPTY P follow the same idea as
for primitive operations at base type: we require that the whole set
value be preserved exactly. As discussed by Perera et al. [27] with
primitive operations, this is a potential source of overapproximation, since (for example) for an emptiness test, all we really need is
to preserve the number of elements in the set, not their values. The
last rule shows how to slice pair patterns when the pattern is ✸: we
slice both of the subtraces by ✸ and combine the results.
It is straightforward to show that the slicing algorithm is welldefined for consistent traces. That is, if γ, T y v and p ⊑ v then
there exists ρ, S such that p, T ց ρ, S holds, where ρ ⊑ γ and
S ⊑ T . We defer the correctness theorem for slicing using simple
patterns to the end of the next section, since it is a special case of
correctness for slicing using enriched patterns.
Continuing our running example, consider the pattern p =
{[r2 ].hA:✷, B:8i, [r3 ].✷}. The slice of T with respect to this pattern is of the form:
S
T ′ = { | x ∈ R} ⊲ { [r1 ].✷,
[r2 ].if(x.B = 3, , ) ⊲true { },
[r3 ].✷ }
where:
Figure 4. Least upper bound for simple patterns
v hp v ′
v h✷ v
′
v h✸ v
v1 hp2 v2′
v1 hp1 v1′
(v1 , v2 ) h(p1 ,p2 ) (v1′ , v2′ )
c hc c
vi hpi vi′ (i ∈ {1, . . . , n})
′
{ℓ1 .v1 , . . . , ℓn .vn } h{ℓ1 .p1 ,...,ℓn .pn } {ℓ1 .v1′ , . . . , ℓn .vn
}
γ hρ γ ′ ⇐⇒ ∀x ∈ dom(ρ). γ(x) hρ(x) γ ′ (x)
Figure 5. Simple pattern equivalence.
extraction operation p.ǫ and label projection operation p[ℓ]:
({ǫ.p}).ǫ
sp[ℓ]
=
=
p
{ℓ′ .v | ℓ.ℓ′ .v ∈ sp}
✷.ǫ = ✷ ✸.ǫ = ✸
✷[ℓ] = ✷ ✸[ℓ] = ✸
These operations are only used for the above cases; they have no
effect on constant or pair patterns. For sets, p[ℓ] extracts the subset
of p whose labels start with ℓ, truncating the initial prefix ℓ, while if
p is ✷ or ✸ then again p[ℓ] returns the same kind of hole. Moreover,
dom(p[ℓ]) is a prefix code if dom(p) is.
Suppose L is a prefix code. We define restriction of a set pattern
p to L as follows:
sp|L = {ℓ.ℓ′ .p ∈ sp | ℓ ∈ L}
✷|L = ✷
and the slice of R is R′ = {[r1 ].✷, [r2 ].hA:✷, B:3, C:8i, [r3 ].✷}.
(That is, R′ is the value of ρ(R), where ρ is the pattern environment produced by slicing T with respect to p.) Observe that the
value of A is not needed but the value of B must remain 3 in order to preserve the control flow behavior of the trace on r2 . The
holes indicate that changes to r1 and r3 in the input cannot affect r2 . However, a trace matching T ′ cannot be replayed if any
of r1 , r2 , r3 are deleted from the input or if the A field is removed
from an input record, because the replay rules require all of the labels mentioned in collections or records in T ′ to be present. We
now turn our attention to enriched patterns, which mitigate these
drawbacks.
✸|L = ✸
It is easy to see that dom(p|L ) ⊆ dom(p) so dom(p|L ) is a prefix
code if dom(p) is, so this operation is well-defined on collections:
Lemma 3.1. If sp is prefix-labeled and L is a prefix code then
sp[ℓ] and sp|L are prefix-labeled.
We show other properties of patterns in Appendix B.
Backward Slicing The rules for backward slicing are given in
Figure 6. The judgment p, T ց ρ, T ′ slices trace T with respect
to a pattern p to yield the slice T ′ and sliced input environment
ρ. The sliced input environment records what parts of the input
are needed to produce p; this is needed for slicing operations such
as let-binding or comprehensions. The main new ideas are in the
rules for collection operations, particularly comprehensions. The
slicing rules SC ONST, SP RIM, SVAR, SL ET, SPAIR, SP ROJi , and
SI F follow essentially the same idea as in our previous work [1, 27].
We focus discussion on the new cases, but we review the key ideas
for these operations here in order to make the presentation selfcontained.
The rules for collections use labels and set pattern operations to
effectively undo the evaluation of the set pattern. The rule SE MPTY
is essentially the same as the constant rule. The rule SS NG uses
the singleton extraction operation p.ǫ to obtain a pattern describing the single element of a singleton set value matching p. The
rule SU NION uses the two projections p[1] and p[2] to obtain the
4. Enriched Patterns
So far we have considered only complete set patterns of the form
{ℓ1 .p1 , . . . , ℓn .pn }. These patterns relate pairs of values that have
exactly n elements labeled ℓ1 , . . . , ℓn , each of which matches
p1 , . . . , pn respectively.
This is awkward, as we already can observe in our running example above: to obtain a slice describing how one record was computed, we need to use a set pattern that lists all of the indexes in the
output. Moreover, the slice with respect to such a pattern may also
include labeled subtraces explaining why the other elements exist
in the output (and no others). This information seems intuitively
irrelevant to the value at ℓ1 , and can be a major overhead if the collection is large. We also have considered only binary pairs; it would
be more convenient to support record patterns directly.
6
p, T ց ρ, S
✷, T ց [], ✷
SH OLE
p, c ց [], c
SC ONST
✸, T1 ց ρ1 , S1
p2 , T2 ց ρ2 [x 7→ p1 ], S2
p1 , T1 ց ρ1 , S1
SL ET
p2 , let x = T1 in T2 ց ρ1 ⊔ ρ2 , let x = S1 in S2
✸, Tn ց ρn , Sn
p[1], T1 ց ρ1 , S1
p[2], T2 ց ρ2 , S2
p, T1 ∪ T2 ց ρ1 ⊔ ρ2 , S1 ∪ S2
✸, T ց ρ, S
SE MPTY P
p, sum T ց ρ, sum S
SU NION
p,
[
p, x ց [x 7→ p], x
p, ∅ ց [], ∅
SVAR
(p, ✷), T ց ρ, S
SP ROJ 1
p, T.#1 ց ρ, S.#1
p.ǫ, T ց ρ, S
SS NG
p, {T } ց ρ, {S}
SE MPTY
p, x.Θ ց∗ ρ′ , Θ′ , p′
p′ , T ց ρ, S
[
SC OMP
{e | x ∈ T } ⊲ Θ ց ρ ⊔ ρ′ , {e | x ∈ S} ⊲ Θ′
✸, T ց ρ, S
SS UM
p, empty T ց ρ, empty S
∅, x.∅ ց∗ [], ∅, ∅
SP RIM
p1 , T1 ց ρ1 , S1
p2 , T2 ց ρ2 , S2
SPAIR
(p1 , p2 ), (T1 , T2 ) ց ρ1 ⊔ ρ2 , (S1 , S2 )
p, T ′ ց ρ′ , S ′
b, T ց ρ, S
SI F
p, if(T, e1 , e2 ) ⊲b T ′ ց ρ′ ⊔ ρ, if(S, e1 , e2 ) ⊲b S ′
(✷, p), T ց ρ, S
SP ROJ 2
p, T.#2 ց ρ, S.#2
p, x.Θ ց∗ ρ, Θ0 , p0
···
p, f(T1 , . . . , Tn ) ց ρ1 ⊔ · · · ⊔ ρn , f(S1 , . . . , Sn )
✸, T1 ց ρ1 , S1
✸, T2 ց ρ2 , S2
SD IAMOND
✸, (T1 , T2 ) ց ρ1 ⊔ ρ2 , (S1 , S2 )
p[ℓ], T ց ρ[x 7→ p0 ], S
SS NG∗
p, x.{ℓ.T } ց∗ ρ, {ℓ.S}, {ℓ.p0 }
SE MPTY∗
p|dom(Θ1 ) , x.Θ1 ց∗ ρ1 , Θ′1 , p1
p|dom(Θ2 ) , x.Θ2 ց∗ ρ2 , Θ′2 , p2
∗
p, x.Θ1 ⊎ Θ2 ց ρ1 ⊔ ρ2 , Θ′1 ⊎ Θ′2 , p1 ⊎ p2
SU NION∗
Figure 6. Backward trace slicing.
In this section we sketch how to enrich the language of patterns
to allow for partial set and partial record patterns, as follows:
p
::=
✸⊎✷ =✷⊎✸ =✷⊎✷
✸⊎✸
sp ⊎ ∅ = ∅ ⊎ sp
{ℓi .pi } ⊎ ✷ = ✷ ⊎ {ℓi .pi }
{ℓi .pi } ⊎ ✸ = ✸ ⊎ {ℓi .pi }
{ℓi .pi } ⊎ ({ℓ′j .p′j } ∪˙ ✷)
˙ ✸)
{ℓi .pi } ⊎ ({ℓ′j .p′j } ∪
({ℓi .pi } ∪˙ ✷) ⊎ ({ℓ′j .p′j } ∪˙ ✷)
˙ ✸) ⊎ ({ℓ′j .p′j } ∪˙ ✷)
({ℓi .pi } ∪
˙ ✷) ⊎ ({ℓ′j .p′j } ∪
˙ ✸)
({ℓi .pi } ∪
˙ ✸)
({ℓi .pi } ∪˙ ✸) ⊎ ({ℓ′j .p′j } ∪
✷ | ✸ | c | sp | rp
rp
::=
hi | hAi : pi i | hAi : pi ; ✷i | hAi : pi ; ✸i
sp
::=
∅ | {ℓi .pi } | {ℓi .pi } ∪˙ ✷ | {ℓi .pi } ∪˙ ✸
Record patterns are of the form hAi : pi i, listing the fields and the
patterns they must match, possibly followed by ✷ or ✸, which the
remainder of the record must match. The pattern {ℓi .pi } ∪˙ ✷ stands
for a set with labeled elements matching patterns p1 , . . . , pn , plus
some additional elements whose values we don’t care about. For
example, we can use the pattern {ℓ1 .p1 } ∪˙ ✷ to express interest
in why element ℓ1 matches p1 , when we don’t care about the rest
of the set. The second partial pattern, {ℓi .pi } ∪˙ ✸, has similar
behavior, but it says that the rest of the sets being considered must
be equal. For example, {ℓ.✷} ∪˙ ✸ says that the two sets are equal
except possibly at label ℓ. This pattern is needed mainly in order to
ensure that we can define a least upper bound on enriched patterns,
since we cannot express ({ℓ1 .v1 , . . . , ℓn .pn } ∪˙ ✷) ⊔ ✸ otherwise.
We define dom({ℓi .pi } ∪˙ ✷) = dom({ℓi .pi } ∪˙ ✸) =
{ℓ1 , . . . , ℓn }. Disjoint union of enriched patterns sp ⊎ sp′ is defined only if the domains are prefix-disjoint, so that the labels of the
result still form a prefix code; this operation is defined in Figure 7.
We now extend the definitions of p[✸/✷] and ⊔ to account for
extended patterns. We extend the [✸/✷] substitution operation as
follows:
hAi : pi i[✸/✷]
hAi : pi ; ✷i[✸/✷]
hAi : pi ; ✸i[✸/✷]
({ℓi .pi } ∪˙ ✷)[✸/✷]
˙ ✸)[✸/✷]
({ℓi .pi } ∪
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
✷
✸
sp
˙ ✷
{ℓi .pi } ∪
˙ ✸
{ℓi .pi } ∪
({ℓi .pi } ⊎ {ℓ′j .p′j }) ∪˙ ✷
({ℓi .pi } ⊎ {ℓ′j .p′j }) ∪˙ ✸
({ℓi .pi } ⊎ {ℓ′j .p′j }) ∪˙ ✷
({ℓi .pi } ⊎ {ℓ′j .p′j }) ∪˙ ✷
({ℓi .pi } ⊎ {ℓ′j .p′j }) ∪˙ ✷
({ℓi .pi } ⊎ {ℓ′j .p′j }) ∪˙ ✸
Figure 7. Enriched pattern union
We extend the singleton extraction p.ǫ, label projection p[ℓ], and
restriction p|L operations on set patterns as follows:
˙ ✸).ǫ = ({ǫ.p} ∪
˙ ✷).ǫ
({ǫ.p} ∪
˙ ✷)
ℓ · ({ℓi .pi } ∪
ℓ · ({ℓi .pi } ∪˙ ✸)
˙ ✷)[ℓ]
({ℓi .pi } ∪
({ℓi .pi } ∪˙ ✸)[ℓ]
˙ ✷)|L
({ℓi .pi } ∪
({ℓi .pi } ∪˙ ✸)|L
=
=
=
=
=
=
=
p
(ℓ · {ℓi .pi }) ⊎ ✷
(ℓ · {ℓi .pi }) ⊎ ✸
({ℓi .pi }[ℓ]) ⊎ ✷
({ℓi .pi }[ℓ]) ⊎ ✸
({ℓi .pi }|L ) ⊎ ✷
({ℓi .pi }|L ) ⊎ ✸
Note that in many cases, we use the disjoint union operation ⊎
on the right-hand side; this ensures, for example, that we never
produce results of the form ∅ ∪˙ ✷ or ∅ ∪˙ ✸; these are normalized to
✷ and ✸ respectively, and this normalization reduces the number
of corner cases in the slicing algorithm.
We define a record pattern projection operation p.A as follows:
hAi : pi [✸/✷]i
hAi : pi [✸/✷];✸i
hAi : pi [✸/✷]; ✸i
{ℓi .pi [✸/✷]} ∪˙ ✸
{ℓi .pi [✸/✷]} ∪˙ ✸
hA1 :p1 , . . . , An :pn i.Ai
hA1 :p1 , . . . , An :pn ; i.Ai
hA1 :p1 , . . . , An :pn ; ✷i.B
hA1 :p1 , . . . , An :pn ; ✸i.B
We handle the additional cases of the ⊔ operation in Figure 8,
and extend the hp relation as shown in Figure 9. Note that taking
the least upper bound of a partial pattern with a complete pattern
yields a complete pattern, while taking the least upper bound of
partial patterns involving ✸ again relies on the [✸/✷] substitution
operation.
=
=
=
=
pi
✷.A = ✷
pi
✸.A = ✸
✷ (B ∈
/ {A1 , . . . , An })
✸ (B ∈
/ {A1 , . . . , An })
We extend the slicing judgment to accommodate these new
patterns in Figure 10. The rules SR EC and SP ROJA are similar to
those for pairs, except that we use the field projection operation
in the case for a record trace, and we use partial record patterns
7
{ℓi .pi , ℓ′j .qj } ⊔ ({ℓi .p′i } ∪˙ ✷)
=
{ℓi .pi ⊔ p′i , ℓ′j .qj }
˙ ✸)
{ℓi .pi , ℓ′j .qj } ⊔ ({ℓi .p′i } ∪
=
{ℓi .pi ⊔ p′i , ℓ′j .qj [✸/✷]}
˙
({ℓi .pi , ℓ′j .qj } ∪˙ ✷) ⊔ ({ℓi .p′i , ℓ′′
k .rk } ∪ ✷)
=
˙
{ℓi .pi ⊔ p′i , ℓ′j .qj , ℓ′′
k .rk } ∪ ✷
˙
({ℓi .pi , ℓ′j .qj } ∪˙ ✷) ⊔ ({ℓi .p′i , ℓ′′
k .rk } ∪ ✸)
=
˙
{ℓi .pi ⊔ p′i , ℓ′j .qj [✸/✷], ℓ′′
k .rk } ∪ ✸
˙
({ℓi .pi , ℓ′j .qj } ∪˙ ✸) ⊔ ({ℓi .p′i , ℓ′′
k .rk } ∪ ✸)
=
˙
{ℓi .pi ⊔ p′i , ℓ′j .qj [✸/✷], ℓ′′
k .rk [✸/✷]} ∪ ✸
hAi : pi , Bj : qj i ⊔ (hAi : p′i ; ✷i)
=
hAi : pi ⊔ p′i , Bj : qj i
p′i ; ✸i)
=
hAi : pi ⊔ p′i , Bj : qj [✸/✷]i
(hAi : pi , Bj : qj ; ✷i) ⊔ (hAi : p′i , Ck : rk ; ✷i)
=
hAi : pi ⊔ p′i , Bj : qj , Ck : rk ; ✷i
(hAi : pi , Bj : qj ; ✷i) ⊔ (hAi : p′i , Ck : rk ; ✸i)
=
hAi : pi ⊔ p′i , Bj : qj [✸/✷], Ck : rk ; ✸i
=
hAi : pi ⊔ p′i , Bj : qj [✸/✷], Ck : rk [✸/✷]; ✸i
hAi : pi , Bj : qj i ⊔ (hAi :
(hAi : pi , Bj : qj ; ✸i) ⊔ (hAi :
p′i , Ck
: rk ; ✸i)
Figure 8. Least upper bound for enriched patterns (excluding some symmetric cases).
v1 hp1 v1′
hAi : vi i hhA
i :pi i
v1 hp1 v1′
hAi : vi′ i
′
vn hpn vn
···
hAi : vi , Bj :wj i hhA
i :pi ;✷i
v1 hp1 v1′
hAi : vi , Bj :wj i hhA
i :pi ;✸i
{ℓi .vi } ⊎ v h{ℓ
v1 hp1 v1′
{ℓi .vi } ⊎ v
hAi : vi′ , Ck :wk′ i
Lemma 4.2 (Projection and ⊑).
′
vn hpn vn
···
v1 hp1 v1′
1. If p1 ⊑ v1 and p2 ⊑ v2 and v1 hp1 v1′ and v2 hp2 v2′ then
v1 ⊎ v2 hp1 ⊎p2 v1′ ⊎ v2′ , provided all of these disjoint unions
are defined.
2. If p ⊑ v1 ⊎ v2 and L1 ≤ dom(v1 ) and L2 ≤ dom(v2 ) and
L1 , L2 are prefix-disjoint, then p|L1 ⊑ v1 and p|L2 ⊑ v2 .
′
vn hpn vn
···
1.
2.
3.
4.
hAi : vi′ , Bj :wj i
···
′
vn hpn vn
˙
i .pi }∪✷
{ℓi .vi′ } ⊎ v′
Lemma 4.3 (Projection and hp ).
1. If p ⊑ {ǫ.v} and v hp.ǫ v ′ then {ǫ.v} hp {ǫ.v ′ }.
2. If p ⊑ 1 · v1 ⊎ 2 · v2 and v1 hp[1] v1′ and v2 hp[2] v2′ then
1 · v1 ⊎ 2 · v2 hp 1 · v1′ ⊎ 2 · v2′ .
3. If p ⊑ ℓ · v and v hp[ℓ] v ′ then ℓ · v hp ℓ · v ′ .
4. If p ⊑ hAi : vi i and v1 hp.A1 v1′ , . . . , vn hp.An vn′ then
hAi : vi i hp hAi : vi′ i.
′
···
vn hpn vn
{ℓi .vi′ } ⊎ v
h{ℓ .p }∪✸
i i ˙
Figure 9. Enriched pattern equivalence
p, T ց ρ, S
Proofs are collected in Appendix B.
We now state the key correctness property for slicing. Intuitively, it says that if we slice T with respect to output pattern p,
obtaining a slice ρ and S, then p will be reproduced on recomputation under any change to the input and trace that is consistent with
the slice — formally, that means that the changed trace T ′ must
match the sliced trace S, and the changed input γ ′ must match γ
modulo ρ.
hA:p; ✷i, T ց ρ, S
SR EC
p, T.A ց ρ, S.A
p.A1 , T1 ց ρ1 , S1
···
p.An , Tn ց ρn , Sn
p, hA1 :T1 , . . . , An :Tn i ց ρ1 ⊔ · · · ⊔ ρn , hA1 :S1 , . . . , An :Sn i
SP ROJ A
p, x.Θ ց∗ ρ, Θ′ , p0
✷, x.Θ ց∗ [], ∅, ✷
SH OLE∗
✸, x.∅ ց∗ [], ∅, ∅
If p ⊑ {ǫ.v} then p.ǫ ⊑ v.
If p ⊑ 1 · v1 ⊎ 2 · v2 then p[1] ⊑ v1 and p[2] ⊑ v2 .
If p ⊑ ℓ · v then p[ℓ] ⊑ v.
If p ⊑ hAi : vi i then p.Ai ⊑ vi .
Theorem 4.4 (Correctness of Slicing).
SD IAMOND∗
1. Suppose γ, T y v and p ⊑ v and p, T ց ρ, S. Then for all
γ ′ hρ γ and T ′ ⊒ S such that γ ′ , T ′ y v ′ we have v ′ hp v.
2. Suppose γ, x ∈ v0 , Θ y∗ v and p ⊑ v and p, x.Θ0 ց
ρ, Θ′0 , p0 , where Θ0 ⊆ Θ. Then for all γ ′ hρ γ and v0′ hp0 v0
and Θ′ ⊒ Θ′0 such that γ ′ , x ∈ v0 , Θ′ y∗ v ′ we have v ′ hp v.
Figure 10. Backward trace slicing over enriched patterns.
hA : p; ✷i in the case for a field projection trace. The added
rules SH OLE∗ and SD IAMOND∗ handle the possibility that a partial
pattern reduces to ✷ or ✸ through projection; we did not need to
handle this case earlier because a simple set pattern is either a hole
(which could be handled by the rule ✷, T ց [], ✷) or a complete
set pattern showing all of the labels of the result.
Both simple and extended patterns satisfy a number of lemmas
that are required to prove the correctness of trace slicing.
Returning to our running example, we can use the enriched
pattern p′ = {[r2 ].hB:8; ✷i} ∪˙ ✷ to indicate interest in the B field
of r2 , without naming the other fields of the row or the other row
indexes. Slicing with respect to this pattern yields the following
slice:
[
T ′′ = { | x ∈ R} ⊲ {[r2 ].if(x.B = 3, , ) ⊲true { }}
˙ This indicates
and the slice of R is R′′ = {[r2 ].hB:3, C:8; ✷i}∪✷.
that (as before) the values of r1 and r3 and of the A field of r2
Lemma 4.1 (Properties of union and restriction).
8
are irrelevant to r2 in the result; unlike T ′ , however, we can also
potentially replay if r1 and r3 have been deleted from R. Likewise,
we can replay if the A field has been removed from a record, or if
some other field such as D is added. This illustrates that enriched
patterns allow for smaller slices than simple patterns, with greater
flexibility concerning possible updates to the input.
A natural question is whether slicing computes the (or a) smallest possible answer. Because our definition of correct slices is based
on recomputation, minimal slices are not computable, by a straightforward reduction from the undecidability of minimizing dependency provenance [1, 12].
p, T ց
ց ρ, e
✷, T ց
ց [], ✷
p, c ց
ց [], c
✸, T1 ց
ց ρ1 , e1
···
✸, Tn ց
ց ρn , en
p, f(T1 , . . . , Tn ) ց
ց ρ1 ⊔ · · · ⊔ ρn , f(e1 , . . . , en )
p, x ց
ց [x 7→ p], x
p2 , T2 ց
ց ρ2 [x 7→ p1 ], e2
p1 , T1 ց
ց ρ1 , e1
p2 , let x = T1 in T2 ց
ց ρ1 ⊔ ρ2 , let x = e1 in e2
5. Query and Differential Slicing
p1 , T1 ց
ց ρ1 , e1
We now adapt slicing techniques to provide explanations in terms
of query expressions, and show how to use differences between
slices to provide precise explanations for parts of the output.
···
pn , Tn ց
ց ρn , en
hA1 :p1 , . . . , An :pn i, hA1 :T1 , . . . , An :Tn i ց
ց ρ1 ⊔ · · · ⊔ ρn , hA1 :e1 , . . . , An :en i
p.A, T ց
ց ρ, S
p, T.A ց
ց ρ, S.A
5.1 Query slicing
p1 , T1 ց
ց ρ1 , e′1
true, T ց
ց ρ, e′
p1 , if(T, e1 , e2 ) ⊲true T1 ց
ց ρ1 ⊔ ρ, if(e′ , e′1 , ✷)
Our previous work [27] gave an algorithm for extracting a program
slice from a trace. We now adapt this idea to queries. A trace slice
shows the parts of the trace that need to be replayed in order to compute the desired part of the output; similarly, a query slice shows the
part of the query expression that is needed in order to ensure that the
desired part of the output is recomputed. As with traces, we allow
holes ✷ in programs to allow deleting subexpressions, and define
⊑ as a syntactic precongruence such that ✷ ⊑ e. We also define a
least upper bound operation e ⊔ e′ on partial query expressions in
the obvious way, so that ✷ ⊔ e = e.
We define a judgment p, T ց
ց ρ, e that traverses T and “unevaluates” p, yielding a partial input environment ρ and partial program e. The rules are illustrated in Figure 11. Many of the rules are
similar to those for trace slicing; the main differences arise in the
cases for conditionals and comprehensions, where we collapse the
sliced expressions back into expressions, possibly inserting holes or
merging sliced expressions obtained by running the same code in
different ways (as in a comprehension that contains a conditional).
Again, it is straightforward to show that if γ, e ⇓ v, T and
p ⊑ v then there exist ρ, e′ such that p, T ց
ց ρ, e′ , where ρ ⊑ γ
and e′ ⊑ e. The essential correctness property for query slices is
similar to that for trace slices: again, we require that rerunning any
sufficiently similar query on a sufficiently similar input produces a
result that matches p. The proof of this result is in Appendix D.
p2 , T2 ց
ց ρ2 , e′2
false, T ց
ց ρ, e′
p2 , if(T, e1 , e2 ) ⊲false T2 ց
ց ρ2 ⊔ ρ, if(e′ , ✷, e′2 )
∅, ∅ ց
ց [], ∅
p[1], T1 ց
ց ρ1 , e1
p[2], T2 ց
ց ρ2 , e2
p, T1 ∪ T2 ց
ց ρ1 ⊔ ρ2 , e1 ∪ e2
p[ǫ], T ց
ց ρ, e
p, {T } ց
ց ρ, {e}
✸, T ց
ց ρ, e
p, empty T ց
ց ρ, empty e
✸, T ց
ց ρ, e
p, sum T ց
ց ρ, sum e
p, x.Θ ց
ց∗ ρ′ , e′ , p0
p0 , T ց
ց ρ, e′0
[
[
′
p, {e | x ∈ T } ⊲ Θ ց
ց ρ ⊔ ρ , {e′ | x ∈ e′0 }
✸, T1 ց
ց ρ1 , e1
···
✸, Tn ց
ց ρn , en
✸, hA1 : T1 , . . . , An : Tn i ց
ց ρ1 ⊔ · · · ⊔ ρn , hA1 : e1 , . . . , An : en i
✸, ∅ ց
ց [], ∅
p, x.Θ ց
ց ρ, e, p′
✷, x.Θ ց
ց∗ [], ✷, ✷
Theorem 5.1 (Correctness of Query Slicing).
∅, x.∅ ց
ց∗ [], ✷, ∅
✸, x.∅ ց
ց∗ [], ✷, ∅
p[ℓ], T ց
ց ρ[x 7→ p0 ], e
p, x.{ℓ.T } ց
ց∗ ρ, e, {ℓ.p0 }
1. Suppose γ, T y v and p ⊑ v and p, T ց
ց ρ, e. Then for all
γ ′ hρ γ and e′ ⊒ e such that γ ′ , e′ ⇓ v ′ we have v ′ hp v.
2. Suppose γ, x ∈ v0 , Θ y∗ v and p ⊑ v and p, Θ ց
ց ρ, e0 , p0 .
Then for all γ ′ hρ γ and v0′ hp0 v0 and e′0 ⊒ e0 such that
γ ′ , x ∈ v0′ , e′0 ⇓∗ v ′ we have v ′ hp v.
p|dom(Θ1 ) , x.Θ1 ց
ց∗ ρ1 , e1 , p1
p|dom(Θ2 ) , x.Θ2 ց
ց∗ ρ2 , e2 , p2
p, x.Θ1 ⊎ Θ2 ց
ց∗ ρ1 ⊔ ρ2 , e1 ⊔ e2 , p1 ⊎ p2
Combining with the consistency property (Proposition 2.6), we
have:
Figure 11. Unevaluation (selected rules).
Corollary 5.2. Suppose γ, e ⇓ v, T and p ⊑ v and p, T ց
ց ρ, e′ .
Then for all γ ′ hρ γ and e′′ ⊒ e′ such that γ ′ , e′′ ⇓ v ′ , we have
v hp v ′ .
5.2 Differential slicing
We consider a pattern difference to be a pair of patterns (p, p′ )
where p ⊑ p′ . Intuitively, a pattern difference selects the part of a
value present in the outer component p′ and not in the inner component p. For example, the pattern difference (hB:✷; ✷i, hB:8; ✷i)
selects the value 8 located in the B component of a record. We can
also write this difference as hB: 8 ; ✷i, using ? to highlight the
boundary between the inner and outer pattern. Trace and query pattern differences are defined analogously.
Continuing our running example, the query slice for the pattern
p′ considered above is
[
Q′ = {if(x.B = 3, {hA:✷, B:x.Ci}, {}) | x ∈ R}
since only the computation of the A field in the output is irrelevant
to p′ .
9
It is straightforward to show by induction that slicing is monotonic in both arguments:
A related point: one may wonder whether it makes sense to select a particular copy of hB:3i in the output, since in a conventional multiset, multiple copies of the same value are indistinguishable. We believe it is important to be able to distinguish different
copies of a value, which may have different explanations. Treating
n copies of a value as a single value with multiplicity n would obscure this distinction and force us to compute the slices of all of the
copies even if only a single explanation is required. This is why we
have chosen to work with indexed sets, rather than pure multisets.
Lemma 5.3 (Monotonicity). If p ⊑ p′ and T ⊑ T ′ and p′ , T ′ ց
ρ′ , S ′ then there exist ρ, S such that p, T ց ρ, S and ρ ⊑ ρ′ and
S ⊑ S ′ . In addition, p, S ′ ց ρ, S.
This implies that given a pattern difference and a trace, we can
compute a trace difference using the following rule:
p 2 , T ց ρ 2 , S2
p 1 , S2 ց ρ 1 , S1
(p1 , p2 ), T ց (ρ1 , ρ2 ), (S1 , S2 )
Joins So far all examples have involved a single table R. Consider a simple join query
It follows from monotonicity that ρ1 ⊑ ρ2 and S1 ⊑ S2 , thus,
pattern differences yield trace differences. Furthermore, the second
part of monotonicity implies that we can compute the smaller slice
S1 from the larger slice S2 , rather than re-traverse T . It is also
possible to define a simultaneous differential slicing judgment, as
an optimization to ensure we only traverse the trace once.
Query slicing is also monotone, so differential query slices can
be obtained in exactly the same way. Revisiting our running example one last time, consider the differential pattern {[r2 ].hB: 8 ; ✷i}∪˙
✷. The differential query slice for the pattern p′ considered above
is
[
Q′′ = {if(x.B = 3, {hA:✷, B: x.C i}, {}) | x ∈ R}
Q3 = {hA:x.A, B:y.Ci | x ∈ R, y ∈ S, x.B = y.B}
and consider the following table S, and the result Q3 (R, S).
id
[s1 ]
S=
[s2 ]
[s3 ]
B
2
3
4
C
4
4
5
id
[r1 , s1 ]
Q3 (R, S) =
[r2 , s2 ]
[r3 , s2 ]
A
1
2
4
B
4
4
5
The full trace of this query execution is as follows:
S
T3 = S
{ | x ∈ R} ⊲ {
[r1 ]. { | y ∈ S} ⊲ {
6. Examples and Discussion
[r2 ].
S
{ | y ∈ S} ⊲ {
In this section we present some more complex examples to illustrate key points.
[r3 ].
S
{ | y ∈ S} ⊲ {
Renaming Recall the swapping query from the introduction,
written in NRC as
[
Q1 = {{if(x.A > x.B, hA:x.B, B:x.Ai, hxi)} | x ∈ R}
[s1 ].if(x.B
[s2 ].if(x.B
[s3 ].if(x.B
[s1 ].if(x.B
[s2 ].if(x.B
[s3 ].if(x.B
[s1 ].if(x.B
[s2 ].if(x.B
[s3 ].if(x.B
=
=
=
=
=
=
=
=
=
y.B,
y.B,
y.B,
y.B,
y.B,
y.B,
y.B,
y.B,
y.B,
,
,
,
,
,
,
,
,
,
) ⊲true { },
) ⊲false {},
) ⊲false {}},
) ⊲false {},
) ⊲true { },
) ⊲false {}},
) ⊲false {},
) ⊲true { },
) ⊲false {}}}
Slicing with respect to {[r1 , s1 ].hA:1; ✷i, [r2 , s2 ].hB:4; ✷i} ∪˙ ✷
yields trace slice
This query illustrates a key difference between our approach and
the how-provenance model of Green et al. [20]. As discussed in
[13], renaming operations are ignored by how-provenance, so the
how-provenance annotations of the results of Q1 are the same as for
a query that simply returns R. In other words, the choice to swap
the fields when A > B is not reflected in the how-provenance,
which shows that it is impossible to extract where-provenance (or
traces) from how-provenance. Extracting where-provenance from
traces appears straightforward, extending our previous work [1].
This example also illustrates how traces and slices can be used
for partial recomputation. The slice for output pattern {[1, r1 ].hB:2i}∪˙
✷, for example, will show that this record was produced because
the A component of hA:1, B:2, C:7i at index [r1 ] in the input was
less than or equal to the B component. Thus, we can replay after
any change that preserves this ordering information.
Union Consider query
[
Q2 = {{hB:x.Bi} | x ∈ R} ∪ {hB:3i}
that projects the B fields of elements of R and adds another copy
of hB:3i to the result. This yields
Q2 (R) = {[1, r1 ].hB:2i, [1, r2 ].hB:3i, [1, r3 ].hB:3i, [2].hB:3i}
This illustrates that the indexes may not all have the same length,
but still form a prefix code. If we slice with respect to {[1, r2 ].hB:3i}∪˙
✷ then the query slice is:
[
Q′2 = {{hB:x.Bi} | x ∈ R} ∪ ✷
and R′ = {[r2 ].hB:3; ✷i} ∪˙ ✷ whereas if we slice with respect to
{[2].hB:3i} ∪˙ ✷ then the query slice is Q′′2 = ✷ ∪ {hB:3i} and
R′′ = ✷, indicating that this part of the result has no dependence
on the input.
10
S
T3′ = S
{ | x ∈ R} ⊲ {
[r1 ]. S{ | y ∈ S} ⊲ {
[r2 ]. { | y ∈ S} ⊲ {
[s1 ].if(x.B = y.B, , ) ⊲true { },
[s2 ].if(x.B = y.B, , ) ⊲true { }}
and input slice R3′ = {[r1 ].hA:1, B:2; ✷i, [r2 ].hB:3; ✷i} and
S3′ = {[s1 ].hB:2; ✷i, [s2 ].hB:3; C:4i}.
Workflows NRC expressions can be used to represent workflows, if primitive operations are added representing the workflow
steps [2, 21]. To illustrate query slicing and differential slicing for a
workflow-style query, consider the following more complex query:
Q4 = {f (x, y) | x ∈ T, y ∈ T, z ∈ U, p(x, y), q(x, y, z)}
where f computes some function of x and y and p and q are selection criteria. Here, we assume T and U are collections of data files
and f, p, q are additional primitive operations on them. This query
exercises most of the distinctive features of our approach; we can
of course translate it to the NRC core calculus used in the rest of the
paper. If dom(T ) = {t1 , . . . , t10 } and dom(U ) = {u1 , . . . , u10 }
then we might obtain result {[t3 , t4 , u5 ].v1 , [t6 , t8 , u10 ].v2 }. If we
focus on the value v1 using the pattern {[t3 , t4 , u5 ].v1 } ∪˙ ✷, then
the program slice we obtain is Q4 itself, while the data slice might
be T ′ = {[t3 ].✸, [t4 ].✸} ∪˙ ✷, U ′ = {[u5 ].✸} ∪˙ ✷, indicating that
if the values at t3 , t4 , u5 are held fixed then the end result will still
be v1 . The trace slice is similar, and shows that v1 was computed
by applying f with x bound to the value at t3 in T , y bound to t4 ,
and z bound to u5 , and that p(x, y) and q(x, y, z) succeeded for
these values.
If we consider a differential slice using pattern difference
{[t3 , t4 , u5 ]. v1 } ∪˙ ✷ then we obtain the following program difference:
[
Qδ4 = { f (x, y) | x ∈ T, y ∈ T, z ∈ U, p(x, y), q(x, y, z)}
This shows that most of the query is needed to ensure that the
result at [t3 , t4 , u5 ] is produced, but the subterm f (x, y) is only
needed to compute the value v1 . This can be viewed as a querybased explanation for this part of the result.
tracing, making it feasible for in-memory execution of workflows
represented in NRC.
8. Related and future work
Program slicing has been studied extensively [17, 30, 31], as has the
use of execution traces, for example in dynamic slicing. Our work
contrasts with much of this work in that we regard the trace and
underlying data as being of interest, not just the program. Some
of our previous work [12] identified analogies between program
slicing and provenance, but to our knowledge, there is no other
prior work on slicing in databases.
Lineage and why-provenance were motivated semantically in
terms of identifying witnesses, or parts of the input needed to ensure that a given part of the output is produced by a query. Early
work on lineage in relational algebra [15] associates each output
record with a witness. Buneman et al. studied a more general notion called why-provenance that maps an output part to a collection of witnesses [7, 8]. This idea was generalized further to the
how-provenance or semiring model [18, 20], based on using algebraic expressions as annotations; this approach has been extended
to handle some forms of negation and aggregation [4, 19]. Semiring
homomorphisms commute with query evaluation; thus, homomorphic changes to the input can be performed directly on the output
without re-running the query. However, this approach only applies
to changes describable as semiring homomorphisms, such as deletion.
Where-provenance was also introduced by Buneman et al. [7,
8]. Although the idea of tracking where input data was copied
from is natural, it is nontrivial to characterize semantically, because
where-provenance does not always respect semantic equivalence.
In later work, Buneman et al. [6] studied where-provenance for
the pure NRC and characterized its expressiveness for queries and
updates. It would be interesting to see whether their notion of
expressive completeness for where-provenance could be extended
to richer provenance models, such as traces, possibly leading to an
implementation strategy via translation to plain NRC.
Provenance has been studied extensively for scientific workflow
systems [5, 29], but there has been little formal work on the semantics of workflow provenance. The closest work to ours is that of
Hidders et al. [21], who model workflows by extending the NRC
with nondeterministic, external function calls. They sketch an operational semantics that records runs that contain essentially all of
the information in a derivation tree, represented as a set of triples.
They also suggest ways of extracting subruns from runs, but their
treatment is partial and lacks strong formal guarantees analogous
to our results.
There have been some attempts to reconcile the database and
workflow views of provenance; Hidders et al. [21] argued for the
use of Nested Relational Calculus (NRC) as a unifying formalism for both workflow and database operations, and subsequently
Kwasnikowska and Van den Bussche [22] showed how to map this
model to the Open Provenance Model. Acar et al. [2] later formalized a graph model of provenance for NRC. The most advanced
work in this direction appears to be that of Amsterdamer et al. [3],
who combined workflow and database styles of provenance in the
context of the PigLatin system (a MapReduce variant based on
nested relational queries). Lipstick allows analyzing the impact of
restricted hypothetical changes (such as deletion) on parts of the
output, but to our knowledge no previous work provides a formal
guarantee about the impact of changes other than deletion.
In our previous work [12], we introduced dependency provenance, which conservatively over-approximates the changes that
can take place in the output if the input is changed. We developed definitions and techniques for dependency provenance in full
NRC including nonmonotone operations (empty, sum) and primi-
7. Implementation
To validate our design and experiment with larger examples, we
extended our Haskell implementation Slicer of program slicing for
functional programs [27] with the traces and slicing techniques
presented in this paper. We call the resulting system NRCSlicer;
it supports a free combination of NRC and general-purpose functional programming features. NRCSlicer interprets expressions inmemory without optimization. As reported previously for Slicer,
we have experimented with several alternative tracing and slicing
strategies, which use Haskell’s lazy evaluation strategy in different
ways. The alternatives we consider here are:
• eager: the trace is fully computed during evaluation.
• lazy: the value is computed eagerly, but the trace is computed
lazily using Haskell’s default lazy evaluation strategy.
To evaluate the effectiveness of enriched patterns, we measured the
time needed for the eager and lazy techniques to trace and slice
the workflow example Q4 in the previous section. We considered a
instantiation of the workflow where the data values are simply integers and with input tables T, U = {1, . . . , 50}, and defined the
operations f (x, y) as x ∗ y, p(x, y) as x < y, and q(x, y, z) as
x2 + y 2 = z 2 . This is not a realistic workflow, and we expect that
the time to evaluate the basic operations of a realistic workflow following this pattern would be much larger. However, the overheads
of tracing and slicing do not depend on the execution time of primitive operations, so we can still draw some conclusions from this
simplistic example.
The comprehension iterates over 503 = 125,000 triples, producing 20 results. We considered simple and enriched patterns selecting a single element of the result. We measured evaluation time,
and the overhead of tracing, trace slicing, and query slicing. The
experiments were conducted on a MacBook Pro with 2GB RAM
and a 2.8GHz Intel Core Duo, using GHC version 7.4.
eager-simple
eager-enriched
lazy-simple
lazy-enriched
eval
0.5
0.5
0.5
0.5
trace
1.5
1.5
0.7
0.7
slice
2.5
<0.1
1.3
<0.1
qslice
1.6
<0.1
1.7
<0.1
The times are in seconds. The “eval” column shows the time needed
to compute the result without tracing. The “trace”, “slice”, and “qslice” columns show the added time needed to trace and compute
slices. The full traces in each of these runs have over 2.1 million
nodes; the simple pattern slices are almost as large, while the enriched pattern slices are only 95 nodes. For this example, slicing is
over an order of magnitude faster using enriched patterns. The lazy
tracing approach required less total time both for tracing and slicing (particularly for simple patterns). Thus, Haskell’s built-in lazy
evaluation strategy offers advantages by avoiding explicitly constructing the full trace in memory when it is not needed; however,
there is still room for improvement. Again, however, for an actual
workflow involving images or large data files, the evaluation time
would be much larger, dwarfing the time for tracing or slicing.
Our implementation is a proof-of-concept that evaluates queries
in-memory via interpretation, rather than compilation; further work
would be needed to adapt our approach to support fine-grained
provenance for conventional database systems. Nevertheless, our
experimental results do suggest that the lazy tracing strategy and
use of enriched patterns can effectively decrease the overhead of
11
tive functions. Dependency provenance cannot predict exactly how
the output will be affected by a general modification to the source,
but it can guarantee that some parts of the output will not change if
certain parts of the input are fixed. Our notion of equivalence modulo a pattern is a generalization of the equal-except-at relation used
in that work. Motivated by dependency provenance, an earlier technical report [10] presented a model of traced evaluation for NRC
and proved elementary properties such as fidelity. However, it did
not investigate slicing techniques, and used nondeterministic label
generation instead of our deterministic scheme; our deterministic
approach greatly simplifies several aspects of the system, particularly for slicing.
There are several intriguing directions for future work, including developing more efficient techniques for traced evaluation and
slicing that build upon existing database query optimization capabilities. It appears possible to translate multiset queries so as to
make the labels explicit, since a fixed given query increases the
label depth by at most a constant. Thus, it may be possible to evaluate queries with label information but without tracing first, then
gradually build the trace by slicing backwards through the query,
re-evaluating subexpressions as necessary. Other interesting directions include the use of slicing techniques for security, to hide confidential input information while disclosing enough about the trace to
permit recomputation, and the possibility of extracting other forms
of provenance from traces, as explored in the context of functional
programs in prior work [1].
ciety University Research Fellowship, by the EU FP7 DIACHRON
project, and EPSRC grant EP/K020218/1. Acar is partially supported by an EU ERC grant (2012-StG 308246—DeepSea) and an
NSF grant (CCF-1320563).
References
[1] U. A. Acar, A. Ahmed, J. Cheney, and R. Perera. A core calculus for
provenance. Journal of Computer Security, 21:919–969, 2013. Full
version of a POST 2012 paper.
[2] U. A. Acar, P. Buneman, J. Cheney, N. Kwasnikowska,
J. Van den Bussche, and S. Vansummeren. A graph model of
data and workflow provenance. In TAPP, 2010.
[3] Y. Amsterdamer, S. B. Davidson, D. Deutch, T. Milo, J. Stoyanovich,
and V. Tannen. Putting lipstick on pig: Enabling database-style workflow provenance. PVLDB, 5(4):346–357, 2011.
[4] Y. Amsterdamer, D. Deutch, and V. Tannen. Provenance for aggregate
queries. In PODS, pages 153–164. ACM, 2011.
[5] R. Bose and J. Frew. Lineage retrieval for scientific data processing: a
survey. ACM Comput. Surv., 37(1):1–28, 2005.
[6] P. Buneman, J. Cheney, and S. Vansummeren. On the expressiveness
of implicit provenance in query and update languages. ACM Transactions on Database Systems, 33(4):28, November 2008.
[7] P. Buneman, S. Khanna, and W. Tan. Why and where: A characterization of data provenance. In ICDT, number 1973 in LNCS, pages
316–330. Springer, 2001.
[8] P. Buneman, S. Khanna, and W. Tan. On propagation of deletions and
annotations through views. In PODS, pages 150–158, 2002.
9. Conclusion
[9] P. Buneman, S. A. Naqvi, V. Tannen, and L. Wong. Principles of programming with complex objects and collection types. Theor. Comp.
Sci., 149(1):3–48, 1995.
The importance of provenance for transparency and reproducibility
is widely recognized, yet there has been little explicit discussion
of correctness properties formalizing intuitions about how provenance is to provide reproducibility. In self-explaining computation,
traces are considered to be explanations of a computation in the
sense that the trace can be used to recompute (parts of) the output
under hypothetical changes to the input. This paper develops the
foundations of self-explaining computation for database queries,
by defining a tracing semantics for NRC, proposing a formal definition of correctness for tracing (fidelity) and slicing, and defining
a correct (though potentially overapproximate) algorithm for trace
slicing. Trace slicing can be used to obtain smaller “golden trail”
traces that explain only a part of the input or output, and explore the
impact of changes in hypothetical scenarios similar to the original
run. At a technical level, the main contributions are the careful use
of prefix codes to label multiset elements, and the development of
enriched patterns that allow more precise slices. Our design is validated by a proof-of-concept implementation that shows that laziness and enriched patterns can significantly improve performance
for small (in-memory) examples.
In the near term, we plan to combine our work on selfexplaining functional programs [27] and database queries (this
paper) to obtain slicing and provenance models for programming
languages with query primitives, such as F# [14] or Links [23].
Ultimately, our aim is to extend self-explaining computation to
programs that combine several execution models, including workflows, databases, conventional programming languages, Web interaction, or cloud computing.
[10] J. Cheney, U. A. Acar, and A. Ahmed. Provenance traces. CoRR,
arXiv.org/abs/0812.0564, 2008.
[11] J. Cheney, U. A. Acar, and R. Perera. Toward a theory of selfexplaining computation. In In search of elegance in the theory and
practice of computation: a Festschrift in honour of Peter Buneman,
number 8000 in LNCS, pages 193–216. Springer, 2013.
[12] J. Cheney, A. Ahmed, and U. A. Acar. Provenance as dependency
analysis. Mathematical Structures in Computer Science, 21(6):1301–
1337, 2011.
[13] J. Cheney, L. Chiticariu, and W. C. Tan. Provenance in databases:
Why, how, and where. Foundations and Trends in Databases,
1(4):379–474, 2009.
[14] J. Cheney, S. Lindley, and P. Wadler. A practical theory of languageintegrated query. In ICFP, pages 403–416, New York, NY, USA, 2013.
ACM.
[15] Y. Cui, J. Widom, and J. L. Wiener. Tracing the lineage of view data in
a warehousing environment. ACM Trans. Database Syst., 25(2):179–
227, 2000.
[16] J. Dean and S. Ghemawat. MapReduce: simplified data processing on
large clusters. Commun. ACM, 51(1):107–113, 2008.
[17] J. Field and F. Tip. Dynamic dependence in term rewriting systems
and its application to program slicing. Information and Software
Technology, 40(11–12):609–636, 1998.
[18] J. N. Foster, T. J. Green, and V. Tannen. Annotated XML: queries and
provenance. In PODS, pages 271–280, 2008.
[19] F. Geerts and A. Poggi. On database query languages for K-relations.
J. Applied Logic, 8(2):173–185, 2010.
Acknowledgments We are grateful to Peter Buneman, Jan Van
den Bussche, and Roly Perera for comments on this work and to
the anonymous reviewers for detailed suggestions. Effort sponsored
by the Air Force Office of Scientific Research, Air Force Material
Command, USAF, under grant number FA8655-13-1-3006. The
U.S. Government and University of Edinburgh are authorized to reproduce and distribute reprints for their purposes notwithstanding
any copyright notation thereon. Cheney is supported by a Royal So-
[20] T. J. Green, G. Karvounarakis, and V. Tannen. Provenance semirings.
In PODS, pages 31–40, 2007.
[21] J. Hidders, N. Kwasnikowska, J. Sroka, J. Tyszkiewicz, and J. Van den
Bussche. A formal model of dataflow repositories. In DILS, 2007.
[22] N. Kwasnikowska and J. Van den Bussche. Mapping the NRC
dataflow model to the open provenance model. In IPAW, pages 3–16,
2008.
12
[23] S. Lindley and J. Cheney. Row-based effect types for database integration. In TLDI, pages 91–102. ACM Press, 2012.
[24] P. Missier, B. Ludäscher, S. Dey, M. Wang, T. McPhillips, S. Bowers,
M. Agun, and I. Altintas. Golden trail: Retrieving the data history that
matters from a comprehensive provenance repository. International
Journal of Digital Curation, 7(1):139–150, 2011.
[25] L. Moreau. The foundations for provenance on the web. Foundations
and Trends in Web Science, 2(2–3), 2010.
[26] C. Olston, B. Reed, U. Srivastava, R. Kumar, and A. Tomkins. Pig
latin: a not-so-foreign language for data processing. In SIGMOD,
pages 1099–1110. ACM, 2008.
[27] R. Perera, U. A. Acar, J. Cheney, and P. B. Levy. Functional programs
that explain their work. In ICFP, pages 365–376. ACM, 2012.
[28] A. Sabelfeld and A. Myers. Language-based information-flow security. IEEE Journal on Selected Areas in Communications, 21(1):5–19,
2003.
[29] Y. Simmhan, B. Plale, and D. Gannon. A survey of data provenance
in e-science. SIGMOD Record, 34(3):31–36, 2005.
[30] F. Tip. A survey of program slicing techniques. J. Prog. Lang., 3(3),
1995.
[31] M. Weiser. Program slicing. In ICSE, pages 439–449. IEEE Press,
1981.
13
Γ⊢T :τ
b ∈ {true, false}
Γ ⊢ b : bool
n∈N
Γ ⊢ n : int
f : (b1 , . . . , bn ) → b ∈ Σ
Γ ⊢ T1 : b1
···
Γ ⊢ f(T1 , . . . , Tn ) : b
Γ ⊢ T1 : τ1
Γ, x : τ1 ⊢ T2 : τ2
Γ ⊢ let x = T1 in T2 : τ2
b ∈ {true, false}
Γ ⊢ T : {τ }
Γ ⊢ T1 : τ1
···
Γ ⊢ Tn : τn
Γ ⊢ hA1 : T1 , . . . , An : Tn i : hA1 : τ1 , . . . , An : τn i
Γ ⊢ T ∪ T ′ : {τ }
Γ, x : τ ⊢ e : {τ ′ }
Γ ⊢ T : {τ }
Γ ⊢ sum T : int
Γ ⊢ empty T : bool
Γ ⊢ T : {τ }
Γ, x ∈ {τ } ⊢ Θ : {τ ′ }
[
Γ ⊢ {e | x ∈ T } ⊲ Θ : {τ ′ }
Γ, x : τ ⊢ T : {τ ′ }
Γ, x ∈ {τ } ⊢ {ℓ.T } : {τ ′ }
′
Γ, x ∈ {τ } ⊢ ∅ : {τ }
Γ⊢T :τ
Γ ⊢ {T } : {τ }
Γ ⊢ ∅ : {τ }
Γ ⊢ T : {int}
Γ, x ∈ {τ } ⊢ Θ : {τ ′ }
x:τ ∈Γ
Γ⊢x:τ
Γ ⊢ T : hA1 : τ1 , . . . , An : τn i
Γ ⊢ T.Ai : τi
Γ ⊢ T′ : τ
Γ ⊢ T : bool
Γ ⊢ e1 : τ
Γ ⊢ e2 : τ
Γ ⊢ if(T, e1 , e2 ) ⊲b T ′ : τ
Γ ⊢ T ′ : {τ }
Γ ⊢ Tn : bn
Γ, x ∈ {τ } ⊢ Θ1 : {τ ′ }
Γ, x ∈ {τ } ⊢ Θ2 : {τ ′ }
Γ, x ∈ {τ } ⊢ Θ1 ∪ Θ2 : {τ ′ }
Figure 12. Well-typed traces.
T′ ⊑ T
T ′′ ⊑ T ′
✷⊑T
hA1 :
T ⊑T
T1′ ⊑ T1
′
T1 , . . . , An :
T′ ⊑ T
{T ′ } ⊑ {T }
T
′′
T′ ⊑ T
T1′ ⊑ T1
T2′ ⊑ T2
′
′
T1 ∪ T2 ⊑ T1 ∪ T2
···
f(T1′ , . . . , Tn′ )
⊑T
···
Tn′ ⊑ Tn
⊑ hA1 : T1 , . . . , An : Tn i
Tn′ i
T1′ ⊑ T1
T′ ⊑ T
T .A ⊑ T.A
′
T′ ⊑ T
sum T ′ ⊑ sum T
T1′ ⊑ T1
Tn′ ⊑ Tn
⊑ f(T1 , . . . , Tn )
let x =
T0′ ⊑ T0
′
if(T0 , e1 , e2 ) ⊲b T ′
T′ ⊑ T
empty T ′ ⊑ empty T
T1′
in
T2′
T2′ ⊑ T2
⊑ let x = T1 in T2
T′ ⊑ T
⊑ if(T0 , e1 , e2 ) ⊲b T
∅⊑∅
T′ ⊑ T
Θ′ ⊑ Θ
[
[
′
′
{e | x ∈ T } ⊲ Θ ⊑ {e | x ∈ T } ⊲ Θ
Θ′ ⊑ Θ ⇐⇒ ∀ℓ ∈ dom(Θ′ ).Θ′ (ℓ) ⊑ Θ(ℓ)
Figure 13. Subtrace relation.
A. Auxiliary definitions
Figure 12 summarizes the typing rules for traces. Figure 13 defines the subtrace relation.
B. Proofs of pattern properties
We prove the required properties for enriched patterns. The corresponding properties for the sublanguage of simple patterns follow
immediately since simple patterns are closed under the relevant operations.
Lemma B.1. If p, p′ ⊑ v then p ⊔ p′ exists and is the least upper bound of p and p′ .
Proof. If both p and p′ match some pattern q, then it is straightforward to show by induction on q that p ⊔ p′ is defined and p ⊔ p′ ⊑ q.
Specifically, if p or p′ is ✷ or ✸ then we are done; if p and p′ are both constants then we are done; otherwise, in each case, the toplevel
structure of p and p′ must match q, so that we can apply one of the rules for ⊔ on smaller terms that match part of q. When q = v, the desired
result follows. The second part (that ⊔ is a least upper bound) also follows directly since clearly, p, p′ ⊑ p ⊔ p′ and if p, p′ ⊑ q then a similar
argument shows that p ⊔ p′ ⊑ q.
Lemma B.2. For any v, v ′ , p, v hp[✸/✷] v ′ holds if and only if v hp v ′ holds and v = v ′ .
Proof. Straightforward induction on the derivation of v hp[✸/✷] v ′ .
Lemma B.3. For any v, v ′ , p, p′ , we have v hp⊔p′ v ′ if and only if v hp v ′ and v hp′ v ′ . Moreover, p ⊑ p′ if and only if for all v, v ′ , we
have v hp′ v ′ implies v hp v ′ .
Proof. For the first part, we proceed by induction on the total size of p, p′ . The cases where one of p, p′ is ✷ or ✸ are straightforward; for ✸
we also need Lemma B.2. The cases involving constants, pairs, or complete set and record patterns are also straightforward.
There are several similar cases involving partial set or record patterns. We illustrate two representative cases:
1. If p = {ℓi .pi , ℓ′i .qi } and p′ = {ℓi .p′i } ∪˙ ✷ then p ⊔ p′ = {ℓi .pi ⊔ p′i , ℓ′i .qi }. First, suppose v hp⊔p′ v ′ . This means v = {ℓi .vi , ℓ′i .wi }
and v ′ = {ℓi .vi′ , ℓ′i .wi′ }, where vi hpi ⊔p′i vi′ and wi hqi wi′ . Therefore, by induction, vi hpi vi′ and vi hp′i vi′ , so we can conclude that
{ℓi .vi , ℓ′i .wi } hp {ℓi .vi′ , ℓ′i .wi′ } and {ℓi .vi , ℓ′i .wi } hp′ {ℓi .vi′ , ℓ′i .wi′ }, as required.
14
Conversely, if we assume v hp v ′ and v hp′ v ′ , then we must have v = {ℓi .vi , ℓ′i .wi } and v ′ = {ℓi .vi′ , ℓ′i .wi′ }, where vi hpi vi′ and
vi hp′i vi′ and wi hqi wi′ . Thus, by induction we have vi hpi ⊔p′i vi′ so we can conclude {ℓi .vi , ℓ′i .wi } hp⊔p′ {ℓi .vi′ , ℓ′i .wi′ }.
2. If p = {ℓi .pi , ℓ′i .qi } ∪˙ ✷ and p′ = {ℓi .p′i , ℓ′′i .ri } ∪˙ ✸ then p ⊔ p′ = {ℓi .pi ⊔ p′i , ℓ′i .qi [✸/✷], ℓ′′i .ri } ∪˙ ✸. First, suppose v hp⊔p′ v ′ .
This means v = {ℓi .vi , ℓ′i .wi , ℓ′′i .ui } ⊎ w0 and v ′ = {ℓi .vi′ , ℓ′i .wi′ , ℓ′′i .u′i } ⊎ w0 , where vi hpi ⊔p′i vi′ and wi hqi [✸/✷] wi′ and
ui hri u′i . Therefore, by induction, vi hpi vi′ and vi hp′i vi′ , and we also have wi hqi wi′ and wi = wi′ , so we can conclude that
{ℓi .vi , ℓ′i .wi , ℓ′′i .ui } ⊎ w0 hp {ℓi .vi′ , ℓ′i .wi′ , ℓ′′i .u′i } ⊎ w0 and {ℓi .vi′ , ℓ′i .wi , ℓ′′i .ui } ⊎ w0 hp′ {ℓi .vi′ , ℓ′i .wi′ , ℓ′′i .u′i } ⊎ w0 , as required.
Conversely, if we assume v hp v ′ and v hp′ v ′ , then we must have v = {ℓi .vi , ℓ′i .wi , ℓ′′i .ui } ⊎ v0 and v ′ = {ℓi .vi′ , ℓ′i .wi′ , ℓ′′i .u′i } ⊎ v0′
where vi hpi vi′ and vi hp′i vi′ and wi hqi wi′ and ui hri u′i . In addition, we must have that wi = wi′ and v0 = v0′ since v and v ′
must be equal at all labels not in ℓi , ℓ′′i . Thus, by induction we have vi hpi ⊔p′i vi′ and (using Lemma B.2) we can also easily show that
wi hqi [✸/✷] wi , so we can conclude that {ℓi .vi , ℓ′i .wi , ℓ′′i .u′i } ⊎ v0 hp⊔p′ {ℓi .vi′ , ℓ′i .wi , ℓ′′i .ui } ⊎ v0 .
The second part follows immediately from the definition of p ⊑ p′ as p ⊔ p′ = p′ .
Lemma B.4 (Properties of union and restriction).
1. If p1 ⊑ v1 and p2 ⊑ v2 and v1 hp1 v1′ and v2 hp2 v2′ then v1 ⊎ v2 hp1 ⊎p2 v1′ ⊎ v2′ , provided all of these disjoint unions are defined.
2. If p ⊑ v1 ⊎ v2 and L1 ≤ dom(v1 ) and L2 ≤ dom(v2 ) and L1 , L2 are prefix-disjoint, then p|L1 ⊑ v1 and p|L2 ⊑ v2 .
Proof. For part 1, assume p1 ⊑ v1 , p2 ⊑ v2 , v1 hp1 v1′ and v2 hp2 v2′ , and assume that the domains of p1 and p2 , v1 and v2 , and v1′ and v2′
are prefix-disjoint respectively, so that the unions exist. There are several cases. If p1 or p2 is ✷ then the conclusion is immediate. If both are
✸ then v1 = v1′ and v2 = v2′ so v1 ⊎ v2 = v1′ ⊎ v2′ .
Most of the remaining cases are straightforward; we illustrate with the case p1 = {ℓi .pi } ∪˙ ✷ and p2 = {ℓ′i .qi } ∪˙ ✸. In this case,
v1
=
{ℓi .vi1 } ⊎ v01
v2
=
{ℓ′i .vi2 } ⊎ v02
v1′
v2′
=
{ℓi .wi1 } ⊎ w01
=
{ℓ′i .wi2 } ⊎ w02
and we also know that vi1 hpi wi1 and vi2 hqi wi2 for each i. Therefore,
{ℓi .vi1 } ⊎ v01 ⊎ {ℓ′i .vi2 } ⊎ v02
=
h{ℓ
′
˙
i .pi ,ℓi .qi }∪✷
=
{ℓi .vi1 , ℓ′i .vi2 } ⊎ v01 ⊎ v02
{ℓi .wi1 , ℓ′i .wi2 } ⊎ w01 ⊎ w02
{ℓi .wi1 } ⊎ w01 ⊎ {ℓ′i .wi1 } ⊎ w02
For part 2, assume p ⊑ v1 ⊎ v2 and Li ≤ dom(vi ) for i ∈ {1, 2}. We proceed by case analysis on p. The cases p = ✷ and p = ✸ are
immediate since ✷|L = ✷ and ✸|L = ✸. If p = {ℓi .pi } is a complete set pattern, then p|L1 selects just those elements of p that have a prefix
in Li , and since every element of vq has its label’s prefix in L1 we must have that v1 = {ℓ′i .vi′ } where pi ⊑ vi′ for each i and p|L1 = {ℓ′i .p′i },
which is what we need to show. The cases for p = {ℓi .pi } ∪˙ ✷ and p = {ℓi .pi } ∪˙ ✸ are similar.
A symmetric argument suffices to show p|L2 ⊑ v2 .
Lemma B.5 (Projection and ⊑).
1.
2.
3.
4.
If p ⊑ {ǫ.v} then p.ǫ ⊑ v.
If p ⊑ 1 · v1 ⊎ 2 · v2 then p[1] ⊑ v1 and p[2] ⊑ v2 .
If p ⊑ ℓ · v then p[ℓ] ⊑ v.
If p ⊑ hAi : vi i then p.Ai ⊑ vi .
Proof. For part (1), suppose p ⊑ {ǫ.v}. We proceed by case analysis on p. The cases for ✷ and ✸ are trivial. If p = {ǫ.p′ } then p.ǫ = p′ so
the conclusion follows. The cases for p = {ǫ.p′ } ∪˙ ✷ or p = {ǫ.p′ } ∪˙ ✸ are similar.
For part (2), suppose p ⊑ 1 · v1 ⊎ 2 · v2 . Suppose v1 = {ℓi .vi } and v2 = {ℓ′i .vi′ }. If p is a complete set pattern, then it must be of the
form {1.ℓi .pi , 2.ℓ′i .qi } , where pi ⊑ vi and qi ⊑ vi′ . The desired conclusion follows since p[1] = {ℓi .pi }, and a symmetric argument shows
that p[2] ⊑ v2 . The cases for partial set patterns are similar, since the ✷ or ✸ is preserved by the projection operation.
For part (3), suppose p ⊑ ℓ · v. The proof is analogous to the previous case.
For part (4), suppose p ⊑ hAi : vi i. If p = ✸ or ✷, the result is immediate; otherwise, p is a record pattern. If it is a total record pattern
hAi : pi i then clearly p.Ai = pi ⊑ vi . Otherwise, it is a partial pattern, in which case either p.Ai is a pattern pi mentioned in p, in which
case we are done, or p.Ai = ✸ or p.Ai = ✷, and the conclusion follows immediately.
Lemma B.6 (Projection and hp ).
1.
2.
3.
4.
If p ⊑ {ǫ.v} and v hp.ǫ v ′ then {ǫ.v} hp {ǫ.v ′ }.
If p ⊑ 1 · v1 ⊎ 2 · v2 and v1 hp[1] v1′ and v2 hp[2] v2′ then 1 · v1 ⊎ 2 · v2 hp 1 · v1′ ⊎ 2 · v2′ .
If p ⊑ ℓ · v and v hp[ℓ] v ′ then ℓ · v hp ℓ · v ′ .
If p ⊑ hAi : vi i and v1 hp.A1 v1′ , . . . , vn hp.An vn′ then hAi : vi i hp hAi : vi′ i.
15
Proof. For part (1), suppose p ⊑ {ǫ.v} and v hp.ǫ v ′ . If p = ✷ or ✸ then the result is immediate (this is the case for all three parts of the
lemma). If p = {ǫ.p′ }, p = {ǫ.p′ } ∪˙ ✷, or p = {ǫ.p′ } ∪˙ ✸ then p.ǫ = p′ so v hp′ v ′ . We can conclude {ǫ.v} hp {ǫ.v ′ }.
For part (2), suppose p ⊑ 1 · v1 ⊎ 2 · v2 and v1 hp[1] v1′ and v2 hp[2] v2′ . As usual, the cases p = ✷ and p = ✸ are trivial. Suppose
v1 = {ℓi .vi′ } and v2 = {ℓ′i .vi′′ }. If p is a complete set pattern it must be of the form {1.ℓi .pi , 2.ℓ′i .qi }, and v1 h{ℓi .pi } v1′ and v2 h{ℓ′ .qi } v2′ .
i
It is straightforward to show that 1·v1 h{1·ℓi .pi } 1·v1′ and 2·v2 h{2·ℓ′ .q } 2·v2′ , so by previous results we have 1·v1 ⊎2·v2 hp 1·v1′ ⊎2·v2′ .
i i
The cases for partial patterns follow the same reasoning, making use of the fact that projection preserves the partial pattern.
For part (3), suppose p ⊑ ℓ · v. The argument is similar to the previous case.
For part (4) suppose p ⊑ hAi : vi i and vi hp.Ai vi′ for each i. If p is ✷, ✸, or a complete record pattern then the conclusion is immediate.
Otherwise, if p = hBi : qi i ∪˙ ✷, the conclusion is immediate since each component of the records hAi : vi i and hAi : vi′ i either match the
appropriate qi or need not match because of the hole. Finally, if p = hBi : qi i ∪˙ ✸, the conclusion follows since each pair of corresponding
components of the records hAi : vi i and hAi : vi′ i either match the appropriate qi or are equal because p.Ai = ✸ if Ai is not among the
Bj .
C. Proof of correctness of trace slicing
Lemma C.1. If γ, x ∈ v1 , Θ y∗ v2 and v1′ ⊆ v1 then there exists v2′ ⊆ v2 such that γ, x ∈ v1′ , Θ y∗ v2′ .
Proof. The proof is straightforward by induction on derivations. The cases for v1 = ∅ and v1 = {ℓ.v} are immediate; if v1 = w1 ⊎ w2 then
we proceed by induction using the subsets w1′ = w1 ∩ v1′ and w2′ = w2 ∩ v1′ .
We prove correctness of the full trace slicing algorithm, with enriched patterns, since the correctness for simple patterns follows as a
special case.
Theorem C.2 (Correctness of Slicing).
1. Suppose γ, T y v and p ⊑ v and p, T ց ρ, S. Then for all γ ′ hρ γ and T ′ ⊒ S such that γ ′ , T ′ y v ′ we have v ′ hp v.
2. Suppose γ, x ∈ v0 , Θ y∗ v and p ⊑ v and p, x.Θ0 ց∗ ρ, Θ′0 , p0 , where Θ0 ⊆ Θ. Then for all γ ′ hρ γ and v0′ hp0 v0 and Θ′ ⊒ Θ′0
such that γ ′ , x ∈ v0′ , Θ′ y∗ v ′ we have v ′ hp v.
Proof. For part (1), the proof is by induction on the structure of slicing derivations, using inversion to extract information from other
derivations. The cases for variables, constants, primitive operations, and let-binding are exactly as in previous work [1]. The cases for
conditionals are similar to the those for variant types and case constructs in previous work.
We show the cases for records and set operations, which are new to this paper (records are handled similarly to pairs in our previous work,
so the cases for pairs are omitted).
• Field projection. If the last step in the slicing derivation is
hAi :p; ✷i, T ց ρ, S
p, T.Ai ց ρ, S.Ai
then the evaluation derivation must be of the form
γ, T y hA1 :v1 , . . . , An :vn i
γ, T.Ai y vi
Let γ ′ hρ γ and T ′ ⊒ S.Ai be given, where γ ′ , T ′ y v ′ . Then T ′ must have the form T ′′ .Ai for some T ′′ ⊒ S so the replay derivation
is of the form
γ ′ , T ′′ y hA1 :v1′ , . . . , An :vn′ i
γ ′ , T ′′ .Ai y vi′
The induction hypothesis applies since it is easy to show that hAi : p; ✷i ⊑ hA1 :v1 , . . . , An :vn i. Therefore
hA1 :v1′ , . . . , An :vn′ i hhAi :p;✷i hA1 :v1 , . . . , An :vn i .
From this it is obvious that vi′ hp vi .
• Record. If the last step in the slicing derivation is
p.A1 , T1 ց ρ1 , S1
···
p.An , Tn ց ρn , Sn
p, hA1 :T1 , . . . , An :Tn i ց ρ1 ⊔ · · · ⊔ ρn , hA1 :S1 , . . . , An :Sn i
then the evaluation derivation must be of the form
γ, T1 y v1
···
γ, Tn y vn
γ, hA1 :T1 , . . . , An :Tn i y hA1 :v1 , . . . , An :vn i
Let γ ′ hρ1 ⊔···⊔ρn γ and T ′ ⊒ hA1 :S1 , . . . , An :Sn i be given, where γ ′ , T ′ y v ′ . Then T ′ must have the form hA1 :T1′ , . . . , An :Tn′ i,
where Ti′ ⊒ Si for each i, so the replay derivation is of the form
γ ′ , T1′ y v1′
···
γ ′ , Tn′ y vn′
′
′
γ , hA1 :T1 , . . . , An :Tn i y hA1 :v1′ , . . . , An :vn′ i
′
16
By Lemma B.5 we know p.Ai ⊑ vi for each i, and γ ′ hρi γ for each i, so by induction vi′ hp.Ai vi for each i. Using Lemma B.6 we
can conclude that hA1 :v1′ , . . . , An :vn′ i hp hA1 :v1 , . . . , An :vn i.
• Empty set. This case is trivial, similar to the usual case for constants.
• Singleton. This case follows immediately from the relevant properties of p.ǫ, using similar reasoning to the record projection case.
• Union. If the last step in the slicing derivation is
p[1], T1 ց ρ1 , S1
p[2], T2 ց ρ2 , S2
p, T1 ∪ T2 ց ρ1 ⊔ ρ2 , S1 ∪ S2
then the evaluation derivation must be of the form
γ, T1 y v1
γ, T2 y v2
γ, T1 ∪ T2 y 1 · v1 ⊎ 2 · v2
Let γ ′ hρ1 ⊔ρ2 γ and T ′ ⊒ T1 ∪ T2 be given, where γ ′ , T ′ y v ′ . Then T ′ must have the form T1′ ∪ T2′ where Ti′ ⊒ Si so the replay
derivation is of the form
γ ′ , T1′ y v1′
γ ′ , T2′ y v2′
γ ′ , T1′ ∪ T2′ y 1 · v1′ ⊎ 2 · v2′
By Lemma B.5 we know p[1] ⊑ v1 and p[2] ⊑ v2 , and γ ′ hρi γ, so by induction we have v1′ hp[1] v1 and v2′ hp[2] v2 , and therefore by
Lemma B.6 we can conclude 1 · v1′ ⊎ 2 · v2′ hp 1 · v1 ⊎ 2 · v2 .
• Sum and emptiness. In both cases, since the slice ensures that the whole argument to the sum or emptiness test is preserved, the argument
is straightforward. For example, for emptiness suppose the derivation is of the form:
✸, T ց ρ, S
p, empty T ց ρ, empty S
Then there are two cases. If replay derivation is of the form
γ, T y ∅
γ, empty T y true
Suppose γ ′ hρ γ and T ′ ⊒ empty S with γ ′ , T ′ y v ′ . Then T ′ is of the form empty T ′′ with T ′′ ⊒ S, so the replay derivation must be
of the form:
γ ′ , T ′′ y v ′′
′
γ , empty T ′′ y v ′
By induction, v ′′ h✸ ∅, which implies v ′′ = ∅ so v ′ = true hp true (since p ⊑ true). The cases where the argument to empty T
evaluates to a nonempty set, and for sum T , are similar.
• Comprehension. If the derivation is of the form
p, x.Θ ց∗ ρ′ , Θ0 , p0
p0 , T ց ρ, S
[
[
p, {e | x ∈ T } ⊲ Θ ց ρ ⊔ ρ′ , {e | x ∈ S} ⊲ Θ0
then the replay derivation must be of the form
γ, T y v0
γ, x ∈ v0 Θ y∗ v
[
γ, {e | x ∈ T } ⊲ Θ y v
S
S
Suppose γ ′ hρ⊔ρ′ γ and T ′ ⊒ {e | x ∈ S} ⊲ Θ0 with γ ′ , T ′ y v ′ . Then T ′ must be of the form {e | x ∈ T ′′ } ⊲ Θ′ for some T ′′ ⊒ S
′
and Θ ⊒ Θ0 so the replay derivation must be of the form
γ ′ , T ′′ y v0′
γ ′ , x ∈ v0′ , Θ′ y∗ v ′
[
γ ′ , {e | x ∈ T ′′ } ⊲ Θ′ y v ′
Since p0 ⊑ v0 and γ ′ hρ γ and γ ′ hρ′ γ we have v0′ hp0 v0 by induction. Thus, by the second induction hypothesis, since p ⊑ v and
γ ′ hρ′ γ and v0′ hp0 v0 we have v ′ hp v.
For part (2), the proof is again by induction on the structure of derivations.
• If the slicing derivation is of the form
∅, x.∅ ց∗ [], ∅, ∅
then the conclusion is immediate, since rerunning an empty trace set always yields the empty set.
• If the slicing derivation is of the form
✸, x.∅ ց∗ [], ∅, ∅
then the conclusion is immediate as before, since rerunning an empty trace set always yields the empty set.
17
• If the slicing derivation is of the form
✷, x.Θ ց∗ [], ∅, ✷
then the conclusion is immediate, since any two values match according to ✷.
• If the slicing derivation is of the form
p[ℓ], T ց ρ[x 7→ p0 ], S
p, x.{ℓ.T } ց∗ ρ, {ℓ.S}, {ℓ.p0 }
then observe that Θ ⊇ {ℓ.T } by assumption, so Θ(ℓ) = T . So, the replay derivation must have the form
ℓ ∈ dom(Θ)
γ[x 7→ v0 ], T y v
γ, x ∈ {ℓ.v0 }, Θ y∗ ℓ · v
Now suppose that γ ′ hρ γ and v0′ h{ℓ.p0 } {ℓ.v0 } and Θ′ ⊒ {ℓ.S} are given where γ ′ , x ∈ v0′ , Θ′ y∗ v ′ . It follows that v0′ = {ℓ.v0′′ }
and v0′′ hp0 v0 , so γ ′ [x 7→ v0′′ ] hρ[x7→p0 ] γ[x 7→ v0 ]. Moreover, by inversion the derivation must have the form:
ℓ ∈ dom(Θ′ )
γ ′ [x 7→ v0′′ ], Θ′ (ℓ) y v ′
′
γ , x ∈ {ℓ.v0′′ }, Θ′ y∗ ℓ · v ′
Since by Lemma B.5 p[ℓ] ⊑ v and Θ′ (ℓ) ⊒ S (which holds because Θ′ ⊒ {ℓ.S}), we have by induction that v ′ hp[ℓ] v, and using
Lemma B.6 we can conclude that ℓ · v ′ hp ℓ · v, as desired.
• Suppose the slicing derivation is of the form:
p|dom(Θ1 ) , x.Θ1 ց∗ ρ1 , Θ′1 , p1
p|dom(Θ2 ) , x.Θ2 ց∗ ρ2 , Θ′2 , p2
p, x.Θ1 ⊎ Θ2 ց∗ ρ1 ⊔ ρ2 , Θ′1 ⊎ Θ′2 , p1 ⊎ p2
and suppose that γ, x ∈ v0 , Θ y∗ v where Θ ⊇ Θ1 ⊎ Θ2 . Suppose that γ ′ hρ1 ⊔ρ2 γ and v0′ hp1 ⊎p2 v0 and Θ′ ⊒ Θ′1 ⊎ Θ′2 are given,
where γ ′ , x ∈ v0′ , Θ′ y∗ v ′ . We need to show that v ′ hp v.
Since v0′ hp1 ⊎p2 v0 , it is straightforward to show that there must exist v1 , v2 , v1′ , v2′ such that v1 ⊎ v2 = v0 , v1′ ⊎ v2′ = v0′ , v1 hp1 v1
and v2′ hp2 v2 . Furthermore, by Lemma C.1 we know that γ, x ∈ vi , Θ y∗ wi and γ ′ , x ∈ vi′ , Θ′ y∗ wi′ for some w1 , w2 , w1′ , w2′ .
Therefore, we can conclude that:
γ ′ , x ∈ v1′ , Θ′ y∗ w1′
γ ′ , x ∈ v2′ , Θ′ y∗ w2′
′
′
′
′
γ , x ∈ v1 ⊎ v2 , Θ y∗ w1′ ⊎ w2′
γ, x ∈ v1 , Θ y∗ w1
γ, x ∈ v2 , Θ y∗ w2
γ, x ∈ v1 ⊎ v2 , Θ y∗ w1 ⊎ w2
Furthermore, since v1 ⊎ v2 = v0 , by determinacy we know that w1 ⊎ w2 = v and similarly w1′ ⊎ w2 = v ′ . By induction since pi ⊑ vi
and Θi ⊆ Θ, we know that wi′ hp|dom(Θ ) wi , so we know that
i
v ′ = w1′ ⊎ w2′ hp|dom(Θ
i)
⊎p|dom(Θ )
2
w 1 ⊎ w2 = v .
To conclude, since p ⊑ w1 ⊎ w2 and dom(Θ1 ) ≤ w1 and dom(Θ2 ) ≤ w2 , it follows that p = p|dom(Θ1 ) ⊎ p|dom(Θ2 ) , so we can
conclude w1 ⊎ w2 hp w1′ ⊎ w2′ as desired.
This exhausts all cases and completes the proof.
D. Proof of correctness of query slicing
Lemma D.1. If γ, x ∈ v1 , e ⇓∗ v2 and v1′ ⊆ v1 then there exists v2′ ⊆ v2 such that γ, x ∈ v1′ , e ⇓∗ v2′ .
Proof. The proof is straightforward by induction on derivations. The cases for v1 = ∅ and v1 = {ℓ.v} are immediate; if v1 = w1 ⊎ w2 then
we proceed by induction using the subsets w1′ = w1 ∩ v1′ and w2′ = w2 ∩ v1′ .
We prove Theorem 5.1 by strengthening the induction hypothesis as follows:
Theorem D.2 (Correctness of Query Slicing).
1. Suppose γ, T y v and p ⊑ v and p, T ց
ց ρ, e. Then for all γ ′ hρ γ and e′ ⊒ e such that γ ′ , e′ ⇓ v ′ we have v ′ hp v.
2. Suppose γ, x ∈ v0 , Θ y∗ v and p ⊑ v and p, Θ0 ց
ց∗ ρ, e0 , p0 , where Θ0 ⊆ Θ. Then for all γ ′ hρ γ and v0′ hp0 v0 and e′0 ⊒ e0 such
′
′
′
∗ ′
′
that γ , x ∈ v0 , e0 ⇓ v we have v hp v.
Proof. The proof is by induction on the structure of query slicing derivations. Many of the cases are essentially the same as for trace slicing.
The cases for conditionals are straightforward, since in either case the sliced trace and environment retain enough information to force the
same branch to be taken on recomputation. We show the details of the cases involving conditionals and comprehensions.
For part (1), we consider a conditional and comprehension rule:
• If the slicing derivation is of the form:
p 1 , T1 ց
ց ρ1 , e′1
true, T ց
ց ρ, e′
p1 , if(T, e1 , e2 ) ⊲true T1 ց
ց ρ1 ⊔ ρ, if(e′ , e′1 , ✷)
18
then the replay derivation must be of the form:
γ, T y true
γ, T1 y v1
γ, if(T, e1 , e2 ) ⊲true T1 y v1
Suppose γ ′ hρ1 ⊔ρ γ and e′′ ⊒ if(e′ , e′1 , ✷) are given where γ ′ , e′ ⇓ v ′ . Then e′′ = if(e′′0 , e′′1 , e′′2 ), where e′′0 ⊒ e′ and e′′1 ⊒ e′1 , so
there are two cases for the evaluation derivation. If it has the form
γ ′ , e′0 ⇓ false
γ ′ , e′2 ⇓ v2′
γ ′ , if(e′0 , e′1 , e′2 ) ⇓ v2′
then since γ ′ hρ γ and γ ′ hρ1 γ, by induction we would have that false htrue true, which is absurd. So this case cannot arise.
Otherwise, the derivation must have the form:
γ ′ , e′0 ⇓ true
γ ′ , e′1 ⇓ v1′
′
′
′
′
γ , if(e0 , e1 , e2 ) ⇓ v1′
Since γ ′ hρ γ and γ ′ hρ1 γ, by induction we have that v1′ hp1 v1 as desired.
• Comprehension. If the derivation is of the form
p0 , T ց
ց ρ, e′0
p, x.Θ ց
ց∗ ρ′ , e′1 , p0
[
[
p, {e | x ∈ T } ⊲ Θ ց
ց ρ ⊔ ρ′ , {e′1 | x ∈ e′0 }
then the replay derivation must be of the form
γ, T y v0
γ, x ∈ v0 , Θ y∗ v
[
γ, {e | x ∈ T } ⊲ Θ y v
S
S
Suppose γ ′ hρ⊔ρ′ γ and e′′ ⊒ {e′1 | x ∈ e′0 } with γ ′ , e′′ ⇓ v ′ . Then e′′ must be of the form {e′′1 | x ∈ e′′0 } for some e′′1 ⊒ e′1 and
′′
′
e0 ⊒ e0 , so the evaluation derivation must be of the form
γ ′ , e′′0 ⇓ v0′
γ ′ , x ∈ v0′ , e′′1 ⇓∗ v ′
[
γ ′ , {e′′1 | x ∈ e′′0 } ⇓ v ′
Since p0 ⊑ v0 and γ ′ hρ γ and γ ′ hρ′ γ we have v0′ hp0 v0 by induction. Thus, by the second induction hypothesis, since p ⊑ v and
γ ′ hρ′ γ and v0′ hp0 v0 we have v hp v ′ .
For part (2), we consider the singleton and union rules:
• If the slicing derivation is of the form
p[ℓ], T ց
ց ρ[x 7→ p0 ], e′
p, x.{ℓ.T } ց
ց∗ ρ, e′ , {ℓ.p0 }
then recall that by assumption, Θ(ℓ) ⊇ {ℓ.T }, so Θ(ℓ) = T , so the replay derivation must have the form
ℓ ∈ dom(Θ)
γ[x 7→ v0 ], T y v
γ, x ∈ {ℓ.v0 }, Θ y∗ ℓ · v
Now suppose that γ ′ hρ γ and v0′ h{ℓ.p0 } {ℓ.v0 } and e′′ ⊒ e′ are given where γ ′ , x ∈ v0′ , e′′ ⇓∗ v ′ . It follows that v0′ = {ℓ.v0′′ } and
v0′′ hp0 v0 , so γ ′ [x 7→ v0′′ ] hρ[x7→p0 ] γ[x 7→ v0 ]. Moreover, by inversion the derivation must have the form:
γ ′ [x 7→ v0′′ ], e′′ ⇓ v ′
γ , x ∈ {ℓ.v0′′ }, e′′ ⇓∗ ℓ · v ′
′
Since by Lemma B.5 p[ℓ] ⊑ v we have by induction that v ′ hp[ℓ] v, and using Lemma B.6 we can conclude that ℓ · v ′ hp ℓ · v, as desired.
• Suppose the slicing derivation is of the form:
p|dom(Θ1 ) , x.Θ1 ց
ց∗ ρ1 , e′1 , p1
p|dom(Θ2 ) , x.Θ2 ց
ց∗ ρ2 , e′2 , p2
∗
′
p, x.Θ1 ⊎ Θ2 ց
ց ρ 1 ⊔ ρ 2 , e0 , p 1 ⊎ p 2
and suppose that γ, x ∈ v0 , Θ y∗ v where Θ ⊇ Θ1 ⊎ Θ2 . Suppose that γ ′ hρ1 ⊔ρ2 γ and v0′ hp1 ⊎p2 v0 and e′0 ⊒ e0 are given, where
γ ′ , x ∈ v0′ , e′0 ⇓∗ v ′ . We need to show that v ′ hp v.
Since v0′ hp1 ⊎p2 v0 , it is straightforward to show that there must exist v1 , v2 , v1′ , v2′ such that v1 ⊎ v2 = v0 , v1′ ⊎ v2′ = v0′ , v1 hp1 v1 and
v2′ hp2 v2 . Furthermore, by Lemmas C.1 and D.1 we know that γ, x ∈ vi , Θ y∗ wi and γ ′ , x ∈ vi′ , e′0 ⇓∗ wi′ for some w1 , w2 , w1′ , w2′ .
Therefore, we can conclude that:
γ ′ , x ∈ v1′ , e′0 ⇓∗ w1′
γ ′ , x ∈ v2′ , e′0 ⇓∗ w2′
γ, x ∈ v1 , Θ y∗ w1
γ, x ∈ v2 , Θ y∗ w2
∗
′
′
′
′
γ, x ∈ v1 ⊎ v2 , Θ y w1 ⊎ w2
γ , x ∈ v1 ⊎ v2 , e0 ⇓∗ w1′ ⊎ w2′
Furthermore, since v1 ⊎ v2 = v0 , by determinacy we know that w1 ⊎ w2 = v and similarly w1′ ⊎ w2 = v ′ . By induction since pi ⊑ vi
and Θi ⊆ Θ, we know that wi′ hp|dom(Θ ) wi , so we know that
i
v ′ = w1′ ⊎ w2′ hp|dom(Θ
i)
19
⊎p|dom(Θ )
2
w 1 ⊎ w2 = v .
To conclude, since p ⊑ w1 ⊎ w2 and dom(Θ1 ) ≤ w1 and dom(Θ2 ) ≤ w2 , it follows that p = p|dom(Θ1 ) ⊎ p|dom(Θ2 ) , so we can
conclude w1 ⊎ w2 hp w1′ ⊎ w2′ as desired.
This exhausts all cases and completes the proof.
20
| 6cs.PL
|
Barely CAT(-1) groups are acylindrically hyperbolic
Anthony Genevois and Arnaud Stocker
December 14, 2017
arXiv:1712.04736v1 [math.GR] 13 Dec 2017
Abstract
In this paper, we show that, if a group G acts geometrically on a geodesically complete
CAT(0) space X which contains at least one point with a CAT(-1) neighborhood, then G
must be either virtually cyclic or acylindrically hyperbolic. As a consequence, the fundamental group of a compact Riemannian manifold whose sectional curvature is nonpositive
everywhere and negative in at least one point is either virtually cyclic or acylindrically hyperbolic. This statement provides a precise interpretation of an idea expressed by Gromov
in his paper Asymptotic invariants of infinite groups.
Contents
1 Introduction
1
2 Preliminaries
3
3 Barely CAT(-1) groups
4
4 Cubical case
11
5 A non relatively hyperbolic barely CAT(-1) group
12
References
13
1
Introduction
A key concept in geometric group theory is the notion of “curvature”. Usually, exhibiting
some negative curvature in the geometry of a given group provides interesting information on the algebraic properties of our group. The first instance of such a geometry
in group theory was small cancellation (see [LS77], or [MW02] for a more geometric
approach), next generalised by Gromov with the seminal concept of hyperbolic groups
[Gro87]. There, Gromov also suggests the definition of relatively hyperbolic groups, allowing some non hyperbolic subspaces but concentrating them into a controlled collection of
subgroups. We refer to the survey [Hru10] and references therein for more information
on relatively hyperbolic groups and their historical development. More recently, Osin
introduced acylindrically hyperbolic groups [Osi16] in order to unify several classes of
groups considered as “negatively-curved”.
Although acylindrically hyperbolic groups generalise relatively hyperbolic groups,
many arguments used in the context of relatively hyperbolic groups turn out to hold in
the context of acylindrically hyperbolic groups as well [DGO17]. One of the most impressive algebraic consequence is that acylindrically hyperbolic groups are SQ-universal. The
first motivating examples of such groups were mapping class groups [BF02] and outer
1
automorphism groups of free groups [BF10]. However, since then a large amount of articles have been dedicated to the recognition of acylindrically hyperbolic groups among
familiar classes of groups, including graph products [MO15], 3-manifold groups [MO15],
Cremona groups [Lon15], small cancellation groups [GS14, AH16, Gen16b], groups of
deficiency at least two [Osi15], Artin groups [CW16, CM16], diagram groups [Gen16c]
and graph braid groups [Gen17a]. So far, acylindrical hyperbolicity is the most general
convincing notion of groups admitting some “negatively-curved behaviour”.
In this paper, we are interested in some “nonpositively-curved” groups, namely
CAT(0) groups, ie., groups acting geometrically on CAT(0) spaces. These spaces generalise Riemannian manifolds whose curvature is everywhere nonpositive, also known as
Hadamard manifolds. Loosely speaking, what we show is that a CAT(0) group which is
“barely hyperbolic” turns out to be acylindrically hyperbolic. More precisely, the main
result of the article is:
Theorem 1.1. Let G be a group acting geometrically on some geodesically complete
proper CAT(0) space X. Suppose that X contains at least one point with a CAT(-1)
neighborhood. Then G must be either virtually cyclic or acylindrically hyperbolic.
As a consequence of this criterion, one immediately gets the following statement:
Corollary 1.2. The fundamental group of a compact Riemannian manifold whose sectional curvature is nonpositive everywhere and negative in at least one point is either
virtually cyclic or acylindrically hyperbolic.
In fact, this statement has motivated the present work, following a remark made by
Gromov in his article Asymptotic invariants of infinite groups [Gro93].
“In fact, the fundamental groups Γ of manifolds V with K ≤ 0, such
that K < 0 at some point v ∈ V generalize in a certain way the hyperbolic
groups”. ([Gro93], page 147.)
Our strategy to prove Theorem 1.1 is to show the existence of a contracting (or
equivalently, rank-one) geodesic ray in our CAT(0) space, which implies the existence of
a contracting (or equivalently, rank-one) isometry in our group, and which finally implies
that our group must be either virtually cyclic or acylindrically hyperbolic. Consequently,
Theorem 1.1 is related to the
Rank Rigidity Conjecture. Let X be a proper geodesically complete CAT(0) space
and G an infinite group acting geometrically on X. If X is irreducible, then X is a
higher rank symmetric space, or a Euclidean building of dimension at least two, or G
contains a rank-one isometry.
In one direction, our theorem is a consequence of the conjecture. And in the oppositive direction, our theorem may be applied to verify the conjecture in particular cases.
However, we do not know examples where our criterion applies and where the Rank
Rigidity Conjecture remains unknown.
The article is organised as follows. In Section 2, we recall briefly several known characterisations of acylindrical hyperbolicity among CAT(0) groups, including the criterion
which we will use to prove Theorem 1.1 in Section 3. In Section 4, we state and prove a
combinatorial version of Theorem 1.1 in the context of CAT(0) cube complexes, under
more general assumptions. Finally, in Section 5, we give an example of a barely CAT(-1)
group which is not relatively hyperbolic, showing that the conclusion of Theorem 1.1
cannot be strengthened to get some relative hyperbolicity.
2
2
Preliminaries
CAT(κ) spaces. In this paragraph, we briefly recall the definition of CAT(κ) spaces
for κ ≤ 0 and the notion of angle in these spaces which will be used in the paper; we refer
to [BH99] for more information and proofs of the statements of this section. For κ ≤ 0
let (Mκ2 , dκ ) be the simply connected Riemannian 2-manifold of constant curvature equal
to κ. That is
(
Mκ2
=
√1 H2
−κ
E2
if κ < 0
if κ = 0.
A triangle in a geodesic metric space X consists of three points p, q, r ∈ X (the vertices)
together with a choice of geodesics segments [p, q], [q, r] and [r, p]. Such a triangle will
be denoted ∆(p, q, r) (this notation is not accurate because the geodesic segments are, in
general, not unique). A comparison triangle in Mκ2 for ∆(p, q, r) is a triangle ∆(p̄, q̄, r̄) in
Mκ2 such that dκ (p̄, q̄) = d(p, q), dκ (q̄, r̄) = d(q, r) and dκ (r̄, p̄) = d(r, p). Such a triangle
always exists and is unique up to isometry. A point x̄ ∈ [p̄, q̄] is called a comparison
point for x ∈ [p, q] if d(p, x) = dκ (p̄, x̄). Similarly, we can define comparison points on
[q̄, r̄] and [p̄, r̄].
Definition 2.1. Let (X, d) be a geodesic metric space and κ ≤ 0.
• A triangle ∆(p, q, r) in X satisfies the CAT(κ) inequality if for all x, y ∈ ∆(p, q, r)
and all comparison points x̄, ȳ ∈ ∆(p̄, q̄, r̄),
d(x, y) ≤ dκ (x̄, ȳ).
• X is a CAT(κ) space if all triangles satisfies the CAT(κ) inequality.
Basic examples of CAT(κ) spaces, which motivated the above definition, are the
simply connected Riemannian manifolds of sectionnal curvature ≤ κ.
In CAT(κ) spaces, κ ≤ 0, one can define a notion of angle:
Definition 2.2. Let (X, d) be a CAT(κ) space, κ ≤ 0 and p, x, y three distinct points
in X. Let cx , cy be geodesic paths from p to x and y respectively. Then the limit
lim ∠(0)
p (cx (t), cy (t)),
t→0
(0)
exists, where ∠p (cx (t), cy (t)) is the angle at p̄ in a comparison triangle for ∆(p, cx (t), cy (t))
in M02 . This limit is called the Alexandrov angle ∠p (x, y) at p between x and y.
The Alexandrov angle ∠p (x, y) is always smaller than the angle ∠κp (x, y) at p̄ in a
comparison triangle ∆(p̄, x̄, ȳ) ⊂ Mκ2 and satisfies the triangular inequality.
Acylindrically hyperbolic CAT(0) groups. We do not define acylindrically hyperbolic groups here, and refer to [Osi16] and references therein for more information
on this class of groups. We only mention the following characterisation of acylindrical
hyperbolicity in the context of CAT(0) groups (see [Gen17b, Theorem 6.40] and the
references mentioned there).
Theorem 2.3. Let G be a non virtually cyclic group acting geometrically on a CAT(0)
space. Then G is acylindrically hyperbolic if and only if X contains a contracting
geodesic ray.
3
Recall that, given a metric space (S, d), a subspace Y ⊂ S is contracting if there exists
some B ≥ 0 such that the nearest-point projection onto Y of any ball which is disjoint
from Y has diameter at most B. The strategy to prove our main theorem will be to
construct a contracting geodesic line. To be precise, we will construct a slim geodesic
line, as define in [CS15].
Definition 2.4. Let X be a CAT(0) space. A geodesic line γ ⊂ X is slim if there
exists some δ ≥ 0 such that, for every x ∈ X and every y ∈ γ, the distance between the
projection of x onto γ and the geodesic [x, y] is at most δ.
According to [CS15, Theorem 2.4], being contracting and being slim for a geodesic line
in a CAT(0) space are equivalent.
3
Barely CAT(-1) groups
In this section, we prove the main result of our article. Namely:
Theorem 3.1. Let G be a group acting geometrically on some geodesically complete
proper CAT(0) space X. Suppose that X contains at least one point with a CAT(-1)
neighborhood. Then G must be either virtually cyclic or acylindrically hyperbolic.
For convenience, from now on we will refer to points admitting CAT(-1) neighborhoods
as CAT(-1) points. Our theorem will be a consequence of Propositions 3.2 and 3.6
below. The first proposition shows that X must contain some geodesic line passing
through infinitely many CAT(-1) points in such a way that the distance between any
two consecutive such points is uniformly bounded. Next, our second proposition states
that such a line must be slim, or equivalently, contracting. The conclusion finally follows
from Theorem 2.3.
Proposition 3.2. Let X be a geodesically complete, cocompact and proper CAT(0)
space which contains at least one point with a CAT(-1) neighborhood. Then there exists
some geodesic ray r : [0, +∞) → X and an increasing sequence (tn ) of nonnegative reals
tending to +∞ such that r(tn ) has a CAT(-1) neighborhood for every n ≥ 0 and such
that the auxiliary sequence (tn+1 − tn ) is bounded.
The proposition will follow from the following two lemmas:
Lemma 3.3. Let X be a CAT(0) space and R, δ, > 0 some fixed constants. Set
k = δ + 1. For every geodesic ray r, the segment [r(0), x] intersects B(r(t), ) for any
t ∈ [0, δ] and x ∈ B(r(t + kR), R).
Proof. We note o = r(0), z = r(t), y = r(t + kR). Consider x ∈ B(y, R) and a
comparison triangle ∆(ō, ȳ, x̄) in E2 for the geodesic triangle ∆(o, y, x). Let ω̄ be the
intersection between [ō, x̄] and the parallel line to (ȳ, x̄) passing through z̄ and let ω be
the corresponding point on [0, x]. Then, Thales theorem gives
d(ō, z̄)
d(ω̄, z̄)
=
,
d(ō, ȳ)
d(x̄, ȳ)
and with the CAT(0) inequality we get
d(ω, z) ≤ d(ω̄, z̄) =
δR
d(ō, z̄)
d(x̄, ȳ) ≤
< .
d(ō, ȳ)
t + kR
4
Lemma 3.4. Let X be a cocompact proper CAT(0) space which contains at least one
point with a CAT(-1) neighborhood and R, , c > 0 some fixed constants. There exists
some k = k(R, , c) such that, if o, z, y, x ∈ X are points satisfying:
1. o, z, y are aligned in this order;
2. d(x, y) ≤ R and d(z, y) ≥ k;
3. B(z, c) is a CAT(-1) neighborhood of z;
then the segment [o, x] intersects the ball B(z, ).
Proof. By contradiction, assume that, for all n ∈ N, there exist on , xn , yn , zn ∈ X such
that:
• on , zn , yn are aligned in this order;
• d(xn , yn ) ≤ R and d(zn , yn ) ≥ n;
• B(zn , c) is a CAT(-1) neighborhood of zn ;
• [on , xn ] ∩ B(zn , ) = ∅.
This last assumption, together with the previous lemma, implies that
n ≤ d(zn , yn ) ≤
d(on , zn )
+1 ·R
ε
so d(on , zn ) −−−−−→ +∞. Since X is cocompact, up to translation, we may assume
n→+∞
that the sequence (zn ) stays in a compact K ⊂ X; and since d(on , zn ) and d(zn , yn )
both tend to +∞, we deduce from Arzelà-Ascoli theorem that, up to subsequence, the
segments [on , yn ] tend to a geodesic line l. Similarly, because [on , xn ] is included into
the R-neighborhood of [on , yn ] as a consequence of the convexity of the distance, up to
a subsequence the segments [on , xn ] converge to a geodesic line l0 parallel to l. These
lines are distinct since d(zn , [on , xn ]) ≥ for all n. The contradiction comes from the
Flat Strip Theorem [BH99, Theorem II.2.13] and the following fact, stating that a limit
of CAT(-1) points must be CAT(-1) as well:
Fact 3.5. Let (zn ) be a sequence of points converging to some z ∈ X such that B(zn , c)
is CAT(-1) for all n. Then B(z, 2c ) is a CAT(-1) neighborhood of z.
Indeed, for n large enough, B(z, 2c ) ⊂ B(zn , c). The conclusion follows from the convexity of balls.
Now we are ready to prove Proposition 3.2. For o, z ∈ X and R > 0 we define the
shadow Oo (z, R) to be the set of y ∈ X such that the segment [o, y] meets the ball
centered at z of radius R.
Proof of Proposition 3.2. Let Y = X/G be a compact quotient of X where G < Isom(X)
and z ∈ X a point such that B(z, 2) is a CAT(-1) neighborhood for some > 0. Choose
R ≥ 2 + diam(Y ) and K ≥ max(R + 2, k(R, , 2)) where k(R, , 2) is the constant
from Lemma 3.4. Finally, we fix a base point o ∈ X.
We now construct by induction a sequence of points (zn ) in the G-orbit of z such that
for all n ≥ 1:
1. Oo (zn , ) ⊂ · · · ⊂ Oo (z1 , );
2. there exist zn1 , . . . , znn ∈ [o, zn ] such that znk ∈ B(zk , ), ≤ d(znk , znk+1 ) ≤ K + R +
and znn = zn .
5
Figure 1
Step n = 1. Simply take z = z1 .
From step n to step n + 1. Assume that z1 , . . . , zn are constructed. Since X is
geodesically complete, we can extend the segment [o, zn ] to a geodesic ray rn and consider
the point yn on rn such that d(yn , zn ) = K. By the choice of K and Lemma 3.4, we
have
Oo (yn , R) ⊂ Oo (zn , ).
Moreover, since the orbit of z is diam(Y )-dense, by choice of R, there is some zn+1 ∈ G·z
such that B(zn+1 , ) ⊂ B(yn , R). It follows that
Oo (zn+1 , ) ⊂ Oo (yn , R) ⊂ Oo (zn , ),
and so, [o, zn+1 ] meets every ball B(zk , ), k = 1, . . . , n. Finally, if one fixes some
k
zn+1
∈ B(zk , ) ∩ [o, zn+1 ], then for k ≤ n − 1 we have
k+1
k+1
k
k
d(zn+1
, zn+1
) ≤ d(zn+1
, zk ) + d(zk , yk+1 ) + d(yk+1 , zn+1
) ≤ + K + R,
and
k+1
k+1
k
k
d(zn+1
, zn+1
) ≥ d(zk , yk+1 ) − d(zn+1
, zk ) − d(yk+1 , zn+1
) ≥ K − R − ≥ .
By Arzelà-Ascoli theorem, up to subsequence, the sequence of segments [z1 , zn ] converges
to some geodesic ray r uniformly on compact sets. By construction, r meets each
closed ball B̄(zn , ) at some point r(tn ) such that ≤ tn+1 − tn ≤ R + K + and
B(r(tn ), ) ⊂ B(zn , 2) is a CAT(-1) neighborhood.
Now, we focus on the second step of the proof of Theorem 3.1. Namely:
Proposition 3.6. Let X be a CAT(0) space and γ : R → X a geodesic line passing
through infinitely many CAT(-1) points in such a way that the distance between any two
consecutive such points is uniformly bounded from above and from zero. Then γ is a
slim geodesic.
Inspired from [KL95], our proof is based on the Gauss-Bonnet formula. We begin by
recalling a few definitions.
Definition 3.7. Let X be a polygonal complex. A corner (v, C) is the data of a vertex
v ∈ X and a polygon C ⊂ X containing v. Given a vertex v ∈ X (resp. a polygon
R ⊂ X), we denote by corner(v) (resp. corner(R)) the set of corners based at v (resp.
the set of corners supported by R).
6
Definition 3.8. An angled polygonal complex (X, ∠) is the data of a polygonal complex
X and a map
∠ : {corners of X} → R.
The curvature of a vertex v ∈ X is defined as
κ(v) = 2π − π · χ (link(v)) −
X
∠(v),
c∈corner(v)
and the curvature of a polygon R ⊂ X as
X
κ(R) =
∠(c) − π · |∂R| + 2π.
c∈corner(R)
It is worth noticing that, if R is a triangle, then its curvature coincides with minus its
deficiency, denoted by def(R), ie., the difference between π and the sum of its angles.
As proved in [MW02, Theorem 4.6], this formalism allows us to recover a combinatorial
version of the well-known Gauss-Bonnet formula.
Combinatorial Gauss-Bonnet formula. Let (X, ∠) be an angled polygonal complex.
Then
X
X
κ(R) = 2π · χ(X).
κ(v) +
v vertex
R polygon
Now we are ready to prove Proposition 3.6.
Proof of Proposition 3.6. Let x ∈
/ γ and y ∈ γ be two points, and let z ∈ γ denote
the projection of x onto γ. Fix some constants , L, R > 0 such that a ball of radius
centered at some CAT(-1) point is CAT(-1) and such that the distance between any
two consecutive CAT(-1) points along γ is at most L and at least R. Without loss
of generality, we may suppose that R > 2. Suppose that there exist N consecutive
CAT(-1) points x1 , . . . , xN ∈ γ between z and y such that B(xi , ) ∩ [x, y] = ∅ for every
1 ≤ i ≤ N . For every 1 ≤ i ≤ N , fix a point yi ∈ [z, x] ∪ [x, y] whose projection onto
γ is xi ; notice that, because the projection of [x, z] is reduced to the singleton {z},
necessarily yi ∈ [x, y]. Finally, for every 1 ≤ i ≤ N , let ai ∈ [xi−1 , xi ], bi ∈ [xi , yi ] and
ci ∈ [xi , xi+1 ] be the unique points of the corresponding segments at distance from xi
(for convenience, we set x0 = z and xN +1 = y). The configuration is summarised by
Figure 2.
Denote by ∆ the union of the geodesics
• [x, y], [y, z] and [x, z];
• [yi , bi ] for every 1 ≤ i ≤ N ;
• [bi , ai ] and [bi , ci ] for every 1 ≤ i ≤ N ;
• [yi , ci ], [yi , ai+1 ] and [yi , bi+1 ] for every 0 ≤ i ≤ N − 1 (setting y0 = x and x0 = z).
Roughly speaking, ∆ is a triangulation of the geodesic triangle T (x, y, z). Now, consider
a comparison triangle T (x̄, ȳ, z̄) of T (x, y, z). For every 1 ≤ i ≤ N , let xi , yi , ai , ci denote
the preimages of xi , yi , ai , ci respectively under the map T (x̄, ȳ, z̄) → T (x, y, z). This
map has a natural extension
T (x̄, ȳ, z̄) ∪
N
[
[y i , xi ] → T (x, y, z) ∪
i=1
N
[
[yi , xi ],
i=1
7
Figure 2
sending each segment [y i , xi ] to the geodesic [yi , xi ] by an affine map. We denote by bi
the preimage of bi under this map, for every 1 ≤ i ≤ N . By triangulating T (x̄, ȳ, z̄) as
T (x, y, z), one gets a planar triangle complex ∆, and a map f : ∆ → ∆ extending the
comparison map T (x̄, ȳ, z̄) → T (x, y, z).
From now on, the triangles (ci , ai , bi ) for 1 ≤ i ≤ N , and their images under f , will be
referred to as CAT(-1) triangles. Notice that a CAT(-1) triangle in ∆ is contained into
a ball of radius centered at a CAT(-1) point, so it lies in a CAT(-1) subspace. For
every triangle δ of ∆, we assign angles to its corners by the following rules:
• for non CAT(-1) triangles, we assign the angles of a comparison triangle in E2 ;
• for the CAT(-1) triangle (āi , b̄i , c̄i ) we assign to the vertex āi (respectively c̄i ) the
corresponding angle in a comparison triangle in H2 for (ai , bi , xi ) (respectively
(ci , bi , xi )) and to the vertex b̄i the corresponding angle in a comparison triangle
in H2 for (ai , bi , ci ).
We emphasize that the angle ∠c̄i āi , b̄i , for instance, denotes the angle as defined
above, and not the corresponding angle in the Euclidean triangulation ∆.
The plan is to apply the Gauss-Bonnet formula in order to bound the number N . So
we need to investigate the curvatures of the vertices and triangles of ∆.
Claim 3.9. The curvature of any vertex of ∆, different from x̄, ȳ, z̄ or the b̄i for 1 ≤
i ≤ N , is nonpositive.
Fix some 1 ≤ i ≤ N . We want to compute the curvature of c̄i . Notice that
∠ci (ai , bi ) + ∠ci (bi , y i ) + ∠ci (y i , ai+1 )
is at least
∠ci (ai , bi ) + ∠ci (bi , yi ) + ∠ci (yi , ai+1 ) ≥ ∠ci (ai , ai+1 ) = π.
Consequently, κ(ci ) ≤ 0. The same argument implies that κ(ȳi ) and κ(āi ) are nonpositive. This concludes the proof of our claim.
Let (a0i , b0i , x0i ) and (c00i , b00i , x00i ) be comparison triangles in H2 of (ai , bi , xi ) and (ci , bi , xi )
respectively. These are isosceles triangles with angles at least π2 at x0i and x00i respectively.
¯
In particular, by definition of the angles in ∆,
∠āi (b̄i , c̄i ) = ∠a0i (b0i , x0i ) = ∠b0i (a0i , x0i ),
8
∠c̄i (b̄i , āi ) = ∠c00i (b00i , x00i ) = ∠b00i (c00i , x00i ),
where ∠a0i (b0i , x0i ), ∠b0i (a0i , x0i ), ∠c00i (b00i , x00i ), ∠b00i (c00i , x00i ) are the angles measured in H2 .
Claim 3.10. For 1 ≤ i ≤ N , we have κ(b̄i ) ≤ ∠b0i (a0i , x0i ) + ∠b00i (x00i , c00i ) − ∠b̄i (āi , c̄i ).
Fix some 1 ≤ i ≤ N . The same argument as before shows that
u := ∠bi (y i , y i−1 ) + ∠bi (y i−1 , ai ) + ∠b0i (a0i , x0i ) + ∠bi (y i , ci ) + ∠b00i (c00i , x00i )
is at least 2π. Since
κ(b̄i ) = 2π − (u − ∠b0i (a0i , x0i ) − ∠b00i (x00i , c00i ) + ∠b̄i (āi , c̄i )),
this proves the claim.
Next, notice that the curvature of a triangle of ∆ which is not CAT(-1) is zero, since its
angles come from a Euclidean triangle. Therefore,
X
κ(δ) =
δ triangle
X
κ(δ).
δ CAT(-1)
¯ Recall that the deficiency def(δi ) of δi is the
Let δi be the triangle (āi , b̄i , c̄i ) in ∆.
difference between π and the sum of its angles, that is
def(δi ) = π − (∠āi (b̄i , c̄i ) + ∠c̄i (āi , b̄i ) + ∠b̄i (āi , c̄i ))
= π − (∠a0i (b0i , x0i ) + ∠c00i (b00i , x00i ) + ∠b̄i (āi , c̄i ))
= π − (∠b0i (a0i , x0i ) + ∠b00i (c00i , x00i ) + ∠b̄i (āi , c̄i )).
Claim 3.11.
s
N
X
(κ(b̄i ) − def(δi )) ≤ −N π − 4 arccos
i=1
cosh()
cosh() + 1
!!
.
We will use the following hyperbolic trigonometry formula:
Lemma 3.12. [Bus10, Theorem 2.2.1(ii)] Let ∆ be a geodesic triangle in H2 with sides
of length a, b, c and respective opposite angles α, β, γ. Then
cos(γ) = sin(α) sin(β) cosh(c) − cos(α) cos(β).
As a consequence of Claim 3.10,
κ(b̄i ) − def(δi ) ≤ ∠b0i (a0i , x0i ) + ∠b00i (x00i , c00i ) − ∠b̄i (āi , c̄i ) + ∠b0i (a0i , x0i ) + ∠b00i (c00i , x00i )
+ ∠b̄i (āi , c̄i ) − π
≤ 2(∠b0i (a0i , x0i ) + ∠b00i (x00i , c00i )) − π.
By applying Lemma 3.12 to the triangle (a0i , b0i , x0i ), we deduce that
0 ≥ cos ∠x0i (a0i , b0i )
≥ sin ∠a0i (b0i , x0i ) sin ∠b0i (a0i , x0i ) cosh(d(a0i , b0i )) − cos ∠a0i (b0i , x0i ) cos ∠b0i (a0i , x0i )
≥
1 − cos2 ∠b0i (a0i , x0i ) cosh(d(ai , bi )) − cos2 ∠b0i (a0i , x0i )
So we get, since ∠b0i (a0i , x0i ) ≤ π2 , that
s
cos ∠b0i (a0i , x0i )
≥
cosh(d(ai , bi ))
.
1 + cosh(d(ai , bi ))
9
Notice that d(ai , bi ) is greater than since the triangle (a0i , b0i , x0i ) is isoscele with angle at
cosh(x)
is increasing. Therefore,
least π2 at x0i and d(x0i , a0i ) = . Also notice that x 7→ cosh(x)+1
since cosinus is a decreasing function on [0, π], we obtain that
s
∠b0i (a0i , x0i ) ≤ arccos
!
cosh()
.
1 + cosh()
Similarly, one has
s
∠b00i (c00i , x00i )
≤ arccos
!
cosh()
.
1 + cosh()
Thus,
s
κ(b̄i ) − def(δi ) ≤ 4 arccos
cosh()
1 + cosh()
!
− π.
This concludes the proof of the claim.
Finally, by applying the Gauss-Bonnet formula to ∆, one deduces that
s
2π =
X
κ(v) +
v vertex
X
κ(δ) ≤ 3π − N π − 4 arccos
δ triangle
hence
s
N π − 4 arccos
r
Notice that π − 4 arccos
strictly greater than
Hence,
1
2)
cosh()
cosh()+1
since x 7→
cosh()
cosh() + 1
cosh()
cosh() + 1
≤ π.
is strictly positive (or equivalently,
is increasing and takes value
π
N ≤ η() :=
r
π − 4 arccos
,
!!
cosh(x)
cosh(x)+1
!!
cosh()
cosh()+1
cosh()
cosh()+1
1
2
is
at zero.
.
So far, we have proved that, given our points x ∈
/ γ and y ∈ γ, there exist at most η()
CAT(-1) points along γ separating y and the projection z of x onto γ such that the balls
of radii centered at these points are all disjoint from the geodesic [x, y]. Therefore,
either [z, y] contains at most η() consecutive CAT(-1) points, so that
d(z, [x, y]) ≤ d(z, y) ≤ (η() + 1) · L,
or there exist more than η() consecutive CAT(-1) points in [z, y], so that, if c ∈ [z, y]
denotes the (η() + 1)-th CAT(-1) point (starting from z to y), then
d(z, [x, y]) ≤ d(z, c) + ≤ η() · L +
since [x, y] must intersect the ball B(c, ). Consequently, the geodesic γ is K-slim where
K = (η() + 1) · L + .
Proof of Theorem 3.1. According to Proposition 3.2, there exists a geodesic ray r and
an increasing sequence (tn ) of nonnegative reals tending to +∞ such that the point r(tn )
has a CAT(-1) neighborhood for every n ≥ 0 and such that the sequence (tn+1 − tn )
is bounded. For every n ≥ 0, let gn ∈ G be an isometry translating r(tn ) into some
fixed compact fundamental domain. Because X is proper, we deduce from Arzelà-Ascoli
theorem that the sequence of rays (gn · rn ) subconverges to a geodesic line γ. Moreover,
since the limit of a sequence of CAT(-1) points must be a CAT(-1) point according to
10
Fact 3.5, we know that γ passes through infinitely many CAT(-1) points in such a way
that the distance between any two consecutive such points is uniformly bounded from
above and from zero. According to Proposition 3.6, this geodesic must be slim, and
finally contracting according to [CS15, Theorem 2.4]. The desired conclusion follows
from Theorem 2.3.
Let us conclude this section with an open question. Define barely CAT(-1) groups as
groups acting geometrically on geodesically complete proper CAT(0) spaces containing
points with CAT(-1) neighborhoods. It would be interesting to determine if barely
CAT(-1) groups satisfy stronger hyperbolic properties than just being acylindrically
hyperbolic. Notice that, in Section 5, an example of a barely CAT(-1) group which is
not relatively hyperbolic is given. A naive question is:
Question 3.13. Must an acylindrically hyperbolic CAT(0) group be barely CAT(-1)?
For instance, when is a right-angled Artin group barely CAT(-1)?
4
Cubical case
In this section, one restricts our attention to CAT(0) cube complexes. It is worth
noticing that, endowed with its usual CAT(0) metric, a CAT(0) cube complex cannot
contain a point admitting a CAT(-1) neighborhood, as each cube is isometric to a (flat)
Euclidean cube. A fortiori, Theorem 3.1 does not apply. A naive attempt to get more
hyperbolicity would be to identify each cube with a fixed hyperbolic cube, but the cube
complex one obtains in that way may be no longer CAT(0). Nevertheless, in [Gro87,
Section 4.2.C], Gromov notices that, by endowing each cube of a given CAT(0) cube
complex with the metric of a hyperbolic cube, the geodesic metric space thus obtained
turns out to be CAT(-1) provided the vertices of our cube complex have no cycles of
length four in their links. This observation motivates our next definition.
Definition 4.1. In a CAT(0) cube complex, a CAT(-1) vertex is a vertex without cycles
of length four in its link.
Now, thanks to Caprace and Sageev’s work on the Rank Rigidity Conjecture [CS11],
we are able to find a cubical analogue of Theorem 3.1. Before stating our result, let us
recall a few definitions.
• If a group G acts on some CAT(0) cube complex X, the action is essential if, for
every halfspace D ⊂ X and every vertex x ∈ X, the orbit G · x does not lie in any
neighborhood of D.
• If a group G acts on some metric space X, the action is non-uniformly weakly
acylindrical if there exists some constant L ≥ 0 such that, for any pair of points
x, y ∈ X at distance at least L apart, the intersection stab(x) ∩ stab(y) is finite.
Notice that, for instance, any proper action is non-uniformly weakly acylindrical. Also,
most of the time, assuming that an action on a CAT(0) cube complex is essential is not
really restrictive; see [CS11, Proposition 3.5].
Proposition 4.2. Let G be a group acting essentially and non-uniformly weakly acylindrically on some finite-dimensional CAT(0) cube complex X. Suppose that one the
following two conditions holds:
• G does not fix a point in X ∪ ∂∞ X;
• or X is locally finite and G acts cocompactly on X.
11
If X contains a CAT(-1) vertex, then G must be either virtually cyclic or acylindrically
hyperbolic.
Proof. If X contains a CAT(-1) vertex, then it cannot split as a Cartesian product of two
cube complexes. Therefore, [CS11, Theorem 6.3] implies that G contains a contracting
isometry, say g ∈ G. As the action G y X is non-uniformly weakly acylindrical, it
follows from [Gen16c, Theorem 3.13] and [Gen16a, Theorem 17] that such an isometry
is necessarily WPD, ie., for every d ≥ 0 and every x ∈ X, there exists some constant
N ≥ 0 such that the set
n
o
h ∈ G | d(x, hx), d g N x, hg N x ≤ d
is finite. It follows from [BBF15, Theorems H and I] that G must be either virtually
cyclic or acylindrically hyperbolic.
As a particular case of the previous proposition, one gets the following statement:
Corollary 4.3. A group acting geometrically and essentially on a CAT(0) cube complex which contains a CAT(-1) vertex must be either virtually cyclic or acylindrically
hyperbolic.
Example 4.4. Let Σg be a compact orientable surface of genus g ≥ 2. We think of Σg
as obtained from a hyperbolic regular right-angled 4g-gon by identifying parallel sides
in the usual way. Each side of this polygon defines a loop in Σg , which we refer to as a
canonical loop. Similarly, we think of the torus Σ1 as obtained from a Euclidean square
by identifying parallel sides in the usual way; and we refer to the image in Σ1 of any side
of our square as a canonical loop. Up to rescaling our metrics, we may suppose without
loss of generality that any canonical loop in any of our surfaces has a fixed length. Now,
let S be a space obtained by gluing compact orientable surfaces along canonical loops
by isometries; let Σ denote the underlying collection of surfaces. The universal cover Se
of S is naturally a polygonal complex. Moreover, if one adds a central vertex to each
polygon which is not a square and if one links this new vertex to half of the vertices of
the corresponding polygon, one obtain a square complex, which turns out to be CAT(0)
provided that the graph underlying our graph of spaces is triangle-free. By noticing
that each of our central vertices are CAT(-1), it follows from Proposition 4.2 that the
fundamental group π1 (S) must be acylindrically hyperbolic, if the collection Σ contains
at least one surface of genus at least two.
5
A non relatively hyperbolic barely CAT(-1) group
Let Σ denote the graph of spaces given by Figure 3. More explicitely, let S be a compact
orientable surface of genus two and T1 , T2 , T3 , T4 , T12 , T23 , T34 seven tori. We denote by
a1 , a2 , a3 , a4 the canonical loops of S (ordered by following a fixed cyclic order on the
boundary of the polygon corresponding to S); by aii , bii the canonical loops of the torus
Ti ; and by bi,i+1
, bi,i+1
i
i+1 the canonical loops of the torus Ti,i+1 . The space Σ is obtained
from these eight surfaces by gluing each Ti to S by identifying ai and aii , and by gluing
i
i
Ti,i+1 to Ti and Ti+1 by identifying bii,i+1 and bi,i+1
i+1 respectively to bi and bi+1 .
It follows from [BH99, Proposition II.11.6] that Σ is locally CAT(0). Moreover, each
subsurface is locally isometrically embedded, so that any point on the surface of genus
two which does not belong to any torus admits a CAT(-1) neighborhood. Next, notice
e of Σ is geodesically complete, as a union of Euclidean and
that the universal cover Σ
e Consequently, the fundamental group G of
hyperbolic planes (which are convex in Σ).
Σ is barely CAT(-1).
12
Figure 3: A non relatively hyperbolic barely CAT(-1) group.
Fact 5.1. The group G is not relatively hyperbolic.
First of all, notice that G admits the following presentation:
*
a1 , a2 , a3 , a4
b1 , b2 , b3 , b4
[a1 , a2 ][a3 , a4 ] = [b1 , b2 ] = [b2 , b3 ] = [b3 , b4 ] = 1
[a1 , b1 ] = [a2 , b2 ] = [a3 , b3 ] = [a4 , b4 ] = 1
+
Suppose that our group G is hyperbolic relatively to some finite collection of subgroups.
As a consequence of [Osi06, Theorems 4.16 and 4.19], every non cyclic free abelian
subgroup of G must be contained into some peripheral subgroup, so, for every 1 ≤ i ≤ 4
(resp. 1 ≤ j ≤ 3), there exists some peripheral subgroup Hi (resp. Kj ) containing both
ai and bi (resp. bj and bj+1 ). Notice that
bi ∈ Hi ∩ Ki for every 1 ≤ i ≤ 4, and bi ∈ Ki ∩ Ki+1 for every 1 ≤ i ≤ 3.
Since the collection of peripheral subgroups must be malnormal according to [Osi06,
Theorems 1.4 and 1.5], it follows that H1 = H2 = H3 = H4 = K1 = K2 = K3 .
Let H denote this common peripheral subgroup. Since H contains all the generators,
necessarily G = H. This proves our fact.
References
[AH16]
G. Arzhantseva and M. Hagen. Acylindrical hyperbolicity of cubical smallcancellation groups. arXiv:1603.05725, 2016.
[BBF15] Mladen Bestvina, Ken Bromberg, and Koji Fujiwara. Constructing group
actions on quasi-trees and applications to mapping class groups. Publications
mathématiques de l’IHÉS, 122(1):1–64, 2015.
[BF02]
M. Bestvina and K. Fujiwara. Bounded cohomology of subgroups of mapping
class groups. Geometry and Topology, 6:69–89, 2002.
13
[BF10]
Mladen Bestvina and Mark Feighn. A hyperbolic Out(Fn )-complex. Groups,
Geometry, and Dynamics, 4(1):31–58, 2010.
[BH99]
Martin R. Bridson and André Haefliger. Metric spaces of non-positive curvature, volume 319 of Grundlehren der Mathematischen Wissenschaften [Fundamental Principles of Mathematical Sciences]. Springer-Verlag, Berlin, 1999.
[Bus10]
Peter Buser. Geometry and spectra of compact Riemann surfaces. Springer
Science & Business Media, 2010.
[CM16]
I. Chatterji and A. Martin. A note on the acylindrical hyperbolicity of groups
acting on CAT(0) cube complexes. arXiv:1610.06864, 2016.
[CS11]
Pierre-Emmanuel Caprace and Michah Sageev. Rank rigidity for CAT(0) cube
complexes. Geom. Funct. Anal., 21(4):851–891, 2011.
[CS15]
Ruth Charney and Harold Sultan. Contracting boundaries of CAT(0) spaces.
J. Topol., 8(1):93–117, 2015.
[CW16]
M. Calvez and B. Wiest. Acylindrical hyperbolicity and Artin-Tits groups of
spherical type. arXiv:1606.07778, 2016.
[DGO17] François Dahmani, Vincent Guirardel, and Denis Osin. Hyperbolically embedded subgroups and rotating families in groups acting on hyperbolic spaces,
volume 245. American Mathematical Society, 2017.
[Gen16a] A. Genevois. Acylindrical action on the hyperplanes of a CAT(0) cube complex. arXiv:1610.08759, 2016.
[Gen16b] A. Genevois. Coning-off CAT(0) cube complexes. arXiv:1603.06513, 2016.
[Gen16c] A. Genevois. Contracting isometries of CAT(0) cube complexes and acylindricaly hyperbolicity of diagram groups. arXiv:1610.07791, 2016.
[Gen17a] A. Genevois. Algebraic characterisations of negatively-curved special groups
and applications to graph braid groups. arXiv:1709.01258, 2017.
[Gen17b] A. Genevois. Hyperbolicities in cat(0) cube complexes. arXiv:1709.08843,
2017.
[Gro87]
M. Gromov. Hyperbolic groups. Essays in group theory, 8(75-263):2, 1987.
[Gro93]
M. Gromov. Asymptotic invariants of infinite groups. In Geometric group
theory, Vol. 2 (Sussex, 1991), volume 182 of London Math. Soc. Lecture Note
Ser., pages 1–295. Cambridge Univ. Press, Cambridge, 1993.
[GS14]
D. Gruber and A. Sisto. Infinitely presented graphical small cancellation
groups are acylindrically hyperbolic. arXiv:1408.4488, 2014.
[Hru10]
G Christopher Hruska. Relative hyperbolicity and relative quasiconvexity for
countable groups. Algebraic & Geometric Topology, 10(3):1807–1856, 2010.
[KL95]
M. Kapovich and B. Leeb. On asymptotic cones and quasi-isometry classes
of fundamental groups of 3-manifolds. Geometric and Functional Analysis,
5(3):582–603, 1995.
[Lon15]
A. Lonjou.
Non simplicité du groupe de cremona sur tout corps.
arXiv:1503.03731, 2015.
14
[LS77]
C. Lyndon and P. E. Schupp. Combinatorial group theory. Ergebnisse der
Mathematik und ihrer Grenzgebiete 89. Springer, Berlin, 1977.
[MO15]
Ashot Minasyan and Denis Osin. Acylindrical hyperbolicity of groups acting
on trees. Mathematische Annalen, 362(3):1055–1105, 2015.
[MW02] J. McCammond and D. Wise. Fans and ladders in small cancellation theory.
Proc. London Math. Soc., 84(3):599–644, 2002.
[Osi06]
D. Osin. Relatively hyperbolic groups: intrinsic geometry, algebraic properties, and algorithmic problems. Mem. Amer. Math. Soc., 179(843):vi–100,
2006.
[Osi15]
D. Osin. On acylindrical hyperbolicity of groups with positive first `2 -Betti
number. Bulletin of the London Mathematical Society, 47(5):725, 2015.
[Osi16]
D. Osin. Acylindrically hyperbolic groups. Trans. Amer. Math. Soc., 368:851–
888, 2016.
15
| 4math.GR
|
arXiv:1702.03292v4 [math.AC] 19 Oct 2017
EXTREMAL BEHAVIOUR IN SECTIONAL MATRICES
ANNA BIGATTI, ELISA PALEZZATO, AND MICHELE TORIELLI
Abstract. In this paper we recall the object sectional matrix
which encodes the Hilbert functions of successive hyperplane sections of a homogeneous ideal. We translate and/or reprove recent
results in this language. Moreover, some new results are shown
about their maximal growth, in particular a new generalization
of Gotzmann’s Persistence Theorem, the presence of a GCD for a
truncation of the ideal, and applications to saturated ideals.
1. Introduction
Let K be a field of characteristic 0 and let P be the polynomial
ring K[x1 , . . . , xn ] with n indeterminates and the standard grading.
Given a finitely generated Z-graded P -module M = ⊕d∈N Md , the Md ’s
are finite-dimensional K-vector spaces. The Hilbert function of M,
HM : Z → N with HM (d) := dimK (Md ), is a very frequent and
powerful tool of investigation in Commutative Algebra.
From Macaulay [12], it is well known that the computation of the
Hilbert function of M may be reduced to the computation of the Hilbert
function of some K-algebras of type P/J, where J is a monomial ideal.
In particular, if I is a homogeneous ideal in P , then HP/I = HP/LT(I) .
Another very common practice consists of studying generic hyperplane sections which, in algebraic terms, means reducing modulo by a
generic linear form. The combination of Hilbert functions and hyperplane sections lead to the result by Green [10] (1988).
The sectional matrix of a homogenous ideal I was introduced by Bigatti and Robbiano in [6] (1997) unifying the concepts of the Hilbert
function of a homogeneous ideal I (along the rows) and of its hyperplane sections (along the columns). Sectional matrices did not receive
much attention, and in this paper we want to revive them. We extend
some results in this language, confirming the merit of this tool and
Date: October 20, 2017.
2010 Mathematics Subject Classification. Primary 13D40, 05E40, Secondary
13P99 .
Key words and phrases. Sectional Matrix, Hilbert Function, Hyperplane Section,
Generic Initial Ideal, Reduction Number, Extremal Behaviour.
1
2
ANNA BIGATTI, ELISA PALEZZATO, AND MICHELE TORIELLI
suggesting that further investigation might cast a new light on many
aspects of Commutative Algebra.
In Section 2 we set our notation and recall the definition of sectional
matrix. In Sections 3 we recall its main properties converting the results
from [6] into terms of the quotient P/I (instead of the ideal I). In
particular, Theorem 3.11 shows Macaulay’s and Green’s inequalities. In
Section 4, we recall Gotzmann’s Persistence Theorem and the sectional
matrix analogue from [6]. Moreover, we generalize it into a sectional
version (Theorem 4.6).
In Section 5, we describe how to deduce information on the dimension and the degree of a homogeneous ideal in terms of the entries of its
sectional matrix. In Section 6, we show how the extremal behaviour implies the presence of a GCD for the truncation of homogeneous ideals.
In Section 7, we apply these results to the class of saturated ideals.
Finally, in Section 8, we present several examples comparing the information given by the sectional matrix, the generic initial ideal, and the
resolution of a homogeneous ideals.
The examples in this paper have been computed with CoCoA ([1],
[2], SectionalMatrix, PrintSectionalMatrix).
2. Definitions and notation
Let K be a field of characteristic 0 and P = K[x1 , . . . , xn ] be the
polynomial ring with n indeterminates with the standard grading. Let
I ⊆ P be a homogeneous ideal in P and A = P/I. Then A is a graded
P -module ⊕d∈N Ad , where Ad = Pd /Id .
The definition of the Hilbert function was extended in [6] to the
bivariate function encoding the Hilbert functions of successive generic
hyperplane sections: the sectional matrix of a homogeneous ideal
I in P . In this paper, we define, in the obvious way, the sectional
matrix for the quotient algebra P/I, and then we show how to adapt
the results given in [6] to the use of P/I.
Definition 2.1. Given a homogeneous ideal I in P = K[x1 , . . . , xn ],
we define the sectional matrix of I and of P/I to be the functions
{1, . . . , n} × N −→ N
MI (i, d) = dimK ((I + (L1 , . . . , Ln−i ))/(L1 , . . . , Ln−i ))d ,
MP/I (i, d) = dimK (Pd /(I + (L1 , . . . , Ln−i ))d ),
where L1 , . . . , Ln−i are generic linear forms. Notice that MP/I (n, d) =
HP/I (d) and MP/I (i, d) = d+i−1
− MI (i, d).
i−1
EXTREMAL BEHAVIOUR IN SECTIONAL MATRICES
3
Remark 2.2. A generic linear form is a polynomial L = a1 x1 + · · · +
an xn in K(a1 , . . . , an )[x1 , ..., xn ]. In this paper we restrict our attention
to a field K of characteristic 0, so the equalities of the Definition 2.1
hold for any L′ = α1 x1 + · · · + αn xn with (α1 , . . . , αn ) in a non-empty
Zariski-open set in PnK . Therefore in this case it is common practice
to talk about “generic linear forms in K[x1 , . . . , xn ]” instead of dealing
with the explicit extension of K.
This small example will be used as a running example throughout
the paper.
Example 2.3. Let P = Q[x, y, z] and I = (x4 − y 2 z 2 , xy 2 − yz 2 − z 3 )
an ideal of P . Then the sectional matrix of P/I is
...
HP/(I+hL1 ,L2 i) (d) = MP/I (1, d) : 1 1 1 0 0 0 0 0 . . .
HP/(I+hL1 i) (d) = MP/I (2, d) : 1 2 3 3 2 1 0 0 . . .
HP/I (d) = MP/I (3, d) : 1 3 6 9 11 12 12 12 . . .
0
1
2
3
4
5
6
7
where the continuations of the lines are obvious in this example. The
general theory about truncation and continuation of the lines will be
described in Theorem 4.1 and Remark 4.3.
3. Background results on sectional matrices
In this section we recall the main properties of sectional matrices
from [6] translating them in terms of the quotient P/I. In particular,
we describe the persistence theorem and the connection with rgin.
Let σ be a term-ordering on P = K[x1 , . . . , xn ]. The leading term
ideal or initial ideal of an ideal I ⊆ P is the ideal, denoted LTσ (I),
generated by {LTσ (f ) | f ∈ I\{0} }. For any homogenous ideal I it is
well known that HP/I = HP/LTσ (I) . This nice property does not extend
to MP/I , but only one inequality holds, as Conca proved in [7]: we
write his result in sectional matrix notation.
Theorem 3.1 (Conca, 2003). Let I be a homogeneous ideal in P =
K[x1 , . . . , xn ] and σ a term-ordering. Then, for all i = 1, . . . , n and
d ∈ N, MP/I (i, d) ≤ MP/LTσ (I) (i, d)
Example 3.2. Recall I from Example 2.3. For σ =DegRevLex compare MP/I with MP/LTσ (I) : the σ-Gröbner basis of I is {xy 2 −yz 2 −z 3 ,
x4 −y 2 z 2 , x3 yz 2 −y 4 z 2 +x3 z 3 , y 5 z 2 −y 4 z 3 +x3 z 4 −x2 yz 4 −x2 z 5 }, thus we
4
ANNA BIGATTI, ELISA PALEZZATO, AND MICHELE TORIELLI
have LTσ (I) = (xy 2, x4 , x3 yz 2 , y 5z 2 ).
...
0 1 2 3
4
5
6
7
MP/LTσ (I) (1, d) : 1 1 1 0 0 0 0 0 . . .
MP/LTσ (I) (2, d) : 1 2 3 3 2 1 1 0 . . .
MP/LTσ (I) (3, d) : 1 3 6 9 11 12 12 12 . . .
Then we observe that MP/I (2, 6) = 0 < 1 = MP/LTσ (I) (2, 6). Notice
that the third lines are equal for all term-orderings because the Hilbert
functions are the same: HP/I = HP/LTσ (I) .
In this paper we compare some of our results with the ones from
[4]. In order to make the comparison clearer to the reader we need to
introduce the notion of s-reduction number and to describe how it is
stated in terms of the sectional matrix. The definition of s-reduction
number has several equivalent formulations and we recall here the one
given in [4].
Definition 3.3. Let I be a homogeneous ideal in P = K[x1 , . . . , xn ].
The s-reduction number, rs (P/I), is max{d | HP/(I+(L1 ,...,Ls )) (d)6=0},
where L1 , . . . , Ls are generic linear forms in P . In our language
rs (P/I) = max{d | MP/I (n−s, d)6=0}.
The reduction number r(P/I) is rdim(P/I) (P/I).
Notice that, for their definitions, the reduction number and the sectional matrix, use “complementary” indices s and n − s.
Example 3.4. In Example 2.3 and Example 3.2 we see that I and
LTσ (I) have the same 2-reduction number, r2 (P/I) = r2 (P/LTσ (I)) =
2, and different 1-reduction number: r1 (P/I) = 5 and r1 (P/LTσ (I)) =
6. From the equalities dim(P/I) = dim(P/LTσ (I)) = 1 it follows that
r(P/I)=5 and r(P/LTσ (I))=6.
Remark 3.5. Using Theorem 3.1 Conca in [7] proved the inequality
for the reduction numbers: r(P/I) ≤ r(P/LTσ (I)).
Going back to the problem of finding a monomial ideal with the same
sectional matrix as P/I, we recall the definitions of strongly stable ideal
and of gin. A monomial ideal J is said to be strongly stable if for
every power-product t ∈ J and every i, j such that i < j and xj |t, the
power-product xi ·t/xj is in J.
In [8] Galligo proved that, given a homogeneous ideal I in the polynomial ring K[x1 , . . . , xn ], with K a field of characteristic 0 and σ a
term-ordering such that x1 >σ x2 >σ · · · >σ xn , then there exists a nonempty Zariski-open set U ⊆ GL(n) and a strongly stable ideal J such
that for each g ∈ U, LTσ (g(I)) = J. This ideal is called the generic
EXTREMAL BEHAVIOUR IN SECTIONAL MATRICES
5
initial ideal of I with respect to σ and it is denoted by ginσ (I).
In particular, when σ =DegRevLex, it is denoted by rgin(I).
Example 3.6. Consider the ideal I = (x4 − y 2 z 2 , xy 2 − yz 2 − z 3 ) from
Example 2.3. Then rgin(I) = (x3 , x2 y 2 , xy 4, y 6 ). See [3] for details
about the computation of gin in CoCoA.
Remark 3.7. Let I be a homogeneous ideal. If I has a minimal generator of degree d (then so does g(I)), then also rgin(I) has a minimal generator of degree d. The converse is not true in general: consider for example the ideal I = (z 5 , xyz 3 ) in Q[x, y, z], then rgin(I) =
(x5 , x4 y, x3 y 3) has a minimal generator of degree 6, and I doesn’t. In
particular, this shows that the highest degree of a minimal generating
set of rgin(I) may be strictly greater than that of I.
The following result represents the sectional matrix analogue of Macaulay’s
Theorem for Hilbert functions (HP/I = HP/LT(I) ): it reduces the study
of the sectional matrix of a homogeneous ideal to the combinatorial
behaviour of a monomial ideal.
Lemma 3.8. Let I be a homogeneous ideal in P = K[x1 , . . . , xn ]. Then
MP/I (i, d) = MP/rgin(I) (i, d) = dimK (Pd /(rgin(I) + (xi+1 , . . . , xn ))d ).
Proof. See Lemma 5.5 in [6]. ⊓
⊔
Remark 3.9. Lemma 3.8 shows that when we have a strongly stable
ideal J in P (and in particular rgin(I) is strongly stable) the sectional
matrix of P/J is particularly easy to compute because sectioning J
by n−i generic linear forms is the same as sectioning J by the smallest n−i indeterminates, xi+1 , . . . , xn .
Using this combinatorial view, Bigatti and Robbiano in [6] proved
a combination of Macaulay’s and Green’s inequalities ([12], [10]) and
then an analogue of Gotzmann’s Persistence Theorem ([9]) for sectional
matrices.
We recall the definition of binomial expansion following the notation
of [6]. If I is a homogeneous ideal then the (n − 1)-binomial expansion
of HI (d) corresponds to a “description” of a lex-segment ideal L in degree d, and similarly the d-binomial expansion of HP/I (d) corresponds
to P/L. See for example [11, Proposition 5.5.13].
Definition 3.10. For h and i, two positive
integers,
we define
the
h(i)
h(i−1)
h(j)
i-binomial expansion of h as h = i + i−1 + · · · + j with
h(i) > h(i − 1) > · · · > h(j) ≥ j ≥ 1. Such expression exists and is
unique.
6
ANNA BIGATTI, ELISA PALEZZATO, AND MICHELE TORIELLI
Moreover we define a family of functions related
to the expansion
in
h(i)+s
h(i−1)+s
h(j)+s
s
the following way: (hi )t := i+t + i−1+t + · · · + j+t .
1
−
For short, we will write (hi )+
instead
+ instead of (hi )1 , and (hi )
−1
of (hi )0 .
Here is Theorem 5.6 of [6] and again we convert the statement in
terms of the quotient P/I using the properties of the functions derived
from the binomial expansion.
Theorem 3.11 (Sectional matrices, 1997). Let I be a homogeneous
ideal in the polynomial ring P = K[x1 , . . . , xn ] and M := MP/I . Then
i
P
(a) M(i, d + 1) ≤
M(j, d) for all i = 1, . . . , n and d ∈ N.
j=1
(b) (Macaulay) M(i, d+1) ≤ (M(i, d)d )+
+ for all i = 1, . . . , n and d ∈ N.
(c) M(i − 1, d) − M(i − 2, d) ≤ ((M(i, d) − M(i − 1, d))d)− for all i =
3, . . . , n and d ∈ N.
(d) (Green) M(i − 1, d) ≤ (M(i, d)d )− for all i = 2, . . . , n and d ∈ N.
Proof. This is Theorem 5.6 of [6], using the conversions
(HI (d)n−1 )+ = (HP/I (d)d )+
+
and
−
(HI (d)n−1 )−
− = (HP/I (d)d )
(see for example [11] Proposition 5.5.16 and Proposition 5.5.18). ⊔
⊓
For the extremal case of Bigatti, Geramita and Migliore in [5], Macaulay’s
inequality defined the maximal growth of the Hilbert function. We
analogously define maximal growth of the sectional matrix following
the extremal case in Theorem 3.11.a.
Definition 3.12. Let I be a homogeneous ideal in P = K[x1 , . . . , xn ].
• The Hilbert function HP/I has maximal growth in degree d
if “Macaulay’s equality” holds: HP/I (d + 1) = (HP/I (d)d )+
+.
• The sectional matrix MP/I has i-maximal growth in degree d if “Bigatti-Robbiano’s equality” holds: MP/I (i, d + 1) =
i
P
MP/I (j, d).
j=1
Remark 3.13. For a homogeneous ideal I in P = K[x1 , . . . , xn ] if
MP/I has n-maximal growth in degree d then I, and rgin(I), have no
minimal generators of degree d+1.
More precisely, for any i ∈ {1, . . . , n}, Corollary 2.7 of [6] implies that
MP/I has i-maximal growth in degree d if and only if rgin(I) has no
minimal generators of degree d+1 in x1 , . . . , xi . (This is a generalization
of Lemma 2.17 in [4].)
EXTREMAL BEHAVIOUR IN SECTIONAL MATRICES
7
4. Sectional Persistence Theorem
Gotzmann’s Persistence Theorem [9] says that, if the generators of
an ideal I have degree ≤ δ and the Hilbert function of P/I has maximal
growth in degree δ, then it has maximal growth for all higher degrees.
This is also true for sectional matrices. Here we recall the Persistence
Theorem 5.8 of [6], and in Theorem 4.6 we will generalize it for imaximal growth, for i ≤ n.
Theorem 4.1 (Persistence Theorem, 1997).
Let I be a homogeneous ideal in P = K[x1 , . . . , xn ]. If MP/I has
n-maximal growth in degree δ and I has no generators of degree >δ
then it has i-maximal growth for all i = 1, . . . , n and for all degrees
>δ.
Moreover, MP/I has n-maximal growth for all degrees ≥ reg(I).
Example 4.2. Consider the polynomial ring P = Q[x, y, z, t] and the
ideal I = (x4 − x2 yz, x5 + xy 3 z) of P . Then
0
MP/I
1
= 1
1
1
1
2
3
4
5
6
7
1 1 1 0 0 0 0
2 3 4 4 3 2 1
3 6 10 14 17 19 20
4 10 20 34 51 70 90
8
0
1
21
111
...
...
...
...
...
Therefore MP/I has 4-maximal growth starting from degree 7, whereas
a direct computation shows that HP/I has maximal growth starting
from degree 49.
Remark 4.3. In particular, the regularity is used by CoCoA for truncating the size of the sectional matrix, displaying the rows up to degree
reg(I)+1, so that the last column shows the persisting equalities. In
Example 2.3, we have rgin(I) = (x3 , x2 y 2 , xy 4, y 6 ), thus reg(I) = 6,
and in degree 7 we read the persisting equalities.
Remark 4.4. We emphasize that the regularity of a homogeneous
ideal I, the highest degree of the generators of rgin(I), is usually a
much lower number than the highest degree of the generators of the
lex-segment ideal with the same Hilbert function of I, as shown in
Example 4.2. This fact makes the persistence in Theorem 4.1 more
“practical” than Gotzmann’s.
With the next lemma we show that if MP/I has i-maximal growth
in degree δ for some i < n, this persists in higher degrees, even if it
does not have n-maximal growth.
8
ANNA BIGATTI, ELISA PALEZZATO, AND MICHELE TORIELLI
Lemma 4.5. Let I be a homogeneous ideal in P = K[x1 , . . . , xn ] generated in degree ≤ δ + 1. If there exists i ≤ n such that rgin(I) has no
minimal generators of degree δ + 1 in P(i) = K[x1 , . . . , xi ], then rgin(I)
has no minimal generators of any degree > δ in P(i) .
Proof. Let σ be DegRevLex and g a generic change of coordinates.
Suppose that the σ-Gröbner basis of g(I) has a polynomial f2 of degree
δ + 2. Then f2 comes from a minimal syzygy of rgin(I) = LTσ (g(I))
and hence this syzygy is linear (see Lemma 5.7 in [6]). This means
that there exists a minimal generator t1 of rgin(I) of degree δ + 1, and,
by the hypothesis, all minimal generators of rgin(I) must be in the
ideal (xi+1 , . . . , xn ). Let f1 be the Gröbner basis polynomial such that
t1 = LTσ (f1 ). Because we are using the reverse lexicographic termordering, this fact implies that f1 ∈ (xi+1 , . . . , xn ). As a consequence
any s-polynomial constructed with f1 is a difference of polynomials in
(xi+1 , . . . , xn ), so f2 ∈ (xi+1 , . . . , xn ). Thus any Gröbner basis element
of degree δ +2 is in (xi+1 , . . . , xn ), and therefore rgin(I) has no minimal
generators of degree δ + 2 in K[x1 , . . . , xi ]. Iterating this reasoning, we
can conclude that rgin(I) has no minimal generators of degree > δ in
K[x1 , . . . , xi ]. ⊓
⊔
Using Lemma 4.5, we can now extend Theorem 4.1.
Theorem 4.6 (Sectional Persistence Theorem).
Let I be a homogeneous ideal in P = K[x1 , . . . , xn ] generated in degree ≤ δ+1. If there exists i ∈ {1, . . . , n} such that MP/I has i-maximal
growth in degree δ then it has j-maximal growth for all j ∈ {1, . . . , i}
and for all degrees ≥ δ.
P
Proof. From MP/I (i, δ + 1) = ij=1 MP/I (j, δ) we have that rgin(I)
has no generators of degree δ + 1 in K[x1 , . . . , xi ] (see Remark 3.13).
Then, applying Lemma 4.5, we know that rgin(I) has no generators
of degree > δ in K[x1 , . . . , xi ]. Hence we can apply Theorem 4.1
to J(i) = rgin(I) ∩ K[x1 , . . . , xi ] and for all d > δ and j = 1, . . . , i
Pj
we get MP/rgin(I) (i, d+1) = MP/J(i) (j, d+1) =
k=1 MP/J(i) (k, d) =
Pj
⊓
k=1 MP/rgin(I) (k, d). The conclusion now follows from Lemma 3.8. ⊔
The Sectional Persistence Theorem says that, whereas the persistence of the n-th row starts at the regularity of the ideal, the persistence in the first rows may be detected in degree lower than the highest
degree of the generators.
Example 4.7. Consider the polynomial ring P = Q[x, y, z, w] and the
ideal I = (x2 , xy, xz(z + w), x(z 2 + w 2 )) of P . Then rgin(I) =
EXTREMAL BEHAVIOUR IN SECTIONAL MATRICES
9
(x2 , xy, xz 2 , xzw, xw 3 ). Notice that I is generated in degree ≤ 3, and
its regularity is 4, so from Theorem 4.1 it follows that MP/I has imaximal growth in degree 4 for i = 1, . . . , 4.
MP/I
0
1
2
1
= 1
1
1
1
2
3
4
0 0 0 0
1 1 1 1
4 4 5 6
8 11 15 21
3
4
5
...
...
...
...
...
We see that MP/I has 2-maximal growth in degree 2 and 3-maximal
growth in degree 3:
MP/I (2, 3) = 1 = MP/I (1, 2) + MP/I (2, 2)
MP/I (3, 4) = 5 = MP/I (1, 3) + MP/I (2, 3) + MP/I (3, 3).
Hence from Theorem 4.6 it follows that MP/I has 2-maximal growth
for all degrees ≥ 2 and it has 3-maximal growth for all degrees ≥ 3.
5. Hilbert Polynomial, Hilbert Series, dimension,
multiplicity
In this section, we show how to read some algebraic invariants for a
homogeneous ideal I from its sectional matrix MP/I truncated at some
degree δ.
Lemma 5.1. Let I be a homogeneous ideal in P = K[x1 , . . . , xn ] generated in degree ≤ δ + 1. If MP/I has i-maximal growth in degree δ,
then for all d ∈ N>0 we have
P
MP/I (i, δ+d) = ij=1 i−j+d−1
· MP/I (j, δ)
i−j
Proof. We prove the statement by induction on d. From Theorem 4.6
it follows that MP/I has k-maximal growth in degree δ, for all k =
P
1, . . . , i, thus for d = 1 MP/I (k, δ+1) = kj=1 MP/I (j, δ).
Let d>1 and suppose the stated equality holds for MP/I (k, δ + d)
for all k = 1, . . . , i. Then by the i-maximal growth from Theorem 4.6,
i X
i
k
X
X
k − j+d−1
MP/I (k, δ+d) =
MP/I (i, δ+d+1) =
·MP/I (j, δ)
k
−
j
j=1
k=1
k=1
then we swap the sums varying j in {1, . . . , i} and t = k − j with
k ∈ {j, .
. . , i}:
Pi
Pi−j t+d−1
P
· MP/I (j, δ) = ij=1 i−j+d−1
· MP/I (j, δ)
j=1
t=0
t
i−j
and this concludes the proof. ⊓
⊔
Proposition 5.2. Let I be a homogeneous ideal in P = K[x1 , . . . , xn ]
generated in degree ≤ δ + 1, and let L1 , . . . , Ln be generic linear forms
10
ANNA BIGATTI, ELISA PALEZZATO, AND MICHELE TORIELLI
in P . If MP/I has i-maximal growth in degree δ, then the Hilbert
polynomial of P/(I + (L1 , . . . , Ln−i )) is
i
X
i−j+x−δ−1
· MP/I (j, δ)
pi (x) =
i−j
j=1
In particular, if pi 6= 0 let k = min{j ∈ {1, . . . , i} | MP/I (j, δ) 6= 0},
then
pi (x) =
MP/I (k, δ) i−k
x + ... terms of lower degree .
(i − k)!
Proof. The first part of the corollary
trivial from Lemma 5.1: for
Pis
i
x > δ we have pi (x) = MP/I (i, x) = j=1 i−j+(x−δ)−1
· MP/I (j, δ).
i−j
(x−δ+i−k−1)...(x−δ+1)(x−δ)
i−k+x−δ−1
We conclude by observing that
=
(i−k)!
i−k
1
i−k
and therefore equal to (i−k)! x + (terms of lower degree). ⊔
⊓
Proposition 5.3. Let I be a homogeneous ideal in P = K[x1 , . . . , xn ]
generated in degree ≤ δ + 1, and let L1 , . . . , Ln be generic linear forms
in P . If MP/I has i-maximal growth in degree δ, then the Hilbert series
of Ri = P/(I + (L1 , .., Ln−i )) is
X
i
δ
X
MP/I (j, δ) δ+1
d
MP/I (i, d)t +
HSRi (t) =
t .
i−j+1
(1
−
t)
j=1
d=0
P
d
Proof. By definition HSRi (t) = ∞
d=0 MP/I (i, d)t . By Lemma 5.1, we
have that
i
∞
∞ X
X
X
i − j+d − δ − 1
d
· MP/I (j, δ) td
MP/I (i, d)t =
i
−
j
j=1
d=δ+1
d=δ+1
swapping the sums and letting k = d − δ − 1 it becomes
Pi P∞ i−j+k k
Pi MP /I (j,δ) δ+1
δ+1
= j=1
.
=
t · MP/I (j, δ) · t
k=0
j=1 (1−t)i−j+1 t
i−j
Therefore,
we can conclude by adding the first part of the series,
Pδ
d
⊔
d=0 MP/I (i, d)t . ⊓
The following theorem shows that we can easily read the dimension
and the multiplicity of P/I from its sectional matrix. In particular,
this information may be found in the δ-th column with δ < reg(I) (see
Example 5.6).
Theorem 5.4. Let I be a homogeneous ideal in P = K[x1 , . . . , xn ] generated in degree ≤ δ+1 such that Iδ 6=Pδ and let i = min{j | MP/I (j, δ)6=0}.
EXTREMAL BEHAVIOUR IN SECTIONAL MATRICES
11
If MP/I (i, δ) = MP/I (i, δ + 1), then
dim(P/I) = n−i+1 and
deg(P/I) = MP/I (i, δ).
Proof. The hypothesis implies that MP/I has i-maximal growth in degree δ, so, by Theorem 4.6, has j-maximal growth in degree d, for all
d > δ and j = 1, . . . , i; this means that i = minj {MP/I (j, d) 6= 0}
for all d > δ and MP/I (i, d) = MP/I (i, δ) for all d ≥ δ. Now, let
δ ′ ≥ δ such that MP/I has n-maximal growth in degree δ ′ , for example
δ ′ = max{δ, reg(I)}. Applying Proposition 5.3, and setting the highest
power, (1 − t)n−i+1 , as common denominator, it follows that
MP/I (i, δ ′ ) + f (t)(1 − t)
HSP/I (t) =
(1 − t)n−i+1
for some polynomial f (t) ∈ K[t] and the fraction above is reduced.
Therefore, the degree of its denominator, n−i+1, is dim(P/I), and the
evaluation of the numerator in 1, MP/I (i, δ), is deg(P/I). ⊔
⊓
Remark 5.5. The hypothesis of Theorem 5.4 is equivalent to the
existence of an integer i such that MP/I (i, δ) = MP/I (i, δ + 1) for
δ > rn−i+1 (P/I): this kind of formulation should look more familiar to
the readers of [5] and [4].
Example 5.6. Following Example 4.7 we consider i = 2, δ = 2 and
then MP/I (1, 2) = 0 and MP/I (2, 2) = MP/I (2, 3) = 1 6= 0. We
then conclude dim(P/I) = n−i+1 = 4 − 2 + 1 = 3 and deg(P/I) =
MP/I (i, δ) = MP/I (2, 2) = 1.
Note that we deduced this information from the sectional matrix in
degree 2, strictly smaller than reg(I) = 4 and also smaller than 3, the
maximal degree of the generators of I.
Remark 5.7. For any homogeneous ideal I in P = K[x1 , . . . , xn ],
MP/I has i-maximal growth for all degrees ≥ reg(I) and for all i ∈
{1, . . . , n}. Therefore all the results in this section hold replacing their
hypotheses with “δ ≥ reg(I)”.
Example 5.8. In Example 2.3, with reg(I) = 6, we have i = 3 so
dim(P/I) = 3 − 3 + 1 = 1 and deg(P/I) = MP/I (3, 6) = 12,
6. Maximal Growth and Greatest Common Divisor
Now we make a subtle change: we consider the same scenario in
degree δ for an arbitrary homogeneous ideal I and see that the same
conclusion hold on the truncation hI≤δ i.
12
ANNA BIGATTI, ELISA PALEZZATO, AND MICHELE TORIELLI
Proposition 6.1. Let I be a homogeneous ideal in P = K[x1 , . . . , xn ].
If there exists δ such that Iδ 6=Pδ and MP/I (i, δ) = MP/I (i, δ+1), for
i = min{j>1 | MP/I (j, δ) 6= 0}, then we have
dim(P/hI≤δ i) = dim(P/hI≤δ+1 i) = n−i+1,
deg(P/hI≤δ i) = deg(P/hI≤δ+1 i) = MP/I (i, δ).
Proof. By construction MP/I (j, δ) = MP/hI≤δ i (j, δ) and MP/I (j, δ+1) =
MP/hI≤δ+1 i (j, δ+1) for all j = 1, . . . , n. From Remark 3.13 it follows
that rgin(I) has no minimal generators in degree δ+1 in x1 , . . . , xi , and
therefore nor does rgin(hI≤δ i) ⊆ rgin(I). It then follows that
MP/I (j, δ+1) = MP/hI≤δ i (j, δ+1)
for all j = 1, . . . , i. This implies that
MP/hI≤δ i (i, δ+1) = MP/hI≤δ i (i, δ) 6= 0,
MP/hI≤δ+1 i (i, δ+1) = MP/hI≤δ+1 i (i, δ) 6= 0,
and i = min{j | MP/hI≤δ i (j, δ) 6= 0} = min{j | MP/hI≤δ+1 i (j, δ) 6= 0}.
Now we can apply Theorem 5.4 and get the conclusions. ⊔
⊓
Corollary 6.2. Let I be a homogeneous ideal in P = K[x1 , . . . , xn ].
If there exists δ such that Iδ 6=Pδ and MP/I has n-maximal growth in
degree δ, let i = min{j>1 | MP/I (j, δ)6=0}, then hI≤δ i = hI≤δ+1 i,
dim(P/hI≤δ i) = n−i+1, and deg(P/hI≤δ i) = MP/I (i, δ).
Proof. By hypothesis MP/I has n-maximal growth in degree δ, hence
by Remark 3.13 it follows that I has no minimal generators in degree δ+1, and therefore hI≤δ i = hI≤δ+1 i. Moreover, from Theorem 4.1
it has i-maximalP
growth in degree δ. Hence we have the equality
i
MP/I (i, δ+1) =
j=1 MP/I (j, δ) = MP/I (i, δ) 6= 0 and the conclusion follows from Proposition 6.1. ⊓
⊔
Example 6.3. Consider the polynomial ring P = Q[x, y, z, t] and the
ideal I = (x3 , x2 y, xy 2, xyz 2 , xyzt3 ) of P . Then
0
1
1
MP/I = 1
1
1
1
2
3
4
0
MP/I≤3
1
= 1
1
1
1
2
3
...
1 0 0 0 0 0 ...
3 1 1 1 1 1 ...
6 7 7 8 9 10 . . .
10 17 24 32 40 50 . . .
2
4
1 1 0 0
2 3 1 1
3 6 7 8
4 10 17 25
3
4
5
6
7
...
0 1
2
3
4
5
1 1 1 0 0 0
...
. . . MP/I≤4 = 1 2 3 1 1 1
1 3 6 7 7 8
...
1 4 10 17 24 32
...
...
...
...
...
...
EXTREMAL BEHAVIOUR IN SECTIONAL MATRICES
13
We see that MP/I has i = 2-maximal growth in degree δ = 3. Then
by Proposition 6.1, we have that dim(P/hI≤3 i) = dim(P/hI≤4 i) = 3,
and deg(P/hI≤3i) = deg(P/hI≤4 i) = 1, regardless what happens in
MP/I (j, δ) for j > i = 2.
The following proposition is the generalization of Proposition 1.6 of
[5].
Proposition 6.4. Let I be a homogeneous ideal in P = K[x1 , . . . , xn ].
If MP/I has n-maximal growth in degree δ, then reg(hI≤δ i) ≤ δ.
Proof. Let I = hI≤δ i. By construction MP/I (j, d) = MP/I (j, d) for
all j = 1, . . . , n and 0 ≤ d ≤ δ. By Remark 3.13, I has no minimal
generators in degree δ+1, and hence MP/I (j, δ+1) = MP/I (j, δ+1) for
all j = 1, . . . , n. This implies that MP/I has n-maximal growth in
degree δ, and then, by the Persistence Theorem 4.1, it has n-maximal
growth in all degrees > δ. By Lemma 3.8, MP/I = MP/rgin(I) and
hence by Lemma 4.5, rgin(I) has no minimal generators of degree > δ,
and then reg(I) ≤ δ. ⊓
⊔
In the rest of this section, we generalize some results of [5] and [4]
about the existence a common factor when there is a certain kind of
maximal growth.
Corollary 6.5. Let I be a homogeneous ideal in P = K[x1 , . . . , xn ].
If there exists δ such that Iδ 6= {0} and MP/I (2, δ) = MP/I (2, δ+1)
(i.e. has 2-maximal growth in degree δ) then hI≤δ i has a GCD of degree
MP/I (2, δ). Furthermore, hI≤δ+1 i shares the same GCD.
Proof. From Iδ 6={0} it follows that xδ1 ∈ rgin(I), and then MP/I (1, δ) =
0. If MP/I (2, δ) = 0 then Iδ = Pδ has GCD = 1 of degree 0. Otherwise, by Proposition 6.1 dim(P/hI≤δ i) = dim(P/hI≤δ +1 i) = n−1 and
deg(P/hI≤δ i) = deg(P/hI≤δ+1 i) = k = MP/I (2, δ). This means that
hI≤δ i defines a hypersurface of degree k, i.e. hI≤δ i = (F ) ∩ J with
dim(J) < n−1 and deg(F ) = k. Therefore hI≤δ i ⊆ (F ) as claimed.
Similarly for hI≤δ+1 i. ⊓
⊔
Following the statement of Corollary 6.5, and along the line of ideas
in [5], we give a new definition for the potential GCD, based on the
sectional matrix instead of the Hilbert function.
Definition 6.6. Let I be a homogeneous ideal in P = K[x1 , . . . , xn ]
such that Iδ 6= {0}. The M-potential degree of the GCD of Iδ is
k = MP/I (2, δ).
The following corollary is the generalization of Proposition 2.7 of [5]
and of Corollary 5.2 of [4].
14
ANNA BIGATTI, ELISA PALEZZATO, AND MICHELE TORIELLI
Corollary 6.7. Let I be a homogeneous ideal in P = K[x1 , . . . , xn ]
and let δ be such that Iδ 6= {0}. Let k be the M-potential degree of the
GCD of Iδ . If MP/I has i-maximal growth in degree δ for some i ≥ 2,
then hI≤δ i and hI≤δ+1 i share the same GCD, F , of degree k.
Proof. By Theorem 4.6, if MP/I has i-maximal growth in degree δ,
then it has 2-maximal growth in degree δ. Therefore we conclude by
Corollary 6.5. ⊓
⊔
Let us see this result in action on an example.
Example 6.8. Consider the polynomial ring P = Q[x, y, z] and the
ideal I = (x3 + y 3 , x2 + 3xy + 2y 2 − xz − yz, x4 + x3 y, xy 4 − 16xyz 3 ,
y 5 − 3xy 3 z − 4y 4 z + 12xyz 3 − 25y 3z 2 + 100yz 4 ) of P . Then
...
1 1 0 0 0 0 0 0 0 0 ...
=
1 2 2 1 1 0 0 0 0 0 ...
1 3 5 6 6 4 3 2 1 1 ...
0
MP/I
1
2
3
4
5
6
7
8
9
We see that MP/I has 2-maximal growth in degree 3 and indeed both
I3 and I4 have a GCD of degree k = MP/I (2, 3) = MP/I (2, 4) = 1.
Indeed, a direct computation shows that the GCD is x + y.
7. Saturated ideals
A homogeneous ideal I in P =K[x1 , . . . , xn ] is saturated if the irrelevant maximal ideal m=(x1 , . . . , xn ) is not an associated prime ideal, i.e.
(I : m) = I. For any homogeneous ideal I of P , the saturation of I, denoted I sat , is defined by I sat := {f ∈ P | f mℓ ⊆ I for some integer ℓ}.
In this section we apply the results obtained previously to the case
of saturated ideals.
Remark 7.1. It is well known that for any homogeneous ideal J there
exists ℓ ∈ N such that J sat = J : mℓ and therefore Jd = (J sat )d for all
d ≫ 0.
Remark 7.2. (Bayer-Stillman) Let I be a homogeneous ideal of P .
Then rgin(I sat ) = rgin(I)xn →0 . This shows that if I is saturated, then
rgin(I) has no minimal generators involving xn .
Lemma 7.3. Let I be a saturated ideal in P = K[x1 , . . . , xn ]. Then
MP/I has n-maximal growth in degree δ if and only if it has (n−1)maximal growth in degree δ.
Proof. By Theorem 3.11.(a) n-maximal growth implies (n−1)-maximal
growth.
EXTREMAL BEHAVIOUR IN SECTIONAL MATRICES
15
Suppose now MP/I has (n−1)-maximal growth. By Remark 3.9 this
implies that rgin(I) has no minimal generators in x1 , . . . , xn−1 in degree
δ+1. Moreover, since rgin(I) is saturated, from Remark 7.2 there are
no minimal generators divisible by xn . With no minimal generators in
degree δ+1 MP/rgin(I) , and therefore MP/I , has also n-maximal growth.
⊔
⊓
In general the truncation of a saturated ideal is not saturated, as
the following example shows. To guarantee that also the truncation is
saturated we need some additional hypothesis, see Lemma 7.5.
Example 7.4. Consider the polynomial ring P = Q[x, y, z, t] and the
ideal I = (yz − xt, z 3 − yt2 , xz 2 − y 2 t, y 3 − x2 z, x3 , x2 y 2). This ideal
is saturated, however, a direct computation shows that the truncation
I≤3 is not saturated.
The following lemma is the generalization of Lemma 1.4 of [5].
Lemma 7.5. Let I be a saturated ideal in P = K[x1 , . . . , xn ]. If MP/I
has (n−1)-maximal growth in degree δ then the ideal hI≤δ i is saturated.
Proof. From Lemma 7.3 it follows that MP/I has n-maximal growth
in degree δ.
sat
Let I = hI≤δ i and Ie = I . Notice that we have that I d ⊆ Ied for
all d ∈ N. We want to prove that our hypotheses imply I d = Ied for all
d ∈ N.
By Remark 7.1 we have that I d = Ied for all d ≫ 0.
Let f ∈ Ied be an element with d ≤ δ. Then f mℓ ⊆ I for some
integer ℓ. Since I ⊆ I, we have f mℓ ⊆ I, and, by hypothesis, I is
saturated, therefore f ∈ I. Now, I and I coincide in degree ≤ δ, hence
f ∈ I. This shows I d = Ied for all d ≤ δ.
By Lemma 4.5, I has no minimal generators in degree δ+1, and
hence Id = I d = Ied also for d = δ+1.
By contradiction, let d > δ+1 be the biggest integer such that I d (
e
Id . This means that in degree d+1
MP/I (n, d+1) = MP/Ie(n, d+1)
and in degree d
MP/I (n, d) > MP/Ie(n, d)
and MP/I (j, d) ≥ MP/Ie(j, d), for j = 1, . . . , n−1.
16
ANNA BIGATTI, ELISA PALEZZATO, AND MICHELE TORIELLI
By definition I is generated in degree δ < d, hence, by Theorem 4.1,
we have that
n
X
MP/I (n, d+1) =
MP/I (j, d).
j=1
Now, using the equalities and inequalities above, we get
MP/Ie(n, d+1) = MP/I (n, d+1) =
n
X
j=1
MP/I (j, d) >
n
X
MP/Ie(j, d).
j=1
This is impossible by the inequalities in Theorem 3.11.(a). ⊔
⊓
Extending Corollary 6.2 to the case of saturated ideals, we can generalize Theorem 3.6 of [4] and Theorem 3.6 of [5].
Corollary 7.6. Let I be a saturated ideal in P = K[x1 , . . . , xn ]. If there
exists δ such that Iδ 6=Pδ and MP/I has (n−1)-maximal or n-maximal
growth in degree δ, let i = min{j>1 | MP/I (j, δ)6=0}, then hI≤δ i is
a saturated ideal of dimension n−i, of degree MP/I (i, δ) and it is δregular. Moreover, dim(P/I) ≤ n−i.
Proof. By Lemma 7.3, since I is saturated, having (n−1)-maximal or nmaximal growth is equivalent. By Lemma 7.5, hI≤δ i is a saturated ideal.
The conclusions then follows from Corollary 6.2 and Proposition 6.4.
⊔
⊓
Now we can generalize Corollary 5.2 of [4] and Corollary 2.9 of [5].
Corollary 7.7. Let I be a saturated ideal in P = K[x1 , . . . , xn ]. If
MP/I has (n−1)-maximal growth in degree δ and potential degree of
the GCD = k ≥ 1. Then hI≤δ i = hI≤δ+1 i is saturated and it has a
GCD of degree k.
Proof. From Lemma 7.3 it follows that MP/I has n-maximal growth
in degree δ. Hence Corollary 6.7 and Lemma 7.5 apply. ⊔
⊓
Similarly to Corollary 7.6, we might be tempted to extend Proposition 6.1 to the case of saturated ideals, or, equivalently, Corollary 7.6
to the case of 2-maximal growth. The example below shows that this
is not possible.
Example 7.8. As in [4], under the assumption of Proposition 6.1,
if I is saturated we can not conclude that hI≤δ i is saturated. For
this example, we consider a first set of 98 points on the conic Q with
equation (z − 3t)(z + 3t) = 0 in P3 and a second set of 16 points
EXTREMAL BEHAVIOUR IN SECTIONAL MATRICES
17
outside Q. In this way we obtain a saturated homogeneous ideal I in
P = Q[x, y, z, t] and MP/I is
0
1
1
1
1
1
1 1 1 1 0 0 0 0 0
0
0
0
0
0
2 3 4 5 2 2 0 0 0
0
0
0
0
0
3 6 10 15 17 13 13 11 9
7
5
3
1
0
4 10 20 35 52 65 78 89 98 105 110 113 114 114
2
3
4
5
6
7
8
9
10
11
12
13
14
...
...
...
...
...
From MP/I we can read that hI≤5 i has a GCD of degree 2 (Corollary 6.5), however MP/I does not have 3-maximal growth in degree 5
(so Corollary 7.7 does not apply), indeed a direct computation shows
that I≤5 is not saturated.
Example 7.9. Consider the polynomial ring P = Q[x, y, z, t, h] and
the strongly stable ideal
I = (x5 , x4 y, x3 y 2 , x2 y 3 , xy 4, x4 z, x3 yz, x2 y 2z, x4 t, xy 3 z 3 ).
The ideal I is saturated and
MP/I
0
1
1
1
=
1
1
1
1
2
3
4
5
...
1 1 1
0
0
0
0 ...
3 4 5
1
1
1
1 ...
6 10 15 13 14 14 15 . . .
10 20 35 47 61 75 90 . . .
15 35 70 117 178 253 343 . . .
2
3
4
5
6
7
8
We can now apply Corollary 7.7 and see that hI≤5 i and hI≤6 i are saturated and have GCD of degree 1 (we can check that the GCD is x).
For this example the result in [4, Corollary 5.2], for detecting a GCD,
do not apply.
8. Sectional matrices, GIN, and resolutions
In this section, we will present some examples in order to compare
the sectional matrix with other algebraic invariants, such as the Hilbert
function H, the generic initial ideal and the minimal resolution.
We start from two homogeneous ideals with same Hilbert function
but different rgin, sectional matrix and Betti numbers.
Example 8.1. Consider P = Q[x, y, z] and let
I = (x2 , xy, xz, y 3 , y 2z, yz 2 , z 3 )
and
J = (x2 , xy, y 2, xz 2 , yz 2 , z 3 )
be two ideals in P . Both ideals are strongly stable and hence, they
coincide with their own rgin. These two ideals clearly have distinct
rgin, but they have the same Hilbert function (the last row in the
18
ANNA BIGATTI, ELISA PALEZZATO, AND MICHELE TORIELLI
sectional matrices). They have different sectional matrix and different
graded Betti numbers.
...
1 1 0 0 0 ...
=
1 2 1 0 0 ...
1 3 3 0 0 ...
0
MP/I
1
2
3
...
1 1 0 0 0 ...
=
1 2 0 0 0 ...
1 3 3 0 0 ...
0
4
MP/J
1
2
3
4
The resolutions of P/I and P/J are respectively
0 → P (−4)⊕P (−5)3 → P (−3)3 ⊕P (−4)7 → P (−2)3 ⊕P (−3)4 → P → P/I → 0.
0 → P (−5)3 → P (−3)2 ⊕P (−4)6 → P (−2)3 ⊕P (−3)3 → P → P/J → 0.
In the following example, we show two ideals with the same sectional
matrix and same Betti numbers, but different generic initial ideal.
Example 8.2. Consider the polynomial ring P = Q[x, y, z] and the
ideals
I = (x5 , x4 y, x3y 2 , x2 y 3 , xy 4 , x4 z, x3 yz, x2 y 2 z, x3 z 2 , x2 yz 2 )
J = (x5 , x4 y, x3 y 2, x2 y 3, xy 4 , x4 z, x3 yz, x2 y 2 z, x3 z 2 , xy 3 z).
Both the ideals are strongly stable and hence, they coincide with their
own rgin. These two ideals clearly have distinct rgin, but they have the
same Hilbert function, the same sectional matrix and the same Betti
numbers.
...
0 1 2
3
4
5
6
1 1 1 1 1 0 0 ...
MP/I = MP/J =
1 2 3 4 5 1 1 ...
1 3 6 10 15 11 12 . . .
The resolution of P/I and P/J is
0 → P (−7)5 → P (−6)14 → P (−5)10 → P.
In the following example we show two ideals with the same sectional
matrix, but different generic initial ideal and different Betti numbers.
Example 8.3. Consider the polynomial ring P = Q[x, y, z] and the
ideals
I = (x5 , x4 y, x3 y 2 , x2 y 3 , xy 4, x4 z, x2 y 2 z, x3 z 2 , x2 yz 2 )
J = (x5 , x4 y, x3y 2 , x2 y 3 , xy 4 , x4 z, x2 y 2z, x3 z 2 , xy 3z).
We have that
rgin(I) = (x5 , x4 y, x3 y 2, x2 y 3, xy 4 , x4 z, x3 yz, x2 y 2 z, x3 z 2 , x2 yz 3 ),
rgin(J) = (x5 , x4 y, x3y 2 , x2 y 3, xy 4 , x4 z, x3 yz, x2 y 2 z, xy 3 z, x3 z 3 ).
EXTREMAL BEHAVIOUR IN SECTIONAL MATRICES
...
1 1 1 1 1 0 0 0 ...
=
1 2 3 4 5 1 1 1 ...
1 3 6 10 15 12 12 13 . . .
0
MP/I = MP/J
19
1
2
3
4
5
6
7
The resolution of P/I is
0 → P (−7)2 ⊕ P (−8) → P (−6)11 → P (−5)9 → P → P/I → 0.
The resolution of P/J is
0 → P (−7)3 ⊕P (−8) → P (−6)11 ⊕P (−7) → P (−5)9 → P → P/J → 0.
In the following example we show two ideals with the same rgin,
therefore the same sectional matrix and Hilbert function, but different
Betti numbers.
Example 8.4. Consider the polynomial ring P = Q[x, y, z], and the
ideals of P
I = (x4 , y 4, z 4 , xy 2 z 3 , x3 yz 2 , x2 y 3 z)
and
J = rgin(I).
These two ideals clearly have the same rgin, therefore the same sectional
matrix. However, J has more minimal generators than I, so they have
different resolutions.
0 1 2
3
4
5
6 7 8 ...
1 1 1 1 0 0 0 0 0 ...
MP/I = MP/J =
1 2 3 4 2 0 0 0 0 ...
1 3 6 10 12 12 7 0 0 . . .
The resolution of P/I is
0 → P (−9)7 → P (−7)3 ⊕P (−8)9 → P (−4)3 ⊕P (−6)3 → P → P/I → 0.
The resolution of P/J is
0 → P (−8)5 ⊕ P (−9)7 → P (−5)2 ⊕ P (−6)2 ⊕ P (−7)10 ⊕ P (−8)14 →
→ P (−4)3 ⊕ P (−5)2 ⊕ P (−6)5 ⊕ P (−7)7 → P → P/J → 0.
In summary:
Example rgin Sec. Mat. Betti n.
8.1
6=
6=
6
=
8.2
6=
=
=
8.3
6=
=
6=
8.4
=
=
6=
20
ANNA BIGATTI, ELISA PALEZZATO, AND MICHELE TORIELLI
Acknowledgements. The authors thank Professor L. Robbiano for
the valuable discussions and for suggesting us Example 7.4.
During the preparation of this paper the third author was supported
by the MEXT grant for Tenure Tracking system.
References
[1] J. Abbott, A. M. Bigatti, and G. Lagorio. CoCoA-5:
a system for doing Computations in Commutative Algebra. Available at
http://cocoa.dima.unige.it, 2017.
[2] J. Abbott and A.M. Bigatti. CoCoALib:
a C++ library for
doing
Computations
in
Commutative
Algebra.
Available
at
http://cocoa.dima.unige.it/cocoalib, 2017.
[3] John Abbott and Anna Maria Bigatti. Gröbner bases for everyone with
CoCoA-5 and CoCoALib. arXiv:1611.07306, to appear in the Proc. of the
MSJ SI 2015, 2016.
[4] J. Ahn and J. C. Migliore. Some geometric results arising from the Borel fixed
property. J. Pure Appl. Algebra, 209(2):337–360, 2007.
[5] A. M. Bigatti, A. V. Geramita, and J. C. Migliore. Geometric consequences
of extremal behavior in a theorem of Macaulay. Trans. Amer. Math. Soc.,
346(1):203–235, 1994.
[6] A. M. Bigatti and L. Robbiano. Borel sets and sectional matrices. Ann. Comb.,
1(1):197–213, 1997.
[7] A. Conca. Reduction numbers and initial ideals. Proc. Amer. Math. Soc.,
131(4):1015–1020, 2003.
[8] A. Galligo. A propos du théoreme de préparation de Weierstrass. In Fonctions
de plusieurs variables complexes, pages 543–579. Springer, 1974.
[9] G. Gotzmann. Eine Bedingung für die Flachheit und das Hilbertpolynom eines
graduierten Ringes. Math. Z., 158:61–70, 1978.
[10] M. Green. Restriction of linear series to hyperplanes, and some results of
Macaulay and Gotzmann, algebraic curves and projective geometry. In Proceedings, Trento, number 1389 in Lecture Notes in Mathematics. Springer,
1988.
[11] Martin Kreuzer and Lorenzo Robbiano. Computational commutative algebra
2. Springer Science & Business Media, 2005.
[12] F. S. Macaulay. Some properties of enumeration in the theory of modular
systems. Proc. Lond. Math. Soc., 26:531–555, 1927.
Department of Mathematics, Genoa University, Via Dodecaneso 35,
16146 Genoa, Italy.
E-mail address: [email protected]
Department of Mathematics, Genoa University, Via Dodecaneso 35,
16146 Genoa, Italy.
E-mail address: [email protected]
Department of Mathematics, Hokkaido University, Kita 10, Nishi 8,
Kita-Ku, Sapporo 060-0810, Japan.
E-mail address: [email protected]
| 0math.AC
|
FIXED-POINT PROPERTY FOR AFFINE ACTIONS ON A
HILBERT SPACE
arXiv:1705.02644v1 [math.GR] 7 May 2017
SHIN NAYATANI
Abstract. Gromov [7] showed that for fixed, arbitrarily large C, any uniformly
C-Lipschitz affine action of a random group in his graph model on a Hilbert
space has a fixed point. We announce a theorem stating that more general
affine actions of the same random group on a Hilbert space have a fixed point.
We discuss some aspects of the proof.
Introduction
In [10], Izeki, Kondo and the present author proved that a random group in the
Gromov graph model had fixed-point property, meaning that any isometric action
had a fixed point, for a large class of CAT(0) spaces, by using the method which
concerns the n-step energy of maps. Naor and Silberman [17] proved a similar
result for a class of p-uniformly convex geodesic metric spaces. (Note that CAT(0)
spaces are 2-uniformly convex.) In these studies it seemed that the condition that
actions are isometric was essential and without the condition the argument should
break dwon. Gromov [7], however, had shown that any uniformly C-Lipschitz
affine action of the same random group on a Hilbert space has a fixed point, where
C may be arbitrarily large but should be specified in advance. The purpose of
this article is to announce a fixed-point theorem for more general affine actions
of the same random group, allowing the Lipschitz constants of the affine maps to
have mild growth with respect to a certain length function on the group [11]. It is
worth while to mention the following: if the Lipschitz constants of the affine maps
are uniformly bounded, then the action reduces to an isometric one on a Banach
space by replacing the Hilbert norm by an equivalent one. On the other hand, our
case treats really non-isometric actions which cannot reduce to isometric ones.
A key of the proof is to verify the existence of a discrete harmonic map from
the group into the Hilbert space which is equivariant with respect to the given
action. In the case of isometric actions, the method of energy minimization coupled
with scaling ultralimit argument was effective. In the general affine case, this
method fails because a map minimizing local energy does not necessarily satisfy
the condition of harmonicity. We therefore employ the method of discrete tensioncontracting flow due to Gromov [7]. Indeed, we refine Gromov’s method and
derive the existence of a harmonic map still by coupling it with scaling ultralimit
argument.
Graduate School of Mathematics, Nagoya University, Chikusa-ku, Nagoya 464-8602, Japan,
[email protected].
1
This article is organized as follows. In §1, we define affine action, discuss the
rigidity of isometric actions and state Shalom’s theorem on the rigidity and existence of uniformly Lipschitz affine actions. In §2, after discussing Nowak’s fixedpoint theorem for uniformly Lipschitz affine actions of a random group in the
Gromov density model, we state our main fixed-point theorem. In §3, we discuss
discrete harmonic maps and state an existence theorem for such maps. We also
discuss the failure of the method of energy minimization. In §4, we introduce
Gromov’s discrete tension-contracting flow and outline the proof of the existence
of harmonic maps. In §5, we outline the proof of the main theorem. In Appendix,
we prove the existence of maps minimizing local energy which are equivariant with
respect to a given affine action.
1. Affine actions on a Hilbert space
Let H be a Hilbert space, and denote the algebra of all bounded linear operators
of H by B(H). Let Γ be a finitely generated infinite group, and let ρ : Γ y H be
an affine action. Thus, for γ ∈ Γ, ρ(γ) : H → H has the form
ρ(γ)(v) = A(γ)(v) + b(γ),
v ∈ H,
where A(γ) ∈ B(H) and b(γ) ∈ H. Since γ 7→ ρ(γ) is a homomorphism, we have
A(γγ ′ ) = A(γ)A(γ ′ ),
b(γγ ′ ) = b(γ) + A(γ)b(γ ′ ),
γ, γ ′ ∈ Γ.
Definition 1.1. An affine action ρ : Γ y H is called uniformly C-Lipschitz if
ρ(γ) : H → H is a C-Lipschitz map, or equivalently kA(γ)k ≤ C, for all γ ∈ Γ.
Note that C ≥ 1 necessarily.
Most basic example of a uniformly Lipschitz affine action is an isometric action.
Recall that a σ-compact, locally compact topological group G is said to have
property F H if any continuous isometric action ρ : G y H has a fixed point, that
is, there exists v ∈ H such that ρ(g)(v) = v for all g ∈ G. It is a celebrated result
of Delorme [4] and Guichardet [8] that property F H is equivalent to Kazhdan’s
property (T). Kazhdan [13] defined this property for locally compact groups in
terms of unitary representations, and proved that if Γ is a lattice in a Lie group
G, then Γ has property (T) if and only if G has property (T). As examples, simple
real Lie groups of real rank at least two have property (T). For n ≥ 2, Sp(n, 1) is
a simple Lie group of real rank one that has property (T). Thus these Lie groups
and their lattices have property F H.
In his unpublished work, Shalom proved the following theorem which exhibits
that higher-rank groups have stronger rigidity than Sp(n, 1) (cf. [2, 19]).
Theorem 1.2 (Shalom). (i) Any uniformly Lipschitz affine action of a simple
real Lie group of real rank at least two (or its lattices) on H has a fixed point.
(ii) Sp(n, 1) admits a uniformly Lipschitz affine action on H without fixed point.
Mimura [16] observes that the action in the statement (ii) is indeed metrically
proper. Hence, any infinite discrete subgroup of Sp(n, 1) also admits a uniformly
Lipschitz affine action on H without fixed point. This exhibits many infinite
hyperbolic groups which admit such affine actions.
Shalom proposed the following (cf. [19])
2
Conjecture 1 (Shalom). Any non-elementary hyperbolic group admits a uniformly
Lipschitz affine action on H without fixed point.
2. Fixed-point property of random groups w.r.t. uniformly
Lipschitz affine actions
In this section, we review two fixed-point theorems regarding uniformly Lipschitz affine actions of certain ramdom groups on a Hilbert space. Recall that in
±1
the Gromov density model G(m, l, d) of random groups, generators s±1
1 , . . . , sm
dl
and a density 0 < d < 1 are fixed, and choose (2m − 1) words, each of them
chosen uniformly and independently from the set of all reduced words of lenght l
±1
±1
±1
in s±1
1 , . . . , sm . The group Γ generated by s1 , . . . , sm and having those reduced
words as relations is a constituent of the model G(m, l, d). Given a group property
P (e.g. Kazhdan’s property (T)), we say that a random group in the Gromov density model has property P if the probability of Γ having property P tends to one
as l → ∞.
√
Theorem 2.1 (Nowak [18]). Fix 1 ≤ C < 2. Let Γ be a random group in
the Gromov density model with density 1/3 < d < 1/2. Then any uniformly CLipschitz affine action ρ : Γ y H has a fixed point.
Note that the random group Γ of the theorem is non-elementary hyperbolic
(hence infinite) [6, 20] and has property (T) [23, 15].
The proof of Theorem 2.1 is based on a fixed-point theorem for an isometric
action of a deterministic group on a Banach space, which we shall review. Let Γ
be a finitely generated group equipped with a finite, symmetric generating set S
not containing the identity element. Modifying the construction as in [23], one
constructs the link graph L(S); its vertices are the elements of S, generators s and
t span an edge (written s ∼ t) if s−1 t is a generator, and the edges are suitably
weighted. (For the account of the choice of weight, see [18, p. 703], [9, Proof of
Lemma 3.1].)
Let B be a Banach space with norm k · k and denote by κp (S, B) the optimal
constant in the p-Poincaré inequality for maps f : S → B:
X
X
kf (s) − f kp m(s) ≤ κp
kf (s) − f (t)kp m(s, t),
s∼t
s∈S
where m(s, t) is P
the weight of the edge (s, t), m(s) =
P
m(s)f
(s)/
s∈S
s∈S m(s), the mean value of f .
P
t∼s
m(s, t), and f =
Theorem 2.2 (Nowak [18]). Let B be a reflexive Banach space and let Γ and S
be as above. If the link graph L(S) is connected and for some 1 < p < ∞ and its
adjoint index p∗ , satisfying 1/p + 1/p∗ = 1, the corresponding Poincaré constants
satisfy
∗
max{2−1/p κp (S, B), 2−1/p κp∗ (S, B∗ )} < 1,
then any affine isometric action ρ : Γ y B has a fixed point.
Let ρ : Γ y H be a uniformly C-Lipschitz affine action, where H is a Hilbert
space, and introduce a new norm on H by |||v||| = supγ∈Γ kA(γ)(v)k for v ∈ H.
Then B = (H, ||| · |||) is a Banach space isomorphic to H, thus reflexive, and
3
ρ : Γ y B is an affine isometric action. Since the norms of B and B∗ (∼
= H) satisfy
k · k ≤ ||| · ||| ≤ Ck · k and C −1 k · k ≤ ||| · |||∗ ≤ k · k, respectively, it follows that
κ2 (S, B), κ2 (S, B∗ ) ≤ C κ2 (S, H) = C κ2 (S, R).
Therefore, we obtain the following
Corollary 2.3. Let Γ and S be as above, and suppose that the link graph L(S)
is connected. √ Then any uniformly C-Lipschitz affine action ρ : Γ y H with
C κ2 (S, R) < 2 has a fixed point.
Now let Γ be a random group in the Gromov density model with density 1/3 <
d < 1/2. By the argument due to Żuk [23], Kotowski and Kotowski [15], there is a
random group Γ′ in a different model so that Γ contains a quotient of Γ′ as a finite
index subgroup and the link graph L(S ′ ) of Γ′ has κ2 (S ′ , R) arbitrarily close to
one. Therefore, we may apply Corollary 2.3 to Γ′ and the conclusion of Theorem
2.1 holds for Γ′ and hence for Γ.
Gromov [7] claimed a result similar to Theorem 2.1 for a random group in
the graph model which was also invented by him. To state Gromov’s result, we
first review the construction of this model. Let Fm denote the free group on m
generators, and let S be the collection of these m elements and their inverses.
Let G = (V, E) be a finite connected graph, where V and E are the sets of
vertices and undirected edges, respectively. We denote the set of directed edges
→
−
→
−
→
−
by E . A map α : E → S satisfying α((v, u)) = α((u, v))−1 for all (u, v) ∈ E is
called an S-labelling of G. Let A(m, G) denote the set of all S-labellings of G,
consisting of (2m)#E elements, and equip it with the uniform probability measure.
→
−
→
→
−
→
For α ∈ A(m, G) and a path −
p = (−
e 1, . . . , →
e l ) in G, where −
e i ∈ E , define
→
→
→
α(−
p ) = α(−
e 1 ) · · · · · α(−
e l ) ∈ Fm . Then set
→
→
R = {α(−
c)|−
c are cycles in G},
α
Γα = Fm /normal closure of Rα .
Let λ1 (G, R) denote the second eigenvalue of the discrete Laplacian of G, acting
on real-valued functions on V . The girth of G, denoted by girth(G), is the minimal
length of a cycle (i.e. a closed path) in G.
A sequence {Gj }j∈N of finite graphs is called a sequence of (bounded-degree)
expanders if it satisfies
(i) #Vj → ∞ as j → ∞,
(ii) ∃d, ∀j, ∀u ∈ Vj , 2 ≤ deg(u) ≤ d (sparce),
(iii) ∃λ > 0, ∀j, λ1 (Gj , R) ≥ λ (highly-connected).
Such a {Gj }j∈N is said to have diverging girth if it further satisfies
(iv) girth(Gj ) → ∞ as j → ∞.
Now suppose that a sequence of expanders {Gj }j∈N with diverging girth is given.
Then the collection of groups G(m, Gj ) = {Γα | α ∈ A(m, Gj )} is the graph model
of random groups. Given a group property P, we say that a random group in the
graph model has property P if the probability of Γα having property P tends to
one as j → ∞. Gromov [7] and Silberman [21] proved that a random group in the
graph model had fixed-point property for Hilbert spaces with respect to isometric
actions, that is, it had property (T). This result was generalized to fixed-point
4
property for CAT(0) spaces [10] (see also [7]) and for p-uniformly convex geodesic
metric spaces [17]. In both generalizations the degrees of singularity of the relevant
geodesic metric spaces should be suitably bounded.
We now state
Theorem 2.4 (Gromov [7]). Fix C > 0. Let Γ be a random group in the graph
model associated with a sequence of expanders with diverging girth. Then any
uniformly C-Lipschitz affine action ρ : Γ y H has a fixed point.
We can relax the condition that the Lipschitz constants of the relevant affine
maps should be uniformly bounded. To state our result precisely, we introduce the
following
Definition 2.5. Let Γ be a finitely generated group equipped with a finite, symmetric generating set S, and let l : Γ → Z≥0 denote the word-length function with
respect to S. For each conjugacy class c of Γ, we define
lconj (c) = inf l(γ)
γ∈c
and call lconj : {conjugacy classes of Γ} → Z≥0 the conjugacy-length function of Γ
[3].
We now state
Theorem 2.6. Fix C > 0 and 0 ≤ σ < 1/10. Let Γ be a random group in the graph
model associated with a sequence of expanders with diverging girth and diameter
growing at most linearly in girth. Then any affine action ρ : Γ y H satisfying
(2.1)
∀γ ∈ Γ, kA(γ)k ≤ C lconj ([γ])σ ,
where [γ] denotes the conjugacy class containing γ, has a fixed point.
Remark 1. In order for a random group in the graph model to be non-elementary
hyperbolic (hence infinite), the relevant sequence of expanders should satisfy some
further conditions (cf. [7, 5, 1]). One of these conditions implies the diameter
growth condition in Theorem 2.6, which is therefore essentially superficial.
3. Discrete harmonic maps
Let Γ be a finitely generated group and fix a finite, symmetric generating set S.
Let µ be the standard random walk of Γ associated with S, that is,
1/#S if ∃s ∈ S, x′ = xs,
′ def
µ(x → x ) =
0
otherwise.
The barycenter map of H, bar : {finite-support probability measures on H} → H,
is given by
!
m
m
X
X
(3.1)
bar
ti Dirac(vi ) =
ti vi .
i=1
i=1
Let ρ : Γ y H be an affine action.
5
Definition 3.1. A ρ-equivariant map f : Γ → H is called harmonic if it satisfies
bar(f∗ µ(x → q )) = f (x)
(3.2)
for all x ∈ Γ. Notice that
bar(f∗ µ(x → q )) =
1 X
f (xs).
#S s∈S
Remark 2. Since the action ρ is affine, we may conclude that a ρ-equivariant f is
harmonic if it satisfies (3.2) for some x ∈ Γ. To see this, suppose that (3.2) holds
for x, and write any x′ ∈ Γ as x′ = γx. Then
1 X
1 X
f (x′ s) =
ρ(γ)(f (xs))
#S s∈S
#S s∈S
!
1 X
= ρ(γ)
f (xs) = ρ(γ)f (x)
#S s∈S
bar(f∗ µ(x′ → q )) =
= f (x′ ),
and (3.2) holds for x′ , too.
The action ρ has a fixed point if and only if a ρ-equivariant constant map, which
are trivially harmonic, exists. In contrast, we have the following existence result
for nonconstant harmonic maps when ρ has no fixed point.
Theorem 3.2. Let Γ be a finitely generated group equipped with a finite, symmetric
generating set S, and let ρ : Γ y H be an affine action, where H is a Hilbert space,
satisfying (2.1) for some C > 0 and σ ≥ 0. Suppose that ρ(Γ) has no fixed point.
Then there exist a (possibly new) affine action ρ′ : Γ y H′ , where H′ is a (possibly
new) Hilbert space, satisfying (2.1) for the same C, σ as above and a nonconstant
harmonic ρ′ -equivariant map f : Γ → H′ .
Before discussing the actual proof, we observe that the standard approach via
energy minimization coupled with scaling ultralimit argument would fail.
Definition 3.3. For a ρ-equivariant map f : Γ → H and x ∈ Γ, define the local
energy E(f )(x) of f at x by
(3.3)
def
E(f )(x) =
1X
kf (x) − f (x′ )k2 µ(x → x′ ).
2 x′ ∈Γ
As will be verified in the appendix, under the assumption that ρ(Γ) has no fixed
point, one can always find a nonconstant ρ-equivariant map f : Γ → H minimizing
the local energy at x, though the Hilbert space H and the affine action ρ : Γ y H
should possibly be renewed. We now focus on the question whether the map f
satisfies (3.2) for x. For v ∈ H and t ∈ R, let ft : Γ → H be the ρ-equivariant map
6
such that ft (e) = f (e) + tv. Then we have, taking x = e for simplicity,
1 X
kft (e) − ft (s)k2
2#S s∈S
1 X
kf (e) + tv − ρ(s)(f (e) + tv)k2
=
2#S s∈S
1 X
=
k(f (e) − f (s)) + t(v − A(s)(v))k2
2#S s∈S
1 X
=
k(f (e) − f (s))k2 + 2t hf (e) − f (s), v − A(s)(v)i + O(t2 ) ,
2#S s∈S
E(ft )(e) =
and therefore
0=
d
1 X
hf (e) − f (s), v − A(s)(v)i .
E(ft )(e)|t=0 =
dt
#S s∈S
If the action ρ is isometric, which means that A(s) is orthogonal, then
1 X
hf (e) − f (s), vi −
#S s∈S
1 X
=
hf (e) − f (s), vi −
#S s∈S
2 X
=
hf (e) − f (s), vi .
#S s∈S
R.H.S. =
1 X
A(s−1 )(f (e) − f (s)), v
#S s∈S
1 X
f (s−1) − f (e), v
#S s∈S
Since this vanishes for all v ∈ H, we conclude (3.2). However, if ρ is not isometric,
the above computation fails and we would not be able to conclude (3.2), that is,
that f is harmonic.
Instead, we use Gromov’s discrete tension-contracting flow developed in [7, §3.6]
and produce a harmonic f . Postponing the details to [11], we shall outline the
argument for the proof of Theorem 3.2. In the remainder of this section, let Γ be
a finitely generated group equipped with a finite, symmetric generating set S, and
let ρ : Γ y H be an affine action, where H is a Hilbert space.
For a ρ-equivariant map f : Γ → H, define new maps Hf : Γ → H and ∆f : Γ →
H by
def
Hf (x) =
=
1
2
1
2
X
x′ ∈Γ
f (x′ ) µ(x → x′ ) + f (x)
!
X
1
f (xs) + f (x) ,
#S s∈S
7
!
def
∆f (x) = (1 − H)f (x)
1X
=
(f (x) − f (x′ )) µ(x → x′ )
2 ′
x ∈Γ
1 X
=
(f (x) − f (xs)).
2#S s∈S
The maps Hf and ∆f are ρ-equivariant and A-equivariant, respectively. We call
H (resp. ∆) the averaging operator (resp. Laplacian). Note that f is harmonic if
and only if ∆f = 0, or Hf = f .
Proposition 3.4 (cf. Gromov [7]). We have
k∆Hf (x)k ≤
max
x′ ∈x(S∪{e})
k∆f (x′ )k
for all x ∈ Γ, and if the equality sign holds for some x then ∆f (x) is a constant
vector independent of x ∈ Γ.
Motivated by this proposition, we introduce the following
Definition 3.5 (cf. Gromov [7]). Let f : Γ → H be a ρ-equivariant map, and
define f0 := f and fi+1 := Hfi inductively. We say that f is (harmonically) stable
if
0 < ∃λ < 1, ∃i0 ∈ N, ∀i ≥ i0 , ∀x ∈ Γ, k∆fi+1 (x)k ≤ λ
max
x′ ∈x(S∪{e})
k∆fi (x′ )k.
It should be mentioned that the above definition of harmonic stability is slightly
modified from Gromov’s original one and it is more suitable for our purpose.
Remark 3. Suppose fi0 is harmonic, that is, ∆fi0 = fi0 − fi0 +1 = 0 for some i0 .
Then fi = fi0 and thus ∆fi = 0 for all i ≥ i0 . Therefore, f is stable.
Proposition 3.6. Suppose that ρ satisfies (2.1) for some C > 0 and σ ≥ 0.
(i) If a ρ-equivariant map f : Γ → H is stable, then {fi }i∈N converges pointwise to
a map f∞ : Γ → H, and f∞ is harmonic.
(ii) If a ρ-equivariant map f : Γ → H is not stable, then there exist a Hilbert space
H′ and a nonconstant harmonic map f ′ : Γ → H′ , equivariant with respect to an
affine action ρ′ : Γ y H′ satisfying (2.1) for the same C, σ as above.
This proposition implies Theorem 3.2. The proofs of the two propositions above
will be given in [11].
4. Proof of Theorem 2.6
In this section, we prove Theorem 2.6. Let Γ be a finitely generated group
equipped with a finite, symmetric generating set S. Let ρ : Γ y H be an affine
action, where H is a Hilbert space, and suppose that ρ satisfies
(4.1)
∀γ ∈ Γ, kA(γ)k ≤ C l(γ)σ
for some C > 0 and σ ≥ 0. (Note that this condition is weaker than (2.1).) For a
ρ-equivariant map f : Γ → H and x ∈ Γ, define the local n-step energy of f at x
8
by
def
E (n) (f )(x) =
1X
kf (x) − f (x′ )k2 µn (x → x′ ),
2 ′
x ∈Γ
n
where µ is the n-th convolution of µ.
Lemma 4.1. Suppose that σ < 1/2. Let f : Γ → H be a harmonic ρ-equivariant
map. Then we have
E (n) (f )(x) &C,σ,x n1−2σ E(f )(x)
for all x ∈ Γ.
The proof of this lemma will be given in [11].
So far, the group Γ has been any finitely generated group. The following lemma,
essentially due to Gromov and Silberman [7, 21], concerns a random Γ.
Lemma 4.2. Let Γ be a random group in the graph model associated with a sequence of expanders with diverging girth and diameter growing at most linearly in
girth, and let ρ : Γ y H be an affine action as above. Then for any ρ-equivariant
map f : Γ → H and any x ∈ Γ, we have
E (n) (f )(x) .C,σ,x,λ n8σ E(f )(x).
(4.2)
Here, n is a positive integer depending on f and x, and we may assume that n is
arbitrarily large, and λ is the positive constant as in the definition of a sequence
of expanders.
Proof. The proof of Proposition 2.14 in [21], which treats the case that the action
is isometric, mostly works for the non-isometric case. For the readers’ convenience
we outline Silberman’s argument, and explain how the term n8σ comes in.
The lemma is a consequence of the following statement. With probability tending to one as j → ∞, the group Γ corresponding to α ∈ A(m, Gj ) has the following
girth(Gj )
property: for any affine action ρ : Γ y H satisfying (4.1), any n <
, any
2
√
ρ-equivariant map f : Γ → H and any x ∈ Γ, there exists n < l ≤ n such that
(4.3)
E (l) (f )(x) .C,σ,x,λ diam(Gj )4σ E(f )(x).
girth(Gj )
,
2
Indeed, choosing n ≃
diam(Gj ), and therefore
we have diam(Gj ) . n ≤ l2 by the assumption on
E (l) (f )(x) .C,σ,x,λ l8σ E(f )(x).
p
Note that l & girth(Gj ); thus l diverges as j → ∞.
For the time being, fix a member Gj of the expander sequence defining the graph
model, and denote it by G = (V, E). Let µG and νG denote the standard random
walk on G and the standard probability measure on V given by
(
→
−
1
deg(u)
if (u, v) ∈ E ,
deg(u)
µG (u, v) =
and νG (u) =
,
2#E
0
otherwise,
respectively. For a map ϕ : V → H and n ∈ N, the n-step energy of ϕ is defined
by
X
1X
EµnG (ϕ) =
νG (u)
kϕ(u) − ϕ(v)k2 µnG (u → v).
2 u∈V
v∈V
9
Recall [21, Lemma 2.11] that we have
(4.4)
EµnG (ϕ) ≤
2
Eµ (ϕ)
λ1 (G, R) G
for all maps ϕ : V → H and all n ∈ N.
→
−
Let α : E → S be an S-labelling of G, and Γ the corresponding group. Let
ρ : Γ y H be an affine action, and ρe: Fm y H its lift. The strategy in proving
(4.3) is to transplant (4.4) onto Γ. In fact, we may work on Fm instead of Γ, and
so we shall transplant (4.4) onto Fm . In order to do this, we ‘push-forward’, using
α, the random walks µG and µnG on G to those on Fm as follows.
If u ∈ V and x ∈ Fm are fixed, α induces a corresponding graph morphism βu→x
from G to X = Cay(Fm , S), the Cayley graph of Fm with respect to S, as follows:
→
→
→
For v ∈ V , choose a path −
p = (−
e 1, . . . , −
e l ) from u to v in G, and set
def
→
→
→
βu→x (v) = x α(−
p ) = x α(−
e 1 ) · · · · · α(−
e l ).
To be precise, βu→x is well-defined only on the set of vertices whose graph distance
from u is less than g/2, where g = girth(G). We now define, for n < g/2, a random
walk µnG,α on X by
X
def
νG (u) (βu→x )∗ µnG (u → ·).
µnG,α (x → ·) =
u∈V
Note that the average over V is taken in order to produce a random walk independent of the individual vertices of G.
We can now transplant (4.4) onto Fm , and it is here that something different
occurs when the action ρ is non-isometric. Suppose n < g/2 and let f : Fm → H
be a ρe-equivariant map.1 When ρ is isometric,
(4.5)
EµnG,α (f )(x) = EµnG (f ◦ βu0 →x )(x)
holds for a fixed u0 ∈ V . Indeed,
X
1X
kf (x) − f (x′ )k2 [(βu→x )∗ µnG (u → ·)](x′ )
EµnG,α (f )(x) =
νG (u)
2 u∈V
x′ ∈Fm
X
X
1
=
νG (u)
kf ◦ βu→x (u) − f ◦ βu→x (v)k2 µnG (u → v).
2 u∈V
v∈V
If ρ is isometric, then we can replace βu→x by βu0 →x in the last expression and get
the right-hand side of (4.5). Now consider the general case that ρ is not necessarily
→
→
isometric. Let −
p and −
r be a path from u0 to v and a shortest path from u to u0 ,
→
−
→
→
respectively, and let q denote the path from u to v traveling along −
r and −
p in
this order. Then
→
f ◦ βu→x (v) = f (xα(−
q ))
→
−
→
= ρe(xα( r )x−1 )f (xα(−
p ))
→
−
−1
= ρe(xα( r )x )f ◦ β
(v),
u0 →x
1
Equivalently, f : Fm → H is the lift of a ρ-equivariant map Γ → H. In particular, the map
f ◦ βu→x is well-defined on the whole vertex set V .
10
and therefore
→
−
e
kf ◦ βu→x (u) − f ◦ βu→x (v)k ≤ kA(xα(
r )x−1 )kkf ◦ βu0 →x (u) − f ◦ βu0 →x (v)k,
e is the linear part of ρe. Since
where A
→
−
→
e
e
e −
e −1 )k
kA(xα(
r )x−1 )k ≤ kA(x)kk
A(α(
r ))kkA(x
→
≤ C 3 l(x)σ l(α(−
r ))σ l(x−1 )σ
≤ C 3 D σ l(x)2σ ,
where D = diam(G), we obtain
and likewise,
EµnG,α (f )(x) ≤ C 6 D 2σ l(x)4σ EµnG (f ◦ βu0 →x )(x),
EµG (f ◦ βu0 →x )(x) ≤ C 6 D 2σ l(x)4σ EµG,α (f )(x).
Together with (4.4), these imply
(4.6)
EµnG,α (f )(x) ≤
2 C 12 D 4σ l(x)8σ
EµG,α (f )(x).
λ1 (G, R)
In order to conclude (4.3) (provisionally on Fm instead of Γ), we must show that
with high probability the random walks µG,α and µnG,α in (4.6) can be replaced
√
by µX and µlX , n < l ≤ n, respectively, where µX is the standard random
walk of X. This will be done by verifying that with high probability the random
variables α 7→ µG,α and α 7→ µnG,α concentrate on their expectations and that these
expectations are computed in terms of µX and its convolutions.
We begin with the second issue. For n < g/2, the expectation µnG,X of the
random variable α 7→ µnG,α can be computed and expressed as a convex combination
of µlX , 0 ≤ l ≤ n:
n
X
(n)
n
(4.7)
w l µlX ,
µG,X =
l=0
where the weights
(n)
wl
satisfy
(4.8)
√
′
X
w
(n)
l
n<l≤n
≥ C′
for a certain absolute constant C > 0.
For the first issue, let j get large and observe that the random variables µGj , q
and µnGj , q , where n < gj /2, concentrate on their expectations µGj ,X and µnGj ,X , respectively. Indeed, one can verify that the map α 7→ µnGj ,α is Lipschitz with respect
to the Hamming distance on A(m, Gj ) with the Lipschitz constant depending only
on the fixed parameters d, m. Using this fact, one deduces that with probability
tending to one as j → ∞,
1
µGj ,α (x → x′ ) ≤ 2 µGj ,X (x → x′ ) and µnGj ,α (x → x′ ) ≥ µnGj ,X (x → x′ )
2
′
hold for all x, x ∈ X.
Now for any ρe-equivariant map f : Fm → H, we obtain
EµGj ,α (f )(x) ≤ 2 EµGj ,X (f )(x) = 2 EµX (f )(x)
11
and
EµnG
j
(f )(x) ≥
,α
≥
1
1 X
(n)
EµnG ,X (f )(x) ≥
w l EµlX (f )(x)
j
2
2√
n<l≤n
C
2
′
√min EµlX (f )(x).
n<l≤n
Together with (4.6), these imply that there exists
f and x) such that
√
n < l ≤ n (which depends on
8 C 12 Dj4σ l(x)8σ
EµX (f )(x).
C ′λ
Now let f : Γ → H be a ρ-equivariant map and set fe = f ◦ π. Let x ∈ Γ and
choose x
e ∈ π −1 (x) ⊂ Fm so that l(e
x) = l(x). Since the ball of radius less than
gj /2 with center x
e in X is isometrically isomorphic to that of the same radius with
center x in Cay(Γ, S), the above inequality (for fe, x
e) implies
EµlX (f )(x) ≤
8 C 12 Dj4σ l(x)8σ
E(f )(x),
E (f )(x) ≤
C ′λ
(l)
that is, (4.3).
Theorem 2.6 now follows by combining Theorem 3.2, Lemma 4.1 and Lemma
4.2.
Appendix
Let Γ be a finitely generated group equipped with a finite, symmetric generating
set S, and let ρ : Γ y H be an affine action, where H is a Hilbert space. In §3, we
referred to the following fact: if ρ(Γ) has no fixed point, then energy minimization
coupled with scaling ultralimit argument produces a nonconstant map from Γ to
a (possibly new) Hilbert space H′ which is equivariant with respect to a (possibly
new) affine action ρ′ : Γ y H′ and minimizes the local energy at a point. While
this fact would not be useful for our purpose of proving Theorem 3.2 as we observed
that we would not be able to conclude the resulting map is harmonic, it might be
so in other circumstances. Therefore, we shall verify the above fact by proving the
following
Proposition 4.3. Let Γ be a finitely generated group equipped with a finite, symmetric generating set S, and let ρ : Γ y H be an affine action, where H is a Hilbert
space. Suppose that ρ(Γ) has no fixed point. Fix x ∈ Γ. Then there exist a (possibly
new) affine action ρ′ : Γ y H′ , where H′ is a (possibly new) Hilbert space, and a
nonconstant ρ′ -equivariant map f : Γ → H′ minimizing the local energy at x. If ρ
satisfies (4.1) for some C > 0 and σ ≥ 0, then ρ′ also satisfies (4.1) for the same
C, σ.
Before proceeding to the proof, we review the definitions of ultrafilter and the
ultralimit of a sequence of metric spaces.
A nonempty subset ω ⊂ 2N is called an ultrafilter on N if it satisfies the following
conditions:
(i) ∅ ∈
/ ω.
12
(ii) A ∈ ω, A ⊂ B ⇒ B ∈ ω.
(iii) A, B ∈ ω ⇒ A ∩ B ∈ ω.
(iv) For any subset A ⊂ N, A ∈ ω or N \ A ∈ ω.
An ultrafilter ω on N is called non-principal if it satisfies also
(v) For any finite subset F ⊂ N, F ∈
/ ω (hence, N \ F ∈ ω).
Let ω be a non-principal ultrafilter on N. Let (aj )∞
j=1 ⊂ R be a sequence of
real numbers. We call α ∈ R an ω-limit of (aj ) and write ω- limj aj = α if
{j ∈ N | |aj − α| < ε} ∈ ω holds for any ε > 0. Let (Yj , dj , oj ) be a sequence of metric spaces with base point. On the set of sequences (yj ), where
yj ∈ Yj and dj (oj , yj ) is bounded independent of j, consider the equivalence relation [(yj ) ∼ (zj ) ⇔ ω- limj dj (yj , zj ) = 0], and denote the equivalence class of
(yj ) by y∞ = ω- limj yj . Let Y∞ denote the set of equivalence classes, and endow
it with the metric d∞ (y∞ , z∞ ) = ω- limj dj (yj , zj ). One writes (Y∞ , d∞ , o∞ ) =
ω- limj (Yj , dj , oj ), called the ω-limit of (Yj , dj , oj ). It is known that the metric
space (Y∞ , d∞ ) is necessarily complete.
Proof of Proposition 4.3 We shall follow [22] and [14] which treat the case that
the action is isometric.
Fix a non-principal ultrafilter ω on N. We divide the proof into two cases, according to whether E0 := inf E(f )(x) is strictly positive or not, where the infimum
is taken over all ρ-equivariant maps f : Γ → H.
Case 1. The case that E0 > 0.
This is a simpler case, and we only outline the argument. Let {fj }∞
j=1 be a
sequence of ρ-equivariant maps Γ → H such that E(fj )(x) ց E0 . Set vj =
fj (x) and define (H∞ , k · k∞ , v∞ ) = ω- limj (H, k · k, vj ). Then an affine action
ρ∞ : Γ y H∞ is induced and satisfies (4.1). Define a map f∞ : Γ → H∞ by
f∞ (y) = ω- limj fj (y) for y ∈ Γ. Then f∞ is ρ∞ -equivariant, and
E(f∞ )(x) = ω- lim E(fj )(x) = E0 ;
j
in particular, f∞ is nonconstant. On the other hand, one can verify that E(g)(x) ≥
E0 for all ρ∞ -equivariant maps g : Γ → H∞ . Thus, f∞ minimizes the local energy
at x.
Case 2. The case that E0 = 0.
Define δ : H → R≥0 by δ(v) = maxs∈S kρ(s)(v) − vk. While δ > 0 since ρ(Γ)
has no fixed-point, we have inf v∈H δ(v) = 0; indeed,
1 X
E(f )(x) =
kf (xs) − f (x)k2
2#S s∈S
1 X
=
kρ(x){ρ(sx−1 )(f (x)) − ρ(x−1 )(f (x))}k2 ,
2#S s∈S
which is clearly comparable to δ(ρ(x−1 )(f (x)))2 .
In order to proceed, we need the following elementary fact: let Y be a complete
metric space and ϕ : Y → R a strictly positive continuous function. Then there
exists y ∈ Y such that dY (z, y) ≤ ϕ(y) ⇒ ϕ(z) ≥ 21 ϕ(y). Let j ∈ N and apply
13
this fact to the function jδ : H → R. Then we get vj ∈ H such
that kw − vj k≤
1
jδ(vj ) ⇒ δ(w) ≥ 2 δ(vj ). Now let (H∞ , k · k∞ , v∞ ) = ω- limj H, δ(v1 j ) k · k, vj .
We shall define an affine action ρ∞ : Γ y H∞ . Let w∞ ∈ H∞ and write w∞ =
ω- limj wj . By definition, there exists M > 0 such that kwj − vj k ≤ Mδ(vj ) for
all j ∈ N. Then
kρ(s)(wj ) − vj k ≤ kρ(s)(wj ) − ρ(s)(vj )k + kρ(s)(vj ) − (vj )k
≤ C kwj − vj k + δ(vj )
≤ (CM + 1) δ(vj ),
where C = kA(s)k. It follows that ω- limj ρ(s)(wj ) exists, and it is easy to verify
that this limit is independent of the choice of wj . Hence, by defining ρ∞ (s)(w∞ ) =
ω- limj ρ(s)(wj ), we obtain a well-defined map ρ∞ (s) : H∞ → H∞ , which is clearly
C-Lipschitz. It is also easy to see that the affineness, that is, the property of preserving internally dividing points, of ρ(s) is inherited by ρ∞ (s). Let γ ∈ Γ and write
γ = s1 . . . sl , where s1 , . . . , sl ∈ S. Let w∞ = ω- limj wj ∈ H∞ . Then the ultralimit of ρ(γ)(wj ) = ρ(s1 ) . . . ρ(sl )(wj ) exists and equals to ρ∞ (s1 ) . . . ρ∞ (sl )(w∞ ).
Thus, defining ρ∞ (γ)(w∞ ) = ω- limj ρ(γ)(wj ), we have ρ∞ (γ) = ρ∞ (s1 ) . . . ρ∞ (sl )
and obtain an affine action ρ∞ : Γ y H∞ . It is clear that if ρ satisfies (4.1), then
ρ∞ also satisfies (4.1) with the same constants.
We now verify that δ∞ ≥ 21 , where δ∞ is the function δ with respect to ρ∞ .
To do so, take any w∞ = ω- limj wj ∈ H∞ , so that kwj − vj k ≤ M δ(vj ) for
some M > 0, and set As := {j ∈ N | kρ(s)(wj ) − wj k ≥ 12 δ(vj )} for s ∈ S.
For j > M, kwj − vj k ≤ j δ(vj ), and therefore δ(wj ) ≥ 21 δ(vj ), that is, j ∈
∪s∈S As . Thus ∪s∈S As ∈ ω. But this means As ∈ ω for some s ∈ S. Therefore,
kρ∞ (s)(w∞ ) − w∞ k∞ ≥ 21 , and δ∞ ≥ 12 . We thus recover the situation of Case 1.
References
[1] G. Arzhantseva and T. Delzant, Examples of random groups, preprint.
[2] U. Bader, A. Furman, T. Gelander and N. Monod, Property (T) and rigidity for actions on
Banach spaces, Acta Math. 198 (2007), 57–105.
[3] M. Coornaert and G. Knieper, Growth of conjugacy classes in Gromov hyperbolic groups,
Geom. Funct. Anal. 12 (2002), 464–478.
[4] P. Delorme, 1-cohomologie des représentations unitaires des groupes de Lie semi-simples
et résolubles. Produits tensoriels continus et représentations, Bull. Soc. Math. France 105
(1977), 281–336.
[5] E. Ghys, Groupes Aléatoires [d’après Misha Gromov,...], Séminaire Bourbaki, 55ème année,
2002–2003, n◦ 916.
[6] M. Gromov, Asymptotic invariants of infinite groups, in Geometric group theory,
ed. G. Niblo, M. Roller, Cambridge University Press, Cambridge, 1993.
[7] M. Gromov, Random walk in random groups, Geom. Funct. Anal. 13 (2003), 73–146.
[8] A. Guichardet, Étude de la 1-cohomologie et de la topologie du dual pour les groupes de Lie
à radical abélien, Math. Ann. 228 (1977), 215–232.
[9] H. Izeki, T. Kondo, and S. Nayatani, Fixed-point property of random groups, Annals of
Global Analysis and Geom. 35 (2009), 363–379
[10] H. Izeki, T. Kondo, and S. Nayatani, N -step energy of maps and fixed-point property of
random groups, Groups, Geometry, and Dynamics 6 (2012), 701–736.
[11] H. Izeki, T. Kondo, and S. Nayatani, in preparation.
14
[12] H. Izeki and S. Nayatani, Combinatorial harmonic maps and discrete-group actions on
Hadamard spaces, Geom. Dedicata 114 (2005), 147–188.
[13] D. Kazhdan, Connection of the dual space of a group with the structure of its closed subgroups, Funct. Anal. Appl. 1 (1967), 63–65.
[14] T. Kondo, Fixed point theorems via a scaling limit argument (in Japanese), RIMS Kokyuroku
1720 (2010), 139–149.
[15] M. Kotowski and M. Kotowski, Random groups and property (T): Zuk’s theorem revisited,
J. Lond. Math. Soc. 88 (2013), 396–416.
[16] M. Mimura, private communication, April 14, 2015.
[17] A. Naor and L. Silberman, Poincaré inequalities, embeddings, and wild groups, Compos. Math. 147 (2011), 1546–1572.
[18] P. W. Nowak, Poincaré inequalities and rigidity for actions on Banach spaces,
J. Eur. Math. Soc. 17 (2015), no. 3, 689–709.
[19] P. W. Nowak, Group actions on Banach spaces. Handbook of group actions. Vol. II, 121–149,
Adv. Lect. Math. 32, Int. Press, Somerville, MA, 2015.
[20] Y. Ollivier, Sharp phase transition theorems for hyperbolicity of random groups,
Geom. Funct. Anal. 14 (2004), 595–679.
[21] L. Silberman, Addendum to “Random walk on random groups” by M. Gromov,
Geom. Funct. Anal. 13 (2003), 147–177.
[22] L. Silberman, note formerly available at the author’s homepage.
[23] Zuk, A.: Property (T) and Kazhdan constants for discrete groups. Geom. Funct. Anal. 13
(2003), 643–670.
15
| 4math.GR
|
CMSIS-NN: Efficient Neural Network Kernels for
Arm Cortex-M CPUs
arXiv:1801.06601v1 [cs.NE] 19 Jan 2018
Liangzhen Lai
Arm Inc.
[email protected]
Naveen Suda
Arm Inc.
[email protected]
Vikas Chandra
Arm Inc.
[email protected]
Abstract
Deep Neural Networks are becoming increasingly popular in always-on IoT edge
devices performing data analytics right at the source, reducing latency as well as
energy consumption for data communication. This paper presents CMSIS-NN,
efficient kernels developed to maximize the performance and minimize the memory
footprint of neural network (NN) applications on Arm Cortex-M processors targeted
for intelligent IoT edge devices. Neural network inference based on CMSIS-NN
kernels achieves 4.6X improvement in runtime/throughput and 4.9X improvement
in energy efficiency.
1
Introduction
Connected devices – otherwise known as the Internet of Things (IoT) – have been rapidly proliferating
over the past few years and are predicted to reach 1 trillion across various market segments by 2035 [1].
These IoT edge devices typically consist of sensors collecting data – such as audio, video, temperature,
humidity, GPS location and acceleration – which is then processed and communicated with other
nodes or the cloud. Currently, the data from the sensors are processed by analytics tools in the cloud
to enable a wide range of applications, such as industrial monitoring and control, home automation
and health care. However, as the number of the IoT nodes increases, this places a considerable
burden on the network bandwidth, as well as adding latency to the IoT applications. Furthermore,
dependency on the cloud makes it challenging to deploy IoT applications in regions with limited or
unreliable network connectivity. One solution to this problem is edge computing [2], performed right
at the source of data, i.e. the IoT edge node, thus reducing latency as well as saving energy for data
communication.
In terms of accuracy, deep neural networks have demonstrated near-human performance for many
complex machine learning applications such as image classification, speech recognition and natural
language processing. A typical neural network (NN) for image classification consists of multiple
layers of convolution based feature extractors, followed by fully-connected layers for classification,
as shown in Fig. 1. Due to the computational complexity and resource requirements, the execution
of NNs has predominantly been confined to cloud computing with high-performance server CPUs
or specialized hardware (e.g. GPU or accelerators), which adds latency to the IoT applications.
Classification using a small neural network right at the source of the data, i.e. the IoT edge, reduces
the overall latency and energy consumption of data communication between the IoT edge and the
cloud.
In this work, we explore the performance optimization of neural networks on resource-constrained
microcontroller based platforms, targeted for intelligent IoT edge nodes. To enable this, we have
developed optimized software kernels for deploying NNs on Arm Cortex-M CPUs. Using these
software kernels, we demonstrate a convolutional neural network (CNN) for CIFAR-10 dataset on
an off-the-shelf Arm Cortex-M7 platform classifying 10.1 images per second with an accuracy of
79.9%.
…
…
Convolution
Pooling
Fully-connected
layer
Figure 1: Structure of a typical deep neural network.
2
Overview
The overview of the neural network kernels is shown in Fig. 2. The kernel code consists of two parts:
NNFunctions and NNSupportFunctions. NNFunctions include the functions that implement popular
neural network layer types, such as convolution, depthwise separable convolution, fully-connected
(i.e. inner-product), pooling and activation. These functions can be used by the application code
to implement the neural network inference applications. The kernel APIs are also kept simple,
so that they can be easily retargeted for any machine learning framework. NNSupportFunctions
include utility functions, such as data conversion and activation function tables, which are used in
NNFunctions. These utility functions can also be used by the application code to construct more
complex NN modules, such as Long Short Term Memory (LSTM) or Gated Recurrent Unit (GRU).
For some kernels, such as fully-connected and convolution, different versions of the kernel functions
are implemented. A basic version is provided that works universally, ‘as-is’, for any layer parameters.
We have also implemented other versions which include further optimization techniques with either
transformed inputs or with some limitations on the layer parameters. Ideally, a simple script can be
used to parse the network topology and automatically determine the appropriate functions to be used.
Figure 2: Overview of the neural network kernel structure.
3
Fixed-Point Quantization
Traditionally, NN models are trained using 32-bit floating point data representation. However, such
high precision is generally not required during inference. Research has shown that NNs work well
even with low-precision fixed-point representation [4, 5, 6]. Fixed-point quantization helps to avoid
the costly floating-point computation and reduces the memory footprint for storing both weights and
activations, which is critical for resource-constrained platforms. Although precision requirements for
different networks or network layers can vary [7], it is hard for the CPU to operate on data types with
varying bit-width. In this work, we develop the kernels that support both 8-bit and 16-bit data.
The kernels adopt the same data type format as used in CMSIS [3], i.e. q7_t as int8, q15_t as
int16 and q31_t as int32. The quantization is performed assuming a fixed-point format with a
power-of-two scaling, i.e. the represented value will be A × 2n , where A is the integer value and n
is an integer number that indicates the location of the radix point. We pass the scaling factors for
the bias and outputs as parameters to the kernels and the scaling is implemented as bitwise shift
2
operations because of the power-of-two scaling. We use this type of quantization – instead of the
8-bit quantization used in TensorFlow [4] – to avoid the need for floating-point de-quantization in
between layers, as some Arm Cortex-M CPUs may not have a dedicated floating point unit (FPU),
thus limiting their floating-point computation capabilities. The other benefit of such quantization is
that we can use simpler table look-up based activation, which is discussed in Section 4.5.
4
Software Kernels
In this section, we describe the implementation and optimization of the proposed software kernels
for Arm Cortex-M CPUs. The Cortex-M [8] family of processors are 32-bit RISC processor cores
that are designed for energy efficiency, and typically used as microcontrollers for deeply embedded
applications. In this work, we focus on enabling neural networks on Cortex-M based systems that
support SIMD instructions, especially 16-bit Multiply-and-Accumulate (MAC) instructions (e.g.
SMLAD) which are very useful for NN computation.
4.1
Support Functions
Most NNFunctions use the 16-bit MAC instructions, hence data transformation is required to convert
the 8-bit data type (i.e. q7_t) into 16-bit data type (i.e. q15_t). CMSIS provides a utility function,
arm_q7_to_q15, to perform the data transformation. The illustration and pseudo code is shown in
Fig. 3. The data transformation is done in two steps: the first step expands the 8-bit data into 16-bit
data by using the sign extension instruction (__SXT B16); the second step rearranges the data so
that the output follows the same order as the input.
Figure 3: Illustration and pseudo code of the data transform from q7_t to q15_t in CMSIS
arm_q7_to_q15 function (assuming big-endian data format).
The performance of data transformation is critical, as it is used in the inner loop inside the computation
kernels. While the first step of sign extension is essential, the second step of rearranging the data
can be omitted if both operands follow the same ordering. To better exploit this, we created another
version of the data transformation routine without the data reordering, as shown in Fig. 4. The routine
is discussed in detail in Section 4.2.
Figure 4: Illustration and pseudo code for data transformation from q7_t to q15_t without reordering.
Output and input data are ordered differently.
3
4.2
Matrix Multiplication
Matrix multiplication is the most important computation kernel in neural networks [9]. The implementation in this work is based on the mat_mult kernels in CMSIS. Similar to CMSIS implementation,
the matrix multiplication kernel is implemented with 2 × 2 kernels, illustrated in Fig. 5. This enables
some data reuse and saves on the total number of load instructions. The accumulation is done with
the q31_t data type and both operands are of q15_t data type. We initialize the accumulator with
the corresponding bias value. The computation is performed using the dedicated MAC instruction
__SM LAD.
Figure 5: The inner-loop of matrix multiplication with 2 × 2 kernel. Each loop computes the dot
product results of 2 columns and 2 rows, i.e. 4 outputs.
If the input activations or network weights are q7_t type, data expansion may be required to convert
them to q15_t type. As discussed in Section 4.1, if both inputs and weights are q7_t type, we can
use data transformation without reordering (as shown in Fig. 4) to improve performance. However,
the data alignment can be tricky when the number of elements is not a multiple of 4.
The other scenario is with q7_t weights and q15_t activations. In this case, the weights can be
pre-processed with the second and third byte swapped for every 32-bit word, i.e. converting [1, 2, 3, 4]
into [1, 3, 2, 4]. With this pre-processing, the data transformation without reordering (as shown in
Fig. 4) will generate q15_t data in the original order, i.e. converting [1, 3, 2, 4] back to [1, 2, 3, 4]. This
pre-processing is only for the network weights and can be reused for different inputs. Alternatively,
the pre-processing can be performed offline when generating the network model.
We consider the fully-connected layer to have a batch size of one, so the main computation becomes
matrix-vector multiplication. Similar to matrix-matrix multiplication, matrix-vector multiplication
can also be implemented with a 1 × 2 kernel size to improve performance. Supporting a large kernel
can further improve performance, but may be limited by the total number of registers. Arm Cortex-M
cores have 16 architectural registers, including PC and LR. This limited number of registers can be a
challenge if we want to implement larger kernels.
Since the weights are kept constant and re-used during inference, we can reorder the matrix weights
so that row data are interleaved and can be read with only one pointer access. This weight reordering
is illustrated in Fig. 6. During the matrix-vector multiplication, the same q7_to_q15 function, without
reordering, is used to expand the q7_t data into q15_t as shown in Fig. 7. In this way, we can fit the
1 × 4 kernels using the available registers.
4
Figure 6: The weight reordering process to support a 1 × 4 kernel (i.e., 1 column and 4 rows). Weights
are interleaved every four rows and shuffled every four entries in the main part. Only the leftover
columns are interleaved, whereas leftover rows remain the same.
Figure 7: The computation of a 1 × 4 kernel. The data order of the weights and activation vectors is
matched after the q7_to_q15 operation without reordering. Each inner loop iteration processes two
1 × 4 MAC operations.
5
4.3
Convolution
A convolution layer extracts a new feature map by computing a dot product between filter weights
and a small receptive field in the input feature map. Typically, a CPU-based implementation of
convolution is decomposed into input reordering and expanding (i.e. im2col, image-to-column)
and matrix multiplication operations. im2col is a process of transforming the image-like input into
columns that represent the data required by each convolution filter. An example of im2col is shown
in Fig.8.
Figure 8: Example of im2col on a 2D image with a 3x3 kernel, padding size of 1 and stride size of 2.
One of the main challenges with im2col is the increased memory footprint, since the pixels in the
input image are repeated in the im2col output matrix. To alleviate the memory footprint issue while
retaining the performance benefits from im2col, we implemented a partial im2col for our convolution
kernels. The kernel will only expand a limited number of columns (e.g. 2), sufficient to get the
maximum performance boost from the matrix-multiplication kernels while keeping memory overhead
minimal.
The image data format can also affect the performance of convolution, especially im2col efficiency [10]. With a batch size of one, the convolution operation is a 2D convolution (i.e. the
convolution window can move in two directions) on 3D data, as shown in Fig. 9. The two most
common image data formats are Channel-Width-Height (CHW), i.e. channel last, and Height-WidthChannel (HWC), i.e. channel first. The dimension ordering is the same as that of the data stride. In
an HWC format, the data along the channel is stored with a stride of 1, data along the width is stored
with a stride of the channel count, and data along the height is stored with a stride of (channel count
× image width).
1st Stride
Channel
Kernel size
2nd Stride
Height
*
Width
Figure 9: Convolution on 3D data. The image has three dimensions: height, width and channel.
The data layout has no impact on the matrix-multiplication operations, as long as the dimension order
of both weights and images is the same. The im2col operations are performed along the width and
height dimensions only. The HWC-style layout enables efficient data movement, as data for each
6
pixel (i.e. at the same x,y location) is stored contiguously and can be copied efficiently with SIMD
instructions. To validate this, we implemented both CHW and HWC versions and compared the
runtime on a Cortex-M7. The results are highlighted in Fig. 10, where we fixed the HWC input to be
16x16x16 and swept the number of output channels. When the output channel value is zero, it means
that the software performs only im2col and no matrix-multiplication operation. Compared to CHW
layout, HWC has less im2col runtime with the same matrix-multiplication performance. Therefore,
we implement the convolution kernels assuming that the data layout is in HWC format.
CHW
HWC
30
Runtime (ms)
25
20
15
10
5
0
0
4
8
12
16
Output channel count
Figure 10: Experiment results with CHW and HWC data layout. Both data layout styles have the
same matrix-multiplication runtime. HWC has less im2col runtime.
Recently, MobileNets using depthwise separable convolution have been proposed as an efficient
alternative to the standard 3D convolution operation [11]. Depthwise separable convolution has been
used to achieve compact network architectures, which are particularly useful for resource-constrained
devices [12]. CMSIS-NN kernels also include support for a depthwise separable convolution layer.
4.4
Pooling
Pooling layers are typically inserted in between convolution layers to reduce the feature dimensions
and thus the number of parameters and computations in the network. Similar to convolution, pooling
is a window-based operation with a given kernel size, stride and padding. Unlike convolution, pooling
typically operates within the same channel, and is independent of data in the other channels. Pooling
is usually performed with a stride size greater than 1, so the output features will have smaller width
and height.
There are two common types of pooling layers: average pooling, which calculates the average value
of all pixels within the window, and max pooling, which calculates the maximum value. Pooling
can be implemented as a nested for-loop over each window, e.g. pooling layers in Caffe [13]. One
efficient alternative is to split the pooling operation into x-pooling (i.e. along the width) and then
y-pooling (i.e. along the height). This way, the max/average operations along the x-direction can
be reused along the y-direction, allowing the total number of operations to be reduced. We call this
approach split x-y pooling. One potential issue with split x-y pooling is the data arrangement, as
additional memory may be required to store the intermediate results after x-pooling.
Our pooling kernels are implemented with split x-y pooling as, based on our experiments, the split x-y
pooling is significantly faster than the window-based pooling. To eliminate the need for additional
memory, the kernels perform the pooling operations in situ. This makes the pooling layer a destructive
operation on the input. An example of an in situ max pooling implementation on a 1D array is
illustrated in Fig. 11. The same operation can be extended for high dimensional data where each
element can represent an array. For example, when performing x-pooling with HWC image data,
each element block in Fig. 11 can represent an array of size equal to the number of channels, i.e.
all the channel data for one pixel. If each block represents an entire image row, this will effectively
perform y-pooling. Compared to window-based pooling, the in situ split x-y pooling achieves 4.5X
speed-up with no additional memory overhead.
7
Figure 11: Example of max pooling with in situ operations.
4.5
Activation Functions
The role of an activation function is to add non-linearity in the network. The most commonly used
activations functions are ReLU, sigmoid and tanh.
4.5.1
ReLU
Rectified-Linear Unit (ReLU) layer is a common activation function for neural networks. The
operation is f (x) = max(0, x), which is 0 when x < 0 and linear with a slope of 1 when x > 0. A
simple implementation (e.g. in Caffe) loops over all elements and make them 0 if they are negative.
Since we mostly use q7_t type data, ReLU can be implemented using a similar concept as SWAR
(SIMD within a register). The key is to identify the sign bit of the q7_t number and make the
number 0 if it is negative. Our ReLU kernel implementation is shown in Fig. 12. The basic idea is
to use the MSB of the q7_t number as the sign bit and extend it into a mask by using the byte-level
subtraction instruction (__QSU B8). This SWAR approach provides about 4X speed-up compared to
the conventional approach of going over each element.
Figure 12: Illustration of the optimized ReLU kernel. The MSB of each q7_t data is used to construct
a data mask. If the number is negative, i.e. the sign bit is 1, the mask is 0xFF, which will make the
output 0.
4.5.2
Sigmoid and Tanh
Sigmoid and tanh are other common activation functions that are typically used in recurrent neural
networks. Computing these activation functions requires the use of dedicated math functions and can
be computationally expensive on Cortex-M CPUs, hence we implement them using a table-lookup
approach with fixed-point input and output. There are two possible ways to do this, the first of which
is to use a unified table for all ranges with fixed input granularity. In this implementation, the MSB of
the input is used to identify the corresponding entries in the look-up table, while the LSB can be used
for linear interpolation, if needed. This is similar to the sine and cosine table look-up in CMSIS.
The other option is to implement two separate tables to cover different regions of the functions. This
can improve accuracy, as both sigmoid and tanh functions are highly non-linear. Ideally, there should
be a table with finer granularity for an input region around 0 and another table with coarser granularity
8
for inputs with larger absolute values. In this case, the function first determines which table to use
based on the input data range, e.g. by looking at the MSB. After that, similar to the unified table
approach, the LSB can be used for calculating the table entries and interpolation.
Unlike periodic functions such as sine or cosine, it is important to determine the table range for
sigmoid and tanh functions. We determine that range of [−8, 8] works well enough for both functions,
as sigmoid(8) = 0.9997 and tanh(8) = 0.9999. We can also generate other versions of the look-up
table with different ranges, e.g. [−4, 4].
5
Experimental Results
We tested the CMSIS-NN kernels on a CNN trained on the CIFAR-10 dataset, consisting of 60,000
32x32 color images divided into 10 output classes. The network topology is based on the built-in
example provided in Caffe, with three convolution layers and one fully-connected layer. All the
layer weights and activation data are quantized to q7_t format. The layer parameters and the detailed
runtime results using the CMSIS-NN kernels are shown in the Table 1. The runtime is measured on a
NUCLEO-F746ZG Mbed board [14] with an Arm Cortex-M7 core running at 216 MHz.
Table 1: Layer parameters and performance for the CIFAR-10 CNN.
Layer 1
Layer 2
Layer 3
Layer 4
Layer 5
Layer 6
Layer 7
Total
Layer Type
Convolution
Max Pooling
Convolution
Max Pooling
Convolution
Max Pooling
Fully-connected
Filter Shape
5x5x3x32 (2.3 KB)
N.A.
5x5x32x32 (25 KB)
N.A.
5x5x32x64 (50 KB)
N.A.
4x4x64x10 (10 KB)
87 KB weights
Output Shape
32x32x32 (32 KB)
16x16x32 (8 KB)
16x16x32 (8 KB)
8x8x32 (2 KB)
8x8x64 (4 KB)
4x4x64 (1 KB)
10
55 KB activations
Ops
4.9 M
73.7 K
13.1 M
18.4 K
6.6 M
9.2 K
20 K
24.7 M
Runtime
31.4 ms
1.6 ms
42.8 ms
0.4 ms
22.6 ms
0.2 ms
0.1 ms
99.1 ms
The entire image classification takes about 99.1 ms per image (the equivalent of 10.1 images per
second). The compute throughput of the CPU is about 249 MOps per second for running this network.
The pre-quantized network achieves an accuracy of 80.3% on the CIFAR-10 test set. The 8-bit
quantized network running on Arm Cortex-M7 core achieves 79.9% accuracy. Maximum memory
footprint using the CMSIS-NN kernels is ∼133 KB, where convolutions are implemented with partial
im2col to save memory, followed by matrix-multiplication. Memory footprint without partial im2col
would be ∼332 KB and the neural network would not fit on the board.
To quantify the benefits of CMSIS-NN kernels over existing solutions, we also implemented a
baseline version using a 1D convolution function (arm_conv from CMSIS-DSP), Caffe-like pooling
and ReLU. For the CNN application, Table 2 summarizes the comparison results of the baseline
functions and the CMSIS-NN kernels. The CMSIS-NN kernels achieve 2.6X to 5.4X improvement
in runtime/throughput over the baseline functions. The energy efficiency improvement is also in line
with the throughput improvement.
Table 2: Throughput and energy efficiency improvments by layer types
Layer type
Baseline runtime
New kernel runtime
Convolution
Pooling
ReLU
Total
443.4 ms
11.83 ms
1.06 ms
456.4ms
96.4 ms
2.2 ms
0.4 ms
99.1 ms
9
Improvement
Throughput Energy Efficiency
4.6X
4.9X
5.4X
5.2X
2.6X
2.6X
4.6X
4.9X
6
Conclusion
We developed CMSIS-NN to maximize the performance and minimize the memory footprint of
neural networks on Arm Cortex-M CPUs. Neural network inference based on CMSIS-NN kernels
achieved 4.6X improvement in runtime/throughput and 4.9X improvement in energy efficiency for a
convolutional neural network targeting the CIFAR-10 dataset. The CMSIS-NN kernels are available
at https://github.com/ARM-software/CMSIS_5. The application code can directly use these
kernels to implement neural network algorithms on Arm Cortex-M CPUs. Alternatively, these kernels
can be used as primitives by machine learning frameworks to deploy trained models.
References
[1] Philip Sparks. The route to a trillion devices. https://community.arm.com/iot/b/blog/posts/whitepaper-the-route-to-a-trillion-devices.
[2] Weisong Shi, Jie Cao, Quan Zhang, Youhuizi Li, and Lanyu Xu. Edge computing: Vision and
challenges. IEEE Internet of Things Journal, 3(5):637–646, 2016.
[3] https://github.com/ARM-software/CMSIS_5.
[4] Martín Abadi, Ashish Agarwal, Paul Barham, Eugene Brevdo, Zhifeng Chen, Craig Citro,
Greg S Corrado, Andy Davis, Jeffrey Dean, Matthieu Devin, et al. Tensorflow: Large-scale
machine learning on heterogeneous distributed systems. arXiv preprint arXiv:1603.04467,
2016.
[5] Liangzhen Lai, Naveen Suda, and Vikas Chandra. Deep convolutional neural network inference
with floating-point weights and fixed-point activations. arXiv preprint arXiv:1703.03073, 2017.
[6] Darryl Lin, Sachin Talathi, and Sreekanth Annapureddy. Fixed point quantization of deep
convolutional networks. In International Conference on Machine Learning, pages 2849–2858,
2016.
[7] Naveen Suda, Vikas Chandra, Ganesh Dasika, Abinash Mohanty, Yufei Ma, Sarma Vrudhula,
Jae-sun Seo, and Yu Cao. Throughput-optimized opencl-based fpga accelerator for largescale convolutional neural networks. In Proceedings of the 2016 ACM/SIGDA International
Symposium on Field-Programmable Gate Arrays, pages 16–25. ACM, 2016.
[8] http://www.arm.com/products/processors/cortex-m.
[9] https://petewarden.com/2015/04/20/why-gemm-is-at-the-heart-of-deep-learning/.
[10] Chao Li, Yi Yang, Min Feng, Srimat Chakradhar, and Huiyang Zhou. Optimizing memory
efficiency for deep convolutional neural networks on gpus. In High Performance Computing,
Networking, Storage and Analysis, SC16: International Conference for, pages 633–644. IEEE,
2016.
[11] Andrew G Howard, Menglong Zhu, Bo Chen, Dmitry Kalenichenko, Weijun Wang, Tobias
Weyand, Marco Andreetto, and Hartwig Adam. Mobilenets: Efficient convolutional neural
networks for mobile vision applications. arXiv preprint arXiv:1704.04861, 2017.
[12] Yundong Zhang, Naveen Suda, Liangzhen Lai, and Vikas Chandra. Hello edge: Keyword
spotting on microcontrollers. arXiv preprint arXiv:1711.07128, 2017.
[13] Yangqing Jia, Evan Shelhamer, Jeff Donahue, Sergey Karayev, Jonathan Long, Ross Girshick,
Sergio Guadarrama, and Trevor Darrell. Caffe: Convolutional architecture for fast feature
embedding. arXiv preprint arXiv:1408.5093, 2014.
[14] Nucleo-f746zg development board. http://www.st.com/en/evaluation-tools/nucleo-f746zg.html.
10
| 9cs.NE
|
1
Green Stability Assumption: Unsupervised Learning
for Statistics-Based Illumination Estimation
arXiv:1802.00776v1 [cs.CV] 2 Feb 2018
Nikola Banić and Sven Lončarić
Abstract—In the image processing pipeline of almost every
digital camera there is a part dedicated to computational color
constancy i.e. to removing the influence of illumination on the
colors of the image scene. Some of the best known illumination
estimation methods are the so called statistics-based methods.
They are less accurate than the learning-based illumination
estimation methods, but they are faster and simpler to implement
in embedded systems, which is one of the reasons for their
widespread usage. Although in the relevant literature it often
appears as if they require no training, this is not true because
they have parameter values that need to be fine-tuned in order to
be more accurate. In this paper it is first shown that the accuracy
of statistics-based methods reported in most papers was not
obtained by means of the necessary cross-validation, but by using
the whole benchmark datasets for both training and testing. After
that the corrected results are given for the best known benchmark
datasets. Finally, the so called green stability assumption is proposed that can be used to fine-tune the values of the parameters of
the statistics-based methods by using only non-calibrated images
without known ground-truth illumination. The obtained accuracy
is practically the same as when using calibrated training images,
but the whole process is much faster. The experimental results
are presented and discussed. The source code is available at
http://www.fer.unizg.hr/ipg/resources/color constancy/.
Index Terms—Chromaticity, color constancy, Gray-edge, Grayworld, green, illumination estimation, Shades-of-Gray, standard
deviation, unsupervised learning, white balancing.
I. I NTRODUCTION
R
EGARDLESS of the influence of the scene illumination,
the human visual system can recognize object colors
through its ability known as color constancy [1]. In the image
processing pipeline of almost every digital camera there is
also a part dedicated to computational color constancy [2].
It first estimates the scene illumination and then uses it to
chromatically adapt the image i.e. to correct the colors. For
a more formal problem statement an often used image f
formation model written under Lambertian assumption is [3]
Z
fc (x) =
I(λ, x)R(λ, x)ρc (λ)dλ
(1)
ω
where c ∈ {R, G, B} is a color channel, x is a given image
pixel, λ is the wavelength of the light, ω is the visible spectrum, I(λ, x) is the spectral distribution of the light source,
This work has been supported by the Croatian Science Foundation under
Project IP-06-2016-2092.
Copyright (c) 2017 IEEE. Personal use of this material is permitted.
However, permission to use this material for any other purposes must be
obtained from the IEEE by sending a request to [email protected].
The authors are with the Image Processing Group, Department of Electronic Systems and Information Processing, Faculty of Electrical Engineering and Computing, University of Zagreb, 10000 Zagreb, Croatia (email:
[email protected]; [email protected]).
R(λ, x) is the surface reflectance, and ρc (λ) is the camera
sensitivity of color channel c. Assuming uniform illumination
for the sake of simplicity makes it possible to remove x from
I(λ, x) and then the observed light source color is given as
Z
eR
e = eG =
I(λ)ρ(λ)dλ.
(2)
ω
eB
The direction of e provides enough information for successful chromatic adaptation [4]. Still, calculating e is an illposed problem because only image pixel values f are given,
while both I(λ) and ρ(λ) are unknown. The solution to this
problem is to make additional assumptions. Different assumptions have given rise to numerous illumiantion estimation
methods that can be divided into two main groups. First
of these groups contains low-level statistics-based methods
such as White-patch [5], [6] and its improvements [7], [8],
[9], Gray-world [10], Shades-of-Gray [11], Grey-Edge (1st
and 2nd order) [12], Weighted Gray-Edge [13], using bright
pixels [14], using bright and dark colors [15]. The second
group includes learning-based methods such as gamut mapping (pixel, edge, and intersection based) [16], using neural networks [17], using high-level visual information [18],
natural image statistics [19], Bayesian learning [20], spatiospectral learning (maximum likelihood estimate, and with gen.
prior) [21], simplifying the illumination solution space [22],
[23], [24], using color/edge moments [25], using regression
trees with simple features from color distribution statistics [26], performing various kinds of spatial localizations [27],
[28], using convolutional neural networks [29], [30], [31].
Statistics-based illumination estimation methods are less
accurate than the learning-based ones, but they are faster and
simpler to implement in embedded systems, which is one of
the reasons for their widespread usage [32]. Although in the
relevant literature it often appears as if they require no training,
this is not true because they have parameter values that need
to be fine-tuned in order to give higher accuracy. In this paper
it is first shown that in most papers on illumination estimation
the accuracy of statistics-based methods was not obtained by
means of the necessary cross-validation, but by using the
whole benchmark datasets for both training and testing, which
leads to an unfair comparison between the methods. After that
the corrected results are given for the best known benchmark
datasets by performing the same cross-validation framework as
for other learning-based methods. Finally, the so called green
stability assumption is proposed that can be used to fine-tune
the values of the parameters of the statistics-based methods by
using only non-calibrated images without known ground-truth
illumination. The obtained accuracy is practically the same as
2
when using calibrated training images, but the whole process
is much faster and it can be directly applied in practice.
The paper is structured as follows: Section II briefly describes the best known statistics-based methods, Section III
shows that their accuracy data should be revisited, Section IV
proposes the green stability assumption, Section V presents
the results, and finally, Section VI concludes the paper.
II. B EST KNOWN STATISTICS - BASED METHODS
Some of the best known statistics-based illumination estimation methods are centered around the Gray-world assumption
and its extensions. Under this assumption the average scene
reflectance is achromatic [10] and e is therefore calculated as
R
f(x)dx
R
= ke
(3)
dx
where k ∈ [0, 1] is the reflectance amount with 0 meaning
no reflectance and 1 meaning total reflectance. By adding
the Minkowski norm p to Eq. (3), the Gray-world method
is generalized into the Shades-of-Gray method [11]:
1
R
p
(f(x)) dx p
R
= ke.
(4)
dx
Having p = 1 results in Gray-world, while p → ∞ results
in White-patch [5], [6]. In [12] Eq. (4) was extended to the
general Gray-world by introducing local smoothing:
R σ
1
p
(f (x)) dx p
R
= ke
(5)
dx
where fσ = f ∗ Gσ and Gσ is a Gaussian filter with standard
deviation σ. Another significant extension is the Grey-edge
assumption, under which the scene reflectance differences
calculated with derivative order n are achromatic [12] so that
Z
p1
p
∂ n (fσ (x))
dx
= ke.
(6)
∂nx
The described Shades-of-Gray, general Gray-world, and
Gray-edge methods have parameters and the methods’ accuracy depends on how the values of these parameters are tuned.
Nevertheless, in the literature it often appears as if they require
no training [3], [15], which is then said to be an advantage.
It may be argued that the parameter values are in most cases
the same, but this is easily disproved. In [15] for methods
mentioned in this section the best fixed parameter values were
given for ten different datasets. These values are similar for
some datasets, but overall they span two orders of magnitude.
With such high differences across different datasets in mind,
it is obvious that the parameter values have to be learned.
III. VALIDATION REVISITED
A. Angular error
Before recalculating the accuracy of the methods from the
previous section, some introduction to the used measures
is needed. From various proposed illumination estimation
accuracy measures [33], [34], [35], the angular error is most
commonly used. It represents the angle between the illumination estimation vector and the ground-truth illumination.
All angular errors obtained for a given method on a chosen
dataset are usually summarized by different statistics. Because
of the non-symmetry of the angular error distribution, the most
important of these statistics is the median angular error [36].
Angular errors below 3◦ are considered acceptable [37], [38].
The ground-truth illuminations of benchmark dataset images
are obtained by reading off calibration objects put in the image
scene, e.g. a gray ball or a color checker. When a method is
tested, these objects are masked out to prevent possible bias.
B. The need for cross-validation
When it comes to accuracy obtained on benchmark datasets,
the ones available in [3], at [39], and in [27] are the most
widely copied and referenced. If, for example, the results
obtained for Shades-of-Gray on the GreyBall dataset [40] are
checked [39], the reported mean and median angular errors of
6.1◦ and 5.3◦ , respectively, are obtained by setting p to 12 on
all 15 folds. However, by performing cross-validation i.e. by
looking for the best p on 14 training folds, applying this to
the test fold, and repeating it all 15 times clearly shows that p
differs for various training sets. Overall, the mean and median
errors for combined results of all test folds are 7.8◦ and 7.2◦ ,
respectively, which differs from the reported results. Similar
differences can be shown for other methods from Section II as
well. For the sake of fair comparison with other illumination
estimation methods, these accuracies are properly recalculated
and they are provided in Section V together with other results.
IV. T HE PROPOSED ASSUMPTION
A. Practical application
The methods mentioned in Section II are some of the most
widely used illumination estimation methods [32] and this
means that their parameters should preferably be appropriately
fine-tuned before putting them in production. The best way
to do this is to use a benchmark dataset, but because of
dependence of Eq. (2) on ρ(λ), a benchmark dataset would
be required for each used camera sensor. Since putting the
calibration objects into image scenes and later extracting the
ground-truth illumination is time consuming, it would be
better, if possible, to perform some kind of unsupervised
learning on non-calibrated images without known ground-truth
illumination. This would save time and be of practical value.
B. Motivation
When for a dataset the ground-truth illuminations are
unknown, an alternative is to make assumptions about the
nature of illumination estimations produced by statistics-based
methods when their parameters are fine-tuned and then to
meet the conditions of the assumptions. When considering the
nature of illumination estimations, a good starting point is the
observation that some statistics-based illumination estimations
appear ”to correlate roughly with the actual illuminant” [25].
Fig. 1 shows this for the images of the GreyBall dataset [40].
The points in Fig. 1 can be considered to occupy a space
around a line in the rb-chromaticity [22] which is connected
3
Fig. 1: The rb-chromaticities of the ground-truth
illuminations and Shades-of-Gray illumination estimations
for GreyBall dataset images [40] (best viewed in color).
to the fact that the green chromaticity of the ground-truth illuminations is relatively stable and similar for all illuminations.
For the GreyBall dataset the standard deviations of the red,
green, and blue chromaticity components of the ground-truth
illuminations are 0.0723, 0.0106, and 0.0750, respectively, and
similar results are obtained for all other datasets. For Shadesof-Gray illumination estimations shown in Fig. 1 the red,
green, and blue chromaticity components of the ground-truth
illuminations are 0.0842, 0.0253, and 0.0770, respectively,
which means that there is also a trend of green chromaticity
stability, although the standard deviation is greater than in the
case of ground-truth illumination. This means that if a set of
illumination estimations is to resemble the set of ground-truth
illuminations, the estimations’ green chromaticity standard
deviation should also be smaller and closer to the one of the
ground-truth. As a matter of fact, if for example the Shadesof-Gray illumination estimations for p = 2 and p = 15 shown
in Fig. 2 are compared, the standard deviations of their green
chromaticities are 0.0253 and 0.0158, respectively, while their
median angular errors are 6.2◦ and 5.3◦ , respectively. Similar
behaviour where lower green chromaticity standard deviation
is to some degree followed by lower median angular error can
be seen on all datasets and for all methods from Section II.
each method M ∈ M, where M contains all methods from
Section II, the Cartesian product of discrete sets of evenly
spread values for individual parameters of M was calculated
(i)
to get n tuples pM , i ∈ {1, 2, . . . , n}. Gray-world and Whitepatch have no parameters, but they were implicitly included as
(i)
special cases of Shades-of-Gray. Second, each pM was used
to set the parameter values of M and then M was applied to
all images of the GreyBall dataset to obtain an illumination
estimation for each of them. Third, for these illumination
estimations the standard deviation of their green chromaticities
σi and their median
angular error mi were calculated. Fourth,
for every of n2 possible pairs of indices i, j ∈ {1, 2, . . . , n}
such that i < j a new difference pair {∆σk , ∆mk } was
calculated such that ∆σk = σi − σj and ∆mk = mi − mj .
Finally, all such difference pairs created for all M ∈ M were
put together into set of pairs P. If members of pairs in P are
interpreted as coordinates, then their plot is shown in Fig. 3.
Fig. 3: Relation between difference in standard deviations of
illumination estimations’ green chromaticity and the
difference in illumination estimations’ median angular error.
C. Green stability assumption
The value of Person’s linear correlation coefficient for the
points in Fig. 3 is 0.7408, which indicates a strong positive
linear relationship [41]. In other words, the difference between
the standard deviations of green chromaticities of illumination
estimations produced by the same method when using different
parameter values is strongly correlated to the difference between median angular errors of these illumination estimations.
The same correlations for NUS datasets [15] are in Table I.
TABLE I: Correlation between difference in green
chromaticity standard deviation and difference in median
angular errors for NUS datasets [15].
Dataset
Correlation
Fig. 2: The rb-chromaticities of different Shades-of-Gray
illumination estimations for GreyBall dataset images [40]
(best viewed in color).
For a deeper insight into this behaviour, another experiment was conducted on the GreyBall dataset [40]. First, for
C1
0.9255
C2
0.6381
Fuji
0.8977
N52
0.9443
Oly
0.8897
Pan
0.9644
Sam
0.8902
Sony
0.9095
Based on this empirical results and observations, it is
possible to introduce the green stability assumption: the parameter values for which a method’s illumination estimations’
green chromaticity standard deviation is lower simultaneously
lead to lower illumination estimation errors. Like many other
assumptions, this assumption does not always hold, but it can
still be useful in cases when the ground-truth illuminations for
4
a set of images taken with a given sensor are not available.
These images should also be taken under similar illuminations
as the mentioned datasets that were used for empirical results.
For a specific case when the parameter values of a chosen
method are fine-tuned and only non-calibrated images are
available, the green stability assumption can be expressed more
formally. If n is the number of images in the training set, pi
is the i-th vector of parameter values, ei,j is the method’s
illumination estimation obtained for the j-th image when pi
is used for parameter values, ei,j
G is the green component of
ei,j , and eiG is the mean green component of illumination
estimations for all images obtained with parameters pi , then
under the green stability assumption the index i∗ of such pi∗
that should result in minimal angular errors is obtained as
v
2
uP
i,j
u n
i
e
−
e
t
G
G
j=1
.
(7)
i∗ = arg min
n
−
1
i
Since Eq. (7) performs minimization of standard deviation,
it can also be written without the square and the denominator.
TABLE II: Combined accuracy on eight NUS dataset (lower
Avg. is better). The used format is the same as in [28].
Algorithm
Mean Med. Tri.
Originally reported results
Shades-of-Gray [11]
3.67 2.94 3.03
General Gray-World [4]
3.20 2.56 2.68
1st-order Gray-Edge [12]
3.35 2.58 2.76
2nd-order Gray-Edge [12]
3.36 2.70 2.80
Revisited results
Shades-of-Gray [11]
3.48 2.63 2.81
General Gray-World [4]
3.37 2.49 2.61
1st-order Gray-Edge [12]
3.12 2.19 2.39
2nd-order Gray-Edge [12]
3.15 2.23 2.42
Green stability assumption results
Shades-of-Gray [11]
3.44 2.65 2.81
General Gray-World [4]
3.40 2.63 2.76
1st-order Gray-Edge [12]
3.29 2.36 2.55
2nd-order Gray-Edge [12]
3.29 2.44 2.59
Best Worst Avg.
25% 25%
0.98
0.85
0.79
0.89
7.75
6.68
7.18
7.14
3.01
2.63
2.67
2.76
0.81
0.73
0.71
0.74
7.62
7.58
7.11
7.13
2.76‘
2.61
2.42
2.46
0.83
0.77
0.79
0.83
7.41
7.42
7.36
7.30
2.75
2.69
2.58
2.63
TABLE III: Accuracy on the original GreyBall dataset
(lower median is better).
method
mean (◦ )
median (◦ )
Originally reported results
Shades-of-Gray [11]
6.14
5.33
General Gray-World [4]
6.14
5.33
1st-order Gray-Edge [12]
5.88
4.65
2nd-order Gray-Edge [12]
6.10
4.85
Revisited results
Shades-of-Gray [11]
7.80
7.15
General Gray-World [4]
7.61
6.85
1st-order Gray-Edge [12]
6.14
5.32
2nd-order Gray-Edge [12]
6.89
5.84
Green stability assumption results
Shades-of-Gray [11]
6.80
5.30
General Gray-World [4]
6.80
5.30
1st-order Gray-Edge [12]
5.97
4.64
2nd-order Gray-Edge [12]
6.69
5.17
TABLE IV: Accuracy on the linear GreyBall dataset (lower
median is better).
method
mean (◦ )
median (◦ )
Originally reported results
Shades-of-Gray [11]
11.55
9.70
General Gray-World [4]
11.55
9.70
1st-order Gray-Edge [12]
10.58
8.84
2nd-order Gray-Edge [12]
10.68
9.02
Revisited results
Shades-of-Gray [11]
13.32
11.57
General Gray-World [4]
13.69
12.11
1st-order Gray-Edge [12]
11.06
9.54
2nd-order Gray-Edge [12]
10.73
9.21
Green stability assumption results
Shades-of-Gray [11]
12.68
10.50
General Gray-World [4]
12.68
10.50
1st-order Gray-Edge [12]
13.41
11.04
2nd-order Gray-Edge [12]
12.83
10.70
trimean (◦ )
10.23
10.23
9.18
9.40
12.10
12.55
9.81
9.49
11.25
11.25
11.87
11.44
newly calculated accuracy results for methods mentioned in
Section II and to test the effectiveness of the proposed green
stability assumption: the GreyBall dataset [40], its approximated linear version, and eight linear NUS dataset [15]. The
ColorChecker dataset [20], [42] was not used because of
its confusing history of wrong usage despite warnings from
leading experts [43]. Except the original GreyBall dataset,
all other contain linear images, which is preferred because
illumination estimation is in cameras usually performed on
linear images [2] similar to the model described by Eq. (1).
The tested methods include all the ones from M. During
cross-validation on all datasets the same folds were used as in
other publications. The source code for recreating the numerical results given in the following subsection is publicly available at http://www.fer.unizg.hr/ipg/resources/color constancy/.
B. Accuracy
Tables II, III, and IV show the previously reported accuracies, the newly recalculated accuracies, and the accuracies
obtained by using the green stability assumption. The results
clearly confirm the potential and the practical applicability
of the green stability assumption. This also demonstrates the
success of unsupervised learning for illumination estimation.
trimean (◦ )
5.51
5.51
5.11
5.28
7.21
6.92
5.49
6.06
5.77
5.77
5.10
5.72
V. E XPERIMENTAL RESULTS
A. Experimental setup
The following benchmark datasets have been used to
demonstrate the difference between previously reported and
VI. C ONCLUSIONS AND FUTURE RESEARCH
In most relevant papers the accuracy results for some of
the most widely used statistics-based methods were calculated without cross-validation. Here it was shown that crossvalidation is needed and the accuracy results were revisited.
When statistics-based methods are fine-tuned, the best way to
do this is by using images with known ground-truth illumination. Based on several observations and empirical evidence,
the green stability assumption has been proposed that can be
successfully used to fine-tune the parameters of statistics-based
methods when only non-calibrated images without groundtruth illumination are available. This makes the whole finetuning process much simpler, faster, and more practical. It is
also an unsupervised learning approach to color constancy.
In future, other similar bases for further assumptions for
unsupervised learning for color constancy will be researched.
5
R EFERENCES
[1] M. Ebner, Color Constancy, ser. The Wiley-IS&T Series in Imaging
Science and Technology. Wiley, 2007.
[2] S. J. Kim, H. T. Lin, Z. Lu, S. Süsstrunk, S. Lin, and M. S. Brown, “A
new in-camera imaging model for color computer vision and its application,” IEEE Transactions on Pattern Analysis and Machine Intelligence,
vol. 34, no. 12, pp. 2289–2302, 2012.
[3] A. Gijsenij, T. Gevers, and J. Van De Weijer, “Computational color constancy: Survey and experiments,” Image Processing, IEEE Transactions
on, vol. 20, no. 9, pp. 2475–2489, 2011.
[4] K. Barnard, V. Cardei, and B. Funt, “A comparison of computational
color constancy algorithms. i: Methodology and experiments with synthesized data,” Image Processing, IEEE Transactions on, vol. 11, no. 9,
pp. 972–984, 2002.
[5] E. H. Land, The retinex theory of color vision. Scientific America.,
1977.
[6] B. Funt and L. Shi, “The rehabilitation of MaxRGB,” in Color and
Imaging Conference, vol. 2010, no. 1. Society for Imaging Science
and Technology, 2010, pp. 256–259.
[7] N. Banić and S. Lončarić, “Using the Random Sprays Retinex Algorithm
for Global Illumination Estimation,” in Proceedings of The Second
Croatian Computer Vision Workshopn (CCVW 2013). University of
Zagreb Faculty of Electrical Engineering and Computing, 2013, pp. 3–
7.
[8] ——, “Color Rabbit: Guiding the Distance of Local Maximums in
Illumination Estimation,” in Digital Signal Processing (DSP), 2014 19th
International Conference on. IEEE, 2014, pp. 345–350.
[9] ——, “Improving the White patch method by subsampling,” in Image
Processing (ICIP), 2014 21st IEEE International Conference on. IEEE,
2014, pp. 605–609.
[10] G. Buchsbaum, “A spatial processor model for object colour perception,”
Journal of The Franklin Institute, vol. 310, no. 1, pp. 1–26, 1980.
[11] G. D. Finlayson and E. Trezzi, “Shades of gray and colour constancy,” in
Color and Imaging Conference, vol. 2004, no. 1. Society for Imaging
Science and Technology, 2004, pp. 37–41.
[12] J. Van De Weijer, T. Gevers, and A. Gijsenij, “Edge-based color
constancy,” Image Processing, IEEE Transactions on, vol. 16, no. 9,
pp. 2207–2214, 2007.
[13] A. Gijsenij, T. Gevers, and J. Van De Weijer, “Improving color constancy by photometric edge weighting,” Pattern Analysis and Machine
Intelligence, IEEE Transactions on, vol. 34, no. 5, pp. 918–929, 2012.
[14] H. R. V. Joze, M. S. Drew, G. D. Finlayson, and P. A. T. Rey,
“The Role of Bright Pixels in Illumination Estimation,” in Color and
Imaging Conference, vol. 2012, no. 1. Society for Imaging Science
and Technology, 2012, pp. 41–46.
[15] D. Cheng, D. K. Prasad, and M. S. Brown, “Illuminant estimation for
color constancy: why spatial-domain methods work and the role of the
color distribution,” JOSA A, vol. 31, no. 5, pp. 1049–1058, 2014.
[16] G. D. Finlayson, S. D. Hordley, and I. Tastl, “Gamut constrained illuminant estimation,” International Journal of Computer Vision, vol. 67,
no. 1, pp. 93–109, 2006.
[17] V. C. Cardei, B. Funt, and K. Barnard, “Estimating the scene illumination
chromaticity by using a neural network,” JOSA A, vol. 19, no. 12, pp.
2374–2386, 2002.
[18] J. Van De Weijer, C. Schmid, and J. Verbeek, “Using high-level visual
information for color constancy,” in Computer Vision, 2007. ICCV 2007.
IEEE 11th International Conference on. IEEE, 2007, pp. 1–8.
[19] A. Gijsenij and T. Gevers, “Color Constancy using Natural Image
Statistics.” in CVPR, 2007, pp. 1–8.
[20] P. V. Gehler, C. Rother, A. Blake, T. Minka, and T. Sharp, “Bayesian
color constancy revisited,” in Computer Vision and Pattern Recognition,
2008. CVPR 2008. IEEE Conference on. IEEE, 2008, pp. 1–8.
[21] A. Chakrabarti, K. Hirakawa, and T. Zickler, “Color constancy with
spatio-spectral statistics,” Pattern Analysis and Machine Intelligence,
IEEE Transactions on, vol. 34, no. 8, pp. 1509–1519, 2012.
[22] N. Banić and S. Lončarić, “Color Cat: Remembering Colors for Illumination Estimation,” Signal Processing Letters, IEEE, vol. 22, no. 6, pp.
651–655, 2015.
[23] ——, “Using the red chromaticity for illumination estimation,” in Image
and Signal Processing and Analysis (ISPA), 2015 9th International
Symposium on. IEEE, 2015, pp. 131–136.
[24] N. Banić and S. Lončarić, “Color Dog: Guiding the Global Illumination
Estimation to Better Accuracy,” in VISAPP, 2015, pp. 129–135.
[25] G. D. Finlayson, “Corrected-moment illuminant estimation,” in Proceedings of the IEEE International Conference on Computer Vision, 2013,
pp. 1904–1911.
[26] D. Cheng, B. Price, S. Cohen, and M. S. Brown, “Effective learningbased illuminant estimation using simple features,” in Proceedings of the
IEEE Conference on Computer Vision and Pattern Recognition, 2015,
pp. 1000–1008.
[27] J. T. Barron, “Convolutional Color Constancy,” in Proceedings of the
IEEE International Conference on Computer Vision, 2015, pp. 379–387.
[28] J. T. Barron and Y.-T. Tsai, “Fast Fourier Color Constancy,” in Computer
Vision and Pattern Recognition, 2017. CVPR 2017. IEEE Computer
Society Conference on, vol. 1. IEEE, 2017.
[29] S. Bianco, C. Cusano, and R. Schettini, “Color Constancy Using CNNs,”
in Proceedings of the IEEE Conference on Computer Vision and Pattern
Recognition Workshops, 2015, pp. 81–89.
[30] W. Shi, C. C. Loy, and X. Tang, “Deep Specialized Network for
Illuminant Estimation,” in European Conference on Computer Vision.
Springer, 2016, pp. 371–387.
[31] Y. Hu, B. Wang, and S. Lin, “Fully Convolutional Color Constancy
with Confidence-weighted Pooling,” in Computer Vision and Pattern
Recognition, 2017. CVPR 2017. IEEE Conference on. IEEE, 2017, pp.
4085–4094.
[32] Z. Deng, A. Gijsenij, and J. Zhang, “Source camera identification using
Auto-White Balance approximation,” in Computer Vision (ICCV), 2011
IEEE International Conference on. IEEE, 2011, pp. 57–64.
[33] A. Gijsenij, T. Gevers, and M. P. Lucassen, “Perceptual analysis of
distance measures for color constancy algorithms,” JOSA A, vol. 26,
no. 10, pp. 2243–2256, 2009.
[34] G. D. Finlayson and R. Zakizadeh, “Reproduction angular error: An
improved performance metric for illuminant estimation,” perception, vol.
310, no. 1, pp. 1–26, 2014.
[35] N. Banić and S. Lončarić, “A Perceptual Measure of Illumination
Estimation Error,” in VISAPP, 2015, pp. 136–143.
[36] S. D. Hordley and G. D. Finlayson, “Re-evaluating colour constancy
algorithms,” in Pattern Recognition, 2004. ICPR 2004. Proceedings of
the 17th International Conference on, vol. 1. IEEE, 2004, pp. 76–79.
[37] G. D. Finlayson, S. D. Hordley, and P. Morovic, “Colour constancy
using the chromagenic constraint,” in Computer Vision and Pattern
Recognition, 2005. CVPR 2005. IEEE Computer Society Conference on,
vol. 1. IEEE, 2005, pp. 1079–1086.
[38] C. Fredembach and G. Finlayson, “Bright chromagenic algorithm for
illuminant estimation,” Journal of Imaging Science and Technology,
vol. 52, no. 4, pp. 40 906–1, 2008.
[39] T. G. A. Gijsenij and J. van de Weijer. (2017) Color Constancy
— Research Website on Illuminant Estimation. [Online]. Available:
http://colorconstancy.com/
[40] F. Ciurea and B. Funt, “A large image database for color constancy
research,” in Color and Imaging Conference, vol. 2003, no. 1. Society
for Imaging Science and Technology, 2003, pp. 160–164.
[41] D. J. Rumsey, U Can: statistics for dummies. John Wiley & Sons,
2015.
[42] B. F. L. Shi. (2015, May) Re-processed Version of the Gehler
Color Constancy Dataset of 568 Images. [Online]. Available:
http://www.cs.sfu.ca/colour/data/
[43] S. E. Lynch, M. S. Drew, and k. G. D. Finlayson, “Colour Constancy
from Both Sides of the Shadow Edge,” in Color and Photometry in
Computer Vision Workshop at the International Conference on Computer
Vision. IEEE, 2013.
| 1cs.CV
|
ENDOMORPHISM FIELDS OF ABELIAN VARIETIES
arXiv:1606.02803v2 [math.NT] 4 Jun 2017
ROBERT GURALNICK AND KIRAN S. KEDLAYA
Abstract. We give a sharp divisibility bound, in terms of g, for the degree of the field
extension required to realize the endomorphisms of an abelian variety of dimension g over
an arbitrary number field; this refines a result of Silverberg. This follows from a stronger
result giving the same bound for the order of the component group of the Sato-Tate group
of the abelian variety, which had been proved for abelian surfaces by Fité–Kedlaya–Rotger–
Sutherland. The proof uses Minkowski’s reduction method, but with some care required in
the extremal cases when p equals 2 or a Fermat prime.
1. Introduction
For A an abelian variety over a field K, the endomorphism field of A is the minimal
algebraic extension L of K such that EndpAL q “ EndpAL q. The purpose of this paper is to
establish a bound on the degree rL : Ks in terms of the dimension of A; more precisely, we
compute the LCM of all possible degrees as A, K vary while dimK A remains fixed.
Before stating our result, we state a prior result of Silverberg [8] which already contains
many of the main ideas. For g a positive integer and p a prime, define
^
8 Z
ÿ
2g
rpg, pq :“
.
i
pp
´
1qp
i“0
Theorem 1.1 (Silverberg). For A an abelian variety of dimension g over a number
K,
śfield
rpg,pq
the endomorphism field of A is a finite Galois extension of K of degree dividing 2ˆ p p
.
The proof [8, Theorem 4.1] is elegantly simple: one verifies that for each prime ℓ ą 2, the
Galois group of the endomorphism field extension is isomorphic (via its action on ℓ-torsion
points) to a subquotient of the group Spp2g, Fℓq. The bound is then obtained by taking the
greatest common divisor of the orders of these finite groups. This echoes the method used
by Minkowski to bound the order of a finite group of integer matrices (as exposed in [3]); we
will return to this analogy a bit later.
From this proof, it is not clear whether one should expect the bound of Theorem 1.1 to be
sharp. However, a moment’s thought shows that it is not sharp for g “ 1: the bound is 24 ˆ 3
but the optimal bound is obviously 2, with the worst case being an elliptic curve whose CM
field is not contained in K. More seriously, for g “ 2, the bound of Theorem 1.1 is 28 ˆ 32 ˆ 5,
but (as will be explained shortly) the work of Fité–Kedlaya–Rotger–Sutherland [2] implies
that the optimal bound is 24 ˆ 3. This raises the question of identifying the discrepancy
between Theorem 1.1 and the optimal bound, and this is achieved by our main result.
Date: May 30, 2017.
Thanks to Francesc Fité, Gaël Rémond, Jean-Pierre Serre, Alice Silverberg, and Andrew Sutherland for
feedback. Guralnick was partially supported by NSF grants DMS-1302886 and DMS-1600056. Kedlaya was
supported by NSF grant DMS-1501214 and UC San Diego (Warschawski Professorship).
1
Theorem 1.2. For A an abelian variety of dimension g ą 0 over a number field K, the
degree over K of the endomorphism field of A divides
$
’
if p “ 2;
&rpg, pq ´ g ´ 1
ź 1
r pg,pq
1
p
,
r pg, pq :“ maxt0, rpg, pq ´ 1u if p is a Fermat prime;
’
%rpg, pq
p
otherwise.
Moreover, for fixed g, p (but varying over all K), this value of r 1 pg, pq is best possible.
To give one more example, for g “ 3, the bound from Theorem 1.1 is 211 ˆ 34 ˆ 5 ˆ 7
whereas the optimal bound is 26 ˆ 33 ˆ 7. It is easy to see that the factor of 7 is necessary,
e.g., by considering twists of the Klein quartic (see [5, §4]).
As in [2], our approach uses the relationship between the endomorphism field L of A
and the Sato-Tate group of A; the latter is a compact Lie group whose component group
surjects canonically onto GalpL{Kq, and the bound we ultimately prove is for the order of the
component group (see Theorem 5.4). The Sato-Tate group is constructed as a compact form
of a certain linear algebraic group over Q, the algebraic Sato-Tate group, which allows us to
bound the order of the component group using a variant of Minkowski’s method. One key
point is that the extremal cases occur for CM abelian varieties, for which the connected part
of the algebraic Sato-Tate group is a torus which splits over a CM field; what distinguishes a
Fermat prime p in this context is that Qpµp q contains no proper subfield which is CM. (For
p “ 2, the same statement about Qpµ4 q plays an analogous role.)
To prove that Theorem 1.2 is sharp, we use the relationship between twisting of abelian
varieties and Sato-Tate groups; this reduces the problem to exhibiting abelian varieties admitting actions by large finite groups, which we achieve using CM abelian varieties and the
same wreath product construction as in Minkowski’s theorem. Note that the fields of definition of the resulting abelian varieties are controlled by class groups of abelian number fields,
so we are unable to establish lower bounds over any fixed number field.
To conclude this introduction, we comment on the subtler problem of giving bounds by
size, rather than divisibility. As described in [3, §6], results of Weisfeiler and Feit can be
combined with the classification of finite simple groups to show that for n ą 10, the largest
finite subgroups of GLpn, Qq have order 2n n! (and are unique up to conjugacy). For abelian
varieties of sufficiently large dimension g, one would expect that the largest possible endomorphism field extension, and the largest possible component group of the Sato-Tate group, are
obtained by twisting a power of an elliptic curve with j-invariant 0 using an automorphism
group of order 6g g! (note that these examples already occur over Q). For the endomorphism
field, this expectation has been confirmed by work of Rémond [6]; it is highly likely that
a similar analysis applies to the component group (because the cases where the two differ
tend not to have enough CM to trouble the bounds), but this would require some additional
argument.
2. Group schemes
We start with some notation. Our notation choices are not entirely typical; they are made
to help us distinguish between groups and group schemes.
Definition 2.1. For G a group scheme (over some base), we write GX for the base extension
of G to the base scheme X, and GpXq for the group of X-valued points of G. We say that
2
G is pointful over X if GpXq occupies a Zariski-dense subset of G. By convention, all group
schemes we consider will be smooth and linear; the standard linear groups will be considered
as schemes over Z, and we will write GLpn, Xq instead of GLpnqpXq and so on.
For G a group scheme over a connected base, let G˝ denote the identity connected component, and write π0 pGq :“ G{G˝ for the group of connected components, viewed as a finite
group scheme over the same base. If G is pointful, then so are both G˝ and G{G˝ .
For L{K a finite extension of fields and G a group scheme over Spec L, write ResLK G for
the Weil restriction of scalars of G to Spec K.
Example 2.2. For n a positive integer, the n-torsion subscheme of the multiplicative group
over Q is the group scheme Spec Qrxs{pxn ´ 1q which is obviously defined over Q. However,
it is only pointful for n “ 1, 2.
Definition 2.3. For G a group scheme, let OutpGq be the group scheme of outer automorphisms of G, i.e., the cokernel of the map G Ñ AutpGq induced by conjugation. Note that for
G a group scheme over a field k which is not algebraically closed, an element of AutpGqpkq
may map trivially to OutpGqpkq even though it does not come from the image of Gpkq; that
is, the scheme-theoretic notion of an outer automorphism disagrees with the group-theoretic
notion because the latter is not stable under base extension.
3. Minkowski’s method
We next formulate our version of Minkowski’s reduction method. We implicitly follow [3],
but see also [7] for another detailed treatment (both considering only finite groups).
Throughout §3, let G be a group scheme over a number field K.
Definition 3.1. By convention G is a scheme of finite type over K, so it can be extended
to a group scheme over oK r1{Ns for some positive integer N. In particular, it makes sense
to form the base extension of G to Fq :“ oK {q for all but finitely many prime ideals q of oK .
Let H be a finite pointful subquotient group scheme of G. By the previous paragraph,
HpKq is isomorphic to a subquotient of GpFq q for all but finitely many q; in particular, for
each prime p, any p-Sylow subgroup of HpKq is isomorphic to a subquotient of a p-Sylow
subgroup of GpFq q for all but finitely many q.
To translate this into a numerical bound, define the nonnegative integers rpG, pq by the
formula
ź
prpG,pq “ suptgcd #GpFq qu
p
S
qPS
where S runs over all cofinite
of prime ideals of oK . Then the preceding discussion implies
ś sets
rpG,pq
that H has order dividing p p
; in particular, this bound applies to the component group
of any pointful subgroup scheme of G.
We collect some remarks related to this construction.
Remark 3.2. Suppose that there exists a finite pointful subquotient group scheme H of G
such that the p-part of #H equals the upper bound prpG,pq . Let P be a p-Sylow subgroup of
H; then for infinitely many q, P has the same cardinality as a p-Sylow subgroup of GpFq q,
so by Sylow’s theorem the two must be isomorphic. That is, the isomorphism type of P is
uniquely determined by G.
3
Remark 3.3. Let H be a pointful subgroup scheme of G. Then #π0 pHq divides
for
ź
pδpG,pq “ inf tgcd #H ˝ pFq qu.
S
p
ś
p
prpG,pq´δpG,pq
qPS
Remark 3.4. In light of Wedderburn’s theorem, for any number field K and any twisted
form G of GLpnqK one has rpG, pq “ rpGLpnqK , pq.
Remark 3.5. For each prime p, the group Cp ≀ Stn{pp´1qu embeds into GLpn, Qq, as then do
its p-Sylow subgroups. The original theorem of Minkowski asserts that the conjugates of the
latter are the largest possible p-subgroups of GLpn, Qq. However, if we compare this to the
values
Z
^ Z
^ Z
^
n
n
n
rpGLpnqQ , pq “
`
` 2
` ¨¨¨
pp ą 2q
p´1
ppp ´ 1q
p pp ´ 1q
Yn] Yn]
`
` ¨¨¨ ,
rpGLpnqQ , 2q “ n ` 2
2
4
we see that theX Minkowski
bound is only sharp for p ą 2; for p “ 2, the Minkowski bound
\
n
is too large by 2 , and one must supplement using some extra analysis involving quadratic
forms over finite fields [3, §5]. For this reason, we do not know whether the example Cp ≀
Stn{pp´1qu is optimal also for subquotients when p “ 2.
Remark 3.6. For K a number field, the Chebotarev density theorem implies that rpGLpnqK , pq
depends only on K X Qpµp8 q. For
mpK, pq :“ mintm ě 1 : K X Qpµpm q “ K X Qpµp8 qu
for p ą 2 we have
(3.1)
tpK, pq :“ rQpµpmpK,pq q : K X QpµpmpK,pq qs,
^ Z
^ Z
^
n
n
n
`
` 2
` ¨¨¨
rpGLpnqK , pq “ mpK, pq
tpK, pq
ptpK, pq
p tpK, pq
Z
and this bound is again optimal (see [3, §5.3] for a detailed discussion).
For p “ 2, the situation depends crucially on whether Qpζ4 q Ď K. If so, then tpK, 2q “ 1,
Yn] Yn]
`
` ¨¨¨ ,
(3.2)
rpGLpnqK , 2q “ mpK, 2qn `
2
4
Sn . If not, the situation is more complicated;
and this bound is optimal, achieved by C2mpK,2q ≀ ?
we limit ourselves?to observing that for K “ Qp ´2q we have rpGLpnq
K , 2q “ rpGLpnqQ , 2q,
X \
while for K “ Qp 2q we have rpGLpnqK , 2q “ rpGLpnqQ , 2q ` n2 .
Remark 3.7. Although we do not need this for our main result, we note in passing the
following corollary of Remark 3.6 (which only affects the prime p “ 2): the
divisibility
ś optimal
rpGLpgqQpiq ,2q
rpGLp2gq,pq
bound for the order of a finite subgroup of Spp2g, Qq is 2
. This
pą2 p
comes down to the fact that any irreducible finite subgroup of Spp2g, Qq is centralized by
some totally imaginary number field [4, Lemma 2.3].
Remark 3.8. It is natural to use Minkowski’s method as a starting point for bounding
the order of finite subgroups of any reductive group over any field. This has been discussed
extensively by Serre [7].
4
4. Comparison of Minkowski bounds
For our purposes, it will be important to compare the Minkowski bounds for various
group/subgroup pairs. The key points will be to identify discrepancies for p “ 2, and to
isolate cases for p ą 2 where the bound for the subgroup matches that of the full group.
Remark 4.1. A trivial but useful observation along these lines is that for n ě 1, p ą 2,
d ą 1,
rpGLpdnqQ , pq ą rpGLpnqQ , pq
whenever rpGLpdnqQ , pq ą 0.
A slightly less trivial observation is that for n ě 1,
rpGLpnqQpiq , 2q ą rpGLpnqQ , 2q.
Lemma 4.2. Let K be a number field of degree d over Q. For each integer n ě 1 and each
odd prime p,
rpGLpdnqQ , pq ě rpGLpnqK , pq ` rpSd , pq;
moreover, if n ą 1 and mpK, pq ą 1, or if d ě ppp ´ 1q, then the inequality is strict.
Proof. There is nothing to check when d “ 1, so we may assume d ě 2. Put m “ mpK, pq,
t “ tpK, pq; then the desired inequality is
Z
^ Z
^
Z ^ Z ^
Yn] Z n ^
dn
dn
d
d
`
` ¨¨¨ ě m
`
` ¨¨¨`
` 2 ` ¨¨¨ .
p´1
ppp ´ 1q
t
pt
p
p
d
equals 1t times the integer pm´1 which is
From the equality dt “ pm´1 pp ´ 1q, we see that p´1
no less than m (and strictly greater than m if m ą 1). Consequently, by writing the difference
between the two sides as
Z
^
Z ^ Z ^
Y n ] Z dn ^ Z n ^
dn
d
d
´m
`
´
` ¨¨¨`
` 2 ` ¨¨¨ ,
p´1
t
ppp ´ 1q
pt
p
p
we see that this difference does not decrease if we increase n by 1 (and strictly increases if
m ą 1). If n “ 1, then the desired inequality becomes rpGLpdqQ , pq ě rpSd , pq, which holds
because Sd embeds into GLpd, Qq; this equality is strict whenever d ě ppp ´ 1q. This proves
the claim.
Corollary 4.3. For K a number field of degree d, for p ą 2 we have
(4.1)
rpGLpdnqQ , pq ě rpAutpK{Qq ˙ ResK
Q GLpnqK , pq.
Moreover, if K Ę Qpµp q, K is not the degree-p subextension of Qpµp2 q, and rpGLpdnqQ , pq ‰
0, then the equality is strict.
Proof. The inequality (4.1) holds because AutpK{Qq ˙ ResK
Q GLpnqK embeds into GLpdnqQ .
We thus only need to obtain a contradiction assuming that K Ę Qpµp q, K is not the degree-p
subextension of Qpµp2 q, rpGLpdnqQ , pq ą 0, and equality holds in (4.1).
Note that (4.1) also follows from Lemma 4.2, so equality must also hold in the latter. By
Remark 3.6, if K 1 :“ K X Qpµp8 q has degree d1 ‰ d, then rpGLpnqK , pq “ rpGLpnqK 1 , pq; we
then get the strict inequality by applying Lemma 4.2 to the field K 1 and invoking Remark 4.1
(using the condition that rpGLpdnqQ , pq ą 0). We must therefore have K “ K 1 and hence
K Ď Qpµp8 q; since we assumed K Ę Qpµp q, this implies that mpK, pq ą 1. To have equality
in Lemma 4.2, we must then have n “ 1 and d ă ppp ´ 1q.
5
Since mpK, pq ą 1, K must contain the degree-p subextension of Qpµp2 q, necessarily
strictly by hypothesis; hence d{p is an integer strictly greater than 1. By the bound on d, we
cannot then have Qpµp q Ď K, so rpGLp1qK , pq “ 0. Meanwhile, K is an abelian extension
of Q, so rpAutpK{Qq, pq “ 1. However, since d ě 2p, rpGLpdqQ , pq ě 2, yielding the desired
contradiction.
Corollary 4.4. For any integers n, d ą 1, for each odd prime p for which rpGLpndqQ , pq ą 0,
we have
rpGLpdnqQ , pq ą rpGLpnqQ , pq ` rpSd , pq.
Proof. XWe\ first reduce to the case where d is even. Namely, we may do this by replacing d
with 2 d2 except if d is odd, rpGLpdnqQ , pq ą 0, and rpGLppd ´ 1qnqQ , pq “ 0. This implies
pd ´ 1qn ă p ´ 1 ď dn, which implies on one hand that n ă p ´ 1 and rpGLpnqQ , pq “ 0, and
on the other hand that d ´ 1 ă p ´ 1 and so rpSd , pq “ 0; this yields the claimed inequality.
For any number field K of even degree d, by Lemma 4.2 we have
rpGLpdnqQ , pq ě rpGLpnqK , pq ` rpSd , pq ě rpGLpnqQ , pq ` rpSd , pq,
so it suffices to confirm that both equalities cannot hold simultaneously. Since we are free
to choose K, we take it to contain the quadratic subfield of Qpµp q; then by Remark 3.6, we
have rpGLpnqK , pq ą rpGLpnqQ , pq unless both quantities equal zero. It thus suffices to rule
out the equality rpGLpdnqQ , pq “ rpSd , pq; since rpGLpdqQ , pq ě rpSd , pq, this follows from
Remark 4.1.
For p “ 2, we have the following analogue of Corollary 4.3.
Remark 4.5. For K{F an extension of number fields of degree d, we obviously have
rpGLpdnqF , 2q ě rpAutpK{F q ˙ ResK
F GLpnqK , 2q.
In case F “ Qpiq, one can show using Remark 3.2 that equality holds only when d “ 1;
however, we will not need this.
For p “ 2, we have the following analogue of Corollary 4.4.
Lemma 4.6. For any integers n, d ą 1 such that g “ dn{2 is an integer,
rpGLpgqQpiq , 2q ě rpGLpnqQ , 2q ` rpSd , 2q
with equality only for pn, dq “ p2, 2q.
Proof. We are claiming that
Z ^ Z ^
Z ^ Z ^
Yn] Yn]
dn
dn
d
d
dn `
`
` ¨¨¨ ě n` 2
`
` ¨¨¨`
`
` ¨¨¨
4
8
2
4
2
4
X \
with equality only for pn, dq “ p2, 2q. For d “ 2, this inequality becomes n ě n2 ` 1; for
n “ 2, it becomes 2d ě 4. It thus remains to check the cases where n, d ě 3.
We may write the difference between the two sides as
ˆZ ^ Z ^˙ ˆZ ^ Z ^˙
Yn] Yn]
dn
d
dn
d
pd ´ 1qn `
´
`
´
` ¨¨¨´ 2
´
´ ¨¨¨ ;
4
2
8
4
2
4
in particular, for n ě 2 fixed, this difference increases if we increase d by 2. Using the previous
paragraph, we deduce the claim when d is even. For d odd, we may argue that
rpGLpgqQpiq , 2q ě rpGLpg ´ n{2qQpiq , 2q ě rpGLpnqQ , 2q ` rpSd´1, 2q “ rpGLpnqQ , 2q ` rpSd , 2q
6
with strict inequality if n ą 2.
5. Abelian varieties and Sato-Tate groups
We now specialize to the cases of interest for abelian varieties.
Definition 5.1. For A an abelian variety over a number field K, let ASTpAq denote the
algebraic Sato-Tate group of A in the sense of [1, Definition 9.5]. The key properties that we
need are the following.
‚ The group scheme ASTpAq is a pointful subgroup scheme of Spp2gqQ whose connected
part is reductive. The connected part is closely related to the Mumford-Tate group
of A.
‚ There exists a torus T Ă ASTpAq˝C which acts on C2g with weights 1, ´1 each with
multiplicity g. In particular, the fixed space of ASTpAq is the zero subspace.
‚ The component group π0 pAq surjects onto GalpL{Kq for L the endomorphism field of
A; this map is a bijection whenever the Mumford-Tate group is completely explained
by endomorphisms (which holds in all cases when g ď 3 but can fail for g ě 4, as
originally shown by Mumford). Moreover, for K 1 a finite extension of K, ASTpAK 1 q
is the inverse image of GalpLK 1 {K 1 q Ď GalpL{Kq in ASTpAq.
‚ Any decomposition of Q2g into indecomposable ASTpAq-modules corresponds to a
product-up-to-isogeny decomposition of A.
‚ The group ASTpAq is a torus if and only if A is isogenous to a product of abelian
varieties with CM defined over K.
Example 5.2. Put
?
?
?
M1 :“ Qpiq, M2 :“ Qp ´2q, M3 :“ Qp ´3q, M4 :“ Qp ´6q
and let K be the compositum of these four fields. Let A be the product of four elliptic curves
E1 , . . . , E4 with CM by M1 , . . . , M4 , respectively. Then ASTpAq is a torus of dimension 3.
Remark 5.3. The Sato-Tate group of A, as studied for abelian surfaces in [2], is a maximal
compact subgroup of ASTpA, Cq; it therefore has the same component group as ASTpAq.
On one hand, this means that the argument using algebraic Sato-Tate groups in the proof of
Theorem 5.4 directly applies also to the component groups of Sato-Tate groups; on the other
hand, the conclusion of Theorem 5.4 in the case g “ 2 is a consequence of [2, Theorem 4.3],
which will save a bit of case analysis.
We prove the upper bound assertion of Theorem 1.2 by establishing the following result.
Theorem 5.4. For A an abelian variety of dimension g over a number field K, the component group of the algebraic
ś 1 Sato-Tate group of A (or equivalently, the Sato-Tate group of A)
has order dividing p pr pg,pq .
Proof. Put G “ ASTpAq. It suffices to check the claimed divisibility for the p-part of #π0 pGq;
this is immediate from Remark 3.5 (applied with n “ 2g) unless p “ 2 or p is a Fermat prime.
In light of Remark 5.3, we may assume further that g ě 3.
Note that for any fixed p, r 1 pg, pq is superadditive in g; we may thus reduce to the case
where A is indecomposable, which as noted above implies that G acts indecomposably on
V “ Q2g . Using Corollary 4.4 and Lemma 4.6, we may also deduce the claim in case G˝ does
7
not act isotypically on V (the exceptional case of Lemma 4.6 cannot occur for g ě 3). We
may thus assume hereafter that G˝ acts isotypically on V .
Let W be an irreducible G˝ -representation occurring in V , and put
D :“ EndG˝ pW q,
M :“ EndG˝ pV q,
F :“ ZpDq “ ZpMq.
By Schur’s lemma, D is a division algebra, M is a matrix ring over D, and T :“ imagepG˝ Ñ
M ˆ q is a torus which splits over F . If we define H :“ kerpG Ñ OutpG˝ qq, we obtain an
induced injective morphism H{G˝ ãÑ M ˆ {T . Meanwhile, since V is G˝ -isotypical, G{H acts
faithfully on the set of isomorphism classes of G˝ -constituents of W bQ Q; this implies that
the map G Ñ AutpF {Qq induces an injective morphism G{H ãÑ AutpF {Qq.
Define the following positive integers:
a :“ rF : Qs;
b :“ rankF D “ the G˝ -multiplicity of W bF F ;
c :“ rankD M “ the G˝ -multiplicity of W in V ;
2g
d :“
“ the Q-dimension of a G˝ -constituent of V bQ Q.
abc
In this notation, G{H injects into Sa while H{G˝ injects into a subgroup of a twisted form
of GLpbcqF . In light of Remark 3.4, it follows that the p-adic valuation of #π0 pGq is at most
(5.1)
rpAutpF {Qq, pq ` rpGLpbcqF , pq ď rpGLpabcqQ , pq.
If d ą 1, then Remark 4.1 immediately yields the desired bound (even for p “ 2). We may
thus assume hereafter that d “ 1, which implies that G˝ is abelian and hence a torus. In this
case, F must be totally imaginary; it is in fact the CM field associated to the unique simple
isogeny factor of A.
If p ą 2 is a Fermat prime, then the only way to violate the desired bound would be
to have equality in (5.1), which can only occur if F Ď Qpµp q in light of Corollary 4.3 (the
degree-p subextension of Qpµp2 q cannot be a compositum of CM fields because its degree
is odd). Since F is totally imaginary, this would force F “ Qpµp q. However, under these
conditions, we may invoke Remark 3.3: the reduction of G˝ itself always has order divisible
by p, yielding exactly the correct bound.
If p “ 2 and F X Qpµ28 q “ Q, then rpGLpnqF , 2q “ rpGLpnqQ , 2q (see Remark 3.6) and
so we may invoke Lemma 4.6 to deduce the desired result (again assuming that g ě 3). If
instead Qpµ4 q Ď F , then Remark 4.5 gives a valuation bound which is only off by 2, and
again this discrepancy is accounted for by Remark 3.3 (the reduction of ?
G˝ itself always
has
?
1
order divisible?by 4). Otherwise, F :“ F X Qpµ8 q must equal one of Qp 2q or Qp ´2q. In
case F 1 “ Qp ´2q, Remark 3.6 implies that rpGLpnqF 1 , 2q “ rpGLpnqQ , 2q; we thus obtain
an upper bound of
rpAutpF 1 {Qq, 2q ` rpGLpabc{2qF 1 , 2q “ 1 ` rpGLpgqQ , 2q
and again Lemma 4.6
? settles the question (for g ě 3).
In case F 1 “ Qp 2q, we must argue a bit more carefully. Since F 1 is Galois and totally
real, we must have F 1 ‰ F and rpAutpF {Qq, 2q “ 1 ` rpAutpF {F 1 q, 2q. By Remark 3.6, we
have
Yn]
rpGLpnqF , 2q “ rpGLpnqF 1 , 2q “ rpGLpnqQ , 2q `
.
2
8
Note finally that the reduction of G˝ always has order divisible by 2. From (5.1), we now
obtain an upper bound of
Z ^
bc
1
rpAutpF {F q, 2q ` rpGLpbcqQ , 2q `
2
which by Lemma 4.6 (and the fact that a ě 4) is itself bounded above by
Yg ]
Yg]
ď rpGLpgqQ , 2q `
.
rpGLpgqQ , 2q `
a
4
This gives the desired bound once more.
6. Lower bounds
To conclude, we establish the lower bound assertion of Theorem 1.2 by twisting powers of
CM abelian varieties.
Definition 6.1. We briefly recall [2, Definition 2.20]. Let A be an abelian variety over a
number field K, let L{K be a finite Galois extension, and let f : GalpL{Kq Ñ AutpAL q be
a 1-cocycle. Then there exists an abelian variety Af over K equipped with an isomorphism
AfL – AL such that the action of τ P GK on Af pKq – AfL pKq corresponds to the action of
f pτ qτ on ApKq – AL pKq. The isomorphism AfL – AL induces an isomorphism EndpAfL q –
EndpAL q in which corresponding elements α P EndpAfL q, β P EndpAL q satisfy the relation
(6.1)
τ pαq “ f pτ qτ pβqf pτ q´1 .
We use the twisting setup in the following setting.
Definition 6.2. Fix a prime p and a positive integer m. Let A0 be an abelian variety of
dimension g0 over some number field K, such that A0 has complex multiplication by the
ring of integers oM of a subfield M of Qpµpm q; put d “ rQpµpm q : Ms. (Note that we cannot
hope to fix the field K, because its degree over Q is related to the class number of M.) Let
G0 Ď GLpd, Mq be a subgroup of order pm stable under GalpM{Qq and identify G0 with a
subgroup of AutpAd0,KM q. Put A1 “ Adn
0 for some positive integer n; then G1 “ G0 ≀ Sn may
be identified with a subgroup of AutpA1,KM q stable under GalpKM{Kq. Let G be the image
of G1 under the map GLpdn, Mq Ñ PGLpdn, Mq.
Choose an Sn -extension L0 {K linearly disjoint from KM, so that L0 M{KM is again an
Sn -extension. Note that for a “generic” Cpm -extension L1 {L0 M, the Galois closure L2 of L1
over M will have Galois group G0 ≀ Sn . Using class field theory, we may further ensure that
L2 is also Galois over K and that there exists a 1-cocycle f : GalpL2 {Kq Ñ AutpA1,L2 q
whose restriction to GalpL2 {KMq is the preceding identification of the latter with G0 ≀ Sn Ď
AutpA1,KM q.
Put A “ Af1 and let L be the endomorphism field of A. Then KM Ď L and (6.1) implies
the existence of a surjective morphism from GalpL{KMq to G, but not in general to G1 .
Theorem 6.3. For each prime p, there exists an abelian variety A of dimension g over some
1
number field K such that the p-part of rL : Ks is at least prg,p .
Proof. Suppose first that p ´ 1 is not a power of 2 (i.e., p is odd and not a Fermat prime).
Then there exists a subfield M of Qpµp q whose index ℓ is an odd prime divisor of p ´ 1.
9
Y ]
g
then yields the desired result; note that in
Applying Definition 6.2 with m “ 1, n “ p´1
this case, there is no harm to take K to contain M, which simplifies the analysis somewhat.
Suppose next that p is a Fermat prime; we may assume that rg,p ě 1. The previous
construction breaks down because p ´ 1 admits
Y no
] odd prime divisor, so we can only apply
g
Definition 6.2 with m “ 1, M “ Qpµp q, n “ p´1 . Note that we now lose one factor of p to
the quotient map G1 Ñ G, so again we get the desired result.
Suppose finally that p “ 2. Apply Definition 6.2 with m “ 2, M “ Qpiq, n “ g; note that
in this case we may even take K “ Q. This time, we lose two factors of 2 to the quotient map
G1 Ñ G, but gain one back from the extension M{Q. This proves the claim once more.
References
[1] G. Banaszak and K.S. Kedlaya, An algebraic Sato-Tate group and Sato-Tate conjecture, Indiana Univ.
Math. J. 64 (2015), 245–274.
[2] F. Fité, K. S. Kedlaya, V. Rotger, A. V. Sutherland, Sato-Tate distributions and Galois endomorphism
modules in genus 2, Compositio Math. 148 (2012), 1390–1442.
[3] R.M. Guralnick and M. Lorenz, Orders of finite groups of matrices, in Groups, Rings and Algebras:
Proceedings of a Conference in Honor of Donald S. Passman, Contemporary Math. 420, 2006, 141–162.
[4] M. Kirschmer, Finite symplectic matrix groups, Experiment. Math. 20 (2011), 217–228.
[5] B. Poonen, E.F. Schaefer, and M. Stoll, Twists of Xp7q and primitive solutions to x2 ` y 3 “ z 7 , Duke
Math. J. 137 (2007), 103–158.
[6] G. Rémond, Degré de définitions des endomorphismes d’une variété abélienne, preprint available at
https://www-fourier.ujf-grenoble.fr/~remond/.
[7] J.-P. Serre, Bounds for the orders of the finite subgroups of Gpkq, in Group Representation Theory, EPFL
Press, Lausanne, 2007, 405–450.
[8] A. Silverberg, Fields of definition for homomorphisms of abelian varieties, J. Pure Appl. Algebra 77
(1992), 253–262.
10
| 4math.GR
|
Towards Provably Invisible Network Flow
Fingerprints
Ramin Soltani∗ , Dennis Goeckel∗ , Don Towsley† , and Amir Houmansadr†
∗
Electrical and Computer Engineering Department, University of Massachusetts, Amherst,
arXiv:1711.10079v1 [cs.NI] 28 Nov 2017
{soltani, goeckel}@ecs.umass.edu
†
College of Information and Computer Sciences, University of Massachusetts, Amherst,
{towsley, amir}@cs.umass.edu
Abstract
Network traffic analysis reveals important information even when messages are encrypted. We consider
active traffic analysis via flow fingerprinting by invisibly embedding information into packet timings of flows. In
particular, assume Alice wishes to embed fingerprints into flows of a set of network input links, whose packet
timings are modeled by Poisson processes, without being detected by a watchful adversary Willie. Bob, who
receives the set of fingerprinted flows after they pass through the network modeled as a collection of independent
and parallel M/M/1 queues, wishes to extract Alice’s embedded fingerprints to infer the connection between
input and output links of the network. We consider two scenarios: 1) Alice embeds fingerprints in all of the
flows; 2) Alice embeds fingerprints in each flow independently with probability p. Assuming that the flow rates
are equal, we calculate the maximum number of flows in which Alice can invisibly embed fingerprints while
having those fingerprints successfully decoded by Bob. Then, we extend the construction and analysis to the
case where flow rates are distinct, and discuss the extension of the network model.
Keywords: Computer Networks, Network Security, Network Analysis, Network Security Analysis, Network De-Anonymization, Anonymous Networks, Covert Communication, Fingerprinting, Flow Fingerprinting, Network Flow Fingerprinting, Watermarking, Flow Watermarking, Network Flow Watermarking, Timing Channel, Covert Channel, Queuing Networks, M/M/1 queues, Timing Capacity of Queues,
Shared Processor Queues, Queues in Tandem.
This work has been supported by the National Science Foundation under grants CNS-1564067 and CNS-1525642.
This work has been presented at the 51st Annual Asilomar Conference on Signals, Systems, and Computers, November 2017.
Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,
including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or
redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
1
Fig. 1. Alice may embed fingerprints in flows. Bob receives the potentially fingerprinted flow after it passes through a network of M/M/1
queues, which are independent and parallel. Each queue is shared between a fingerprinted flow (shown by a blue solid line) and interfering
flows (shown by green dotted lines).
I. I NTRODUCTION
Security in computer networks has emerged as an important area of research. Although encryption
hides information sent from a transmitter, network traffic analysis can extract important information
from the size, count, and timings of the packets. For instance, when attackers relay their flows through
compromised nodes called stepping stones, traffic analysis can trace back the attackers [1], [2]. Also,
traffic analysis can find the correlations in traffic patterns to link incoming/outgoing flows and break
anonymity [3].
Flow watermarking and flow fingerprinting are two active traffic analysis methods that work by
perturbing packet timings of flows according to specific patterns to embed information in them. In flow
watermarking, the information embedded in a flow is one bit, i.e., either the flow is marked or not.
However, in many applications, more than one bit of information is required to be embedded in the
packet timings of the flows. Flow fingerprinting provides the solution for such applications by embedding
several bits of information in the flows such as the information about the party that has embedded the
fingerprint, the source of the flow, or the location at which the flow has been fingerprinted [4].
Active traffic analysis has become an important area of research due to the increasing use of encryption. Wang et al. [5] proposed to embed flow watermarks in inter-packet delays to detect stepping
stones, and Wang et al. [6] used an interval-based flow watermark to compromise anonymized VoIP
conversations. Houmansadr et al. proposed the first non-blind watermark, RAINBOW [7], offering
significantly higher invisibility compared to prior designs, and SWIRL [8] was designed to resist
aggregated-flows attacks. Houmansadr et al. [9] was the first to introduce flow fingerprinting, and
TagIt [10] introduced the first blind flow fingerprint.
As previous active traffic analysis designs are based on ad hoc heuristics (such as moving packets
into secret time intervals), they do not offer any theoretical guarantees on the invisibility-performance
2
trade-off. In this work, we take a systematic approach to design a flow fingerprinting system with
provable information-theoretic guarantees on invisibility and performance (e.g., number of fingerprints).
Consider a network containing m independent, parallel, work conserving, and First In First Out (FIFO)
queues with independent exponential service times where the ith queue conveys the ith flow (fi ) from
the ith input link to the ith output link, and conveys interfering flows independent of fi (See Fig. 1).
The network is anonymous to Alice and Bob such that they do not know the connections between input
and output links. Alice has access to the input links and is able to buffer the packets and release them
when she desires to embed fingerprints in packet timings of the flows. Adversary Willie is between
Alice and the network and observes f1 , f2 , . . . , fm after they are accessed by Alice and wishes to detect
if Alice is embedding fingerprints in the flows or not. Bob observes the packet timings of the flows on
the output links and wishes to extract Alice’s fingerprints.
We consider the following problem: given the time interval [0, T ], can Alice embed flow identifier
fingerprints invisible to Willie in the packet timings such that Bob can extract them successfully to deanonymize the network and, if yes, what is the maximum number m of flows that can be fingerprinted?
For the case where the packet timings of the flows are governed by Poisson process, we calculate the
asymptotic expression for the number of flows that can be fingerprinted as a function of T , for two
scenarios: 1) Alice embeds fingerprints in all of the flows; 2) Alice embeds fingerprints in each flow
independently with some small probability p.
The remainder of the paper is organized as follows. In Section II, we present the system model,
definitions and the metrics employed for the two scenarios of interest. Then, we provide constructions
and analyses for the two fingerprinting scenarios in Sections III and Sections IV. In Section V we
discuss the results, the extension of the scenarios to distinct flow rates, and the extension of the network
model to more general networks. Finally, we conclude in Section VI.
II. S YSTEM M ODEL , D EFINITIONS , A ND M ETRICS
A. System Model
(I)
(I)
(I)
Alice has access to a set of input links L1 , L2 , . . . , Lm of a network, and is able to buffer packets
(I)
and release them when she desires. The packet flow conveyed over Li
is denoted by fi (1 ≤ i ≤ m),
and F = {f1 , f2 , . . . , fm } is the set of flows accessed by Alice. Bob receives the flows f1 , f2 , . . . , fm
(O)
(O)
(O)
from the output links L1 , L2 , . . . , Lm of the network, respectively. The network is anonymous such
that Alice and Bob do not know the connections between input and output links; they wish to infer this
in the interval [0, T ], and thus de-anonymize the network.
3
Alice embeds a unique flow identifier fingerprint in each flow by altering its packet timings according
to a secret codebook of fingerprints shared with Bob, and Bob extracts the fingerprints from the observed
flows. Warden Willie, who is between Alice and the network, observes the input links and wishes to
detect if Alice embeds fingerprints in them or not (see Fig. 1). Willie knows the fingerprinting scheme
Alice will employ if she chooses to embed fingerprints, but he does not have access to the codebook
of fingerprints.
Alice, Bob, and Willie know that the packet timings of the flows f1 , f2 , . . . , fm are modeled by
Poisson processes with rates λ1 , . . . , λm , respectively. The network consists of m independent single
server queues with exponential service times, i.e., M/M/1 queues, which are work conserving and
discipline First In First Out (FIFO). Each queue has multiple inputs and outputs such that the ith queue
(I)
(qi ) conveys fi from the input link Li
(O)
to the output link Li , and also conveys interfering Poisson
flows independent of fi . We denote the sum of the rates of the interfering flows on qi by λ0i . The service
rate of qi is µi , and the queues are stable, i.e., λi + λ0i ≤ µi .
We consider two scenarios. In Scenario 1 (analyzed in Section III), the flow rates are equal (λi = λ),
and Alice embeds fingerprints in all of the flows of F. In Scenario 2 (analyzed in Section IV), the flow
rates are equal, but Alice embeds fingerprints in each flow independently with probability p. For each
scenario, we calculate the number of flows in which Alice can invisibly and reliably embed fingerprints,
as described precisely next.
B. Definitions
Willie’s hypotheses are H0 (Alice did not embed fingerprints) and H1 (Alice embedded fingerprints).
We denote by PFA the probability of rejecting H0 when it is true (type I error or false alarm), and PMD
the probability of rejecting H1 when it is true (type II error or mis-detection). We assume that Willie
uses classical hypothesis testing with equal prior probabilities and seeks to minimize his probability of
(w)
error, Pe
=
PFA +PMD
;
2
the generalization to arbitrarily prior probabilities is available in [11].
Definition 1. (Invisibility) Alice’s fingerprinting is invisible (covert) if and only if she can lower bound
(w)
Willies’ probability of error (Pe ) by
1
2
− for any > 0, asymptotically. This definition is similar to
that of covertness developed in [11], and used in covert communication [12]–[15]
Definition 2. (Reliability) Fingerprinting for each flow is reliable if and only if Pf ≤ ζ for any ζ > 0,
where Pf is the probability of the failure event which occurs when
•
Alice cannot successfully embed a fingerprint since she does not have a packet to release when
she needs to;
4
•
Alice runs out of fingerprints because the number of fingerprints in her codebook is less than the
number of flows in which she wishes to embed fingerprints; or
•
Bob cannot extract a fingerprint successfully.
Definition 3. (Lambert W-function) The Lambert W-function is the inverse function of f (W ) = W eW .
Definition 4. (The Kullback–Leibler divergence) If f and g are probability measures over a set S, then
the Kullback–Leibler divergence between f and g is:
Z
f (x)
dx
D(f ||g) =
f (x) log
g(x)
S
(1)
In this paper, we use standard Big-O notation [16, ch. 3].
III. S CENARIO 1: A LL FLOWS ARE FINGERPRINTED
In this section we consider Scenario 1: Alice embeds fingerprints in all of the input flows of a network
with equal rates in the time interval [0, T ], and Bob extracts the fingerprints from the output flows to infer
the connection between input and output flows of the network. Because Alice is able to buffer packets
and release them when she desires, she changes the packet timings of the flows to embed fingerprints in
them according to a secret fingerprinting codebook shared with Bob. Each of the fingerprints is a flow
identifier and consists of a sequence of inter-packet delays to be employed to embed the corresponding
fingerprint. To successfully change the packet timings of a flow according to the chosen codeword,
Alice must have a packet in her buffer to transmit at the appropriate times. To account for this, Alice
uses a two phase scheme for each flow fi , similar to the one adopted in [13, Section IV]. First, Alice
slows down fi to buffer packets; then, during the fingerprinting phase, she releases the packets from her
buffer with the inter-packet delays prescribed by the codeword corresponding to the fingerprint, while
buffering the arriving packets of fi .
We calculate the asymptotic expression for the number of flows that can be fingerprinted as a function
of T using this strategy.
Theorem 1. Consider the setting in Section II-A. In a set F containing m flows with rates λi = λ,
Alice and Bob can invisibly and reliably track all of the flows in the time interval [0, T ], as long as
m = O(T /W (T )), where W (·) is the Lambert-W function.
Proof. Construction: Per above, Alice divides the time interval of length T into two phases: a buffering
phase of length T1 and a fingerprinting phase of length T2 such that T = T1 + T2 . During the buffering
phase, Alice slows down the packets of each flow fi , from rate λ to rate λ − ∆, in order to build up
5
Fig. 2. Two phase scheme: Alice divides the duration of time T into two phases with lengths T1 and T2 = T − T1 . In the first phase,
Alice slows down each flow from the rate λ to the rate λ − ∆, and buffers the excess packets. In the next phase, she transmits packets
at rate λ according to the inter-packet delays in the codeword corresponding to the fingerprint to be embedded.
Fig. 3. Codebook generation: Alice and Bob share a secret codebook which specifies the sequence of inter-packet delays corresponding
to each fingerprint. To generate each codeword, a number N is generated according to the Poisson distribution with parameter λT2 , and
then N points are placed uniformly and randomly in the time interval [0, T2 ].
packets in her buffer, ensuring that with high probability, she will not run out of packets during the
fingerprinting phase of length T2 = T − T1 (see Fig. 2).
Alice and Bob share a codebook to which Willie does not have access.The codebook construction is
similar to that of [13], [14]. To build the codebook, a set of m codewords {C(Wl )}l=m
l=1 are independently
generated according to realizations of a Poisson process with parameter λ. In particular, to generate a
codeword C(Wl ), first a random variable N is generated according to a Poisson distribution with mean
λT2 . Then, N inter-packet delays are generated by placing N points uniformly and independently on
an interval of length T2 [17] (see Fig. 3). Therefore, each codeword of the codebook is a series of
inter-packet delays and corresponds to a unique flow identifier fingerprint. To embed a fingerprint in a
flow fi , Alice applies the inter-packet delays of the chosen codeword to the packets of the flow fi .
Analysis: (Invisibility) The analysis of invisibility follows from that of covertness in [13, Theorem
p
2]. In the first phase, Alice slows down the flows from rate λ to rate λ − 2λ/mT1 , where > 0,
(w)
while lower bounding Willie’s error probability (Pe ) by
1
2
− . During the second phase, the packet
timings for each flow is an instantiation of a Poisson process with rate λ and hence the traffic pattern
is indistinguishable from the pattern that Willie expects to observe. Hence, the scheme is invisible.
(Reliability) By [17, Definition 2], Bob can successfully extract the fingerprint from fi as long as T2
6
is large and:
log m
< C(qi ),
T2
(2)
where C(qi ) is the capacity of qi for conveying information through packet delays. By [18, Proposition
1], C(qi ) = λ log ((µi − λ0i )/λ), where λ0i is the sum of rates of the interfering flows passing through
qi . Define
C = λ log min{µi −
i
λ0i }/λ
.
(3)
Since (2) holds for all 1 ≤ i ≤ m, for large T2 :
log m
< min{C(qi )} = C.
i
T2
(4)
Note that Alice does not run out of fingerprints since the number of fingerprints in her codebook
equals to the number of flows. Finally, similar to the reliability analysis in [13], we can show that if
T mα/2
T1 =
,
1 + mα/2
T2 = T − T1 =
T
,
1 + mα/2
(5)
(6)
where
α = (2erf −1 (1 − ζ))2 ,
(7)
then Pf ≤ ζ. Thus Alice’s fingerprinting is reliable.
(Number of flows) By (4) and (6), we require
log m < CT2 =
CT
.
1 + mα2
(8)
Next, we show that if
1
m = min
2
2
α
TC
TC
−1 ,
,
W (T C)
W (T C)
(9)
then (8) is satisfied. Consider the following fact:
Fact 1. For x, y > 0, if x log x = y, then x = y/W (y), where W (·) is the lambert-W function (see
Definition 3).
Proof. By Definition 3, W (y)eW (y) = y. Therefore, W (y) = log Wy(y) . Consequently,
x log x =
y
y
y
log
=
W (y) = y
W (y)
W (y)
W (y)
7
If m ≥ 1 + mα/2 , since m <
TC
,
W (T C)
then Fact 1 yields:
T C > m log m ≥ (1 + mα/2 ) log(m).
2
TC
2
If m < 1 + mα/ , since m < α W (T C) − 1 , then:
1 + mα/2
2
2
2
T C > (1 + mα/ ) log (1 + mα/ ) = (1 + mα/ ) log m + log
≥ (1 + mα/2 ) log m.
m
Consequently, Alice and Bob can invisibly and reliably track m = O(T /W (T )) flows. Note that by (5),
T1 → ∞ as T → ∞, as required by the proof for invisibility of the second phase. Also, by (9) and (6)
we can show that T2 → ∞ as T → ∞, as required by the proof for reliability.
IV. S CENARIO 2: E ACH FLOW IS FINGERPRINTED INDEPENDENTLY WITH PROBABILITY p
In this section we consider Scenario 2. In a set containing m network input flows with equal rates,
Alice embeds fingerprints into each flow independently with probability p in the time interval [0, T ],
and Bob extracts the fingerprints from the output flows to infer the connection between input and output
flows of the network. Similar to Scenario 1, we show that employing a two phase scheme, Alice can
embed a unique flow identifier fingerprint in the chosen flows by altering their packet timings according
to a secret fingerprint codebook shared between Alice and Bob but unknown to Willie. We calculate
the asymptotic expression for the number of flows that can be fingerprinted as a function of T using
this strategy
Theorem 2. Consider the setting in Section II-A. In a set F containing m flows with rates λi = λ, if
Alice embeds fingerprints in each flow independently with probability p, Alice and Bob can invisibly
√
CT − CT α
flows in the time interval [0, T ], where C and α are given in (3)
and reliably track O e
and (7), respectively, as long as
√
e2CT − CT α
,
m=
22
(10)
p = 2 e−CT .
(11)
Proof. Construction: The construction is similar to that of Scenario 1. Alice’s codebook contains M
fingerprints where
M = (1/2)e
CT √
1+α/ln 1+e CT α
(
),
(12)
To decide whether to embed a fingerprint in a flow or not, Alice generates independent Bernoulli random
variables X1 , . . . , Xm with P(Xi = 1) = p, and she embeds a fingerprint in fi if and only if Xi = 1.
8
Analysis: (Invisibility) We analyze the invisibility of the first and second phases separately. In the
first phase, the joint pdfs of Willie’s observations under H0 (Alice did not embed fingerprints), and H1
(Alice embedded fingerprints) are:
P0 =
m
Y
Pλ (ni ),
i=1
P1 =
m
Y
(pPλ−∆ (ni ) + (1 − p)Pλ (ni )) ,
i=1
(w)
When Willie applies the optimal hypothesis test to minimize Pe [15, Eq.1]:
r
1
1
(w)
D(P1 ||P0 ),
Pe ≥ −
2
8
(13)
where D(P1 ||P0 ) is the relative entropy between P1 and P0 . Denote by Ep [·] the expected value with
respect to the probability measure (pPλ−∆ (ni ) + (1 − p)Pλ (ni )). Then:
m
X
D(P1 ||P0 ) =
D(pPλ−∆ (ni ) + (1 − p)Pλ (ni )||Pλ (n))
i=1
n
λ−∆
∆T1
= mEp ln pe
+ (1 − p) ,
λ
n
(a)
λ−∆
∆T1
≤ mEp pe
−p ,
λ
(b)
= mp2 (e∆
2 T /λ
1
− 1).
(14)
h
i
λ−∆ k
2
where (a) is true since ln(1+x) ≤ x for all x ∈ R, and (b) is true since Ep
= pe−∆T1 e∆ T1 /λ +
λ
q
λ
2
2
(1 − p)e−∆T1 . Let ∆ =
ln(1 + 2mp
2 ). Then, (14) yields D(P1 ||P0 ) ≤ /2. By (13), Willies’
T1
(w)
probability of error (Pe ) is lower bounded by
1
2
− , and thus the first phase is invisible. The analysis
of the invisibility for the second phase is the same as that of Scenario 1. Thus, the fingerprinting scheme
is invisible.
(Reliability) Similar to the reliability analysis of Theorem 1, we can show that the probability that
Alice runs out of packets for each flow is upper bounded by ζ as long as
T1 =
Tα
ln(1 +
2
)
2mp2
T2 = T − T1 =
By (10), (11),
2
2mp2
√
=e
CT α
+α
,
(15)
T
1 + α/ ln(1 +
2
)
2mp2
,
, and thus T1 , T2 → ∞ as T → ∞.
Next, we show that Bob can successfully extract Alice’s fingerprints. By (12) and (16),
2
1 + α/ ln(1 + 2mp
2)
log M
√
= C.
<C
T2
1 + α/ln 1 + e CT α
9
(16)
where the last step is true since
2
2mp2
√
=e
CT α
. Hence, (4) is satisfied, and thus Bob successfully extracts
each fingerprint.
Furthermore, since M −mp is an increasing function of T , by the weak law of large numbers (WLLN)
we can show that Alice does not run out of fingerprints. Hence, Alice’s fingerprinting is reliable.
√
(Number of flows) By (10), (11), mp = (1/2)eCT −
CT α
, and by the WLLN,
∀γ > 0 : lim P(Nf − mp > γ) = 0.
(17)
T →∞
Therefore, Alice and Bob can invisibly and reliably track Nf = O(eCT −
√
CT α
) flows.
V. D ISCUSSION
A. Source of the gain in Scenario 2
The result for Scenario 2 indicates a much larger fingerprint dictionary can be generated and employed
covertly than in Scenario 1. Note that (11) implies that in Scenario 2, a small portion of the flows are
fingerprinted. Intuitively, because Willie has to investigate a large number of flows to look for alterations
in the timings of a relatively (very) small random subset of those flows, in particular in the first phase,
this makes covertness much easier to achieve and leads to the significant gains observed.
B. Extension to distinct rates
When Scenarios 1 and 2 are extended to distinct flow rates, Alice can build a codebook in which
the rate of the codewords is λmin = min (λ1 , . . . , λm ). To embed a fingerprint in a flow fi , Alice first
scales the corresponding codeword (τ1 , . . . , τN ) by a factor λi /λmin and applies the inter-packet delays
τN
i τ1
, . . . , λλimin
) to the first N + 1 packets of the flow. If Alice receives more than N + 1 packets in
( λλmin
the fingerprinting phase, she releases the excess packets according to random independent inter-packet
delays generated from the pdf of an exponential random variable with mean λ−1
i . Bob rescales the flow
fi by a factor of λmin /λi and uses the codebook to extract the corresponding fingerprint.
q
p
2
We can show that if ∆i = 2λi /mT1 and ∆i = (λi /T1 ) ln(1 + 2mp
2 ) in the first phases of
Scenarios 1 and 2, respectively, then Alice’s buffering is invisible. Note that the fingerprinted flow fi
in the second phase is a realization of a Poisson process with rate λi , and thus it is indistinguishable
from the pattern that Willie expects to observe. Hence, the scheme is invisible.
Note that the time to transmit a fingerprint in fi is T2 λmin /λi . Therefore Bob can successfully extract
Alice’s codeword from fi as long T2 is large and
log M
< λi C 0 (qi ) = log
T2 λmin /λi
10
µi − λ0i
.
λi
(18)
Since (18) is true for all 1 ≤ i ≤ m,
log M
≤ min
i
T2
λmin 0
C (qi ) = C 0 .
λi
Finally, we can obtain an expression for the number of flows by replacing C with C 0 in the results of
Theorems 1 and 2.
C. Extension of the network
By [19], we can extend our model to m parallel routes where each route consists of multiple M/M/1
queues in tandem. On each route ri , queues are shared between a main flow fi and interfering flows and
the interfering flows are independent. Furthermore, by [20, Corollary 3.3], we can relax the condition
of independent interference for queues on each route and extend our model to a feedforward multiclass
product form network [21] containing m parallel routes where each route ri conveys flow fi and consists
of multiple M/M/1 queues in tandem shared between a main flow fi and interfering flows.
VI. C ONCLUSION
In this paper, we presented the construction and analysis for embedding fingerprints in packet timings
of flows. In a setting where a set of flows visit Alice, adversary Willie, a network of m independent
parallel M/M/1 queues with background traffic, and Bob respectively, we established a construction
where Alice alters the packet timings in the time interval [0, T ], according to a secret codebook shared
with Bob, to embed flow identifier fingerprints in them without being detected by Willie. We considered
two scenarios: 1) Alice embeds fingerprints in all of the flows; 2) Alice embeds fingerprint in each flow
independently with probability p, and calculated the asymptotic expression for the number of flows that
can be fingerprinted as a function of T .
R EFERENCES
[1] S. Staniford-Chen and L. T. Heberlein, “Holding intruders accountable on the internet,” in Security and Privacy, 1995. Proceedings.,
1995 IEEE Symposium on, pp. 39–49, IEEE, 1995.
[2] Y. Zhang and V. Paxson, “Detecting stepping stones,” in USENIX Security Symposium, vol. 171, p. 184, 2000.
[3] P. Syverson, G. Tsudik, M. Reed, and C. Landwehr, “Towards an analysis of onion routing security,” in Designing Privacy Enhancing
Technologies, pp. 96–114, Springer, 2001.
[4] A. Houmansadr, Design, analysis, and implementation of effective network flow watermarking schemes. PhD thesis, University of
Illinois at Urbana-Champaign, 2012.
[5] X. Wang and D. S. Reeves, “Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket
delays,” in Proceedings of the 10th ACM conference on Computer and communications security, pp. 20–29, ACM, 2003.
[6] X. Wang, S. Chen, and S. Jajodia, “Tracking anonymous peer-to-peer voip calls on the internet,” in Proceedings of the 12th ACM
conference on Computer and communications security, pp. 81–91, ACM, 2005.
[7] A. Houmansadr, N. Kiyavash, and N. Borisov, “Rainbow: A robust and invisible non-blind watermark for network flows,” in NDSS,
2009.
[8] A. Houmansadr and N. Borisov, “Swirl: A scalable watermark to detect correlated network flows,” in NDSS, 2011.
[9] A. Houmansadr and N. Borisov, “The need for flow fingerprints to link correlated network flows,” in International Symposium on
Privacy Enhancing Technologies Symposium, pp. 205–224, Springer, 2013.
11
[10] F. Rezaei and A. Houmansadr, “Tagit: Tagging network flows using blind fingerprints,” Proceedings on Privacy Enhancing
Technologies, vol. 2017, no. 4, pp. 290–307, 2017.
[11] B. Bash, D. Goeckel, and D. Towsley, “Limits of reliable communication with low probability of detection on AWGN channels,”
Selected Areas in Communications, IEEE Journal on, vol. 31, pp. 1921–1930, September 2013.
[12] R. Soltani, B. Bash, D. Goeckel, S. Guha, and D. Towsley, “Covert single-hop communication in a wireless network with distributed
artificial noise generation,” in Communication, Control, and Computing (Allerton), 2014 52nd Annual Allerton Conference on,
pp. 1078–1085, IEEE, 2014.
[13] R. Soltani, D. Goeckel, D. Towsley, and A. Houmansadr, “Covert communications on poisson packet channels,” in 2015 53rd Annual
Allerton Conference on Communication, Control, and Computing (Allerton), pp. 1046–1052, IEEE, 2015.
[14] R. Soltani, D. Goeckel, D. Towsley, and A. Houmansadr, “Covert communications on renewal packet channels,” in 2016 54th Annual
Allerton Conference on Communication, Control, and Computing (Allerton), IEEE, 2016.
[15] R. Soltani, D. Goeckel, D. Towsley, B. Bash, and S. Guha, “Covert wireless communication with artificial noise generation,” arXiv
preprint arXiv:1709.07096, 2017.
[16] T. H. Cormen, Introduction to algorithms. MIT press, 2009.
[17] V. Anantharam and S. Verdu, “Bits through queues,” Information Theory, IEEE Transactions on, vol. 42, no. 1, pp. 4–18, 1996.
[18] X. Liu and R. Srikant, “The timing capacity of single-server queues with multiple flows,” DIMACS Series in Discrete Mathematics
and Theoretical Computer Science, 2004.
[19] P. Mimcilovic, “Mismatch decoding of a compound timing channel,” in Forty-Fourth Annual Allerton Conference on Communication,
Control, and Computing, 2006.
[20] F. P. Kelly, Reversibility and stochastic networks. Cambridge University Press, 2011.
[21] F. Baskett, K. M. Chandy, R. R. Muntz, and F. G. Palacios, “Open, closed, and mixed networks of queues with different classes of
customers,” Journal of the ACM (JACM), vol. 22, no. 2, pp. 248–260, 1975.
12
| 7cs.IT
|
Particle Swarm Optimized Fuzzy Controller for Indirect Vector
Control of Multilevel Inverter Fed Induction Motor
Sanjaya Kumar Sahu1,T. V. Dixit 2 and D.D. Neema3
1
Electrical Engineering, Bhilai Institute of Technology
Durg, Chhattisgarh491001, India
2
Electrical Engineering, Sarguja University
Ambikapur, Chhattisgarh-497001, India
3
Electrical and Electronics Engineering, Chhattisgarh Institute of Technology
Rajanandgaon, Chhattisgarh-491445, India
Abstract
The Particle Swarm Optimized (PSO) fuzzy controller has been
proposed for indirect vector control of induction motor. In this
proposed scheme a Neutral Point Clamped (NPC) multilevel
inverter is used and hysteresis current control technique has been
adopted for switching the IGBTs. A Mamdani type fuzzy
controller is used in place of conventional PI controller. To
ensure better performance of fuzzy controller all parameters such
as membership functions, normalizing and de-normalizing
parameters are optimized using PSO. The performance of
proposed controller is investigated under various load and speed
conditions. The simulation results show its stability and
robustness for high performance derives applications.
Keywords: Multilevel Inverter, Hysteresis Current Control,
Particle Swarm Optimization (PSO), Fuzzy Logic Controller
(FLC).
1. Introduction
Three phase induction motors are widely used in the
industrial purpose because they show better performance
during heavy loads as well as cost effective. However the
drawbacks associated with induction motor are its nonlinear behaviour, controllability and its complexity in
developing mathematical model [1]. By vector control or
field oriented control (FOC) theory, induction motor can
be controlled like a separately excited dc motor. As a
result field and torque of the induction machine can be
controlled
independently
by
manipulating
the
corresponding field oriented quantities. There are two
methods of vector control - direct and indirect vector
control [1]–[3]. In this paper the indirect control method is
adopted, where the slip angle, the d-axis and q-axis stator
currents in synchronous reference frame are computed
from the torque and rotor flux and used for vector control.
A multi-level inverter is a power electronic circuit
built to synthesize stepped approximation of a sinusoidal
wave output voltage or current from a number of DC
voltages [4]. The multilevel inverters gained the attention
in industrial drive application due to following features
[5]:
a)
Improves the waveform quality as the level of
inverter increases.
b) Reduces the size and rating of filter components.
c) High efficiency due to low switching frequency.
d) Lower dv/dt across switches and generate lower
distorted output voltages.
e) Draw input current with very low distortion.
f) Generate smaller common-mode voltage which
reduces the stress in the motor bearings.
The several multilevel inverter topologies are: The Neutral
point clamped (NPC) inverter, Flying Capacitor Inverter
(FCI), and Cascade H-Bridge (CHB) inverter [6]. The
NPC inverters are very popular for high voltage and high
power applications. Theoretically, NPC topology with any
number of levels can be realized. But some of the
problems like complexity of switching algorithm, voltage
unbalance
across
capacitors,
voltage
clamping
requirements, and circuit layouts have limits on the level
in practical multilevel inverters [7]. In an N-level NPC,
each phase leg consists of
power switches,
clamping diodes. The DC bus requires
bulk capacitors. The line voltage has
Levels. At any given time there are (N-1) switches in each
leg which are in ON state. Voltage rating of each of the
device is assumed to be(
⁄
).
In recent years, Fuzzy logic has emerged as an
important artificial intelligence tool to characterize and
control a system, whose model is not known or ill defined.
This paper involves the development of novel
methodology to optimize the performance of Mamdani
type fuzzy logic controller based on a pre defined
objective function. The predefined objective function is
optimized by optimizing the normalization parameter, denormalization parameter and the membership functions of
the Fuzzy logic controller.
Recently, there has been a huge interest in the Particle
Swarm Optimization (PSO) due to its great potential as an
evolutionary algorithm, which is based on the social
behaviour of flocks of birds and schools of fish [8].Since it
is population based and self adaptive, it has gained an
increasing popularity as an efficient alternative to the
genetic algorithm (GA) in solving optimization problem.
Similar to other population-based optimization method
such as the GA, the PSO algorithm starts with random
initialization of a population of individuals in the search
space. Each particle in the search space is adjusted by its
own flying experience and the other particles flying
experience to find the global best solution at each
generation [8]. This paper proposes an implementation of
the PSO method for an off-line tuning of the normalization
parameter, de-normalization parameter and membership
functions of the fuzzy controller.
2.2 Three-Level NPC Inverter
The three-level NPC inverter with two DC link capacitors
C1 and C2 in series and a neutral point O is shown in Fig.1.
2. Modeling
Fig. 1 Three Level NPC Inverter
2.1 Induction Motor
Table 1: Switching Levels in a Three-Level NPC Inverter
The three-phase squirrel cage induction motor
mathematical equations in synchronous rotating reference
frames are as follows [1]–[3]:
Vdse Rs idse pdse e qse
(1)
Vqse Rs iqse pqse e dse
(2)
0 Rr idre pdre (e r )qre
(3)
0 Rr iqre pqre (we wr )dre
(4)
dse Ls idse Lmidre
(5)
e
m qr
Li L i
(6)
dre Lr idre Lmidse
(7)
qre Lr iqre Lmiqse
(8)
Where,
e
qs
e
s qs
And electromagnetic torque
3P
Te
Lm (iqse idre idse iqre )
22
d
wr r
dt
dwr
Te jm
Bm wr Tl
dt
S i1
Si 2
Si 3
Si 4
i th Pole voltage Vio
ON
ON
OFF
OFF
Vdc / 2
OFF
ON
ON
OFF
0
OFF
OFF
ON
ON
Vdc / 2
Each phase of the three-level NPC inverter has two pair of
switching devices Si1 , Si 2 and Si 3 , Si 4 in series, where
i a, b, c phases. The center of each pair is clamped to
the neutral of the DC link capacitors through the clamping
diodes D1, D2, D3, D4, D5 and D6. Table I enumerates the
switching states for the semiconductor devices for the ithphase of this inverter. In Table-1, the switching symbols +,
0 and - respectively denote that the ith-phase terminal is
connected to the positive bus, the neutral point and the
negative bus.
2.3 Three-Level Hysteresis Current Controller
(9)
(10)
(11)
Fig. 2: Three-Level Hysteresis Switching Scheme
An analytical solution of different multilevel PWM
techniques for three-level NPC has been presented [9],
[10]. Among these techniques, the hysteresis band is used
very often because of its simplicity of implementation, fast
response current and robust structure [11], [12]. Hysteresis
band controller is used to track the line current references.
The current errors between the reference and measured
currents are used to develop three valid switching states in
each inverter leg by the hysteresis band controller.
Actual Current Reference Current
Dead Zone
2.4 Indirect Vector Control
Hysteresis
Band
ia*+h
ia*+δ
ia*
ia*-δ
ia*- Vdc/2
Vdc/2
h
-Vdc/2
+1 states) or in the upper band (through 0 and -1 states).
Here U 1 , means the switch state is Vdc / 2 ; U 0 means
the switch state is 0; and U 1 , means the switch state is
Vdc / 2 . Similarly the b-phase and c-phase switching
function for the three-phase voltage source inverter can be
obtained.
-Vdc/2
Fig.
The indirect vector control is a technique that controls
the dynamic speed of Induction motor. Unlike direct
vector control, in indirect vector control, the unit vectors
are generated in an indirect manner. Fig.4 is the phasor
diagram that explains the fundamental principle of indirect
vector control. The d s q s axes are fixed on the stator and
3: Three-Level Hysteresis Current Control
d r q r axes are fixed on the rotor which rotates at a speed
To develop a switching scheme for the three-level
inverter, the zero voltage level should be applied only at
appropriate instants. The switching logic must ensure that
V
there is no successive transition between dc and Vdc
2
2
states, as this will increase the frequency of switching. A
dead zone ‘δ’ is necessary in the hysteresis band ‘h’, to
avoid switching towards two-level scheme, because of
finite sampling rate of error. Without the dead zone, when
the error becomes zero and is not detected, the opposite
polarity of forcing function follows, resulting in a twolevel scheme. However, the introduction of dead zone
increases the tracking error and has to be chosen to a
minimum value, depending on the best sampling speed
that can be achieved [13].
r . Synchronously rotating axes d e q e are rotating ahead
of d r q r axes by the positive slip angle sl corresponding
to slip frequency sl . Thus
If U represents the input state to be applied, e
represents error (ia* ia ) and ce represents the change in
error the switching logic is governed by equation (12)
e e dt (r sl )dt
(13)
For decoupling control qr 0 or pqr 0 and r dr
.Substituting the above condition in equations (3), (4), (7)
and (8).
is
Vs
Vqse
Vdss
e
s
qs
V
sl
r
Vdse
iqse
iqss
dre r
e
ds
i
(q-d, e)
Synchronous
reference frame
r
idss
(q-d, r)
Rotor reference
frame
If e 0 then
(q-d, s)
Stator Reference
frame
U 1 for e h
U 0 for e
Fig. 4: Phasor diagram of Indirect Vector Control principle
U 0 for e h and ce 0
sl
U 1 for e h and ce 0
Rr Lm iqse
Lr r
(14)
Te
3 P Lm e
r iqs
2 2 Lr
(15)
U -1 for e -h
U 0 for e -
iqse
2 2 Lr Te
3 P Lm r
(16)
U 0 for - e - h and ce 0
idse
L
1
[r r pr ]
Lm
Rr
(17)
Else if e 0 then
U -1 for - e - h and ce 0
(12)
The above logic represented in Fig.2 and Fig.3, tracks
reference current either in the lower band (through 0 and
The equations (14-17) are used to produce an adequate
field orientation. These equations could be propagated to
the set point variables [14].
*
*
sl
Rr Lm iqse
(18)
Lr
*
r
2 2 Lr Te*
i
3 P Lm r*
e*
qs
*
(20)
If it is accepted that the rotor flux set point is constant then
its derivative is zero and the above equation is simplified
as
idse
*
r*
(21)
Lm
Using the above equations the block diagram of indirect
vector control of induction motor drive is as shown in
Fig.5.
+
*
-
r
Speed
controller
(G1)
Estimation of
i de s*
idse* , iqse* , sl*
T e*
(G2 )
i
sl*
e*
qs
Transformation
(q, d , e) (a, b, c)
(G3 )
*
i abc
Three-Level u Three- V
abc
abc
Level
Hystersis
Inverter
Comtroller
e
+
+
r
iabc
r
Fig. 5: Block diagram of Indirect Vector Control of IM
It contains three principal blocks, G1 used as speed
*
controller, G2 used for estimation of idse , iqse , sl* andG3 used
*
for current co-ordinate transformation (q, d, e) to (a, b, c).
3. Fuzzy Logic Speed Controller
The speed controller block G1 is proposed to be a
Mamdani type fuzzy controller having five blocks namely
normalizer, fuzzifier, inference mechanism, de-fuzzifier,
and de-normalizer as shown in Fig.6. [15].
e
Normalizer
ce
Fuzzifier
(22)
Input2 ce(t ) e(t ) e(t 1)
(23)
Inference
Mechanism
du
De-Fuzzifier
Where, is the actual speed and is the reference
speed. Two normalization parameters (k1, k2) for inputs (e,
ce) and one de-normalization parameter (k3) for output
(du) are defined. In normalization process the input
variables are scaled in the range of (-1, +1) and in denormalization process the output values of fuzzy controller
are converted to a value depending on the terminal control
element. The determination of normalization and denormalization parameters of fuzzy controller is important
for system stability.
*
3.2Fuzzifier and De-fuzzifier
780V
r*
Reference
speed
Input1 e(t ) * (t ) (t )
(19)
1 * Lr
[r
pr* ]
Lm
Rr
idse
shown in Fig. The error is the difference between the
reference speed and the actual rotor speed.
The fuzzifier processes the crisp input values (e, ce) and
convert them into fuzzy values. Also the fuzzy values
obtained in fuzzy inference mechanism are converted to
crisp output (du) value by a de-fuzzifier. Here, a triangular
fuzzy membership function is defined for each input and
output values by seven clusters. For seven clusters in the
membership functions, seven linguistic variables are
defined as: Negative Big (NB), Negative Medium (NM),
Negative Small (NS), Zero (Z), Positive Small (PS),
Positive Medium (PM), Positive Big (PB). Fig.11 shows
the membership functions used to fuzzify two input values
(e, ce) and de-fuzzify output (du) of the realized fuzzy
controller. The peak or bottom points of the membership
functions to be tuned are a1 and a2 for error (e), b1 and b2
for change in error (ce) and c1 and c2 for output (du).
Therefore the design of fuzzy controller requires the
optimization of nine parameters (k1, k2, k3, a1, a2, b1, b2, c1,
c2).
(e)
NB
NM
NS
a2
a1
NM
NS
1
b2
b1
NB
NM
NS
c2
c1
PS
PM
PB
0
a1
a2
1
Z
PS
PM
PB
0
b1
b2
1
PS
PM
PB
c1
c2
1
Z
De-Fuzzifier
Knowledge
Based rule
1
NB
(ce)
New Fuzzy
Parameters
By PSO
Fig. 6: Block Diagram of Fuzzy Controller
(du)
Z
3.1 Normalizer and De- normalizer
In closed loop control system the use of error (e) and the
change in error (ce) as controller input is a universal
approach. Therefore the fuzzy controller has two inputs,
error and change in error (e, ce) and one output (du) as
1
0
Fig. 7: Membership functions of Inputs and output
In this work the centre of gravity or centroid method is
used for de-fuzzification. As a result the control increment
is obtained by the equation [16].
4.1 Particle Swarm Optimization
m
du
di A i
(24)
i 1
m
A i
i 1
Here di is the distance between ith fuzzy set and the
centre, A i is area value of ith fuzzy set.
3.3 Knowledge Base and Inference Mechanism
The rule definition is subjective and based on expert’s
knowledge and experiences. It establishes the relationship
between outputs with inputs [17]. For the system with two
inputs and seven membership functions in each leads to
forty nine combination of these inputs, in which there are
forty nine rules. The rules are like:
R1. If e = NB and ce = NB Then du is NB
or
R2. If e = NB and ce = NM Then du is NB
or......
R49. If e = PB and ce = PB Then du is PB
Change in Error
(ce)
Table 2: Fuzzy Linguistic Rule Table
NB
NM
NS
Z
PS
PM
PB
NM
NB
NB
NB
NM
NS
Z
PS
Error (e)
NS
Z
PS
NB NB NM
NB NM NS
NM NS
Z
NS
Z
PS
Z
PS
PM
PS
PM PB
PM PB
PB
Particle Swarm Optimization is a population based
stochastic optimization technique, inspired by social
behaviour of bird flocking or fish schooling. In PSO
system the individuals called particles, fly around in a
multidimensional search space and change their position
with time. During its flight, each particle adjusts its
position according to its own experience and according to
the experience of neighbouring particle. The position or
value corresponding to its own experiences called Pbest and
corresponding to the experience of neighbouring particle is
called Gbest. The search for the optimal position advances
as the particles’ velocities and positions are updated. The
fitness of each particle’s position and iteration is
calculated using a pre defined objective (fitness) function
and the velocity of each particle is updated using the Pbest
and Gbest, which were previously defined. The velocity of
ith particle can be modified by the following equation.
vi (n 1) (n) vi (n) C1 r1(n) Pbest xi (n)
i
The rules are represented by a matrix called matrix
inference shown in Table 2. A feature of the rule base used
is the symmetry across the diagonal. This feature occurs in
systems where the physical behaviors of the system exhibit
symmetry, which is consistent in case of speed control of
Induction, motor.
The developed fuzzy logic uses the inference method
for each rule given by the relation
(25)
i du min i (e), i (ce) ; i 1, 2,......49
NB
NB
NB
NB
NB
NM
NS
Z
4. Fuzzy Logic Speed Controller Based on
Particle Swarm Optimization
(27)
C2 r2 (n) Gbest xi (n)
i
Where, vi (n) is the velocity of ith particle at iteration n,
vi (n 1)
r1 (n)
and
is the velocity of ith particle at iteration (n + 1),
r2 (n)
are random numbers with uniform
distribution in the interval [0, 1], (n) is the momentum
or inertial weight constant given by [18]
max min
n
nmax
(n) max
(28)
Here nmax is the maximum number of iteration, max
PM
NS
Z
PS
PM
PB
PB
PB
PB
Z
PS
PM
PB
PB
PB
PB
Therefore, the resulting membership function is given by
(26)
du max 1(du), 2 (du),.......49 (du)
and min are the maximum and minimum weights
respectively. Appropriate values of max and min are 0.9
and 0.4 respectively [19]. The values C1 and C2 are two
positive constants represent the social and cognitive
accelerations for the Pbest and Gbest positions, respectively.
Varying these parameters has the effect of varying the
strength of the pull towards the two bests. Values of
C1 C2 0 mean that both the cognitive and social
accelerations are absent, and particles keep moving at their
current speed until they hit a boundary of the search space
(assuming no inertia) [20].With C1 0 and C2 0 , each
particle searches for the best position in its neighbourhood,
and replaces the current best position if the new position is
better [20]. However, with C2 0 and C1 0 , the entire
swarm is attracted to a single point, Gbest. Furthermore,
having C1 C2 causes each particle to be attracted to its
own personal best position to a very high extent, resulting
in excessive wandering. On the other hand, C2 C1 results
in particles being more strongly attracted to the global best
position, thus causing particles to rush prematurely
towards optima [20]. It is demonstrated that the particle
swarm is only stable and guaranteed to converge to a
stable equilibrium point if the following conditions are
satisfied [21].
0 (C1 C2 ) 4
(29)
(C1 C2 )
1 ( n) 1
2
(30)
However, whether or not this point is actually the global
minimum cannot be guaranteed, and its acceptability as a
solution should be verified. The position of ith particle at
iteration n is xi (n) . The modified position at iteration
(n 1) is given by
xi (n 1) xi (n) vi (n 1)
(31)
Fig. 8: Flowchart of the PSO algorithm
4.2 Optimization of Fuzzy Controller
The Particle Swarm Optimization is applied to automate
and optimize the fuzzy controller design process. The
normalization parameters (k1, k2, k3) and the parameters of
the membership functions (a1, a2, b1, b2, c1, c2) are
optimized by optimizing a properly defined objective or
fitness function [22], [23]. In the context of optimization
our goal is to have a speed response with a short rise time,
small overshoot and near zero steady state error. In this
respect a multiple objective function is defined as
t
t
F e dt e tdt
0
(32)
0
Where, the first term is the measure of fast dynamic
response and the second term is the measure of steady
state error.
Thus the purpose of PSO algorithm is to minimize the
objective function. The PSO based approach to find the
minimum value of objective function is as shown in Fig.8.
The input parameters of the proposed PSO algorithm are:
nmax 100, n pop 30, nvar s 9, C1 0.5, C2 1.25,
max 0.9, min 0.4, 0 (a1, a2 , b1, b2 , c1, c2 ) 1,
a2 a1, b2 b1, c2 c1, 0 k1 6.67e 3,
0 k2 1, 0 k3 6, Stall generation =20 and Function
tolerance = 1e 6.
5. Simulation Results and Discussion
Complete simulation model for vector controlled Induction
motor (IM) drive of the proposed scheme is developed
using MATLAB/ SIMULINK. The motor parameters are:
Rated Power Prated 50HP , Rated Voltage V 480volt ,
Rated Frequency F 50Hz , Pair of poles P=2, Stator
Resistance Rs 0.087 , Rotor Resistance Rr 0.228 ,
Stator Inductance Ls 0.8mH , Rotor Inductance Lr 0.8mH ,
Mutual Inductance Lm 34.7mH , Moment of Inertia
J 1.662Kg.m2 .
Fig.9 shows the scores of the fitness function
corresponding to different generation in PSO. The PSO is
terminated at 41 generations as the termination criteria
reached. The termination criteria of the algorithm is either
the maximum generations reached or the weighted average
change in the fitness function value over Stall generations
is less than function tolerance. The values of nine
parameters used in fuzzy controller and their optimized
values by particle swarm optimization are shown in
Fig.10. The particle swarm optimized input and output
membership functions are in Fig.11.
7
Pole Voltage Vp (V)
x 10
Best: 1.65831e+007 Mean: 1.65847e+007
Mean Score
Best Score
Line Voltage Vab (V)
1.75
1.7
1.65
0
10
20
30
Generation
500
0
-500
40
Fig. 9: Fitness Score versus Generation
3
3.05
3.1
3.15
3.2
3.25
3.3
3.35
3.4
3.45
3.5
3.3
3.35
3.4
3.45
3.5
3.3
3.35
3.4
3.45
3.5
Time(sec)
1000
500
0
-500
-1000
Stator Currents(A)
Score
1.8
3
3.05
3.1
3.15
3.2
3.25
Time(sec)
50
0
-50
3
3.05
3.1
3.15
3.2
3.25
Time(sec)
Fig. 12: Inverter Voltages and Currents
6
50
Speed
(rad/sec)
3.4746
4
-50
0
1
2
1
2
k1
k2
c2
Speed Error
(rad/sec)
0.5
0.6951
c1
DOM
DOM
NB
1
0.5
0
-1
DOM
1NB
0.5
0
-1
NS Z PS
-0.5
0 Error (e)
PM
0.5
-0.5
NM
Change in0Error (ce)
PM
0.5
-0.5
0
Output (du)
PB
1
PM
NS Z PS
PB
1
NS Z PS
NM
6
3
Time(sec)
4
5
6
k3
Fig.12 shows the pole voltage, line voltage and the line
currents (stator line currents) of the three-level inverter
under steady state condition. The line currents are
sinusoidal with almost negligible ripple. Fig.13 shows the
speed tracking performance of the motor following a
trapezoidal speed reference. The speed tracking
experiment is on no load condition. The motor speed
almost tracks the reference speed in both the direction. The
ripple content in the torque during the transition is
comparatively reduced with PSO fuzzy controller as
compared to simple fuzzy controller as shown in Fig.14
NM
5
Fig. 13: Trapezoidal Speed Tracking
Fig. 10: Conventional and PS Optimized fuzzy
Controller parameters
NB
1
0.5
0
-1
4
0
-1
0
0.5
Fig. 11: PS Optimized Input Output Membership
Functions of fuzzy controller
PB
1
Torque Developed
(Nm)
b2
0.2
0.0505
0.5
0.7936
0.2
0.0538
b1
3
Time(sec)
1
200
Torque Developed
(Nm)
a2
1
0.5383
a1
0.0067
6.367e-4
0
0.5
0.7008
2
2
1
Motor Speed
Reference Speed
0
3
0.2
0.0357
Values of Parameters
5
5
Fuzzy Parameters
Particle Swarm Optimized Fuzzy Parameters
200
Torque developed during trapizoidal speed tracking with Fuzzy
100
0
-100
-200
0
1
2
3
4
5
Time(sec)
Torque developed during trapizoidal speed tracking with PSO Fuzzy
6
100
0
-100
-200
0
1
2
3
Time(sec)
4
5
6
Fig. 14: Torque Developed in Trapezoidal Speed Tracking
Fig. 15 and Fig.16 show the performance of motor
for the constant reference speed of
with
constant load torque
in both fuzzy and PSO fuzzy
speed controller. The ripple in speed and torque, when the
motor achieves the reference speed is nearly zero in case
of PSO fuzzy as compared to fuzzy controller. Fig.17 and
Fig.18 show the performance of motor when the load
torque is suddenly changed from
to
and
then from
to
at constant reference speed
1
1.5
2
3
3.5
-1
0
0.5
1
1.5
2
2.5
Time(sec)
3
3.5
4
4.5
5
0
0.5
1
1.5
2
2.5
Time(sec)
3
3.5
4
4.5
0
5
Torque
(Nm)
2
2.5
Time(sec)
3
3.5
4
4.5
5
0
0.5
1
1.5
2
2.5
Time(sec)
3
3.5
4
4.5
5
Fig. 19: Performance under variable speed and
constant torque with fuzzy
1
1.5
2
2.5
Time(sec)
3
3.5
Motor Speed
Reference Speed
4
4.5
5
120
Speed
(Rad./Sec)
0.5
80
50
Motor Speed
Reference Speed
4
4.5
5
0
0.5
1
1.5
2
400
2.5
Time(sec)
3
3.5
4
4.5
5
0
Torque Developed
Load Torque
200
0
0
1.5
Torque Developed
Load Torque
0
0
-1
0
1
-200
0.5
1
1.5
2
2.5
Time(sec)
3
3.5
4
4.5
5
Torque
(Nm)
Speed
(Rad./Sec)
Speed Error
(Rad./Sec)
1
0
0
0.5
200
Fig. 15: Performance under constant speed and
constant torque with fuzzy
120
80
Torque Developed
Load Torque
200
0
0
Motor Speed
Reference Speed
120
0
400
Torque
(Nm)
2.5
Time(sec)
all these cases the performances are better with PSO
fuzzy as compared to fuzzy controller.
Speed
(Rad./Sec)
0.5
1
Motor Speed
Reference Speed
4
4.5
5
Torque
(Nm)
0
0
Speed Error
(Rad./Sec)
Speed
(Rad./Sec)
120
0.5
1
1.5
2
2.5
Time(sec)
3
3.5
Torque Developed
Load Torque
200
0
-200
0.5
1
1.5
2
1
2.5
Time(sec)
3
3.5
0
0.5
1
1.5
2
2.5
Time(sec)
3
3.5
4
4.5
5
200
0.5
1
1.5
2
2.5
Time(sec)
3
3.5
4
4.5
5
1.5
2
2.5
Time(sec)
3
3.5
-1
0
0.5
1
1.5
2
2.5
Time(sec)
3
3.5
4.5
5
Torque Developed
Load Torque
200
0
0
4
0.5
1
1.5
2
2.5
Time(sec)
3
3.5
4
4.5
3.5
4
Fig. 18: Performance under constant speed and
variable torque with PSO fuzzy
Fig.19 and Fig.20 show the performance of the motor
when the reference speed is suddenly changed from
to
and then from
to
with a constant load torque of
Fig.21 and Fig.22 show the performance of the motor
with variable speed and variable torque. The speed is
increased from
to
and then
decreased from
to
with a
variable load torque. The load torque is increased from
to
and then it is decreased to
In
5
0.5
1
1.5
2
2.5
Time(sec)
3
3.5
0.5
1
1.5
2
2.5
Time(sec)
3
3.5
4
4.5
5
Torque Developed
Load Torque
4
4.5
5
Fig. 21: Performance under variable speed and
variable torque with fuzzy
Motor Speed
Reference Speed
100
50
0
0
5
4.5
0
Motor Speed
Reference Speed
4
4.5
5
0
400
3
200
0
Speed(Rad./Sec)
1
2.5
Time(sec)
-200
Torque(Nm)
Speed
(Rad./Sec)
Speed Error
(Rad./Sec)
0.5
2
50
120
1
1.5
Motor Speed
Reference Speed
0
0
Fig. 17: Performance under constant speed and
variable torque with fuzzy
0
0
1
100
Torque Developed
Load Torque
Torque(Nm)
-1
0
0
0
Torque
(Nm)
0.5
Fig. 20: Performance under variable speed and
constant torque with PSO fuzzy
Motor Speed
Reference Speed
4
4.5
5
Speed(Rad./Sec)
0
0
400
Torque
(Nm)
0
120
Speed Error
(Rad./Sec)
Speed
(Rad./Sec)
Fig. 16: Performance under constant speed and
constant torque with PSO fuzzy
0.5
1
1.5
2
2.5
Time(sec)
3
3.5
0.5
1
1.5
2
2.5
Time(sec)
3
3.5
4
4.5
5
200
0
-200
0
Torque Developed
Load Torque
4
4.5
5
Fig. 22: Performance under variable speed and
variable torque with PSO fuzzy
6. Conclusions
The optimal fuzzy controller has been designed off-line
using techniques of Particle Swarm Optimization for
indirect vector control of multilevel inverter fed Induction
motor. It achieves good pursuit of reference speed, starting
without overshoot and rapid rejection of disturbances with
a low drop-out speed. By comparison with fuzzy logic
controller, it testifies that this method is not only robust,
but also can improve dynamic performance of the system.
References
[1] B. K. Bose, Modern Power Electronics and AC Drives, Inc.
Upper Saddle River, NJ-07458: Prentice-Hill PTR
Companies, 2002.
[2] P. Vas, Vector control of AC machines, New York:
Clarendon, 1990.
[3] R. Krishnan, Electric motor drives modeling, analysis and
control. New Delhi: PHI Pvt. Ltd, 2003.
[4] A. Nabae, I. Takahasi, and H. Akagi, “A neutral point
clamped PWM inverter”, IEEE Transaction on Industry
Applications, Vol. 1A, No. 17,Sept./Oct 1981, pp. 518–523.
[5] J. Rodrguez, J.-S. Lai, and F. Z. Peng, “Multilevel inverters:
A survey of topologies, controls, and applications”, IEEE
Transaction on Industrial Electronics, Vol. 49, No. 4, Aug.
2002.
[6] S. Lai and F. Z. Peng, “Multilevel converters- a new breed
of power converters”, IEEE Transaction on Industry
Applications, Vol. 32, No. 3, May 1996, pp. 509–517.
[7] X. Yuan and I. Barbi, “A new diode clamping multilevel
inverter,” IEEE, conference, 1999, pp. 495–501.
[8] J. Kennedy and R. C. Eberhart, “Particle swarm
optimization,” Proceedings of the IEEE Int. Conf. on Neural
Networks, Perth, Australia,1995, pp. 1942–1948.
[9] M. Kazmierkowski and L. Malesani, “Current control
techniques for three-phase voltage-source pwm converters:
A survey,” IEEE Transaction Ind. Electron, Vol. 45, No. 5,
1998, pp. 691–703.
[10] A. Shukla, A. Ghosh, and A. Joshi, “Hysteresis modulation
of multilevel inverters,” IEEE Transaction on Power
Electronics, Vol. 26, No. 5, May 2011, pp. 1396–1408.
[11] J. Zeng, C. Yu., Q. Qi., Z. Yan., Y. Ni., B. Zhang, S. Chen,
and F. F. Wu., “A novel hysteresis current control for active
power filter with constant frequency”, Electric Power
Systems Research, Vol. 68, 2004, pp. 75–82.
[12] M. Milosevic, “Hysteresis current control in three-phase
voltage source inverter”,Zurich: Technical Report, 2003.
[13] S. Srikanthan, M. Mishra, and R. Rao, “Improved hysteresis
current control of three-level inverter for distribution static
compensator application”, IET Power Electronics, Vol. 2,
No. 5, 2009, pp. 517–526.
[14] S. K. Sahu, D. D. Neema, and T. V. Dixit, “Indirect vector
control of induction motor using ANN estimator and ANFIS
controller,” International Journal of Computer Applications,
Vol. 66, No. 14, March 2013.
[15] M. N. Uddin, T. S. Radwan, and M. A. Rahman,
“Performances of fuzzy-logic-based indirect vector control
for induction motor drive,” IEEE Transaction on Industry
Applications, Vol. 38, No. 5, Sept./Oct 2002, pp. 1219–
1225.
[16] C. C. Lee, Fuzzy Logic in Control Systems: Fuzzy Logic
controller Part 1 and Part 2. New Delhi: IEEE Press, 1990.
[17] Z. Zhao, M. Tomizuka, and S. Isaka, “Fuzzy gain
scheduling of PID controllers,” IEEE Transactions on
Systems, Man and Cybernetics, Vol. 23, No. 5, Sept./Oct
1993, pp. 1392–1398.
[18] Y. Bekakra and D. B. Attous, “Sensorless speed based on
MARS with tuning of PI speed controller in FOC of
induction motor drive using PSO,” World Academy of
Science, Engineering and Technology, Vol. 60, 2011, pp.
1550–1555.
[19] R. Eberhart. and Y. Shi, “Comparing inertial weights and
constriction factor in particle swarm optimization,”
Proceeding of the International Congress on Evaluationing
Computation, 2000, pp. 84–88.
[20] E. AP, Fundamentals of Computational Swarm Intelligence.
John Wiley Sons, 2005.
[21] R. Perez and K. Behdinan, “Particle swarm approach for
structural design optimization”, Computers and Structures,
Vol. 85, 2007, pp. 1579–88.
[22] V. Donescu, D. Neacsu, G. Griva, and F. Profumo, “A
systematic design method for fuzzy controller for brushless
dc motor drives,” Proc. of the 27th. IEEE Annual Power
Electronics Specialists Conference, 1996, pp. 689– 694.
[23] F. D. S. Cardoso, J. F. Martins, and V. F. Pires, “A
comparative study of a PI, neural network and fuzzy genetic
approach controllers for an ac drive,” IEEE 5thInternational
Workshop on Advanced Motion Control AMC, Coimbra,
1998, pp. 375–380.
| 9cs.NE
|
MISO: An intermediate language to express
parallel and dependable programs
Alcides Fonseca, Raul Barbosa
arXiv:1608.06171v1 [cs.DC] 22 Aug 2016
CISUC, Department of Informatics Engineering
University of Coimbra
P-3030 290, Coimbra, Portugal
Email: {amaf, rbarbosa}@dei.uc.pt
Abstract—One way to write fast programs is to explore the
potential parallelism and take advantage of the high number
of cores available in microprocessors. This can be achieved by
manually specifying which code executes on which thread, by
using compiler parallelization hints (such as OpenMP or Cilk),
or by using a parallel programming language (such as X10,
Chapel or Æminium). Regardless of the approach, all of these
programs are compiled to an intermediate lower-level language
that is sequential, thus preventing the backend compiler from
optimizing the program and observing its parallel nature.
This paper presents MISO, an intermediate language that
expresses the parallel nature of programs and that can be
targeted by front-end compilers. The language defines ‘cells’,
which are composed by a state and a transition function from
one state to the next. This language can express both sequential
and parallel programs, and provides information for a backendcompiler to generate efficient parallel programs. Moreover, MISO
can be used to automatically add redundancy to a program, by
replicating the state or by taking advantage of different processor
cores, in order to provide fault tolerance for programs running
on unreliable hardware.
I. I NTRODUCTION
In recent years, processor architectures have evolved towards processors with multiple CPU cores, rather than increasing the operating frequency. In order to improve the performance of programs, developers have to design (or redesign)
programs to execute code in parallel. Writing parallel code
can be done through the usage of libraries, such as Pthreads,
or with special parallel programming-languages. In any of the
cases, the parallel code is translated to a sequential intermediate language. Regardless of being compiled or interpreted, the
intermediate language can be used to perform optimizations at
the lower-level code. These optimizations are unaware of the
parallel nature of the program and cannot take into account.
Intermediate languages handle a program as a list of operations, organized in blocks expected to be executed sequentially.
Parallel programs are also considered to be sequential, and
the parallel nature of a program is hidden behind system calls
for which the compiler does not know the semantics. This is
true for LLVM, B3 and Swift intermediate languages, which
are compiled, as well for virtual machine bytecode languages,
such as Java bytecode, .NET Intermediate Language, Python
bytecode and others.
Since these intermediate languages are shared between
several high-level front-end programming languages, they are
the focus of optimization. Parallelization is one type of optimization that can result in very significant speedups for large
programs. Polly [1] is a tool that performs automatic parallelization of loops at the LLVM-IR level. Universal Translation
Library [2] is another approach that takes LLVM-IR, translates
to its own representation of the parallel program and then
generates the resulting LLVM-IR. Both these approaches use
internal representations that are not intended to be a target of
compilation.
SPIRE [3] has tackled this issue by extending LLVM with
detach, attach and barrier constructs that allow asynchronous
execution. This simple extension makes LLVM able to represent parallel languages such as OpenCL, Cilk, OpenMP, X10
and Chapel, while maintaining some lower-level semantics.
Despite this effort, there are some other parallel semantics
not being represented, such as parallel for-loops and task
dependencies, among others. The limited semantics of SPIRE
prevent some optimizations that could have been done otherwise.
In this paper, we present MISO, an intermediate language
for representation of parallel programs, supporting both Single
Instruction Multiple Data (SIMD) and Multiple Instructions
Multiple Data (MIMD). MISO can be used for performing
optimization at the parallelization level, as well as for improving the dependability of programs running on unreliable
hardware.
II. A MISO P RIMER
MISO stands for Multiple-Input Single-Output, which describes the semantics of each MISO block. MISO is organized
in ‘cells’, of which there can be several instances. A cell has
two components: the state definition and the state transition
function.
Listing 1 shows the example code of a program that
progressively blends one image into another. The ImageBlend
cell is defined as having three memory slots: r, g and b, all
integers (the state). That cell also has a transition function
that performs a weighted sum of the value of each color in
the previous state, and the same color from the second image
in the previous state as well. The saved values are stored in
a new state that will be feed into the next transition. In the
bottom of the program, we can see the instantiation of several
cells, one for each pixel of the two images. The source code
for StaticImage is omitted, as it is similar to ImageBlend with
an empty transition function.
particle strikes, that must be corrected in order for programs
to produce correct results. We introduce redundancy in MISO
in order to tolerate hardware errors.
Listing 1. An example of a MISO program
In MISO, all state transitions are isolated from one another.
Since the state of one cell is only written by one state-transition
c e l l I m ag eBlen d {
function, replication of operations can be achieved through
var r : In t = 0;
the same means as parallelization. Given that each cell has
var g : In t = 0;
its own memory, the memory contents may be duplicated and
var b : In t = 0;
the state-transition function can operate on both replicas. This
replication can be applied in parallel in different CPU cores or
transition {
processors. In NUMA architectures, the state duplication can
r = . 9 9 ∗ r + . 0 1 ∗ im ag e2 ( t h i s . p o s ) . r ; be achieved even in different memories. Identifying a soft error
g = . 9 9 ∗ g + . 0 1 ∗ im ag e2 ( t h i s . p o s ) . g ; can be done by comparing the two new states. If there is a
b = . 9 9 ∗ b + . 0 1 ∗ im ag e2 ( t h i s . p o s ) . b ; mismatch, a third equal transition should be executed to decide
}
between the two possible outcomes. By identifying MISO cells
}
that are frequently erroneous, it is possible to detect permanent
failures in hardware requiring maintenance.
im ag e1 = new I m ag eBlen d ( 3 0 0 ∗ 2 0 0 )
Replication is managed by the runtime environment, and
im ag e2 = new S t a t i c I m a g e ( 3 0 0 ∗ 2 0 0 )
therefore the same MISO program may be executed with
One aspect of MISO is that loading input and output data different levels of redundancy. In some circumstances a given
can be performed by the runtime. In this case, the program piece of code may be crucial for a specific application, thereby
could load the two images from file and could output all requiring full duplication and comparison of MISO cells, while
intermediate states to screen, resulting in a video animation the same piece of code may play a secondary role in a
non-critical application and require no replication. Selective
transition from one image to another.
The state transition moves each cell from one state to the replication of key cells may also be applied by the runtime,
next. In order to achieve this safely, there can be only writes in order to balance the fault tolerance and the overhead.
to the current state, or local variables. Reads can be performed
V. C ONCLUSION
from the previous state of either the current cell or any other
This paper presented MISO, an intermediate language that
cell. This semantic restriction allows for further optimizations.
can represent programs with both task and data parallelism
implicit in its semantics. By isolating state and state transiIII. PARALLELIZATION OF MISO
One of the main challenges for automatic parallelization is tions, compiler tools can reason about the program in order to
the extraction of data-flow information, in order to understand perform optimizations in terms of parallelization. Furthermore,
what computations can influence further operations, in order to the state isolation of MISO cells allows for replication in
establish dependencies and guarantee that the parallel program different hardware processors and memories, in order to detect
has the same semantics of the sequential version. MISO de- and recover from transient hardware faults.
The MISO toolset is currently under development, and a
scribes those dependencies explicitly in the transition function.
prototype
is available at https://github.com/alcides/miso-dsl,
Cells that have dependencies can be synchronously executed,
featuring
a
sequential and parallel runtime execution system.
while cells without any direct or indirect dependency can be
The
toolset
is open source and open to improvements and
executed in parallel, removing the need for a global barrier
suggestions
from
the community.
per transition step.
Furthermore, both task and data parallelism can be described
in MISO. Task parallelism (Multiple Instructions, Multiple
Data) can be represented using different types of cell and
Data parallelism (Single Instruction, Multiple Data) can be
expressed by having several instances of the same cell. Data
parallelism in MISO can be directly translated to GPU languages, such as CUDA or OpenCL.
IV. D EPENDABILITY
OF
MISO
Integrated circuits are continually evolving toward higher
density and greater number of transistors, as well as smaller
gates and lower operating voltages. Although this trend vastly
increases the performance of microprocessors, it also increases
the rate at which soft errors occur. Soft errors are incorrect
states in the hardware, caused by transient events such as
ACKNOWLEDGMENT
The first author was supported by the Portuguese National
Foundation for Science and Technology (FCT) through a
Doctoral Grant (SFRH/BD/84448/2012).
R EFERENCES
[1] T. Grosser, H. Zheng, R. Aloor, A. Simbürger, A. Größlinger, and L.N. Pouchet, “Polly-polyhedral optimization in llvm,” in Proceedings of
the First International Workshop on Polyhedral Compilation Techniques
(IMPACT), vol. 2011, 2011.
[2] A. Y. Drozdov, S. Novikov, V. Vladislavlev, E. Kochetkov, and P. Ilin,
“Program auto parallelizer and vectorizer implemented on the basis of
the universal translation library and llvm technology,” Programming and
Computer Software, vol. 40, no. 3, pp. 128–138, 2014.
[3] D. Khaldi, P. Jouvelot, F. Irigoin, and C. Ancourt, “Spire: A methodology
for sequential to parallel intermediate representation extension,” in 17th
Workshop on Compilers for Parallel Computing (CPC 2013), 2012.
| 6cs.PL
|
ON TOPOLOGIES ON THE GROUP (Zp )N
arXiv:1610.00046v1 [math.GR] 30 Sep 2016
I. K. BABENKO AND S. A. BOGATYI
Abstract. It is proved that, on any Abelian group of infinite cardinality m, there exist
m
precisely 22 nonequivalent bounded Hausdorff group topologies. Under the continuum
hypothesis, the number of nonequivalent compact and locally compact Hausdorff group
topologies on the group (Zp )N is determined.
The systematic study of Abelian topological groups was initiated in Pontryagin’s paper [18] and van Kampen’s paper [9] (see also [1]). In these papers, an exceptionally
important relationship between an Abelian topological group and the topological group
of its characters was revealed. It is not an exaggeration to say that this relationship is one
of the most important tools for studying Abelian topological groups. This relationship
manifests itself most pronouncedly for compact and locally compact groups.
Topological groups close to compact and locally compact ones are, respectively, totally
bounded and locally bounded Abelian topological groups. This type of topologies on
Abelian groups was studied by A. Weil [21], who showed that an Abelian topological
group is totally bounded if and only if it is embedded in a compact Abelian group as a
dense subgroup and that such a group is locally bounded if and only if it is embedded
in a locally compact group as a dense subgroup. Another deep characteristic property
of locally bounded and totally bounded topological, not necessarily Abelian, groups were
found by A.D. Alexandroff [2]. He showed in particular that a topological group G is
locally bounded if and only if G admits a left invariant generalized measure, see [2] for
more details.
Among all bounded group topologies on a given Abelian group there is a maximal
topology; the Weil completion of a group with this topology coincides with the Bohr
compactification of this group and can be continuously mapped onto any compact group
extension.
The next important step in the study of Abelian topological groups was made by
Kakutani [7], who showed that the cardinality of an infinite compact Abelian group G
and the cardinality of the discrete group G∗ of its characters are related by
∗
|G| = 2|G | .
In the 1950s, interest in the study of general properties of Abelian topological groups
motivated the interest in the study of the relationship between the algebraic structure of
a given group and the possible topologies consistent with its group structure. This topic
includes, in particular, the problem of describing Abelian groups admitting a compact
topology, which was posed by Kaplansky in [8]. This problem was completely solved by
Hulanicki in [14, 15].
This work was partially supported by the Russian Foundation for Basic Research (project no. 16-0100357A), and by ANR-Finsler.
1
2
I. K. BABENKO AND S. A. BOGATYI
We mention two results concerning the possible compact topologies on a given Abelian
group. In the very early 1950s, Kulikov [11] showed that the cardinality of the family
of all compact Abelian groups of cardinality 2m , where m is an infinite cardinal, equals
2m . In the light of this result the following example of Fuchs [12] looks quite surprising.
He constructed an Abelian group G of cardinality 2m admitting infinitely many different
compact topologies. Moreover, the cardinality of the set of pairwise non-homeomorphic
compact invariant topologies on G equals 2m .
It is well known that, on any Abelian group G, there are as many nonequivalent Hausdorff group topologies as possible. To be more precise, the cardinality of the set of
|G|
nonequivalent Hausdorff group topologies on G equals 22 . This result was obtained
by Podewski [17], who studied the problem in its most general setting. Namely, given
any set with a finite or countable system of algebraic structures, Podewski found necessary and sufficient conditions on these algebraic structures ensuring the existence of
a nondiscrete Hausdorff topology consistent with all of them [17]. Moreover, Podewski
showed that these conditions ensure the existence of the maximal possible number of
pairwise non-equivalent Hausdorff topologies which agree with all algebraic structures.
For Abelian groups and fields, Podewski’s conditions always hold; details can be found
in [17]. In 1970, Arnautov constructed an example of an infinite commutative ring such
that any Hausdorff ring topology on this ring is discrete [4]. In the 1979s–1980s, examples
of infinite non-Abelian groups admitting only discrete Hausdorff group topologies were
given [13], [16], [20].
Fuchs’ example shows that properties of various topologies that an abstract Abelian
group G carries directly depend on the algebraic properties of the group G.
In our view, the influence of the algebraic structure of an Abelian group on the structure
of the set of Hausdorff group topologies on this group has been studied insufficiently. All
topologies considered in the following are assumed to be Hausdorff.
This paper studies the structure of the set of possible topologies on the well known
Abelian group
(1)
G = (Zp )N ,
where Zp = Z/pZ for a prime p. Henceforth for two sets X and Y the set X Y is understood
in usual sense of set theory. As customary in topology, we denote the prime field with p
elements by the same symbol Zp .
Note that there are four canonical, in a certain sense, topologies on G. The group G
has the natural compact topology determined by the structure of the direct product (1);
we denote this topology by τc . The second topology is the discrete topology τd on G. The
character group of (G, τc ), which we denote by (G, τc )∗ = ⊕ℵ0 Zp , is countable and discrete.
Thus, we obtain two topological groups, (G, τc )×(G, τc )∗ and (G, τc )×(G, τd ). Since these
two groups are algebraically isomorphic to G, it follows that, in fact, we obtain two more
topologies on G, which are surely different (they have different weights); we denote these
topologies by τ0 and τ1 , respectively. Obviously, these two topologies are locally compact.
The following theorem is one of the main results of this paper.
Theorem 0.1. For the Abelian group G = (Zp )N , the following assertions hold.
2ℵ0
1. The set of all Hausdorff group topologies on G contains a subset of cardinality 22
consisting of pairwise non-homeomorphic totally bounded topologies.
ON TOPOLOGIES ON THE GROUP (Zp )N
3
2. Under the continuum hypothesis, τc , τd , τ0 , and τ1 are the only locally compact Hausdorff group topology on G. Only one of them, τc , is compact.
2ℵ0
As mentioned above, the general result of Podewski [17] affirms that there are 22
pairwise non-homeomorphic group topologies on G. The first assertion of the theorem
shows that the set of all group topologies on G contains a subset of the same cardinality
consisting of totally bounded pairwise non-homeomorphic topologies on G.
Although totally bounded topologies are very close to compact, under the continuum
hypothesis, only four of these numerous topologies are locally compact, and only one of
them is compact. This fact contrasts with Fuchs’ result in [12] cited above.
Theorem 0.1 follows from more general statements proved below. Thus, its first assertion is, in fact, a general property of Abelian groups and follows directly from Theorem 1.3
proved in Section 1.
Compact and locally compact topologies are studied in Section 2 in a more general
situation. However, in Section 2, we essentially use the algebraic structure of G, namely,
the fact that each of its element has order p. The second assertion of the theorem follows
directly from Corollary 2.4 and, according to this corollary, is equivalent to the continuum
hypothesis. Note that the negation of the continuum hypothesis drastically changes the
situation with locally compact topologies; see Proposition 2.3.
Section 1.1 considers the set of all totally bounded topologies on the group G. This
subset, which has the largest possible cardinality in the set of all topologies on G, has a
number of interesting structures. For example, we can single out lattices of topologies.
This, in turn, allows us to construct chains of decreasing totally bounded topologies
on G. Moreover, there exist chains of maximum length, which have maximal or minimal
elements. These structures are studied in Section 1.1.
One of our main tools for studying Abelian topological groups is, as usual, the character
theory founded by Pontryagin in [18]. This theory has been developed most fully for locally
compact Abelian groups, for which Pontryagin’s duality theorem is valid (see [19]). Among
other classes of topological groups whose connection with their character groups remains
strong enough are the already mentioned classes of totally bounded and locally bounded
groups. The relationship between these groups and their character groups was studied by
Comfort and Ross [5].
For other classes of Abelian topological groups, connection with character groups is
not so pronounced; nevertheless, character groups remain an important tool for studying
them.
In conclusion, we mention that our interest in this topic was aroused by a series of
questions asked to us by R. I. Grigorchuk. We thank him for numerous fruitful discussions.
We are also grateful to O. V. Sipacheva for useful conversations.
1. The Structure of the Set of All Topologies
Q
Let
m
be
a
finite
or
infinite
cardinal.
In
what
follows,
we
use
the
notation
Q
P m Zp =
(Zp )α , where the cardinality of the index set is |A| = m; accordingly,
m Zp =
α∈A
⊕ (Zp )α .
α∈A
4
I. K. BABENKO AND S. A. BOGATYI
Given another cardinal k, we set
(2)
Fk,m (p) =
Y
Zp ×
X
Zp .
m
k
In the case where p fixed or is clear from the context, we denote groups of the form (2)
by Fk,m .
Endowing the first factor with the compact product topology and the second with the
discrete topology, we turn Fk,m into an Abelian topological group. In what follows, we
assume that at least one of the cardinals k and m is infinite and the finite cardinals can
take only the value 0. The easy-to-prove properties of this Abelian topological group are
collected in the following proposition.
Proposition 1.1. The topological group Fk,m is locally compact; it has cardinality
max{2k , m} and weight max{k, m}. The group of characters of Fk,m is isomorphic to
the group Fm,k . For different pairs of cardinals (k, m), the topological spaces Fk,m are
nonhomeomorphic.
Below we give general facts about topologies on Abelian groups generated by subgroups
of the character group.
We denote the entire group of characters of an Abelian group A, i.e., the group of
all possible homomorphisms of A to the circle S 1 = {eit }, by A⋆ . If A is endowed with
a group topology, then we denote the group of topological characters, i.e., continuous
homomorphisms, of the Abelian topological group A to the circle by A∗ . Note that A∗ is
always a subgroup of A⋆ ; if the topology of A is discrete, then these two groups coincide.
As usual, a subset X ⊂ A⋆ is said to separate vectors if, for any different v, w ∈ A,
there exists an h ∈ X such that h(v) 6= h(w). Any set X ⊂ A⋆ generates a diagonal map
(3)
∆X : A −→ (S 1 )X .
A set X separates vectors if and only if the diagonal map (3) is a monomorphism. Note
that X separates vectors if and only if so does the subgroup hXi generated by this set.
As is known [19], for any nonzero element v ∈ A, there exists a character φv ∈ A⋆ such
that φv (v) 6= 1. Uniting such characters over all elements v ∈ A, we obtain a set X ⊂ A⋆
separating the elements of A. Let H = hXi be the subgroup generated by this set; as
mentioned above, H separates points as well. If |A| = m, where m is an infinite cardinal,
then, obviously, we have |H| ≤ m. Note also that
diagonal map ∆H implements an
Q the
1
isomorphism of the group A onto its image in
(S )h .
h∈H
Given a subgroup H ⊂ A⋆ , we denote the minimal topology on A with respect to which
all maps in H are continuous by τH . This topology coincides with the minimal topology
with respect to which the diagonal map (3) is continuous (the image is assumed to be
endowed with the product topology). Obviously, τH is Hausdorff if and only if H separates
points. Recall that a topology τ on a group G is said to be totally bounded if, for any
neighborhood U of zero, there exists a finite set {0, g1, . . . , gk } of elements of G such that
the family {U, g1 + U, . . . , gk + U} covers the entire group.
Topologies determined by various subgroups H ⊂ A⋆ were studied by Comfort and
Ross [5]; we collect the results of [5] needed later on in the following theorem.
ON TOPOLOGIES ON THE GROUP (Zp )N
5
Theorem 1.2. [5] 1. For any subgroup H ⊂ A⋆ , the topology τH is totally bounded,
and for each totally bounded topology τ on A, there exists a subgroup H ⊂ A⋆ such that
τ = τH .
2. The identity map id : (A, τH2 ) −→ (A, τH1 ) is continuous if and only if H1 ⊂ H2 .
Now, we prove a general statement on the number of totally bounded topologies on an
Abelian group.
Theorem 1.3. Let A be an Abelian group of cardinality |A| = m, where m is an infinite
m
cardinal. Then, on A, there are precisely 22 totally bounded Hausdorff group topologies.
m
Among them there are 22 pairwise nonhomeomorphic topologies.
Proof. Let A⋆ be the group of all characters of A; by Kakutani’s theorem, we have |A⋆ | =
2m . Fix a subgroup H ✁ A⋆ separating the points of characters. As mentioned above,
this subgroup can always be chosen so that |H| ≤ m. Let B = A⋆ /H; then |B| = 2m .
Given a subgroup C ✁ B, we set C̄ = p−1 (C), where p : A −→ B is the natural
projection. Since H ✁ C̄, it follows that the topology τC̄ on A is Hausdorff. Thus, to
each subgroup of B we have assigned a totally bounded Hausdorff group topology on A.
These topologies are different for different subgroups. Indeed, according to Theorem 1.2,
the identity map is not a homeomorphism with respect to topologies corresponding to
different subgroups. In turn, Lemma 1.4 implies that the cardinality of the set of such
m
topologies is 22 .
Finally, let us count nonequivalent topologies among those obtained above. By nonequivalent topologies we mean topologies that cannot be mapped to each other by a homeomorphism, not necessarily consistent with the group structure.
Since |A| = m, it follows that the set of all self-maps of A has cardinality mm = 2m
(as a set). It follows that any topology on A is equivalent to at most 2m other topologies
m
on this set. Thus, we obtain a partition of 22 different totally bounded group topologies
into classes of equivalent topologies, each of which has cardinality at most 2m . Therefore,
m
the number of classes is precisely 22 , and topologies from different classes are pairwise
nonequivalent. This completes the proof of the theorem.
Lemma 1.4. Let m be an infinite cardinal, and let B be an Abelian group of cardinality
m
2m . Then the cardinality of the set of pairwise different subgroups in B equals 22 .
Proof. The upper bound for the cardinality of the set of subgroups in B is obvious and
coincides with the cardinality of the set of all subsets in B. Let us prove the lower bound.
Let T = Tors(B) be the torsion subgroup of B; then B ′ = B/T is torsion-free. The
cardinality of at least one of the groups T and B ′ equals 2m , and the presence of the
required number of pairwise different subgroups in T or in B ′ implies the presence of the
same number of subgroups in B. Thus, it suffices to prove the lemma for periodic groups
and torsion-free groups separately. Consider two cases.
1. Suppose that the group B is periodic. Since B decomposes into the direct sum of its
primary components [10], it follows that at least one primary component has cardinality
2m , and it suffices to prove the required assertion for the case of a primary p-group, where
p is a prime.
Suppose that B is a p-group. Consider the subgroup B(p) consisting of all elements
of order p. Obviously, |B(p)| = 2m , so that it suffices to prove the required assertion
for the group B(p). In this case, B(p) is a Zp -vector space, and it has a Hamel basis of
6
I. K. BABENKO AND S. A. BOGATYI
cardinality 2m . Different subsets of this basis generate different subgroups of B(p) and,
therefore, of B. This completes the proof in the case of periodic groups.
2. Finally, suppose that B is torsion-free. Since |B| = 2m , it follows that the (Prüfer)
rank of B equals 2m . Thus, there is a free Z-module of rank 2m in B. As above, different
subsets in a family of generators of such a module generate different subgroups in the
module and, therefore, in B.
1.1. The Structure of the Family of Totally Bounded Topologies. In what follows,
we essentially use the structure of the groups Fk,m (p) and, in particular, the fact that these
group can be treated as Zp -vector spaces. The characters of such groups are simply the
elements of the dual space. In what follows, we use this dual understanding of characters
without mention.
Consider the case where the group A is a Zp -vector space of dimension equal to an infinite cardinal m. In this case, Theorem 1.3 is substantially simpler and has a transparent
combinatorial interpretation. The subgroup H ✁ A⋆ of characters separating points is a
subspace of the same dimension m. Next, we choose a Hamel basis B in H and extend it
to a Hamel basis B⋆ in the entire space A⋆ . Let M = B⋆ \ B; obviously, we have |M| = 2m .
Each set N ⊂ M now determines a subgroup in A being the linear span of the system
of vectors {N ∪ B}. The set of pairwise different subgroups thus defined has cardinality
m
22 and can be used in Theorem 1.3 for the special case where A is a Zp -vector space.
The Hausdorff group topologies on A thus obtained have an additional structure: on this
set of topologies, there arise lattices.
The construction described above shows that, for the set M = B⋆ \ B of cardinality 2m ,
the lattice (2M ; ⊂, ∪, ∩) of subsets is embedded in the lattice of totally bounded linearly
invariant topologies on the space A. Therefore, the structures on the lattice (2M ; ⊂, ∪, ∩)
can be transferred to topologies. Thus, any linearly ordered set M generates a chain of
length 2m of one-to-one continuous maps. In the family of topologies under consideration,
there is the minimal topology τmin = τHB and the maximal topology τmax = τA⋆ .
Thus, on a vector space A of dimension m, there are chains of length 2m of one-to-one
continuous maps, and there are no longer chains. Such chains carry various combinatorial
structures, which correspond to different types of ordering of the vectors in the Hamel
basis.
m
m
Moreover, the existence of 22 independent subsets in M implies the existence of 22
totally bounded linearly invariant Hausdorff topologies on A such that the identity map
is not continuous with respect to any pair of these topologies.
Proposition 1.5. Let A be a vector space of infinite dimension m. Then any separating
subspace H ⊂ V ⋆ contains a separating subspace of dimension at most m.
Proof. Indeed, given any pair of different vectors in the space A, it suffices to take a linear
functional on H separating them. The dimension of the linear span of such functionals
does not exceed m2 = m.
Proposition 1.6. Let τ be a totally bounded linearly invariant Hausdorff topology on a
vector space A of infinite dimension m. Then there is a set M of cardinality 2m such
that, on the set of totally bounded linearly invariant Hausdorff topologies on A, there is
a lattice isomorphic to (2M ; ⊂, ∪, ∩). Moreover, the initial topology τ is either minimal
ON TOPOLOGIES ON THE GROUP (Zp )N
7
or maximal in this lattice. In particular, any totally bounded linearly invariant Hausdorff
topology on A can be included in a linear chain of length 2m of different topologies.
Proof. Consider the space H of linear functionals generating the given topology. If the
dimension of H is less than 2m , then we take the Hamel basis B in H, extend it to a
Hamel basis B⋆ in A⋆ , and set M = B⋆ \ B̃. In this case, (2M ; ⊂, ∪, ∩) is the required
lattice, and the given topology is minimal in this lattice.
Suppose that the dimension of H equals 2m . According to Proposition 1.5, H contains
a separating subspace Q ⊂ H of dimension m. We take a Hamel basis B in Q and extend
it to a Hamel basis B̃ in H. As above, we set M = B̃ \ B. The desired lattice is again
(2M ; ⊂, ∪, ∩), and the topology determined by H is maximal in it.
Q
Proposition 1.7. Let k be an infinite cardinal, and let A = Fk,0 = k Zp . Then the
subspace H0 ⊂ A⋆ generated by the coordinate projections of A is a minimal separating
space.
Proof. Obviously, the subspace H0 itself is separating. Suppose that there exists a separating subspace H ⊂ H0 . Consider the one-to-one continuous map generated by the
embeddings (A, τH0 ) −→ (A, τH ). The topology of τH0 coincides with the Tychonoff product topology on A and, therefore, is compact. Since a continuous one-to-one map of a
compact space to any Hausdorff space is a homeomorphism, the separating subspace H
cannot be proper.
The following result shows that there are no other minimal separating subspaces.
Theorem 1.8. For a Zp -vector space A, a subspace H ⊂ A⋆ is a minimal separating
space if and only if the natural map e : A −→ H ⋆ is an isomorphism.
Proof. Obviously, the natural map e is a monomorphism if and only if H ⊂ A⋆ is a
separating subspace.
Suppose that e is an isomorphism and H1 ⊂ H is a proper subspace. Since the map
p : H ⋆ −→ H1⋆ of the dual spaces has nontrivial kernel, it follows that so does the natural
map e1 = p ◦ e in H1⋆ . Therefore, H1 does not separate points, i.e., H is minimal.
Now, let us suppose that H is a minimal separating space and show that e is an
isomorphism. Take a nonzero element φ ∈ H ⋆ and let ker φ = H1 ⊂ H. By minimality, H1
is not separating; hence there exists a nonzero vector v ∈ A such that e(v)(x) = x(v) = 0
for all x ∈ H1 . Since H separates points, it follows that there exists a y ∈ H for which
y(v) 6= 0. Without loss of generality, we can assume that y(v) = 1.
The subspace H1 has codimension 1, because this is the kernel of a linear functional.
Therefore, H1 and y generate H; in particular, φ(y) 6= 0. Finally, for any vector z ∈ H,
we have z = x + ty, where x ∈ H1 . This implies
φ(z) = tφ(y) = tφ(y)y(v) = ty(φ(y)v) = (x + ty)(φ(y)v) = e(φ(y)v)(z).
Thus, φ = e(φ(y)v), so that e is an epimorphism and, by the remark at the beginning of
the proof, an isomorphism.
Corollary 1.9. Let A be a Zp -vector space for which H ⊂ A⋆ is a minimal
separating
Q
subspace of infinite
dimension
k.
Then
there
exists
an
isomorphism
i
:
Z
−→
A such
p
k
Q
⋆
⋆
that
i
(H)
⊂
(
Z
)
coincides
with
the
subspace
generated
by
the
basis
projections
of
k p
Q
k Zp .
8
I. K. BABENKO AND S. A. BOGATYI
Proof.PIndeed, it suffices to choose
Q a Hamel basis in H; this determines an isomorphism
⋆
H ≃ k Zp , whence A ≃ H ≃ k Zp .
We define the logarithm of a cardinal m by
Ln(m) = {n : m = 2n }.
Obviously, k ∈ Ln(2k ) for any cardinal k. Moreover, the set Ln(ℵ0 ) is empty by Cantor’s
theorem. Finally, the generalized continuum hypothesis (2ℵα = ℵα+1 ) implies Ln(2k ) =
{k}.
Corollary 1.10. If the dimension m of a vector space A satisfies the condition Ln(m) =
∅, then A⋆ contains no minimal separating subspace.
2. Locally Compact Topologies
Q In this section, we analyze the set of locally compact topologies arising on the group
n Zp , where n is an infinite cardinal.
Let G be an infinite compact Abelian group; then, according to Kakutani’s theorem
[7], we have |G| = 2m , where m = |G∗ |. Since the character group G∗ is discrete, it
follows that if
Qany element of G has order p, then the group G is isomorphic to one of the
groups G ≃ n Zp , where n ∈ Ln(|G|),
Q with the natural product topology. For different
n ∈ Ln(|G|), the topological groups
n Zp are nonhomeomorphic, because, according to
Q
Proposition 1.1, the weight of n Zp equals n. Finally, note that under the generalized
continuum
hypothesis there exists only one compact topology on each direct product
Q
n Zp . Thus, the following assertion is valid.
Proposition 2.1. If n is an infinite cardinal, then
Q the cardinality of the set of compact
Hausdorff group topologies on the group G ≃ n Zp equals |Ln(|G|)|. Moreover, each
n′ ∈ Ln(|G|) corresponds to precisely one compact topology, and its weight equals n′ .
P
Theorem 2.2. Let τ be a locally compact Hausdorff topology on the group G ≃ m Zp .
Then the group (G, τ ) is topologically isomorphic to Fk,n , where the cardinals k and n
satisfy the condition max{2k , n} = m.
Proof. All elements of the group G and, therefore, all elements of its character group G∗
have order p. It follows that the group (G, τ ) is totally disconnected.
According to van Dantzig’s theorem [6], there exists a compact open subgroup H ⊂ G.
Let p : G −→ N = G/H be the natural projection, and let i : H −→P
G be an embedding.
Since H is open, it follows that N is discrete and, therefore,
N ≃ n Zp , where n is a
Q
cardinal. According to Proposition 2.1, we have H ≃ k Zp for an appropriate cardinal
k (naturally, the direct product is endowed with the compact product topology).
Next, choosing a Hamel basis in the Zp -vector space N, we take a splitting q : N −→ G
of the projection p. The homomorphism q is automatically continuous, and its image is
discrete in G.
Finally, consider the homomorphism i×q : H×N −→ G defined by i×q(h, n) = i(h) +
q(n). Obviously, i × q is an algebraic isomorphism. Since H is open, it follows that this
is a local homeomorphism between H×N and G, which, in turn, implies that i×q is an
isomorphism of topological groups.
Thus, we conclude that (G, τ ) is isomorphic to Fk,n as a topological group. The equality
max{2k , n} = m is now obvious.
ON TOPOLOGIES ON THE GROUP (Zp )N
9
The P
following proposition shows what happens to locally compact topologies on the
group n Zp , where n = ℵ1 or 2ℵ0 , under the negation of the continuum hypothesis.
Proposition 2.3.PIf ℵ1 < 2ℵ0 , then there is only one (discrete) locally compact topology on the group ℵ1 Zp . Under the same assumption, there
P exist at least five pairwise
nonhomeomorphic locally compact topologies on the group 2ℵ0 Zp .
P
Proof. According to Theorem 2.2, the group ℵ1 Zp with a locally compact topology is
isomorphic to a group Fk,n . Taking into account the inequality ℵ1 < 2ℵ0 , we see that the
only possible choice of the cardinals is k = 0 and n = ℵ1 , i.e., the topology is discrete.
ℵ0
The groups F
Pk,n are locally compact and, under the assumption ℵ1 < 2 , algebraically
isomorphic to 2ℵ0 Zp for the following pairs (k, n) of cardinals:
(2ℵ0 , 0), (2ℵ0 , ℵ0 ), (2ℵ0 , ℵ1 ), (2ℵ0 , ℵ2 ), (0, 2ℵ0 ).
Here the first topology is compact and the last one is discrete. All of these topologies are
pairwise nonhomeomorphic by virtue of Proposition 1.1.
Theorem 2.2 and Proposition 2.3 have the following immediate corollary.
Corollary 2.4. The following conditions are equivalent:
ℵ0
(1) the continuum
P hypothesis holds: ℵ1 = 2 ;
(2) the group Pℵ1 Zp admits a compact group topology;
(3) the group Q ℵ1 Zp admits a nondiscrete locally compact group topology;
(4) the group Qℵ0 Zp admits at most four locally compact group topologies;
(5) the group ℵ0 Zp admits precisely four locally compact group topologies.
In conclusion, we mention that the four locally compact topological groups in condition
(5) are precisely as follows:
Fℵ0 ,0 (this is a compact topology of weight ℵ0 );
Fℵ0 ,ℵ0 (a noncompact nondiscrete topology of weight ℵ0 );
Fℵ0 ,2ℵ0 (a noncompact nondiscrete topology of weight 2ℵ0 );
F0,2ℵ0 (the discrete topology of weight 2ℵ0 ).
This list completes the proof of the second assertion of Theorem 0.1 stated in the
introduction.
References
[1] J. W. Alexander, On the characters of discrete Abelian groups, Ann. of Math., 1934, Vol. 35, No. 2,
389–395.
[2] A.D. Alexandroff, On groups with an invariant measure. C. R. (Doklady) Acad. Sci. URSS (N.S.),
1942, Vol. 34, No. 1, 59.
[3] H. Anzai and Sh. Kakutani, Bohr compactifications of a locally compact Abelian group, Proc. Imp.
Acad. Tokyo, 1943, Vol. 19, No. 8, 476–480.
[4] V. I. Arnautov, Non-discrete topologizability of infinite commutative rings, Dokl. Academy of Sciences SSSR, 1970, Vol. 111, No. 8, 476–480.
[5] W. W. Comfort and K. A. Ross, Topologies induced by groups of characters, Fundamenta Math.,
1964, Vol. 55, 283–291.
[6] D. van Dantzig, Zur topologischen Algebra I, Math. Ann., 1933, Vol. 107, No. 1, 587–626.
[7] Sh. Kakutani, On cardinal numbers related with a compact Abelian group, Proc. Imp. Acad. Tokyo,
1943, Vol. 19, 366–372.
10
I. K. BABENKO AND S. A. BOGATYI
[8] I. Kaplansky, Infinite Abelian Groups (Univ. of Michigan Press, Ann Arbor, 1954).
[9] E. R. van Kampen, Locally bicompact Abelian groups and their character groups, Annals of Math.,
1935, Vol. 36, No. 2, 448–463.
[10] M. I. Kargapolov and Yu. I. Merzlyakov, Foundations of Group Theory (Nauka, Moscow, 1972) [in
Russian].
[11] L. Ya. Kulikov, Generalized primary groups. I–II, Tr. Mosk. Mat. O-va, 1952, Vol. 1, 247–326; 1953,
Vol. 2, 85–167.
[12] L. Fuchs, On character groups of discrete Abelian groups, Acta Math. Hungarica, 1959, Vol. 10,
Nos. 1–2, 133–140.
[13] G. Hesse, Zur Topologisierbarkeit von Gruppen, Dissertation (Univ. of Hannover, Hannover, 1979)
[in German].
[14] A. Hulanicki, Algebraic characterization of Abelian divisible groups which admit compact topologies, Fundamenta Math., 1957, Vol. 44, 192–197.
[15] A. Hulanicki, Algebraic structure of compact Abelian groups, Bull. Acad. Polon. Sci., 1958, Vol. 6,
71–73.
[16] A. Yu. Ol’shanskii, A remark on a countable nontopologizable group, Vestnik Mosk. Univ. Mat.
Mekh., 1980, No. 3, 103.
[17] K.-P. Podewski, Topologisierung algebraischer Strukturen, Rev. Roumaine Math. Pures Appl., 1977,
Vol. 22, No. 9, 1283–1290.
[18] L. Pontrjagin, Theory of topological commutative groups, Ann. of Math., 1934, Vol. 35, 361–388.
[19] L.S. Pontryagin, Continuous Groups (Nauka, Moscow, 1973) [in Russian].
[20] S. Shelah, On a problem of Kurosh, Jonsson groups, and applications, in Word Problems II, Ed.
by S. I. Adian, W. W. Boone, and G. Higman (North-Holland, Amsterdam, 1980), pp. 373–394.
[21] A. Weil, Sur les espaces à structure uniforme et sur la topologie générale, (Hermann, Paris, 1937)
[in French].
Université de Montpellier CNRS UMR 5149, Institut Montpelliérain Alexander Grothendieck, Place Eugène Bataillon, Bât. 9, CC051, 34095 Montpellier CEDEX 5, France;, Mechanics and Mathematics Faculty, M. V. Lomonosov Moscow State University, Moscow
119992, Russia
E-mail address: [email protected]; [email protected]
| 4math.GR
|
A generalization of the Log-Lindley distribution – its properties and applications
S. Chakraborty1*, S. H. Ong2 and C. M. Ng2
1
2
Department of Statistics, Dibrugarh University, India
Institute of Mathematical Sciences, University of Malaya, Malaysia
* Corresponding author. Email: [email protected]
(Version II-21st October 2017)
Abstract
An extension of the two-parameter Log-Lindley distribution of Gomez et al. (2014) with
support in (0, 1) is proposed. Its important properties like cumulative distribution
function, moments, survival function, hazard rate function, Shannon entropy, stochastic n
ordering and convexity (concavity) conditions are derived. An application in distorted
premium principal is outlined and parameter estimation by method of maximum
likelihood is also presented. We also consider use of a re-parameterized form of the
proposed distribution in regression modeling for bounded responses by considering a
modeling of real life data in comparison with beta regression and log-Lindley regression
models.
1. Introduction
In statistical research many attempts have been made to introduce alternative to the
classical beta distribution (see Gomez et al., 2014 for details). But most of these
distributions involved special functions in their formulations barring the Kumaraswamy
distribution (Jones, 2012).
Distribution with support (0, 1) and having a compact
cumulative distribution function (cdf) can be used as a distortion function to define a
premium principle. Recently, a new pdf with bounded support in (0,1) was introduced by
Gomez et al. (2014), as an alternative to the classical beta distribution by suitable
transformation of a particular case of the generalized Lindley distribution proposed by
Zakerzadeh and Dolati (2010). The new distribution called Log-Lindley (LL) distribution
Preprint Version II
1
has compact expressions for the moments as well as the cdf. Gomez et al. (2014) studied
its important properties relevant to the insurance and inventory management applications.
The new model is also shown to be appropriate regression model to model bounded
responses as an alternative to the beta regression model. The LL distribution of Gomez et
al. (2014) is probably the latest in a series of proposals as alternatives to the classical beta
distribution. Unlike its predecessors the main attraction of the LL distribution is that it
has nice compact forms for the probability density function (pdf), cdf and moments,
which do not involve any special functions.
The LL distribution of Gomez et al. (2014) is given by
Pdf: f ( x; , )
2
( log x ) x 1 , 0 x 1, 0, 0
1
(1)
Cdf: F ( x; , )
x [1 ( log x)]
1
(2)
Moments: E ( X r ; , )
2 1 (r )
, r ,2,1,1, 2,
1 (r ) 2
(3)
In this paper we attempt to extend the LL distribution to provide another distribution
in (0, 1) having compact expressions for the pdf, cdf and moments and study its
properties and applications.
2. Extended Log-Lindley distribution LL p ( , )
The LL distribution of Gomez et al., (2014) was obtained from a two-parameter
particular case of the three-parameter generalized Lindley (GL) distribution of
Zakerzadeh and Dolati (2010) which has the pdf
2 ( x) 1 ( x)e x
f ( x)
, 0 x 1, 0, 0 .
( ) ( 1)
Gomez et al. (2014) first substituted 1 and then employed the transformation
X log(1 / Y ) to obtain their LL distribution in (1).
In this section, we extend their proposal by employing the same transformation to
the GL distribution directly to derive what we call the generalized Log-Lindley
2
distribution. This proposed three-parameter distribution can be seen as an extension of
the LL distribution of Gomez et al. (2014) with an additional parameter ‘p’. We denote
the new distribution by LL p ( , ) . The pdf and cdf of the proposed distribution are given
respectively by
f ( x; , , p)
2 p
( log x ) p ( log x ) x 1 ,
(1 p)[1 p ]
0 x 1, 0, 0, p 0
(4)
and
F ( x; , , p )
[ x (1 p ) Ei( p, log x )] ( log x)1 p
(1 p ) [1 p ]
(5)
where Ei(n, z ) e zt / t n dt z n1(1 n, z ) is the exponential integral and (1 n, z ) is
z
the upper incomplete gamma function. In particular, the recurrence relations
n Ei(n 1, z ) e z zEi(n, z ) and
d
Ei(n, z ) zEi (n 1, z )
dz
can be utilized in conjunction with Ei(0, z ) e z / z to obtain expressions for higher
integral values on n. Moreover, as z , Ei(n, z ) e z / z (see http:// mathworld.
wolfram.com/ En-Function.html for more results).
Alternatively, we can write the cdf in (5) in terms of upper incomplete gamma function as
x ( log x )1 p (1 p )(1 p, log x )
.
F ( x; , , p )
(1 p ) [1 p ]
p
Further using the result ( p 1, y ) p! e y y k / k! for integer p, the cdf can be written
k 0
in a compact from devoid of any special function as
p
x ( log x)1 p (1 p ) p! x ( log x) k / k!
F ( x; , , p)
k 0
(1 p ) p!
3
.
Important particular cases of LL p ( , ) :
i.
for p 0 , we get back the LL distribution of Gomez et al. (2014) in (1).
ii.
for p 0, 1 , as , LL p ( , ) Uniform (0, 1) .
iii.
for p 1 , we get new LL1 ( , ) distribution as:
Pdf: f ( x; , )
3
( log x)( log x) x 1 ,
[2 ]
Cdf: F ( x; , )
x [2 log x (2 log x )]
2
3 [(r ) 2]
Moment: E ( X ; , )
,
(r ) 3 [2 ]
r
iv.
0 x 1, 0, 0
r ,2,1, 1, 2,
(7)
(8)
(9)
for p 2 , we get new LL2 ( , ) distribution as
Pdf: f ( x; , )
4
( log x) 2 ( log x ) x 1 ,
6 2
Cdf: F ( x; , )
x [6 2 log x {6 2 log x (3 log x)}]
6 2
Moment: E ( X r ; , )
4 [ 2 ( r ) 6]
,
2(r ) 4 (3 )
0 x 1, 0, 0
r ,2,1, 1, 2,
(10)
(11)
(12)
2.1 Shape of LL p ( , ) distributions
Here we have drawn some illustrative pdf of LL p ( , ) distributions for different choices
of parameters , and index p to study their shapes. It is observed that the distribution
can be positively or negatively skewed and symmetrical. The pdf can also be increasing
or decreasing.
4
(a)
(b)
(c)
(d)
(e)
(f)
Figure 1. Pdf plots of LL p ( , ) when p = 0 (red), 1 (green), 3(blue), 5 (brown), 7
(light green) for (a) 20, 0.001 (b) 5, 0.1 (c) 20, 5 (d)
2, 0.1 (e) 0.5, 10 (f) 0.9, 0
5
2.2 Moment
Here we derive general result for moments of LL p ( , ) distribution and obtain its
particular cases.
2 p ((r ) (1 p ))
E ( X ; , )
, r ,2,1,1, 2,
(r ) 2 p [1 p ]
r
In particular, E ( X ; , )
1
2 p
1 p (1 )
.
1 p
(13)
(14)
2.3 Mode
The mode plays an important role in the usefulness of a distribution. For the LL p ( , )
distribution the mode occurs at
exp[{1 p (1 ) 4 p ( 1) (1 p (1 ))2 } / 2(1 )] .
2.4 Survival and Hazard Rate functions
S ( x; , , p )
r ( x; , , p )
(1 p ){(1 p) ( log x)1 p Ei ( p, log x)} x ( log x)1 p
(1 p) [1 p ]
(1 p ){ (1 p) (1 p, log x)} x ( log x )1 p
(1 p )[1 p ]
2 ( log x ) p ( log x ) x 1
(1 p ){(1 p) ( log x )1 p Ei( p, log x )} x ( log x)1 p
2 ( log x)( log x ) p
(1 p ){(1 p) (1 p, log x)} x ( log x)1 p
(15)
It can be easily checked that for p 0 , the above results reduce to those of the LL0 ( , )
distribution of Gomez et al. (2014). When p is an integer the expressions can be written
p
in compact form using the result ( p 1, y ) p! e y y k / k!.
k 0
6
Some illustrative plots of the hazard function of LL p ( , ) distributions for different
choices of parameters , and index p are presented in Figure 2, which reveals that the
hazard function can be increasing and bath-tub shaped.
Figure 2. Hazard rate function plots of LL p ( , ) when p = 0 (red), 1 (green), 3 (blue), 5
(brown), 7 (light green) for (a) 0.9, 2 (b) 2, 2 (c) 5, 2
2.5 Shannon Entropy of LL p ( , )
Here we derive the Shannon entropy of LL p ( , ) in terms of that of LL0 ( , ) .
H p ( X ) E[ log f ( X ; , , p)]
2 p
E log
( log X ) p ( log X ) X 1
(1 p)[1 p ]
2 p
log
pE log (log(1 / X ) E[log{( log X ) X 1}]
(1 p)[1 p ]
2 p
log
pE log (log(1 / X )
(1 p)[1 p ]
2
2
E log
( log X ) X 1 log
1
1
(1 p )(1 p)
log
pE[log (log(1 / X )] H 0 ( X )
(1 ) p
(16)
It can be checked that for p 0 , H p ( X ) reduces to H 0 ( X ) , the Shannon entropy of
LL0 ( , ) which is the Log-Lindley (see proposition 2 in page 51 of Gomez et al., 2014).
7
For integral values of index parameter p, exact expression for Elog (log(1 / X )] can be
obtained using Mathematica as follows.
p 1, E log {log(1 / X )}
3 (2 )( log )
2
p 2, E log {log(1 / X )}
11 3 2(3 )( log )
6 2
p 3, E log {log(1 / X )}
50 11 6(4 )( log )
24 6
p 4, E log {log(1 / X )}
274 50 24(5 )( log )
,…
120 24
Thus, for p 1 , Shannon Entropy for LL1 ( , ) using (16) is given by
(2 ) 3 (2 )( log )
H1 ( X ) log
H0( X ) .
2
2
(1 )
2.6 Stochastic Ordering
We will consider the likelihood ratio (LR), hazard rate (HR) and stochastic (ST)
orderings for LL p ( , ) random variables in this section.
Theorem1. Let X 1 and X 2 be random variables following LL p1 (1 , 1 ) and LL p2 ( 2 , 2 )
distributions, respectively. If 1 2 , 1 2 and p2 p1 then X1 LR X 2 .
Proof: Consider the ratio
2 p
f ( x; 2 , 2 , p2 ) 2 2 (1 p1 )[1 p1 11 ]
( log x) p2 p1 h( x )
f ( x; 1 , 1 , p1 ) 12 p1 (1 p2 )[1 p2 2 2 ]
where h( x)
(17)
2 log x 2 1
x
. Gomez-Deniz et al. (2014) has shown that the function
1 log x
h(x) is non-decreasing for x (0,1) if 1 2 , 1 2 . Here, if p2 p1 , it is clear that
( log x ) p2 p1 is non-decreasing for x (0,1) . This implies that if 1 2 , 1 2 and
p2 p1 , then the ratio in (17) is non-decreasing for x (0,1) and hence, X1 LR X 2 .
8
The result on LR ordering leads to the following (Gomez-Deniz et al., 2014):
X 1 LR X 2 X 1 HR X 2 X 1 ST X 2 . Therefore, similar results as in Corollary 1 of
Gomez-Deniz et al. (2014) can be shown for the new log-Lindley distribution as follows.
Corollary 1. Let X1 and
X 2 be random variables following LL p1 (1 , 1 ) and
LL p2 ( 2 , 2 ) distributions, respectively. If 1 2 , 1 2 and p2 p1 , then
a. the moments, E[ X 1k ] E[ X 2k ] for all k 0 ;
b. the hazard rates, r1 ( x) r2 ( x) for all x (0,1) .
2.7 Convexity and Concavity for Generalized Log-Lindley Distribution
For brevity, we suppress the cdf notation for LL p , distribution in (5) as F (x) in this
section.
Theorem 2: If 0 1 , p 0 and 0 , then F (x) is concave for x (0,1) . Hence,
for 0 1 , F (x) is also log-concave for x (0,1) since F ( x) 0 .
Proof: If 0 1 , then ( log x) p , ( log x) and ( x ) 1 are decreasing in x (0,1) for
p 0 and 0 . This implies that the pdf
F ( x) f ( x; , , p )
2 p
( log x) p ( log x ) x 1 ,
(1 p )[1 p ]
is decreasing in x (0,1) . Thus, F (x) is concave for x (0,1) .
Since F ( x) 0 , concavity implies F (x) is also log-concave for x (0,1) .
Theorem 3. The function F (x) is not convex or concave for x (0,1) for any 1 ,
p 0 and 0 .
Proof: For any 1 , p 0 and 0 , consider the second order derivative of F (x)
given by
F ( x )
2 p
p 1
p
x 1 ( log x) p1 ( 1)(log x) 2
log x
(1 p )[1 p ]
1
1
9
In order for
F (x)
to be convex,
F (x)
must be
0
or that the term
p 1
p
2
log x
(log x )
0 for all x (0,1) . However, when x 1 ,
1
1
p 1
p
p
2
0.
log x
(log x )
1
1
1
Thus, F (x) is not convex for x (0,1) for any 1 , p 0 and 0 .
When x 0 ,
p 1
p 1
p
p
1
2
2
(log
x
)
log
x
(log
x
)
1
.
1
1
log x
( 1)(log x) 2
This implies that F (x) cannot be 0 for all x (0,1) . Therefore, F (x) is not concave
for x (0,1) for any 1 , p 0 and 0 .
Note: F (x) is convex for x (0,1) only for p 0 and ( 1) 1 as shown in GomezDeniz et al. (2014).
3. Application to insurance premium loading
Theorem 4. If F ( x; , ) of LL p ( , ) given by (5) is concave, then 1 F (1 x; , ) is
a convex function from (0, 1) to (0, 1) for 0 1 and p 0, 0 .
Proof: It has been shown in Theorem 2 that the cdf F ( x; , ) of LL p ( , ) is concave
for 0 1 and p 0, 0 . Hence, 1 F (1 x; , ) is a convex function from (0, 1) to
(0, 1).
Remark: F ( x; , ) can be used as a distortion function to distort survival function (sf) of
a given random variable as stated in the corollary below.
Corollary 2. If X is the risk with sf G (x ) and let Z be a distorted random variable with sf
H , ( x ) F [G ( x); , ] for 0 1 and p 0, 0 . Let E[Z ]
F [G ( x); , ] dx
0
10
P , ( X ) be the distorted premium and Pn ( X ) [G ( x)]n dx , 0 n 1 be the
0
proportional hazard premium (see Wang, 1995) of a insurance product respectively. Then
P , ( X ) is a premium principle such that
i.
Pn ( X ) P , ( X ) max( X ) , for all n
ii.
P , (aX b) aP , ( X ) b ,
iii. if G1 ( X 1 ) and G1 ( X 2 ) are sf of two non negative risk random variables X 1 and
X 2 with G1 ( X 1 ) G2 ( X 2 ) , that is, X 1 precedes X 2 under first stochastic
dominance then P , ( X 1 ) P , ( X 2 ) ,
X 1 precedes
iv. if
X 2 under second stochastic dominance, that is, if
G ( x ) dx G ( x ) dx
1
1
1
x
2
2
2
for all x 0 then P , ( X 1 ) P , ( X 2 ) .
x
Proof: From theorem 2 above we know that F ( x; , ) is concave for x (0,1) when
0 1 , p 0 and 0 . Also being a cdf, it is an increasing function of x with
F (0; , ) 0 and F (1; , ) 1 .
The results (ii), (iii) and (iv) follow immediately from definition 6 of distortion premium
principle and subsequent properties thereof in Wang (1996).
For the result (i) from Wang (1996) it follows that P , ( X ) max( X ) .
Now we provide a proof of Pn ( X ) P , ( X ) . We first prove that for any p, F x; , , p
x .
Case I: When p is an integer, we get
p
x
F x; , , p
1 p
1 p
( log x )
(1 p ) p! x
( log x)
k 0
(1 p ) p!
11
k
/ k!
p
( log x ) k
( log x )1 p
x 1
x .
k
!
(
1
p
)
p
!
k 1
Case II: For real p, we apply the integral representation (https://en.wikipedia.org/wiki/
Incomplete_gamma_function; see section “Evaluation Formulae”)
(1 p, y ) e
y
y
1 p
yu
e 1 u
p
du
0
p
e y y1 p e yu u du e y e t t p 11dt e y (1 p )
0
0
Hence,
x
F x; , , p
( log x)1 p (1 p )(1 p, log x)
(1 p ) [1 p ]
x ( log x)1 p (1 p )e log x (1 p)
( log x)1 p
x 1
x
(1 p) [1 p ]
(1 p) [1 p ]
Therefore for any p, F x; , , p x . It follows that
F ( x; , ) x x F ( x; , ) for x (0,1)
(G ( x )) F (G ( x ); , ) since 0 G ( x ) 1 for all x .
(G ( x )) F (G ( x ); , ) for all x .
Now, for all x , we have
(G ( x )) n F (G ( x ); , ) when 0 n 1
0
0
(G ( x )) n dx F (G ( x); , ))dx Pn ( X ) P , ( X ) .
Note: This new distorted premium principle is a tradeoff between the proportional hazard
premium
and
maximal
loss.
For
n 1,
Pn ( X ) E ( X )
and
Pn ( X ) max( X ) (see Wang, 1995).
4. Parameter Estimation: Maximum Likelihood Estimation
The likelihood function for a random sample of size n from the LL p , is
n( 2 p )
L
(1 p)(1 p )n
n
log xi
i 1
12
p
n
( log x ) x
i
i 1
1
.
for
n 0,
The log-likelihood function is then given by
n
l log L n(2 p) log n log (1 p ) n log(1 p ) p log( log xi )
i 1
n
n
log( log xi ) ( 1) log xi .
i 1
i 1
The first and second order derivatives of the log-likelihood function are:
n
l n(2 p)
n
log xi
1 p i 1
n
l
n
1
1 p i 1 log xi
n
l
/ (1 p)
n
n log n
log[log[1 / xi ]]
p
(1 p ) 1 p i 1
2l n ( 2 p )
n2
n[(2 p)(1 p ) 2 2 2 ]
2
2
(1 p ) 2
2 (1 p ) 2
n
2l
n 2
1
2
2
2
(1 p )
i 1 ( log xi )
2
/ (1 p )
2l
// (1 p )
n
n
p 2
(1 p)
(1 p )
2l
n
n
2
(1 p ) 1 p
2l
n
n
p (1 p ) 2
2l
n
p
(1 p ) 2
For information matrix we obtain the following result
13
r
p
n
p 1
1
2 p e
p
E
( ) (r , ) .
2
i 1 ( log xi ) (1 p)[1 p ] r 0 r
For p 0 , this reduces to the result given in Gomez et al. (2014).
The information matrix is given by
n[( 2 p)(1 p ) 2 2 2 ]
2 (1 p ) 2
n
(1 p ) 2
n
1 p
p p 1
2 p e
r ( ) p (r , )
(1 p)[1 p ] r 0
r
n 2
(1 p )
2
//
(1 p)
n
(1 p )
n
n
(1 p ) 2
n 2
(1 p ) 2
/ (1 p)
n
(1 p)
2
This matrix can be inverted to get asymptotic variance-covariance matrix for the
maximum likelihood estimates.
5. Numerical Applications
In this section, for the purpose of application with the LL p , regression model, reparameterization of the distribution is required. The LL p , will be re-parameterized
in terms of its mean, in (14) together with two other new parameters and such
that the parameters in (4) are replaced by:
(2 ) 2 2 2 4 (1 )
log
1 p
,p
,
2(1 )(1 )
log(1 )
1
The new parameters are such that 0 < < 1, > 0, 1 1 . The LL p ( , ) will
now be denoted in terms of the new parameters as LL ( , ) . When γ = 1, the reparameterized log-Lindley distribution of Gomez et al. (2014) is obtained.
Suppose that a random sample Y1 , Y2 , , Yn of size n is obtained from the
LL , distribution. For a set of k covariates, the logit link for the LL ( , )
regression model gives the mean for each Yi as
14
i
where
xTi 1, xi1 , , xik
are
exp( x Ti β )
1 exp( x Ti β)
the
, i 1, 2, , n
covariates
with
corresponding
coefficients
β 0 , 1 , , k .
Here, the beta, LL and LL ( , ) regression models are applied on the data set
originally used in Schmit and Roth (1990) and considered in Gomez-Deniz et al. (2014)
about the cost effectiveness of risk management (measured in percentages) in relation to
exposure to certain property and casualty losses, adjusted by several other variables such
as size of assets and industry risk. Description on the data set may be found in GomezDeniz et al. (2014). We take the response variable to be Y = FIRMCOST/100. Six other
variables (covariates) are ASSUME (X1), CAP (X2), SIZELOG (X3), INDCOST (X4),
CENTRAL (X5) and SOPH (X6). Similar to the analysis on the same data set by Jodra and
Jimenez-Gamero (2016), which used a different re-parameterization of the Log-Lindley
distribution, we investigated the cases of y and 1 – y with and without covariates.
Analysis was performed using the R packages. Beta regression is performed using
the package betareg, while LL and LL ( , ) regressions are performed through
optimization using the function mle2 under the package bbmle. The log-likelihood values
and parameter estimates for the models considered, with and without covariates, are
presented in Table 1.
15
Table 1. Log-likelihood values and parameter estimates for beta, Log-Lindley and
generalized Log-Lindley models, with and without covariates
Y
1–Y
Models
Log-likelihood
Estimates
Log-likelihood
Estimates
a = 0.6125
76.1175
a = 3.7979
(a) Without covariates
Beta(a,b)
76.1175
b = 3.7979
Log-Lindley,
76.6042
LL
Generalized
= 0.03427
b = 0.61252
69.0196
= 0.6907
83.2511
Log-Lindley,
= 0.3824
= 4.16×103
= 5.9076
69.0195
= 2.66×103
= 1.2694
= 5.9077
p = 1.7819
p = 1.0×10-6
LL p ( , )
(b) With covariates and logit link for regression
Beta ( , )
Log-Lindley,
LL1 ( , )
87.7230
83.7575
0 = 1.8880
87.7230
0 = -1.8880
1 = -0.01214
1 = 0.01214
2 = 0.1780
2 = -0.1780
3 = -0.5115
3 = 0.5115
4 = 1.2363
4 = -1.2363
5 = -0.01216
5 = 0.01216
6 = -0.003721
6 = 0.003721
= 6.331
= 6.331
0 = 1.6767
1 = -7.57×10-3
16
96.7689
0 = -2.7200
1 = 0.03208
Generalized
91.9525
2 = 0.08903
2 = -0.7378
3 = -0.4281
3 = 0.7024
4 = 0.9687
4 = -3.7854
5 = -0.02318
5 = 6.86×10-3
6 = 2.91×10-4
6 = 0.03593
= 0.03488
= 67.212
0 = 0.2175
96.8252
0 = -2.7149
Log-Lindley,
LL ( , )
1 = 0.004907
1 = 0.03221
2 = -0.1335
2 = -0.7508
3 = -0.2644
3 = 0.7049
4 = 0.4451
4 = -3.7945
5 = -0.07726
5 = 0.002473
6 = 0.005268
6 = 0.03570
= 0.1755
= 65.0001
γ = 2.6735
γ = 1.0021
In terms of the log-likelihood values, it is clear from the results in Table 1 that the
generalized Log-Lindley model fits the data best with or without covariates for the
response variable y. It is also the best model for the regression of 1 – Y, while the beta
model is the best for this case without covariates. For the case of modeling 1 – Y without
covariates, it is seen that the estimates for the parameter p of the LL p , model
approaches 0 and hence, approaches the results for the LL distribution. Similarly for the
regression of 1 – Y with covariates, the estimates of the parameter γ for the LL ,
model approaches 1 and hence, the results approach that of the LL regression model.
17
6. Conclusion
A generalized Log-Lindley distribution has been investigated with important
properties such as the pdf, cdf, survival function and hazard rate function derived.
Application to a real life data set shows the relevance of the newly proposed distribution
in regression modeling. The proposed distribution nests the Log Lindley distribution
proposed by Gomez-Deniz et al. (2014) and offers compact expression for cdf and
moments.
References
1. G´omez−D´eniz, E, Sordo, M.A. and Calder´in−Ojeda, E (2014). The LogLindley distribution as an alternative to the beta regression model with
applications in insurance, Insurance: Mathematics and Economics, 54, 49-57.
2. Jodra, P. and Jimenez-Gamero, M.D. (2016). A note on the Log-Lindley
distribution, Insurance: Mathematics and Economics, 71, 189-194.
3. Jones, M.C. (2009). Kumaraswamy’s distribution: a beta-type distribution with
some tractability advantages, Statistical Methodology, 6, 70-81.
4. Nadaraja, S. (2005) Exponentiated Beta Distribution -, Computers and
Mathematics with Application, 49, 1029-1035
5. Schmit, J.T., Roth, K. (1990). Cost effectiveness of risk managements practice.
The Journal of Risk and Insurance 57 (3), 455–470.
6. Wang, S. (1995). Insurance pricing and increased limits rate making by
proportional hazards transformations, Insurance: Mathematics and Economics, 17,
43-54.
7. Wang, S. (1996). Premium calculation by transforming the layer premium
density, Astin Bulletin, 26 (1), 71-92.
8. Zakerzadeh, H., Dolati, A., 2010. Generalized Lindley distribution. Journal of
Mathematical Extension 3 (2), 13–25.
18
| 10math.ST
|
TO APPEAR IN IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS-I: REGULAR PAPERS
1
VLSI Designs for Joint Channel Estimation and
Data Detection in Large SIMO Wireless Systems
arXiv:1709.07860v1 [cs.IT] 22 Sep 2017
Oscar Castañeda, Tom Goldstein, and Christoph Studer
Abstract—Channel estimation errors have a critical impact on
the reliability of wireless communication systems. While virtually
all existing wireless receivers separate channel estimation from
data detection, it is well known that joint channel estimation
and data detection (JED) significantly outperforms conventional
methods at the cost of high computational complexity. In this
paper, we propose a novel JED algorithm and corresponding
VLSI designs for large single-input multiple-output (SIMO)
wireless systems that use constant-modulus constellations. The
proposed algorithm is referred to as PRojection Onto conveX hull
(PrOX) and relies on biconvex relaxation (BCR), which enables us
to efficiently compute an approximate solution of the maximumlikelihood JED problem. Since BCR solves a biconvex problem
via alternating optimization, we provide a theoretical convergence
analysis for PrOX. We design a scalable, high-throughput VLSI
architecture that uses a linear array of processing elements
to minimize hardware complexity. We develop corresponding
field-programmable gate array (FPGA) and application-specific
integrated circuit (ASIC) designs, and we demonstrate that PrOX
significantly outperforms the only other existing JED design in
terms of throughput, hardware-efficiency, and energy-efficiency.
Index Terms—FPGA and ASIC designs, joint channel estimation and data detection (JED), large single-input multiple-output
(SIMO) wireless systems, biconvex relaxation (BCR).
I. I NTRODUCTION
IRELESS communication with a large number of
antennas at the base-station (BS) will play a major
role in fifth-generation (5G) systems. By equipping the BS
with hundreds or thousands of antenna elements, large wireless
systems enable fine-grained beamforming and, hence, improved
spectral-efficiency within each cell compared to traditional
communication systems that use a small number of BS
antennas [2]–[7]. All these advantages come at significantly
increased signal-processing complexity at the BS [8], which
necessitates the development of high-performance transceiver
algorithms that scale well to large BS array sizes and can be
implemented in very-large scale integration (VLSI) circuits at
low costs and in an energy-efficient manner.
W
A. The Importance of Accurate Channel State Information
Due to the fine-grained nature of beamforming in such
large wireless systems, the acquisition of accurate channel
O. Castañeda and C. Studer are with the School of Electrical and Computer
Engineering, Cornell University, Ithaca, NY; e-mail: [email protected],
[email protected]; web: http://vip.ece.cornell.edu
T. Goldstein is with the Department of Computer Science, University of
Maryland, College Park, MD; e-mail: [email protected]
A short version of this paper summarizing the PrOX FPGA design has been
presented at the IEEE Int. Symp. on Circuits and Systems (ISCAS) 2017 [1].
The MATLAB simulator for PrOX used in this paper is available on GitHub:
https://github.com/VIP-Group/PrOX.
state information (CSI) at the BS is critical for reliable, highthroughput data transmission. In particular, accurate channel
state information is not only required in the uplink (to
coherently detect data transmitted from the users to the BS),
but also required for beamforming or precoding in the downlink
(to precisely focus the transmit energy towards the users
and to mitigate multi-user interference). However, the fading
nature of wireless channels as well as pilot contamination,
i.e., channel training that may be contaminated by pilots or
data transmission of users communicating in adjacent cells [2],
render the acquisition of accurate CSI without a significant
channel-training overhead a difficult task.
Most proposed large wireless systems rely on time-division
duplexing (TDD) and perform pilot-based channel training
during the uplink phase [3], [5]. It is, however, well known
that the quality of CSI can be improved significantly by
joint channel estimation and data detection (JED), which is
capable of approaching the performance of idealistic systems
with perfect CSI [9], [10]. While a few JED algorithms have
been proposed for traditional, small-scale wireless systems [9]–
[16], their computational complexity is typically high and not
much is known about their efficacy for systems with hundreds
or thousands of antennas. Moreover, with the exception of
the recently proposed VLSI designs in [17], no hardware
implementations for JED have been described in the literature.
B. Contributions
In this paper, we propose a novel, computationally efficient
and near-optimal JED algorithm for large SIMO wireless systems, and we develop corresponding very-large scale integrated
(VLSI) designs. Our contributions are summarized as follows:
• We use biconvex relaxation (BCR) [18] to develop PRojection Onto conveX hull (PrOX), a novel algorithm that
achieves near-optimal JED performance at low complexity.
• We theoretically analyze the convergence of PrOX, which
solves a biconvex problem via alternating optimization.
• We introduce an approximation that significantly reduces
the preprocessing complexity of PrOX at virtually no loss
in terms of error-rate performance.
• We provide simulation results that showcase the robustness
of PrOX to a broad range of system parameters.
• We develop a scalable VLSI architecture for PrOX that
uses a linear array of processing elements (PEs) to achieve
high-throughput at low hardware complexity.
• We show reference FPGA and ASIC implementation
results, and compare our designs to that of the recentlyreported JED implementations in [17].
2
TO APPEAR IN IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS-I: REGULAR PAPERS
Our results demonstrate that PrOX provides near-optimal JED at
significantly lower complexity than existing reference designs.
C. Related Relevant Results
theoretical convergence analysis. Section IV details the VLSI
architecture for PrOX. Section V shows error-rate performance
and VLSI implementation results, and compares PrOX to
existing FPGA and ASIC designs. We conclude in Section VI.
While a considerable number of algorithms and VLSI designs
II. S YSTEM M ODEL AND ML-O PTIMAL JED
have been proposed for small- and large-scale multi-antenna
We now introduce the considered SIMO system model and
wireless systems that separate channel estimation and data
develop
the associated ML-JED problem.
detection (see, e.g., [8], [17], [19] and the references therein),
only a few of results have been proposed for JED. Spheredecoding (SD) algorithms have been proposed to perform A. System Model
exact maximum-likelihood (ML) JED in SIMO and MIMO
We study a (potentially large) SIMO wireless uplink system
systems that use a small number of time slots [9]–[12], [20],
in which a single-antenna user transmits data over K + 1
[21]. Unfortunately, the complexity of SD methods quickly
time slots to a BS with B antennas. We consider the standard
becomes prohibitive for larger dimensional problems [22], [23]
block-fading, narrow-band1 channel model with the following
and approximate linear methods, which are widely used for
input-output relation [9]–[11], [20]:
coherent data detection in massive MIMO systems [8], cannot
be used for JED (see Section II-B for the reasons). Very recently,
Y = hsH + N.
(1)
a handful of approximate JED algorithms have been proposed
B×(K+1)
contains the B-dimensional
for large wireless systems [17], [24]–[26]. To the best of our Here, the matrix Y ∈ C
knowledge, reference [17] describes the only VLSI design of a receive vectors for the K + B1 time slots, i.e., Y =
, . . . , yK+1 ] with yk ∈ C and k = 1, 2, . . . , K + 1,
JED algorithm reported in the open literature. While this design [y1 , y2B
(assumed to
achieves near-ML-JED performance, the algorithm relies on h ∈ C is the unknown SIMO channel vector K+1
contains
semidefinite relaxation (SDR), which lifts the dimensionality of remain constant over the K +1 time slots), s ∈ O
the
transmitted
data
symbols
for
all
K
+
1
time
slots,
and
the problem to the square of the number of time slots causing
B×(K+1)
N
∈
C
models
i.i.d.
complex
circularly-symmetric
high hardware complexity. In contrast to all these results, PrOX
avoids lifting while achieving near-ML-JED performance and Gaussian noise with variance N0 per entry. In the remainder
can be implemented efficiently in VLSI, even for scenarios of the paper, we assume constant-modulus constellations, i.e.,
|s| = σ for all s ∈ O and a fixed σ > 0.
that operate with a large number of time slots.
Another line of related work investigates data detection Remark 1. The SIMO case is relevant in many rural dealgorithms that are robust to imperfect CSI [27], [28]. The ployment scenarios in which only a few users are active
idea is to statistically model channel estimation errors and at a time [30]. The assumption of having constant-modulus
to solve suitably adapted data detection problems. The re- constellations limits our results to low-rate modulation schemes,
sulting algorithms, however, (i) do not achieve the error-rate such as BPSK and PSK constellations. While the (multi-user)
performance of JED as they are not taking into account all MIMO case and higher-order QAM modulation schemes would
the received information (i.e., from training and data symbols be of interest in more general deployment scenarios, the
received over multiple time slots) and (ii) do not improve the associated ML-JED problem is significantly more challenging
channel estimate itself—the latter is critical in TDD systems to solve, and requires different, more complex, and complicated
that perform beamforming in the downlink using acquired CSI algorithms; see, e.g., [12], [21] for more details—we are
in the uplink [2]–[5]. In contrast, we propose JED algorithms planning to address this scenario in the future.
that (i) approach optimal error-rate performance as they jointly
process all received information and (ii) generate improved
B. Joint Channel Estimation and Data Detection (JED)
channel estimates that can be used for beamforming.
Let h be a deterministic—but unknown—channel vector
with unknown prior statistics. Then, one can formulate the
D. Notation
following ML-JED problem [11]:
Lowercase and uppercase boldface letters stand for column
JED
ŝ , ĥ = arg min
Y − hsH F .
(2)
vectors and matrices, respectively. For the matrix A, the
K+1
B
s∈O
, h∈C
Hermitian is AH and the kth row and `th column entry is Ak,` .
For the vector a, the kth entry is ak . The Euclidean norm of a, This problem aims at simultaneously finding an estimate for
the Frobenius norm, and the spectral norm of A are denoted the transmitted data vector s and the channel vector h. We
by kak2 , kAkF , and kAk, respectively. The real and imaginary emphasize that there is a phase ambiguity between both output
vectors of ML-JED in (2). Specifically, if ŝJED ejφ ∈ OK+1 for
parts of the vector a are <(a) and =(a), respectively.
φ ∈ [0, 2π), then ĥejφ is also a valid solution to (2). In order to
E. Paper Outline
The rest of the paper is organized as follows. Section II
describes the system model as well as ML-optimal JED.
Section III introduces the PrOX algorithm and provides a
1 An extension to wideband systems that use OFDM [29] is straightforward
as the flat-fading model in (1) remains to be valid per active sub-carrier. An
extension of our methods to channels with multi-user interference or wideband
channels with inter-symbol interference is, however, not straightforward; see
also Remark 1 for more details.
O. CASTAÑEDA ET AL.
3
avoid this phase ambiguity, one can either transmit information
as phase differences among the entries in the vector s, which
is known as differential signaling [24], or fix the phase of at
least one entry in the transmit vector s. As in [17], we set the
first entry of the transmit vector to a fixed constellation point
š ∈ O and exploit this knowledge at the receiver.
where α > 0 is a suitably chosen regularization parameter. To
ensure that the problem in (4) is convex in the vector q, the
parameter α must be larger than the maximum eigenvalue of
the Gram matrix G = YH Y, i.e., α > kYH Yk.
We next relax the finite-alphabet constraint to the convex
hull CO of the set O given by [34]
|O|
|O|
Remark 2. While this approach resembles that of conventional,
X
X
pilot-based data transmission, we emphasize that ML-JED
CO =
αi si | (αi ∈ R+ , ∀i) ∧
αi = 1 ,
is fundamentally different. In traditional, pilot-based data
i=1
i=1
transmission, a small number of known training symbols are
used to generate channel estimates, which are then used during with si , i = 1, . . . , |O|. For example, the convex hull for BPSK
the detection of the data symbols. In contrast, ML-JED uses all constellations CBPSK is the line along the real axis in [−1, +1];
received symbols, i.e., pilots and data symbols, to improve the the convex hull CQPSK for QPSK is the square with the four
quality of CSI. We also note that ML-JED as in (2) jointly solves constellation points as corners. By relaxing O to the convex
for the transmitted data vector s and the channel vector h; this hull CO , we arrive at the following relaxed ML-JED problem:
is in contrast to JED methods that alternate between channel
minimize − kYqk22 + αkq − sk22 .
K+1
estimation and data detection (see, e.g., [13]–[16]) and for
s∈CO
,q∈CK+1
which ML-JED optimality can, in general, not be guaranteed.
For the above problem, it is likely to obtain a solution that is
Since we assumed the entries in s to be constant-modulus, inside the convex hull. We are, however, interested in finding
the ML-JED problem in (2) can be rewritten in the following, solutions that lie at the boundary of the convex hull CO as
more compact form [11]:
the original constellation points in O lie at the boundary. To
this end, we include a norm constraint that promotes large
ŝJED = arg max kYsk2 ,
(3)
values
in s, with the goal of pushing the entries of s towards
K+1
s∈O
the boundary of the convex hull. This leads to the final BCR
and the associated channel estimate is given by ĥ = formulation of the ML-JED problem:
YŝJED /kŝJED k22 . We note that the optimization problem in (3)
ŝBCR =
arg min
−kYqk22 + αkq − sk22 − βksk22 . (5)
resembles the famous MaxCut problem that is known to be NPK+1
K+1
s∈CO ,q∈C
hard [31]. Indeed, general problems of the form (3) are known
to be NP-hard with respect to randomized reductions, even Here, β is a suitably chosen algorithm parameter that satisfies
when only approximate solutions are sought [32]. Nevertheless, β < α, which ensures that the optimization problem is biconvex
for a small number of time slots K + 1, the problem in (3) in the vectors s and q. In words, for a fixed vector q, the
can be solved exactly and at low average complexity using problem in (5) is convex in s, and vice versa.
sphere decoding (SD) methods [11]. For a large number of
time slots, however, SD is known to entail prohibitively high
complexity [33]. Furthermore, linear approximations are useless B. Alternating Optimization
for JED, since the entries of s would grow without bound when
We solve the BCR problem in (5) using alternating minirelaxing the finite-alphabet constraint s ∈ OK+1 to the complex mization, i.e., we keep one of the vectors fixed while solving
numbers s ∈ CK+1 . As a consequence, the design of non-linear for the other. The resulting iterative procedure is given by
and low-complexity algorithms is necessary to enable JED for
q(t) = arg min −kYqk22 + αkq − s(t−1) k22
(6)
practical SIMO systems that use a large number of time slots.
q∈CK+1
(t)
s
III. P ROX: PROJECTION O NTO CONVE X HULL
= arg min αkq(t) − sk22 − βksk22 ,
(7)
K+1
s∈CO
We now develop a novel algorithm to approximately solve the where t = 1, 2, . . . , t
max is the iteration counter.
ML-JED problem in (3) using biconvex relaxation (BCR) [18],
We initialize the above algorithm with s(0) = š(G1,1 )−1 g1c ,
a recent framework to solve large semidefinite programs in
where g1c is the first column of G, and š ∈ O is the fixed
computer vision. The resulting algorithm is referred to as PRosymbol transmitted in the first time slot and known at the
jection Onto conveX hull (PrOX), requires low computational
receiver.
complexity, and achieves near-ML-JED performance.
Since the problem in (5) is biconvex in s and q, both
of the above steps are convex and can be solved optimally.
Furthermore, each of these optimization problems turns out
A. Biconvex Relaxation (BCR) of the ML-JED Problem
to have a closed form solution. Concretely, we obtain the
We start from (3) and include a regularization term that
following two-step PrOX algorithm:
K+1
forces the transmit vector s ∈ O
to be close to a copy
q ∈ CK+1 that is relaxed to the complex numbers as follows:
q(t) = (I − α−1 G)−1 s(t−1)
(8)
minimize
s∈O K+1 ,q∈CK+1
− kYqk22 + αkq − sk22 ,
(4)
s(t) = proxC K+1 (θq(t) ),
O
(9)
4
TO APPEAR IN IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS-I: REGULAR PAPERS
α
> 0, I is the identity matrix, and the proximal
where θ = α−β
operator [35] is defined as
always lie on the boundary of the convex hull CO ; a proof is
given in Appendix B.
proxC K+1 (v) = arg min kv − sk22 .
Theorem 2. Let the conditions of Theorem 1 hold and further
assume α > β > 0. Then, any non-zero stationary point of (5)
lies along the boundary of the set CO .
O
(10)
K+1
s∈CO
This proximal operator is the element-wise orthogonal projection of the vector v = θq(t) onto the convex hull CO around the
constellation set O. For BPSK, the proximal operator in (10)
is given by proxCBPSK (vb ) = max {min {<(vb ), +1} , −1}, i.e.,
the projection onto the real line in [−1, +1]; for QPSK, (10)
corresponds to applying the same operation, independently, to
both <(vb ) and =(vb ). In the case of (9), we have v = θq(t)
with θ > 0 and hence, the proximal operator in (10) projects a
scaled version of q(t) onto the convex hull of the constellation
set CO —this is why we dub our algorithm PRojection Onto
conveX hull (PrOX).
C. Convergence Theory of PrOX
Remark 3. Theorem 1 and Theorem 2 do not guarantee PrOX
to find a global minimizer to the ML-JED problem (3), but
rather stationary (or saddle) points that lie on the boundary of
the convex hull—although we often observe global minimizers
in practice (cf. Section V-A). The development of stronger
results that provide conditions for which PrOX finds the optimal
solution is challenging and left for future work.
D. Simplifying the Preprocessing Stage
For a large number of time slots K + 1, computing the
b = (I − α−1 G)−1 in (8) results in high
matrix inverse G
preprocessing complexity. We now propose an approximate
method that substantially reduces the preprocessing complexity
for PrOX at a negligible loss in terms of error-rate performance.
Let kGk < α for any consistent matrix norm k · k. Then,
we have the following Neumann series expansion [36]:
We now show that the PrOX algorithm is well behaved,
even though it solves a biconvex problem using alternating
optimization. More specifically, we begin by establishing that
the iterates q(t) and s(t) generated by PrOX converge to
stationary points of the objective function in (5), provided that
∞
X
the algorithm parameters α and β are chosen appropriately.
(α−1 G)k .
(11)
(I − α−1 G)−1 =
We then show that these stationary points lie on the boundary
k=0
K+1
of the convex hull CO
, which implies that our biconvex As put forward in [8] for data detection in massive MIMO
relaxation is reasonably tight. In what follows, we denote the systems, one can approximate a matrix inverse by truncating
objective function of PrOX in (5) as
the series expansion to the first two terms, which is
( 1
β
K+1
α
2
2
2
− 2 kYqk2 + 2 kq − sk2 − 2 ksk2 , if s ∈ CO
(I − α−1 G)−1 ≈ I + α−1 G.
(12)
f (q, s) =
∞, otherwise.
Evidently, the expression on the right-hand side does not require
1
Note that the factors of 2 do not affect the solution of PrOX. the computation of a matrix inverse, which significantly reduces
At an optimal solution, the sub-gradients of f with respect the preprocessing complexity. More specifically, the matrix
to both s and q should be zero. Because s(t) is computed by to be inverted in the left-hand side of (12) is of dimension
minimizing f with respect to s(t) , we already know that the (K + 1) × (K + 1). The complexity (in terms of the number
sub-gradient of f with respect to s(t) contains zero. We can of real-valued multiplications) of an explicit matrix inversion
thus measure the optimality of the iterates by examining only using, e.g., the Cholesky factorization scales with (K + 1)3
∇q f, the gradient of f with respect to q. We now show that and exhibits stringent data dependencies when implemented
this gradient vanishes for a large number of iterations t; the in VLSI; see [8] for more details on the computational
complexity of Cholesky-based matrix inversion and a VLSI
proof is given in Appendix A.
design. Hence, for a large number of time slots K, the
Theorem 1. Suppose that the parameters α and β satisfy approximate preprocessing method in (12) yields significant
α > kGk and α > β. Then, the PrOX algorithm in (8) and (9) savings in terms of hardware complexity.
converges in the gradient sense, i.e.,
We have the following result that bounds the error of the
(t) (t)
approximation
in (12); the proof is given in Appendix C.
lim ∇q f (q , s ) = 0.
t→∞
Furthermore, any limit point of the sequence of iterates is a
stationary point.
Theorem 3. Let α > kGk. Then, the error of the approximation in (12) is bounded by
kα−1 Gk2
The PrOX algorithm is founded on the idea of replacing the
k(I − α−1 G)−1 − (I + α−1 G)k ≤
.
1 − kα−1 Gk
discrete constellation O with its convex hull CO . This results
in a biconvex problem that is easily solved without resorting
This result implies that if kGk is smaller than α, then
to expensive discrete programming or lifting-based methods. the approximation error will be small. In other words, the
However, in using a biconvex relaxation, there is a risk of approximation error will depend on the parameter α, which we
finding a minimizer that lies somewhere in the interior of the can tune in practice for optimal performance. In Section V-A,
convex hull CO , far away from any of the constellation points. we will show that PrOX with this approximation results in
We now provide conditions for which this situation does not excellent error-rate performance while significantly reducing
b
happen. The following theorem shows that minimizers of (5) the complexity compared to using the original matrix G.
O. CASTAÑEDA ET AL.
5
E. Hardware-Friendly Variant of PrOX
As a last step, we now modify the PrOX algorithm in (8)
and (9) to make it more hardware friendly. Since the BS is
assumed to know the first entry of s, there is no need to apply
the algorithm to this particular entry. Consequently, we force
(t)
the entry s1 to be š at the end of each iteration.
b exhibits, in general, a large dynamic range
The matrix G
for different system configurations and channel realizations.
To facilitate fixed-point design, we divide all of its elements
by a constant γ > 0, so that the entries of the resulting matrix
are close to one in absolute value. This scaling procedure
requires us to introduce a new vector q̃ = γ −1 q, resulting in
the following modified PrOX algorithm:
b (t−1)
q̃(t) = γ −1 q(t) = γ −1 Gs
(t)
s
(13)
(t)
(t)
= proxC K+1 (θγ q̃ ) = proxC K+1 (%q̃ ),
O
O
(14)
where % = θγ. With these two modifications, we arrive at the
hardware-friendly version of PrOX summarized as follows:
Algorithm 1 (Hardware-Friendly PrOX). Fix the algorithm parameters % > 0 and α > kGk. Precompute the
b using one of the following expressions:
matrix G
b = γ −1 (I − α−1 G)−1
G
b = γ −1 (I + α−1 G),
G
(15)
(16)
architecture consists of a linear array of N = K + 1 processing
elements (PEs), each one dedicated to computing an entry of
the vectors s and q̃. To execute Algorithm 1, each PE has three
b
key components: (i) a G-matrix
memory, (ii) a complex-valued
multiply-accumulate (MAC) unit, and (iii) a projection unit (see
b
the right side of Figure 1). The G-matrix
memory comprises
two memories to store the real and imaginary parts of ĝkr , i.e.,
b We assume that G,
b which is
the kth row of the matrix G.
the result of either (15) (for PrOX) or (16) (for APrOX), was
computed and loaded in the memories during a preprocessing
step. The MAC unit of the kth PE is used to sequentially
compute the kth row of the matrix-vector product (MVP) in
(t)
Step (17) of Algorithm 1, resulting in q̃k (see Section IV-B
for the details). Finally, the projection unit of the kth PE
computes the kth entry of Step (18) of Algorithm 1, i.e., it
(t)
(t)
(t)
uses q̃k to acquire sk . Since s1 = š, the first PE does
not need the previous three key components. Instead, PE 1
only contains two multiplexers and flip-flops that store the
predefined constellation point š in order to implement Step (19)
of Algorithm 1. The implementation of all other PEs is identical
and uses the aforementioned three key components. For these
PEs, the hard-output estimates in Step (20) are extracted directly
from the sign bits at the outputs of the projection units.
B. Matrix-Vector Product (MVP)
Before explaining the operation details of the proposed VLSI
architecture, we focus on the main computation of PrOX: the
MVP operation in Step (17) of Algorithm 1. A straightforward
b (t−1) using a linear array of
way
for computing q̃(t) = Gs
(t)
(t−1)
b
q̃ = Gs
(17)
PEs is depicted in Figure 2(a) for N = K + 1 = 3. This
s(t) = proxC K+1 (%q̃(t) )
(18)
architecture computes q̃(t) sequentially and on a column-byO
PN
c (t−1)
(t)
column basis, i.e., it evaluates q̃(t) =
in a
k=1 ĝk sk
s1 = š
(19)
sequential manner over k = 1, . . . , N clock cycles. Here, ĝkc
b While such an approach is
At the end of iteration tmax , compute hard-output estimates
represents the kth column of G.
of the transmitted signals as follows:
conceptually simple, it requires a centralized vector memory
which suffers from a high fan-out at its output (highlighted
(t )
ŝk = arg min |sk max − s|, k = 1, 2, . . . , K + 1. (20)
with red color in Figure 2(a)). More concretely, the vector
s∈O
memory output must be connected to N = K + 1 MAC units,
eventually becoming the critical path for systems with a large
In what follows, we will use PrOX to refer to Algonumber of time slots K +1. While wire pipelining at the output
rithm 1 with exact preprocessing as in (15) and approximate
of the vector memory could be used to mitigate the fan-out, we
PrOX (APrOX) to refer to Algorithm 1 with approximate
propose an alternative solution that avoids this issue altogether.
preprocessing as in (16). We also note that α > 0 and % > 0
Consider the MVP architecture depicted in Figure 2(b). In
are algorithm parameters that can be tuned via numerical
this architecture, we replace the centralized vector memory
simulations to improve the error-rate performance.
by a set of registers: each register is associated with a PE
and contains an entry of the vector s(t−1) . Furthermore, the
IV. VLSI A RCHITECTURE
registers are chained together in a cyclic manner, forming a
We now propose a VLSI architecture for PrOX, which shift register that enables all entries of s(t−1) to reach all the
exhibits high regularity and enables us to achieve high PEs in a round-robin fashion. Then, each PE only needs to
throughput at low hardware complexity.
access the correct entry of ĝkr to ensure that the accumulator of
their MAC unit contains the correct MVP result after N clock
cycles. By following this approach, each register only drives
A. Architecture Overview
the next register in the cycle and one of the MAC unit inputs,
Figure 1 shows the VLSI architecture for PrOX in a
regardless of N , hereby completely avoiding the fanout issue.
system that uses QPSK2 modulation. At a high level, our
We henceforth call this architecture input-cyclic MVP, which
builds the core component of the PrOX architecture shown in
2 For BPSK modulation, the VLSI architecture shown in Figure 1 can be
simplified as data-path elements used to compute = (s) can be removed.
Figure 1 and detailed in the next subsection.
and initialize s(0) = š(G1,1 )−1 g1c . Then, for every
iteration t = 1, 2, . . . , tmax , compute the following steps:
6
TO APPEAR IN IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS-I: REGULAR PAPERS
Complex-valued MAC unit
Projection unit
PE
X
Memory
PE
+
+
-
+
+
+
+
+
X
Memory
X
PE
X
PE
Fig. 1. VLSI architecture of PrOX. Left: linear array of K + 1 processing elements (PEs), which enables us to achieve high throughput at low complexity.
Right: architecture details of the kth PE, which mainly consists of a complex-valued multiply-accumulate (MAC) unit and a projection unit.
b
We note that the reading pattern of the G-matrix
memory
for each PE corresponds to simply accessing the entries of ĝkr
in order. However, in contrast to the conventional architecture
in Figure 2(a), reading can start from any element and wraps
around after reaching the end of ĝkr . Instead of using address
generation logic required to implement this behavior, we store
b
a cyclically-permuted version of ĝkr in the G-matrix
memory
of each PE. By doing so, each PE simply needs to access
b
its G-matrix
memory in regular order starting from the first
address, as it would be done in the conventional architecture
depicted in Figure 2(a).
C. Operation Details of the PrOX Architecture
To implement the input-cyclic MVP architecture, the entries
b matrix for the kth PE are stored in the following
of the G
b k,k ; the
way: The first address of the PE memory contains G
b
second address contains Gk,k+1 , and so on. For example, in
the case shown in Figure 2(b), the second PE would have its
b
b 2,2 , G
b 2,3 , G
b 2,1 }.
G-matrix
entries organized as follows: {G
b k,k
In the first clock cycle, the kth PE has access to both G
(t−1)
(t−1)
b
and sk
, so it can compute the Gk,k sk
product, and store
the result in its accumulator. At the same time, this PE passes
its current s(t−1) entry to the subsequent PE in the chain, i.e.,
the (k − 1)th PE. Passing the current s(t−1) entry to the next
PE will be performed in all PEs during all the clock cycles of
the MVP computation. An example of this first clock cycle is
b 2,2 s2
shown in Figure 2(b), where the second PE computes G
and passes the s2 value to the first PE, so that the first PE has
access to s2 in the second clock cycle.
(t−1)
In the second clock cycle, the kth PE receives sk+1 from
the (k + 1)th PE, the previous PE in the array. As a result, the
b k,k+1 s(t−1) and accumulate it with the
kth PE can compute G
k+1
previous product. For example, in the second clock cycle of
Figure 2(b), the second PE receives s3 from the third PE and
b 2,3 s3 and add it with G
b 2,2 s2 .
is hence able to compute G
(t−1)
In the third clock cycle, the kth PE receives sk+2 from the
(t−1)
(k + 1)th PE. Note that, while the sk+2 value was initially in
the (k+2)th PE, the (k+2)th PE previously passed this value to
the (k + 1)th PE. Then, the kth PE has the necessary operands
to continue executing its complex-valued MAC operation. To
clarify this aspect, let us examine the third clock cycle in
b 2,1 and s1 to finish
Figure 2(b): the second PE has access to G
its computation. While the second PE received s1 from the
third PE, the third PE received s1 from the first PE in the
previous clock cycle.
This example illustrates how the exchange of values between
PEs enables each entry of s(t−1) to circulate through the linear
array of PEs. In the case of the example in Figure 2(b), a
complete circulation of all values in the shift registers takes
three clock cycles. In general, after K + 1 clock cycles, all PEs
have had access to all the entries of s(t−1) and used them to
compute their respective entry of q̃(t) . During this procedure,
the first PE (which is implemented differently than the other
PEs) executes the same procedure: it passes š to the (K + 1)th
PE during the first clock cycle, and in the subsequent clock
cycles sends the s(t−1) entry received from the second PE to
the (K + 1)th PE. As the MAC units contain three pipeline
stages, two clock cycles are required to flush the pipeline.
Hence, the MVP operation in Step (17) of Algorithm 1 is
computed in only K + 3 clock cycles.
We now describe the operation of the projection unit
shown on the right side of Figure 1, which implements
s(t) = proxC K+1 (%q̃(t) ). For QPSK, the projection unit of
O
the kth PE consists of two identical modules: one module
(t)
takes q̄ = <(q̃k ) as its input, while the other module takes
(t)
q̄ = =(q̃k ) as its input. For BPSK, only the module with an
(t)
input of q̄ = <(q̃k ) is required. The function of each module
is to compute %q̄ and to clip its value in case it exceeds an
absolute value of 1. In other words, each module determines
if %q̄ is smaller than −1, larger than +1, or in-between these
numbers, and outputs −1, +1, or %q̄, respectively. As % > 0,
to determine if %q̄ ≥ +1, one can also check q̄ ≥ +1/% or,
equivalently, if q̄ − 1/% ≥ 0, which can be extracted from the
sign bit of q̄ − 1/%. Analogously, to determine if %q̄ < −1, one
X
+
X
+
+
X
X
+
+
Vector Memory
Vector Memory
+
X
X
+
+
+
+
+
+
Vector Memory
X
Cycle 3
Cycle 2
7
Cycle 1
O. CASTAÑEDA ET AL.
X
X
+
+
+
+
+
+
X
+
Cycle 3
Cycle 2
Cycle 1
(a) Conventional column-by-column matrix-vector product
X
+
X
+
+
X
+
X
+
X
+
+
X
+
X
+
+
+
+
+
+
+
X
+
+
(b) Proposed input-cyclic matrix-vector product for PrOX
Fig. 2. Processing details of the matrix-vector product (MVP) operation: (a) conventional approach that proceeds on a column-by-column basis and leads to
high memory fan-out; (b) proposed input-cyclic method that reduces fan-out.
can also check q̄ + 1/% < 0, which can be extracted from the
sign bit of q̄ + 1/%. As a result, each module takes its input q̄
and computes q̄ − 1/% and q̄ + 1/%. Using the sign bits of these
two results, the module can select if the output will be −1,
+1, or %q̄. The quantity %q̄ is computed in parallel with the
calculation of q̄ + 1/% and q̄ − 1/%, which reduces the critical
path. By restricting the parameter % to be a power of two, the
multiplication can be carried out with inexpensive arithmetic
shifts. The projection unit uses one clock cycle to complete
its operation, but it can start only after the K + 3 clock cycles
used by the complex MAC unit. After the projection unit has
(t)
finished, the new sk will be available at the inputs of the
complex-valued MAC unit of the kth PE, ready to start a new
iteration. Consequently, each PrOX iteration requires a total
number of K + 4 clock cycles.
D. Implementation Details
We now provide the remaining implementation details,
including the fixed-point parameters as well as memory
considerations for our FPGA and ASIC designs.
1) Fixed-Point Parameters: To minimize area and power
consumption, and to maximize the throughput, we deploy fixedpoint arithmetic in our design. Specifically, our architecture
uses 6 bit signed fixed-point values for representing the s(t)
b 12 bit
entries, with 3 fraction bits. For the elements of G,
signed fixed-point values are used, with 11 fraction bits. While
18 bit values are generated at the outputs of the multipliers in
the complex-valued MAC unit, only 15 bits are used in the
subsequent adders and accumulators (of which 11 are fraction
bits). The adder and subtractor that receive the outputs from
the multipliers do not saturate, but rather wrap-around which
reduces area and delay. In contrast, the accumulator adders
saturate. The outputs of the complex-valued MAC unit are also
15 bit signed fixed-point values with 11 fraction bits. In the
projection unit, the −1/% and +1/% quantities are represented
using 12 bit signed fixed-point numbers with 11 fraction bits,
and are added to the outputs of the complex MAC unit using
15 bit saturating adders. The outputs of these adders are used
to determine the output of the projection unit. Furthermore,
for all the considered system configurations, % > 1. As % is
restricted to be a power of two, a multiplication with % is
8
TO APPEAR IN IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS-I: REGULAR PAPERS
implemented by an arithmetic left shift. The number of shifts i.e., the downlink channel is the transpose of the uplink channel.
is encoded with a 4 bit number. Only the 6 most significant Hence, we can use the estimated channel acquired in the
bits of the shifted value are taken into the multiplexer of the uplink for MRC-based beamforming in the downlink. We
projection unit, as the output of this multiplexer will become the observe similar trends as for the uplink shown in Figure 3. In
next iterate s(t+1) . We note that these fixed-point parameters particular, PrOX, APrOX, and TASER all achieve near-MLare sufficient to achieve near-floating-point performance; see JED performance. MRC and MRC that uses the estimated
Figures 3 and 4 in Section V-A for corresponding symbol data vector sMRC to compute a re-trained channel estimate
error-rate performance results.
according to ĥ = YŝMRC /kŝMRC k22 (referred to as “RT”) is
b
2) Memory Considerations: For the FPGA designs, the G- able to approach our algorithms by 2 dB and 4 dB, respectively.
matrix memory is implemented using look-up tables (LUTs) Hence, we conclude that JED also significantly improves the
as distributed RAM, i.e., no block RAMs have been used. For reliability of data transmission in the downlink.
b
3) Performance vs. Complexity Trade-offs: Figure 5 shows
the ASIC designs, the G-matrix
memory is implemented using
latch arrays as described in [37]; these memories are built from the trade-offs between the ASIC throughput of PrOX and
standard cells and simplify automated design synthesis, without AProX, and the minimum signal-to-noise ratio (SNR) required
to achieve 1% SER in the uplink for SIMO systems with
a significant area penalty compared to SRAM macrocells.
K = 16 time slots and a varying number of BS antennas.
As
a reference, we include the performance of MRC with
V. R ESULTS
perfect
CSIR and that of the optimal ML-JED detector. We
We now show error-rate performance results as well as FPGA
observed
that by increasing the number of PrOX and APrOX
and ASIC implementation results. We also compare our design
iterations
tmax , the mean squared error (MSE) of the channel
to the only other existing JED design reported recently in [17].
estimate is reduced monotonically and the desired SER is
achieved at a lower SNR at the expense of reduced throughput.
A. Error-Rate Performance
Clearly, PrOX outperforms APrOX for a small number of
1) Uplink Data Detection: Figure 3 shows uplink symbol iterations; this implies that the preprocessing approximation
error-rate (SER) simulation results for PrOX and APrOX, both proposed in Section III-D entails a small performance loss
running tmax = 5 iterations. The simulation results are obtained when a small number of iterations is used. Note that for BPSK
from 50, 000 Monte-Carlo trials in a B = 16 BS antenna modulation, tmax = 2 PrOX iterations are typically sufficient
SIMO system with K = 16 time slots. We consider both to reach near-ML-JED performance at an ASIC throughput of
an i.i.d. flat Rayleigh block-fading channel model as well as 338 Mb/s per PrOX instance. For QPSK, 3 PrOX iterations are
a line-of-sight (LoS) channel with a spherical wave model sufficient at an ASIC throughput of 451 Mb/s.
and a linear BS antenna array with λ/2-wavelength spacing
Remark 4. For all provided simulation results, we have
as described in [38]. As reference points, we also include
assumed perfect synchronization and a transmission free of
the performance of maximum ratio combining (MRC)-based
impairments or pilot contamination3 . Hence, the provided
data detection with both perfect receive-side CSI (denoted by
simulation results may not be representative for other system
“CSIR”) and with conventional channel estimation, optimal MLconfigurations or more realistic communication scenarios. The
JED detection using the sphere-decoding algorithm put forward
MATLAB simulator for PrOX used in this paper is available on
in [12], and the recently proposed TASER (short for Triangular
GitHub: https:// github.com/ VIP-Group/ PrOX; this enables the
Approximate SEmidefinite Relaxation) algorithm [17] running
interested readers to investigate such aspects in more detail.
for 10 iterations. Note that MRC with perfect CSIR is optimal
for these scenarios. However, the assumption of perfect CSIR
cannot be realized in practice and one must resort to channel B. FPGA and ASIC Implementation Results
estimation (CHEST), which entails a performance loss of
To demonstrate the efficacy of PrOX, we now provide FPGA
more than 4 dB at 1% SER. PrOX and AProX achieve similar implementation results on a Xilinx Virtex-7 XC7VX690T and
error rate performance. Furthermore, both of our algorithms ASIC implementation results in a 40 nm CMOS technology.
significantly outperform MRC with CHEST and approach We implemented for different array sizes N ∈ {5, 9, 17, 33} in
near-ML-JED performance but, in stark contrast to ML-JED Verilog on register transfer level (RTL) and hence, our FPGA
data detection, at very low computational complexity. Our and ASIC designs support near-ML-JED for K ∈ {4, 8, 16, 32}
algorithms also outperform TASER, especially for QPSK time slots, respectively. We also provide a comparison to the
modulation; see Section V-B for a hardware comparison. We only other existing FPGA and ASIC designs for JED proposed
also show the fixed-point performance of the VLSI designs of in the literature [17].
PrOX. The markers of PrOX and APrOX correspond to the
1) FPGA Implementation Results: Our FPGA implemenfixed-point performance of golden models that exactly match tation results were obtained using the Xilinx Vivado Design
the outputs of our VLSI designs, whereas the curves correspond Suite, and are summarized in Table I. As expected, the resource
to MATLAB floating-point performance—evidently, our fixed- utilization scales nearly linearly with the array size N . For the
point VLSI designs exhibit virtually no implementation loss.
3 A straightforward model for pilot contamination would be to add inde2) Downlink Beamforming: Figure 4 shows downlink SER
pendent Gaussian noise to the received signals—such a model would simply
simulation results for PrOX and APrOX with the same system reduce the operating SNR. Without more accurate models, however, it is not
and algorithm parameters. We assume channel reciprocity [5], clear what the SNR reduction would be in a practical cellular system.
O. CASTAÑEDA ET AL.
9
100
10−1
10−2
10−3
−12
−10
−8
−6
−4
−2
Average SNR per receive antenna [dB]
10−1
10−2
10−3
−10
0
100
MRC (CSIR)
MRC
ML-JED
TASER
PrOX
APrOX
Uncoded symbol error rate (SER)
MRC (CSIR)
MRC
ML-JED
TASER
PrOX
APrOX
Uncoded symbol error rate (SER)
Uncoded symbol error rate (SER)
100
(a) BPSK, Rayleigh fading
−8 −6 −4 −2
0
2
4
Average SNR per receive antenna [dB]
10−1
10−2
10−3
−10
6
MRC (CSIR)
MRC
ML-JED
TASER
PrOX
APrOX
(b) QPSK, Rayleigh fading
−8 −6 −4 −2
0
2
4
Average SNR per receive antenna [dB]
6
(c) QPSK, LoS
Fig. 3. Uncoded uplink symbol-error rate (SER) for a SIMO uplink with B = 16 BS antennas and transmission over K = 16 time slots. PrOX and APrOX
achieve near-optimal SER performance (close to that of MRC detection with perfect CSIR) and exhibit a performance similar to ML-JED. At a SER of 0.1%,
TASER [17] entails a 1 dB SNR loss for QPSK, while MRC with conventional CHEST suffers more than 3 dB SNR loss for BPSK and QPSK. For PrOX and
APrOX, the curves show the floating-point performance whereas the markers show the fixed-point performance of our golden models.
100
10−1
10−2
10−3
−12
−10
−8
−6
−4
−2
Average SNR per receive antenna [dB]
10−1
10−2
10−3
−10
0
100
MRC (CSIR)
MRC
MRC (RT)
ML-JED
TASER
PrOX
APrOX
Uncoded symbol error rate (SER)
MRC (CSIR)
MRC
MRC (RT)
ML-JED
TASER
PrOX
APrOX
Uncoded symbol error rate (SER)
Uncoded symbol error rate (SER)
100
(a) BPSK, Rayleigh fading
−8 −6 −4 −2
0
2
4
Average SNR per receive antenna [dB]
10−1
10−2
10−3
−10
6
MRC (CSIR)
MRC
MRC (RT)
ML-JED
TASER
PrOX
APrOX
(b) QPSK, Rayleigh fading
−8 −6 −4 −2
0
2
4
Average SNR per receive antenna [dB]
6
(c) QPSK, LoS
Fig. 4. Uncoded downlink symbol-error rate (SER) for a SIMO uplink with B = 16 and K = 16. Beamforming with the channel estimate from PrOX, APrOX
and TASER [17] achieve near-optimal SER performance (close to that of perfect CSIR) and a performance similar to that of ML-JED. At a SER of 0.1%, MRC
with conventional CHEST suffers a 4 dB SNR loss for QPSK; retraining the channel with the estimated uplink data vector can reduce this loss, as in MRC
(RT). For PrOX and APrOX, the curves show the floating-point performance whereas the markers show the fixed-point performance of our golden models.
500
400
300
PrOX
B = 16
B = 32
B = 64
B = 128
APrOX
B = 16
B = 32
B = 64
B = 128
1
1 11
1
1
1,400
1 1
1,200
200
100
1,000
800
600
PrOX
B = 16
B = 32
B = 64
B = 128
APrOX
B = 16
B = 32
B = 64
B = 128
1
1
1 1
1
1
1,400
1
1,200
ASIC throughput [Mb/s]
600
ASIC throughput [Mb/s]
ASIC throughput [Mb/s]
700
400
200
0
−18 −16 −14 −12 −10 −8 −6 −4
Min. SNR [dB] required to achieve 1% SER
(a) BPSK, Rayleigh fading
−2
0
−14
1,000
800
600
PrOX
B = 16
B = 32
B = 64
B = 128
APrOX
B = 16
B = 32
B = 64
B = 128
1
1 1
1 1
1
1 1
400
200
−12 −10 −8
−6
−4
−2
Min. SNR [dB] required to achieve 1% SER
(b) QPSK, Rayleigh fading
0
0
−14
−12 −10 −8
−6
−4
−2
Min. SNR [dB] required to achieve 1% SER
0
(c) QPSK, LoS
Fig. 5. ASIC throughput vs. performance trade-off of PrOX and APrOX for K = 16 time slots. Vertical solid lines represent MRC with CSIR; vertical dashed
lines represent ML-JED performance. The numbers next to the markers correspond to the number of iterations tmax . The throughput was obtained from post
place-and-route ASIC implementation results. We can see that PrOX requires a smaller number of iterations than APrOX to achieve ML-JED performance.
10
TO APPEAR IN IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS-I: REGULAR PAPERS
TABLE I
FPGA IMPLEMENTATION RESULTS OF P ROX ON A X ILINX V IRTEX -7
XC7VX690T FOR DIFFERENT P ROX ARRAY SIZES
Array size (N = K +1)
Time slots (K = N −1)
Slices
LUTs
FFs
DSP48s
Max. clock freq. [MHz]
Min. latency [cycles]
Max. throughputa [Mb/s]
Power estimateb [W]
a Assuming
b Statistical
N =5
K =4
N =9
K =8
N = 17
K = 16
N = 33
K = 32
327
990
515
16
358
8
358
0.45
658
1 991
989
32
341
12
454
0.47
1 491
4 818
1 953
64
297
20
475
0.79
3 018
9 861
3 857
128
240
36
426
1.14
(a) N = 5
(b) N = 9
QPSK modulation; for BPSK, the throughput is halved.
power estimation at max. clock freq. and 1.0 V supply voltage.
(d) N = 33
(c) N = 17
TABLE II
C OMPARISON OF JED FPGA DESIGNS FOR A QPSK, B = 128, K = 8
LARGE -SIMO SYSTEM ON A X ILINX V IRTEX -7 XC7VX690T
Detection algorithm
Error-rate performance
Iterations tmax
PrOX
Near ML-JED
3
TASER [17]
Near ML-JED
3
Slices
LUTs
FFs
DSP48s
Clock frequency [MHz]
Latency [clock cycles]
Throughput [Mb/s]
Power estimatea [W]
658 (0.61 %)
1 991 (0.46 %)
989 (0.11 %)
32 (0.89 %)
341
12
151
0.47
4 350 (4.02 %)
13 779 (3.18 %)
6 857 (0.79 %)
168 (4.67 %)
225
72
50
1.30
75 841
3.09
3 629
26.0
Throughput/LUTs
Energy/bit [nJ/b]
a Statistical
power estimation at max. clock freq. and 1.0 V supply voltage.
N ∈ {5, 9, 17} arrays, the critical path of PrOX is in the PEs’
projection unit; for the largest N = 33 array, the critical path
is in the distribution of the control signals.
Table II compares PrOX with TASER [17], which have been
implemented on the same FPGA for a SIMO system with
B = 128 BS antennas and communication through K = 8
time slots. PrOX requires significantly fewer resources and
lower power than TASER, while achieving a substantially
higher throughput. This makes our design superior to TASER
in terms of both hardware-efficiency (measured in throughput
per FPGA LUTs) and energy per bit. Concretely, PrOX is 20×
more hardware-efficient and 8× more energy-efficient than
TASER for the considered scenario.
2) ASIC Implementation Results: Our ASIC post placeand-route implementation results summarized in Table III
were obtained using Synopsys DC and IC compilers with
a 40 nm CMOS standard-cell technology. Figure 6 shows the
corresponding ASIC layouts. For the N ∈ {5, 9} arrays, the
critical path of PrOX is in the PEs’ projection unit; for N = 17,
the critical path is in the multipliers of the MAC unit and, for
the largest N = 33 array, the critical path is in the address
generation logic and readout circuitry of the ĝkr memories.
Table IV compares PrOX with TASER [17], which have
Fig. 6. Layouts of the PrOX ASIC designs for array sizes N ∈ {5, 9, 17, 33}.
The PEs of each design were colored differently. One can observe a nearly
linear increase in silicon area depending on the array size N = K + 1.
TABLE III
ASIC IMPLEMENTATION RESULTS OF P ROX IN 40 NM CMOS FOR
DIFFERENT ARRAY SIZES
Array size (N = K +1)
Time slots (K = N −1)
N =5
K =4
N =9
K =8
N = 17
K = 16
N = 33
K = 32
Core area [µm2 ]
Core density [%]
Cell area [GE]
Max. clock freq. [MHz]
Min. latency [cycles]
Max. throughput [Mb/s]
Power estimatea [mW]
26 419
77.24
28 922
976
8
976
10
53 361
77.39
58 522
942
12
1 256
18
132 903
72.96
137 428
846
20
1 354
38
303 722
76.38
328 753
695
36
1 235
58
a Post
place-and-route power estimation at max. clock freq. and 1.1 V.
TABLE IV
C OMPARISON OF JED ASIC S FOR A QPSK, B = 128, K = 8
LARGE -SIMO SYSTEM IN 40 NM CMOS
Detection algorithm
Error-rate performance
Iterations tmax
PrOX
Near ML-JED
3
TASER [17]
Near ML-JED
3
Core area [µm2 ]
Core density [%]
Cell area [GE]
Max. clock freq. [MHz]
Latency [clock cycles]
Throughput [Mb/s]
Power estimatea [mW]
53 361
77.39
58 522
942
12
418
18
482 677
68.89
471 238
560
24
125
87
7 153
279
43
697
Throughput/cell
area [b/(s×GE)]
Energy/bit [pJ/b]
a Post
place-and-route power estimation at max. clock freq. and 1.1 V.
O. CASTAÑEDA ET AL.
11
been implemented on the same 40 nm CMOS technology for a constellation sets [12], [21], they are either computationally
SIMO system with B = 128 and K = 8. Similar to the complex or exhibit a considerable loss with respect to the
FPGA case, the PrOX ASIC designs require significantly optimal ML-JED performance. The development of efficient
fewer resources and lower power than the TASER ASIC JED algorithms that can be implemented as high-throughput
designs, while achieving a substantially higher throughput. VLSI designs for large (multi-user) MIMO systems with
Concretely, PrOX is 25× more hardware-efficient (in terms of arbitrary constellations is part of ongoing work.
the throughput per cell area) and 16× more energy-efficient
than TASER for the considered scenario.
A PPENDIX A
We also note that PrOX exhibits a similar (for BPSK) or
P ROOF OF T HEOREM 1
better (for QPSK) SER performance than TASER, while using
We need a closed form expression for the gradient so that
fewer algorithm iterations; see Figures 3 and 4 for the associated we can say something about its convergence. We have
SER results. However, while PrOX is only suitable for JED in
∂q f (q(t) , s(t) ) = −YT Yq(t) + α(q(t) − s(t) ).
large SIMO systems, TASER is also able to perform near-ML
data detection in coherent massive multi-user MIMO systems From the optimality condition for the minimization step (6),
that use conventional pilot-based channel training [17]. Hence, we have
the error-rate performance and hardware complexity advantages
0 = −YT Yq(t) + α(q(t) − s(t−1) )
of PrOX over TASER come at the cost of reduced flexibility.
= −YT Yq(t) + α(q(t) − s(t) ) + α(s(t) − s(t−1) )
= ∂q f (q(t) , s(t) ) + α(s(t) − s(t−1) ),
Remark 5. While a plethora of VLSI designs exist for data detection in coherent small-scale and massive (multi-user) MIMO
and thus
systems that separate channel estimation from data detection
(see [8], [19], [22], [23], [39]–[46] and the references therein),
∂q f (q(t) , s(t) ) = α(s(t−1) − s(t) ).
(21)
TASER is the only other SIMO-JED VLSI design that has been
Now that we have a simple representation for the gradient,
described in the literature [17]. Furthermore, low-complexity
we can bound its norm. Note that f is strongly convex in q
linear methods that are commonly used for conventional (multiwith parameter α − kYT Yk, and so
user) MIMO data detection cannot be used in the JED scenario
(as briefly discussed in Section II-B). Hence, we limited our
α − kYT Yk
kq − qs k22
(22)
f
(q,
s)
−
f
(q
,
s)
≥
s
comparisons in Table II and Table IV to PrOX and TASER.
2
VI. C ONCLUSIONS
where qs = arg minq f (q, s). Likewise, f is strongly convex
in s with parameter α − β, and so
α−β
f (q, s) − f (q, sq ) ≥
ks − sq k22
(23)
We have proposed a novel joint channel estimation and data
2
detection (JED) algorithm, referred to as PRojection Onto
where sq = arg mins f (q, s).
conveX hull (PrOX). Our algorithm builds upon biconvex
If we choose q = q(t−1) and s = s(t−1) in (22), then
relaxation (BCR) [18], which enables near-maximum-likelihood
qs = q(t) and we have
(ML) JED performance at low computational complexity for
large SIMO systems with constant-modulus constellations. We
f (q(t−1) , s(t−1) ) − f (q(t) , s(t−1) )
have provided theoretical convergence guarantees for PrOX
α − kYT Yk (t−1)
and introduced an approximation that significantly reduces the
≥
kq
− q(t) k22 . (24)
2
preprocessing complexity. To demonstrate the effectiveness
of our algorithm, we have proposed a VLSI architecture Similarly, from (23) we get
that consists of a linear array of processing elements (PEs).
α − β (t−1)
f (q(t) , s(t−1) ) − f (q(t) , s(t) ) ≥
ks
− s(t) k22 .
Our architecture enables high-throughput near-ML-JED at low
2
silicon area and power consumption. We have provided FPGA Adding these two inequalities yields
and ASIC implementation results, which demonstrate that
(t−1) (t−1)
,s
) − f (q(t) , s(t) )
PrOX significantly outperforms the only other existing JED f (q
design [17] in terms of hardware- and energy-efficiency as well
α − β (t−1)
α − kYT Yk (t−1)
kq
− q(t) k22 +
ks
− s(t) k22 .
≥
as error-rate performance. More generally, PrOX constitutes a
2
2
first step towards hardware accelerators that are able to find Summing from t = 1 to t = T, and observing that the
approximate solutions to problems that resemble the famous summation on the left telescopes, we get
MaxCut problem in a hardware-efficient manner.
f (q(0) , s(0) ) − f (q(T ) , s(T ) )
(25)
There are many avenues for future work. An extension of
T
PrOX to compute soft-outputs in the form of log-likelihood raT
X α − kY Yk
≥
kq(t−1) − q(t) k22
(26)
tios (LLRs) is part of ongoing work. Furthermore, a theoretical
2
t=1
error-rate performance analysis of PrOX is a challenging open
α − β (t−1)
research problem. Finally, while some algorithms exist for JED
+
ks
− s(t) k22 .
in the MIMO case and for general (non-constant modulus)
2
12
TO APPEAR IN IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS-I: REGULAR PAPERS
Because the iterates remain bounded and f is continuous, the
left-hand side of (25) is bounded from above. We can conclude
that ks(t−1) − s(t) k → 0, and from (21), we see that the
residuals converge as well.
Finally, because the sub-gradients of f depend continuously
on s and q, any limit point of the sequence of iterates must
have zero sub-gradients, and is thus a stationary point.
A PPENDIX B
P ROOF OF T HEOREM 2
Let (q∗ , s∗ ) denote a non-zero stationary point of f that
lies in the interior of CO . Such a point satisfies the first-order
conditions
∗
T
∗
∗
−Y Yq + α(q − s ) = 0
∗
∗
(28)
α−β ∗
α s .
Plugging this result
α(s − q ) − βs = 0.
From (28), we see that q∗ =
into (27) yields
−YT Y
(27)
∗
α−β ∗
s + (α − β)s∗ − αs∗ = 0,
α
which re-arranges to
YT Ys∗ =
−αβ ∗
s .
α−β
Since s∗ is non-zero, this shows that s∗ is an eigenvector of
YT Y with negative eigenvalue. This is impossible because the
Gram matrix YT Y is positive semi-definite. It follows that
(q∗ , s∗ ) cannot satisfy the first-order conditions (27) and (28),
and thus, cannot lie in the interior of CO .
A PPENDIX C
P ROOF OF T HEOREM 3
Since kGk < α, we have the Neumann series expansion [36]
in (11). Hence, we can bound the approximation error from
above as follows:
k(I − α−1 G)−1 − (I + α−1 G)k =
(a)
∞
X
(c)
k=2
∞
X
≤
=
k=0
(d)
=
(b)
(α−1 G)k ≤
α−1 G
k
∞
X
∞
X
(α−1 G)k
k=2
α−1 G
k
k=2
− 1 − kα−1 Gk
−1
1
Gk2
(e) kα
− 1 − kα−1 Gk =
.
−1
1 − kα Gk
1 − kα−1 Gk
Here, step (a) follows from the triangle inequality, step (b)
from the fact that the spectral norm is a consistent matrix norm,
step (c) is a result of basic arithmetic manipulations, step (d)
follows from geometric series expansions, and step (e) is the
same expression in simplified form. We note that the proof
continues to hold for any consistent matrix norm.
ACKNOWLEDGMENTS
The authors would like to thank S. Jacobsson and G. Durisi
for discussions on line-of-sight channels. We also thank C. Jeon
and G. Mirza for discussions on the input-cyclic MVP engine.
The work of O. Castañeda and C. Studer was supported by
Xilinx, Inc. and by the US National Science Foundation (NSF)
under grants ECCS-1408006, CCF-1535897, CAREER CCF1652065, and CNS-1717559. The work of T. Goldstein was
supported by the US NSF under grant CCF-1535902 and by the
US Office of Naval Research under grant N00014-17-1-2078.
R EFERENCES
[1] O. Castañeda, T. Goldstein, and C. Studer, “FPGA design of lowcomplexity joint channel estimation and data detection for large SIMO
wireless systems,” in Proc. IEEE Int. Symp. Circuits Syst. (ISCAS), May
2017, pp. 128–131.
[2] T. L. Marzetta, “Noncooperative cellular wireless with unlimited numbers
of base station antennas,” IEEE Trans. Wireless Commun., vol. 9, no. 11,
pp. 3590–3600, Nov. 2010.
[3] F. Rusek, D. Persson, B. K. Lau, E. G. Larsson, T. L. Marzetta, O. Edfors,
and F. Tufvesson, “Scaling up MIMO: Opportunities and challenges with
very large arrays,” IEEE Signal Process. Mag., vol. 30, no. 1, pp. 40–60,
Jan. 2013.
[4] J. Hoydis, S. Ten Brink, and M. Debbah, “Massive MIMO in the UL/DL
of cellular networks: How many antennas do we need?” IEEE J. Sel.
Areas Commun., vol. 31, no. 2, pp. 160–171, Feb. 2013.
[5] E. Larsson, O. Edfors, F. Tufvesson, and T. Marzetta, “Massive MIMO
for next generation wireless systems,” IEEE Commun. Mag., vol. 52,
no. 2, pp. 186–195, Feb. 2014.
[6] J. G. Andrews, S. Buzzi, W. Choi, S. V. Hanly, A. Lozano, A. C. Soong,
and J. C. Zhang, “What will 5G be?” IEEE J. Sel. Areas Commun.,
vol. 32, no. 6, pp. 1065–1082, Jun. 2014.
[7] L. Lu, G. Li, A. Swindlehurst, A. Ashikhmin, and R. Zhang, “An overview
of massive MIMO: Benefits and challenges,” IEEE J. Sel. Topics Signal
Process., vol. 8, no. 5, pp. 742–758, Oct. 2014.
[8] M. Wu, B. Yin, G. Wang, C. Dick, J. R. Cavallaro, and C. Studer,
“Large-scale MIMO detection for 3GPP LTE: algorithms and FPGA
implementations,” IEEE J. Sel. Topics Signal Process., vol. 8, no. 5, pp.
916–929, Oct. 2014.
[9] P. Stoica and G. Ganesan, “Space–time block codes: Trained, blind, and
semi-blind detection,” Elsevier Dig. Signal Process., vol. 13, no. 1, pp.
93–105, Jan. 2003.
[10] H. Vikalo, B. Hassibi, and P. Stoica, “Efficient joint maximum-likelihood
channel estimation and signal detection,” IEEE Trans. Wireless Commun.,
vol. 5, no. 7, pp. 1838–1845, Jul. 2006.
[11] H. A. J. Alshamary, M. F. Anjum, T. Al-Naffouri, A. Zaib, and W. Xu,
“Optimal non-coherent data detection for massive SIMO wireless systems
with general constellations: A polynomial complexity solution,” arXiv
preprint: 1507.02319, Jul. 2015.
[12] W. Xu, M. Stojnic, and B. Hassibi, “On exact maximum-likelihood
detection for non-coherent MIMO wireless systems: A branch-estimatebound optimization framework,” in Proc. IEEE Int. Symp. Inf. Theory
(ISIT), Jul. 2008, pp. 2017–2021.
[13] T.-H. Pham, Y.-C. Liang, and A. Nallanathan, “A joint channel estimation
and data detection receiver for multiuser MIMO IFDMA systems,” IEEE
Trans. Commun., vol. 57, no. 6, pp. 1857–1865, Jun. 2010.
[14] R. Prasad, C. R. Murthy, and B. D. Rao, “Joint channel estimation and
data detection in MIMO-OFDM systems: A sparse Bayesian learning
approach,” IEEE Trans. Sig. Proc., vol. 63, no. 20, pp. 5369–5382, Oct.
2015.
[15] E. Kofidis, C. Chatzichristos, and A. L. F. de Almeida, “Joint channel
estimation / data detection in MIMO-FBMC/OQAM systems - a tensorbased approach,” arXiv preprint: 1609.09661, Sep. 2016.
[16] C.-K. Wen, C.-J. Wang, S. Jin, K.-K. Wong, and P. Ting, “Bayes-optimal
joint channel-and-data estimation for massive MIMO with low-precision
ADCs,” IEEE Trans. Sig. Proc., vol. 64, no. 10, pp. 2541–2556, Dec.
2016.
[17] O. Castañeda, T. Goldstein, and C. Studer, “Data detection in large
multi-antenna wireless systems via approximate semidefinite relaxation,”
IEEE Trans. Circuits Syst. I, no. 99, pp. 2334–2346, Nov. 2016.
O. CASTAÑEDA ET AL.
[18] S. Shah, A. Kumar, C. Castillo, D. Jacobs, C. Studer, and T. Goldstein,
“Biconvex relaxation for semidefinite programming in computer vision,”
European Conf. Comput. Vision (ECCV), pp. 717–735, Sep. 2016.
[19] S. Yang and L. Hanzo, “Fifty years of MIMO detection: The road to
large-scale MIMOs,” IEEE Commun. Surveys Tuts., vol. 17, no. 4, pp.
1941–1988, Sep. 2015.
[20] P. Stoica, H. Vikalo, and B. Hassibi, “Joint maximum-likelihood channel
estimation and signal detection for SIMO channels,” in Proc. IEEE Int.
Conf. Acoust., Speech, Signal Process. (ICASSP), vol. 4, May 2003, pp.
13–16.
[21] H. A. J. Alshamary and W. Xu, “Efficient optimal joint channel estimation
and data detection for massive MIMO systems,” in Proc. IEEE Int. Symp.
Inf. Theory (ISIT), Jul. 2016, pp. 875–879.
[22] A. Burg, M. Borgmann, M. Wenk, M. Zellweger, W. Fichtner, and
H. Bölcskei, “VLSI implementation of MIMO detection using the sphere
decoding algorithm,” IEEE J. Solid-State Circuits, vol. 40, no. 7, pp.
1566–1577, Jul. 2005.
[23] C. Studer, M. Wenk, and A. Burg, “VLSI implementation of hard-and
soft-output sphere decoding for wide-band MIMO systems,” in VLSI-SoC:
Forward-Looking Trends in IC and Systems Design. Springer, 2010, pp.
128–154.
[24] A. Schenk and R. F. H. Fischer, “Noncoherent detection in massive
MIMO systems,” in Int. ITG Workshop on Smart Antennas (WSA), Apr.
2013, pp. 1–8.
[25] G. Yammine and R. F. Fischer, “Soft-decision decoding in noncoherent
massive MIMO systems,” in Int. ITG Workshop on Smart Antennas
(WSA), Mar. 2016, pp. 1–7.
[26] J. Feng, H. Gao, T. Wang, T. Lv, and W. Guo, “A noncoherent differential
transmission scheme for multiuser massive MIMO systems,” in Proc.
IEEE Wireless Commun. Networking Conf. (WCNC), Mar. 2017, pp. 1–6.
[27] B. S. Thian and A. Goldsmith, “Decoding for MIMO systems with
imperfect channel state information,” in Proc. IEEE Global Telecommun.
Conf. (GLOBECOM), Dec. 2010, pp. 1–6.
[28] R. Ghods, C. Jeon, G. Mirza, A. Maleki, and C. Studer, “Optimally-tuned
nonparametric linear equalization for massive MU-MIMO systems,” in
Proc. IEEE Int. Symp. Inf. Theory (ISIT); arXiv preprint: 1705.02985,
Jun. 2017.
[29] R. Prasad, OFDM for Wireless Communications Systems. Norwood,
MA, USA: Artech House, Inc., 2004.
[30] “3GPP TS 36.211 Evolved Universal Terrestrial Radio Access (E-UTRA)
physical channels and modulation (release 8),” 3rd Generation Partnership
Project.
[31] D. Steinberg, “Computation of matrix norms with applications to robust
optimization,” Master’s thesis, Technion, Israel, 2005.
13
[32] M. Ajtai, “The shortest vector problem in L2 is NP-hard for randomized
reductions,” in Proc. ACM Symp. Theory Comput. ACM, 1998, pp.
10–19.
[33] D. Seethaler, J. Jaldén, C. Studer, and H. Bölcskei, “On the complexity
distribution of sphere decoding,” IEEE Trans. Inf. Theory, vol. 57, no. 9,
pp. 5754–5768, Sep. 2011.
[34] M. Wu, C. Dick, J. R. Cavallaro, and C. Studer, “High-throughput
data detection for massive MU-MIMO-OFDM using coordinate descent,”
IEEE Trans. Circuits Syst. I, no. 99, pp. 2357–2367, Nov. 2016.
[35] N. Parikh and S. Boyd, “Proximal algorithms,” Foundations and Trends
Optimization, vol. 1, no. 3, pp. 123–231, Jan. 2013.
[36] G. Stewart, Matrix Algorithms: Basic decompositions, 1998.
[37] P. Meinerzhagen, C. Roth, and A. Burg, “Towards generic low-power
area-efficient standard cell based memory architectures,” in Proc. IEEE
Int. Midwest Symp. Circuits Syst. (MWSCAS), Aug. 2010, pp. 129–132.
[38] D. Tse and P. Viswanath, Fundamentals of wireless communication.
Cambridge University Press, 2005.
[39] K. Wong, C. Tsui, R. Cheng, and W. Mow, “A VLSI architecture of a
K-best lattice decoding algorithm for MIMO channels,” in Proc. IEEE
Int. Symp. Circuits Syst. (ISCAS), vol. 3, May 2002, pp. 273–276.
[40] C. Studer, A. Burg, and H. Bölcskei, “Soft-output sphere decoding:
Algorithms and VLSI implementation,” IEEE J. Sel. Areas Commun.,
vol. 26, no. 2, pp. 290–300, Feb. 2008.
[41] C. H. Liao, T. P. Wang, and T. D. Chiueh, “A 74.8 mW soft-output
detector IC for 8×8 spatial-multiplexing MIMO communications,” IEEE
J. Solid-State Circuits, vol. 45, no. 2, pp. 411–421, Feb. 2010.
[42] C. H. Yang, T. H. Yu, and D. Marković, “A 5.8 mW 3GPP-LTE compliant
8×8 MIMO sphere decoder chip with soft-outputs,” in Symp. VLSI
Circuits, Jun. 2010, pp. 209–210.
[43] E. M. Witte, F. Borlenghi, G. Ascheid, R. Leupers, and H. Meyr, “A
scalable VLSI architecture for soft-input soft-output single tree-search
sphere decoding,” IEEE Trans. Circuits and Syst. II, vol. 57, no. 9, pp.
706–710, Sep. 2010.
[44] C.-F. Liao, J.-Y. Wang, and Y.-H. Huang, “A 3.1 Gb/s 8×8 sorting
reduced K-Best detector with lattice reduction and QR decomposition,”
IEEE Trans. VLSI Syst., vol. 22, no. 12, pp. 2675–2688, Feb. 2014.
[45] C. Senning, L. Bruderer, J. Hunziker, and A. Burg, “A lattice reductionaided MIMO channel equalizer in 90 nm CMOS achieving 720 Mb/s,”
IEEE Trans. Circuits Syst. I, vol. 61, no. 6, pp. 1860–1871, Jun. 2014.
[46] B. Yin, M. Wu, J. Cavallaro, and C. Studer, “VLSI Design of Large-Scale
Soft-Output MIMO Detection Using Conjugate Gradients,” in Proc. IEEE
Int. Conf. Circuits Syst. (ISCAS), May 2015, pp. 1498–1501.
| 7cs.IT
|
Analysis of Feature Detector and Descriptor Combinations with a Localization
Experiment for Various Performance Metrics
Ertugrul BAYRAKTAR*, Pınar BOYRAZ
Graduate School of Science Engineering and Technology Mechatronics Engineering Department,
Istanbul Technical University, [email protected]
Mechanical Engineering Department, Istanbul Technical University, Inonu Cd. No: 65, 34437
Beyoglu Istanbul, Turkey, [email protected]
Abstract
The purpose of this study is to give a detailed performance comparison about the feature
detector and descriptor methods, particularly when their various combinations are used for
image matching. As the case study, the localization experiments of a mobile robot in an
indoor environment are given. In these experiments, 3090 query images and 127 dataset
images are used. This study includes five methods for feature detectors such as features from
accelerated segment test (FAST), oriented FAST and rotated binary robust independent
elementary features (BRIEF) (ORB), speeded-up robust features (SURF), scale invariant
feature transform (SIFT), binary robust invariant scalable keypoints (BRISK), and five other
methods for feature descriptors which are BRIEF, BRISK, SIFT, SURF, and ORB. These
methods are used in 23 different combinations and it was possible to obtain meaningful and
consistent comparison results using some performance criteria defined in this study. All of
these methods are used independently and separately from each other as being feature detector
or descriptor. The performance analysis shows the discriminative power of various
combinations of detector and descriptor methods. The analysis is completed using five
parameters such as (i) accuracy, (ii) time, (iii) angle difference between keypoints, (iv)
number of correct matches, and (v) distance between correctly matched keypoints. In a range
of 60°, covering five rotational pose points for our system, “FAST-SURF” combination gave
the best results with the lowest distance and angle difference values and highest number of
matched keypoints. The combination “SIFT-SURF” is obtained as the most accurate
combination with 98.41% of correct classification rate. The fastest algorithm is achieved with
“ORB-BRIEF” combination with a total running time 21303.30 seconds in order to match 560
images captured during the motion with 127 dataset images.
1. Introduction
Achieving beneficial information from visual sensors for indoor robots is crucial. In order to
get this type of information capable of representing the real world with minimum loss of
details, robots use various computer vision algorithms under the names of object detection,
segmentation, and recognition. These algorithms work by matching and obtaining structural
or inferred information about objects. Then, relating these separate low-level information sets,
the algorithm constructs a framework in order to obtain semantic information. In this context,
semantic information is necessary to get robots, machines, or digital systems to make sense
from numerical data such as understanding what is happening in a scene or what the context
of a speech/conversation could be. Consequently, semantic information requires more
*: Corresponding Author
computational effort and a deeper knowledge representation in comparison to low-level
computing such as basic object detection and recognition algorithms.
Image matching has a wide range of applications in real world such as object and face
recognition. In addition, image matching is the main operation for obtaining semantic
information. On the other hand, image matching is still a challenging problem for real-time
applications because of the amount of the data to be processed. One can briefly summarize the
process of image matching as follows; 1) Constructing an appropriate feature database for the
desired application, 2) Streaming live/recorded video or loading images to the system, 3)
Computing the features of frame grabbed/captured from streamed live/recorded video or
loaded images with the database, 4) Comparing the features, 5) Decision making about the
quality of the matches such as accurately matched features.
Furthermore, our work includes design of an algorithm which may be applied to known
indoor environments to obtain semantic information. In order to develop and test this
algorithm,
we
created
an
image
database
(https://web.itu.edu.tr/bayraktare/Visual_Indoor_Dataset.rar) consisting 3090 images of an
office environment and we specified various office objects within this database to match these
objects with query images. We have selected 127 images which contain only one object in
each image without any occlusions as database images to be compared by query images. In
addition, these 127 images are taken as the ground-truth for our performance analysis. In
order to accurately find the location of the robot, we consider the 3 height levels in a range of
300. This means the localization algorithm may give six possible results for the same point. By
using the output of the localization process, it is possible to determine the location of the robot
within a cube which contains the 6 possible coordinates as boundary points. For this reason,
scale and rotation performance of these methods are crucial for our localization algorithm.
This paper has been organized as follows; previous studies about feature detector-descriptor
algorithms and performance evaluation of these methods are given in section 2, in 3rd section
the datasets and the methods used in this study are explained, performance results are shown
in 4th section, and finally, in section 5 we discuss the results.
2. Related Work
In literature, there is a wide range of studies based on feature detector-descriptor
combinations of which some compare the feature detectors and feature descriptor methods;
some of them argue the best detector-descriptor combinations, and a few of them focus on
their performance in the recognition of objects. A feature in an image can be defined in a
specific 2-dimensional structure that is composed of a detector and a descriptor. In this
structure, the detector finds the repeatable interest points, and the descriptor is a distinctive
specification that is obtained by computing each detected feature which can be matched
between different images.
It is commonly accepted that SIFT [1], SURF [2], BRISK [3], ORB [6] methods used in this
work consist of similar content and it may be given in 4 steps as follows; 1) Scale-space
representation, 2) Key-point localization, 3) Orientation assignment, and 4) Key-point
descriptor as given in [5]. In other words, one can summarize the first three of these steps as
detector, and the last one as descriptor. Besides, some of these methods may include both the
detector and descriptor, while some are distinctly known as detector or descriptor. As an
example, FAST [7, 8] is a detector method and BRIEF [4] is a descriptor method. In the step
of scale-space representation, SIFT applies a series of Difference-of-Gaussian (DoG) filters
for multiple scales, and in this way we may get DoG filtered and down-sampled versions of
the original image. SIFT descriptor is composed of a 4x4 array of gradient orientation
histogram weighed by the gradient magnitude. On the other hand, scale-space representation
in SURF is based on sums of 2D Haar wavelets using integral images that approximate
Gaussian derivatives given by [2]. SURF detector approximates the determinant of Hessian
matrix which will give a local maximum. SURF descriptor is a 64-dimensional vector which
is obtained by summing the Haar Wavelet coefficients over 4x4 pixels around the key-point.
As described in [7] and [8] FAST, a detection method that is actually used to detect corners,
uses a circle consisting of 16 pixels around candidate corner pixels to classify whether that
point is a corner or not by comparing these 16 pixels’ brightness with the intensity of
candidate pixel including a threshold. BRIEF is a binary descriptor based on pairwise
intensity comparison. The detector part of the BRISK is given at [3] as computing FAST
score, which is computed at each octave and intra-octave separately, across scale space and
obtained continuous maximum across scales by calculating the sub-pixel maximum across
patch at pixel level non-maximal suppression. BRISK descriptor contains concatenated
brightness results tests with a binary string and it is rotation and scale invariant apart from
BRIEF. Descriptor part of ORB is a method that is similar to BRIEF with rotation and scale
invariances. Detector part of ORB applies FAST detector in a Gaussian pyramid.
The system proposed in [5] demonstrates the performance results of 4 descriptors [SIFT,
SURF, BRISK, and FREAK] and looks for the best matching results in terms of detection
accuracy and speed in the context of detecting the abandoned objects in real-time. This
method is very sensitive to disturbances and the robustness is not completely ensured in the
experimental setup. In addition to this, the camera system movement of the work is very
limited such as linear back and forth motion. Another study, which investigates the detector
and descriptor methods for photogrammetric applications [9], compares 5 interest point
detectors with respect to correct detected corners, their localizations, the density of detected
points/regions, but it is clear that the number of methods is very limited and performance
analysis does not cover the time cost for these methods. Similar to a part of our work, [10]
analyzes the different detector-descriptor combinations with 7 detectors and 2 descriptors with
the aim of finding the best combination. They used a dataset that includes 60 scenes from 119
positions with 19 different illumination conditions. They conclude as a result of their
experiments that DOG or MSER detector with a SIFT or DAISY descriptor as the best
combination by using a performance measure computed from area under receiver operating
characteristic (ROC) curve which depends on a proportion of the distance values between the
best matched features.
As a matter of course, previous studies have used different measuring scales and criteria in
order to evaluate the performance outputs of different feature detector-descriptor
combinations. In [11], although it does not consider time performance, the performance
evaluation is realized counting the number of correctly detected interest points and their
locations with comparing the density and relative orientations of these points with stereo pairs
for 5 interest point detectors (Förstner, Heitger, Susan, Harris, and Hessian) and two region
detectors/descriptors (Harris-Affine and SIFT). Another study, [12], considers the occlusions
and realized using a moving camera gives the performance comparison results for 4
descriptors (SURF, SIFT, BRISK, and FREAK). This paper uses accuracy and speed as
performance criteria, but it is very sensitive to disturbances, and the robustness is provided by
limiting the movement of the robot just by a linear back-and-forth motion at the experimental
setup. Although it tells that the real-time detection, normalized cross correlation, which scans
all the frame which makes this method slow rotation-variant, is applied to the binary image
that means loss of information in the image used as image comparison method. [13] compares
only binary descriptors (SIFT, FAST, BRIEF, BRISK, ORB, and FREAK) and their
combinations without giving any details about these combinations’ total performance and
compliance of different detectors and descriptors. The performance evaluation results are
obtained by matching the given images and pixel based distance values of the corresponding
points. In this study, SIFT is assumed to be ground-truth, but ground-truth would be obtained
by direct matching of images more precisely. Another local descriptor comparison is given in
[14] for only 4 methods. These 4 methods are based on Harris-Affine detector and they are
compared with regard to the complexity of the compared methods’ individual parameters and
usage areas with detection rate with respect to false positive rate as evaluation criterion based
on the calculation of the area under Receiver Operating Characteristics (ROC) curves. In
addition to the comparison of local detectors and descriptors, [15] investigates the
performance of in terms of two properties; robustness and distinctiveness using a unified
framework. The framework is composed of two steps; the first step is detector evaluation
criteria, which takes into account the accuracy of localization under different conditions, and
the repeatability score for 6 detectors (Harris-Affine, Hessian-Affine, Maximally stable
extremal regions, Intensity based regions, Geometry based regions, Salient regions). The
second step is descriptor evaluation criterion that considers the distinctiveness, which is
measured by ROC of the number of correct matches with respect to the number of
corresponding regions against false positive rate with a distance threshold for 6 descriptors
(SIFT, steerable filters, differential invariants, complex filters, moment invariants, crosscorrelation). On the other hand, [16] gives the effects of different detectors (SIFT, SURF,
BRISK, ORB, FAST, GFTT, STAR) and descriptors (SIFT, SURF, BRISK, ORB, BRIEF,
FREAK) on RGB-D SLAM (Simultaneous Localization and Mapping) methods. The
performance evaluations of these methods are investigated in terms of accuracy by measuring
empirically the distance of matched objects and time to process per frame. The detectordescriptor combinations of this study are limited and only BRIEF and FREAK descriptors are
combined with other detectors. In an addition to the comparison of feature detectors and
descriptors performance on visual SLAM, [18] compares the effects of 6 feature descriptors
(BRIEF, BRISK, FREAK, ORB, SIFT, SURF) on graph-based VSLAM algorithm according
to localization accuracy and motion speed of the camera for real-time performance using two
different datasets as being used as two different motion scenario. Even though, both the
number of performance parameters and compared descriptors are limited, and there are no
detectors compared, similarly to our accuracy and time performance evaluation results given
in Table 1, the results are clearly show that the accuracy of SIFT and the speed of BRIEF are
the best options. In the context of image search and fine-grained classification, [17] provides
the performance assessment results in terms of accuracy and time by proposing new
approaches such as modifying Harris, Hessian and DoG detectors to extract dense patches,
changing the scale of selecting these patches’ edges, and filter selection is made by their own
method to locate patches. Although this paper studies on the developing the accuracy and
process time, it is underlined that not to target high repeatability. Besides, [19] examines the
JPEG compression’s effects on different feature detector-descriptor combinations. They used
VLBenchmarks [21] framework to test their 60 combinations composed of 10 detectors with 6
descriptors, which the dependency to this framework may harm some important properties
about performance evaluation results such as repeatability, accuracy, speed and extracted
feature numbers. Performance evaluation parameter of this study is very limited with mAP
(mean average precision) Scores, which is computed by taking the average of 55 same-level
compressed query images with JPEG with a quality range from 4 to 20 after applying 3
deblocking methods (spatial domain, frequency domain, hybrid filtering), by comparing the
number of feature detector-descriptor combinations and the feature extraction speed is not
considered as a performance evaluation criterion.
Similar to [15], [20] gives the comparison of performance evaluation results about affine
covariant region detectors using a structured and textured scenes under different conditions
such as viewpoints changes, scale changes, illumination and blurring variations. This
comprehensive study assesses the performance in terms of measuring the repeatability by the
detector’s performance on determining the corresponding scene region, and the accuracy with
respect to regions’ shape, scale, and localization. In addition, also, the distinctiveness of the
detected regions is evaluated as another parameter for performance to emphasize the
discriminative power of these methods.
Our study is one of the most comprehensive comparisons available because we give 23
different feature detector-descriptor performance evaluation results in terms of accuracy and
speed in a real-world scenario including localization experiment. Additionally, we present 19
different feature detector-descriptor comparisons regarding the number of correct matches,
mean angle difference between key-points, and minimum distance metrics. Although, as
mentioned above, the literature studies mostly focused on accuracy and time performance
evaluations, this work investigates the time consumed to match two features, time
performance from start to finish of the comparison of all query images with all dataset images
for different detector-descriptor methods combinations, accuracy values of these
combinations, and the relative relations of different detector-descriptor combinations with
respect to correct matches, mean angle difference between key-points, and minimum distance
between key-points.
3. Data and Methodology
In this section we give details about the dataset and query images which we created for this
study. Query image dataset is created by grabbing indoor images with the dimensions of
555x480 pixels using a low-cost CMOS camera from a laboratory environment by rotating the
camera by 15o with an apparatus at predetermined points for 3 different heights. Besides, the
dataset that contains the template images to be matched with the query images which are
chosen from the query image dataset. Figure 1.a shows the image grabbing process and the
hypothetical volumetric location cube, and the objects in the template images are given in
Figure 1. b. A collage of query images grabbed from two different points is displayed in
Figure 1. c.
In addition, before obtaining performance results of a combination of methods between query
and template images, two elimination steps are evaluated in order to prevent obtaining trivial
results. After a satisfactory matching score is obtained then the robot location is determined
approximately in a hypothetical cube.
In the first step, we used FAST method to detect the key-points of the query image and
determined a hysteresis threshold that provides us to eliminate images which have less keypoints than the lower threshold or have much key-points than the upper threshold. In the
second step, we used histogram comparison results to eliminate query images before matching
process. Thus we have same number of matching results for all combinations. After these
steps we achieve the performance results at matching process of the algorithm.
Figure 1 a. Demonstration of grabbing images from the environment and the localization of the mobile robot in
a hypothetical location cube. b. A part of template image dataset. c. A sequence of query image dataset which
grabbed from 2 points.
In order to visualize experimental localization results, two different tools are used. Figure 2.a
demonstrates the mobile robot’s path during its flight in the office room and Figure 2.b
displays the same path in a virtual reality environment. The red symbols indicate the
recognized location of the robot which means a matched query image with a template image
and it can be seen from the Figure 1. a that there are much more recognized points at the last
stage of the movement than the beginning because of the speed of the robot is faster in the
beginning and then slows down.
Figure 2 Localization experiment results. a. Demonstration of the location of the mobile robot in 3D
coordinates. b. Path followed by mobile robot using a different visualization tool.
4. Performance Analysis
This section demonstrates the performance results using different parameters such as time for
total computation, number of matches per second, and accuracy given in Table 1 and mean
key-point angle differences, number of correct of matches, distance metrics of matches, given
in Figure 3.
In order to complete Table 1, we compared all query images grabbed from the office room
with template images chosen from query images. Thus, we observed the parameter changes
whether an image pair (query and template) is related according to its position/rotation or
these query and template images are irrelevant. Before the comparison section of the program,
we eliminate some of the query images using a hysteresis threshold with respect to the
number of key-points which are computed using FAST method. The first column of Table 1,
total running time of the algorithm means the time passed until the robot finishes the same
number of image comparison process using different combinations on the same path between
560 query images and 127 template images. The last column is the time passed to match
correctly per features extracted by different feature-detector-descriptor combinations. It is
clear from Table 1 that the fastest combination consists of ORB for both key-point detector
and key-point descriptor. On the other hand, minimum number of correct matches per second
belongs to the combination of BRISKSIFT; conversely, maximum number of correct matches
per second belongs to the combination of FASTBRIEF. Furthermore, SURFSIFT combination
has the biggest running time. In an addition, if the SIFT is used as the key-point descriptor,
time for total computation is lower than all the other combinations for each key-point detector
methods. It can be easily estimated that the accuracy for the 127 template images are %100
for all combinations because the template images are chosen from the query images and these
are exactly the same.
%𝐴𝑐𝑐𝑢𝑟𝑎𝑐𝑦 =
∑(𝑇𝑟𝑢𝑒 𝑝𝑜𝑖𝑠𝑖𝑡𝑖𝑣𝑒𝑠 + 𝑇𝑟𝑢𝑒 𝑛𝑒𝑔𝑎𝑡𝑖𝑣𝑒𝑠)
127 + 0
∗ 100 =
∗ 100 = %100
∑(𝑇𝑜𝑡𝑎𝑙 𝐶𝑎𝑠𝑒𝑠)
127
Therefore, giving these accuracy rates is trivial. However, we formulated a different accuracy
term that includes the 3 height level for 5 different pose angles from -300 to 300 according to
the current pose angle and height, and if the histogram comparison value is higher than the
threshold value (0.9) of that comparison result, it is accepted that this comparison is made for
the same point at different pose angles. This measure of accuracy works because the
algorithm is designed so that if any match is achieved in this range in terms of given
parameters, the robot location detected at that point is acceptable. Furthermore, in Table 1 the
accuracy rates are given for explained situation and SIFTSURF is ascertained as the most
accurate combination with % 98.41. Moreover, as one can see that excluding BRISK method
as key-point detector combinations, the best accuracy rates are achieved when the SURF
method is the key-point descriptor.
Table 1 Performance Results for All Combinations.
KEYPOINT
DETECTOR
TYPE
ORB
SURF
SIFT
FAST
BRISK
Parameters Utilized in Performance Analysis
KEYPOINT DESCRIPTOR
TYPE
Total Time of the
Algorithm (sec)
Accuracy
GroundTruth
Number of Correct
Matches per Second
BRIEF
21303.299
%62.83
127*3*5
1457.011
BRISK
23461.675
%74.28
127*3*5
956.158
SIFT
97603.701
%72.28
127*3*5
318.012
SURF
79391.059
%97.90
127*3*5
390.965
ORB
21330.015
%63.62
127*3*5
1455.186
BRIEF
32277.702
%62.36
127*3*5
1568.788
BRISK
35133.182
%63.52
127*3*5
1275.433
SIFT
196487.667
%68.82
127*3*5
280.432
SURF
79135.063
%89.54
127*3*5
696.295
ORB
35074.987
%63.78
127*3*5
1414.503
BRIEF
30938.270
%62.73
127*3*5
879.923
BRISK
32422.058
%64.67
127*3*5
920.443
SIFT
45919.045
%62.31
127*3*5
698.415
SURF
35319.080
%98.41
127*3*5
908.024
BRIEF
23355.701
%62.52
127*3*5
2736.879
BRISK
33752.854
%63.20
127*3*5
454.341
SIFT
56154.363
%72.44
127*3*5
1373.775
SURF
37357.531
%88.30
127*3*5
2065.004
ORB
22734.255
%62.62
127*3*5
275.125
BRIEF
20517.530
%64.62
127*3*5
320.6933
SIFT
34284.954
%86.61
127*3*5
202.3933
SURF
26043.988
%80.32
127*3*5
266.4356
ORB
23335.765
%69.76
127*3*5
289.8432
In order to make our comparison more comprehensive, we give the performance results for
different pose cases using the query and template image matches within an rotational pose
range of [−300 , 300 ] for 5 cases in Figure 3. From Figure 3.a, it is clear that the all methods
are scattered in a wide range in 3-dimensional space, and also FASTSURF combination gives
the best results for all rotations excluding the comparison given for the same images with
respect to number of correct matches, mean of angle of differences between correctly matched
key-points and minimum distance metrics. If we limit our comparison parameters to two of
recent parameters for these comparison results by taking the application priorities into
account, the best combination may change. For instance, if the minimum distance metrics and
the number of correct matches are important for an application, then for 150 and 300 there are
4 best results (SURFSURF, SURFBRIEF, FASTORB, and SURFBRISK). It is possible to
make such analysis for any kind of priorities from the given performance evaluation
parameters.
If the comparison is given for the same image, the combinations align on a straight line at
different points. In this case, SURFSURF and SURFSIFT combinations both give the best
results, and SIFTBRIEF, ORBBRISK, SIFTSURF, SIFTBRISK, and SIFTSIFT are very close
to each other giving the worst results. As a matter of course, only the number of correct
matches change between 220 matches and 990 matches, other parameters are the same for all
combinations.
Whether the number of correct matches is changing between around 200 and 1000 for all
rotation cases, minimum distance metrics and mean of angle difference values between keypoints vary. For positive signed rotations (150 , 300 ), minimum distance metrics values change
between 0 and 170 pixels. On the other hand, for negative signed rotations (−150, −300 ),
minimum distance metrics values change between 0 and 300 pixels. Furthermore, average of
angle difference values between correctly matched key-points vary from −300 to 300 for
negative signed rotations, and from −100 to 400 for positive signed rotations.
Consequently, we may obtain the worst combination results with respect to present
parameters by calculating the geometrical distance using the relative geometric positions of
all combinations from the figures to the best combination. For the rotations of 300 , 150 , and
−300 , ORBSIFT, for the same image comparison SIFTBRIEF, and for −150 , SURFSIFT
combinations are obtained as the worst combinations with respect to given comparison
parameters.
Figure 3 Performance results for the different angle cases. These comparison results are given for the points
that are rotated from -300 to +300 according to the current point which query image and template image is the
same with respect to number of correct matches, minimum distance metrics and the average of angle difference
values between key-points. Lower the average of angle difference values between key-points, and minimum
distance metrics, and higher the number of correct matches is desired for the best result. In summary for all
subfigures displayed in here is the longer to the central point, which indicates the best method, the worse the
performance. a. Comparison of the template image with +𝟑𝟎𝟎 rotated query image from the same environment
and height. b. Comparison of the template image with +𝟏𝟓𝟎 rotated query image from the same environment
and height c. Comparison of the template image with −𝟑𝟎𝟎 rotated query image from the same environment and
height d. Comparison of the template image with −𝟏𝟓𝟎 rotated query image from the same environment and
height e. Comparison of the template image with the same image as query image.
5. Conclusion and Future Work
Developing good feature detectors and descriptors is still a challenging research topic.
Independent from the development of hardware, especially for embedded and/or onboard
applications, and in any autonomous system, the parameters such as computation time,
robustness, repeatability, and accuracy are crucial in the context of soft algorithm
development of feature detectors and descriptors. It has been a usual path to create a new
feature detector-descriptor method by combining previous detector and descriptor methods in
an effective algorithm. Our study provides more comprehensive information with more
performance evaluation parameters (in terms of accuracy and temporal costs such as the
running time from start to end, time per matched features) wider coverage of methods (i.e. 23
combinations). In addition to these commonly used metrics, we give the performance results
of 19 combinations with respect to new metrics, such as mean keypoint angle differences,
number of correct matches, and the distance metrics of matches.
It is clear from our results that there are trade-offs between different parameters and
performance criteria when different feature detector-descriptor combinations are analyzed. If
a wide rotation range is desired to be matched, then the algorithm finds weak features and
matches are not realized because of predefined threshold values. On the other hand, if a
narrow rotation range is desired, the algorithm finds too many features to match and this
causes the increase at total loop time because of an increase at number of correct matches per
unit time. The lowest total running time belongs to the combination of BRISK-BRIEF with
64.62% accuracy rate and 320.6933 correct matches per second. The highest running time is
for the SURF-SIFT combination with 68.82% accuracy rate and 280.432 correct matches per
second. Additionally, SIFT-SURF combination has 98.41% accuracy rate in a total of
35319.080 seconds with 908.024 correct matches per second. Furthermore, FAST-SURF
combination is the method to give the best results for the angular rotations of 30°, 15°, -15°,
and -30° for comparisons. Moreover, for the case of the comparison of the same images,
SURF-SURF and SURF-SIFT combinations give the best results with respect to number of
correct matches, mean of angle of differences between correctly matched keypoints and
minimum distance metrics.
Future research in the computer vision, perception and robotics areas can benefit from the
results provided in this study. From the investigated methods, the individual priorities of
different applications can easily be reflected in combinations as the best option. To be more
specific, our results can improve the applications in the fields of object recognition by
image/object matching in different conditions, and in visual SLAM field by extracting robust
features with its generic outcomes.
In our future work, using the results of this study, an experiment in real-time on our ongoing
humanoid project UMAY [21] with a wider object database will be performed to get the
semantic information of unknown indoor environments. Since the recognition of the
environment is crucial for the robot in terms of executing or interpreting the given tasks in a
dynamical way, object recognition algorithms here can provide an optimized method to start
with processing the visual information. As a consequence, this framework can be considered
to form a basis for future applications involving extracting of visual semantic cues.
Acknowledgements
The research was conducted at the Mechatronics Research and Education Center at Istanbul
Technical University.
References
[1] David G. Lowe, "Distinctive image features from scale-invariant keypoints," International Journal of Computer Vision,
60, 2 (2004), pp. 91-110.
[2] H. Bay, A. Ess, T. Tuytelaars, L. van Gool, "Speeded-up Robust Features (SURF)", Computer Vision and Image
Understanding (CVIU), Vol. 110, No. 3, pp. 346--359, 2008
[3] Leutenegger, S. ; Autonomous Syst. Lab., ETH Zurich, Zurich, Switzerland ; Chli, M. ; Siegwart, R.Y., “BRISK: Binary
Robust invariant scalable keypoints”, Computer Vision (ICCV), 2011 IEEE International Conference on, pp. 2548-2555,
Barcelona, 6-13 Nov. 2011.
[4] Calonder, M., Lepetit, V., Strecha, C., Fua, P., “BRIEF: Binary Robust Independent Elementary Features”, 11th European
Conference on Computer Vision, pp 778-792, Heraklion, Crete, Greece, September 5-11, 2010, Proceedings, Part IV
[5] Kucharczak, F., Da Silva, A., F., Thomaz., L., A., Carvalho, G., Da Silva, E., A., B., Netto, S., L., "Comparison and
Optimization of Image Descriptors for Real-Time Detection of Abandoned Objects."
[6] Rublee, E., Rabaut, V., Konolige, K., Bradski, G., “ORB: an efficient alternative to SIFT or SURF”, In Proc. of the
IEEE Intl. Conf. On Computer Vision (ICCV), volume 13, 2011.
[7] Rosten, E., Drummond, T., “Fusing points and lines for high performance tracking”, Computer Vision, 2005. ICCV 2005.
Tenth IEEE International Conference on (Volume:2 ), pp 1508-1515 Vol. 2, Beijing, 17-21 Oct. 2005.
[8] Rosten, E., Drummond, T., “Machine learning for high-speed corner detection”, 9th European Conference on Computer
Vision Proceedings, Part I, pp 430-443, Graz, Austria, May 7-13, 2006.
[9] Remondino, F., “Detectors and descriptors for photogrammetric applications.”, International Archives of the
Photogrammetry, Remote Sensing and Spatial Information Sciences, 36(3): 49–54, 2006.
[10] Dahl, L., A., Aanæs, H., Pedersen, K., S., “Finding the Best Feature Detector-Descriptor Combination”. International
Conference on 3D Imaging, Modeling, Processing, Visualization and Transmission (3DIMPVT), 16-19 may 2011
[11] Remondino, Fabio. "Detectors and descriptors for photogrammetric applications." International Archives of
Photogrammetry, Remote Sensing and Spatial Information Sciences 36.3 (2006): 49-54.
[12] Kucharczak, Florentin, et al. "Comparison and Optimization of Image Descriptors for Real-Time Detection of
Abandoned Objects."
[13] Figat, Jan, Tomasz Kornuta, and Włodzimierz Kasprzak. "Performance evaluation of binary descriptors of local
features." Computer Vision and Graphics. Springer International Publishing, 2014. 187-194.
[14] Mikolajczyk, Krystian, and Cordelia Schmid. "A performance evaluation of local descriptors." Pattern Analysis and
Machine Intelligence, IEEE Transactions on 27.10 (2005): 1615-1630.
[15] Mikolajczyk, Krystian, and Cordelia Schmid. "Comparison of Affine-Invariant Local Detectors and Descriptors”, 12th
European Signal Processing Conference, Vienna, pp. 1729-1732, 2004.
[16] Guclu, Oguzhan, and Ahmet Burak Can. "A Comparison of Feature Detectors and Descriptors in RGB-D SLAM
Methods." Image Analysis and Recognition. Springer International Publishing, pp. 297-305, 2015.
[17] Iscen, Ahmet, et al. "A comparison of dense region detectors for image search and fine-grained classification." Image
Processing, IEEE Transactions on (Volume:24, Issue: 8), pp. 2369-2381, 2015.
[18] Hartmann, Jean-Michel, Jan Helge Klussendorff, and Erik Maehle. "A comparison of feature descriptors for visual
SLAM." Mobile Robots (ECMR), 2013 European Conference on. IEEE, 2013.
[19] Chao, J., Al-Nuaimi, A., Schroth, G., Steinbach, E., “ Performance comparison of various feature detector-descriptor
combinations for content-based image retrieval with JPEG-encoded query images”., Multimedia Signal Processing
(MMSP), 2013 IEEE 15th International Workshop on, pp. 029-034, Pula, 2013.
[20] Mikolajczyk K, Tuytelaars T, Schmid C, et al., “A Comparison of Affine Region Detectors”, International Journal of
Computer Vision, Vol:65, ISSN:0920-5691, Pages:43-72, 2005.
[21] Lenc, K., Gulshan, V., Vedaldi, A. “VLBenchmarks, http://www.vlfeat.org/benchmarks/”., 2012.
| 1cs.CV
|
arXiv:1710.07792v2 [math.ST] 17 Nov 2017
Cointegrated Density-Valued Linear Processes
Won-Ki Seo
Department of Economics, University of California, San Diego
November 20, 2017
Abstract
In data rich environments we may sometimes deal with time series
that are probability density-function valued, such as observations of
cross-sectional income distributions over time. To apply the methods of functional time series analysis to such observations, we should
first embed them in a linear space in which the essential properties
of densities are preserved under addition and scalar multiplication.
Bayes Hilbert spaces provide one way to achieve this embedding. In
this paper we investigate the use of Bayes Hilbert spaces to model
cointegrated density-valued linear processes. We develop an I(1) representation theory for cointegrated linear processes in a Bayes Hilbert
space, and adapt existing statistical procedures for estimating the corresponding attractor space to a Bayes Hilbert space setting. We revisit
empirical applications involving earnings and wage densities to illustrate the utility of our approach.
I thank Brendan K. Beare for a lot of discussion at all stages of this paper. I am
also grateful to Dakyung Seong and Lam Nguyen for useful discussion on section 6 of this
paper.
1
1
Introduction
While the subject of time series analysis has traditionally dealt with time
series taking values in finite dimensional Euclidean space, a recent literature
on functional time series analysis deals with time series taking values in an
infinite dimensional Banach or Hilbert space. Each observation of such a time
series is a functional object; for example, it could be a square-integrable function, continuous function, or probability density function. Bosq (2000) gives
a rigorous theoretical treatment of linear processes in Banach and Hilbert
spaces. Horváth and Kokoszka (2012) discuss statistical aspects of functional
data and time series analysis, and provide various empirical applications.
Granger (1981) introduced the notion of cointegration as a way to model
long-run equilibrium relationships between real-valued time series. A recent
paper by Chang et al. (2016) is the first to consider the possibility of cointegration in a functional time series setting. The authors consider a time
series of probability densities taking values in the space of square-integrable
real functions on a compact interval K, denoted by L2 (K), and provide a
notion of cointegration adapted to this space. They develop associated statistical methods based on functional principal component analysis (FPCA),
and provide empirical applications to time series of earnings and stock return
densities.
Beare (2017) notes that a technical complication arises in the framework
developed by Chang et al. (2016): the nonnegativity property of probability
densities is incompatible with the type of nonstationarity exhibited by integrated time series, and this incompatibility cannot be resolved by a simple
demeaning of densities. Nontrivial examples of cointegrated density-valued
processes in L2 (K) therefore do not exist. Even in models of stationary probability density-valued time series, Petersen and Müller (2016) have observed
that it is generally inadvisable to treat such time series as taking values in
the subset of L2 (K) consisting of probability densities, as this subset does
not form a linear subspace of L2 (K). It is clear that an arbitrary linear
combination of densities is not a proper density; only a convex combination
of densities is a proper one.
The primary purpose of this paper is to show that the technical complications just discussed can be resolved by viewing probability density-valued
observations as elements of a Bayes Hilbert space. Such spaces were introduced by Egozcue et al. (2006) and developed further by van den Boogaart
et al. (2014). They are constructed in such a way that different elements
2
of the space correspond to different probability densities, and the essential
properties of probability densities are preserved under addition and scalar
multiplication. The notion of cointegration may easily be adapted to this
space as in Beare et al. (2017), who extend the framework developed by
Chang et al. (2016) to arbitrary complex separable Hilbert spaces.
A secondary purpose of the paper is to study the behavior of densityvalued autoregressive processes of order p (AR(p) processes) taking values
in a Bayes Hilbert space. We provide conditions under which an AR(p)
law of motion has a stationary solution or I(d) solution for some positive
integer d, and a necessary and sufficient condition for such an I(d) solution
to in fact be I(1). These results are closely related to the so-called GrangerJohansen representation theorem and its generalization to a possibly infinite
dimensional Hilbert space setting by Beare et al. (2017) and Beare and Seo
(2017).
A third contribution of the paper is the provision of statistical methods
to estimate the attractor space (to be defined later) for an I(1) process in a
Bayes Hilbert space. These methods are based on the functional unit root
test proposed by Chang et al. (2016). We illustrate their usefulness with
empirical applications to time series of cross-sectional densities of individual
earnings and wages.
The remainder of the paper is organized as follows. In Section 2, we review some background material on Bayes Hilbert spaces and other essential
mathematical concepts. In Section 3, we explain how Bayes Hilbert spaces
can provide a useful setting for models of cointegrated density-valued time
series. Results on I(d) representations of cointegrated AR(p) processes in
Bayes Hilbert space are provided in Section 4. Statistical tools for studying cointegrated density-valued time series are introduced in Section 5, and
illustrated with empirical applications in Section 6.
2
Preliminaries
Here we briefly review essential background for the study of cointegrated
density-valued linear processes, and fix standard notation and terminology.
3
2.1
Bayes Hilbert spaces
Bayes Hilbert spaces provide the setting for our treatment of cointegrated
density-valued linear processes. The discussion provided here will omit some
details to conserve space. The reader is referred to Egozcue et al. (2006) and
van den Boogaart et al. (2014) for a rigorous introduction to the subject.
Let (M, A) be a measurable space and P be the set of σ-finite positive
real-valued measures defined on it. For any measure λ, called a reference
measure, define
M(λ) := {ν ∈ P : ν(A) = 0 ⇔ λ(A) = 0,
∀A ∈ A}.
That is, M(λ) is the collection of σ-finite positive measures absolutely continuous with respect to λ. Due to the Radon-Nikodym theorem, any element
ν in M(λ) may be identified with the λ-density dν/dλ, so hereafter we always
regard an element in M(λ) as its λ-density.
We define an equivalence relation ' on M(λ) as follows. For λ-densities
f, g ∈ M(λ), the equivalence f ' g holds if there is some a > 0 such that
Z
Z
gdλ for all A ∈ A.
f dλ = a ·
A
A
The above says that if two measures ν1 and ν2 are proportional in the sense
that ν1 (A) = a · ν2 (A) for all A ∈ A, their λ-densities are equivalent under
'. The collection of '-equivalence classes of λ-densities, denoted by B(λ),
are the elements of a Bayes space associated with λ. We define two vector
operations (⊕, ), called perturbation and powering, as follows. For a ∈ R
and f, g ∈ B(λ), define
Z
f ⊕g '
f gdλ,
Z
a
f'
f a dλ.
Negative perturbation is defined as f g = f ⊕ (−1 g). B(λ) equipped
with the two vector operations (⊕, ) is a vector space.
We hereafter assume that λ is a finite measure and let B 2 (λ) be the
collection of λ-densities that have square-integrable logarithms, i.e.
Z
2
2
B (λ) := f ∈ B(λ) :
|log f | dλ < ∞ .
4
It turns out that B 2 (λ) is a vector subspace of B(λ). Define the inner product
h·, ·iB 2 (λ) in the following way: for f, g ∈ B 2 (λ),
Z
Z
Z
log f − log f dλ
log g − log f dλ dλ.
hf, giB 2 (λ) =
The following result is obtained in van den Boogaart et al. (2014).
Lemma 2.1. B 2 (λ) equipped with (⊕, ) and h·, ·iB 2 (λ) is a separable Hilbert
space.
Define L2 (λ) as the set of measurable square-integrable functions f : Ω →
R. An element of L2 (λ) is regarded as a class of square-integrable functions
that are λ-almost surely equivalent. L2 (λ) is assumed to be
R equipped with
the inner product h·, ·iL2 (λ) defined as follows: hf˜, g̃iL2 (λ) = f˜g̃dλ for f˜, g̃ ∈
L2 (λ). Define
Z
2
2
L (λ) = f˜ ∈ L (λ) : f˜ = 0 ,
which is a closed subspace of L2 (λ). One useful fact for the study of densityvalued functional objects is that there exists an isometric isomorphism between B 2 (λ) and L2 (λ).
Lemma 2.2. The following hold:
(a) B 2 (λ) is isometrically isomorphic to L2 (λ).
(b) clr : B 2 (λ) → L2 (λ) defined as
Z
clr(f ) = log f −
log f dλ,
f ∈ B 2 (λ),
is an isometrical isomorphism. Moreover, clr−1 is given by
clr−1 (f˜) ' exp(f˜),
f˜ ∈ L2 (λ).
See van den Boogaart et al. (2014) for more details. The map clr is called
the centered log-ratio (clr) transformation. Since clr is a unitary linear map,
the following are naturally implied:
clr(f ⊕ g) = clr(f ) + clr(g),
hf, giB 2 (λ)
clr(a f ) = a · clr(f ),
Z
= hclr(f ), clr(g)iL2 (λ) = clr(f ) clr(g)dλ.
5
Let λ be the uniform measure defined on a compact interval K. The Bayes
Hilbert space associated with λ, B 2 (λ), was considered in Egozcue et al.
(2006), and it may be understood as the space of probability densities with
support K. Note that B 2 (λ) is the space of equivalence classes of positive
functions defined on K with square-integrable logarithms with respect to
the
R uniform measure λ. Within an equivalence class, the integral constraint
f dλ = 1 singles out the representative element as a probability density
K
function. Then for f, g ∈ B 2 (λ), two operations ⊕ and are be defined as
f (x)g(x)
,
f
(y)g(y)dy
K
f ⊕ g(x) = R
a
f (x) = R
f (x)a
.
a dy
f
(y)
K
If we denote the indicator function on K by 1K , then the '-equivalence
class associated with 1K is the neutral element of perturbation. Naturally,
1 ∈ R is the neutral element of powering. Perturbation and powering are
constructed such that the results of f ⊕ g and a f are always densities even
if one or both of f and g are not proper densities. If one regards an element
in B 2 (λ) as a probability density, perturbation can be interpreted as a Bayes
updating. This is why B 2 (λ) is called a Bayes (Hilbert) space in the previous
literature.
The fact that the resulting density from any arbitrary linear combination
of two elements of B 2 (λ) is a proper density is crucial to the approach taken
in this paper. In fact, the point of Beare (2017)’s comments on Chang et al.
(2016) is rooted in the fact that linear combinations of probability densities
in L2 (K) are not necessarily probability densities. It will be shown in the
subsequent sections that the Bayes Hilbert space is not just a good candidate on which to define (cointegrated) density-valued processes, but also its
Hilbert space structure makes it possible to use well-developed statistical
techniques in Hilbert spaces without further technicality.
We will consider a time series of densities with common support K.
Therefore, λ will be assumed to be the uniform measure on K and densityvalued linear processes will be defined in the associated Bayes Hilbert space
B 2 (λ). Allowing the reference measure to be another measure with compact
support is trivial. However, generalization to a reference measure with unbounded support is nontrivial and we will not consider this case. When the
reference measure has unbounded support, the space of probability measures
as a subset of B 2 (λ) is not a subspace, as the following example demonstrates.
6
Example 2.1. Let λ be the standard normal measure defined on the real
line and B 2 (λ) be the associated Bayes Hilbert space. Let ν be the normal
2
Rmeasure 2with mean 0 and variance 2. Then f := dν/dλ ' exp(x /4), so
| log f | dλ < ∞ since the fourth moment of the standard normal measure
is finite. However, note that f itself represents an infinite measure; i.e. it is
not integrable. So in this case, an element of B 2 (λ) need not be a proper
density.
Aitchison (1982) introduced the space B 2 (λ) equipped with (⊕, ) and
h·, ·iB 2 (λ) in the special case where λ is the discrete uniform measure supported on a finite set K. The term Aitchison geometry is used to connote
the geometric properties of this Bayes Hilbert space. The term generalized
Aitchison geometry may be preferred when referring to Bayes Hilbert spaces
constructed with general reference measures.
2.2
Bounded linear operators on Bayes Hilbert space
Here we briefly summarize essential concepts on bounded linear operators.
The reader is referred to Bosq (2000) and Conway (1994) for a detailed
introduction.
Let H be B 2 (λ) or its complexification BC2 (λ), defined as
BC2 (λ) = {f ⊕ ig : f, g ∈ B 2 (λ)},
where i denotes the imaginary unit. BC2 (λ) is understood to be equipped
with the inner product hf ⊕ ig, f 0 ⊕ ig 0 iBC2 (λ) = hf, f 0 iB 2 (λ) − ihf, g 0 iB 2 (λ) +
ihg, f 0 iB 2 (λ) + hg, g 0 iB 2 (λ) .
Let B(H) be the space of bounded linear operators, equipped with the
usual operator norm
kAkB(H) = sup kAf kH ,
A ∈ B(H).
kf kH ≤ 1
A ∈ B(H) is said to be compact if for two orthonormal bases (uj , j ∈ N)
and (vj , j ∈ N) of H, it can be written as
Af =
∞
M
γj hf, uj iH
j=1
for some sequence (γj , j ∈ N) tending to zero.
7
vj ,
Given A ∈ B(H), we define two fundamental subspaces, the range and
kernel of A, as follows.
ker A := {f ∈ H : Af = λ},
ran A := {Af : f ∈ H}.
The dimension of ker A is called the nullity of A, and the dimension of ran A
is called the rank of A.
For A ∈ B(H), there exists an operator A∗ ∈ B(H), called the adjoint of
A, that is uniquely determined by the following property
hAf, giH = hf, A∗ giH ,
for all f, g ∈ H.
Given a subset V ⊂ H, the orthogonal complement of V is denoted by
V ⊥ = {g ∈ H : hf, giH = 0 for all f ∈ V }.
The closure of V , defined as the union of V and its limit points, is denoted
by cl(V ). It turns out that the following relationship holds (see e.g. Conway,
1994, pp. 35-36)
ker A = (ran A∗ )⊥
and (ker A)⊥ = cl(ran A∗ ).
(2.1)
A ∈ B(H) is said to be positive semidefinite if hAf, f iH ≥ 0 for all f ∈ H.
If the inequality is strict for all f 6= λ, A is said to be positive definite.
Given a subspace V ∈ H, A|V denotes the restriction of an operator
A ∈ B(H), i.e. A|V : V → H.
Let K = L2 (λ) if H = B 2 (λ), and let K = L2C (λ) if H = BC2 (λ), where
L2C (λ) is the complexification of L2 (λ) similarly defined as BC2 (λ). Let clrC
denote the complexification of clr, i.e. clrC (f ⊕ ig) = clr(f ) + i · clr(g). Then
clrC is an isometric isomorphism between BC2 (λ) and L2C (λ). Since clr or clrC
is an isometric isomorphism between H and K, any bounded linear operator
in B(H) can be understood as the corresponding element in B(K). This
property will be used repeatedly in subsequent sections.
2.3
Random elements of Bayes Hilbert space
Here we summarize some essential concepts relating to random elements of
a Bayes Hilbert space. See Bosq (2000) for a detailed discussion of random
elements of Banach and Hilbert spaces.
8
Let (Ω, F, P ) be the underlying probability triple and let H = B 2 (λ) or
which is understood to be equipped with its Borel σ-field. An Hvalued random variable is a measurable map X : Ω → H. Let k · kH be the
norm defined on H. We say that X is integrable if EkXkH < ∞. If X is
integrable, there exists a unique element, denoted by EX, such that
BC2 (λ),
EhX, f iH = hEX, f iH ,
for all f ∈ H.
EX is called the expectation of X.
If EkXk2H < ∞ then X is said to be square-integrable. Let L2H denote
the space of square-integrable random variables X with EX = λ, equipped
with the norm
1/2
kXkL2H = EkXk2H
.
It turns out that L2H is a Banach space. For X ∈ L2H , the Cauchy-Schwarz
inequality implies that Xhf, XiH is integrable for all f ∈ H. Define the
operator CX ∈ B(H) by
CX (f ) := E (Xhf, XiH ) .
CX is called the covariance operator of X.
2.4
Operator pencils
Let H be a complex separable Hilbert space and U be an open connected set
in the complex plane C. An operator-valued map Q : U → B(H) is called
an operator pencil. In this paper, H = BC2 (λ) or L2C (λ) is considered.
For notational convenience, we put H = L2C (λ). An operator pencil Q(z)
is holomorphic on an open connected set D if and only if
Q(1) (z0 ) := lim
z→z0
Q(z) − Q(z0 )
z − z0
exists in the norm of B(H) for each z0 ∈ D. A well known fact is that when
Q(z) is holomorphic at z = z0 , it allows the power series expansion
Q(z) =
∞
X
Qk (z − z0 )k
k=0
for some sequence (Qk , k ∈ N) in B(H).
The set σ(Q) := {z ∈ U : Q(z) is not invertible} is called the spectrum
of Q, which turns out to be closed (Markus, 2012, p. 56).
9
3
Cointegrated density-valued linear processes
Hereafter the following is always assumed without explicitly stating it.
Assumption (R). λ is the uniform measure on a compact interval K ⊂ R.
Under the above assumption, B 2 (λ) is the Bayes Hilbert space studied in
Egozcue et al. (2006). The assumption is not essential but convenient. In
fact, extending the subsequent results of this paper to other measures supported on K, such as the truncated normal measure, can be easily done with
trivial modifications.
First we define linear processes in B 2 (λ), called Bayes linear processes.
Due to the Hilbert space structure, linear processes in B 2 (λ) may be easily
defined and studied according to the work of Bosq (2000, 2007). As seen in
Section 2, a Bayes linear process may be understood as a linear process of
probability densities with compact support K.
Then, we introduce I(1) processes in B 2 (λ) based on the previous work of
Beare et al. (2017) who provided a notion of cointegrated linear processes in
an arbitrary Hilbert space. Of course, it can be understood as an I(1) process
of probability densities with support K. We further investigate cointegration
in B 2 (λ).
3.1
Linear processes in B 2 (λ)
Suppose that we have a time series of densities f = (ft , t ≥ t0 ) with compact
t
for each t, where νt is a probability
support K ⊂ R. We assume that ft := dν
dµ
measure for each t and µ is the Lebesgue measure defined on R. Since
ft has compact support K, it is absolutely continuous with respect to λ.
This implies that the corresponding λ-density of the underlying probability
measure νt is µ(K)−1 ft . Thus, the unit integral constraint singles out ft
itself from the equivalence class containing ft . The time series of µ-densities
f = (ft , t ≥ t0 ) may therefore be regarded as a stochastic process taking
values in B 2 (λ).
Let ε = (εt , t ∈ Z) be an independent and identically distributed (iid)
sequence in L2B 2 (λ) and (Ak , k ≥ 0) be a sequence in B(B 2 (λ)) satisfying
P∞
2
k=0 kAk kB(B 2 (λ)) < ∞. For fixed t0 ∈ Z ∪ {−∞}, the sequence f = (ft , t ≥
10
t0 ) defined as
ft =
∞
M
Ak εt−k
(3.1)
k=0
is convergent in L2B 2 (λ) (Bosq, 2000, Lemma 7.1). We call the sequence f =
(ft , t ≥ t0 ) a Bayes linear process. Bayes linear processes are necessarily
stationary.
P∞
A Bayes linear process,
L∞ (3.1), is said to be standard2 if k=0 kAk kB(B 2 (λ)) <
∞. In this case, A := k=0 Ak is convergent in B(B (λ)). As in Beare et al.
(2017), we define the long-run covariance operator Λ ∈ B(B 2 (λ)) for a standard linear process as follows
Λ := ACε0 A∗ .
Since clr is an isometric isomorphism, it follows that the clr image of a
(standard) linear process in B 2 (λ) is a (standard) linear process in L2 (λ).
Denote by g̃ ∈ L2 (λ) the clr image of g ∈ B 2 (λ). Then the L2 (λ)-linear
process paired with (3.1) is
f˜t =
∞
X
Ãk ε̃t−k ,
k=0
where f˜t = clr(ft ), Ãk = clr ◦Ak ◦ clr−1 and ε̃ = (ε˜t , t ∈ Z) is an iid sequence
in L2 (λ).
3.2
I(1) processes in B 2 (λ) and cointegration
Chang et al. (2016) were the first to study I(1) processes taking values in
an infinite dimensional Hilbert space, specifically the space L2 (λ). Subsequently, Beare et al. (2017) considered I(1) processes in an arbitrary separable complex Hilbert space. In this section we specialize the latter setting
to the Bayes Hilbert space B 2 (λ). Let the time series of random densities
of interest f = (ft , t ≥ 0) be a sequence in B 2 (λ). Denote the time series
of first differences ∆f = (∆ft , t ≥ 1) with ∆ft = ft ft−1 . We say that
f = (ft , t ≥ 0) is I(1) if ∆ft satisfies
∆ft =
∞
M
k=0
11
Nk εt−k
(3.2)
for all t ≥ 1, where ε = (εt , t ∈ Z) is an iid sequence in L2B 2 (λ) , and (Nk , k ≥ 0)
P∞
2
is
k=0 kkNk kB(B 2 (λ)) < ∞ and N :=
La∞ sequence in B(B (λ)) satisfying
k=0 Nk 6= 0.
From Chang et al. (2016) and Beare et al. (2017), it can be shown that
the above I(1) sequence allows the so-called Beveridge-Nelson decomposition,
ft = (f0
ν0 ) ⊕ N ξ t ⊕ νt ,
t≥0
Lt
L∞
L
where ξt =
( ∞
s=1 εs and νt =
k=0 Nk εt−k with Nk = −1
j=k+1 Nj ).
This means that ft is obtained by combining three different components: an
initial condition f0 ν0 , a random walk component N ξt , and a stationary
component νt .
Given an I(1) sequence f = (ft , t ≥ 0), we define the cointegrating space
associated with f , denoted by C(f, B 2 (λ)), to be the set
C(f, B 2 (λ)) := g ∈ B 2 (λ) : hft , giB 2 (λ) , t ≥ 0 is stationary for some f0 .
Moreover, we call A(f, B 2 (λ)) := C(f, B 2 (λ))⊥ the attractor space. These
terms to indicate such subspaces are commonly used in the literature on
cointegration, see e.g. Johansen (1996).
Define the long-run variance operator of ∆f as Λ := N Cε0 N ∗ . If Cε0 is
positive definite, it must be the case that
ker Λ = ker N ∗ ,
and further Beare et al. (2017) showed that the cointegrating space is equal
to ker N ∗ .
The cointegrating space (or attractor space) can be identified by analyzing
its clr-image in L2 (λ), which may be convenient in practice. Suppose that
the clr image of (3.2) is
∆f˜t =
∞
X
Ñk ε̃t−k ,
k=0
where ∆f˜t = f˜t − f˜t−1 and Ñk = clr ◦Nk ◦ clr−1 . The Beveridge-Nelson
decomposition is
f˜t = (f˜0 − ν̃0 ) + Ñ ξ˜t + ν˜t ,
12
t≥0
where Ñ = clr ◦N ◦ clr−1 . We also define the long-run variance operator
of ∆f˜ as Λ̃ = Ñ Cε̃0 Ñ ∗ , where Cε̃0 is the covariance operator of ε̃0 . The
following result shows that we can fully identify the cointegrating space in
B 2 (λ) associated with f from the cointegrating space in L2 (λ) associated
with f˜, the clr image of f .
Proposition 3.1. If Cε0 is positive definite, then C(f, B 2 (λ)) = clr−1 ker Ñ ∗
Proof. Proposition 3.1 in Beare et al. (2017) implies that C(f, B 2 (λ)) =
ker N ∗ . Note that clr∗ = clr−1 since for g̃ := clr(g),
hf, clr−1 g̃iB 2 (λ) = hclr(f ), g̃iL2 (λ) .
This holds for any arbitrary g ∈ B 2 (λ). By the uniqueness of the adjoint
map, clr∗ = clr−1 . From these results, it is clear that
Ñ ∗ = clr ◦N ∗ ◦ clr−1 .
Since clr and clr−1 are bijective, it follows that ker N ∗ = clr−1 ker Ñ ∗ .
Chang et al. (2016) considered a cointegrated density-valued process with
values in L2 (λ). However, Beare (2017) pointed out that the attractor space
under their assumptions is always trivial, i.e. A(f, L2 (λ)) = {0}. This problem occurs because an I(1) process of probability densities in L2 (λ) cannot
satisfy the nonnegativity constraints required for each realization to be a
proper density; the space of probability densities with compact support K
is strictly smaller than L2 (λ) and not a subspace. Due to the geometry of
the Bayes Hilbert space, a cointegrated linear process in B 2 (λ) does not suffer from this problem. Furthermore, it is clear from the earlier discussion
of Bayes Hilbert spaces in Section 2.1 that the space of probability densities supported on K is isomorphic to L2 (λ), which is just a slightly smaller
subspace than L2 (λ) itself.
4
Cointegrated AR(p) processes in B 2(λ)
In this section, we study AR(p) processes with values in B 2 (λ) and obtain a
version of the Granger-Johansen representation theorem.
Suppose that a sequence of λ-densities (ft , t ≥ −p + 1) in B 2 (λ) evolves
according to
ft = A1 ft−1 ⊕ · · · ⊕ Ap ft−p ⊕ εt
13
(4.1)
for t ≥ 1, where ε = (εt , t ∈ Z) is an iid sequence in L2B 2 (λ) and A1 , . . . , Ap ∈
B(B 2 (λ)). Equation (4.1) may be understood as an autoregressive law of
motion for density-valued processes in B 2 (λ). The corresponding clr image
of (4.1) with values in L2 (λ) is given by
f˜t = Ã1 f˜t−1 + · · · + Ãp f˜t−p + ε˜t
(4.2)
for t ≥ 1, where Ãk = clr ◦Ak ◦ clr−1 . It is clear that Ãk ∈ B(L2 (λ)), and
that Ãk is compact if and only if Ak is compact. Let idL2 (λ) be the identity
operator on L2 (λ), and for z ∈ C define the operator pencil
Ã(z) = idL2 (λ) −z Ã1 − · · · − z p Ãp .
For each z ∈ C, Ã(z) is a bounded linear operator on L2C (λ), the complexification of L2 (λ). The operator pencil Ã(z) is polynomial in z; see Markus
(2012) for a detailed discussion of polynomial operator pencils. Let idB 2 (λ)
be the identity operator on B 2 (λ), and define
A(z) = idB 2 (λ) (z
A1 )
···
(z p
Ap ).
(4.3)
For each z, A(z) is a bounded linear operator on BC2 (λ). One can easily show
that A(z) = clr−1
C ◦Ã(z) ◦ clrC , so σ(A) = σ(Ã) holds.
To further analyze (4.1), we employ the following mutually exclusive assumptions.
Assumption (S). If z ∈ σ(A) then |z| > 1.
Let Dr be the open disk centered at zero with radius r > 0. Since σ(A)
is closed, Assumption (S) implies that there exists η > 0 such that A(z) is
invertible on D1+η .
Assumption (N).
(i) A1 , . . . , Ap ∈ B(B 2 (λ)) are compact operators.
(ii) If z ∈ σ(A) then |z| > 1 or z = 1. Moreover, 1 ∈ σ(A).
(iii) If P ∈ B(B 2 (λ)) is a projection on ran A(1), then the map
(idB 2 (λ) P)A(1) (1)|ker A(1) : ker A(1) → ran(idB 2 (λ) P)
is invertible.
14
Under Assumption (N)-(i), A(z) is an index-zero Fredholm operator for each
z ∈ C. This implies that ran A(1) is closed. (N)-(i) is not restrictive in practice since it is in fact common to assume the compactness of autoregressive
operators. (N)-(ii) implies the existence of η > 0 such that A(z) is invertible
everywhere on D1+η except at z = 1. The role of (N)-(iii) will be discussed
later.
The AR(p) law of motion (4.1) behaves very differently depending on
whether A(z) satisfies Assumption (S) or (N). In the former case it generates
a stationary process which may be represented as a standard Bayes linear
process.
Proposition 4.1. Suppose that Assumption (S) is satisfied. Then the AR(p)
law of motion (4.1) admits a unique stationary solution in L2B 2 (λ) given by
ft =
∞
M
Nk εt−k
(4.4)
k=0
for all t ≥ 1. Moreover, Nk is given by
Nk =
1
k!
N (k) (0)
and N (z) := A(z)−1 is holomorphic on D1+η for some η > 0.
Proof of Proposition 4.1. Consider the clr image of (4.2) in L2 (λ) and let
H = L2 (λ). Using the Markovian representation in Bosq (2000, p. 128), the
AR(p) law of motion in H can be re-expressed as an AR(1) law of motion in
Hp by writing
Ft = AFt−1 + Et ,
where
f˜t
f˜
t−1
Ft = . ,
..
f˜t−p+1
ε˜t
0
Et = .. ,
.
0
Ã1 Ã2 · · · Ãp−1 Ãp
id
0
0
H 0 ···
A= .
.. . .
..
.. .
.
.
.
.
.
.
0
0 · · · idH 0
15
(4.5)
Define A(z) := idHp −Az, i.e.
idH −Ã1 z −Ã2 z −Ã3 z −Ã4 z
···
−Ãp z
− id z
idH
0
0
···
0
H
0
− idH z idH
0
···
0
A(z) =
.
.
.
.
..
.
..
..
..
..
..
.
0
0
0
0
− idH z idH
A11 (z) A12 (z)
=:
,
A21 (z) A22 (z)
where one can easily verify that A22 (z) is invertible. Define the Schur com−1
plement of A22 (z) as A+
11 (z) := A11 (z) − A12 (z)A22 A21 (z). From a little
algebra, it can be easily verified that A+
11 (z) = Ã(z). Since A22 (z) is invert+
ible, A(z) is invertible if and only if A11 is invertible. Therefore, it follows
that σ(A) = σ(Ã) ⊂ {z : |z| > 1}. Define
s(A) := {z ∈ C : A − z idHp is invertible}
and
ρ(A) := sup{|z| : z ∈ σ(A)},
the spectrum and spectral radius of the bounded linear operator A. From
the construction of the operator pencil A(z) and Assumption (S), it is clear
that
ρ(A) := sup{|z| : z ∈ s(A)} < 1.
(4.6)
In view of Gelfand’s formula (Conway, 1994, Proposition VII.3.8), (4.6) implies that there exists j such that
kAj kB(Hp ) < aj ,
a ∈ (0, 1).
(4.7)
From a well known result on the inverse of Banach-valued functions , A(z)−1
is given as
A(z)−1 = idH +Az + A2 z 2 + · · ·
which is convergent in D1+η , and indeed holomorphic on D1+η , for some η > 0
because of (4.7). This shows that the AR(1) law of motion in (4.5) may be
represented as
Ft =
∞
X
Ak Et−k ,
k=0
16
t ∈ Z.
Let Π : Hp → H be the coordinate projection given as Π(x1 , . . . , xp ) = x1
and let Π∗ : H → Hp be its adjoint. Then one can easily verify that
f˜t =
∞
X
ΠAk Π∗ ε̃t−k ,
t ∈ Z.
k=0
−1
Simple algebra yields ΠA(z)−1 Π∗ = A+
= Ã(z)−1 , and it is clear that
11 (z)
ΠAk Π∗ is the kth coefficient in the Taylor series of Ã(z)−1 around z = 0.
Holomorphicity of A(z)−1 on D1+η is inherited from the holomorphicity of
Ã(z)−1 on D1+η , which is implied by the holomorphicity of A(z)−1 established
above and the relation Ã(z)−1 = ΠA(z)−1 Π∗ .
P
Remark 4.1. Norm-summability, ∞
k=0 kÑk kB(B 2 (λ)) < ∞, is a natural consequence of holomorphicity of A(z)−1 on D1+η for some η > 0. This shows
that (4.4) is a standard Bayes linear process.
Under Assumption (N), a process in B 2 (λ) satisfying the AR(p) law of
motion (4.1) is no longer stationary. Loosely speaking, it corresponds to an
I(d) process for d ≥ 1.
Proposition 4.2. Under Assumption (N)-(i, ii), the AR(p) law of motion
does not admit a stationary solution. Instead, given a suitable initialization
f−d+1 , . . . , f0 , it is satisfied by a sequence in L2B 2 (λ) whose dth difference is
given by
∞
M
d
Nk εt−k
∆ ft =
k=0
for all t ≥ 1. Nk is defined by
Nk =
1
k!
N (k) (0)
and N (z) := (z − 1)d A(z)−1 is holomorphic on D1+η for some η > 0.
If Assumption (N)-(iii) also holds, then d = 1 and
lim (z − 1)
z→1
A(z)−1 =
−1
idB 2 (λ) P A(1) (1)|ker A(1)
idB 2 (λ) P , (4.8)
which does not depend on the choice of the projection P on ran A(1).
17
Proof. For notational convenience, we work with Ã(z) and set H = L2 (λ).
Assumption (N)-(i,ii) implies that 1 is an isolated singularity of Ã(z). From
Lemma 8.1, we know that there exist finite dimensional projections Q1 , . . . , Qd
such that, for z in a punctured neighborhood of 1,
Ã(z) = (P1 + (1 − z)Q1 ) · · · (Pd + (1 − z)Qd )G(z),
where Pi = idH −Qi for i = 1, . . . , d, and G(z) is a holomorphic function that
is invertible at z = 1. Note that for i = 1, . . . , d
(Pi + (1 − z)Qi )−1 = (Pi + (1 − z)−1 Qi ).
This shows that in a punctured neighborhood of z = 1,
Ã(z)−1 = G(z)−1 (Pd + (1 − z)−1 Qd ) · · · (P1 + (1 − z)−1 Q1 ).
(4.9)
Therefore, Ã(z)−1 is meromorphic and the lowest order of the Laurent series
is −d. Therefore Ñ (z) := (1 − z)d Ã(z)−1 can be continued holomorphically
over z = 1. By applying the linear filter induced by Ñ (z) to (4.1), we have
for all t ≥ d + 1
∆ f˜t =
d
∞
X
Ñk ε̃t−k ,
k=0
Ñk =
1 (k)
Ñ (0)
k!
(4.10)
Since (∆d f˜t , t ≥ d + 1) is stationary, it may be extended for t ≥ 1 in a
natural way and f−d+1 , . . . , f0 may be chosen accordingly. This proves the
first statement.
Additionally under Assumption (N)-(iii), Lemma 8.2 implies that d = 1.
The only remaining thing is to verify the residue formula (4.8). From (4.9)
we know that
lim (1 − z)Ã(z)−1 = G(1)−1 (idH −P1 ).
z→1
Define
A := G(1)−1 |ran(idH −P1 ) ,
B := G(1)|ker Ã(1) .
From Lemma 8.3(a,b) we know that B = −(idH −P1 )Ã(1) (1)|ker Ã(1) and
ran B ⊂ ran(idH −P1 ). Since B as a map from ker Ã(1) to ran(idH −P1 )
18
is invertible under Assumption (N)-(iii), it is clear that AB = idker Ã(1) . This
shows that
Ñ−1 := lim(1 − z)Ã(z)−1 = A(idH −P1 ) = B−1 (idH −P1 ).
z→1
Under Lemma 8.1, we may choose P1 to be any projection on ran Ã(1), so
the expression for Ñ−1 just obtained cannot depend on the particular choice
of projection.
Under Assumption (N)-(i,ii), Proposition 4.2 says that ∆d f = (∆d ft , t ≥ 1)
is a Bayes linear process under a suitable initial condition. In this sense, we
say that the AR(p) law of motion (4.1) is I(d) for some d ≥ 1. The most
common case in practice may be I(1), and such an I(1) solution is guaranteed
under an extra condition, Assumption (N)-(iii).
Remark 4.2. When H = Rn , Johansen (1991) provided a necessary and sufficient condition on the autoregressive matrix polynomial and its first derivative at one for an AR(p) law of motion to be I(1). It is commonly called the
I(1) condition. Assumption (N)-(iii) plays the same role for an AR(p) law
of motion in B 2 (λ). Beare et al. (2017) provided an I(1) condition for an
AR(p) law of motion in an arbitrary complex Hilbert space, and Assumption
(N)-(iii) is a reformulation of it.
Remark 4.3. When p = 1, an I(1) solution can be guaranteed without
requiring compactness of the autoregressive operator. See Theorem 4.1 in
Beare et al. (2017).
Under Assumption (N)-(i,ii,iii), one natural consequence of Proposition
4.2 is the following Beveridge-Nelson decomposition: for some f0 , ν0 ∈ B 2 (λ),
ft = (f0
ν0 ) ⊕ N (1)ξt ⊕ νt ,
t≥0
(4.11)
Lt
L∞
where ξt =
s=1 εs , νt =
k=0 Nk εt−k and N (1) is a finite rank operator
which can be explicitly obtained from the residue formula (4.8). If ε = (εt , t ∈
Z) has a positive definite covariance operator, one can easily identify the
cointegrating and attractor spaces of B 2 (λ) from the decomposition (4.11).
Proposition 4.3. Assume that Cε0 is positive definite and (N)-(i, ii, iii) hold.
Then C(f, B 2 (λ)) = [ker A(1)]⊥ .
19
Proof. We only provide an informal argument. For a more detailed and
rigorous proof, refer to Beare et al. (2017, Proposition 3.1). From (4.11), for
any g ∈ B 2 (λ) we have
hft , giB 2 (λ) = hf0
ν0 , giB 2 (λ) + hN (1)ξt , giB 2 (λ) + hνt , giB 2 (λ) .
By employing the initial condition f0 = ν0 , we can make the first term
vanish. Moreover, the inner product process (hνt , giB 2 (λ) , t ≥ 0) is stationary
because (νt , t ≥ 0) is stationary. The variance of hN (1)ξt , giB 2 (λ) increases in
t. Thus, hN (1)ξt , giB 2 (λ) must vanish in order for hft , giB 2 (λ) to be stationary.
Given that ε has a positive definite covariance operator, for hN (1)ξt , giB 2 (λ)
to vanish we require g ∈ ker N (1)∗ . From the closed form solution for N (1)
given in (4.8) combined with (2.1) , it can be easily deduced that ker N (1)∗ =
[ker A(1)]⊥ .
Naturally, the attractor space A(f, B 2 (λ)) = C(f, B 2 (λ))⊥ = ker A(1), which
is finite dimensional under Assumption (N).
Example 4.1 (A numerical example).
Let λ be the uniform measure on [−3, 3] and consider the Bayes Hilbert
space associated with λ. Let g be the standard normal measure truncated
on [−3, 3]. We consider the following AR(1) law of motion
g) = Ψ(ft−1 g) ⊕ εt ,
∞
M
Ψ(·) =
λj h·, ej iB 2 (λ) ej ,
(ft
j=1
where λj = 21−j . Let (uj , j ∈ N) be the Fourier basis for L2 (λ), and let e1 be
the Cauchy probability density with location zero and scale 0.25. We obtain
an orthonormal basis (ej , j ∈ N) for B 2 (λ) by applying the Gram-Schmidt
process to the basis (e1 , clr−1 u2 , clr−1 u3 , . . .). If εt has a positive definite
covariance operator, this specification makes the attractor space equal to
A(f, B 2 (λ)) = {g ⊕ (a
e1 ) : a ∈ R}.
(4.12)
Figure 4.1 shows typical elements in the attractor space. An element g ⊕
(a e1 ) shows higher concentration around 0 when a > 0, or is bimodal
when a < 0. To obtain a simulated sequence, I generated a sequence of
independent standard Brownian bridges (Bt , t ≥ 1), and set
εt = clr−1 {0.3 · Pm (λ) B t },
20
where Pm (λ) denotes orthogonal projection on theR space of mth-order poly1
nomials in L2 (λ), and B t (u) = Bt ((u + 3)/6) − 6 0 Bt (r)dr for u ∈ [−3, 3].
A consequence of using the projection Pm to construct the innovation εt is
that the attractor space may not be exactly equal to that in (4.12), since the
covariance operator of εt is not positive definite. However, this is a convenient way to force the simulated probability densities to be smooth, and by
choosing large m the attractor space should approximate that in (4.12). I
set f1 = g and generated a sequence which is shown in Figure 4.2. We can
easily see that ft floats around the attractor space in the long run.
Figure 4.1: Typical elements in the attractor
g ⊕ e1
g
e1
Figure 4.2: Realization of (ft , t ≥ 1)
t=1
t = 10
t = 30
t = 100
t = 300
t = 500
t = 800
t = 1000
21
5
Statistical inference
In this section we provide a statistical procedure to estimate the attractor
space, which is assumed here to be finite dimensional. Chang et al. (2016)
provided statistical methods based on FPCA for a cointegrated densityvalued linear process with values in L2 (λ). Even though Beare (2017) commented that their time series cannot accommodate a nontrivial attractor
space, the statistical procedure they provided is useful since we can apply it
to the time series of clr-images f˜ = (f˜t , t ≥ 1) with values in L2 (λ). Using
their procedure, the attractor space of L2 (λ) can be estimated, and then it
is easy to obtain the attractor space of B 2 (λ) using the clr−1 transformation.
We therefore do not have to develop a new statistical technique adapted to
Bayes Hilbert spaces.
Assumption (T1).
(i) For some finite rankPÑ ∈ B(L2 (λ)) and a sequence (Ñk , k ≥ 0) in
B(L2 (λ)) such that ∞
k=0 kkÑk kL2 (λ) < ∞, we have
f˜t = f˜0 − ν̃0 + Ñ ξ˜t + ν̃t ,
where ν̃t =
P∞
k=0
t ≥ 0.
Ñk ε̃t−k .
(ii) (ε̃t , t ∈ Z) is an iid sequence with E ε̃t = 0, positive definite covariance
operator Cε̃0 , and Ekε̃t kpL2 (λ) < ∞ for some p ≥ 4.
In the above assumption, it is explicitly required that the attractor space
A(f˜, L2 (λ)) is finite dimensional. An example of such an I(1) process is
an AR(p) process satisfying Assumption (N), which we considered in the
previous section. Assume that dim(A(f˜, L2 (λ))) = r > 0 and let (vi , i ∈ N)
be the orthonormal basis of L2 (λ) such that
A(f˜, L2 (λ)) = span(v1 , . . . , vr ),
C(f˜, L2 (λ)) = span(vr+1 , vr+2 , . . .).
The probability density functions (ft , t = 1, . . . , T ) are not directly observed and must be estimated from the data. We assume that there are n
cross-sectional observations that are available to estimate ft at each time
period t. One possibility would be to obtain estimated densities (fˆ1 , . . . , fˆT )
22
from a standard nonparametric kernel method. However, since we would
ˆ
Rbe applying the procedure of Chang et al. (2016) to the clr-images log ft −
ˆ
log ft dλ, this naive approach could lead to unacceptable bias if the densities are close to zero at the boundary of their support. Possibly, a better
approach is to estimate the log-densities directly. Methods for doing so include the maximum penalized likelihood method of Silverman (1982), the
spline-based method of O’Sullivan (1988) and the local likelihood method of
Loader (1996). However the clr-images are estimated, we assume that they
satisfy the following high level condition.
Assumption (T2). The estimated clr-images (f˜tE , t = 1, . . . , T ) satisfy
(i) sup1≤t≤T kf˜tE − f˜t kL2 (λ) = Op (1),
(ii) T −1
PT
t=1
kf˜tE − f˜t kL2 (λ) →p 0.
The testing procedure is based on FPCA of the empirical covariance operator
!
!
T
T
T
X
X
X
T
−1
E
−1
E
E
−1
E
Ṽ = T
f˜t − T
f˜t ⊗ f˜t − T
f˜t .
t=1
t=1
t=1
Let (ζiT , viT ), i ∈ N, be the eigenpairs of the empirical covariance operator
Ṽ T , where ζiT is assumed to be decreasing as i gets larger. Let PA be the
orthogonal projection on ran Ñ and define PC = idL2 (λ) −PA . Ṽ T can be
written as
T
T
T
T
Ṽ T = ṼAA
+ ṼAC
+ ṼCA
+ ṼCC
,
T
T
T
T
where ṼAA
= PA Ṽ T PA , ṼAC
= PA Ṽ T PC , ṼCA
= PC Ṽ T PA , and ṼCC
=
PC Ṽ T PC . Under Assumptions (T1) and (T2), it can be shown that
T
kB(L2 (λ)) = Op (T −1 ).
kT −1 Ṽ T − T −1 ṼAA
T
That is, the difference between T −1 Ṽ T and T −1 ṼAA
is a norm-vanishing opT
erator. Noting that the eigenfunctions of ṼAA are in A(f˜, L2 (λ)), it follows
that the eigenfunctions associated with the r leading eigenvalues are a consistent estimator of a spanning set of A(f˜, L2 (λ)). Formally, it can be shown
(Chang et al., 2016, Proposition 3.2 and Section 4) that
kP̂A − PA kL2 (λ) = Op (T −1 ),
23
(5.1)
where P̂A is the projection operator based on the eigenfunctions. An alternative formulation of (5.1) is
span(v1T , . . . , vrT ) →p A(f˜, L2 (λ)).
(5.2)
Needless to say, C(f˜, L2 (λ)) can be estimated as the orthogonal complement,
[span(v1T , . . . , vrT )]⊥ . These results show that if r is known, then it is easy to
estimate the attractor space, A(f˜, L2 (λ)), since the r leading eigenfunctions
of Ṽ T asymptotically span A(f˜, L2 (λ)).
In practice, the dimension of A(f˜, L2 (λ)) is typically unknown. To determine the dimension, we may consider testing the null hypothesis
2
˜
H0 : dim A(f , L (λ)) = R,
(5.3)
against the alternative
H1 : dim A(f˜, L2 (λ)) ≤ R − 1.
(5.4)
For some positive integer Rmax ≥ 1, successive tests of the null hypothesis
for R = Rmax , Rmax − 1, . . . , 1 can determine the dimension of A(f˜, L2 (λ)).
For example, if the null is rejected in favor of the alternative
for R > r, but
2
˜
not rejected for R = r , we can conclude that dim(A f , L (λ)) = r. A
feasible test statistic and its limiting distribution under the null hypothesis
are given by Chang et al. (2016). Let
*
+
*
+ !0
T
T
X
X
ẑt =
v T , f˜E − T −1
f˜E
, . . . , v T , f˜E − T −1
f˜E
1
t
t
t=1
R
H
t
t
t=1
H
for t =P
1, . . . , T , and define ẐT = (ẑ1 , . . . , ẑT )0 . Further let Q̂TR = ẐT0 ẐT and
Σ̂TR = |k|≤` w` (k)Γ̂(k), where Γ̂(k) is the sample autocovariance of ẑt and
w` (k) is a bounded weight function1 . The proposed test statistic is
τRT = T −2 ζmin (Q̂TR , Σ̂TR )
where ζmin (Q̂TR , Σ̂TR ) denotes the smallest generalized eigenvalue of Q̂TR with
respect to Σ̂TR .
1
See Chang et al. (2016) for further details. The truncation parameter ` may be chosen
as in Andrews (1991). In the empirical applications reported in Section 6 of this paper,
w` (·) is chosen to be the quadratic spectral kernel.
24
Proposition 5.1 (Theorem 4.3 in Chang et al., 2016). If Assumptions (T1)
and (T2) are satisfied then, under the null hypothesis H0 in (5.3), we have
Z
0
T
W R (r)W R (r) dr, IR ,
(5.5)
τR →d ζmin
R
where I is the R × R identity matrix, W R (r) = WR (r) − WR (s)ds, and WR
is an R × 1 vector of independent standard Brownian motions. On the other
hand, under the alternative hypothesis H1 in (5.4),
τRT →p 0.
R
That is, τRT converges in law to the smallest eigenvalue of W R (r)W R (r)0 dr
under the null hypothesis, and vanishes under the alternative. The critical
values can be easily obtained from a large number of simulated sample paths
of W R . The critical values are presented in Table 5.1.2
Table 5.1: Critical values of τRT
R
1%
5%
10%
1
2
3
4
5
6
7
0.0248 0.0163 0.0123 0.0100 0.0084 0.0073 0.0065
0.0365 0.0215 0.0156 0.0122 0.0101 0.0086 0.0075
0.0459 0.0254 0.0177 0.0136 0.0111 0.0094 0.0081
Remark 5.1. The case when f˜t is observable at each t may be easily dealt
with. Test statistics can be calculated based on true observations f˜ = (f˜t , t =
1, . . . , T ). The limit distribution is slightly different from (5.5); it is given by
Z
0
ζmin
WR (r)WR (r) dr, IR .
See Chang et al. (2016) for more details.
6
Empirical application
6.1
Example 1: Cross-sectional densities of earnings
In this section, we revisit the application of FPCA to cross-sectional densities of individual weekly earnings undertaken by Chang et al. (2016). The
2
The reported critical values for R = 1, . . . , 5 are taken from Table 1 in Chang et al.
(2016). The values for R = 6 and 7 are newly calculated for reference in the next section.
25
cross-sectional observations that are used to estimate densities are obtained
at monthly frequency from the Current Population Survey (CPS) database,
running from January 1990 to March 2017 (327 months in total). Since individual earnings in each month are reported in current dollars, I adjusted them
all to January 1990 prices.3 I excluded earnings below the 2.5th percentile
and above the 97.5th percentile since there are many near-zero4 earnings and
top-coded earnings in the raw dataset.5 Weekly earnings are censored from
above, with the threshold for censoring changing partway through the sample: the top-coded nominal earning is $1923 before January 1998, and $2885
afterward. This difference introduces significant heterogeneity; for example,
the support of the earnings distribution changes greatly after January 1998
since the number of observations contained in (1923, 2885) is always zero
before this month, but nonzero afterward. However, after dropping the top
2.5% of observations, the range of earnings is quite stable over time. Moreover, after dropping the bottom 2.5% of observations, all near-zero earnings
are excluded and the smallest earnings become reasonably sized. After applying this truncation, the number of observations for each month ranges
from 11760 to 15489. The last thing we need to notice is that the CPS individual earnings data are collected from a monthly survey of individuals, with
each individual assigned their own design weight. Therefore, any estimates
constructed from the dataset should take design weights into account. To
estimate log-densities, I used the local likelihood method of Loader (2006)
which can easily accommodate design weights. The procedure is described in
detail in the Appendix. Figure 6.2 shows the time series of density estimates
and their clr-images.
To investigate the dimension of the attractor space, I calculated the test
statistics described in the previous section. Figure 6.1 displays the test statistics for R = 1, . . . , 7 as well as a scree plot of the eigenvalues. From the scree
plot it is apparent that Rmax can be set to around 5. Referring back to Table
5.1, we see that R = 2 is rejected even at the 1% level, but R = 1 is not
rejected at the 5% level. We tentatively conclude that the dimension of the
2
attractor space is one. Viewed as a subspace of L (λ), the estimated attrac3
Monthly CPI data are obtained from the Federal Reserve Economic Data (FRED).
The dataset contains a lot of abnormal values of nominal earnings near zero. For
example, there are total 9188 observations corresponding to weekly earnings less than
$0.01 over the whole span.
5
This symmetrical trimming was considered in, for example, Autor et al. (2008) for
analysis of the CPS wage data.
4
26
tor space is the span of the leading eigenfunction v̂1 , displayed in Figure 6.1.
Alternatively, we may regard the attractor space to be the span of clr−1 (v̂1 ),
a subspace of B 2 (λ).
To describe the attractor space, I orthogonally projected the estimated
densities upon the estimated cointegrating space, obtaining the projected
series (fˆtC , t = 1, . . . , T ). I positively and negatively perturbed the sample
mean f¯TC of (fˆtC , t = 1, . . . , T ), called the stationary mean of f , in the direction associated with the leading eigenfunction clr−1 v̂1 . More specifically, the
positive perturbation is f¯TC ⊕ (ζ̂1 clr−1 (v̂1 )) and the negative perturbation
is f¯TC (ζ̂1 clr−1 (v̂1 )), where ζ̂1 is the eigenvalue associated with v̂1 . Figure
6.3 shows the results.
Figure 6.1: Test statistics — individual earnings
R
τRT
1
0.03638
2
0.01253
3
0.00908
4
0.00590
Scree plot of eigenvalues
6.2
5
0.00537
6
0.00506
7
0.00472
Leading eigenfunction
Example 2 : cross-sectional densities of wages
Now we consider cross-sectional densities of hourly wages. The cross-sectional
observations are obtained at monthly frequency from the CPS database, and
the span is the same as in the previous example. Wages are deflated using
CPI data and measured in January 1990 dollars. There are many near-zero
values and top-coded values in the raw data set, so I excluded earnings below
the 1.25th percentile and above the 98.75th percentile; unlike the earnings
27
Figure 6.2: Density estimates and clr-images - earnings
Time series of density estimates
Time series of clr-images
Figure 6.3: Description of the attractor - earnings
data set, the top-coded values are constant over time, so only a small truncation is required to get rid of abnormal or extreme values. The number
of observations for each month ranges from 7348 to 9584 after truncation.
Figure 6.5 shows the time series of density estimates and their clr-images.
Test statistics are calculated as before and reported in Figure 6.4 with
28
other graphs. From the scree plot, we may set Rmax to around 5. From
successive tests we conclude that the dimension of the attractor space is 1.6
Thus, the estimated attractor space, viewed as a subspace of L2 (λ), is the
span of the eigenfunction associated with the first leading eigenvalue. Viewed
as a subspace of B 2 (λ), it is the span of the clr−1 -image of this eigenfunction.
Figure 6.6 provides a visual impression of the attractor space, similar to
Figure 6.3 above. In this case I perturbed the stationary mean f¯TC in the
direction of clr−1 v̂1 by ±2ζ̂1 , so as to more clearly emphasize the difference
between the two perturbations.
7
Concluding remarks
In this paper we have investigated cointegrated linear processes with values
in a Bayes Hilbert space of densities. Autoregressive density-valued processes
were also studied and a version of the Granger-Johansen representation theorem is provided. We showed that the statistical methods developed by Chang
et al. (2016) can be used to estimate the attractor space associated with a
cointegrated linear process in a Bayes Hilbert space.
6
On the other hand, if we set Rmax equal to 6 (resp. 7) then our sequential testing
procedure indicates an attractor space dimension of 6 (resp. 7), which seems large.
Figure 6.4: Test statistics - wages
R
τRT
1
0.05174
2
0.01181
3
0.01081
4
0.01076
Scree plot of eigenvalues
5
0.00982
6
0.00977
7
0.00966
Leading eigenfunction
29
Figure 6.5: Density estimates and clr-images - wages
Time series of density estimates
Time series of clr-images
Figure 6.6: Description of the attractor - wages
30
References
Aitchison, J. (1982). The statistical analysis of compositional data. Journal
of the Royal Statistical Society. Series B (Methodological), 44(2):139–177.
Andrews, D. W. K. (1991). Heteroskedasticity and autocorrelation consistent
covariance matrix estimation. Econometrica, 59(3):817–858.
Autor, D. H., Katz, L. F., and Kearney, M. S. (2008). Trends in u.s. wage
inequality: Revising the revisionists. Review of Economics and Statistics,
90(2):300–323.
Beare, B. K. (2017). The Chang-Kim-Park model of cointegrated densityvalued time series cannot accommodate a stochastic trend. Econ Journal
Watch, 14(2):133 – 137.
Beare, B. K., Seo, J., and Seo, W.-K. (2017). Cointegrated linear processes
in hilbert space. Journal of Time Series Analysis, 38(6):1010–1027.
Beare, B. K. and Seo, W.-K. (2017). Representation of I(1) autoregressive
Hilbertian processes. ArXiv e-print, arXiv:1701.08149v1 [math.ST].
Bosq, D. (2000). Linear Processes in Function Spaces. Springer-Verlag New
York.
Bosq, D. (2007). General linear processes in Hilbert spaces and prediction.
Journal of Statistical Planning and Inference, 137(3):879 – 894. Special
Issue on Nonparametric Statistics and Related Topics: In honor of M.L.
Puri.
Chang, Y., Kim, C. S., and Park, J. Y. (2016). Nonstationarity in time series
of state densities. Journal of Econometrics, 192(1):152 – 167.
Conway, J. B. (1994). A Course in Functional Analysis. Springer.
Egozcue, J. J., Dı́az-Barrero, J. L., and Pawlowsky-Glahn, V. (2006). Hilbert
space of probability density functions based on Aitchison geometry. Acta
Mathematica Sinica, 22(4):1175–1182.
Granger, C. W. J. (1981). Some properties of time series data and their use
in econometric model specification. Journal of Econometrics, 16(1):121 –
130.
31
Horváth, L. and Kokoszka, P. (2012). Inference for Functional Data with
Applications. Springer-Verlag GmbH.
Howland, J. S. (1971). Simple poles of operator-valued functions. Journal of
Mathematical Analysis and Applications, 36(1):12 – 21.
Johansen, S. (1991). Estimation and hypothesis testing of cointegration vectors in Gaussian vector autoregressive models. Econometrica, 59(6):1551–
1580.
Johansen, S. (1996). Likelihood-Based Inference in Cointegrated Vector Autoregressive Models (Advanced Texts in Econometrics). Oxford University
Press.
Loader, C. R. (1996). Local likelihood density estimation. Annals of Statistics, 24(4):1602–1618.
Loader, C. R. (2006). Local Regression and Likelihood. Springer New York.
Markus, A. S. (2012). Introduction to the Spectral Theory of Polynomial
Operator Pencils (Translations of Mathematical Monographs). American
Mathematical Society.
O’Sullivan, F. (1988). Fast computation of fully automated log-density and
log-hazard estimators. SIAM Journal on Scientific and Statistical Computing, 9(2):363–379.
Petersen, A. and Müller, H.-G. (2016). Functional data analysis for density functions by transformation to a Hilbert space. Annals of Statistics,
44(1):183–218.
Silverman, B. W. (1982). On the estimation of a probability density function by the maximum penalized likelihood method. Annals of Statistics,
10(3):795–810.
van den Boogaart, K. G., Egozcue, J. J., and Pawlowsky-Glahn, V. (2014).
Bayes Hilbert spaces. Australian & New Zealand Journal of Statistics,
56(2):171–194.
32
8
8.1
Appendix
Useful lemmas
Lemma 8.1 (Theorem 1.4 in Howland (1971)). Let B(H) be the space of
bounded linear operators H → H for a separable complex Hilbert space H and
let A(z) = idH −C(z) where C(z) is an analytic family of compact operators.
If z0 ∈ σ(A) is an isolated element, there exist finite dimensional projections
Q1 , . . . , Qd such that
A(z) = (P1 + (z0 − z)Q1 ) · · · (Pd + (z0 − z)Qd )G(z),
where G(z) is analytic, G(z0 ) is invertible, and Pi = idH −Qi . We may
choose P1 to be any projection on ran A(z0 ).
Lemma 8.2. Under the conditions of Lemma 8.1,
(idH −P1 )A(1) (z0 )|ker A(z0 ) : ker A(z0 ) → ran(idH −P1 )
is invertible if and only if A(z)−1 has a simple pole at z = z0 .
Proof. From Corollary 3.5 in Howland (1971) A(z)−1 has a simple pole at
z = z0 if and only if (i) A(1) (z0 ) is injective on ker A(z0 ) and (ii) ran A(z0 ) ∩
A(1) (z0 ) ker A(z0 ) = {0}. Since A(z) = idH −C(z) and C(z) is a compact
family of operators, A(z) is an index-zero Fredholm family of operators. This
implies that dim(ker A(z0 )) = dim(ran(idH −P1 )). From this, one can easily
show that the invertibility of (idH −P1 )A(1) (z0 )|ker A(z0 ) is another equivalent
condition to (i) and (ii).
Lemma 8.3. Let d = 1 in Lemma 8.1. Then,
(a) G(z0 ) = A(z0 ) − (idH −P1 )A(1) (z0 ),
(b) ran G(z0 ) |ker A(z0 ) = ran(idH −P1 ),
Proof. We may easily deduce (b) from (a) and Lemma 8.2, so we only show
(a). We know that G(z) is holomorphic at z = z0 from Lemma 8.1, so
(1)
G(z) = G(z0 ) − G (z0 )(z0 − z) +
∞
X
G(j) (z0 )
j=2
33
j!
(z − z0 )j .
Therefore,
A(z) = [P1 + (idH −P1 )(z0 − z)][G(z0 ) − G(1) (z0 )(z0 − z) + H1 (z)],
(8.1)
where H1 (z) denotes the remainder of the Taylor series of G(z). Since A(z)
is holomorphic at z = z0 , we have
A(z) = A(z0 ) − A(1) (z0 )(z0 − z) + H2 (z),
(8.2)
where H2 (z) is the remainder of the Taylor series of A(z). Collecting terms
associated with the same powers from (8.1) and (8.2) we obtain
P1 G(z0 ) = A(z0 )
(8.3)
(idH −P1 )G(z0 ) = −A(1) (z0 ) + P1 G(1) (z0 ).
(8.4)
The left-hand side of the second equation is invariant under (idH −P1 ), implying that
(idH −P1 )G(z0 ) = −(idH −P1 )A(1) (z0 ).
(8.5)
Combining (8.3) and (8.5), we obtain (a).
8.2
Log-density estimation
In Section 6, the estimated log-density ĝt is obtained from the following
procedure. The reader is referred to Loader (1996, 2006) for more details.
Given
P survey responses X1 , . . . , Xn with design weights w1 , . . . , wn such
that i=1 wi = n, consider the weighted log-likelihood
Z
n
X
L(ft ) =
wi log(ft (Xi )) − n
ft (u)du − 1 .
i=1
Let K be the support of ft . Under some local smoothness assumptions, we
can consider a localized version of the log-likelihood and log ft (u) can be
locally approximated by a polynomial function, so follows.
Lp (ft )(x) =
n
X
i=1
wi W
Xi − x
h
Q(Xi − x; αt )
Z
−n
W
34
u−x
h
exp(Q(u − x; αt ))du (8.6)
where W is a suitable kernel function, h is a bandwidth which assumed to
be fixed, and Q(u; αt ) is polynomial in u with coefficients αt .
(1 − |u|3 )3 and Q(u; α) = α0,t + α1,t u. For fixed x ∈ K, let
I set W(u) = 70
81
(α̂0,t , α̂1,t ) be the maximizer of (8.6). Then the local likelihood log-density
estimate is given by
ĝt (x) = α̂0,t
The procedure is repeated for a fine grid of points, and then ĝt may be
obtained from an interpolation method described in (Loader, 2006, Chapter
12). Needless to say, the above estimation procedure depends on h, a fixed
−1/5
bandwidth parameter. Let bt := [qt (99) − qt (1)] nt
where qt (a) is the a-th
percentile of observations at time t and nt is the number of observations.
Within the range [0.75 bt , 1.25 bt ], bandwidth h is set to the minimizer of a
generalized BIC criterion.7
7
A generalized version of AIC as a diagnostic for the local likelihood method is given
in Loader (2006). A suitable generalization of BIC is obtained by changing the penalty
term in an obvious way.
35
| 10math.ST
|
arXiv:1108.4455v2 [math.AC] 8 Jul 2012
Local cohomology properties of direct summands
Luis Núñez-Betancourt
July 10, 2012
Abstract
In this article, we prove that if R → S is a homomorphism of
Noetherian rings that splits, then for every i ≥ 0 and ideal I ⊂ R,
i
AssR HIi (R) is finite when AssS HIS
(S) is finite. In addition, if S is a
Cohen-Macaulay ring that is finitely generated as an R-module, such
i
that all the Bass numbers of HIS
(S), as an S-module, are finite, then
i
all the Bass numbers of HI (R), as an R-module, are finite. Moreover, we show these results for a larger class a functors introduced by
Lyubeznik [6]. As a consequence, we exhibit a Gorenstein F -regular
UFD of positive characteristic that is not a direct summand, not even
a pure subring, of any regular ring.
1
Introduction
Throughout this article all rings are commutative Noetherian with unity.
Let R denote a ring. If M is an R-module and I ⊂ R is an ideal, we
denote the i-th local cohomology of M with support in I by HIi (M ). If I is
generated by the elements f1 , . . . , fℓ ∈ R, these cohomology groups can be
computed by the Čech complex,
0 → M → ⊕j Mfj → . . . → Mf1 ···fℓ → 0.
The structure of these modules has been widely studied by several authors. Among the results obtained, one encounters the following finiteness
properties for certain regular rings:
(1)
the set of associated primes of HIi (R) is finite;
(2)
the Bass numbers of HIi (R) are finite;
(3)
inj.dimHIi (R) ≤ dimSuppHIi (R).
1
Huneke and Sharp proved those properties for characteristic p > 0 [4].
Lyubeznik showed them for regular local rings of equal characteristic zero
and finitely generated regular algebras over a field of characteristic zero [6].
These properties have been proved for a larger family of functors introduced by Lyubeznik [6]. If Z ⊂ Spec(R) is a closed subset and M is an
R-module, we denote by HZi (R) the i-th local cohomology module of M
with support in Z. We notice that HZi (R) = HIi (R), where Z = V(I) =
{P ∈ Spec(R) : I ⊂ P }. For two closed subsets of Spec(R), Z1 ⊂ Z2 , there
is a long exact sequence of functors
. . . → HZi 1 → HZi 2 → HZi 1 /Z2 → . . .
(1)
We denote by T any functor of the form T = T1 ◦· · · ◦Tt , where every functor
Tj is either HZi for some closed subset Z of Spec(R) or the kernel, image
or cokernel of some morphism in the previous long exact sequence for some
closed subsets Z1 , Z2 of Spec(R).
Our aim in this manuscript is to prove the finiteness properties (1) and
(2) for direct summands. We need to make some observations before we
are able to state our theorems precisely. Let R → S be a homomorphism
of Noetherian rings. For an ideal I ⊂ R, we have two functors associated
i (−) : S-mod → S-mod, which
with it, HIi (−) : R-mod → R-mod and HIS
are naturally isomorphic when we restrict them to S-modules. Moreover,
for two ideals of R, I2 ⊂ I1 , the natural morphism HIi1 (−) → HIi2 (−) is the
same as the natural morphism HIi1 S (−) → HIi2 S (−) when we restrict the
functors to S-modules. Thus, their kernel, cokernel and image are naturally
isomorphic as S-modules. Hence, every functor T for R is a functor of the
same type for S when we restrict it to S-modules.
As per the previous discussion, for an S-module, M , we will make no
distinction in the notation or meaning of T(M ) whether it is induced by
ideals of R or their extensions to S and, therefore, by the corresponding
closed subsets of their respective spectra. Now, we are ready to state our
main results.
Theorem 1.1. Let R → S be a homomorphism of Noetherian rings that
splits. Suppose that AssS T(S) is finite for a functor T induced by extension
of ideals of R. Then, AssR T(R) is finite. In particular, AssR HIi (R) is finite
i (S) is finite.
for every ideal I ⊂ R, if AssS HIS
Theorem 1.2. Let R → S be a homomorphism of Noetherian rings that
splits. Suppose that S is a Cohen-Macaulay ring such that all the Bass
numbers of T(S), as an S-module, are finite for a functor T induced by
2
extension of ideals of R. If S is a finitely generated R-module, then all the
Bass numbers of T(R), as an R-module, are finite. In particular, for every
ideal I ⊂ R the Bass numbers of HIi (R) are finite, if the Bass numbers of
i (S) are finite.
HIS
The first theorem holds when S is a polynomial ring over a field and R
is the invariant ring of an action of a linearly reductive group over S. It also
holds when R ⊂ K[x1 , . . . , xn ] is an integrally closed ring that is finitely
generated as a K-algebra by monomials. This is because such a ring is a
direct summand of a possibly different polynomial ring (cf. Proposition 1
and Lemma 1 in [2]).
We would like to mention another case in which an inclusion splits. This
is when R → S is a module finite extension of rings containing a field
of characteristic zero such that S has finite projective dimension as an Rmodule. Moreover, such a splitting exists when Koh’s conjecture holds (cf.
[5, 9, 1]). Therefore, if Koh’s conjecture applies to R → S and T(S) has
finite associated primes or finite Bass numbers, so does T(R).
We point out that property (3) does not hold for direct summands
of regular rings, even in the finite extension case. A counterexample is
R = K[x3 , x2 y, xy 2 , y 3 ] ⊂ S = K[x, y], where S is the polynomial ring
in two variables with coefficients in a field K. The splitting of the inclusion is the map θ : S → R defined in the monomials by θ(xα y β ) = xα y β
if α + β ∈ 3Z and as zero otherwise. We have that the dimension of
2
Supp(H(x
3 ,x2 y,xy 2 ,y 3 ) (R)) is zero, but it is not an injective module, because
R is not a Gorenstein ring, since R/(x3 , y 3 )R has a two dimensional socle.
The manuscript is organized as follows. In section 2, we prove Theorem
1.1, and we show some consequences. In particular, we exhibit a Gorenstein
F -regular UFD of positive characteristic that is not a direct summand, not
even a pure subring, of any regular ring. In section 3, we give a proof for
Theorem 1.2.
2
Associated Primes
Lemma 2.1. Let R → S be an injective homomorphism of Noetherian rings,
and let M be an S-module. Then, AssR M ⊂ {Q ∩ R : Q ∈ AssS M }.
Proof. Let P ∈ AssR M and u ∈ M be such that AnnR u = P . We have that
(AnnS u) ∩ R = P . Let Q1 , . . . , Qt denote the minimal primes of AnnS u. We
obtain that
p
√
P = P = AnnS u ∩ R = (∩j Qj ) ∩ R = ∩j (Qj ∩ R),
3
so, there exists a Qj such that P = Qj ∩ R. Since Qj is a minimal prime for
AnnS u, we have that Qj ∈ AssS M and the result follows.
Definition 2.1. We say that a homomorphism of Noetherian rings R → S
is pure if M = M ⊗R R → M ⊗R S is injective for every R-module M. We
also say that R is a pure subring of S.
Proposition 2.1 (Cor. 6.6 in [3]). Suppose that R → S is a pure homeomorphism of Noetherian rings and that G is a complex of R-modules. Then,
the induced map j : H i (G) → H i (G ⊗R S) is injective.
Proposition 2.2. Let R → S be a pure homomorphism of Noetherian rings.
Suppose that AssS HIi (R) is finite for some ideal I ⊂ R and i ≥ 0. Then,
i (S) is finite.
AssS HIS
i (S) is injective by Proposition 2.1, Ass H i (R) ⊂
Proof. Since HIi (R) → HIS
R I
i
AssR HIS (S) and the result follows by Lemma 2.1.
Proof of Theorem 1.1. The splitting between R and S makes T(R) into a direct summand of T(S); in particular, T(R) ⊂ T(S). Therefore, AssR T(R) ⊂
AssR T(S) and the result follows by Lemma 2.1.
If R is a ring containing a field of characteristic p > 0, Theorem 1.1 gives
a method for showing that R is not a direct summand of a regular ring. We
used this method to prove that there exists a Gorenstein strongly F -regular
UFD of characteristic p > 0 that is not a direct summand of any regular
ring.
Theorem 2.1 (Thm. 5.4 in [8]). Let K be a field, and consider the hypersurface
K[r, s, t, u, v, w, x, y, z]
R=
.
(su2 x2 + sv 2 y 2 + tuxvy + rw2 z 2 )
Then, R is a unique factorization domain for which the local cohomology
3
module H(x,y,z)
(R) has infinitely many associated prime ideals. This is preserved if R is replaced by the localization at its homogeneous maximal ideal.
The hypersurface R has rational singularities if K has characteristic zero,
and it is F -regular if K has positive characteristic.
Corollary 2.1. Let R be as in the previous theorem taking K of positive
characteristic. Then, R is a Gorenstein F -regular UFD that is not a pure
subring of any regular ring. In particular, R is not direct summand of any
regular ring.
4
3
Proof. Since H(x,y,z)
(R) has infinitely many associated prime ideals, it cannot be a direct summand or pure subring of a regular ring by Theorem 1.1,
Proposition 2.1 and finiteness properties of regular rings of positive characteristic (cf. [7]).
Theorem 2.2 (Thm. 1 in [10]). Assume that S = K[x1 , . . . , xn ] is a polynomial ring in n variables over a field K of characteristic
p > 0. SupP
pose that I = (fP
,
.
.
.
,
f
)
is
an
ideal
of
S
such
that
deg
f
1
s
i < n. Then
i
i
dim S/Q ≥ n − i deg fi for all Q ∈ AssS HI (S).
Corollary 2.2. Let S = K[x1 , . . . , xn ] be a polynomial ring in n variables
over a field K of characteristic p > 0. Let R → S be a homomorphism of
NoetherianPrings that splits. Suppose that I = (f1 , . . . , fs ) is an ideal of R
such that i deg(fi )P
< dimR. If S is a finitely generated R-module, then
dim R/P ≥ dim R − i deg fi for all P ∈ AssR HIi (R).
Proof. Since HIi (−) commutes with direct sum of R-modules, we have that
a splitting of R ֒→ S over R induces an splitting of HIi (R) ֒→ HIi (S) over
R. Then, by Lemma 2.1, for any P ∈ AssR HIi (R) ⊂ AssR HIi (S) there exists
Q ∈PAssR HIi (S) such that P = Q ∩ R and then dimR/P = dimS/Q >
n − i deg fi , and the result follows.
3
Bass Numbers
Lemma 3.1. Let (R, m, K) be a local ring and M be an R-module. Then,
the following are equivalent:
a) dimK (ExtjR (K, M )) is finite for all j ≥ 0;
b) length(ExtjR (N, M )) is finite for every finite length module N for all
j ≥ 0;
c) there exists one module N of finite length such that length(ExtjR (N, M ))
is finite for all j ≥ 0.
Proof. a) ⇒ b): Our proof will be by induction on h = length(N ). If h = 1,
then N = K, and the proof follows from our assumption. We will assume
that the statement is true for h and prove it when length(N ) = h + 1. In
this case, there is a short exact sequence 0 → K → N → N ′ → 0, where N ′
has length h. From the induced long exact sequence
j−1
. . . → ExtR
(N ′ , M ) → ExtjR (K, M ) → ExtjR (N, M ) → . . . ,
5
we see that length(ExtiR (N, M )) is finite for all i ≥ 0.
b) ⇒ c): Clear.
c) ⇒ a): We will prove the contrapositive. Let j be the minimum nonnegative integer such that dimK (ExtjR (K, M )) is infinite. We claim that
length(ExtiR (N, M )) < ∞ for i < j and length(ExtjR (N, M )) = ∞ for any
module N of finite length. Our proof will be by induction on h = length(N ).
If h = 1, then N = K and it follows from our choice of j. We will assume
that this is true for h and prove it when length(N ) = h + 1. We have a short
exact sequence 0 → K → N → N ′ → 0, where N ′ has length h. From the
induced long exact sequence
j−1
. . . → ExtR
(N ′ , M ) → ExtjR (K, M ) → ExtjR (N, M ) → . . . ,
we have that length(ExtiR (N, M )) < ∞ for i < j and that the map
j−1
ExtjR (K, M )/Im(ExtR
(N ′ , M )) → ExtjR (N, M ) is injective. Therefore,
length(ExtjR (N, M )) = ∞.
Lemma 3.2. Let R → S be a pure homomorphism of Noetherian rings.
Assume that S is a Cohen-Macaulay ring. If S is finitely generated as an
R-module, then R is a Cohen-Macaulay ring.
Proof. Let P ⊂ R be a prime ideal. Let x = x1 , . . . , xd denote a system of parameters of RP , where d = dim(RP ). It suffices to show that
Hi (K(x; RP )) = 0 for i 6= 0, where K is the Koszul complex with respect
to x. We notice that the natural inclusion RP → SP is a pure homeomorphism of rings. This induces an injective morphism of R-modules
Hi (K(x; RP )) → Hi (K(x; SP )) by Proposition 2.1. Thus, it is enough to
show that Hi (K(x; SP )) = 0 for i 6= 0. Since SP is a module finite extension
of RP , we have that every maximal ideal Q ⊂ SP contracts to P RP and x is
a system of parameters for SQ . Then, Hi (K(x; SQ )) = 0 for i 6= 0 and every
maximal ideal Q ⊂ SP . Hence, Hi (K(x; SP )) = 0 for i 6= 0 and the result
follows.
Proposition 3.1. Let R → S be a homomorphism of Noetherian rings that
splits. Assume that S is a Cohen-Macaulay ring and S is finitely generated
as an R-module. Let N be an R-module and M be an S-module. Let N → M
be a morphism of R-modules that splits. If all the Bass numbers of M , as
an S-module, are finite, then all the Bass numbers of N , as an R-module,
are finite.
6
Proof. Since N ֒→ M splits, we have that ExtiRP (RP /P RP , NP ) is a direct
summand of ExtiRP (RP /P RP , MP ), so, we may assume that N = M .
Let P be a fixed prime ideal of R and let KP denote RP /P RP . Since
we want to show that dimKP (ExtiRP (KP , MP )) is finite, we may assume
without loss of generality that R is local and P is its maximal ideal. Let
x = x1 , . . . , xn be a system of parameters for R. Since R is Cohen-Macaulay
by Lemma 3.2, we have that the Koszul complex, KR (x), is a free resolution for R/I, where I = (x1 , . . . , xn ). We also have that for every maximal ideal Q ⊂ S lying over P , x is a system of parameters of SQ because dimR = dimSQ and SQ /ISQ is a zero dimensional ring. From the
Cohen-Macaulayness of S and the previous fact, we have that the Koszul
complex KS (x) is a free resolution for S/IS. Therefore, ExtiR (R/I, M ) =
H i (HomR (KR (x), M )) = H i (HomS (KS (x), M )) = ExtiS (S/IS, M ). Since
ExtiS (S/IS, M ) = ⊕Q ExtiSQ (SQ /ISQ , MQ ) has finite length as an S-module
by Lemma 3.1, we have that ExtiR (R/I, M ) has finite length as an R-module
because S is finitely generated. Then, we have that dimKP (ExtiR (KP , M ))
is finite by Lemma 3.1.
Proof of Theorem 1.2. The splitting between R and S induces a splitting
between T(R) ֒→ T(S). The rest follows from Proposition 3.1.
Acknowledgments
I would like to thank my advisor Mel Hochster for his valuable comments
and suggestions. I also wish to thank Juan Felipe Perez-Vallejo for carefully
reading this manuscript. I am grateful to the referee for her or his comments.
Thanks are also due to the National Council of Science and Technology of
Mexico by its support through grant 210916.
References
[1] R. Flórez, J.D. Vélez, Failure of splitting from module-finite extension rings. Beitrage Algebra Geom. 41 (2000), no. 2, 345-357.
[2] M. Hochster, Rings of invariants of tori, Cohen-Macaulay rings
generated by monomials, and polytopes, Ann. of Math. (2) 96
(1972), 318337.
7
[3] M. Hochster, J.L. Roberts, Rings of invariants of reductive groups
acting on regular rings are Cohen-Macaulay, Advances in Mathematics 13, 115–175 (1974).
[4] C. Huneke, R. Sharp, Bass numbers of local cohomology modules,
Transactions of the American Mathematical Society, Vol. 339, No.
2, October 1993), pp. 765–779.
[5] J. H. Koh, The direct summand conjecture and behavior of codimension in graded extensions, Thesis, University of Michigan,
1983.
[6] G. Lyubeznik, Finiteness properties of local cohomology modules
(an application of D-modules to commutative algebra), Invent.
Math. 113 (1993), no. 1, 41–55.
[7] G. Lyubeznik, F -modules: applications to local cohomology and
D-modules in characteristic p > 0, J. Reine Angew. Math. 491
(1997), 65–130.
[8] A. Singh, I. Swanson, Associated primes of local cohomology modules and of Frobenius powers, Int. Math. Res. Not. 2004, no. 33,
1703–1733.
[9] J.D. Vélez, Splitting results in module-finite extension rings and
Koh’s conjecture, J. Algebra 172 (1995), no. 2, 454-469.
[10] Y. Zhang, A property of local cohomology modules over polynomial
rings, Proc. Amer. Math. Soc. 139 (2011), 125–128.
Department of Mathematics, University of Michigan, Ann Arbor, MI 48109–1043, USA.
Email address: [email protected]
8
| 0math.AC
|
Answerer in Questioner’s Mind for Goal-Oriented Visual Dialogue
Sang-Woo Lee Yu-Jung Heo Byoung-Tak Zhang
arXiv:1802.03881v1 [cs.CV] 12 Feb 2018
Abstract
Goal-oriented dialogue has been paid attention
for its numerous applications in artificial intelligence. To solve this task, deep learning and reinforcement learning have recently been applied.
However, these approaches struggle to find a competent recurrent neural questioner, owing to the
complexity of learning a series of sentences. Motivated by theory of mind, we propose “Answerer in
Questioner’s Mind” (AQM), a novel algorithm for
goal-oriented dialogue. With AQM, a questioner
asks and infers based on an approximated probabilistic model of the answerer. The questioner
figures out the answerer’s intent via selecting a
plausible question by explicitly calculating the
information gain of the candidate intentions and
possible answers to each question. We test our
framework on two goal-oriented visual dialogue
tasks: “MNIST Counting Dialog” and “GuessWhat?!.” In our experiments, AQM outperforms
comparative algorithms and makes human-like dialogue. We further use AQM as a tool for analyzing the mechanism of deep reinforcement learning
approach and discuss the future direction of practical goal-oriented neural dialogue systems.
1. Introduction
Goal-oriented dialogue is a classical artificial intelligence
problem including digital personal assistants, order-byphone tools, and online customer service centers. Goaloriented dialogue occurs when a questioner asks an actionoriented question and an answerer responds with the intent
of letting the questioner know a correct action to take. Significant research on goal-oriented dialogue has tackled this
problem (Lemon et al., 2006; Williams & Young, 2007),
though a good solution has not yet been provided (Bordes
& Weston, 2017).
Motivated by the achievement of neural chit-chat dialogue
School of Computer Science and Engineering, Seoul National University. Correspondence to: Byoung-Tak Zhang
<[email protected]>.
Copyright 2018 by the authors.
Figure 1. Illustration of an AQM algorithm for goal-oriented visual
dialogue. AQM makes a decision tree on the image for asking
efficient questions.
research (Vinyals & Le, 2015), recent studies on goaloriented dialogues have utilized deep learning, using massive data to train their neural networks in for self-play
environments. Many researchers attempted to solve goaloriented dialogue tasks by using deep supervised learning
(deep SL) approach (Wen et al., 2016) based on seq2seq
models (Cho et al., 2014) or deep reinforcement learning
(deep RL) approach utilizing rewards obtained from the result of the dialogue (Zhao & Eskenazi, 2016; Li et al., 2017).
However, these methods struggle to find a correct RNN
model that uses back-propagation, owing to the complexity
of learning a series of sentences. These algorithms tend to
generate redundant sentences, making generated dialogues
inefficient (Kim et al., 2017; Das et al., 2017b).
Our idea to deal with goal-oriented dialogue is to introduce
opponent modeling. In this approach, an agent considers
what the opponent will respond by using an explicit approximated model of the opponent. Our study is motivated by
theory of mind, the ability to attribute mental states to others and to understand how our mental states are different
(Premack & Woodruff, 1978). If one wishes to efficiently
convey information to an opponent, it is best to converse in
a way that maximizes the opponent’s understanding (Bruner,
1981). For our method, we consider the mind to be beyond
a part of mental states (e.g., belief, intent, knowledge). The
Answerer in Questioner’s Mind for Goal-Oriented Visual Dialogue
mind is the probabilistic distribution of the opponent model
itself.
We propose an “Answerer in Questioner’s Mind’’ (AQM)
algorithm to allow an agent to ask appropriate consecutive questions during goal-oriented dialogue (Figure 1).
AQM’s questioner explicitly possesses an approximated
model of the answerer. The questioner utilizes the approximated model to calculate the information gain of the candidate answerer’s intentions and answers for each question. In
the experiment, AQM’s question generator extracts proper
questions from training data, not really generates.
We test AQM mainly on goal-oriented visual dialogue tasks.
There have been several kinds of visual-language tasks including image captioning (Vinyals et al., 2015) and visual
question answering (VQA) (Antol et al., 2015; Mao et al.,
2016), and recent research goes further to propose multiturn visual dialogue tasks (Kim et al., 2017). Our main
experiment is conducted on “GuessWhat?!”, a cooperative
two-player guessing game on the image (Figure 2). AQM
achieves an accuracy of 63.63% in 3 turns and 78.72% in 10
turns, outperforming deep SL (46.8% in 4.1 turns) (de Vries
et al., 2017) and deep RL (52.3% in 5 turns) (Strub et al.,
2017) algorithms. Though we demonstrate the performance
of our models in visual dialogue tasks, our approach can
be directly applied to general goal-oriented dialogue where
there is a non-visual context.
In the discussion section, aside from the experimental success of AQM, we leverage AQM as a tool for analyzing
deep RL approach on goal-oriented dialogue tasks from the
perspective of theory of mind. According to our argument,
training two agents to make plausible dialogues via rewards
during self-play is not adaptable to a service scenario. To enable an agent to converse with a human, the opponent agent
in self-play should model a human as much as possible. We
prove that AQM and RL have a similar objective function,
and that the objective function of RL can be replaced by a
direct objective function for each question, instead of reward
assigned at the end of dialogue. Through these series of arguments, we discuss future directions for building practical
goal-oriented dialogue systems.
2. Previous Works
2.1. Theory of Mind Approach
In this section, we introduce a series of studies considering
opponent’s uncertainty or the opponent model itself explicitly. We refer to these methods as theory of mind approach.
Opponent Modeling Studies on opponent modeling have
treated simple games with a multi-agent environment where
an agent competed with the other (Hernandez-Leal &
Kaisers, 2017; Foerster et al., 2017). In the study of Fo-
Figure 2. An example of the GuessWhat?! game. A green mask
highlights the correct object.
erster et al., the agent has the model of the opponent and
updates it assuming the opponent will be updated by gradient descent with RL. They argued modeling opponent could
be applied to track the non-stationary behavior of an opponent agent. Their model outperformed classical RL methods
in simple games, such as tic-tac-toe and rock-paper-scissors.
On the other hand, AQM applied opponent modeling to a
cooperative multi-agent setting. We believe that opponent
modeling can also be applied to dialogue systems in which
agents are partially cooperative and partially competitive.
Obverter A recent study applied the obverter technique
(Batali, 1998), motivated by theory of mind, to an imagedescription-match classification task to study language emergence (Choi et al., 2018). In the experiments of Choi et al.,
one agent transmitted one sentence for describing artificial
images to the opponent agent. In their study, the obverter
technique can be understood as that an agent play both questioner and answerer, maximizing the consistency between
visual and language modules. Their experimental results
showed that their obverter technique generated a word corresponding to a specific object (e.g. ‘bbbbbbb{b,d}’ for a blue
box). They argued their method could be an alternative to
RL-based language emergence systems. Compared to their
model, however, AQM uses real images, creates multi-turn
dialogue, and can be used for general goal-oriented dialogue
tasks.
Information Gain AQM’s question-generator optimizes
information gain using an approximated opponent model.
However, the concept of utilizing information gain in a dialogue task is not new for a classical rule-based approach.
Polifroni and Walker used information gain to build a dialogue system for restaurant recommendations (Polifroni &
Walker, 2006). They made a decision tree using information gain and asked a series of informative questions about
restaurant preferences. Rothe et al. applied a similar method
to generate questions on a simple Battleship game experiment (Rothe et al., 2017). It is noticeable that they used
pre-defined logic to generate questions with information
gain criteria to make novel (i.e., not shown in the training
dataset) and human-like questions. Unlike these previous
studies, AQM makes a new decision tree for every new context (see the decision tree in Figure 1). AQM also considers
Answerer in Questioner’s Mind for Goal-Oriented Visual Dialogue
uncertainty by using a multi-modal deep learning module,
and does not require hand-made or domain-specific rules.
Theory of AI’s Mind Chandrasekaran et al. argued that
human-machine collaboration could be improved when humans understand the properties of behavior (e.g., strengths,
weakness, or quirks) of the opponent machine (Chandrasekaran et al., 2017). They referred to this kind of human
understanding as “theory of AI’s mind.’’ In their human
experiment on visual question answering, a team consisting
of a human-questioner and a machine-answerer performed
better when the human knew whether the opponent could
answer correctly.
2.2. Visually Grounded Dialogue Task
GuessWhat?! GuessWhat?! is a cooperative two-player
guessing game proposed by De Vries et al. (Figure 2)
(de Vries et al., 2017). GuessWhat?! has received attention in the field of deep learning and artificial intelligence
as a testbed for research on the interplay of computer vision and dialogue systems. The goal is to locate a hidden
object in a rich image scene by asking a sequence of questions. One participant, called “Oracle,” or “Answerer” in
our paper, is randomly assigned an object in the image. The
other participant, “Questioner,” guesses the object assigned
to the answerer. The questioner asks a series of questions,
for which the answerer responds as “yes,” “no,” and “n/a.”
When the questioner decides to guess the correct object, a
list of candidate objects is then revealed. A win occurs when
the questioner picks the correct object. The GuessWhat?!
dataset contains 66,537 MSCOCO images (Lin et al., 2014),
155,280 games, and 831,889 question-answer pairs.
Visual Dialog In Visual Dialog (Das et al., 2017a), two
agents also communicate with questioning and answering
about the given MSCOCO image. Unlike GuessWhat?!, an
answer can be a sentence and there is no restriction for the
Visual Dialogue answerer. Das et al. used this dataset to
make a goal-oriented dialogue task, where the questioner
guesses a target image from 9,627 candidates in the test
dataset (Das et al., 2017b). The dataset includes a true caption of each image achieving percentile ranks around 90%.
In their self-play experiments, adding information via a dialogue improved the percentile ranks to around 93%, where
the questioner and answerer were trained with deep SL and
deep RL methods. This means that the models predict the
correct image to be more exact than 93% of the rest images
in the test dataset.
3. Answerer in Questioner’s Mind (AQM)
Preliminary In our experimental setting, two machine players, a questioner and an answerer, communicate via natural
dialogue. Specifically, there exists a class c, which is an
Algorithm 1 AQM’s Question-Generator
p̂(c) ∼ p̂0 (c)-model
p̃(at |c, qt , a1:t−1 , q1:t−1 ) ∼ p̃(a|c, q)-model
Q ← Q-sampler
for t = 1:T do
˜ At ; qt , a1:t−1 , q1:t−1 ] in Eq. 2
qt ← argmaxqt ∈Q I[C,
Get at from the answerer
Update p̂(c|a1:t , q1:t ) ∝ p̃(at |c; qt , a1:t−1 , q1:t−1 ) ·
p̂(c|a1:t−1 , q1:t−1 )
end for
answerer’s intention or a goal-action, the questioner should
perform. The answerer knows the class c, whereas the questioner does not. The goal of the dialogue for the questioner
is to find the correct class c by asking a series of questions
to the answerer. The answerer responds the correct answer
to given question.
We treat C, Qt , and At as random variables of class, t-th
question, and t-th answer, respectively. c, qt , and at becomes
their single instance. In a restaurant scenario example, qt
can be “Would you like to order?” or “What can I do for
you?” at can be “Two coffees, please.” or “What’s the password for Wi-Fi?” c can then be “Receive the order of two
hot Americanos.” or “Let the customer know the Wi-Fi
password.”
AQM’s claim In our problem setting, the answerer requires
one module, an answer-generator, and the questioner needs
two modules, a question-generator and a guesser. The objective function of three modules is as follows.
Answer-generator: argmaxat p(at |c, qt , a1:t−1 , q1:t−1 )
Guesser: argmaxc p(c|a1:t , q1:t )
Question-generator: argmaxqt I[C, At ; qt , a1:t−1 , q1:t−1 ]
I is information gain or mutual information of the class
C and the current answer At , where the previous history
(a1:t−1 , q1:t−1 ) and a current question qt are given (See
Equation 2). Note that maximizing information gain can be
understood as minimizing the conditional entropy of class
C, given a current answer At .
Answer-generator
For the answerer’s answergenerator module, a neural network is trained by
minimizing cross-entropy over the answer distribution
p(at |c, qt , a1:t−1 , q1:t−1 ), like the deep SL approach. On
the other hand, the questioner’s question-generator and
guesser module possess the approximated answer distribution p̃(at |c, qt , a1:t−1 , q1:t−1 ), or simply the likelihood p̃.
The likelihood p̃ can be obtained by learning training data
as does in the answer-generator, or by distilling from an
answer-generator module directly (Hinton et al., 2015). If
Answerer in Questioner’s Mind for Goal-Oriented Visual Dialogue
Figure 3. Illustration of the AQM question-generator module.
at is a sentence, as in Visual Dialog (Das et al., 2017b), the
probability is extracted from the multiplication of the word
probability of RNN.
Guesser For the questioner’s guesser module, the posterior
of class c, p̂(c), is calculated based on the history (a1:t , q1:t ),
the likelihood p, and the prior of class c, p̂0 (c).
p̂(c|a1:t , q1:t ) ∝ p̂0 (c)
t
Y
p̃(aj |c, qj , a1:j−1 , q1:j−1 ) (1)
j
We use a term of likelihood as p̃, prior as p̂0 , and posterior as p̂ from the perspective that the questioner classifies class c. When the answerer’s answer distribution
p(at |c, qt , a1:t−1 , q1:t−1 ) is fixed, the questioner achieves
an ideal performance when the likelihood p̃ is the same as
p(at |c, qt , a1:t−1 , q1:t−1 ).
Question-generator AQM’s question-generator module selects qt∗ , which has a maximum information gain
˜ At ; qt , a1:t−1 , q1:t−1 ], or simply I.
˜ To calculate inforI[C,
˜
mation gain I, the question-generator module uses the likelihood p̃ and the posterior p̂.
& Fergus, 2014). AQM is explainable because it is clear
how a question is selected. Asking a series of questions
in AQM corresponds to constructing an efficient decision
tree classifier. We further introduce two properties of AQM
related to explainability.
AQM’s Property 1. The performance of AQM’s questioner is optimal, where the likelihood p̃ is equivalent to the
answering distribution of the opponent p. For the guesser
module, the performance of the guesser with the posterior
p̂ is optimal when p̃ is p. The performance of questiongenerator also increases as the p̃ becomes more similar to
the opponent, when the p̂ is fixed.
AQM’s Property 2. The contexts of history questioner
requires are the posterior p̂ and the history itself (a1:t , q1:t )
used as input for the likelihood p̃. In comparative deep learning methods, hidden neurons in RNN are expected to track
the context of history; though it has not been known yet
what kinds of information should be tracked. If the question
to be asked is independent from the previous questions, the
only context AQM should track is the posterior p̂. In this
case, the posterior p̂ in the yellow box of Figure 3 corresponds to the hidden vector of the RNN in the comparative
dialogue studies.
4. Experiments
˜ At ; qt , a1:t−1 , q1:t−1 ]
qt∗ = argmax I[C,
qt ∈Q
= argmax
qt ∈Q
XX
at
p̂(c|a1:t−1 , q1:t−1 )·
c
p̃(at |c, qt , a1:t−1 , q1:t−1 )
p̃0 (at |qt , a1:t−1 , q1:t−1 )
(2)
P
0
where p̃ (at |qt , a1:t−1 , q1:t−1 ) =
c p̂(c|a1:t−1 , q1:t−1 ) ·
p̃(at |c, qt , a1:t−1 , q1:t−1 ). Q is the set of the candidate questions.
p̃(at |c, qt , a1:t−1 , q1:t−1 ) ln
Algorithm 1 and Figure 3 explain the question-generator
module procedure. The question-generator requires the p̂0 model for the prior, the p̃(a|c, q)-model for the likelihood,
and the Q-sampler for the set of candidate questions.
Explainable AQM Explainable machine learning has recently received much attention (Ribeiro et al., 2016; Zeiler
4.1. MNIST Counting Dialog
To clearly explain the mechanism of AQM, we introduce
an MNIST Counting Dialog task, which is a toy goaloriented visual dialogue problem, illustrated in Figure 4.
This task utilizes the concept of the MNIST Dialog dataset
suggested by Seo et al. (Seo et al., 2017). Like MNIST
Dialog, each image in MNIST Counting Dialog contains
16 digits, each having four randomly assigned properties:
color = {red, blue, green, purple, brown}, bgcolor = {cyan,
yellow, white, silver, salmon}, number = {0, 1, · · · , 9}, and
style = {flat,stroke}. Unlike MNIST Dialog, MNIST Counting Dialog only asks counting questions. This type does not
require the information of previous questions and answers.
The goal of the MNIST Counting Dialog task is to inform
the questioner to pick the correct image among 10K candidate images via questioning and answering. In other words,
Answerer in Questioner’s Mind for Goal-Oriented Visual Dialogue
Figure 4. Illustration of MNIST Counting Dialog, a simplified version of MNIST Dialog (Seo et al., 2017).
class c is an index of the true target image (1 ∼ 10,000).
In the example of Figure 4, asking about the number of 1
digits or 6 digits classifies a target image perfectly if the
recognition accuracy on each digit in the image is 100%.
Asking about the number of 0 digits does not help classify,
because all images have one zero. If recognition accuracy
is less than 100%, asking about the number of 1 digits is
better than asking about the number of 6 digits, because the
variance of the number of 1 digits is larger than that of the 6
digits.
For the MNIST Counting Dialog task, we do not use neural
networks for modeling the questioner or answerer. The questioner’s answering model is count-based for each property
value and is trained for 30K training data. To add randomness or uncertainty to this task, we set the ratio of recognition accuracy of each property to that of the answerer. If the
recognition accuracy on the digit decreases, the answering
accuracy on the image is decreased much. If the recognition
accuracy of color is 85%, the answering accuracy is 46.6%,
on average. 22 questions about red to stroke are used for the
candidate questions.
Figure 5 shows that AQM nearly always chooses the true target image from 10K candidates in six turns if the recognition
accuracy is 100%. However, AQM also chooses correctly
with a probability of 51%, 39%, and 31% (test accuracy)
in six turns, when the recognition accuracy (Acc in the legend) is 95%, 90%, 85%, respectively. “Random” denotes a
questioner with a random question-generator module and
the AQM’s guesser module.
4.2. GuessWhat?!
p̂0 (c)-model for the Prior The questioner does not know
the list of candidate objects while asking questions. This
makes the GuessWhat?! task difficult, although the number
of candidates is around 8. We use YOLO9000, a real-time
object detection algorithm, to estimate the set of candidate
objects (Redmon & Farhadi, 2016). The prior p̂0 (c) is set to
Figure 5. Test accuracy from the MNIST Counting Dialog task.
Acc is the average of the randomly assigned recognition accuracy.
1/N , where N is the number of extracted objects.
p̃(a|q, c)-model for the Likelihood We use the answerer
model from previous GuessWhat?! research (de Vries et al.,
2017). The inputs of the answer-generator module consist
of a VGG16 feature of a given context image, a VGG16
feature of the cropped object in the context image, spatial
and categorical information of the target object, and the
question qt at time step t. Our answer-generator module
assumes the answer distribution is independent from the
history (a1:t−1 , q1:t−1 ).
p̃(at |c, qt , a1:t−1 , q1:t−1 ) ∝ p̃00 (at |c, qt )
(3)
We use two strategy to make the questioner’s answer
distribution p̃(at |c, qt , a1:t−1 , q1:t−1 ) approximate the answerer’s answer distribution p(at |c, qt , a1:t−1 , q1:t−1 ). The
first is “indA,” in which p and p̃ is trained separately for the
training data. The second is “depA,” in which p̃ is trained
for the answer from p. The question and the image is also
sampled from the training data.
Q-sampler for the Candidate Question Set We compare two Q-samplers. The first is “randQ,’’ which samples
questions randomly from the training data. The second is
“countQ,’’ which causes every other question from the set Q
to be less dependent on the other. countQ checks the dependency of two questions with the following rule: the probability that two consecutive questions’
P answers are same
cannot exceed 95%. In other words, a p̃† (ai = a|qi , aj =
a, qj ) < 0.95, where p̃† (ai |qi , aj , qj ) is derived from the
count of a pair of answers for two questions in the training
data. p̃ made by indA is used for countQ. We set the size of
Q to 200.
Answerer in Questioner’s Mind for Goal-Oriented Visual Dialogue
Table 1. Test accuracies from the GuessWhat?! task.
Model
Baseline
Deep SL (de Vries et al., 2017)
Deep RL (Strub et al., 2017)
Random-randQ-indA (5-q)
Random-randQ-depA (5-q)
AQM-randQ-indA (5-q)
AQM-countQ-indA (5-q)
AQM-countQ-depA (5-q)
AQM-countQ-depA (10-q)
Human (Strub et al., 2017)
Figure 6. Test accuracy from the GuessWhat?! task. Previous
works do not report the performance change with an increase
in the number of turns.
Experimental Results Figure 6 and Table 1 shows the
experimental results. Figure 7 illustrates the generated dialogue. Our best algorithm, AQM-countQ-depA, achieved
63.63% in three turns, outperforming deep SL and deep
RL algorithms. By allowing ten questions, the algorithms
achieved 78.72% and reached near-human performance. If
answerer’s answer distribution p is directly used for the questioner’s answer distribution p̃ (i.e., p̃ = p), AQM-countQ
achieved 63.76% in three turns and 81.96% in ten turns.
depA remarkably improved the score in self-play but did not
increased the quality of the generated dialogue significantly.
On the other hand, countQ did not boost the score much but
increased the quality of the generated dialogue. The comparative deep SL method used the question-generator with
hierarchical recurrent encoder-decoder (Serban et al., 2015),
achieving an accuracy of 46.8% in five turns (de Vries et al.,
2017). However, Random-randQ-depA achieved 46.36%
in five turns, which is a competitive result to the deep SL
model. The comparative deep RL method applied reinforcement learning on long short-term memory, achieving 52.3%
in about 4.1 turns (Strub et al., 2017).
5. Discussion
Many researchers have studied dialogue systems for cooperative games using RL, to increase the score in self-play
environments (Lazaridou et al., 2016; Kottur et al., 2017;
Mordatch & Abbeel, 2017). In the discussion section, we
discuss various issues in RL research on goal-oriented dialogue, mainly based on the case of goal-oriented visual
dialogue studies (de Vries et al., 2017; Das et al., 2017b).
Our primary argument is that considering the opponent’s
Accuracy
16.04
46.8
52.3
42.48 (± 0.84)
46.36 (± 0.91)
65.66 (± 0.55)
66.73 (± 0.76)
72.89 (± 0.70)
78.72 (± 0.54)
84.4
mind in implementing an agent is important.
Section 5.1 discusses three objectives of goal-oriented visual
dialogue research: score in self-play, service, and language
emergence. Section 5.2 introduces three properties of RL
algorithms in goal-oriented dialogue tasks using AQM as a
tool. Section 5.3 discusses the direction of future works to
make the questioner agent applicable for service.
5.1. Objective Function of Goal-Oriented Visual
Dialogue
Score In goal-oriented visual dialogue research, score is
used as one of the main measurements of dialogue efficiency.
However, a high score can be achieved via optimization over
p(c|a1:T , q1:T ), which is the objective function of RL. Particularly, the agent can achieve a high score if the probability
distribution of both the questioner and answerer is not bound
to a human’s distribution, even when human-like dialogue is
generated. For example, in GuessWhat?!, Han et al. showed
that pre-defined questions about location can provide an
accuracy of 94.34% in five turns (Han et al., 2017). Their
methods divided an image evenly into three parts using two
vertical or horizontal lines for three cases of answer {yes,
no, n/a}. A natural language-based protocol can also be created by using size, color, category, or other major properties
of the object.
Service One of the ultimate objectives of goal-oriented
dialogue research is to create an agent that can be used in a
real service (Bordes & Weston, 2017). However, successful
reports have been limited. Chattopadhyay et al. reported
the human-machine performance of the deep RL method
in a study on Visual Dialog (Das et al., 2017b; Chattopadhyay et al., 2017). In their method, questioner and answerer
were both fine-tuned by RL. Thus, the answerer’s answering distribution differed from the training data. This RL
method also used the objective function of deep SL as the
regularizer, conserving generated dialogue as human-like.
Answerer in Questioner’s Mind for Goal-Oriented Visual Dialogue
Figure 7. Generated dialogues from our algorithm and the comparative algorithms. The tested games are sampled from the selected results
of previous papers.
Nevertheless, the RL algorithm deteriorated the score in
the game with a human, compared to deep SL. The authors
also assessed six measures of generated dialogue quality:
accuracy, consistency, image understanding, detail, question
understanding, and fluency. However, the human subjects
reported that the deep RL algorithm performed worse than
the deep SL algorithm for all measures, except “detail.”
Language Emergence Plenty of research has recently
been published on language emergence with RL in a multiagent environment. Some studied artificial (i.e., non-natural)
language (Evtimova et al., 2017; Lazaridou et al., 2018),
whereas others attempted to improve the quality of generated natural dialogue. One of the best progress found in the
latter study is the improvement on the quality of a series of
questions in a multi-turn VQA. When deep RL is applied,
the questioner generates fewer redundant questions than
deep SL (Strub et al., 2017; Das et al., 2017b). It can be
understood that the questioner in these methods are optimized by both p(qt |a1:t−1 , q1:t−1 ) and p(c|a1:T , q1:T ). The
questioners are improved more than the answerers, because
the answerer gets the objective function directly for each
answer (i.e., VQA), whereas the questioner does not.
5.2. Analyzing RL via AQM
RL’s Property 1. AQM and RL approaches share
same objective function. Two algorithms have the same
objective function with the assumption that qt only considers the performance of the current turn. The assumption is
used in the second line of the following equation.
argmax max ln p(c|a1:T , q1:T )
qt
qt−
≈ argmax ln p(c|a1:t , q1:t )
qt
p(at |c, qt , a1:t−1 , q1:t−1 )
= argmax E ln
p(at |qt , a1:t−1 , q1:t−1 )
qt
(4)
= argmax I[C, At ; qt , a1:t−1 , q1:t−1 ]
qt
In the third line, at ∼ p(at |c, qt , a1:t−1 , q1:t−1 ), c ∼
p(c|a1:t−1 , q1:t−1 ), and Bayes rule is used. The assumption in the second line can be alleviated via multi-step
AQM, which uses I[C, At:t+k ; qt:t+k , a1:t−1 , q1:t−1 ] as the
objective function of the question-generator module. In the
multi-step AQM, the optimal question cannot be selected
in a greedy way, unlike AQM. The multi-step AQM needs
to search in a tree structure; a Monte Carlo tree search
(Coulom, 2006) can be used to find a reasonable solution.
The RL and AQM question-generator are closely related,
as is the discriminative-generative pair of classifiers (Ng
& Jordan, 2002). AQM’s question-generator and guesser
module explicitly have a likelihood p̃, whereas the RL’s
modules do not have explicitly. The properties of AQM,
for example, including optimal conditions and sentence dynamics (AQM’s property 1 and 2), can be extended to RL.
The complexity of RL’s question-generator can be decomposed to tracking class posteriors p(c|a1:t−1 , q1:t−1 ) and
Answerer in Questioner’s Mind for Goal-Oriented Visual Dialogue
history (a1:t−1 , q1:t−1 ) for multi-turn question answering.
For human-like learning, the context for language generation
p(qt |a1:t−1 , q1:t−1 ) is also required; Q-sampler corresponds
to this context.
RL’s Property 2. Optimizing both questioner and answerer with rewards makes the agent’s performance with
human worse. This is true, even when the process improves
a score during self-play or uses tricks to maintain a humanlike language generation. The property of self-play in a
cooperative goal-oriented dialogue task is different from the
case of AlphaGo, which defeated a human Go champion
(Silver et al., 2017). For example, in GuessWhat?!, the reversed response of the answerer (e.g., “no” for “yes”) may
preserve the score in the self-play, but it makes the score in
the human-machine game near 0%.
According to AQM’s Property 1, for the play of a machine
questioner and a human answerer, the performance is optimal only if the approximated answerer’s distribution p̃ of
AQM’s questioner is the same as the human’s answering
distribution. According to RL’s Property 1, RL and AQM
shares the optimality condition about the distribution of
the opponent. Fine-tuning an answerer agent with a reward
makes the distribution of the agent different from a human’s.
Therefore, fine-tuning both agents decreases performance in
service situations. The experiment with a human, studied by
Chattopadhyay et al. explained in Section 5.1, empirically
demonstrates our claim.
RL’s Property 3. An alternative objective function
exists, which is directly applicable to each question. A reward can only be applied when one game is finished. If the
goal of training is to make language emergence itself or to
make an agent for service, two agents can communicate with
more than just question-answering for back-propagation, including sharing attention for the image (Kim et al., 2017).
Cross-entropy for the guesser of each round can be considered to replace reward. Information gain can also be used
not only for AQM but also for alternative objectives of backpropagation.
5.3. Future Works
RL with Theory of Mind RL methods can be enhanced in
a service scenario by considering the answering distribution
of human. It is advantageous for the machine questioner to
ask questions for which the human answer is predictable
(Chandrasekaran et al., 2017). In other words, a question
having a high VQA accuracy is preferred. The model uncertainty of the questioner can also be measured and utilized with recent studies on Bayesian neural networks and
uncertainty measures (Kendall & Gal, 2017). Because the
questioner has the initiative of dialogue, the questioner does
not need to necessarily learn the entire distribution of human conservation. The question, which the questioner uses
frequently in self-play, can be asked more to a human. Then,
the obtained question-answer pairs can be used for improving the answerer, like in active learning.
Opponent Modeling in the Test-Phase In the perspective
of making an agent for service, RL in self-play can be understood as opponent modeling in the training-phase; An
opponent model in self-play is just an approximated model
of the true opponent, a human. On the other hand, AQM
can be understood as opponent modeling in the test-phase,
especially when the approximated model of the agent is the
opponent model itself in self-play.
Opponent modeling during the test-phase can make it easier to handle a non-stationary environment (Foerster et al.,
2017) or a multi-domain problem. The AQM models can
also be easily trained because research on training an answerer model on VQA tasks has been more progressed than
training an RNN for the questioner. However, during testphase opponent modeling, it is difficult to back-propagate in
an end-to-end way. Thus, it requires additional techniques.
For example, in GuessWhat, if the Q-sampler in our experiment is replaced with seq2seq trained by a deep SL method,
AQM would generate a question by optimizing both sentence probability from the seq2seq model and information
gain, because the Q-sampler in AQM corresponds to regularizing with p(qt |a1:t−1 , q1:t−1 ) in the deep RL approach.
6. Concluding Remarks
Our contributions are two-fold. First, we proposed the AQM,
a practical and explainable goal-oriented dialogue system.
The algorithm is a scaled-up version of theory of mind methods for a realistic problem. During the self-play experiment,
AQM outperformed comparative deep SL and RL methods.
Second, we used AQM as a tool for analyzing deep RL research. We argued that the AQM and RL approach shared
the same objective function. From our discussion: 1) optimizing both agents through reward during self-play makes
the service performance worse; and 2) the reward in RL can
be replaced with an alternative objective function directly
applicable to each question.
The limitation of AQM is that the question-generator retrieves a question from the training data, not generating a
new question. One of the future directions would include
generating questions from the perspective discussed in this
paper. However, just generating novel questions can be produced with a simple rule-based program (Rothe et al., 2017)
or replacing Q-sampler to a seq2seq model. Our primary
interest is to make an agent that can talk with a human for
a practical service. In our future work, we will make a new
algorithm that has strengths of both theory of mind and deep
RL approach.
Answerer in Questioner’s Mind for Goal-Oriented Visual Dialogue
Acknowledgements
The authors would like to thank Jin-Hwa Kim, Cheolho Han,
Wooyoung Kang, Jaehyun Jun, Christina Baek, Hanock
Kwak, Marco Baroni, and Jung-Woo Ha for helpful comments and editing.
References
Antol, Stanislaw, Agrawal, Aishwarya, Lu, Jiasen, Mitchell,
Margaret, Batra, Dhruv, Lawrence Zitnick, C, and Parikh,
Devi. Vqa: Visual question answering. In Proceedings of
the IEEE International Conference on Computer Vision,
pp. 2425–2433, 2015.
Batali, John. Computational simulations of the emergence
of grammar. Approaches to the evolution of language:
Social and cognitive bases, 405:426, 1998.
Bordes, Antoine and Weston, Jason. Learning end-to-end
goal-oriented dialog. In ICLR, 2017.
Bruner, Jerome S. Intention in the structure of action and
interaction. Advances in infancy research, 1981.
Chandrasekaran, Arjun, Yadav, Deshraj, Chattopadhyay,
Prithvijit, Prabhu, Viraj, and Parikh, Devi. It takes two
to tango: Towards theory of ai’s mind. arXiv preprint
arXiv:1704.00717, 2017.
Chattopadhyay, Prithvijit, Yadav, Deshraj, Prabhu, Viraj,
Chandrasekaran, Arjun, Das, Abhishek, Lee, Stefan, Batra, Dhruv, and Parikh, Devi. Evaluating visual conversational agents via cooperative human-ai games. arXiv
preprint arXiv:1708.05122, 2017.
Cho, Kyunghyun, van Merrienboer, Bart, Gulcehre, Caglar,
Bahdanau, Dzmitry, Bougares, Fethi, Schwenk, Holger,
and Bengio, Yoshua. Learning phrase representations
using rnn encoder–decoder for statistical machine translation. In Proceedings of the 2014 Conference on Empirical
Methods in Natural Language Processing (EMNLP), pp.
1724–1734, 2014.
Choi, Edward, Lazaridou, Angeliki, and Freitas, Nando de.
multi-agent compositional communication learning from
raw visual input. In ICLR, 2018.
Coulom, Rémi. Efficient selectivity and backup operators
in monte-carlo tree search. In International conference
on computers and games, pp. 72–83. Springer, 2006.
Das, Abhishek, Kottur, Satwik, Gupta, Khushi, Singh, Avi,
Yadav, Deshraj, Moura, José MF, Parikh, Devi, and Batra,
Dhruv. Visual dialog. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2017a.
Das, Abhishek, Kottur, Satwik, Moura, José MF, Lee, Stefan,
and Batra, Dhruv. Learning cooperative visual dialog
agents with deep reinforcement learning. arXiv preprint
arXiv:1703.06585, 2017b.
de Vries, Harm, Strub, Florian, Chandar, Sarath, Pietquin,
Olivier, Larochelle, Hugo, and Courville, Aaron. Guesswhat?! visual object discovery through multi-modal dialogue. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2017.
Evtimova, Katrina, Drozdov, Andrew, Kiela, Douwe, and
Cho, Kyunghyun. Emergent language in a multimodal, multi-step referential game. arXiv preprint
arXiv:1705.10369, 2017.
Foerster, Jakob N, Chen, Richard Y, Al-Shedivat, Maruan,
Whiteson, Shimon, Abbeel, Pieter, and Mordatch, Igor.
Learning with opponent-learning awareness. arXiv
preprint arXiv:1709.04326, 2017.
Han, Cheolho, Lee, Sang-Woo, Heo, Yujung, Kang, Wooyoung, Jun, Jaehyun, and Zhang, Byoung-Tak. Criteria for
human-compatible ai in two-player vision-language tasks.
In 2017 IJCAI Workshop on Linguistic and Cognitive
Approaches to Dialogue Agents, 2017.
Hernandez-Leal, Pablo and Kaisers, Michael. Learning
against sequential opponents in repeated stochastic games.
In The 3rd Multi-disciplinary Conference on Reinforcement Learning and Decision Making, Ann Arbor, 2017.
Hinton, Geoffrey, Vinyals, Oriol, and Dean, Jeff. Distilling the knowledge in a neural network. arXiv preprint
arXiv:1503.02531, 2015.
Kendall, Alex and Gal, Yarin. What Uncertainties Do We
Need in Bayesian Deep Learning for Computer Vision?
In Advances in neural information processing systems,
2017.
Kim, Jin-Hwa, Parikh, Devi, Batra, Dhruv, Zhang, ByoungTak, and Tian, Yuandong. Codraw: Visual dialog for
collaborative drawing. arXiv preprint arXiv:1712.05558,
2017.
Kottur, Satwik, Moura, José, Lee, Stefan, and Batra, Dhruv.
Natural language does not emerge ‘naturally’in multiagent dialog. In Proceedings of the 2017 Conference on
Empirical Methods in Natural Language Processing, pp.
2962–2967, 2017.
Lazaridou, Angeliki, Peysakhovich, Alexander, and Baroni,
Marco. Multi-agent cooperation and the emergence of
(natural) language. In ICLR, 2016.
Answerer in Questioner’s Mind for Goal-Oriented Visual Dialogue
Lazaridou, Angeliki, Hermann, Karl Moritz Hermann,
Tuyls, Karl, and Clark, Stephen. Emergence of linguistic communication from referential games with symbolic
and pixel input. In ICLR, 2018.
Rothe, Anselm, Lake, Brenden M, and Gureckis, Todd.
Question asking as program generation. In Advances in
Neural Information Processing Systems, pp. 1046–1055,
2017.
Lemon, Oliver, Georgila, Kallirroi, Henderson, James, and
Stuttle, Matthew. An isu dialogue system exhibiting reinforcement learning of dialogue policies: generic slotfilling in the talk in-car system. In Proceedings of the
Eleventh Conference of the European Chapter of the Association for Computational Linguistics: Posters & Demonstrations, pp. 119–122. Association for Computational
Linguistics, 2006.
Seo, Paul Hongsuck, Lehrmann, Andreas, Han, Bohyung,
and Sigal, Leonid. Visual reference resolution using
attention memory for visual dialog. In Advances in neural
information processing systems, 2017.
Li, Xuijun, Chen, Yun-Nung, Li, Lihong, and Gao, Jianfeng. End-to-end task-completion neural dialogue systems. arXiv preprint arXiv:1703.01008, 2017.
Silver, David, Schrittwieser, Julian, Simonyan, Karen,
Antonoglou, Ioannis, Huang, Aja, Guez, Arthur, Hubert,
Thomas, Baker, Lucas, Lai, Matthew, Bolton, Adrian,
et al. Mastering the game of go without human knowledge. Nature, 550(7676):354, 2017.
Lin, Tsung-Yi, Maire, Michael, Belongie, Serge, Hays,
James, Perona, Pietro, Ramanan, Deva, Dollár, Piotr, and
Zitnick, C Lawrence. Microsoft coco: Common objects
in context. In European conference on computer vision,
pp. 740–755. Springer, 2014.
Mao, Junhua, Huang, Jonathan, Toshev, Alexander, Camburu, Oana, Yuille, Alan L, and Murphy, Kevin. Generation and comprehension of unambiguous object descriptions. In Proceedings of the IEEE conference on computer
vision and pattern recognition, pp. 11–20, 2016.
Mordatch, Igor and Abbeel, Pieter. Emergence of grounded
compositional language in multi-agent populations. arXiv
preprint arXiv:1703.04908, 2017.
Serban, Iulian V, Sordoni, Alessandro, Bengio, Yoshua,
Courville, Aaron, and Pineau, Joelle. Hierarchical neural
network generative models for movie dialogues. arXiv
preprint arXiv:1507.04808, 2015.
Strub, Florian, de Vries, Harm, Mary, Jeremie, Piot, Bilal,
Courville, Aaron, and Pietquin, Olivier. End-to-end optimization of goal-driven and visually grounded dialogue
systems. arXiv preprint arXiv:1703.05423, 2017.
Vinyals, Oriol and Le, Quoc. A neural conversational model.
In ICML deep learning workshop, 2015.
Vinyals, Oriol, Toshev, Alexander, Bengio, Samy, and Erhan, Dumitru. Show and tell: A neural image caption
generator. In Proceedings of the IEEE conference on
computer vision and pattern recognition, pp. 3156–3164,
2015.
Ng, Andrew Y and Jordan, Michael I. On discriminative
vs. generative classifiers: A comparison of logistic regression and naive bayes. In Advances in neural information
processing systems, pp. 841–848, 2002.
Wen, Tsung-Hsien, Vandyke, David, Mrksic, Nikola, Gasic, Milica, Rojas-Barahona, Lina M, Su, Pei-Hao, Ultes,
Stefan, and Young, Steve. A network-based end-to-end
trainable task-oriented dialogue system. arXiv preprint
arXiv:1604.04562, 2016.
Polifroni, Joseph and Walker, Marilyn. Learning database
content for spoken dialogue system design. In 5th International Conference on Language Resources and Evaluation (LREC), 2006.
Williams, Jason D and Young, Steve. Partially observable
markov decision processes for spoken dialog systems.
Computer Speech & Language, 21(2):393–422, 2007.
Premack, David and Woodruff, Guy. Does the chimpanzee
have a theory of mind? Behavioral and brain sciences, 1
(4):515–526, 1978.
Redmon, Joseph and Farhadi, Ali. Yolo9000: better, faster,
stronger. arXiv preprint arXiv:1612.08242, 2016.
Ribeiro, Marco Tulio, Singh, Sameer, and Guestrin, Carlos.
Why should i trust you?: Explaining the predictions of
any classifier. In Proceedings of the 22nd ACM SIGKDD
International Conference on Knowledge Discovery and
Data Mining, pp. 1135–1144. ACM, 2016.
Zeiler, Matthew D and Fergus, Rob. Visualizing and understanding convolutional networks. In European conference
on computer vision, pp. 818–833. Springer, 2014.
Zhao, Tiancheng and Eskenazi, Maxine. Towards endto-end learning for dialog state tracking and management using deep reinforcement learning. arXiv preprint
arXiv:1606.02560, 2016.
| 1cs.CV
|
Finite Uniform Bisimulations for Linear Systems with Finite
Input Alphabets
arXiv:1510.04209v1 [math.OC] 14 Oct 2015
Donglei Fan and Danielle C. Tarraf∗
Abstract
We consider a class of systems over finite alphabets, namely discrete-time systems with linear dynamics and a finite input alphabet. We formulate a notion of finite uniform bisimulation, and motivate and
propose a notion of regular finite uniform bisimulation. We derive sufficient conditions for the existence
of finite uniform bisimulations, and propose and analyze algorithms to compute finite uniform bisimulations when the sufficient conditions are satisfied. We investigate the necessary conditions, and conclude
with a set of illustrative examples.
Index Terms— finite uniform bisimulations, systems over finite alphabets, abstractions.
1
Introduction
The past decade has witnessed much interest in finite state approximations of hybrid systems for both analysis
and control design. Multiple complementary approaches have been developed and used [8, 10, 16, 23, 24]
including qualitative models and l-complete approximations [11–13], approximating automata [2–4], exact
or approximate bisimulation and simulation abstractions [6, 18], and ρ/µ approximations [20–22].
In particular, the existence of “equivalent" finite state representations of systems with infinite memory
has been a problem of academic interest, and continues to be so. Typically, this equivalence is captured by
the existence of a bisimulation relation between the original system and the finite memory model, a concept
originally introduced in the context of concurrent processes [15]. For instance in [9], the authors show that
if a hybrid transition system is O-minimal, then it has a finite bisimulation quotient. In [1], by interpreting
the trajectories of linear systems as O-minimal language structures, the authors present instances of linear
systems which admit finite bisimulation quotients. In [26], the authors provide an algorithm for finding finite
bisimulations for piecewise affine systems, and show that it can be applied to linear systems in a dead-lock free
manner. In [19], the authors show that certain controllable linear systems admit finite bisimulations. In [6]
the authors propose an algorithm, based on polyhedral Lyapunov functions, to generate finite bisimulations
for switched linear systems with stable subsystems.
Concurrently, bisimulation has been explored in a more traditional systems setting. Particularly in
[25], the author discusses the connection between bisimulation relations and classical notions of state space
equivalence and equality of external behavior in systems theory. Specifically, he shows that a bisimulation
relation between two linear time-invariant (LTI) systems exists if and only if their transfer matrices are
identical.
In this paper, we revisit the question of existence of finite state equivalent models (a preliminary version
of this work appeared in [5]), focusing on a special class of systems over finite alphabets, namely systems
with linear dynamics and finite input alphabets. This class of systems provides potential models of simple
practical systems where the actuation involves multi-level switching. For this class of systems:
1. We formalize the notion of finite uniform bisimulation and discuss its connections to the existing
literature, and we propose a new notion of regular finite uniform bisimulation.
2. We derive sufficient conditions for the existence of finite uniform bisimulations.
∗ The authors are with the Department of Electrical & Computer Engineering Department at Johns Hopkins University,
Baltimore, MD, 21218 ([email protected], [email protected]).
1
3. We propose and analyze constructive algorithms for computing finite uniform bisimulations when the
sufficient conditions are satisfied.
4. We explore the question of necessity and derive a set of necessary conditions, highlighting the relevance
of the regularity property of finite uniform bisimulations.
5. We provide a set of examples, thereby illustrating how existence of finite uniform bisimulations can be
exploited to derive an “equivalent" deterministic finite state machine model for the system.
Paper Organization: We formulate the notion of finite uniform bisimulation and propose that of regular
finite uniform bisimulation in Section 2. We describe the class of systems of interest, pose our problem, and
place our work in the context of existing literature in Section 3. We state our main analytical results in
Section 4 and present the corresponding constructive algorithms in Section 5. We present a full derivation
of the analytical results and an analysis of our constructive algorithms in Section 6. We present a set of
illustrative examples in Section 7 and conclude with directions for future work in Section 8.
Notation: We briefly summarize our notation here and, for completeness, we provide a review of all
relevant concepts in the Appendix. We use N to denote the non-negative integers, Z+ to denote the positive
integers, Q to denote the rationals, R to denote the reals, and C to denote the complex numbers. For a set
A ⊂ Rn , we use |A| to denote its cardinality (which could be infinite), diam(A) to denote its diameter, Ac
to denote its complement, cl(A) to denote its closure, int(A) to denote its interior, and ∂A to denote its
boundary. A pair W and V of disjoint, nonempty, open sets in Rn is a disconnection of A if W ∩ A =
6 ∅,
V ∩ A 6= ∅ and A ⊂ W ∪ V, and we say A is not connected if there is a disconnection of A.
For
v ∈ Rn , we use kvk1 to denote its 1-norm. We use Br (v) to denote the open ball centered at v with
radius r. For a square matrix A, we use kAk1 to denote its 1-induced norm and ρ(A) to denote its spectral
radius. For sets S, R ⊂ Rn , a matrix H ∈ Rn×n and a vector v ∈ Rn , we use HS to denote the set
{z ∈ Rn |z = Hx, for some x ∈ S}, use v + S to denote the set {z ∈ Rn |z = v + x, for some x ∈ S}, and use
S + R to denote the set {x + r|x ∈ S, r ∈ R}. We use ∼ to denote an equivalence relation, x ∼ y to denote
that x is equivalent to y, x y to denote that x is not equivalent to y, and [x] to denote the equivalence
class of x. For completeness, we provide detailed definitions of all our notation in the Appendix.
2
2.1
Finite Uniform Bisimulations
Proposed Notions
We begin by defining the notion of finite uniform bisimulation, which is simply an equivalence relation that
satisfies certain desired properties:
Definition 1. Consider a discrete-time system
xt+1 = f (xt , ut )
(1)
where t ∈ N is the time index, xt ∈ Rn is the state, ut ∈ U is the input, f : Rn × U → Rn is given, and
input alphabet U represents the collection of possible values of the input. Given a set S ⊂ Rn , we say
an equivalence relation ∼⊂ S × S is a finite uniform bisimulation on S if the following two conditions are
satisfied:
(i) For any x, x0 ∈ S and any u ∈ U, if x ∼ x0 , then
f (x, u) ∼ f (x0 , u)
(2)
(ii) For x ∈ S with [x] = {y ∈ S|y ∼ x}, we have
1 < |{[x]|x ∈ S}| < ∞
(3)
Essentially (2) requires that each equivalence class transition into another equivalence class under any
input, and (3) requires that there be a finite number of equivalence classes while avoiding the trivial instance
of a single equivalence class.
We define a finite uniform bisimulation to be regular if the equivalence classes have a specific topological
structure:
2
Definition 2. Given a finite uniform bisimulation ∼ on S of system (1), we say ∼ is regular if for all x ∈ S,
[x] = {y ∈ S|y ∼ x} consists of open sets in Rn and possibly their boundary points.
We are interested in regular finite uniform bisimulations because we wish to avoid certain “pathological"
finite uniform bisimulations, as will become clear when we discuss the necessary conditions for the existence
of finite uniform bisimulations in Section 4.2.
2.2
Deterministic Finite State Bisimulation Models
Given a finite uniform bisimulation ∼ on S of system (1), it is straightforward to construct a deterministic
finite state machine (DFM) that is bisimilar to the original system when the latter is restricted to evolve on
S. Indeed:
Definition 3. Given a system (1) denoted by P and a finite uniform bisimulation ∼ on S of P , consider the
DFM P̂ defined by
qt+1 = f∼ (qt , ut ),
(4)
where t ∈ N is the time index, qt ∈ Q is the state, ut ∈ U is the input, Q = {[x]|x ∈ S} (essentially Q is
the finite quotient set of S under equivalence relation ∼), U is the input alphabet of system (1), and state
transition function f∼ : Q × U → Q is defined as
f∼ (q, u) = [f (x, u)], ∀ x ∈ q.
(5)
We say that P̂ is uniformly bisimilar to P .
Note that since ∼ is a finite uniform bisimulation, it follows from (2) that f∼ is well-defined.
3
Problem Setup and Formulation
3.1
Systems of Interest & Problem Statement
We first introduce the specific class of systems (1) that we will study in this paper. Consider a discrete-time
dynamical system described by
xt+1 = Axt + But ,
(6)
where t ∈ N is the time index, xt ∈ Rn is the state, ut ∈ U is the input, and A ∈ Rn×n and B ∈ Rn×m are
given. We enforce that the input ut can only take finitely many values in U ⊂ Rm (that is, |U| < ∞).
For this class of systems, we are interested in questions of existence and construction of finite uniform
bisimulations on a subset S of the state space Rn . Particularly, in order for the bisimulation relation to yield
a meaningful “equivalent" DFM, we require the set S be an invariant set of the system:
N
Definition 4. A set S ⊂ Rn is an invariant set of system (6) if for any input sequence {ut }∞
t=0 ∈ U
x0 ∈ S ⇒ xt ∈ S, for all t ∈ N.
(7)
We are now ready to state the first problem of interest:
Problem 1. Given system (6), under what conditions on A, B, U does there exist a finite uniform bisimulation
∼ on some invariant set S of system (6)?
When Problem 1 has an affirmative answer, another set of problems naturally follows:
Problem 2. Given a system (6) that admits a finite uniform bisimulation on some invariant set S, under
what conditions on A, B, U can an arbitrarily large number of equivalence classes be generated by a finite
uniform bisimulation?
Note that we seek (and propose) both analytical and constructive, algorithmic solutions to the above
problems.
3
3.2
Comparison with Existing Work on Finite Bisimulations
Before presenting our main results, we briefly discuss the similarities and differences between the current
problem of interest and some of the previous developments on finite bisimulations:
• Our definition of finite uniform bisimulation is stronger than that of finite bisimulation used in some
of the literature, of which we pick [19] as a representative paper. In particular in that setting, the
definition requires that if two states are bisimilar (x ∼ y) and x transitions to x0 under input u, then
there exists an input u0 such that y transition to y 0 under u0 and y 0 ∼ y. Note that u and u0 need not
be the same, and thus a finite bisimulation as in [19] is not necessarily a finite uniform bisimulation.
We will use Example 1 in Section 7 to illustrate this difference.
• Our definition of finite uniform bisimulation is in accordance with the definitions of finite bisimulation
introduced in [6, 9]. However, the sufficient conditions for existence of finite bisimulations derived
in [9] concern linear vector fields, and as such correspond to special cases of (6) where B is the zero
matrix, whereas the present contribution addresses the more general case where B is nonzero. Likewise,
the dynamics of the system of interest in [6] are different, as the authors study systems of the form
xt+1 = Aσ(t) xt , where σ(t) is the switching signal and is considered to be the input.
• Finally, the finite input alphabet setup is unique in the literature, in contrast to typically studied
setups where the input signal takes arbitrary instantaneous values in Euclidean space, or else the input
signal is of certain form such as polynomial, exponential or sinusoidal as in [1].
4
4.1
Statement of Main Results
Sufficient Conditions and Construction
We begin by defining a set that will be useful for formulating a sufficient condition for the existence of finite
uniform bisimulations.
Definition 5. Given system (6), define set A as
A = {α ∈ Rn |α =
t
X
At−τ Buτ , u(·) ∈ U, t ∈ N}.
(8)
τ =0
Essentially, A is the collection of forced responses of system (6). Now, we are ready to propose a sufficient
condition for the existence of finite uniform bisimulations on some invariant subset of the state space.
Theorem 1. Given system (6) with 0 ∈ U, assume that A has all eigenvalues within the unit disc. If cl(A)
is not connected, then there exists a finite uniform bisimulation on a subset of Rn that is an invariant set of
system (6).
When the conditions in Theorem 1 are satisfied, we also propose an algorithm for computing finite uniform
bisimulations. To keep the flow of presentation, we present this algorithm in the following section (Algorithm
1 in Section 5). We show that Algorithm 1 is guaranteed to generate a finite uniform bisimulation when the
sufficient condition is satisfied.
Theorem 2. Given system (6), and let the hypothesis in Theorem 1 hold, then Algorithm 1 terminates, and
returns X1 , X2 such that X1 , X2 afford a finite uniform bisimulation on an invariant set S, namely S = X1 ∪X2 ,
of system (6).
Next, we continue to study Problem 2. It turns out that additional assumptions are needed to guarantee
the existence of arbitrarily many equivalence classes, as we shall see in Section 7 Example 2. In order to
describe such conditions, we first define a relevant collection of subsets of the state space Rn : Given system
(6), let U = {u1 , u2 , . . . , uq } for q ∈ Z+ and define sets {Sj1 }qj=1 as follows
Sj1 = Buj + cl(AA),
j = 1, 2, . . . , q.
(9)
We can now propose a sufficient condition for the existence of an arbitrarily large number of equivalence
classes.
4
Theorem 3. Given system (6) with 0 ∈ U and |U| > 1, assume that A has all eigenvalues within the unit disc.
If A is invertible, and {Sj1 }qj=1 (9) are disjoint, then for any z ∈ Z+ there is a finite uniform bisimulation ∼
of system (6) such that the number of equivalence classes associated with ∼ is greater than z.
We also propose an algorithm, which is an extension of Algorithm 1, to compute many equivalence classes.
Corollary 1. Given system (6), and let the hypothesis in Theorem 3 hold, then for any z ∈ Z+ , Algorithm
2 (see Section 5) terminates, and returns a finite uniform bisimulation ∼ that has more than z equivalence
classes.
Remark 1. These equivalence classes computed by Algorithm 2 can also be made arbitrarily fine, that is to
say, the diameter of each equivalence class can be made arbitrarily small (see Section 6.3).
4.2
Necessary Conditions for the Existence of Finite Uniform Bisimulations
Next, we investigate necessary conditions for the existence of finite uniform bisimulations. We quickly realize
that system (6) may admit “pathological" finite uniform bisimulations: If A, B, U have entries in Q, then the
partition Qn and Rn \ Qn affords a finite uniform bisimulation of system (6). This motivates us to study
regular finite uniform bisimulations. We propose a necessary condition for the existence of regular finite
uniform bisimulations.
Theorem 4. Given system (6) with 0 ∈ U. If ∼ is a regular finite uniform bisimulation on an invariant set
S of system (6), 0 ∈ int([0]), and [0] is bounded, then ρ(A) ≤ 1.
Remark 2. Theorem 4 states that under certain assumptions, there do not exist regular finite uniform
bisimulations for Schur unstable systems (6). This justifies why we study Schur stable systems in Theorem
1.
We point out that the condition “[0] is bounded" in Theorem 4 cannot be dropped (see Example 3 in
Section 7). However, the condition “[0] is bounded" in Theorem 4 can be dropped for scalar systems, where
we restrict our attention to instances of (6) described by
xt+1 = axt + but
(10)
where xt ∈ R, ut ∈ U, and a, b ∈ R. U is a finite subset of R.
Corollary 2. Given system (10) with 0 ∈ U. If ∼ is a regular finite uniform bisimulation on an invariant set
S of system (10) and 0 ∈ int([0]), then |a| ≤ 1.
5
Constructive Algorithms
First, we present an algorithm for computing finite uniform bisimulations when the conditions in Theorem
1 are satisfied.
We begin by introducing the notation of binary partitions of the finite input set U with |U| > 1: A pair
(U1 , U2 ) is a binary partition of U if U1 , U2 are nonempty, disjoint subsets of U, and U1 ∪U2 = U. The order of
U1 , U2 is not relevant: (U1 , U2 ) is the same as (U2 , U1 ). Since U is a finite set, there are finitely many distinct
(i)
(i)
binary partitions of U. We use {(U1 , U2 ) : i = 1, . . . , r} to denote the collection of all binary partitions of
q!
1
2
q−1
represents the quantity “q choose
U. Here r = (Cq + Cq + · · · + Cq )/2, where q = |U|, and Cqj = j!(q−j)!
j". Now we are ready to present the following algorithm to compute finite uniform bisimulations of system
(6).
5
Algorithm 1 Computing a Finite Uniform Bisimulation
17:
18:
19:
20:
Input: Matrix A, B, set U
Compute: h = max{kBuk1 : u ∈ U}
Choose: such that 0 < < 1 − ρ(A).
Compute: Matrix T , invertible, such that kT −1 AT k1 ≤ ρ(A) + .
(i)
(i)
Compute: All binary partitions of U: (U1 , U2 ), i = 1, . . . , r.
−1
k1 kT k1
Compute: κ = 2kT
1−ρ(A)−
k ← 1.
loop
Compute: lk = hkAk k1
i ← 1.
while i ≤ r do
(i)
(i)
Compute: C1 = {Bu1 + ABu2 + · · · + Ak−1 Buk : u1 ∈ U1 , u2 , . . . , uk ∈ U}
(i)
(i)
C2 = {Bu1 + ABu2 + · · · + Ak−1 Buk : u1 ∈ U2 , u2 , . . . , uk ∈ U}
(i)
(i)
(i)
Compute: dk = min{kα − βk1 : α ∈ C1 , β ∈ C2 }
(i)
if dk ≥ κlk then
ĩ ← i, k̃ ← k.
Exit the loop
end if
i ← i + 1.
end while
k ← k + 1.
end loop
21:
Compute: S = {x ∈ Rn : kT −1 xk1 <
22:
23:
Compute: X1 = C1 + S, X2 = C2 + S
Return: X1 , X2
1:
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
16:
(ĩ)
(ĩ)
d
k̃
2kT k1 }
(ĩ)
Remark 3. In the preceding algorithm, one approach to compute matrix T involves Schur’s triangularization
of matrix A (pp. 79, [7]). We refer interested readers to [7] on the specifics of computing matrix T such that
kT −1 AT k1 ≤ ρ(A) + is satisfied.
Remark 4. Here we explain why Algorithm 1 returns two equivalence classes. We first point out that if
the conditions in Theorem 1 are satisfied, the number of equivalence classes generated by a finite uniform
bisimulation could be greater than two, which is the case in Example 4 in Section 7. However, for certain
systems (see Example 2 in Section 7), two, and only two equivalence classes can be generated based on the
analytical result stated in Theorem 1. Therefore Algorithm 1 returns two equivalence classes, since it is
capable of computing finite uniform bisimulations for any system that satisfies the conditions in Theorem 1.
As we shall see next, we propose another algorithm in case more equivalence classes are desired.
Next, we present a second algorithm, which is an extended version of Algorithm 1, to generate an
arbitrarily large number of equivalence classes when the conditions in Theorem 3 are satisfied.
6
Algorithm 2 Computing a Finite Uniform Bisimulation with Many Equivalence Classes
1:
2:
3:
4:
5:
6:
7:
8:
Input: Matrix A, B, set U = {u(1) , u(2) , . . . , u(q) }, integer z: Lower bound of the number of equivalence
classes.
Compute: h = max{kBuk1 : u ∈ U}
Choose: such that 0 < < 1 − ρ(A).
Compute: Matrix T , invertible, such that kT −1 AT k1 ≤ ρ(A) + .
k1 kT −1 k1
Compute: κ = 2kT
1−ρ(A)−
k ← 1.
loop
Compute: lk = hkAk k1
(k)
Compute: C1 = {Bu1 + ABu2 + · · · + Ak−1 Buk : u1 = u(1) , u2 , . . . , uk ∈ U}
(k)
= {Bu1 + ABu2 + · · · + Ak−1 Buk : u1 = u(2) , u2 , . . . , uk ∈ U}
C2
..
.
(k)
Cq
9:
10:
11:
12:
13:
14:
15:
16:
= {Bu1 + ABu2 + · · · + Ak−1 Buk : u1 = u(q) , u2 , . . . , uk ∈ U}
(i)
(i)
Compute: dk = min{kα − βk1 : α ∈ Cv , β ∈ Cw , w 6= v, 1 ≤ w, v ≤ q}
if dk ≥ κlk then
k̃ ← k.
Exit the loop
end if
k ← k + 1.
end loop
d
Compute: S = {x ∈ Rn : kT −1 xk1 < 2kTk̃k1 }
(k̃)
(k̃)
(k̃)
Compute: X¯1 = C1 + S, X¯2 = C2 + S, . . . , X¯q = Cq + S
η+1
Choose: η ∈ Z+ such that q
> z.
η
19: Compute: An enumeration {u1 , u2 , . . . , uq η } of the set U η , where uj = (u1j , . . . , uj ).
20: Compute: Xk = Bu1 + ABu2 + · · · + Aη−1 Buη + Aη X̄i , 1 ≤ k ≤ q η+1 , where (u1 , . . . , uη ) = uj for
some 1 ≤ j ≤ q η , and 1 ≤ i ≤ q.
21: Return: X1 , . . . , Xq η+1
17:
18:
As we shall see in the derivation of Theorem 3 in Section 6, we claim that the sets X1 , . . . , Xqη+1 returned
η+1
by Algorithm 2 afford a finite uniform bisimulation on ∪qk=1 Xk of system (6).
6
6.1
Derivation of Main Results
Derivation of Theorem 1
We first introduce several Lemmas which will be instrumental in this derivation of Theorem 1.
Lemma 1. Given system (6), if matrix A has all eigenvalues within the unit disc, then cl(A) is compact.
P∞
Proof. If A ∈ Rn×n has all eigenvalues within the unit disc, then τ =0 kAτ k1 converges (pp. 298, [7]). Since
U is finite, max{kBuk1 : u ∈ U} is also finite. Combining these two facts, and applying triangle inequality,
we conclude that A is bounded and therefore cl(A) is bounded. Since cl(A) is closed and bounded in Rn ,
cl(A) is compact.
Next, we study the structure of set A as defined in (8). By the definition of A and 0 ∈ U, and recall (9),
we have
q
[
Sj1 = cl(A).
(11)
j=1
7
Generally, for any k ∈ Z+ , let {u1 , u2 , . . . , uqk } be an enumeration of the set U k , where uj = (u1j , . . . , ukj ),
k
u1j , . . . , ukj ∈ U, we define sets {Sjk }qj=1 as follows
Sjk = Bu1j + ABu2j + · · · + Ak−1 Bukj + cl(Ak A),
j = 1, 2, . . . , q k .
(12)
We also have
k
q
[
Sjk = cl(A).
(13)
j=1
Now we introduce the following Lemma.
Lemma 2. Given system (6), assume that A has all eigenvalues within the unit disc. If open sets W and V
∗
is a disconnection of cl(A), then there exists k ∗ ∈ Z+ such that for all j ∈ {1, . . . , q k },
∗
Sjk ∩ W 6= ∅
∗
Sjk ⊂ W
⇒
(14)
Proof. We show this Lemma by contradiction. We first assume that for all k ∈ Z+ , there is j(k) ∈ {1, . . . , q k }
k
k
k
k
∩W =
6 ∅ and Sj(k)
∩V =
6 ∅. For each k, choose wk ∈ Sj(k)
∩ W and vk ∈ Sj(k)
∩ V. Then
such that Sj(k)
∞
we have constructed two sequences {wk }∞
and
{v
}
.
k k=1
k=1
∞
Since {wk }∞
k=1 ⊂ cl(A), {vk }k=1 ⊂ cl(A) and cl(A) is compact (by Lemma 1), there exists a subsequence
∞
{wkl }∞
l=1 that converges to a point in cl(A). Similarly, there also exists a subsequence of {vkl }l=1 that
∞
converges to a point in cl(A). By relabeling, we have found two sequences {wkp }∞
and
{v
}
such
that
kp p=1
p=1
lim wkp = w,
p→∞
lim vkp = v
and
(15)
p→∞
where w, v ∈ cl(A).
By the construction of Sjk (12), we see that for any j, diam(Sjk ) ≤ kAk k1 diam(A). Since A has all
eigenvalues within the unit disc, lim Ak = 0n×n (pp.298, [7]). By boundedness of set A, diam(A) is finite.
k→∞
k
k
p
p
Therefore diam(Sjk ) goes to 0 as k tends to infinity. Note that wkp ∈ Sj(k
and vkp ∈ Sj(k
, and kp ≥ p,
p)
p)
therefore limp→∞ kwkp − vkp k1 = 0. Combine with (15), we have limp→∞ wkp = limp→∞ vkp = w, where
w ∈ cl(A). Without loss of generality, let w ∈ W. Since W is open, there exist > 0 such that the open
ball B (w) ⊂ W. Since W ∩ V = ∅, {vkp }∞
p=1 ∩ B (w) = ∅. Therefore kvkp − wk1 ≥ for all p. This is a
contradiction with limp→∞ vkp = w. Therefore (14) holds.
Next, we introduce another Lemma which is based on Lemma 2.
Lemma 3. Given system (6), assume that A has all eigenvalues within the unit disc. If open sets W and V
is a disconnection of cl(A), then there exist open sets W 0 and V 0 in Rn such that the pair W 0 and V 0 is also
a disconnection of cl(A), and for all j ∈ {1, . . . , q}
Sj1 ∩ W 0 6= ∅
Sj1 ⊂ W 0
⇒
(16)
Proof. By Lemma 2 , (14) holds, and we only need to consider the case when k ∗ ≥ 2.
Define a function f : Rn → Rn as :f (x) = Ax. Clearly f is continuous. For any set S, use f −1 (S) to
denote the set f −1 (S) = {x ∈ Rn |f (x) ∈ S}.
∗
k∗
For {Sjk }qj=1 as constructed in (12), let u be an element of U, then define an index set J as
∗
J = {j ∈ {1, . . . , q k } : u1j = u},
then |J | = q k
∗
−1
. Define sets
∗
∗
S̃jk = −Bu + Sjk , j ∈ J .
∗
∗
(17)
For any j ∈ J , by (14), either S̃jk ⊂ −Bu + W or S̃jk ⊂ −Bu + V. Write W 0 = f −1 (−Bu + W) and
∗
∗
V 0 = f −1 (−Bu + V), then either f −1 (S̃jk ) ⊂ W 0 or f −1 (S̃jk ) ⊂ V 0 .
8
For each j ∈ J , by (12), (17), and the compactness of cl(A), we have
∗
S̃jk = A(Bu2j + · · · + Ak
∗
for some (u2j , . . . , ukj ) ∈ U k
that
∗
−1
∗
−2
∗
Bukj + cl(Ak
∗
−1
A))
. Consequently, we can determine one and only one j 0 ∈ {1, . . . , q k
∗
Sjk0
−1
∗
⊂ f −1 (S̃jk ).
We also observe that
[
∗
∗
−1
} such
(18)
(u2j , u3j , . . . , ukj ) = U k
∗
−1
.
(19)
j∈J
Recall (13), (18), we see that
∗
cl(A) =
−1
q k[
∗
Sjk0
−1
⊂
j 0 =1
[
∗
f −1 (S̃jk ) ⊂ W 0 ∪ V 0 .
(20)
j∈J
It is clear that W 0 and V 0 are disjoint open sets. Therefore (14) holds for k ∗ − 1 and W 0 , V 0 . Repeat this
argument k ∗ − 1 times, we conclude that (16) holds.
Finally, we provide the proof of Theorem 1.
Proof. (of Theorem 1) Since cl(A) is not connected, let W and V be a disconnection of cl(A). Then by
Lemma 3, (16) holds. We propose an equivalence relation on A. Since A is an invariant set of system (6),
the proof is complete if we can show that this equivalence relation satisfies (2) and (3).
Given open sets W 0 and V 0 that satisfy (16), let X1 = A ∩ W 0 and X2 = A ∩ V 0 . Define an equivalence
relation ∼ as
x ∼ x0 ⇔ x ∈ Xi and x0 ∈ Xi for some i ∈ {1, 2}.
For any x, x0 ∈ A, any uj ∈ U, if x ∼ x0 , then Ax + Buj ∈ Sj1 and Ax0 + Buj ∈ Sj1 . By (16), we see that
Ax + Buj ∼ Ax0 + Buj . Therefore (2) is satisfied. Since 1 < 2 < ∞, (3) is also satisfied. This completes the
proof.
6.2
Derivation of Theorem 2
In this section, we derive Theorem 2. We first show that Algorithm 1 terminates, and then show that the
equivalence classes X1 , X2 returned by Algorithm 1 afford a finite uniform bisimulation on X1 ∪ X2 .
Proof. (of Theorem 2) Given system (6), since matrix A has all eigenvalues within the unit disc, and cl(A)
is not connected, by Lemma 3, there is a disconnection of cl(A), W and V, such that for all j ∈ {1, . . . , q}
Sj1 ∩ W 6= ∅
⇒
Sj1 ⊂ W
(21)
where q = |U|. Let U1∗ = {uj ∈ U|Sj1 ∩ W 6= ∅}, and U2∗ = U \ U1∗ . Recall (11), we see that U1∗ is nonempty,
otherwise cl(A) ∩ W = ∅, which contradicts with W and V being a disconnection of cl(A). U2∗ is also
nonempty, otherwise cl(A) ⊂ W, then cl(A) ∩ V = ∅, which draws a contradiction. We also observe that
|U| > 1, otherwise U = 0 by assumption, and cl(A) = 0 is connected. Therefore the binary partitions of U
are well-defined. Since U1∗ and U2∗ are nonempty, disjoint subsets of U, and U1∗ ∪ U2∗ = U, there is a binary
(i∗ )
(i∗ )
partition of U, (U1 , U2 ), such that
(i∗ )
(U1
(i∗ )
, U2
) = (U1∗ , U2∗ )
where i∗ is an integer between 1 and r.
Since for any k ∈ Z+ ,
(i)
(i)
(i)
dk = min{kα − βk1 : α ∈ C1 , β ∈ C2 },
9
(22)
(23)
(i∗ )
we claim that dk
(23) is uniformly bounded away from zero, that is: There exists d > 0 such that
(i∗ )
dk
≥ d,
for all
To see this claim, we define two sets G1 , G2 by
[
G1 =
Sj1 ,
k ∈ Z+ .
[
G2 =
j∈U1∗
(24)
Sj1 .
(25)
j∈U2∗
By the definition of U1∗ , we see that G1 ⊂ W. Recall (11) and that W and V is a disconnection of cl(A),
we see that G2 ⊂ V. Because V and W are disjoint, G1 and G2 are also disjoint. Since G1 is a finite union
of closed sets, G1 is closed. By Lemma 1, cl(A) is bounded, and therefore G1 is bounded. We see that G1 is
closed, bounded, and therefore compact. Similarly, G2 is also compact. By an observation in analysis: The
distance between two disjoint compact sets is positive (pp. 18, [17]), we have
d = inf{kα − βk1 : α ∈ G1 , β ∈ G2 } > 0.
Since
(i)
(i)
(i)
(i)
(26)
C1 = {Bu1 + ABu2 + · · · + Ak−1 Buk : u1 ∈ U1 , u2 , . . . , uk ∈ U}
C2 = {Bu1 + ABu2 + · · · + Ak−1 Buk : u1 ∈ U2 , u2 , . . . , uk ∈ U}
(27)
and recall (9), (22), and (25), we observe that: For all k ∈ Z+ ,
(i∗ )
C1
(i∗ )
⊂ G1 ,
C2
⊂ G2 .
(28)
∗
(i )
Recall (23), we have dk ≥ d > 0 for all k ∈ Z+ .
Since matrix A is Schur stable, we see that lk = hkAk k1 → 0 as k → ∞. Consequently, there exists
∗
k ∈ Z+ such that
2kT k1 kT −1 k1
(i∗ )
lk∗ .
dk∗ ≥ κlk∗ =
1 − ρ(A) −
Now we see that the loop in Algorithm 1 terminates, and returns two sets X1 , X2 :
(ĩ)
X1 = C1 + S,
(29)
(ĩ)
X2 = C2 + S.
For the second part of this derivation, we show that X1 ∪ X2 is an invariant set of system (6), and that
X1 , X2 afford a finite uniform bisimulation on X1 ∪ X2 .
For any x ∈ X1 ∪ X2 , by (27) and (29), there exist (u1 , . . . , uk̃ ) ∈ U k̃ and s ∈ S such that
x = Bu1 + ABu2 + · · · + Ak̃−1 Buk̃ + s.
(30)
Ax + Bu = (Bu + ABu1 + · · · + Ak̃−1 Buk̃−1 ) + (Ak̃ Buk̃ + As).
(31)
Then for any u ∈ U,
Recall kT −1 AT k1 ≤ ρ(A) + , κ =
2kT k1 kT −1 k1
1−ρ(A)− ,
and h = max{kBuk1 : u ∈ U}, we observe that
kT −1 (Ak̃ Buk̃ + As)k1
≤ kT −1 Ak̃ Buk̃ k1 + kT −1 Ask1
≤ kT −1 k1 kAk̃ k1 kBuk̃ k1 + k(T −1 AT )T −1 sk1
≤ kT −1 k1 lk̃ + k(T −1 AT )k1 kT −1 sk1
(ĩ)
< kT −1 k1
d
1 − ρ(A) − (ĩ)
dk̃ + (ρ(A) + ) k̃
−1
2kT k1 kT k1
2kT k1
(ĩ)
=
dk̃
2kT k1
.
10
Therefore (Ak̃ Buk̃ + As) ∈ S. By (27), we observe that (Bu + ABu1 + · · · + Ak̃−1 Buk̃−1 ) ∈ C1ĩ ∪ C2ĩ , therefore,
we have
Ax + Bu ∈ X1 ∪ X2 .
(32)
We conclude that X1 ∪ X2 is an invariant set of system (6).
Next, we show X1 ∩ X2 = ∅. We show by contradiction: Assume z ∈ X1 ∩ X2 , then by (29), there exist
c1 ∈ C1ĩ , c2 ∈ C2ĩ , s1 ∈ S, and s2 ∈ S such that z = c1 + s1 , and z = c2 + s2 , and recall S = {x ∈ Rn :
(ĩ)
kT −1 xk1 < dk̃ /(2kT k1 )}, we have
kc1 − c2 k1 ≤ kc1 − zk1 + kz − c2 k1
= ks1 k1 + ks2 k1
= kT (T −1 s1 )k1 + kT (T −1 s2 )k1
≤ kT k1 (kT −1 s1 k1 + kT −1 s2 k1 )
(ĩ)
< dk̃ .
(ĩ)
But by (23), we have kc1 − c2 k1 ≥ dk̃ , which draws a contradiction. Therefore X1 ∩ X2 = ∅.
Now we are ready to define an equivalence relation ∼ on X1 ∪ X2 as:
x ∼ x0 ⇔ x ∈ Xi and x0 ∈ Xi for some i ∈ {1, 2}.
We show that ∼ is a finite uniform bisimulation on X1 ∪X2 . For any x, x0 ∈ X1 ∪X2 , and any u ∈ U, if x ∼ x0 ,
we consider two cases: If u ∈ U1ĩ , recall (27), (29), and (31), we see that Ax + Bu ∈ X1 and Ax0 + Bu ∈ X1 ,
therefore Ax + Bu ∼ Ax0 + Bu. Similarly, if u ∈ U2ĩ , then Ax + Bu ∈ X2 and Ax0 + Bu ∈ X2 , therefore
Ax + Bu ∼ Ax0 + Bu. Since (U1ĩ , U2ĩ ) is a binary partition of U, we see that (2) is satisfied.
Since {[x]|x ∈ X1 ∪ X2 } = {X1 , X2 }, we have |{[x]|x ∈ X1 ∪ X2 }| = 2, and (3) is satisfied. Therefore ∼ is
a finite uniform bisimulation on X1 ∪ X2 . This completes the proof.
6.3
Derivation of Theorem 3 & Corollary 1
Proof. To show Theorem 3 and Corollary 1, it suffices to show that Algorithm 2 terminates, and that the
sets X1 , . . . , Xqη+1 :
Xk = Bu1 + ABu2 + · · · + Aη−1 Buη + Aη X̄i , 1 ≤ k ≤ q η+1 ,
(33)
η+1
q
returned by Algorithm 2 afford a finite uniform bisimulation ∼ on ∪k=1
Xk of system (6). By Algorithm 2,
η+1
the number of equivalence classes q
is guaranteed to be greater than z.
By assumption, {Sj1 }qj=1 (9) are disjoint. By Lemma 1, Sj1 is also compact for all j ∈ {1, . . . , q}. Since
the distance between two disjoint compact sets is positive, we have
1
min{d(Sw
, Sv1 ) : w 6= v, 1 ≤ w, v ≤ q} > 0.
Recall
(k)
= {Bu1 + ABu2 + · · · + Ak−1 Buk : u1 = u(1) , u2 , . . . , uk ∈ U},
(k)
= {Bu1 + ABu2 + · · · + Ak−1 Buk : u1 = u(2) , u2 , . . . , uk ∈ U},
C1
C2
..
.
(34)
Cq(k) = {Bu1 + ABu2 + · · · + Ak−1 Buk : u1 = u(q) , u2 , . . . , uk ∈ U},
(k)
we observe that Cj
α∈
(i)
Cv , β
∈
(i)
Cw , w
(34) is a subset of Sj1 for any j ∈ {1, . . . , q} and any k ∈ Z+ , therefore dk = min{kα−βk1 :
6= v, 1 ≤ w, v ≤ q} is uniformly bounded away from zero:
1
dk ≥ min{d(Sw
, Sv1 ) : w 6= v, 1 ≤ w, v ≤ q} > 0, ∀ k ∈ Z+ .
Since lk tends to zero as k tends to infinity, we see that Algorithm 2 terminates.
11
(35)
Recall
(k̃)
X¯1 = C1 + S,
(k̃)
X¯2 = C2 + S,
..
.
(36)
X¯q = Cq(k̃) + S,
we observe that X¯1 , . . . , X¯q afford a finite uniform bisimulation on ∪qj=1 X̄j of system (6) by the derivation
of Theorem 2. We will use this observation to show that sets X1 , . . . , Xqη+1 (33) also afford a finite uniform
bisimulation.
η+1
We first show that ∪qk=1 Xk is an invariant set of system (6). For any x ∈ Xk , by (33), we can write
x = Bu1 + ABu2 + · · · + Aη−1 Buη + Aη x̄
for some (u1 , . . . , uη ) ∈ U η and some x̄ ∈ X̄i with 1 ≤ i ≤ q. Then for any u ∈ U,
Ax + Bu = Bu + ABu1 + A2 Bu2 + · · · + Aη−1 Buη−1 + Aη (Ax̄ + Buη ).
Since ∪qj=1 X̄j is an invariant set of system (6), we have (Ax̄ + Buη ) ∈ X̄j for some 1 ≤ j ≤ q. Recall (33),
η+1
we see that (Ax + Bu) ∈ Xk for some 1 ≤ k ≤ q η+1 , and therefore ∪qk=1 Xk is an invariant set of system (6).
Next, we use an inductive approach to show that the sets Xk , k = 1, . . . , q η+1 (36) are disjoint. Write
U = {u(1) , . . . , u(q) }, we observe that the q 2 sets Bu(i) + AX̄j , i = 1, . . . , q, j = 1, . . . , q are disjoint.
Indeed, consider any Bu(i1 ) + AX̄j 1 and Bu(i2 ) + AX̄j 2 with (i1 , j 1 ) 6= (i2 , j 2 ). If i1 = i2 , then j 1 6=
j 2 . Since X¯1 , . . . , X¯q are disjoint, we have X̄j 1 ∩ X̄j 2 = ∅. Since A is invertible by assumption, we have
AX̄j 1 ∩ AX̄j 2 = ∅, and therefore (Bu(i1 ) + AX̄j 1 ) ∩ (Bu(i2 ) + AX̄j 2 ) = ∅. If i1 6= i2 , from the second part of
the derivation of Theorem 2 (equation (30) through (32)) and the construction of X̄j (34), (36), we see that
(Bu(i1 ) + AX̄j 1 ) ⊂ X̄i1 and (Bu(i2 ) + AX̄j 2 ) ⊂ X̄i2 . Since X¯1 , . . . , X¯q are disjoint, we have X̄i1 ∩ X̄i2 = ∅,
and therefore (Bu(i1 ) + AX̄j 1 ) ∩ (Bu(i2 ) + AX̄j 2 ) = ∅. We conclude that the sets Bu(i) + AX̄j , i = 1, . . . , q,
j = 1, . . . , q are disjoint, where U = {u(1) , . . . , u(q) }.
For the ease of exposition, we use Xj1 , j = 1, . . . , q 2 to denote the q 2 disjoint sets Bu(i) +AX̄j , i = 1, . . . , q,
j = 1, . . . , q. We observe that the q 3 sets Bu(i) + AXj1 , i = 1, . . . , q, j = 1, . . . , q 2 are also disjoint. Indeed,
consider any Bu(i1 ) + AXj11 and Bu(i2 ) + AXj12 with (i1 , j 1 ) 6= (i2 , j 2 ). If i1 = i2 , then j 1 6= j 2 . Since
Xj1 , j = 1, . . . , q 2 are disjoint, we have Xj11 ∩ Xj12 = ∅. Since A is invertible by assumption, we have
AXj11 ∩ AXj12 = ∅, and therefore (Bu(i1 ) + AXj11 ) ∩ (Bu(i2 ) + AXj12 ) = ∅. If i1 6= i2 , by the preceding
paragraph, we see that Xj11 ⊂ X̄l for some 1 ≤ l ≤ q, and therefore
(Bu(i1 ) + AXj11 ) ⊂ (Bu(i1 ) + AX̄l ) ⊂ X̄i1 .
Similarly, we see that (Bu(i2 ) + AXj12 ) ⊂ X̄i2 . Since X¯1 , . . . , X¯q are disjoint, we have X̄i1 ∩ X̄i2 = ∅, and
therefore (Bu(i1 ) + AXj11 ) ∩ (Bu(i2 ) + AXj12 ) = ∅. We conclude that the sets Bu(i) + AXj1 , i = 1, . . . , q,
j = 1, . . . , q 2 are disjoint.
Repeating this argument η times, we conclude that the q η+1 sets Xk , k = 1, . . . , q η+1 (36) are disjoint.
η+1
Next, we define an equivalence relation ∼ on ∪qk=1 Xk as
x ∼ y ⇐⇒ x ∈ Xk and y ∈ Xk for some 1 ≤ k ≤ q η+1 .
We claim that ∼ is a finite uniform bisimulation. Indeed, for any 1 ≤ k ≤ q η+1 , by (33), write Xk as
Xk = Bu1 + ABu2 + · · · + Aη−1 Buη + Aη X̄i . Then for any u ∈ U, AXk + Bu = Bu + ABu1 + A2 Bu2 + · · · +
Aη−1 Buη−1 + Aη (AX̄i + Buη ). Since (AX̄i + Buη ) ⊂ X̄j for some 1 ≤ j ≤ q, we have
(AXk + Bu) ⊂ (Bu + ABu1 + A2 Bu2 + · · · + Aη−1 Buη−1 + Aη X̄j ) = Xk0
for some 1 ≤ k 0 ≤ q η+1 . Therefore (2) is satisfied. Since q η+1 is finite, (3) is also satisfied. This completes
the proof of Theorem 3 and Corollary 1.
12
Lastly, we comment on the fact that the diameter of the equivalence classes Xk can be made arbitrarily
small. For any 1 ≤ k ≤ q η+1 , we have
(k̃)
diam(Xk ) ≤ kAη k1 diam(Ci
+ S) ≤ kAη k1 (diam(A) + diam(S))
Since A is Schur-stable, diam(A) is finite, and kAη k1 can be made arbitrarily small by choosing η large
enough. diam(S) is finite by construction, and we conclude that diam(Xk ) can be made arbitrarily small by
choosing η sufficiently large.
6.4
Derivation of Necessary Conditions
Proof. (of Theorem 4) We will prove by contradiction. Assume ρ(A) > 1, let Av = λv with |λ| > 1, kvk1 = 1,
λ ∈ C, v ∈ Cn . And for any w ∈ Cn , we use Re(w) to denote the real part of w. Define a set O as
O = {α ∈ R+ |Re(γv) ∈ [0], for all |γ| ≤ α, γ ∈ C}.
(37)
We show that O is non-empty and bounded in the following. Write v = [v1 v2 . . . vn ]T , where v1 , . . . , vn ∈ C
and |v1 | + · · · + |vn | = 1. For any γ ∈ C, we have |Re(γvi )| ≤ |γkvi |, therefore
kRe(γv)k1 =
n
X
|Re(γvi )| ≤ |γ|
i=1
n
X
|vi | = |γ|.
i=1
Since Br (0) ⊂ [0] for some r > 0 by assumption, for all γ with |γ| ≤ r/2, Re(γv) ∈ Br (0). Therefore
r/2 ∈ O, and O is nonempty.
Next, we show that O is bounded. Since [0] is bounded by assumption, let [0] ⊂ Bσ (0) for some σ > 0.
Since v = [v1 v2 . . . vn ]T 6= 0n×1 , let |vk | > 0 for some 1 ≤ k ≤ n. Write vk as vk = |vk |eiφ for some
φ ∈ [0, 2π). Assume O is unbounded, then there exist α ∈ O with |α| > 2σ/|vk |. Let γ = (2σ/|vk |)ei(−φ) ,
then |γ| < α. By the definition of O (37), we have Re(γv) ∈ [0]. Observe that
kRe(γv)k1 ≥ |Re(γvk )| = |Re(
2σ i(−φ)
e
|vk |eiφ )| = |Re(2σ)| = 2σ.
|vk |
Therefore Re(γv) ∈
/ Bσ (0), and consequently Re(γv) ∈
/ [0], which draws a contradiction. Therefore O is
bounded.
Next, we define β = sup O. Since O is non-empty and bounded, we have 0 < β < ∞. Then for any
> 0, there is 0 ≤ δ < such that Re(κv) ∈
/ [0] for some κ ∈ C and |κ| = β + δ. Choose = ( |λ|−1
2 )β, and
κ
let κ0 = λ , then
|κ|
β+δ
β+
β + (|λ| − 1)β
|κ0 | =
=
<
<
= β.
|λ|
|λ|
|λ|
|λ|
Therefore |κ0 | < β. Since β = sup O, there exists α ∈ O such that α > |κ0 |. By (37), we see that Re(κ0 v) ∈ [0],
or equivalently Re(κ0 v) ∼ 0. Since ∼ is a finite uniform bisimulation, by (2) and letting the input u be zero,
we have ARe(κ0 v) ∼ 0. We observe that
ARe(κ0 v) = Re(Aκ0 v) = Re(κ0 (Av)) = Re(κ0 λv) = Re(κv),
therefore Re(κv) ∼ 0 ,which draws a contradiction. We conclude that the assumption ρ(A) > 1 is false, and
therefore ρ(A) ≤ 1.
Proof. (of Corollary 2) We will prove by contradiction. Assume |a| > 1, and use [0] to denote the equivalence
class [0] = {x ∈ S|x ∼ 0}. By the assumption Br (0) ⊂ [0] for some r > 0, define β as
β = sup{x ∈ S|[0, x] ⊂ [0]},
(38)
where [0, x] is the closed interval between 0 and x. Since int([0]) is nonempty, there is such that [0, ) ⊂ [0],
therefore the supremum is well defined, and β > 0.
13
First, we consider the case β < ∞. Clearly [0, β) ⊂ [0]. By the definition of β, we have that for any
> 0, there is 0 ≤ δ < such that
β+δ ∈
/ [0].
(39)
Let = (a2 − 1)β > 0, and let δ denote the nonnegative number that satisfy (39). We observe that
z=
β+δ
< β,
a2
therefore z ∼ 0. Since ∼ is a finite uniform bisimulation, when the input is 0 we have az ∼ 0, and a2 z ∼ 0.
This draws a contradiction with (39).
For the case β = ∞, let β 0 = inf{x ∈ S|[x, 0] ⊂ [0]}, then β 0 > −∞, otherwise for any x ∈ R, x ∈ [0],
which implies R = [0] and there is only one equivalence class. Next, for any > 0, there is 0 ≤ δ < such
that β 0 − δ ∈
/ [0]. Choose = (1 − a2 )β 0 and z = (β 0 − δ)/a2 , then the preceding argument follows.
7
Illustrative Examples
In this section, we present a set of illustrative examples: In Example 1, we illustrate the difference between
the notion of finite uniform bisimulation and the notion of finite bisimulation stated in [19]; in Example
2, we show that additional assumptions, besides the conditions in Theorem 1, are needed to guarantee the
existence of arbitrarily many equivalence classes; in Example 3, we show that the condition “[0] is bounded"
in Theorem 4 cannot be dropped; in Example 4, we illustrate the analytical result in Theorem 1, discuss
how to construct a DFM approximation of the original system, and apply Algorithm 2 to construct many
equivalence classes.
Example 1. (Example 2.14, [19]) Consider system
2
0
A = −1 −7
0
4
(6) with parameters
1 2
−1
11 , B = 1 1
1 1
6
According to [19], a finite bisimulation with eight equivalence classes {q1 , . . . , q8 } is constructed. If we
choose x = [1 − 2 − 3]T ∈ q1 , x0 = [8, −18, −24]T ∈ q1 and let input u = [0 60]T , then Ax + Bu =
[125 40 34]T ∈ q2 , and Ax0 + Bu = [160 − 86 − 156]T ∈ q1 . Therefore this finite bisimulation is not a “finite
uniform bisimulation" as defined in Definition 1.
Example 2. Consider system (6) with parameters
0.5 0
A=
,
0 0
and
U=
1
0
B=
1
0
0
1
(40)
0
0
0
,
,
,
1
−1
0
We calculate, and plot cl(A):
cl(A) = {(x, y) ∈ R2 |x = 0, −2 ≤ y ≤ 2} ∪ {(x, y) ∈ R2 |x = 1, −1 ≤ y ≤ 1}
14
(41)
Figure 1: 2 and only 2 equivalence classes.
In the above figure, W and V represents a disconnection of cl(A). We see that both cl(A) ∩ W and
cl(A) ∩ V are connected. Therefore, we cannot apply the analytical result in Theorem 1 to generate more
than two equivalence classes, because such result relies on the disconnectedness of an invariant set.
Example 3. Given system (6) with parameters: A = diag({2, 0.5}) (a diagonal matrix with diagonal entries
2 and 0.5), B is the identity matrix, and U = {[0 0]T }. Let X1 = {(x, y) ∈ R2 : 1 < |y| < 2}, and
X2 = {(x, y) ∈ R2 : |y| < 1}, then we see that X1 , X2 afford a regular finite uniform bisimulation on X1 ∪ X2 ,
which is an invariant set, and Br (0) ⊂ [0] for r = 0.5, and ρ(A) = 2 > 1.
Example 4. Consider system (6) with parameters:
0.25 −0.15
1 0
A=
, B=
(42)
0
0.1
0 1
and
1
−1
0
0
0
U=
,
,
,
,
0
0
1
−1
0
Since A is diagonalizable, we have
(1/4)n (1/10)n − (1/4)n
An =
, n = 0, 1, 2, · · ·
0
(1/10)n
and we can show that cl(A) is a subset of:
[
1 1
4 4
{(±1, ±1), (0, 0)} + {(x, y) : x ∈ [− , ], y ∈ [− , ]}
9 9
9 9
Therefore cl(A) is not connected.
By the derivation of Theorem 1, we find a finite uniform bisimulation ∼ on an invariant set of this system:
Figure 2: 2-d finite uniform bisimulation example.
15
X1 , . . . , X5 shown in Figure 2 afford a finite uniform bisimulation ∼ on an invariant set S = ∪5i=1 Xi of
system (6). The points a, b, c, d are given by:
22 10
10 10
4 1
4 1
, ), b = ( , − ), c = ( , ), d = ( , − )
9 9
9
9
9 9
9 9
and Figure 2 is symmetric with respect to the origin. Particularly, the set S is the convex hull of points:
{a, b, −a, −b}.
Given ∼, we can construct a DFM that is uniformly bisimilar to the original system. Particularly, we
associate each equivalence class Xi to a discrete state qi of the DFM, i = 1, . . . , 5. The state transitions
of the DFM can be determined based on (5): For instance, if the current state of the DFM is q1 , and the
current input is [0 1]T , then the next state of the DFM is q3 .
Since this example also satisfies the conditions in Theorem 3, we can also use Algorithm 2 to generate a
finite uniform bisimulation with an arbitrarily large number of equivalence classes. In particular, we generate
two finite uniform bisimulations with 5 equivalence classes, and 25 equivalence classes respectively.
a=(
(a) 5 equivalence classes.
(c) 25 equivalence classes.
(b) Zoom in on 1 equivalence class.
(d) Zoom in on 1 equivalence class.
Figure 3: Finite uniform bisimulations with many equivalence classes.
In the above, Figure 3a shows the 5 equivalence classes generated by Algorithm 2, and Figure 3b shows
one particular equivalence class (the boxed rectangular area in Figure 3a). Similarly Figure 3c shows the
25 equivalence classes, and Figure 3d shows one particular equivalence class. As shown in Figure 3b and
Figure 3d, an equivalence class computed by Algorithm 2 is the union of all the polytopes (in this case
parallelograms). This is in accordance with the construction of the equivalence classes.
8
Conclusions
In this paper we propose notions of finite uniform bisimulation and regular finite uniform bisimulation. We
then present a sufficient condition for the existence of finite uniform bisimulations: If the forced response of a
Schur stable system is not connected, then the system admits a finite uniform bisimulation. In this case, we
construct an algorithm to compute finite uniform bisimulations. Furthermore, we discuss the existence and
construction of an arbitrarily large number of equivalence classes. We also present a necessary condition for
the existence of regular finite uniform bisimulation. Future works include closing the gap between necessary
conditions and sufficient conditions, and extending the current result to systems with more general dynamics.
16
9
Appendix
For the sake of completeness, we review here relevant mathematical concepts and notation, beginning with
the concept of equivalence relations [14]. Given a set A, a subset ∼ of A × A is called a relation on A. With
some slight abuse of notation, we write a ∼ b, read a is equivalent to b, to mean that (a, b) is an element of
the relation ∼. A relation ∼ on A is an equivalence relation if for any a, b, c ∈ A, we have:
(i) a ∼ a (reflexive),
(ii) If a ∼ b, then b ∼ a (symmetric),
(iii) If a ∼ b and b ∼ c, then a ∼ c (transitive).
An equivalence relation ∼ on a set A can be used to partition A into equivalence classes. We use [x] to
denote the equivalence class of x, defined as [x] = {y ∈ A|y ∼ x}. Note that this indeed defines a partition
as the following properties are satisfied:
(i) [x] 6= ∅, ∀x ∈ A,
(ii) [x] =
6 [y] ⇒ [x] ∩ [y] = ∅,
[
(iii)
[x] = A.
x∈A
Next, we review relevant concepts in analysis. A point x ∈ Rn consists of an n−tuple of real numbers
x = (x1 , x2 , . . . , xn ). For the purpose of illustration, we use the 1-norm to review relevant concepts. The 1norm of x is denoted by kxk1 and is defined as kxk1 = (|x1 |+· · ·+|xn |). The distance between two points x and
y is then simply kx − yk1 . Given a set A in Rn , the diameter of A is defined as diam(A) = sup{ky − xk1 : x ∈
A, y ∈ A}. The open ball in Rn centered at x and of radius r is defined by Br (x) = {y ∈ Rn : ky − xk1 < r}.
Given a set A in Rn , a point x is a closure point of A if for every r > 0, the ball Br (x) contains a point of
A. Similarly, a point x is a limit point of A if for every r > 0, the ball Br (x) contains a point of A that is
distinct from x. The closure of A, cl(A), consists of all closure points of A. A point x ∈ A is an interior
point of A if there exists r > 0 such that Br (x) ⊂ A. The interior of A, int(A), consists of all interior points
of A. A boundary point of A is a point which is in cl(A) but not in int(A). The boundary of A, ∂A, consists
of all boundary points of A.
Lastly, we review the notion of spectral radius of a square matrix. Given a square matrix A, the spectral
radius of A is the nonnegative real number ρ(A) = max{|λ| : λ is an eigenvalue of A}. Given a square
matrix A, the 1-induced norm of A is defined as kAk1 = max kAxk1 . Recall that induced norms satisfy
kxk1 =1
the sub-multiplicative property: kABk1 ≤ kAk1 kBk1 .
10
Acknowledgments
This research was supported by NSF CAREER award 0954601 and AFOSR Young Investigator award
FA9550-11-1-0118.
References
[1] R. Alur, T. A. Henzinger, G. Lafferriere, and G. J. Pappas. Discrete abstractions of hybrid systems.
Proceedings of the IEEE, 88(7):971–984, July 2000.
[2] A. Chutinan and B. H. Krogh. Computing approximating automata for a class of hybrid systems.
Mathematical and Computer Modelling of Dynamical Systems, 6(1):30–50, 2000.
[3] A. Chutinan and B. H. Krogh. Verification of infinite-state dynamic systems using approximate quotient
transition systems. IEEE Transactions on Automatic Control, 46(9):1401–1410, 2001.
[4] J. E. R. Cury, B. H. Krogh, and T. Niinomi. Synthesis of supervisory controllers for hybrid systems
based on approximating automata. IEEE Transactions on Automatic Control, 43(4):564–568, 1998.
17
[5] D. Fan and D. C. Tarraf. On existence of finite uniform bisimulations for linear systems with finite input
alphabets. Proceedings of the 54th IEEE International Conference on Control and Decision, December
2015. To appear.
[6] E. A. Gol, X. Ding, M. Lazar, and C. Belta. Finite bisimulations for switched linear systems. IEEE
Transactions on Automatic Control, 59(12):3122–3134, 2014.
[7] R. A. Horn and C. R. Johnson. Matrix Analysis. Cambridge University Press, 1990.
[8] M. Kloetzer and C. Belta. A fully automated framework for control of linear systems from temporal
logic specifications. IEEE Transactions on Automatic Control, 53(1):287–297, February 2008.
[9] G. Lafferriere, G. J. Pappas, and S. Sastry. O-minimal hybrid systems. Mathematics of Control, Signals
and Systems, 13(1):1–21, 2000.
[10] J. Liu, N. Ozay, U. Topcu, and R. M. Murray. Synthesis of reactive switching protocols from temporal
logic specifications. IEEE Transactions on Automatic Control, 58(7):1771–1785, 2013.
[11] J. Lunze. Qualitative modeling of linear dynamical systems with quantized state measurements. Automatica, 30:417–431, 1994.
[12] T. Moor and J. Raisch. Supervisory control of hybrid systems whithin a behavioral framework. Systems
& Control Letters, Special Issue on Hybrid Control Systems, 38:157–166, 1999.
[13] T. Moor, J. Raisch, and S. D. O’Young. Discrete supervisory control of hybrid systems by l-complete
approximations. Discrete Event Dynamic Systems: Theory and Applications, 12:83–107, 2002.
[14] W. K. Nicholson. Introduction to Abstract Algebra. Wiley, 2012.
[15] D. Park. Concurrency and automata on infinite sequences. In Proceedings of the Fifth GI Conference
on Theoretical Computer Science, volume 104 of Lecture Notes in Computer Science, pages 167–183.
Springer-Verlag, 1981.
[16] G. Reißig. Computing abstractions of nonlinear systems. IEEE Transactions on Automatic Control,
56(11):2583–2598, November 2011.
[17] E. M. Stein and R. Shakarchi. Real analysis: measure theory, integration, and Hilbert spaces. Princeton
University Press, 2009.
[18] P. Tabuada. Verification and Control of Hybrid Systems: A Symbolic Approach. Springer, 2009.
[19] P. Tabuada and G. J. Pappas. Linear time logic control of discrete-time linear systems. IEEE Transactions on Automatic Control, 51(12):1862–1877, 2006.
[20] D. C. Tarraf. A control-oriented notion of finite state approximation. IEEE Transactions on Automatic
Control, 57(12):3197–3202, 2012.
[21] D. C. Tarraf. An input-output construction of finite state ρ/µ approximations for control design. IEEE
Transactions on Automatic Control, Special Issue on Control of Cyber-Physical Systems, 59(12):3164–
3177, Dec 2014.
[22] D. C. Tarraf, A. Megretski, and M. A. Dahleh. Finite approximations of switched homogeneous systems
for controller synthesis. IEEE Transactions on Automatic Control, 56(5):1140–1145, May 2011.
[23] K. Tsumura. Approximation of discrete time linear systems via bit length of memory. In Proceedings of
the 17th International Symposium on Mathematical Theory of Networks and Systems, pages 1066–1072,
Kyoto, Japan, July 2006.
[24] K. Tsumura. A lower bound of the necessary bit length of memory for approximation of discrete time
systems. In Proceedings of the 46th IEEE Conference on Decision and Control, pages 2241–2246, New
Orleans, LA, U.S.A., December 2007.
18
[25] A. J. van der Schaft. Equivalence of dynamical systems by bisimulation. IEEE Transactions on Automatic Control, 49(12):2160–2172, 2004.
[26] B. Yordanov, J. Tumová, I. Cerná, J. Barnat, and C. Belta. Temporal logic control of discrete-time
piecewise affine systems. IEEE Transactions on Automatic Control, 57(6):1491–1504, 2012.
19
| 3cs.SY
|
C ∗-algebras generated by projective representations
of free nilpotent groups
arXiv:1301.2942v2 [math.OA] 7 Jul 2016
Tron Ånen Omland
Updated version, July 2016
Abstract
We compute the two-cocycles (or multipliers) of the free nilpotent groups of class
2 and rank n and give conditions for simplicity of the corresponding twisted group
C ∗ -algebras. These groups are representation groups for Zn and can be considered as a
family of generalized Heisenberg groups with higher-dimensional center. Their group
1
C ∗ -algebras are in a natural way isomorphic to continuous fields over T 2 n(n−1) with the
noncommutative n-tori as fibers. In this way, the twisted group C ∗ -algebras associated
with the free nilpotent groups of class 2 and rank n may be thought of as “second order”
noncommutative n-tori.
Introduction
The discrete Heisenberg group may be described as the group generated by three elements
u1 , u2 , and v12 satisfying the commutation relations
[u1 , v12 ] = [u2 , v12 ] = 1
and
[u1 , u2 ] = v12 .
The group has received much attention in the literature, partly because it is one of the easiest
examples of a nonabelian torsion-free group. Moreover, the continuous Heisenberg group (see
below) is a connected nilpotent Lie group that arises in certain quantum mechanical systems.
As a natural consequence of this attention, several classes of generalized Heisenberg groups
have been investigated. For example, in [14, 15] Milnes and Walters describe the four and
five-dimensional nilpotent groups, and in [11, 12] Lee and Packer study the finitely generated
torsion-free two-step nilpotent groups with one-dimensional center.
In this paper, on the other hand, we will consider a family of generalized Heisenberg
groups, denoted by G(n) for n ≥ 2, with larger center. The groups G(n) are the so-called
free nilpotent groups of class 2 and rank n and will be defined properly in Section 1. Here we
also provide further motivation for our investigation of these groups. Inspired by the work of
Packer [20] we compute the second cohomology group H 2 (G(n), T) of G(n) and study the
structure of the twisted group C ∗ -algebras C ∗ (G(n), σ) associated with two-cocycles σ of
G(n).
Section 2 is devoted to two-cocycle calculations, where we decompose G(n) into a semidirect
product and apply techniques introduced by Mackey [13]. In particular, we will see that
1
H 2 (G(n), T) ∼
= T 3 (n+1)n(n−1) ,
Published in J. Operator Theory, 73(1):3-25, 2015.
2010 Mathematics Subject Classification: Primary 46L05; Secondary 20C25, 20F18, 20J06, 22D25.
Key words and phrases: free nilpotent group, projective unitary representation, twisted group C ∗ -algebra,
simplicity, two-cocycle, group cohomology, Heisenberg group, noncommutative n-torus.
1
and in Theorem 2.6 we give explicit formulas for the two-cocycles of G(n) up to similarity.
Next, in Section 3 we describe C ∗ (G(n), σ) as a universal C ∗ -algebra of a set of generators
and relations. Then we construct the algebra that in a natural way appear as a continuous
field over the compact space H 2 (G(n), T) with C ∗ (G(n), σ) as fibers. We also explain that
for n = 2, this algebra is the group C ∗ -algebra of the free nilpotent group of class 3 and rank
2.
In Section 4 we investigate the center of C ∗ (G(n), σ) and give conditions for simplicity of
these twisted group C ∗ -algebras in Theorem 4.4 and Corollary 4.6.
Finally, in Section 5 we study the automorphism group of G(n) and discuss isomorphism
invariants of C ∗ (G(n), σ) coming from Aut G(n).
Acknowledgements
This version is from July 2016 and includes several computations and details that were left
out in the published version of the article, in addition to a reformulation of Proposition 2.2
in terms of general semidirect products, and a new Remark 5.6 that makes a connection to
more recent work.
A comprehensive summary of this paper was part of the author’s PhD dissertation [18] at
the Norwegian University of Science and Technology (NTNU) submitted in May 2013.
The author would like to thank Erik Bédos, first for suggesting the problem of computing
the two-cocycles of the group G(3), and then for providing valuable comments throughout
this work. The author would also like to thank the referee of Journal of Operator Theory for
several valuable comments and suggestions.
This research was partially supported by the Research Council of Norway (NFR).
1
The free nilpotent groups G(n) of class 2 and rank n
For each natural number n ≥ 2, let G(n) be the group generated by elements {ui }1≤i≤n and
{vjk }1≤j<k≤n subject to the relations
[vjk , vlm ] = [ui , vjk ] = 1
and
[uj , uk ] = vjk
(1)
for 1 ≤ i ≤ n, 1 ≤ j < k ≤ n, and 1 ≤ l < m ≤ n. Clearly, G(2) is the usual discrete
Heisenberg group. For some purposes, it can be useful to set G(1) = hu1 i ∼
= Z. Note that
G(n) is generated by n + 21 n(n − 1) = 12 n(n + 1) elements.
The group G(n) is called the free nilpotent group of class 2 and rank n. Indeed, G(n) is a
free object on n generators in the category of nilpotent groups of step at most two. To see
this, note first that G(n) is the group generated by {ui }ni=1 subject to the relations that all
commutators of order greater than two involving the generators are trivial. Let G0 (n) be any
other nilpotent group of step at most two and let {u0i }ni=1 be any set of n elements in G0 (n).
Then there is a unique homomorphism from G(n) to G0 (n) that maps ui to u0i for 1 ≤ i ≤ n.
Of course, every free object on n generators in this category is isomorphic to G(n). For a
more extensive treatment of free nilpotent groups, see the article on Terence Tao’s website
[26] (see also 2. in the list below).
e
Furthermore, we will need the following concrete realization, say G(n),
of G(n). For
e
n ≥ 2, we denote the elements of G(n)
by
r = (r1 , . . . , rn , r12 , r13 , . . . , rn−1,n )1 ,
1 To be absolutely precise, the entries with double index are colexicographically ordered, that is, (i, j) < (k, l)
if j < l or if j = l and i < k.
2
where all entries are integers, and define multiplication by
r · s = (r1 + s1 , . . . , rn + sn ,
r12 + s12 + r1 s2 , r13 + s13 + r1 s3 , . . . , rn−1,n + sn−1,n + rn−1 sn ).
By letting ui have 1 in the i’th spot and 0 else and vjk have 1 in the jk’th spot and 0
else, the relations (1) are satisfied for these elements. Next, we define the map
e
G(n)
−→ G(n),
r
r12
n−1,n
r 7−→ v12
· · · vn−1,n
· urnn · · · ur11 ,
e
and then it is not difficult to see that G(n)
is isomorphic to G(n). Henceforth, we will not
e
distinguish between G(n) and the realization G(n)
just described, but this should cause no
confusion.
Denote by V (n) the subgroup of G(n) generated by the vjk ’s. Then V (n) coincides with
the center Z(G(n)) of G(n) and
1
V (n) = Z(G(n)) ∼
= Z 2 n(n−1) .
Indeed, both this and the next observations follow after noticing that
r · s · r−1 = (s1 , . . . , sn , s12 + r1 s2 − s1 r2 , . . . , sn−1,n + rn−1 sn − sn−1 rn ).
Moreover, consider the subgroups G(n − 1) and H(n) of G(n) defined by
G(n − 1) = hui , vjk : 1 ≤ i ≤ n − 1, 1 ≤ j < k ≤ n − 1i,
H(n) = hun , vjn : 1 ≤ j < ni.
Note that G(n − 1) sits inside G(n) as a subgroup and that H(n) ∼
= Zn is a normal subgroup
n
∼
∼
of G(n). Clearly, we have G(n)/V (n) = Z and G(n)/H(n) = G(n − 1). Therefore, there
are short exact sequences
1
V (n)
G(n)
Zn
1
and
1
H(n)
G(n)
G(n − 1)
1
where the second one splits and the first does not. In particular, G(n) is a central extension
1
of Zn by Z 2 n(n−1) and consequently, G(n) is a two-step nilpotent group.
To motivate our investigation of G(n), we present a few aspects about these groups and
some appearances in the literature.
1. Consider in the first place the continuous Heisenberg group. We will represent this group
in two different ways, Gmatrix and Gwedge , both with elements (x, x0 ) = (x1 , x2 , x0 ) ∈ R3 ,
i.e. x = (x1 , x2 ) ∈ R2 , and with multiplication as follows. For Gmatrix we define
(x1 , x2 , x0 )(y1 , y2 , y 0 ) = (x1 + y1 , x2 + y2 , x0 + y 0 + x1 y2 ) ,
and for Gwedge we set
(x1 , x2 , x0 )(y1 , y2 , y 0 ) = x1 + y1 , x2 + y2 , x0 + y 0 + 12 (x1 y2 − x2 y1 ) .
3
∼ Gwedge . To motivate the notation, note that Gmatrix
One can deduce that Gmatrix =
can be represented as matrix multiplication in M3 (R) if one identifies
1 x1 x0
(x1 , x2 , x0 ) ←→ 0 1 x2 ,
0 0
1
and that the multiplication in Gwedge may be written as
(x, x0 )(y, y 0 ) = x + y, x0 + y 0 + 21 (x ∧ y) .
In general, the wedge product on Rn is defined as a certain bilinear map (see e.g. [24,
p. 79])
V2 n
Rn × Rn →
(R ),
V2 n
V2 n
where
(R ) is a 12 n(n − 1)-dimensional real vector space. The elements of
(R )
are called bivectors and if {ei }ni=1 is a basis for Rn , then {ei ∧ ej }i<j is a basis for
V2 n
b R) with elements
(R ). For every n ≥ 2, define the group G(n,
V2 n
(x, x0 ) ∈ Rn ⊕
(R ), where x = (x1 , . . . , xn ), x0 = (x012 , x013 , . . . , x0n−1,n ),
and where multiplication is given by
(x, x0 )(y, y 0 ) = x + y, x0 + y 0 + 12 (x ∧ y) .
This group is of dimension n + 12 n(n − 1) = 12 n(n + 1). Remark especially that if n = 3,
the wedge product can be identified with the vector cross product on R3 . That is, the
b R) is given by
product in G(3,
(x, x0 )(y, y 0 ) = x + y, x0 + y 0 + 12 (x × y) .
b R) is isomorphic to the group consisting of the same
It is not hard to see that G(n,
elements, but with multiplication given by
(x, x0 )(y, y 0 ) = (x + y, x0 + y 0 + (x1 y2 , x1 y3 , . . . , xn−1 yn )) .
(2)
Let G(n, R) denote the group defined by (2). Then G(n) is the integer version of
G(n, R).
We also mention that Nielsen [17] has classified all the six-dimensional connected, simply
connected, nilpotent Lie groups. In this setting, G(3, R) is the group denoted by G6,15 .
2. One may define the free nilpotent group G(m, n) of class m and rank n for every
m ≥ 1. Indeed, G(m, n) is the group generated by {ui }ni=1 subject to the relations that
all commutators of order greater than m involving the generators are trivial. More
precisely, for m = 1, 2, 3 and n ≥ 2, we have that G(m, n) can be described as the
groups with presentations
G(1, n) = h{ui }ni=1 : [ui , uj ] = 1i ∼
= Zn ,
G(2, n) = h{ui }ni=1 : [[ui , uj ], uk ] = 1i = G(n),
G(3, n) =
h{ui }ni=1
(3)
: [[[ui , uj ], uk ], ul ] = 1i,
and it should now be clear how to define G(m, n) for all m ≥ 1 and n ≥ 2. Finally, we
set G(m, 1) = hu1 i ∼
= Z for each m ≥ 1. Moreover, for all m, n ≥ 1, the group G(m, n)
4
is the free object on n generators in the category of nilpotent groups of step at most m.
In particular, notice that G(m, n) is m-step nilpotent and that
∼ G(m + 1, n)/Z(G(m + 1, n)).
G(m, n) =
(4)
Again, we refer to [26] for additional details.
In [15, Section 4] Milnes and Walters describe the simple quotients of the C ∗ -algebra
associated with a five-dimensional group denoted by H5,4 . One can check that H5,4 is
isomorphic to the group G(3, 2). See Remark 3.2 for more about this group.
3. The group G(3) is briefly discussed by Baggett and Packer [4, Example 4.3]. The
purpose of that paper is to describe the primitive ideal space of group C ∗ -algebras of
some two-step nilpotent groups. However, G(3) only serves as an example of a group
the authors could not handle.
4. Let n ≥ 2. It is well-known that the group C ∗ -algebra A = C ∗ (G(n)) may be described as the universal C ∗ -algebra generated by unitaries {Ui }1≤i≤n and {Vjk }1≤j<k≤n
satisfying the relations
[Vjk , Vlm ] = [Ui , Vjk ] = I
and
[Uj , Uk ] = Vjk
for all 1 ≤ i ≤ n, 1 ≤ j < k ≤ n, and 1 ≤ l < m ≤ n.
1
For λ = (λ12 , λ13 , . . . , λn−1,n ) ∈ T 2 n(n−1) , let Aλ be the noncommutative n-torus. It is
the universal C ∗ -algebra generated by unitaries {Wi }ni=1 and relations [Wi , Wj ] = λij I
1
for 1 ≤ i < j ≤ n. The universal property of A gives that for each λ in T 2 n(n−1) there
is a surjective ∗ -homomorphism
πλ : A → Aλ
satisfying πλ (Ui ) = Wi for 1 ≤ i ≤ n and πλ (Vjk ) = λjk I for 1 ≤ j < k ≤ n.
Furthermore, A has center Z(A) = C ∗ ({Vjk }1≤j<k≤n ) ∼
= C ∗ (V (n)). Indeed, this is the
case since G(n) is amenable and its finite conjugacy classes are precisely the one-point
sets of central elements (see Lemma 4.1 below). Therefore, we set
[ = T 21 n(n−1) .
T = Prim Z(A) ∼
= Z(A)
1
Let λ be a primitive ideal of Z(A) identified with an element of T 2 n(n−1) . Let Iλ be the
ideal of A generated by λ, that is, the ideal generated by {Vjk − λjk I : 1 ≤ j < k ≤ n}.
It is clear that Iλ ⊆ ker πλ . By the universal property of Aλ , there is a ∗ -homomorphism
ρ : Aλ → A/Iλ
such that ρ(Wi ) = Ui + Iλ for 1 ≤ i ≤ n. Hence, ρ ◦ πλ coincides with the quotient
∼ A/Iλ and πλ may be
map A → A/Iλ and consequently, ker πλ ⊆ Iλ . Therefore, Aλ =
regarded as the quotient map A → A/Iλ .
F
For an element a of A, let ã be the section T → T Aλ given by ã(λ) = πλ (a) and let
e = {ã | a ∈ A} be the set of all such sections. Then the following can be deduced
A
from the Dauns-Hofmann Theorem [5].
e consisting of the base space T , C ∗ -algebras Aλ
Theorem 1.1. The triple (T, {Aλ }, A)
e is a full continuous field of C ∗ -algebras.
for each λ in T , and the set of sections A,
∗
Moreover, the C -algebra associated with this continuous field is naturally isomorphic
to A.
5
This result may be obtained as a corollary to [23, Theorem 1.2] which employs tools
of Williams [28] related to Fell bundle theory, by taking G = G(n) and σ = 1 in that
theorem. It is also a special case of [3, Corollary 2.3]. Our proof is more direct and
partly inspired by [1, Theorem 1.1] which covers the case where n = 2.
From the above discussion it now follows that G(n) is a representation group for Zn in
the sense of Moore [16]. In this case, that means G(n) is (up to isomorphism) the unique
central extension of Zn by H 2\
(Zn , T) such that the ordinary irreducible representation
theory of G(n) coincides with the projective irreducible representation theory of Zn .
This fact plays an important role in [6], where the noncommutative principal torus
bundles over locally compact spaces are classified up to equivariant Morita equivalence.
As explained in [6, Section 2], the group C ∗ -algebra of G(n) serves as a “universal”
bundle in this classification.
We refer to [7, Section 4] for more information on representation groups, where the
groups G(n, R) and G(n) are treated particularly in [7, Example 4.7].
2
The two-cocycles of the free nilpotent groups G(n)
Let G be any discrete group with identity e. A function σ : G × G → T satisfying
σ(r, s)σ(rs, t) = σ(r, st)σ(s, t)
σ(r, e) = σ(e, r) = 1
for all elements r, s, t ∈ G is called a two-cocycle of G with values in T (or a multiplier of G).
Moreover, two two-cocycles σ and τ are said to be similar, written σ ∼ τ , if
τ (r, s) = β(r)β(s)β(rs)σ(r, s)
for all r, s ∈ G and some function β : G → T. The set of similarity classes of two-cocycles of
G is an abelian group under pointwise multiplication. This group is the second cohomology
group H 2 (G, T).
Let G be a semidirect product of a normal subgroup H and a subgroup K. By properties
of the semidirect product, the elements of G can be uniquely written as products ab, where a
belongs to H and b belongs to K. Define the action α of K on H by αb (a) = bab−1 . One
often writes G = H oα K, but to simplify the notation, we will still denote the elements of G
by ab instead (a, b) and write the group product in G as (ab)(a0 b0 ) = aαb (a0 )bb0 for a, a0 ∈ H
and b, b0 ∈ K. Hopefully, the reader is familiar with semidirect products so that this does not
cause any confusion.
Next, we apply Mackey’s theorem [13, Theorem 9.4] and obtain the following result.
Theorem 2.1. Every two-cocycle of G is similar to a two-cocycle σ of G of the form
σ(a0 b, ab0 ) = σH (a0 , αb (a))g(a, b)σK (b, b0 ),
where σH and σK are two-cocycles of H and K, respectively,
g: H × K → T
6
(5)
is a function such that g(a, e) = g(e, b) = 1 for all a ∈ H, b ∈ K, and σH and g satisfy
g(aa0 , b) = σH (αb (a), αb (a0 ))σH (a, a0 ) · g(a, b)g(a0 , b),
g(a, bb0 ) = g(αb0 (a), b)g(a, b0 ).
(6)
Moreover, for every choice of σH , g, and σK satisfying the conditions above, σ is a two-cocycle
of G.
0
0
Proposition 2.2. Let (σH , g, σK ) and (σH
, g 0 , σK
) be triples satisfying the conditions of
0
Theorem 2.1 and let σ and σ be the corresponding two-cocycles of G. Then σ ∼ σ 0 if and
only if the following conditions hold:
0
(i) σK ∼ σK
,
(ii) There exists a function β : H → T such that
0
σH
(a, a0 ) = β(a)β(a0 )β(aa0 )σH (a, a0 ),
g 0 (a, b) = β(αb (a))β(a)g(a, b).
0
0
Remark 2.3. If (ii) holds, then σH ∼ σH
. If σH ∼ σH
and β and β 0 are two functions
implementing the similarity, then β 0 = f · β for some homomorphism f : H → T.
Proof of Proposition 2.2. Suppose σ ∼ σ 0 . Then there exists some γ : G → T such that
σ(a0 b, ab0 ) = γ(a0 b)γ(ab0 )γ(a0 bab0 )σ 0 (a0 b, ab0 )
(7)
for all a, a0 ∈ H and b, b0 ∈ K. In particular, if a = a0 = e, then
0
σK (b, b0 ) = γ(b)γ(b0 )γ(bb0 )σK
(b, b0 )
0
for all b, b0 ∈ K, so σK ∼ σK
. Moreover, the formula (5) from Theorem 2.1 with a = e and
b = e gives that
σ(a0 , b0 ) = 1 = σ 0 (a0 , b0 )
for all a0 ∈ H and b0 ∈ K. Applying this fact to (7) shows that γ(a0 b0 ) = γ(a0 )γ(b0 ) for all
a0 ∈ H and b0 ∈ K. Define β on H by β(a) = γ(a). Then, by letting b = b0 = e in (5) and
(7), we get
0
σH
(a0 , a) = β(a0 )β(a)β(a0 a)σH (a0 , a)
for all a0 , a ∈ H. Furthermore, by letting a0 = e and b0 = e in (5) and (7), we compute
g(a, b) = γ(b)γ(a)γ(ba)g 0 (a, b)
= γ(b)γ(a)γ(αb (a)b)g 0 (a, b)
= γ(b)γ(a)γ(αb (a))γ(b)g 0 (a, b)
= γ(a)γ(αb (a))g 0 (a, b)
= β(a)β(αb (a))g 0 (a, b)
for all a ∈ H and b ∈ K.
Assume next that β is such that (ii) holds, and that (i) holds through δ, that is,
0
σK (b, b0 ) = δ(b)δ(b0 )δ(bb0 )σK
(b, b0 ).
7
Define γ on G by γ(ab) = β(a)δ(b). Then
σ(a0 b, ab0 ) = σH (a0 , αb (a))g(a, b)σK (b, b0 )
0
(a0 , αb (a))
= β(a0 )β(αb (a))β(a0 αb (a))σH
0
· β(a)β(αb (a))g 0 (a, b) · δ(b)δ(b0 )δ(bb0 )σK
(b, b0 )
= β(a0 )δ(b) · β(a)δ(b0 ) · β(a0 αb (a))δ(bb0 )σ 0 (a0 b, ab0 )
= γ(a0 b)γ(ab0 )γ(a0 bab0 )σ 0 (a0 b, ab0 ).
Fix n ≥ 2. To compute the two-cocycles of G(n) up to similarity, we will proceed in the
following way. Consider G(n) as the split extension of G(n − 1) by H(n) as described in
Section 1. We will identify the elements
a = (0, . . . , 0, an , 0, . . . , 0, a1n , . . . , an−1,n ),
b = (b1 , . . . , bn−1 , 0, b12 , . . . , bn−2,n−1 , 0, . . . , 0),
of H(n) and G(n − 1), respectively, with ones of the form
a ←→ (an , a1n , . . . , an−1,n ),
b ←→ (b1 , . . . , bn−1 , b12 , . . . , bn−2,n−1 ).
The elements of G(n) will be written as products ab, where a belongs to H(n) and b belongs
to G(n − 1), and the action α of G(n − 1) on H(n) is then given by
αb (a) = bab−1 = (an , a1n + b1 an , . . . , an−1,n + bn−1 an ).
Remark 2.4. In the published version, Theorem 2.1 and Proposition 2.2 were only shown
to hold for G(n), not for any semidirect product.
Proposition 2.2 can be deduced from [23, Appendix 2], but in any case it may be useful
to give a proof by a direct computation.
Let τn be a two-cocycle of G(n) coming from a pair (σH(n) , gn ), that is,
τn (a0 b, ab0 ) = σH(n) (a0 , αb (a))gn (a, b),
(8)
where (σH(n) , gn ) satisfies (6). By Theorem 2.1 and Proposition 2.2, every two-cocycle of
G(n) that is trivial on G(n − 1) is similar to one of this form. Denote the abelian group of
e 2 (G(n), T).
similarity classes of two-cocycles of this type by H
Corollary 2.5. The second cohomology group of G(n) may be decomposed as
e 2 (G(n), T) ⊕ H 2 (G(n − 1), T) =
H 2 (G(n), T) = H
n
M
e 2 (G(k), T).
H
k=2
Proof. It follows from Theorem 2.1 and Proposition 2.2 (see our comment above) that
e 2 (G(n), T) ⊕ H 2 (G(n − 1), T).
H 2 (G(n), T) = H
Thus, the second inequality is proven by induction after noticing that
e 2 (G(1), T).
{1} = H 2 (Z, T) = H 2 (G(1), T) = H
8
Theorem 2.6. We have
H 2 (G(n), T) ∼
= T 3 (n+1)n(n−1) ,
1
and for each set of 31 (n + 1)n(n − 1) parameters
{λi,jk : 1 ≤ i ≤ k, 1 ≤ j < k ≤ n} ⊆ T,
the associated [σ] in H 2 (G(n), T) may be represented by
Y s r +s r s r +s (r r −r )
jk i
k ij
ij
ik j
k i j
σ(r, s) =
λi,jk
λj,ik
i<j<k
·
Y
r + 21 sk rj (rj −1) rk (sjk +rj sk )+ 21 rj sk (sk −1)
λk,jk
.
s
(9)
jk j
λj,jk
j<k
The proof of this theorem will be given in Section 2.1.
See the paragraph following Theorem 3.1 for an explanation of why λi,jk for i > k is not
involved in the above.
Example 2.7. For G(1) ∼
= Z there are no nontrivial two-cocycles. The two-cocycles of the
usual Heisenberg group G(2) are, up to similarity, given by two parameters (as computed in
[20, Proposition 1.1]):
r + 12 s2 r1 (r1 −1) r2 (s12 +r1 s2 )+ 12 r1 s2 (s2 −1)
λ2,12
s
12 1
σ(r, s) = λ1,12
(10)
The two-cocycles of G(3) are, up to similarity, given by eight parameters:
s
r +s3 (r1 r2 −r12 )
s23 r1 +s3 r12
13 2
σ(r, s) = λ1,23
λ2,13
s
r + 12 s2 r1 (r1 −1) r2 (s12 +r1 s2 )+ 12 r1 s2 (s2 −1)
λ2,12
s
r + 21 s3 r1 (r1 −1) r3 (s13 +r1 s3 )+ 12 r1 s3 (s3 −1)
λ3,13
s
r + 21 s3 r2 (r2 −1) r3 (s23 +r2 s3 )+ 12 r2 s3 (s3 −1)
λ3,23
12 1
· λ1,12
13 1
· λ1,13
23 2
· λ2,23
Remark 2.8. One may associate a Lyndon-Hochschild-Serre spectral sequence with the
extension (see e.g. [27, 6.8.2]):
1
V (n)
G(n)
Zn
1
By applying [10, Theorem 4] to this sequence, one can compute the second homology group
of G(n) (which is recently also done more generally for G(m, n) in [25, Proposition 2.1]), and
deduce that
∼ Z 13 (n+1)n(n−1) ,
H2 (G(n), Z) =
1
which gives that H 2 (G(n), T) ∼
= T 3 (n+1)n(n−1) after dualizing, using the universal coefficient
theorem for cohomology. However, this does not give an explicit description of H 2 (G(n), T).
2.1
Proof of Theorem 2.6
e 2 (G(n), T) through several lemmas and then use
We will in this proof first compute H
Corollary 2.5 to conclude the argument.
9
e 2 (G(n), T) may be represented by a pair (σH(n) , gn ),
Lemma 2.1.1. Every element of H
where σH(n) is a two-cocycle of H(n) given by
σH(n) (a0 , a) =
n−1
Y
a0 ain
λi n
(11)
(12)
i=1
for some λ1 , . . . , λn−1 ∈ T, and gn satisfies
gn (a + a0 , b) =
n−1
Y
b an a0n
λi i
gn (a, b)gn (a0 , b)
i=1
for all a, a0 ∈ H(n) and b ∈ G(n − 1).
e 2 (G(n), T) may be represented by a two-cocycle of the form (8),
Proof. Every element of H
that is, by a pair (σH(n) , gn ) satisfying (6).
Moreover, it is well-known (see e.g. [2]) that every two-cocycle of H(n) ∼
= Zn is similar to
one of the form
Y
Y
a0 akn
a0 a
σH(n) (a0 , a) =
λi n in ·
µjkjn
1≤i≤n−1
1≤j<k≤n−1
for some sets of scalars {λi }1≤i≤n−1 , {µjk }1≤j<k≤n−1 ⊆ T. Since H(n) is abelian, (6) gives
that
σH(n) (αb (a), αb (a0 ))σH(n) (a, a0 ) = gn (a + a0 , b)gn (a, b)gn (a0 , b)
= gn (a0 + a, b)gn (a0 , b)gn (a, b)
= σH(n) (αb (a0 ), αb (a))σH(n) (a0 , a)
for all a, a0 ∈ H(n) and b ∈ G(n − 1). Furthermore, we have
σH (αb (a), αb (a0 ))σH (a, a0 )
Y
a (a0 +b a0 )−a a0
=
λi n in i n n in ·
1≤i≤n−1
=
Y
1≤i≤n−1
Y
(a
µjkjn
+bj an )(a0kn +bk a0n )−ajn a0kn
1≤j<k≤n−1
b a a0
λi i n n
·
b a0kn an +bk ajn a0n +bj bk an a0n
Y
µjkj
.
1≤j<k≤n−1
This is equal to σH (αb (a0 ), αb (a))σH (a0 , a) for all a, a0 ∈ H(n) and b ∈ G(n − 1) if and only
if the expression remains unchanged under the substitution a ←→ a0 , that is, if and only if
all the µjk ’s are 1.
e 2 (G(n), T) there is a unique associated pair (σH(n) , gn )
Lemma 2.1.2. For every element of H
satisfying the conditions of Lemma 2.1.1 such that
gn (un , ui ) = 1
for all
1 ≤ i ≤ n − 1.
(13)
Proof. Suppose that (σH(n) , gn ) satisfies (11) and (12). Let f : H(n) → T be the homomorphism determined by f (un ) = 1 and f (vin ) = gn (un , ui ) for all 1 ≤ i ≤ n − 1 and define
gn0 by gn0 (a, b) = f (αb (a))f (a)gn (a, b). Then, gn0 (un , ui ) = 1 for all 1 ≤ i ≤ n − 1 and by
Proposition 2.2, (σH(n) , gn0 ) determines a two-cocycle of H(n) in the same similarity class as
the one coming from (σH(n) , gn ).
10
0
Suppose now that there are two pairs (σH(n) , gn ) and (σH(n)
, gn0 ) both satisfying the
0
conditions of Lemma 2.1.1. Then σH(n)
= σH(n) , so by Proposition 2.2 and the succeeding
remark, there is a homomorphism f : H(n) → T such that
gn0 (a, b) = f (αb (a))f (a)gn (a, b) =
n−1
Y
f (vin )an bi gn (a, b)
i=1
for all a ∈ H(n) and b ∈ G(n − 1). In particular,
gn0 (un , ui ) = f (vin )gn (un , ui ) for all
1 ≤ i ≤ n − 1,
so that gn0 = gn if gn0 (un , ui ) = gn (un , ui ) for all 1 ≤ i ≤ n − 1.
e 2 (G(n), T), and let (σH(n) , g) be the
In the forthcoming lemmas we fix an element of H
unique associated pair satisfying (11), (12), and (13) for some set of scalars {λi }n−1
i=1 ⊆ T.
For computational reasons, we introduce the following notation. For a = (an , a1n , . . . , an−1,n )
in H(n), we write a = w(a) + z(a), where w(a) = (an , 0, . . . , 0), and z(a) is the “central
part”, i.e. z(a) = (0, a1n , . . . , an−1,n ). Similarly, for b = (b1 , . . . , bn−1 , b12 , . . . , bn−2,n−1 )
in G(n − 1), we write b = w(b)z(b), where w(b) = (b1 , . . . , bn−1 , 0, . . . , 0) and z(b) =
(0, . . . , 0, b12 , . . . , bn−2,n−1 ). Note that αb (a) = a if either w(a) or w(b) is trivial, i.e. if
either a or b is central.
Lemma 2.1.3. For all a ∈ H(n) and b ∈ G(n − 1) we have
g(a, b) = g(w(a), w(b))g(w(a), z(b))g(z(a), w(b)).
Proof. It follows immediately from Lemma 2.1.1 that if a, a0 ∈ H(n) and w(a) or w(a0 ) is 0,
then
g(a + a0 , b) = g(a, b)g(a0 , b),
(14)
hence,
g(a, b) = g(w(a) + z(a), b) = g(w(a), b)g(z(a), b)
for all a ∈ H(n) and b ∈ G(n − 1). If b0 ∈ G(n − 1) and w(b0 ) = e, then b0 is central and
αb0 (a) = a for all a ∈ H(n). Therefore,
g(a, b)g(a, b0 ) = g(a, bb0 ) = g(a, b0 b) = g(αb (a), b0 )g(a, b)
(15)
for all a ∈ H(n), b ∈ G(n − 1). By (14), we then get
1 = g(αb (a), b0 )g(a, b0 )
= g(a + (0, b1 an , . . . , bn−1 an ), b0 )g(a, b0 )
= g(a, b0 )g((0, b1 an , . . . , bn−1 an ), b0 )g(a, b0 )
= g((0, b1 an , . . . , bn−1 an ), b0 )
for all a ∈ H(n) and b ∈ G(n − 1). Consequently, since this holds for all a ∈ H(n) and
b ∈ G(n − 1), and central b0 ∈ G(n − 1), we get that if ã and b̃ are any elements in H(n) and
G(n − 1), respectively, then g(z(ã), z(b̃)) = 1. Moreover, (15) also imply that if b, b0 ∈ G(n − 1)
and either w(b) or w(b0 ) is equal to e, that is, either b or b0 is central, then
g(a, bb0 ) = g(a, b)g(a, b0 ).
11
(16)
Hence, by (16) and (14),
g(a, b) = g(a, w(b)z(b)) = g(a, w(b))g(a, z(b))
= g(w(a), w(b))g(z(a), w(b))g(w(a), z(b)) · 1
for all a ∈ H(n) and b ∈ G(n − 1).
Lemma 2.1.4. For all a ∈ H(n) and b, b0 ∈ G(n − 1) we have
g(z(a), w(b)) =
n−1
Y
g(vin , uj )ain bj ,
i,j=1
g(w(a), z(b)) =
Y
g(un , vij )an bij =
g(a, bb0 ) =
an bij
,
g(vin , uj )g(vjn , ui )
1≤i<j≤n
1≤i<j≤n
and
Y
n−1
Y
0
g(vin , uj )bi bj an g(a, b)g(a, b0 ).
(17)
i,j=1
Proof. Let z(H(n)) = {z(a) | a ∈ H(n)} and z(G(n − 1)) = {z(b) | b ∈ G(n − 1)}. Then g is
a bihomomorphism when restricted to z(H(n)) × G(n − 1) or H(n) × z(G(n − 1)). Therefore,
the first two identities hold. Indeed, this follows directly from (6) after noticing that since
z(a) and z(b) are central,
αw(b) (z(a)) = z(a) and αz(b) (w(a)) = w(a).
Moreover, for i < j we have ui uj = vij uj ui . By (6) and the previous lemma, one calculates
g(un , ui uj ) = g(αuj (un ), ui )g(un , uj )
= g(un vjn , ui )g(un , uj )
= g(un , ui )g(vjn , ui )g(un , uj )
and
g(un , vij uj ui ) = g(un , vij )g(un , uj ui )
= g(un , vij )g(αui (un ), uj )g(un , ui )
= g(un , vij )g(un vin , uj )g(un , ui )
= g(un , vij )g(un , uj )g(vin , uj )g(un , ui ),
so that
g(vjn , ui ) = g(un , vij )g(vin , uj ),
which gives the last identity in the second line of the statement. Finally, we compute
g(a, bb0 ) = g(αb0 (a), b)g(a, b0 ) = g(a + (0, b01 an , . . . , b0n−1 an ), b)g(a, b0 )
= g((0, b01 an , . . . , b0n−1 an ), w(b))g(a, b)g(a, b0 )
n−1
Y
0
=
g(vin , w(b))bi an g(a, b)g(a, b0 )
i=1
=
n−1
Y n−1
Y
i=1
g(vin , uj )bj
b0i an
j=1
12
g(a, b)g(a, b0 ).
(18)
Lemma 2.1.5. For all a ∈ H(n) and b ∈ G(n − 1) we have
n−1
Y
g(w(a), w(b)) =
1
λi2
bi an (an −1)
1
g(vin , ui ) 2 an bi (bi −1)
i=1
Y
·
g(vin , uj )bi bj an .
1≤i<j≤n−1
Proof. First we see from (17) that if bj ≥ 1, then
b −1
b
g(un , ujj ) = g(un , ujj
uj )
b −1
= g(vjn , uj )bj −1 g(un , ujj
= · · · = g(vjn , uj )
1
2 bj (bj −1)
)g(un , uj )
g(un , uj )bj
and then it is not hard to see that
b
1
g(un , ujj ) = g(vjn , uj ) 2 bj (bj −1) g(un , uj )bj
for negative bj as well, for example by applying (17) again.
bn−1
Moreover, note that w(b) = un−1
· · · ub11 , so that by (17),
b
n−1
g(un , w(b)) = g(un , un−1
· · · ub11 )
n−1
Y
=
bn−1
g(v1n , uj )b1 bj g(un , un−1
· · · ub22 )g(un , ub11 )
j=2
Y
= ··· =
bi bj
g(vin , uj )
Y
n−1
b
g(un , ujj ) .
j=1
1≤i<j≤n−1
Then by (12) for an ≥ 1,
b
n−1
g(w(a), w(b)) = g(an un , un−1
· · · ub11 )
n−1
Y b (a −1)
bn−1
bn−1
λi i n
· g((an − 1)un , un−1
· · · ub11 )g(un , un−1
· · · ub11 )
=
i=1
= ··· =
n−1
Y
b · 12 an (an −1)
λi i
b
n−1
· g(un , un−1
· · · ub11 )an
i=1
=
n−1
Y
i=1
·
n−1
Y
1
2 bi an (an −1)
λi
·
Y
g(vin , uj )bi bj an
1≤i<j≤n−1
1
g(vjn , uj ) 2 an bj (bj −1) g(un , uj )an bj .
j=1
Again, it is not hard to see that a similar argument also works for negative an . Finally, recall
that we have chosen g so that g(un , uj ) = 1 by (13).
Lemma 2.1.6. We have
e 2 (G(n), T) ∼
H
= Tn(n−1) ,
13
and for each set of n(n − 1) parameters
{λi,jn : 1 ≤ i ≤ n, 1 ≤ j ≤ n − 1} ⊆ T,
e 2 (G(n), T) may be represented by
the associated [τ ] in H
Y
τ (a0 b, ab0 ) =
a
b +an bij
jn i
λi,jn
a
b +an (bi bj −bij )
in j
λj,in
·
a0 (a
jn
n
λn,jn
a
b + 21 an bj (bj −1)
jn j
λj,jn
j=1
1≤i<j≤n−1
n−1
Y
n−1
Y
+bj an )+ 21 bj an (an −1)
.
j=1
Proof. If one puts λi,jn = g(vjn , ui ) for i, j < n and λn,jn = λj for j < n, then this is a
consequence of the preceding lemmas. Indeed, by (8) we can represent τ as a pair (σH(n) , g).
Here σH(n) is of the form (11) and g can decomposed as in Lemma 2.1.3 with factors computed
in Lemma 2.1.4 and Lemma 2.1.5.
To complete the proof of Theorem 2.6, we set r =Q
a0 b and s = ab0 and recall that by
n
Corollary 2.5 we can compute σn inductively
as [σn ] = k=2 [τn ].
Pn
Finally, we can also check that k=2 k(k − 1) = 31 (n + 1)n(n − 1).
3
The twisted group C ∗ -algebras C ∗ (G(n), σ) of G(n)
Again, let G be any discrete group, σ a two-cocycle of G and H a nontrivial Hilbert space. A
map U from G into the unitary group of H satisfying
U (r)U (s) = σ(r, s)U (rs)
for all r, s ∈ G is called a σ-projective unitary representation of G on H.
We recall the following facts about twisted group C ∗ -algebras and refer to Zeller-Meier
[29] for further details of the construction.
To each pair (G, σ), we may associate the full twisted group C ∗ -algebra C ∗ (G, σ). Denote
the canonical injection of G into C ∗ (G, σ) by iσ . Then C ∗ (G, σ) satisfies the following
universal property. Every σ-projective unitary representation of G on some Hilbert space H
(or in some unital C ∗ -algebra A) factors uniquely through iσ .
The reduced twisted group C ∗ -algebra Cr∗ (G, σ) is generated by the left regular σ-projective
unitary representation λσ of G on B(`2 (G)). Consequently, λσ extends to a ∗ -homomorphism
of C ∗ (G, σ) onto Cr∗ (G, σ). If G is amenable, then λσ is faithful. Note especially that every
∼ C ∗ (G(n), σ) through λσ for every n ≥ 1
nilpotent group is amenable, so that C ∗ (G(n), σ) =
r
and all two-cocycles σ of G(n).
Finally, we remark that if τ ∼ σ through some function β : G → T, then the assignment
iτ (r) 7→ β(r)iσ (r) induces an isomorphism C ∗ (G, τ ) → C ∗ (G, σ).
Theorem 3.1 (Remark 3.1 in the published version). Fix n ≥ 2, let σ be a two-cocycle of
G(n) of the form (9), that is, determined by the 13 (n + 1)n(n − 1) parameters
{λi,jk : 1 ≤ i ≤ k, 1 ≤ j < k ≤ n} ⊆ T,
and set
λk,ij = λi,jk λj,ik
when 1 ≤ i < j < k ≤ n.
14
(19)
Then the twisted group C ∗ -algebra C ∗ (G(n), σ) is the universal C ∗ -algebra generated by
unitaries {Ui }1≤i≤n and {Vjk }1≤j<k≤n satisfying the relations
[Vjk , Vlm ] = I,
[Ui , Vjk ] = λi,jk I,
[Uj , Uk ] = Vjk
(20)
for 1 ≤ i ≤ n, 1 ≤ j < k ≤ n, and 1 ≤ l < m ≤ n.
Proof. Set Ui = iσ (ui ) and Vjk = iσ (vjk ) and note that (9) gives that σ(ui , vjk ) = λi,jk and
σ(vjk , ui ) = 1 for all 1 ≤ i ≤ n and 1 ≤ j < k ≤ n. Thus,
[Ui , Vjk ] = σ(ui , vjk )σ(vjk , ui )I = λi,jk I for all 1 ≤ i ≤ n, 1 ≤ j < k ≤ n.
Moreover, note that σ(ui , uj ) = 1 for all 1 ≤ i, j ≤ n and σ(vjk , vlm ) = 1 for all 1 ≤ j < k ≤ n
and 1 ≤ l < m ≤ n. Hence, it is clear that C ∗ (G(n), σ) is generated as a C ∗ -algebra by
unitaries satisfying (20).
Next, suppose that A is any C ∗ -algebra generated by a set of unitaries satisfying the
relations (20). For each r in G(n) we define the unitary Wr in A by
r
r12
n−1,n
Wr = V12
· · · Vn−1,n
· Unrn · · · U1r1 .
Then a computation using (20) repeatedly gives that2 Wr Ws = τ (r, s)Wrs , where τ (r, s) is
a scalar in T for all r, s ∈ G(n). Now, the associativity of A immediately implies that τ
is a two-cocycle of G(n), so that W is a τ -projective unitary representation of G(n) in A.
Furthermore, note that τ satisfies
τ (ui , vjk )τ (vjk , ui ) = λi,jk for 1 ≤ i ≤ n, 1 ≤ j < k ≤ n.
By the universal property of the full twisted group C ∗ -algebra, there exists a unique ∗ homomorphism ϕ of C ∗ (G(n), τ ) onto A such that ϕ(iτ (r)) = W (r) for all r ∈ G(n).
Therefore, it is sufficient to show that τ ∼ σ, because then C ∗ (G(n), τ ) is canonically
isomorphic to C ∗ (G(n), σ). By Theorem 2.6, there is some β : G(n) → T such that σ 0 , given
by
σ 0 (r, s) = β(r)β(s)β(rs)τ (r, s),
is of the form (9). We calculate that
σ 0 (ui , vjk )σ 0 (vjk , ui )
= β(ui )β(vjk )β(ui vjk )τ (ui , vjk )β(vjk )β(ui )β(vjk ui )τ (vjk , ui )
= τ (ui , vjk )τ (vjk , ui ) = λi,jk
for all 1 ≤ i ≤ n and 1 ≤ j < k ≤ n. Hence, σ 0 = σ, so τ ∼ σ.
The above relation (19) is a consequence of (18) in the proof of Theorem 2.6 and is
the reason why λi,jk for i > k is not involved in the expression (9). To illustrate this
further, consider the three-dimensional case. Let U1 , U2 , U3 and V12 , V13 , V23 be unitaries in
a C ∗ -algebra B satisfying
[Vjk , Vlm ] = I,
[Ui , Vjk ] = µi,jk I,
[Uj , Uk ] = Vjk
2 In general, it will require much work to compute the formula for τ and it is not needed for this argument.
However, for n = 2, the expression for τ is precisely of the form (10).
15
for 1 ≤ i ≤ 3, 1 ≤ j < k ≤ 3, and 1 ≤ l < m ≤ 3 where {µi,jk } is any set of nine scalars in T.
Then we can compute that
U1 U2 U3 = V12 U2 U1 U3 = · · · = µ2,13 V12 V13 V23 U3 U2 U1 ,
U1 U2 U3 = U1 V23 U3 U2 = · · · = µ1,23 µ3,12 V12 V13 V23 U3 U2 U1 ,
that is, we must have µ2,13 = µ1,23 µ3,12 .
n
For dimensions n > 3, any choice of a triple of unitaries from the family
{U }i=1 gives a
n
1
similar dependence. In the n · 2 n(n − 1) commutation relations, these 3 dependencies are
the only possible ones since
n · 21 n(n − 1) − n3 = 12 n(n − 1) n − 31 (n − 2) = 13 (n + 1)n(n − 1).
Remark 3.2. For n ≥ 2, let ω be the dual two-cocycle of G(n), that is,
1
\ T) ∼
ω : G(n) × G(n) → H 2 (G(n),
= Z 3 (n+1)n(n−1)
is determined by ω(r, s)(σ) = σ(r, s) for a two-cocycle σ of G(n). Let the group R(G(n)) be
1
defined as the set Z 3 (n+1)n(n−1) × G(n) with product
(j, r)(k, s) = (j + k + ω(r, s), rs).
It is not entirely obvious that ω and R(G(n)) are well-defined and we refer to [23, p. 689–690]
and [7, Section 4] for details on this and the fact that R(G(n)) is a representation group for
G(n). Moreover, according to [23, Corollary 1.3] we may construct a continuous field A over
H 2 (G(n), T) with fibers Aλ ∼
= C ∗ (G(n), σλ ) for each λ ∈ H 2 (G(n), T). Then the C ∗ -algebra
associated with this continuous field will be naturally isomorphic to the group C ∗ -algebra of
the group R(G(n)).
Next, we briefly consider the group G(3, 2) generated by u1 , u2 , v12 , w1 , w2 satisfying
[u1 , u2 ] = v12 ,
[u1 , v12 ] = w1 ,
[u2 , v12 ] = w2 ,
w1 , w2 central.
Then we have Z(G(3, 2)) ∼
= Z2 and Z(C ∗ (G(3, 2))) ∼
= C(T2 ).
The following statement can also be deduced from [23, Theorem 1.2 and Examples 1.4 (3)],
but we include the analysis that follows, because it is similar to that used in Theorem 1.1.
Let i denote the canonical injection of G(3, 2) into C ∗ (G(3, 2)). For each λ = (λ1 , λ2 ) ∈ T2 ,
let C ∗ (G(2), σλ ) be generated by unitaries satisfying (20). By a similar argument as in
Theorem 1.1, there is a surjective ∗ -homomorphism
πλ : C ∗ (G(3, 2)) → C ∗ (G(2), σλ )
such that i(ui ) = Ui , i(v12 ) = V12 , and i(wi ) = λi I for i = 1, 2. Moreover, the kernel of πλ
coincides with the ideal of C ∗ (G(3, 2)) generated by
λ ∈ Prim Z(C ∗ (G(3, 2))) ∼
(G(3, 2))) = T2 ∼
= Z(C ∗\
= H 2 (G(2), T).
Again, similarly as in Theorem 1.1, we define a set of sections and apply the DaunsHofmann Theorem. In this way, the triple
^ 2))
H 2 (G(2), T), {C ∗ (G(2), σλ )}λ , C ∗ (G(3,
is a full continuous field of C ∗ -algebras, and the C ∗ -algebra associated with this continuous
field is naturally isomorphic to C ∗ (G(3, 2)).
16
It is not difficult to see that R(G(2)) is isomorphic to G(3, 2). We conjecture that
R(G(n)) ∼
= G(3, n) also for n ≥ 3, where G(3, n) is the free nilpotent group of class 3
and rank n as described in (3), so that A is isomorphic to C ∗ (G(3, n)). For n ≥ 3, the
complicated part is to construct a homomorphism R(G(n)) → G(3, n), find an isomorphism
1
∼ Z(G(3, n)), and then use (4) to produce a commuting diagram:
Z 3 (n+1)n(n−1) =
1
1
Z 3 (n+1)n(n−1)
R(G(n))
∼
=
1
Z(G(3, n))
G(n)
1
=
G(3, n)
G(n)
1
In fact, [25, Proposition 2.2 and Remark 2.3] indicate that the representation group R(G(m, n))
for G(m, n) defined similarly as above may be isomorphic to G(m + 1, n) for all m, n ≥ 1.
4
Simplicity of the twisted group C ∗ -algebras C ∗ (G(n), σ)
Let σ be a two-cocycle of any group G. An element r of G is called σ-regular if σ(r, s) = σ(s, r)
whenever s in G commutes with r. If r is σ-regular, then every conjugate of r is also σ-regular.
Therefore, we say that a conjugacy class of G is σ-regular if it contains a σ-regular element.
Let n ≥ 2. The conjugacy class Cr of r ∈ G(n) is infinite if r ∈
/ V (n) = Z(G(n)). Indeed,
for any s ∈ G(n) we have
(srs−1 )i = ri and (srs−1 )jk = rjk + sj rk − rj sk .
Hence, |Cr | = ∞ if ri 6= 0 for some i. Of course, Cr = {r} if r ∈ V (n).
Now, we fix a two-cocycle σ of G(n) of the form (9).
Lemma 4.1. Let S(G(n)) be the set of σ-regular central elements of G(n), that is,
S(G(n)) = {r ∈ V (n) | σ(r, s) = σ(s, r) for all s ∈ G(n)}.
\
Then S(G(n)) is a subgroup of G(n) and Z(C ∗ (G(n)), σ) ∼
= C(S(G(n))).
Proof. It is not hard to check that S(G(n)) is a subgroup of V (n).
We identify C ∗ (G(n), σ) with Cr∗ (G(n), σ) ⊆ B(`2 (G)). Let δe in `2 (G) be the characteristic function on {e} and for an operator T in B(`2 (G)), set fT = T δe ∈ `2 (G). If T belongs
to the center of C ∗ (G(n), σ), then fT can be nonzero only on the finite σ-regular conjugacy
classes of G(n), that is, on S(G(n)) (see e.g. [19, Lemmas 2.3 and 2.4]).
Next, let C ∗ (S(G(n)), σ) be identified with {λσ (s) | s ∈ S(G(n))} ⊆ B(`2 (G)). This
means that Z(C ∗ (G(n), σ) ⊆ C ∗ (S(G(n)), σ). As the reverse inclusion obviously holds, we
have Z(C ∗ (G(n)), σ) = C ∗ (S(G(n)), σ).
Now, it is not difficult to see that C ∗ (S(G(n))) ∼
= C ∗ (S(G(n)), σ). Indeed, as s 7→ λσ (s)
∗
is a unitary representation of S(G(n)) into C (S(G(n)), σ) and the canonical tracial state τ
on C ∗ (S(G(n)), σ) is faithful and satisfies τ (λσ (s)) = 0 for each nonzero s ∈ S(G(n)), this is
just a consequence of [29, Théorème 4.22]. Altogether, we get
\
Z(C ∗ (G(n)), σ) = C ∗ (S(G(n)), σ) ∼
= C ∗ (S(G(n))) ∼
= C(S(G(n))).
17
Remark 4.2. If S(G(n)) is nontrivial, we can describe C ∗ (G(n), σ) as a continuous field of C ∗ \ The fibers will be isomorphic to C ∗ (G(n)/S(G(n)), ω)
algebras over the base space S(G(n)).
for some two-cocycle ω of G(n)/S(G(n)) (see [11, Theorem 1.1] and [23, Theorem 1.2] for
further details).
Example 4.3 ([11, Lemma 3.8 and Theorem 3.9]). Fix a two-cocycle σ of G(2) of the
form (10) such that both λ1,12 and λ2,12 are torsion elements. Let p and q be the smallest
natural numbers such that λp1,12 = λq2,12 = 1 and set k = lcm(p, q). Clearly, V (2) = Z and
S(G(2)) = kZ. Moreover, G(2)/S(G(2)) can be identified with the group with product
(r1 , r2 , r12 )(s1 , s2 , s12 ) = (r1 + s1 , r2 + s2 , r12 + s12 + r1 s2 mod kZ)
for r1 , r2 , s1 , s2 ∈ Z and r12 , s12 ∈ {0, 1, . . . , k − 1}.
\ ∼
Then C ∗ (G(2), σ) is a continuous field of C ∗ -algebras over the base space S(G(2))
= T.
The fibers will be isomorphic to C ∗ (G(n)/S(G(n)), ωλ ), where λ ∈ T and
ωλ (r, s) = σ(r, s)µr1 s2
for some µ ∈ T with µk = λ.
Characterizations for simplicity of of twisted group C ∗ -algebras of two-step nilpotent
groups have been given in [11, Corollary 1.4] and [23, Corollary 1.6]. For the groups G(n),
the necessary and sufficient conditions for simplicity are somewhat easier to provide.
Theorem 4.4. The following are equivalent:
(i) C ∗ (G(n), σ) is simple.
(ii) C ∗ (G(n), σ) has trivial center.
(iii) There are no nontrivial central σ-regular elements in G(n).
Proof. By [21, Theorem 1.7] C ∗ (G(n), σ) is simple if and only if every nontrivial σ-regular
conjugacy class of G(n) is infinite. Since every finite conjugacy class of G(n) is a one-point
set of a central element, then (i) is equivalent with (iii).
Moreover, (iii) is the same as saying that S(G(n)) is trivial, so therefore, (ii) is equivalent
with (iii) by Lemma 4.1. This also follows from [19, Theorem 2.7].
Lemma 4.5. A central element s = (0, . . . , 0, s12 , s13 , . . . , sn−1,n ) of G(n) is σ-regular if and
only if
Y
sjk
λi;jk
=1
1≤j<k≤n
for all 1 ≤ i ≤ n.
Proof. Clearly, an element s = (0, . . . , 0, s12 , s13 , . . . , sn−1,n ) ∈ V (n) is σ-regular if and only
if σ(s, r) = σ(r, s) for all r ∈ G(n). By a direct calculation from the cocycle formula (9), we
get that
Y
Y
Y
sjk ri sik rj
sjk rj rk sjk
−r s
rk sij
σ(r, s)σ(s, r) =
λi,jk
λj,ik
λj,jk
λk,jk
λi,jkk ij λj,ik
i<j<k
=
n
Y
i=1
j<k
Y
s
jk
λi,jk
i<j<k
ri
1≤j<k≤n
is equal to 1 for all r ∈ G(n) if and only if the inner parenthesis is 1 for each 1 ≤ i ≤ n.
18
Corollary 4.6. We have that C ∗ (G(n), σ) is simple if and only if for each nontrivial central
element s = (0, . . . , 0, s12 , s13 , . . . , sn−1,n ) there is some 1 ≤ i ≤ n such that
Y
sjk
λi,jk
6= 1.
1≤j<k≤n
∗
Example 4.7. In particular, C (G(3), σ) is simple if and only if for each nontrivial central
element s = (0, 0, 0, s12 , s13 , s23 ) at least one of the following hold:
12
13
23
λs1,12
λs1,13
λs1,23
6= 1,
12
13
23
λs2,12
λs2,13
λs2,23
6= 1,
12
13
23
λs3,12
λs3,13
λs3,23
6= 1.
Next, set λi,jk = e2πiti,jk for ti,jk ∈ [0, 1) and consider the n × 12 n(n − 1)-matrix T with
entries ti,jk in the corresponding spots. Then T induces a linear map
1
R 2 n(n−1) → Rn .
Corollary 4.8. Let T be the matrix described above. Then following are equivalent:
(i) C ∗ (G(n), σ) is simple
1
(ii) T −1 (Zn ) ∩ Z 2 n(n−1) = {0}
1
(iii) T (Z 2 n(n−1) \ {0}) ∩ Zn = ∅
Remark 4.9. Clearly, condition (ii) above is equivalent to that T restricts to an injective
map
1
Z 2 n(n−1) → Rn /Zn ∼
= Tn .
Furthermore, for 1 ≤ j < k ≤ n, define
Λjk = {ti,jk ∈ [0, 1), 1 ≤ i ≤ n | e2πiti,jk = λi,jk }
and for 1 ≤ i ≤ n, define
Λi = {ti,jk ∈ [0, 1), 1 ≤ j < k ≤ n | e2πiti,jk = λi,jk }.
Proposition 4.10. If there exists i such that all the elements of Λi are irrational and linearly
independent over Q, then C ∗ (G(n), σ) is simple.
Proof. It follows immediately from Lemma 4.5, that “equation i” cannot be satisfied unless
s = 0. Hence, no nontrivial σ-regular central elements exists.
Proposition 4.11. If there exists j < k such that Λjk consists of only rational elements,
then C ∗ (G(n), σ) is not simple.
Proof. Let q be the least common two-cocycle of the denominators of the elements of Λjk .
Then qvjk is central and σ-regular. Indeed,
σ(r, qvjk )σ(qvjk , r) =
n−1
Y
i
λqr
i,jk = 1
i=1
for all r ∈ G(n).
Remark 4.12. In the case where C ∗ (G(n), σ) is not simple, some more information about
the primitive ideal space can be deduced from [11, Proposition 1.3].
19
5
On isomorphisms invariants of C ∗ (G(n), σ)
Fix n ≥ 2 and let σ be a two-cocycle of G(n). If ϕ is an automorphism of G(n), define the
two-cocycle σϕ of G(n) by
σϕ (r, s) = σ(ϕ(r), ϕ(s)).
(21)
Then it is well-known that the associated twisted group C ∗ -algebras C ∗ (G(n), σ) and
C ∗ (G(n), σϕ ) are isomorphic. Indeed, the map
i(G,σ) (r) 7→ i(G,σϕ ) (ϕ−1 (r))
extends to an isomorphism C ∗ (G(n), σ) → C ∗ (G(n), σϕ ). Moreover, for any automorphism ϕ
of G(n), it is easily seen that two two-cocycles σ and τ of G(n) are similar if and only if σϕ
and τϕ are similar. Hence, there is a well-defined group action of the automorphism group
Aut G(n) on H 2 (G(n), T) defined by ϕ · [σ] = [σϕ ].
Therefore, we will now briefly investigate Aut G(n). Let V (n)n be the subgroup of
Aut G(n) consisting of the automorphisms G(n) → G(n) of the form ui 7→ zi ui for 1 ≤ i ≤ n
and elements zi ∈ V (n) = Z(G(n)). In particular, these automorphisms leave all the vjk ’s
fixed, i.e. V (n)n is the subgroup of Aut G(n) leaving V (n) fixed. Clearly, V (n)n contains
Inn G(n). In fact, in the case n = 2, we have V (2)2 = Inn G(2).
Proposition 5.1. There is a split short exact sequence:
1
V (n)n
Aut G(n)
GL(n, Z)
1
Proof. Assume that ϕ is any endomorphism G(n) → G(n). The image of a central element
under ϕ must be central, so ϕ restricts to an endomorphism ϕ1 : V (n) → V (n). Therefore,
ϕ also induces an endomorphism ϕ2 : G(n)/V (n) → G(n)/V (n) determined by ϕ2 (q(r)) =
q(ϕ(r)). Consider now the following commutative diagram:
1
V (n)
i
ϕ1
1
V (n)
G(n)
q
ϕ
i
G(n)
Zn
1
ϕ2
q
Zn
1
Assume that ϕ2 is an automorphism. Since ϕ2 is surjective, then for all ui there is some
si ∈ G(n) such that ϕ(si ) = zi ui for some zi ∈ V (n). Hence, for all j < k, we have
−1
n
ϕ1 (sj sk s−1
j sk ) = vjk and therefore, ϕ1 is surjective. Every surjective endomorphism of Z
is also injective, so ϕ1 is an automorphism as well. Thus, by the “short five lemma”, ϕ is an
automorphism.
The converse obviously holds and hence, ϕ is an automorphism if and only if ϕ2 is an
automorphism.
Furthermore, the construction of G(n) in terms of generators and relations means that
every endomorphism G(n) → G(n) is uniquely determined by its values at {ui }ni=1 . In
particular, we let ϕ : G(n) → G(n) be determined by the pair of matrices given by its entries
(ϕ(ui )j ), (ϕ(ui )jk ) ∈ Mn (Z) × Mn, 21 n(n−1) (Z)
so that the induced endomorphism ϕ2 is coming from a matrix in Mn (Z).
By the above argument, the map between endomorphism groups defined by
End G(n) → End Zn ,
(ϕ(ui )j ), (ϕ(ui )jk ) 7→ (ϕ(ui )j )
20
(22)
restricts to a surjective map Aut G(n) → Aut Zn = GL(n, Z).
Before concluding the argument, we need the following.
Lemma 5.2 (nested inside the proof). If ϕ and ϕ0 are two endomorphisms of G(n), then
(ϕ ◦ ϕ0 )(ui )j =
n
X
ϕ0 (ui )k ϕ(uk )j .
k=1
If ϕ and ϕ0 are two endomorphisms of G(n) that both induce the trivial map on G(n)/V (n),
then
(ϕ ◦ ϕ0 )(ui )jk = ϕ0 (ui )jk + ϕ(ui )jk .
Proof. For the moment, set ϕ(ui )j = rij and ϕ0 (ui )j = sij . Then
(ϕ ◦ ϕ0 )(ui ) = ϕ(usnin · · · us1i1 z) = (urnnn · · · ur1n1 )sin · · · (urn1n · · · ur111 )si1 z 0
for some elements z, z 0 ∈ V (n). Moreover, we can change the order of the ui ’s in the expression
just by replacing z 0 by another central element z 00 and thus,
(ϕ ◦ ϕ0 )(ui )j = rnj sin + rn−1,j si,n−1 + · · · + r1j si1 =
n
X
sik rkj .
k=1
If both ϕ2 and ϕ02 are trivial, then ϕ(ui ) = zi ui and ϕ0 (ui ) = zi0 ui for all 1 ≤ i ≤ n and some
elements zi , zi0 ∈ V (n). Hence, ϕ(vjk ) = ϕ0 (vjk ) = vjk for all j < k and thus,
(ϕ ◦ ϕ0 )(ui ) = ϕ(zi0 ui ) = zi0 zi ui .
Therefore, (22) restricts to a surjective homomorphism Aut G(n) → GL(n, Z) with kernel
isomorphic to the group Mn, 12 n(n−1) (Z) under addition, that is, to V (n)n .
Moreover, if A is a matrix in GL(n, Z) with entries aij , then one can define an automorphism ϕA of G(n) by ϕA (ui )j = aij . Thus, it should be clear that GL(n, Z) sits inside
Aut G(n) as a subgroup so that the sequence splits.
Proposition 5.3. If ϕ belongs to V (n)n , then σϕ is similar to σ. Thus, the action of V (n)n
on H 2 (G(n), T) given by (21) is trivial.
Proof. It is not hard to see that
σ(ui , vjk )σ(vjk , ui ) = σϕ (ui , vjk )σϕ (vjk , ui ),
that is,
[i(G,σ) (ui ), i(G,σ) (vjk )] = [i(G,σϕ ) (ui ), i(G,σϕ ) (vjk )]
for all 1 ≤ i ≤ n and 1 ≤ j < k ≤ n. It then follows from the universal property of
C ∗ (G(n), σ) described in Theorem 3.1 that σϕ ∼ σ.
To describe the GL(n, Z)-action on H 2 (G(n), T) requires more work. To any A in GL(n, Z)
we may associate a square matrix à of dimension 12 n(n − 1), with entries coming from the
determinant of all 2 × 2-matrices inside A. More precisely, if A = (aij ), Ã is given by entries
ãij,kl for i < j, k < l such that ãij,kl = aik ajl − ail ajk . Then A acts on the matrix T defined
prior to Corollary 4.8 by A · T = AT Ã. Tedious computations of commutation relations and
use of the universal property of C ∗ (G(n), σ) from Theorem 3.1 now lead to the following
result.
21
Proposition 5.4. Let σ and σ 0 be two-cocycles of G(n) of the form (9) and let T and T 0 be
the associated matrices of Corollary 4.8. If there exists a matrix A in GL(n, Z) such that
A · T = T 0 , then C ∗ (G(n), σ) and C ∗ (G(n), σ 0 ) are isomorphic.
For n = 2, it is shown by Packer [21, Theorem 2.9] that C ∗ (G(2), σ) and C ∗ (G(2), σ 0 ),
where σ and σ 0 are of the form (9), are isomorphic if and only if there is a GL(2, Z)-matrix
A taking σ to σ 0 . Note in this case that à = det A = ±1.
For n ≥ 3, it is at the moment not clear whether the GL(n, Z)-action on H 2 (G(n), T)
described above is such that the orbits represent different isomorphism classes of twisted group
C ∗ -algebras. Therefore, the problem of determining the isomorphism classes of C ∗ (G(n), σ)
remains open for future investigation.
σλ
Remark 5.5. Every two-cocycle σλ of G(n) is of the form e2πie
for some two-cocycle σ
eλ
on G(n, R). Moreover, any pair of two-cocycles σλ and σµ of the form described above are
homotopic in the sense of Packer and Raeburn [22, Section 4]. Hence, one may use [22,
Theorem 4.2 and Corollary 4.5] to deduce that
1
i+ n(n−1)
Ki (C ∗ (G(n)), σλ ) ∼
(G(n, R)/G(n)).
= Ki (C ∗ (G(n)), σµ ) ∼
= Ktop2
Remark 5.6 (new). The groups G(n), or more generally all the free nilpotent groups G(m, n)
of class m and rank n are finitely generated (torsion-free) nilpotent groups. Let σ be a
two-cocycle of G(m, n) and suppose that there are no nontrivial central σ-regular elements
in G(m, n), that is, C ∗ (G(m, n), σ) is simple with a unique trace by [20] (see Theorem 4.4
and the subsequent results above for the case of G(n)). Then there exists an irreducible
representation πσ of G(m + 1, n) such that C ∗ (G(m, n), σ) ∼
= C ∗ (πσ (G(m + 1, n))) by using
Theorem 1.1, Remark 3.2, and (4). Thus it follows from [9] and [8] that C ∗ (G(m, n), σ) is
classified by its ordered K-theory within the class of simple, unital, nuclear C ∗ -algebras with
finite nuclear dimension that satisfy the universal coefficient theorem.
References
[1] Joel Anderson and William L. Paschke. The rotation algebra. Houston J. Math.,
15(1):1–26, 1989.
[2] Nigel B. Backhouse and Christopher J. Bradley. Projective representations of space
groups. I. Translation groups. Q. J. Math., 21:203–222, 1970.
[3] Lawrence W. Baggett and Judith A. Packer. C ∗ -algebras associated to two-step nilpotent
groups. In Selfadjoint and nonselfadjoint operator algebras and operator theory, Contemp.
Math., vol. 120, pp. 1–6, Amer. Math. Soc., Providence, RI 1991.
[4] Lawrence W. Baggett and Judith A. Packer. The primitive ideal space of two-step
nilpotent group C ∗ -algebras. J. Funct. Anal., 124(2):389–426, 1994.
[5] John Dauns and Karl Heinrich Hofmann. Representation of rings by sections. Mem.
Amer. Math. Soc., vol. 83, Amer. Math. Soc., Providence, RI 1968.
[6] Siegfried Echterhoff, Ryszard Nest, and Herve Oyono-Oyono. Principal non-commutative
torus bundles. Proc. Lond. Math. Soc., 99(1):1–31, 2009.
[7] Siegfried Echterhoff and Dana P. Williams. Locally inner actions on C0 (X)-algebras. J.
Operator Theory, 45(1):131–160, 2001.
22
[8] Caleb Eckhardt and Elizabeth Gillaspy. Irreducible representations of nilpotent groups
generate classifiable C ∗ -algebras. Münster J. Math., to appaer.
[9] Caleb Eckhardt and Paul McKenney. Finitely generated nilpotent group C ∗ -algebras
have finite nuclear dimension. J. Reine Angew. Math., to appear.
[10] Yuri V. Kuz’min and Yuri S. Semenov. On the homology of a free nilpotent group of
class 2. Mat. Sb., 189(4):49–82, 1998.
[11] Soo Teck Lee and Judith A. Packer. Twisted group C ∗ -algebras for two-step nilpotent
and generalized discrete Heisenberg groups. J. Operator Theory, 34(1):91–124, 1995.
[12] Soo Teck Lee and Judith A. Packer. The cohomology of the integer Heisenberg groups.
J. Algebra, 184(1):230–250, 1996.
[13] George W. Mackey. Unitary representations of group extensions. I. Acta Math., 99:265–
311, 1958.
[14] Paul Milnes and Samuel G. Walters. Simple quotients of the group C ∗ -algebra of a
discrete 4-dimensional nilpotent group. Houston J. Math., 19(4):615–636, 1993.
[15] Paul Milnes and Samuel G. Walters. Simple infinite-dimensional quotients of C ∗ (G) for
discrete 5-dimensional nilpotent groups G. Illinois J. Math., 41(2):315–340, 1997.
[16] Calvin C. Moore. Extensions and low dimensional cohomology theory of locally compact
groups. II. Trans. Amer. Math. Soc., 113:64–86, 1964.
[17] Ole A. Nielsen. Unitary representations and coadjoint orbits of low-dimensional nilpotent
Lie groups. Queen’s Papers Pure Appl. Math., vol. 63, Queen’s Univ., Kingston, ON
1983.
[18] Tron Ånen Omland. On the structure of certain C ∗ -algebras arising from groups.
Doctoral thesis, Norwegian University of Science and Technology (NTNU), 2013.
[19] Tron Ånen Omland. Primeness and primitivity conditions for twisted group C ∗ -algebras.
Math. Scand., 114(2):299–319, 2014.
[20] Judith A. Packer. C ∗ -algebras generated by projective representations of the discrete
Heisenberg group. J. Operator Theory, 18(1):41–66, 1987.
[21] Judith A. Packer. Twisted group C ∗ -algebras corresponding to nilpotent discrete groups.
Math. Scand., 64(1):109–122, 1989.
[22] Judith A. Packer and Iain Raeburn. Twisted crossed products of C ∗ -algebras. II. Math.
Ann., 287(4):595–612, 1990.
[23] Judith A. Packer and Iain Raeburn. On the structure of twisted group C ∗ -algebras.
Trans. Amer. Math. Soc., 334(2):685–718, 1992.
[24] Michael D. Spivak. Calculus on manifolds. A modern approach to classical theorems of
advanced calculus. W. A. Benjamin, Inc., New York-Amsterdam 1965.
[25] Markus Szymik. Twisted homological stability for extensions and automorphism groups
of free nilpotent groups. J. K-Theory, 14(1):185–201, 2014.
[26] Terence Tao. The free nilpotent group. http://terrytao.wordpress.com/2009/12/
21/the-free-nilpotent-group/
23
[27] Charles A. Weibel. An introduction to homological algebra. Cambridge Stud. Adv. Math.,
vol. 38, Cambridge Univ. Press, Cambridge 1994.
[28] Dana P. Williams. The structure of crossed products by smooth actions. J. Aust. Math.
Soc., 47(2):226-235, 1989.
[29] Georges Zeller-Meier. Produits croisés d’une C ∗ -algèbre par un groupe d’automorphismes.
J. Math. Pures Appl., 47:101–239, 1968.
Department of Mathematical Sciences, Norwegian University of Science and Technology
(NTNU), NO-7491 Trondheim, Norway.
24
| 4math.GR
|
arXiv:1608.02085v1 [math.GR] 6 Aug 2016
AN AXIOMATIZABLE PROFINITE GROUP WITH
INFINITELY MANY OPEN SUBGROUPS OF INDEX 2
OR BEN PORATH AND MARK SHUSTERMAN
Abstract. We show that a profinite group with the same first-order
theory as the direct product over all odd primes p of the dihedral group
of order 2p, is necessarily isomorphic to this direct product.
1. Introduction
We say that a profinite group Γ is axiomatizable if for every profinite
group Λ with the same first-order theory as that of Γ, we have Λ ∼
= Γ.
The study of axiomatizable profinite groups began in [3], where it is shown
that finitely generated profinite groups are axiomatizable, and an example
of a profinite group that is not axiomatizable is given (for instance, Zℵ2 0 ).
More generally, it is shown in [2] that a strongly complete profinite group
(that is, a profinite group all of whose finite index subgroups are open) is
axiomatizable. Are there more axiomatizable profinite groups?
By [2, Corollary 3.8] a strongly complete profinite group is small (that
is, it has only finitely many open subgroups of index n, for every n ∈ N).
Thus, a possible precise formulation given by [2, Question 3.15 (i)] for the
question we have just raised is whether every axiomatizable profinite group
is small. Here, a negative answer to this question is given.
Theorem 1.1. The profinite group G given by the direct product of the
dihedral groups Dp over all odd primes p, is axiomatizable.
From our proof of Theorem 1.1 one can extract an explicit (infinite) set
of axioms characterizing G up to an isomorphism.
2. The group G and its properties
Definition 2.1. For a profinite group Γ we set
(2.1)
Inv(Γ) ··= {τ ∈ Aut(Γ) | τ 2 = IdΓ }
and note that this defines a group if Aut(Γ) is abelian.
Definition 2.2. For a prime number p we denote by Cp the cyclic group of
order p. If p is odd, then Aut(Cp ) ∼
= Cp−1 so Inv(Cp ) is a group isomorphic
to C2 . The semidirect product Cp ⋊ Inv(Cp ) is the dihedral group Dp . Let
ρp be a generator of Cp , and let ǫp be a generator of Inv(Cp ) so that they
generate Dp and we have ǫp ρp ǫp = ρ−1
p .
1
2
OR BEN PORATH AND MARK SHUSTERMAN
Proposition 2.3. For an odd prime p we have Cp = {[a, b] | a, b ∈ Dp }.
Proof. For one inclusion note that Dp /Cp is abelian, and for the other one
take some ρnp ∈ Cp . As p is odd, there exists a k ∈ Z such that 2k ≡ n (p).
k
−k
k k
2k
n
We find that [ǫp , ǫp ρkp ] = ǫp ǫp ρkp ǫp ρ−k
p ǫp = ρp ǫp ρp ǫp = ρp ρp = ρp = ρp .
Remark 2.4. A similar argument shows that Cp ≤ Dp is its own centralizer.
Q
Q
Q
Definition 2.5. We set G ··=
Dp , C ··=
Cp , E ··= hǫp i where the
products (here and in the sequel) are always taken over all odd primes p.
Since Cp ⊳ Dp and Dp /Cp ∼
= C2 for all odd primes p, we conclude that C
is a closed normal procyclic subgroup of G with G/C ∼
= (Z/2Z)ℵ0 . Hence,
∀g ∈ G g 2 ∈ C
(2.2)
and G/C is not small. Therefore, G is not small as well. Furthermore, we
have G = C ⋊ E. Since the Sylow subgroups of C are normal, we see that
Y
Y
Cp−1
(2.3)
Aut(C) =
Aut(Cp ) ∼
=
p
p
is an abelian group, so
(2.4)
Inv(C) =
Y
Inv(Cp ) = E.
p
Thus,
(2.5)
G∼
= C ⋊ Inv(C).
Definition 2.6. For a profinite group Γ we denote by Γ′ its profinite commutator, which is the closed subgroup of Γ generated by {[a, b] | a, b ∈ Γ}.
It follows from Proposition 2.3 that
(2.6)
G′ = C = {[a, b] | a, b ∈ G}
so the following first-order sentence holds in G
(2.7)
∀a, b, c, d ∃r, s [a, b][c, d] = [r, s].
Remark 2.7. By (2.2), (2.6) the following first-order sentence is valid in G
(2.8)
∀g ∃h, k g 2 = [h, k].
Remark 2.8. It follows from Remark 2.4 that C is its own centralizer in G.
In view of (2.6), this is tantamount to the following first-order sentence
!
∀y, z x[y, z]x−1 = [y, z] −→ ∃a, b x = [a, b] .
(2.9)
∀x
Remark 2.9. Fix an odd prime p. We can think of ǫp , ρp as elements of E, C
respectively, and thus also as elements of G. The first-order sentence
(2.10)
∃x ∀y, z x[y, z]x−1 = [y, z]−1 ←→ [y, z]p = 1
holds in G since we can take x = ǫp .
AN AXIOMATIZABLE PROFINITE GROUP WITH INFINITELY MANY OPEN SUBGROUPS OF INDEX 2
3
Definition 2.10. We say that profinite groups Γ, Λ are elementarily equivalent if they have the same first-order theory, and denote this by Γ ≡ Λ.
3. The proof of Theorem 1.1
e be a profinite group for which G ≡ G.
e Set
Let G
(3.1)
e ··= {[g, h] | g, h ∈ G}
e
C
e of the compact space G
e2 under the
and note that it is the image in G
2
e
e
e is
continuous map sending (g, h) ∈ G to [g, h] ∈ G. It follows that C
e By (2.7) C
e is a subgroup of G.
e
compact, and thus closed in G.
e
Let us now show that C ≡ C. For that take a first-order sentence ϕ that
holds in C. For every variable x that appears in ϕ, replace each appearance
of Qx by Qx1 , x2 where Q ∈ {∀, ∃} and x1 , x2 are new variables. Furthermore, replace any instance of x in any atomic formula in ϕ by [x1 , x2 ] and
denote the resulting first-order sentence by ψ. It follows from (2.6) that ψ
e By (3.1), ϕ holds in C
e as required.
holds in G, and thus also in G.
e and by (2.8) every element of G/
e C
e is of order
By [3, Theorem A], C ∼
=C
∼
e
e
e
e
dividing 2, so |G/C| is prime to |C| = |C|. Since C = C is abelian and
e the action by conjugation of G
e on C
e gives rise to a continuous
normal in G,
e
e
e
homomorphism τ : G/C → Inv(C). By the Schur-Zassenhaus theorem (see
[1, Lemma 22.10.1]) we get that
(3.2)
e∼
e ⋊τ G/
e C.
e
G
=C
By Remark 2.8 τ is injective, and in order to see that it is also surjective,
e with Inv(C). A generating set for Inv(C)
e is thus given
first identify Inv(C)
by {ǫp }p . By Remark 2.9 the image of τ contains ǫp for each odd prime p,
so τ is a surjection, and thus an isomorphism. We conclude that
(3.3)
2.5
3.2
e ⋊ Inv(C)
e ∼
e ⋊τ G/
e C
e ∼
e
G ∼
= C ⋊ Inv(C) ∼
=C
=C
= G.
Acknowledgments
We would like to sincerely thank Arno Fehm for telling us about the
question that motivated this work, and for many helpful discussions.
References
[1] M. D. Fried, M. Jarden, Field Arithmetic, Third Edition, revised by M. Jarden,
Ergebnisse der Mathematik, 3, 11, Springer, Heidelberg, 2008.
[2] P. Helbig, On small profinite groups, preprint, 2015.
[3] M. Jarden, A. Lubotzky, Elementary equivalence of profinite groups, Bull. London
Math. Soc. 40 (2008), 887-896.
4
OR BEN PORATH AND MARK SHUSTERMAN
Raymond and Beverly Sackler School of Mathematical Sciences, Tel-Aviv
University, Tel-Aviv, Israel
E-mail address: [email protected]
Raymond and Beverly Sackler School of Mathematical Sciences, Tel-Aviv
University, Tel-Aviv, Israel
E-mail address: [email protected]
| 4math.GR
|
Computing All Distinct Squares in Linear Time for Integer
Alphabets
Hideo Bannai1 , Shunsuke Inenaga1 , and Dominik Köppl2
arXiv:1610.03421v2 [cs.DS] 20 Feb 2017
1
Department of Informatics, Kyushu University, Japan,
[email protected], [email protected]
2
Department of Computer Science, TU Dortmund, Germany,
[email protected]
February 21, 2017
Abstract
Given a string on an integer alphabet, we present an algorithm that computes the set of all distinct
squares belonging to this string in time linear to the string length. As an application, we show how
to compute the tree topology of the minimal augmented suffix tree in linear time. Asides from that,
we elaborate an algorithm computing the longest previous table in a succinct representation using
compressed working space.
1
Introduction
A square is a string of the form SS, where S is some non-empty string. It is well-known that a string of
length n contains at most n2 /4 squares. This bound is the number of all squares, i.e., we count multiple
occurrences of the same square, too. If we consider the number of all distinct squares, i.e., we count
exactly one occurrence of each square, then it becomes linear in n: The first linear upper bound was
given by Fraenkel and Simpson [17] who proved that a string of length n contains at most 2n distinct
squares. Later, Ilie [25] showed the slightly improved bound of 2n − Θ(lg n). Recently, Deza et al. [9]
refined this bound to ⌊11n/6⌋. In the light of these results one may wonder whether future results will
“converge” to the upper bound of n: The distinct square conjecture [17, 26] is that a string of length n
contains at most n distinct squares; this number is known to be independent of the alphabet size [33].
However, there still is a big gap between the best known bound and the conjecture. While studying a
combinatorial problem like this, it is natural to think about ways to actually compute the exact number.
This article focuses on a computational problem on distinct squares, namely, we wish to compute
(a compact representation of) the set of all distinct squares in a given string. Gusfield and Stoye [22]
tackled this problem with an algorithm running in O(nσT ) time, where σT denotes the number of different
characters contained in the input text T of length n. Although its running time is optimal O(n) for a
constant alphabet, it becomes O n2 for a large alphabet since σT can be as large as O(n).
We present an algorithm (Sec. 4) that computes this set in O(n) time for a given string of length n
over an integer alphabet of size nO(1) . Like Gusfield and Stoye, we can use the computed set to decorate
1
the suffix tree with all squares (Sec. 6). As an application, we provide an algorithm that computes
the tree topology of the minimal augmented suffix tree [1] in linear time (Sec. 7). The fastest known
algorithm computing this tree topology takes O(n lg n) time [4].
For our approach, we additionally need the longest previous factor table [18, 7]. As a side result of
independent interest, we show in Sec. 3 how to store this table in 2n + o(n) bits, and give an algorithm
that computes it using compressed working space.
2
Definitions
Our computational model is the word RAM model with word size Ω(lg n) for some natural number n.
Let Σ denote an integer alphabet of size σ = |Σ| = nO(1) . An element w in Σ∗ is called a string, and |w|
denotes its length. We denote the i-th character of w with w[i], for 1 ≤ i ≤ |w|. When w is represented
by the concatenation of x, y, z ∈ Σ∗ , i.e., w = xyz, then x, y and z are called a prefix, substring and
suffix of w, respectively. For any 1 ≤ i ≤ j ≤ |w|, let w[i..j] denote the substring of w that begins at
position i and ends at position j in w.
The longest common prefix (LCP) of two strings is the longest prefix shared by both strings.
The longest common extension (LCE) query asks for the longest common prefix of two suffixes of
the same string. The time for an LCE query is denoted by tLCE .
A factorization of a string T is a sequence of non-empty substrings of T such that the concatenations
of the substrings is T . Each substring is called a factor.
In the rest of this paper, we take a string T of length n > 0, and call it the text. We assume that
T [n] = $ is a special character that appears nowhere else in T , so that no suffix of T is a prefix of
another suffix of T . We further assume that T is read-only; accessing a character costs constant time.
We sometimes need the reverse of T , which is given by the concatenation T [n − 1] · · · T [1] · T [n] =
T [n − 1] · · · T [1]$.
The suffix tree of T is the tree obtained by compacting the trie of all suffixes of T ; it has n leaves and
at most n internal nodes. The leaf corresponding to the i-th suffix is labeled with i. Each edge e stores
a string that is called the edge label of e. The string label of a node v is defined as the concatenation
of all edge labels on the path from the root to v; the string depth of a node is the length of its string
label.
SA and ISA denote the suffix array and the inverse suffix array of T , respectively [32]. The access
time to an element of SA is denoted by tSA . LCP is an array such that LCP[i] is the length of the
longest common prefix of T [SA[i]..n] and T [SA[i − 1]..n] for i = 2, . . . , n. For our convenience, we define
LCP[1] := 0.
A range minimum query (RMQ) asks for the smallest value in an integer array for a given range.
There are data structures that can answer an RMQ on an integer array of length n in constant time while
taking 2n+o(n) bits of space [15]. An LCE query for the suffixes T [s..n] and T [t..n] can be answered with
an RMQ data structure on LCP with the range [min(ISA[s], ISA[t]) + 1.. max(ISA[s], ISA[t])] in constant
time.
A bit vector is a string on a binary alphabet. A select query on a bit vector asks the position of
the i-th ‘0’ or ‘1’ in the bit vector. There is a data structure that can be built in O(n) time with O(n)
bits of working space such that it takes o(n) bits on top of the bit vector, and can answer a select query
in constant time [5].
We identify occurrences of substrings with their position and length in the text, i.e., if x is a substring
2
i
1
2
3
4
5
6
7
8
9
10
11
12
T
a
b
a
b
a
a
a
b
a
b
a
$
SA
12
11
5
6
9
3
7
1
10
4
8
2
LCP
0
0
1
2
1
3
3
5
0
2
2
4
PLCP
5
4
3
2
1
2
3
2
1
0
0
0
LPF
0
0
3
2
1
2
5
4
3
2
1
0
Figure 1:
The
arrays SA, LCP,
PLCP and LPF
of the running
example.
of T , then there is a 1 ≤ i ≤ n and a 0 ≤ ℓ ≤ n − i + 1 such that T [i..i + ℓ − 1] = x. In the
following, we will represent the occurrences of substrings by tuples of position and length. When storing
these tuples in a set, we call the set distinct, if there are no two tuples (i, ℓ) and (i′ , ℓ) such that
T [i..i + ℓ − 1] = T [i′ ..i′ + ℓ − 1]. A special kind of substring is a square: A square is a string of the form
SS for S ∈ Σ+ ; we call S and |S| the root and the period of the square SS, respectively. Like with
substrings, we can generate a set containing some occurrences of squares. A set of all distinct squares
is a distinct set of occurrences of squares that is maximal under inclusion.
To compute a set of all distinct squares is the main focus of this paper. We will tackle this problem
theoretically in Sec. 4, and practically in Sec. 5. Finally, we give two applications of this problem in
Sec. 6 and Sec. 7. But before all that, we start with the study of the LPF array needed for our approach
computing all distinct squares:
3
A Compact Representation of the LPF Array
The longest previous factor table LPF of T is formally defined as
LPF[j] := max {ℓ | there exists an i ∈ [1..j − 1] such that T [i, i + ℓ − 1] = T [j, j + ℓ − 1]} .
It is useful for computing the Lempel-Ziv factorization of T = f1 · · · fz , which is defined as fi =
Pi−1
T [k..k + max(1, LPF[k])] with k := j=1 |fj | + 1 for 1 ≤ i ≤ z.
0 0 3 2 1 2 5 4 3 2 1 0
In the following, we will use the text T = ababaaababa$ as our running example whose LPF array is
represented by the small numbers above the characters. The Lempel-Ziv factorization of T is given by
1
2
3
4
5
6
a|b|aba|aa|baba|$, where the small numbers denote the factor indices, and the vertical bars denote the
factor borders. Fig. 1 shows SA, LPF and other used array data structures of our running example.
Corollary 3.1. Given LPF, we can compute the Lempel-Ziv factorization in O(n) time. If the factorization consists of z factors, the factorization can be represented by an array of z lg n bits, where the x-th
entry stores the beginning of the x-th factor.
Alternatively, it can be represented by a bit vector of length n in which we mark the factor beginnings.
A select data structure on top of the bit vector can return the length and the position of a factor in
constant time.
Since we will need LPF in Sec. 4, we are interested in the time and space bounds for computing LPF.
We start with the (to the best of our knowledge) state of the art algorithm with respect to time and
space requirements.
Lemma 3.2 ([8, Theorem 1]). Given SA and LCP, we can compute LPF in O(ntSA ) time. Besides the
output space of n lg n bits, we only need constant working space.
3
Apart from this algorithm, we are only aware of some practical improvements [36, 28].
Let us consider the size of LCP needed in Lem. 3.2. Sadakane [37] showed a 2n + o(n)-bits representation of LCP. Thereto he stores the array PLCP defined as PLCP[SA[i]] = LCP[i] in a bit vector in the
following way (also described in [13]): Since PLCP[1]+ 1, PLCP[2]+ 2, . . . , PLCP[n]+ n is a non-decreasing
sequence with 1 ≤ PLCP[1] + 1 ≤ PLCP[n] + n = n (PLCP[i] ≤ n − i since the terminal $ is a unique
character in T ) the values I[1] := PLCP[1] and I[i] := PLCP[i] − PLCP[i − 1] + 1 (2 ≤ i ≤ n) are nonnegative. By writing I[i] in the unary code 0I[i] 1 to a bit vector S subsequently for each 2 ≤ i ≤ n, we
Pn
can compute PLCP[i] = select1 (S, i) − 2i and LCP[i] = select1 (S, SA[i]) − 2SA[i]. Moreover, i=1 I[i] ≤ n
and therefore S is of length at most 2n.
By using Sadakane’s LCP-representation, we get LPF with the algorithm of Crochemore et al. [8] in
the following time and space bounds:
Corollary 3.3. Having SA and LCP stored in n lg n bits (this allows tSA = O(1)) and 2n + o(n) bits,
respectively, we can compute LPF with O(lg n) additional bits of working space (not counting the space
for LPF) in O(n) time.
By plugging in a suffix array construction algorithm like the in-place construction algorithm by Li
et al. [31], we get the bounds shown in Fig. 2 (since we can build LCP in-place after having SA [23]).
Although this result seems compelling, this approach stores SA and LPF in plain arrays (the former
for getting constant time access). In the following, we will show that the LPF array can be stored more
compactly. We start with a new representation of LPF, for which we use the same trick as for PLCP due
to the following property (which is crucial for squeezing PLCP into 2n + o(n) bits).
Lemma 3.4. n − j ≥ LPF[j] ≥ LPF[j − 1] − 1 for 2 ≤ j ≤ n.
Proof. There is an i with 1 ≤ i < j − 1 such that T [i..i + LPF[j − 1] − 1] = T [j − 1..j − 1 + LPF[j − 1] − 1].
Hence T [i + 1..i + LPF[j − 1] − 1] = T [j..j − 1 + LPF[j − 1] − 1].
We conclude that the sequence LPF[1] + 1, LPF[2] + 2, . . . , LPF[n] + n is non-decreasing with 1 ≤
LPF[1] + 1 ≤ LPF[n] + n ≤ n. We immediately get:
Corollary 3.5. LPF can be represented by a bit vector with a select data structure such that accessing
an LPF value can be performed in constant time. The data structures use 2n + o(n) bits.
To get a better working space bound, we have to come up with a new algorithm since the algorithm
of Lem. 3.2 creates a plain array to get constant time random write-access for computing the entries of
LPF. To this end, we present two algorithms that compute LPF in this representation with the aid of the
suffix tree. The two algorithms are derivatives of the algorithms [30, 16] that compute the Lempel-Ziv
factorization, either in O(n lg lg σ) time using O(n lg σ) bits, or in O n/ǫ2 time using (1+ǫ)n lg n+O(n)
bits, for a constant 0 < ǫ ≤ 1. The current bottleneck of both algorithms is the suffix tree implementation
with respect to space and time. Due to current achievements [35, 31], the algorithms now run in O(n)
time using O(n lg σ) bits, or in O(n/ǫ) time using (1 + ǫ)n lg n + O(n) bits, respectively.
We aim at building the LPF-representation of Cor. 3.5 directly such that we do not need to allocate
the plain LPF array using n lg n bits in the first place. To this end we create a bit vector of length 2n
and store the LPF values in it successively. In more detail, we follow the description of the Lempel-Ziv
factorization algorithms presented in [30, 16]. There, the algorithms are divided into several passes. In
each pass we successively visit leaves in text order (determined by the labels of the leaves). To compute
LPF, we only have to do a single pass. Similarly to the first passes of the two Lempel-Ziv algorithms,
4
algorithm
time
working space
|LPF|
Lem. 3.2,[8]
O(ntSA )
|SA| + |LCP| + O(lg n)
n lg n
Cor. 3.3,[31, 23]
O(n)
n lg n + 2n + O(lg n)
n lg n
Lem. 3.6,[30]
O(n/ǫ)
(1 + ǫ)n lg n + O(n)
2n + o(n)
Lem. 3.6,[16]
O(ntSA )
O(n lg σ)
2n + o(n)
Figure 2: Algorithms
computing
LPF;
space is counted in
bits.
The output
space |LPF| is not
considered as working
space. 0 < ǫ ≤ 1 is a
constant.
we use a bit vector BV to mark already visited internal nodes. On visiting a leaf we climb up the tree
until reaching the root or an already marked node. In the former case (we climbed up to the root) we
output zero. In the latter case, we output the string depth of the marked node. By doing so, we have
computed LPF[1..j] after having processed the leaf with label j.
Lemma 3.6. We can compute LPF in O(ntSA ) time with O(n lg σ) bits of working space, or in O(n/ǫ)
time using (1 + ǫ)n lg n + O(n) bits of working space, for a constant 0 < ǫ ≤ 1. Both variants include
the space of the output in their working spaces.
Proof. Computing the string depth of a node needs access to an RMQ data structure of LCP, and an
access to SA. Both accesses can be emulated by the compressed suffix array in tSA time, given that we
have computed PLCP in the above representation.
4
Computing the Set of All Distinct Squares
Given a string T , our goal is to compute all distinct squares of T . Thereto we return a set of pairs, where
each pair (s, ℓ) consists of a starting position s and a length ℓ such that T [s..s + ℓ − 1] is the leftmost
occurrence of a square. The size of this set is linear due to
Lemma 4.1 (Fraenkel and Simpson [17]). A string of length n can contain at most 2n distinct squares.
We follow the approach of Gusfield and Stoye [22]. Their idea is to compute a set of squares (the set
stores pairs of position and length like described in Sec. 2)1 with which they can generate all distinct
squares. They call this set of squares a leftmost covering set. A leftmost covering set obeys the
property that every square of the text can be constructed by right-rotating a square of this set. A
square (k, ℓ) is constructed by right-rotating a square (i, ℓ) with i ≤ k iff each tuple (i + j, ℓ) with
1 ≤ j ≤ k − i represents a square T [i + j..i + ℓ + j − 1] = T [i + j..i + ℓ − 1]T [i..i + j − 1].
The set of the leftmost occurrences of all squares is a set of all distinct squares. Unfortunately, the
leftmost covering set computed in [22] is not necessarily a set of all distinct squares since (a) it does not
have to be distinct, and (b) a square might be missing that can be constructed by right-rotating a square
of the computed leftmost covering set.
For illustration, the squares of our running example T = ababaaababa$ are highlighted with bars.
The set of all squares is {(1, 4), (2, 4), (5, 2), (6, 2), (7, 4), (8, 4)}. If we take the leftmost occurrences of
all squares, we get {(1, 4), (2, 4), (5, 2)}; this set comprises all squares marked by the solid bars, i.e., the
dotted bars correspond to occurrences of squares that are not leftmost. In this example, the dotted
bars form the set {(6, 2), (7, 4), (8, 4)}, which is a set of all distinct squares. A leftmost covering set is
{(1, 4), (5, 2)}.
1 It differs to the set we want to compute by the fact that they allow, among others, occurrences of the same square in
their set.
5
q
ℓL ℓR ℓ ℓR
L
fx
p
q
ℓL
fx+1
fx−1
ℓR ℓ
p
L
ℓR
fx
Figure 3: Search for squares on Lempel-Ziv borders. The left image corresponds to squares of type
Lem. 4.2(a), the right image to the type Lem. 4.2(b). Given two adjacent factors, we determine a
position q that is p positions away from the border (the direction is determined by the type of square
we want to search for). By two LCE queries we can determine the lengths ℓL and ℓR that indicate the
presence of a square if ℓL + ℓR ≥ p.
Our goal is to compute the set of all leftmost occurrences directly by modifying the algorithm of [22].
To this end, we briefly review how their approach works: They compute their leftmost covering set by
examining the borders between all Lempel-Ziv factors f1 · · · fz = T . That is because of
Lemma 4.2 ([22, Theorem 5]). The leftmost occurrence of a square T [i..i + 2p − 1] touches at least two
Lempel-Ziv factors. Let fx be the factor that contains the center of the square i + p − 1. Then either
(a) the square has its left end (position i) inside fx and its right end (position i + 2p − 1) inside fx+1 ,
or
(b) the left end of the square extends into fx−1 (or even further left). The right end can be contained
inside fx or fx+1 .
Having a data structure for computing LCE queries on the text and on its inverse, they can probe
at the borders of two consecutive factors whether there is a square. Roughly speaking, they have to
check at most |fx | + |fx+1 | many periods at the borders of every two consecutive factors fx and fx+1
Pz
due to the above lemma. This gives x=1 tLCE (|fx | + |fx+1 |) = O(ntLCE ) time, during which they can
compute a leftmost covering set L. Fig. 3 visualizes how the checks are done. Applying the algorithm
on our running example will yield the set L = {(1, 4), (5, 2), (7, 4)}. To transform this set into a set of
all distinct squares, their algorithm runs the so-called Phase II that uses the suffix tree. It begins with
computing the locations of the squares belonging to a subset L′ ⊆ L in the suffix tree in O(n) time. This
subset L′ is still guaranteed to be a leftmost covering set. Finally, their algorithm computes all distinct
squares of the text by right-rotating the squares in L′ . In their algorithm, the right-rotations are done
by suffix link walks over the suffix tree. Their running time analysis is based on the fact that each node
has at most σT incoming suffix links, where σT denotes the number of different characters occurring in
the text T . Given that the number of distinct squares is linear, Phase II runs in O(nσT ) time.
In the following, we will present our modification of the above sketched algorithm. To speed up
the computation, we discard the idea of using the suffix links for right-rotating squares (i.e., we skip
Phase II completely). Instead, we compute a list of all distinct squares directly. To this end, we show
a modification of the sketched algorithm such that it outputs this list sorted first by the lengths (of the
squares), and second by the starting position.
First, we want to show that we can change the original algorithm to output its leftmost covering
set in the above described order. To this end, we iterate over all possible periods, and search not
yet reported squares at all Lempel-Ziv borders, for each period. To achieve linear running time, we
want to skip a factor fx when the period becomes longer than |fx | + |fx+1 |. We can do this with an
array Z of z lg z bits that is zero initialized. When the period p becomes longer than |fx | + |fx+1 |, we
write Z[x] ← min {y > x : |fy | + |fy+1 | ≥ p} such that Z[x] refers to the next factor whose length is
6
sufficiently large. By doing so, if Z[x] 6= 0, we can skip all factors fy with y ∈ [x..Z[x] − 1] in constant
time. This allows us running the modified algorithm still in linear time.
We have to show that the modified algorithm still computes the same set. To this end, let us fix
the period p (over which we iterate in the outer loop). By [22, Lemma 7], processing squares satisfying
Lem. 4.2(a) before processing squares satisfying Lem. 4.2(b) (all squares have the same period p) produces
the desired output for period p.
Finally, we show the modification that computes all distinct squares (instead of the original leftmost
covering set). On a high level, we use an RMQ data structure on LPF to filter already found squares. The
filtered squares are used to determine the leftmost occurrences of all squares by right-rotation. In more
detail, we modify Algorithm 1 of [22] by filtering the squares in the following way (see Algorithm 1): For
each period p, we use a bit vector B marking the beginning positions of all found squares with period p.
On reporting a square, we additionally mark its starting position in B. By doing so, an invariant of the
algorithm below is that all right-rotated squares of a marked square are already reported.
Let us assume that we are searching for the leftmost occurrences of all squares whose periods are
equal to p. Given the starting position s of a square returned by [22, Algorithm 1], we consider the
square (s, 2p) and its right-rotations as candidates of our list: If B[s] = 1, then this square and its
right-rotations have already been reported. Otherwise, we report (s, 2p) if LPF[s] < 2p. In order to
find the leftmost occurrences of all not yet reported right-rotated squares efficiently, we first compute
the rightmost position e of the repetition of period p containing the square (s, 2p) by an LCE query.
Second, we check the interval I := [s + 1.. min(s + p − 1, e − 2p + 1)] for the starting positions of the
squares whose LPF values are less than 2p. To this end, we perform an RMQ query on LPF to find the
position j whose LPF value is minimal in I. If j > 2p, then all squares with period p in the considered
range have already been found, i.e., there is no leftmost occurrence of a square with the period p in this
range. Otherwise, we report (j, 2p) and recursively search for the text position with the minimal LPF
value within the intervals [s + 1..j − 1] and [j + 1.. min(s + p − 1, e − 2p + 1)]. In overall, the time of
the recursion is bounded by twice of the number of distinct squares starting in the interval I, since a
recursion step terminates if it could not report any square.
Theorem 4.3. Given an LCE data structure with tLCE access time and LPF, we can compute all distinct
squares in O(ntLCE + occ) = O(ntLCE ) time, where occ is the number of distinct squares.
Proof. We show that the returned list is the list of all distinct squares. No square occurs in the list
twice since we only report the occurrence of a square (i, ℓ) if LPF[i] < ℓ. Assume that there is a square
missing in the list; let (i, ℓ) be its leftmost occurrence. There is a square (j, ℓ) reported by the (original)
algorithm [22] such that i − ℓ/2 < j ≤ i and right-rotating (j, ℓ) yields (i, ℓ). Since we right-rotate all
found squares, we obviously have reported (j, ℓ).
The occ term in the running time is dominated by the ntLCE term due to Lem. 4.1.
5
Practical Evaluation
We have implemented the algorithm computing the leftmost occurrences of all squares in C++11 [29]. The
primary focus was on the execution time, rather than on a small memory footprint: We have deliberately
chosen plain 32-bit integer arrays for storing all array data structures like SA, LCP and LPF. These data
structures are constructed as follows: First, we generate SA with divsufsort [34]. Subsequently, we
generate LCP with the Φ-algorithm [27], and LPF with the simple algorithm of [8, Proposition 1]. Finally,
we use the bit vector class and the RMQ data structure provided by the sdsl-lite library [20]. In practice,
7
collection
pc-dblp.xml
pc-dna
pc-english
pc-proteins
pc-sources
pcr-cere
pcr-einstein.en
pcr-kernel
pcr-para
σ
maxi LCP[i]
avgLCP
z
maxx |fx |
maxx |fx fx+1 |
|occ|
time
97
17
226
26
231
6
125
161
6
1084
97,979
987,770
45,704
307,871
175,655
935,920
2,755,550
72,544
44
60
9390
278
373
3541
45,983
149,872
2268
7,035,342
13,970,040
13,971,134
20,875,097
11,542,200
1,446,793
49,575
774,532
1,926,563
1060
97,966
987,766
45,703
307,871
175,643
906,995
2,755,550
70,680
1265
97,982
1,094,108
67,809
307,884
185,362
1,634,034
2,755,556
73,735
7412
132,594
13,408
3,108,339
339,818
47,081
18,192,737
9258
37,391
70
310
2639
245
792
535
3953
6608
265
Table 1: Practical evaluation of the algorithm computing all distinct squares on the datasets described in
Sec. 5. Execution time is in seconds. It is the median of several conducted experiments, whose variance
in time was small. We needed approx. 5.73 GB of RAM for each instance. The expression avgLCP is the
average of all LCP values, and z is the number of Lempel-Ziv factors.
it makes sense to use an RMQ only for very large LCP values and periods (i.e., RMQs on LPF) due to
its long execution time. For small values, we naively compared characters, or scanned LPF linearly.
We ran the algorithm on all 200MiB collections of the Pizza&Chili Corpus [12]. The Pizza&Chili
Corpus is divided in a real text corpus with the prefix pc, and in a repetitive corpus with the prefix pcr. The experiments were conducted on a machine with 32 GB of RAM and an Intel Xeon
R
R
CPU E3-1271 v3. The operating system was a 64-bit version of Ubuntu Linux 14.04 with the kernel
version 3.13. We used a single execution thread for the experiments. The source code was compiled
using the GNU compiler g++ 6.2.0 with the compile flags -O3 -march=native -DNDEBUG.
Table 1 shows the running times of the algorithm on the described datasets. It looks like that
large factors tend to slow down the computation, since the algorithm has to check all periods up to
maxx (|fx | + |fx+1 |). This seems to have more impact on the running time than the number of LempelZiv factors z.
6
Decorating the Suffix Tree with All Squares
Gusfield and Stoye described a representation of the set of all distinct squares by a decoration of the
suffix tree, like the highlighted nodes (additionally annotated with its respective square) shown in the
suffix tree of our running example below. This representation asks for a set of tuples of the form (node,
length) such that each square T [i..i + ℓ − 1] is represented by a tuple (v, ℓ), where v is the highest node
whose string label has T [i..i + ℓ − 1] as a (not necessarily proper) prefix.
We show that we can compute this set of tuples
1
in linear time by applying the Phase II algorithm dea
$
b
scribed in Sec. 4 to our computed set of all distinct
12
3
a
a
$
b
5,aa
squares. The Phase II algorithm takes a list Li storing
11 5
14
a
a b
$ a
b
squares starting at text position i, for each 1 ≤ i ≤ n.
5 6
8
10 4
a
$ a
b
Each of these lists has to be sorted in descending order
17,baba
9 3
17
a
$ a
with respect to the squares’ lengths. It is easy to adapt
11,abab
11
8 2
$ a
our algorithm to produce these lists: On reporting a
7 1
square (i, ℓ), we insert it at the front of Li . By doing so, we can fill the lists without sorting, since we
iterate over the period length in the outer loop, while we iterate over all Lempel-Ziv factors in the inner
loop.
Finally, we can conduct Phase II. In the original version, the goal of Phase II was to decorate the suffix
tree with the endpoints of a subset of the original leftmost covering set. We will show that performing
8
exactly the same operations with the set of the leftmost occurrences of all squares will decorate the suffix
tree with all squares directly. In more detail, we first augment the suffix tree leaf having label i with the
list Li , for each 1 ≤ i ≤ n. Subsequently, we follow Gusfield and Stoye [22] by processing every node of
the suffix tree with a bottom-up traversal. During this traversal we propagate the lists of squares from
the leaves up to the root: An internal node u inherits the list of the child whose subtree contains the
leaf with the smallest label among all leaves in the subtree rooted at u. If the edge to the parent node
contains the ending position of one or more squares in the list (these candidates are stored at the front
of the list), we decorate the edge with these squares, and pop them off from the list. By [22, Theorem
8], there is no square of the set L′ (defined in Sec. 4) neglected during the bottom-top traversal. The
same holds if we exchange L′ with our computed set of all distinct squares:
Lemma 6.1. By feeding the algorithm of Phase II with the above constructed lists Li containing the
leftmost occurrences of the squares starting at the text position i, it will decorate the suffix tree with all
distinct squares.
Proof. We adapt the algorithm of Sec. 4 to build the lists Li . These lists contain the leftmost occurrences
of all squares. In the following we show that no square is left out during the bottom-up traversal. Let us
take a suffix tree node u with its children v and w. Without loss of generality, assume that the smallest
label among all leaves contained in the subtree of v is smaller than the label of every leaf contained
in w’s subtree. For the sake of contradiction, assume that the list of w contains the occurrence of a
square (i, ℓ) at the time when we pass the list of v to its parent u. The length ℓ is smaller than v’s string
depth, otherwise it would already have been popped off from the list. But since v’s subtree contains a
leaf whose label j is the smallest among all labels contained in the subtree of w, the square occurs before
at T [j..j + ℓ − 1] = T [i..i + ℓ − 1], a contradiction to the distinctness.
This concludes the correctness of the modified algorithm. We immediately get:
Theorem 6.2. Given LPF, an LCE data structure on the reversed text, and the suffix tree of T , we can
decorate the suffix tree with all squares of the text in O(ntLCE ) time. Asides from these data structures,
we use (occ + n) lg n + z lg z + min(n + o(n) , z lg n) + O(lg n) bits of working space.
Proof. We need (occ + n) lg n bits for storing the lists Li (occ lg n bits for storing the lengths of all
squares in an integer array, and n lg n bits for the pointers to the first element of each list). An LCE
query on the text can be answered by the string depth of a lowest common ancestor in the suffix tree;
most representations can answer string depth and lowest ancestor queries in constant time. The array Z
uses z lg z bits. The Lempel-Ziv factors are represented as in Cor. 3.1.
Corollary 6.3. We can compute the suffix tree and decorate it with all squares of the text in O(n/ǫ)
time using (3n + occ + 2nǫ) lg n + z lg z + O(n) bits, for a constant 0 < ǫ ≤ 1.
Proof. We use Lem. 3.6 to store SA, ISA, LCP, and LPF in (1 + ǫ)n lg n + O(n) bits. Subsequently, we
build an RMQ data structure on LCP such that LCE queries can be answered in constant time. We
additionally need the suffix array, its inverse, and the LCP array (with an RMQ data structure) of the
reversed text to answer LCE queries on the reversed text. Finally, we equip LPF with an RMQ data
structure for the right-rotations.
The values in the lists (i.e., the lengths of the squares starting at a specific position) can be stored in
Pn
Elias-Fano coding [11, 10]. If the list Li stores mi elements, then 2occ + i=1 (mi ⌈lg(n/mi )⌉) + o(occ)
bits are needed to represent the content of all lists. It is easy to implement the popping of the first
9
value from a list with this representation, given that we store an offset value and a pointer to the current
beginning of each list.
As an application, we consider the common squares problem: Given a set of non-empty strings with
a total length n, we want to find all squares that occur in every string in O(n) time. We solve this
problem by first decorating the generalized suffix tree built on all strings with the distinct squares of all
strings. Subsequently, we apply the O(n) time solution of Hui [24] that annotates each internal suffix
tree node v with the number of strings that contain v’s string label. This solves our problem since we
can simply report all squares corresponding to nodes whose string labels are found in all strings. This
also solves the problem asking for the longest common square of all strings in O(n) time, analogously to
the longest common substring problem [21].
Finally, the last section is dedicated to another application of our suffix tree decoration:
7
Computing the Tree Topology of the MAST in Linear Time
A modification of the suffix tree is the minimal aug-
$
12
a
$
11 15
a b
5 6
a
73
71
b
a
14
4
mented suffix tree (MAST) [1]. This tree can answer the number of the non-overlapping occurrences of
b
a substring in T . To this end, it adds some nodes on
4
a
$ a
b
the unary paths of the suffix tree, and augments each
28
10 4
a
$ a
b
internal node with the number of the non-overlapping
9 3
17
2
a
$ a
occurrences of its string label, like in the left tree (the
11
2
8 2
a
$
leaves are shown with their suffix number, each leaf rep7 1
resents a substring that occurs exactly once). The newly created nodes obey the property that the stored
numbers of the MAST nodes on the path from a leaf to the root are strictly increasing. Given a pattern
of length m, the MAST can answer the number of the non-overlapping occurrences of the pattern in
O(m) time. To this end, we traverse the MAST from the root downwards while reading the pattern from
the edge labels. If there is a mismatch, the pattern cannot be found in the text. Otherwise, we end at
reading the label of an edge (u, v); let u be v’s parent. Then the node v is the highest node whose string
label has the pattern as a (not necessarily strict) prefix. By returning the number stored in v we are
done, since this number is the number of non-overlapping occurrences of the pattern in the text. The
MAST can be built in O(n lg n) time [4].
In this section, we show how to compute the tree topology of the MAST in linear time. The topology
of the MAST differs to the suffix tree topology by the fact that the root of each square is the string
label of a MAST node. Our goal is to compute a list storing the information about where to insert the
missing nodes. The list stores tuples consisting of a node v and a length ℓ; we use this information later
to create a new node w splitting the edge (u, v) into (u, w) and (w, v), where u is the (former) parent
of v. We will label (w, v) with the last ℓ characters and (u, v) with the rest of the characters of the edge
label of (u, v).
To this end, we explore the suffix tree with a top-down traversal while locating the roots of the squares
in the order of their lengths. To locate the roots of the squares in linear time we use two data structures.
The first one is a semi-dynamic lowest marked ancestor data structure [19]. It allows marking a node
and querying for the lowest marked ancestor of a node in constant amortized time. We will use it to
mark the area in the suffix tree that has already been processed for finding the roots of the squares.
The second data structure is the list of tuples of the form (node, length) computed in Sec. 6, where
10
each tuple (v, ℓ) consists of the length ℓ of a square T [i..i + ℓ − 1] and the highest suffix tree node v whose
string label has T [i..i + ℓ − 1] as a (not necessarily proper) prefix. We sort this list, which we now call L,
with respect to the square lengths with a linear time integer sorting algorithm.
Finally, we explain the algorithm locating the roots of all squares. We successively process all tuples
of L, starting with the shortest square length. Given a tuple of L containing the node v and the length ℓ,
we want to split an edge on the path from the root to v and insert a new node whose string depth is
ℓ/2. To this end, we compute the lowest marked ancestor u of v. If u’s string depth is smaller than ℓ/2,
we mark all descendants of u whose string depths are smaller than ℓ/2, and additionally the children
of those nodes (this can be done by a DFS or a BFS). If we query for the lowest marked ancestor of u
again, we get an ancestor w whose string depth is at least ℓ/2, and whose parent has a string depth less
than ℓ/2. We report w and the subtraction of ℓ/2 from w’s string depth (if ℓ/2 is equal to the string
depth of w, then w’s string label is equal to the root of v’s string label, i.e., we do not have to report it).
If the suffix tree has a pointer-based representation, it is easy to add the new nodes by splitting each
edge (u, v), where v is a node contained in the output list.
Theorem 7.1. We can compute the tree topology of the MAST in linear time using linear number of
words.
Proof. By using the semi-dynamic lowest marked ancestor data structure, we visit a node as many times
as we have to insert nodes on the edge to its parent, plus one. This gives O(n + 2occ) = O(n) time.
Open Problems
It is left open to compute the number of the non-overlapping occurrences of the string labels of the
MAST nodes in linear time. Since RMQ data structures are practically slow, we wonder whether we can
avoid the use of any RMQ without loosing linear running time.
subsection*Acknowledgements This work was mainly done during a visit at the Kyushu University
in Japan, supported by the Japan Society for the Promotion of Science (JSPS). We thank Thomas
Schwentick for the question whether we can run our algorithm online, for which we provided a solution
in Appendix B.
References
[1] A. Apostolico and F. P. Preparata. Data structures and algorithms for the string statistics problem.
Algorithmica, 15(5):481–494, 1996.
[2] P. Beame and F. E. Fich. Optimal bounds for the predecessor problem and related problems. J.
Comput. Syst. Sci., 65(1):38–72, 2002.
[3] A. Blumer, J. Blumer, D. Haussler, A. Ehrenfeucht, M. T. Chen, and J. I. Seiferas. The smallest
automaton recognizing the subwords of a text. Theor. Comput. Sci., 40:31–55, 1985.
[4] G. Brodal, R. Lyngsø, A. Östlin, and C. Pedersen. Solving the string statistics problem in time
O(n log n). In Automata, Languages and Programming, volume 2380 of LNCS, pages 728–739.
Springer, 2002.
[5] D. R. Clark. Compact Pat Trees. PhD thesis, University of Waterloo, Canada, 1996.
[6] R. Cole and R. Hariharan. Dynamic LCA queries on trees. SIAM J. Comput., 34(4):894–923, 2005.
11
[7] M. Crochemore and L. Ilie. Computing longest previous factor in linear time and applications. Inf.
Process. Lett., 106(2):75–80, 2008.
[8] M. Crochemore, L. Ilie, C. S. Iliopoulos, M. Kubica, W. Rytter, and T. Walen. LPF computation
revisited. In Proc. IWOCA, pages 158–169, 2009.
[9] A. Deza, F. Franek, and A. Thierry. How many double squares can a string contain? Discrete
Applied Mathematics, 180:52–69, 2015.
[10] P. Elias. Efficient storage and retrieval by content and address of static files. Journal of the ACM,
21:246–260, 1974.
[11] R. M. Fano. On the number of bits required to implement an associative memory. Memorandum
61, Computer Structures Group, Project MAC, 1971.
[12] P.
Ferragina
and
G.
Navarro.
The
Pizza
&
Chili
Corpus.
Available
at
http://pizzachili.di.unipi.it and http://pizzachili.dcc.uchile.cl, 2005.
[13] J. Fischer. Wee LCP. Inform. Process. Lett., 110(8–9):317–320, 2010.
[14] J. Fischer. Inducing the LCP-array. In Proc. WADS, volume 6844 of LNCS, pages 374–385. Springer,
2011.
[15] J. Fischer and V. Heun. Space efficient preprocessing schemes for range minimum queries on static
arrays. SIAM J. Comput., 40(2):465–492, 2011.
[16] J. Fischer, T. I, and D. Köppl. Lempel-Ziv computation in small space (LZ-CISS). In Proc. CPM,
volume 9133 of LNCS, pages 172–184. Springer, 2015.
[17] A. S. Fraenkel and J. Simpson. How many squares can a string contain? J. Comb. Theory, Ser. A,
82(1):112–120, 1998.
[18] F. Franek, J. Holub, W. F. Smyth, and X. Xiao. Computing quasi suffix arrays. Journal of Automata,
Languages and Combinatorics, 8(4):593–606, 2003.
[19] H. N. Gabow and R. E. Tarjan. A linear-time algorithm for a special case of disjoint set union. J.
Comput. Syst. Sci., 30(2):209–221, 1985.
[20] S. Gog, T. Beller, A. Moffat, and M. Petri. From theory to practice: Plug and play with succinct
data structures. In Proc. SEA, volume 8504 of LNCS, pages 326–337, 2014.
[21] D. Gusfield. Algorithms on Strings, Trees, and Sequences. Cambridge University Press, 1997.
[22] D. Gusfield and J. Stoye. Linear time algorithms for finding and representing all the tandem repeats
in a string. J. Comput. Syst. Sci., 69(4):525–546, 2004.
[23] W.-K. Hon and K. Sadakane. Space-economical algorithms for finding maximal unique matches. In
Proc. CPM, volume 2373 of LNCS, pages 144–152. Springer, 2002.
[24] L. C. K. Hui. Color set size problem with application to string matching. In Proc. CPM, volume
644 of LNCS, pages 230–243. Springer, 1992.
[25] L. Ilie. A note on the number of squares in a word. Theor. Comput. Sci., 380(3):373–376, 2007.
12
[26] N. Jonoska, F. Manea, and S. Seki. A stronger square conjecture on binary words. In Proc. SOFSEM
2014, volume 8327 of LNCS, pages 339–350. Springer, 2014.
[27] J. Kärkkäinen, G. Manzini, and S. J. Puglisi. Permuted longest-common-prefix array. In Proc.
CPM, volume 5577 of LNCS, pages 181–192. Springer, 2009.
[28] J. Kärkkäinen, D. Kempa, and S. J. Puglisi. Linear time Lempel-Ziv factorization: Simple, fast,
small. In Proc. CPM, volume 7922 of LNCS, pages 189–200. Springer, 2013.
[29] D.
Köppl.
Computing
all
distinct
squares
efficiently.
Available
at
https://github.com/koeppl/distinct_squares, 2017.
[30] D. Köppl and K. Sadakane. Lempel-Ziv computation in compressed space (LZ-CICS). In Proc.
DCC, pages 3–12. IEEE Computer Society, 2016.
[31] Z. Li, J. Li, and H. Huo. Optimal in-place suffix sorting. ArXiv CoRR, abs/1610.08305, 2016.
[32] U. Manber and E. W. Myers. Suffix arrays: A new method for on-line string searches. SIAM J.
Comput., 22(5):935–948, 1993.
[33] F. Manea and S. Seki. Square-density increasing mappings. In Proc. WORDS 2015, volume 9304
of LNCS, pages 160–169. Springer, 2015.
[34] Y. Mori. divsufsort. Available at https://github.com/y-256/libdivsufsort, 2015.
[35] J. Munro, G. Navarro, and Y. Nekrich. Space-efficient construction of compressed indexes in deterministic linear time. In Proc. SODA, pages 408–424. SIAM, 2017.
[36] E. Ohlebusch and S. Gog. Lempel-Ziv factorization revisited. In Proc. CPM, volume 6661 of LNCS,
pages 15–26. Springer, 2011.
[37] K. Sadakane. Compressed suffix trees with full functionality. Theory Comput. Syst, 41(4):589–607,
2007.
[38] Y. Ueki, Diptarama, M. Kurihara, Y. Matsuoka, K. Narisawa, R. Yoshinaka, H. Bannai, S. Inenaga,
and A. Shinohara. Longest common subsequence in at least k length order-isomorphic substrings.
In Proc. SOFSEM, volume 10139 of LNCS, pages 363–374. Springer, 2017.
[39] E. Ukkonen. On-line construction of suffix trees. Algorithmica, 14(3):249–260, 1995.
[40] P. Weiner. Linear pattern matching algorithms. In Proc. Annual Symp. on Switching and Automata
Theory, pages 1–11. IEEE Computer Society, 1973.
13
A
Observations
In [22, Line 6 of Algorithm 1b], the condition start + k < h1 has to be changed to start + k ≤ h1 .
Otherwise, the algorithm would find in T = abaabab$ only the square aa, but not abaaba.
B
Online Variant
In this section, we consider the online setting, where new characters are appended to the end of the text T .
Given the text T [1..i] up to position i with the Lempel-Ziv factorization f1 · · · fy = T , we consider computing the set of all distinct squares of f1 · · · fy−2 , i.e., up to the last two
factors. For this set-
Lempel-Ziv
p
2
ting, we show that we can compute the set of all distinct squares in O n min lg lg n/ lg lg lg n, lg n/ lg lg n
time using O(n) words of space. To this end, we adapt the algorithm of Theorem 4.3 to the online setting.
We need an algorithm computing LPF online, and a semi-dynamic LCE data structure (answering LCE
queries on the text and on the reversed text while supporting appending characters to the text).
The main idea of our solution is to build suffix trees with two online suffix tree construction algorithms.
The first is Ukkonen’s algorithm that computes the suffix tree online in O(ntnav ) time [39], where tnav is
the time for inserting a node and navigating (in particular, selecting the child on the edge starting with a
specific character). We can adapt this algorithm to compute LPF online: Assume that we have computed
the suffix tree of T [1..i − 1]. The algorithm processes the new character T [i] by (1) taking the suffix links
of the current suffix tree, and (2) adding new leaves where a branching occurs. On adding a new leaf with
suffix number i, we additionally set LPF[i] to the string depth of its parent. By doing so, we can update
the LPF values in time linear to the update time of the suffix tree. We build the semi-dynamic RMQ
data structure of Fischer [14] (or of [38] if n is known beforehand) on top of LPF. This data structure
takes O(n) words and can perform query and appending operations in constant amortized time.
The second suffix tree construction algorithm is a modified version [3] of Weiner’s algorithm [40] that
builds the suffix tree in the reversed order of Ukkonen’s algorithm in O(ntnav ) time. Since Weiner’s
algorithm incrementally constructs the suffix tree of a given text from right to left, we can adapt this
algorithm to compute the suffix tree of the reversed
text
nav ) time.
online in O(ntp
2
To get a suffix tree construction time of O n min lg lg n/ lg lg lg n, lg n/ lg lg n , we use the pre-
decessor data structure of Beame and Fich [2]. We create a predecessor
children
datastructure to store the
p
2
of each suffix tree node, such that we get the navigation time tnav = O min lg lg n/ lg lg lg n, lg n/ lg lg n
for both suffix trees. We also create a predecessor data structure to store the out-going suffix links of
each node of the suffix tree constructed by Weiner’s algorithm. Overall, these take a total of O(n) words
of space.
Finally, our last ingredient is a dynamic lowest common ancestor data structure with O(n) words
that performs querying and modification operations in constant time [6]. The lowest common ancestor
of two suffix tree leaves with the labels i and j is the node whose string depth is equal to the longest
common extension of T [i..] and T [j..], where T [i..] denotes the i-th suffix (up to the last position that is
available in the online setting). Building this data structure on the suffix tree of the text T and on the
suffix tree of the reversed text allows us to compute LCE queries in both directions in constant time.
We adapt the algorithm of Sec. 4 by switching the order of the loops (again). The algorithm first
fixes a Lempel-Ziv factor fx and then searches for squares with a period between one and |fx | + |fx+1 |.
Unfortunately, we would need an extra bit vector for each period so that we can track all found leftmost occurrences. Instead, we use the predecessor data structure of [2] storing the found occurrences
of squares as pairs of starting positions and lengths. These pairs can be stored in lexicographic or14
der (first sorted by starting position, then by length). The predecessor data structure will contain at
most
takes O(occ)
= O(n) words of space. An insertion and or a search costs us
occ
elements, hence p
O min lg2 lg n/ lg lg lg n, lg n/ lg lg n
time.
Let us assume that we have computed the set for T [1..i − 1], and that the Lempel-Ziv factorization of T [1..i − 1] is f1 · · · fy . If appending a new character T [i] will result in a new factor fy+1 , we
check for squares of type Lem. 4.2(a) and Lem. 4.2(b) at the borders of fy−1 . Duplicates are filtered
by the predecessor data structure storing all already reported leftmost occurrences. The algorithm
outputs only the leftmost occurrences with the aid of LPF, whose entries are fixed up to the last
two factors (this is sufficient since we search for the starting position of the leftmost occurrence of a
square
with type Lem.
|f1 · · · fy−1
|], including right-rotations). In overall, we need
4.2(a) only in T [1..
p
time.
O (|fy−1 | + |fy |) min lg2 lg n/ lg lg lg n, lg n/ lg lg n
The current bottleneck of the online algorithm is the predecessor data structure in terms of the
running time. Future integer dictionary data structures can improve the overall performance of this
algorithm.
C
Algorithm Execution with one Step at a Time
In this section, we process the running example T = ababaaababa$ with the algorithm devised in Sec. 4
step by step. SA, LCP, PLCP, and LPF are given in the table below:
1
2
i
1
2
3
4
5
6
7
8
9
10 11 12
T
a
b
a
b
a
a
a
b
a
b
a
$
SA
12 11
5
6
9
3
7
1
10
4
8
2
LCP
0
0
1
2
1
3
3
5
0
2
2
4
PLCP 5
4
3
2
1
2
3
2
1
0
0
0
LPF
0
0
3
2
1
2
5
4
3
2
1
0
LZ
f1
f2
3
4
f3
5
f4
f5
f6
6
The text T = a—b—aba—aa—baba—$ = f1 · · · f6 is factorized in six Lempel-Ziv factors. We call
T [1 + |f1 · · · fi−1 |] (first position of the i-th factor) and T [1 + |f1 · · · fi |] (position after the i-th factor) the
left border and the right border of fi , respectively. The idea of the algorithm is to check the presence
of a square at a factor border and at an offset value q of the border with LCE queries. q is either the
addition of p to the left border, or the subtraction of p from the right border.
The algorithm finds the leftmost occurrences of all squares in the order (first) of their lengths and (second)
of their starting positions. We start with the period p = 1 and try to detect squares at each Lempel-Ziv
factor border. To this end, we create a bit vector B marking all found squares with period p. A square
of this period is found at the right border of f3 . It is of type Lem. 4.2(a), since its starting position is
in f3 . To find it, we take the right border b = 6 of f3 , and the position q := b − p = 5. We perform
an LCE query at b and q in the forward and backward direction. Only the forward query returns the
non-zero value of one. But this is sufficient to find the square aa of period one. Its LPF value is smaller
than 2p = 2, so it is the leftmost occurrence. It is not yet marked in B, thus we have not yet reported
it. Right-rotations are not necessary for period 1. Having found all squares with period 1, we clear B.
Next, we search for squares with period 2. We find a square of type Lem. 4.2(b) at the left border b = 2
of f2 . To this end, we perform an LCE query starting from b and q := b + p = 4 in both directions. Both
15
LCE queries show that T [1..5] is a repetition with period p = 2. Thus we know that T [1..4] is a square.
It is not yet marked in B, and has an LPF value smaller than 2p = 4, i.e., it is a not yet reported leftmost
occurrence. On finding a leftmost occurrence of a square, we right-rotate it, and report all right-rotations
whose LPF values are below 2p. This is the case for T [2..5], which is the leftmost occurrence of the square
baba.
After some unsuccessful checks at the next factor borders, we come to factor f5 and search for a
square of type Lem. 4.2(b). Two LCE queries in both directions at the left border b = 8 of f5 and
q := b + p = 10 reveal that T [7..11] is a repetition of period 2. The substring T [7..10] is a square, but its
LPF value is 5(≥ 2p), i.e., we have already reported this square. Although we have already reported it,
some right-rotation of it might not have been reported yet (see Appendix D for an example). This time,
all right-rotations (i.e., T [8..12]) have an LPF value ≥ 2p, i.e., there is no leftmost occurrence of a square
of period 2 found by right-rotations. In overall, we have found and reported the leftmost occurrences of
all squares once.
D
Need for RMQ on LPF
In Sec. 4, we perform the right-rotations of a square (s, 2p) with an RMQ on the interval I := [s +
1.. min(s + p − 1, e − 2p + 1)], where e is the last position of the maximal repetition of period p that
contains the square. Instead of an RMQ, we can linearly scan all LPF values in I, giving O(p) = O(n)
time. We cannot do better since the LPF values can be arbitrary. For instance, consider the text
T = abaaabaababaaabaaa$. The text aligned with LPF is shown in the table below.
i
1
2
3
4
5
6
7
8
9 10 11 12 13 14 15 16 17 18 19
T
a
b
a
a
a
b
a
a
b
a
b
a
a
a
b
a
a
a
$
LPF
0
0
1
2
4
3
4
3
2
8
7
6
5
5
4
3
2
1
0
The square abaaabaa has two occurrences starting at the positions 1 and 10. The square baaabaaa at
position 11 is found by right-rotating the occurrence of abaaabaa at position 10. It is found by a linear
scan over LPF or an RMQ on LPF. A slight modification of this example can change the LPF values
around this occurrence. This shows that we cannot perform a shortcut in general (like stopping the
search when the LPF value is at least twice as large as p).
16
E
More Evaluation
collection
1MiB
10MiB
50MiB
100MiB
200MiB
pc-dblp.xml
pc-dna
0.2
0.3
3
3
16
23
33
56
70
310
pc-english
pc-proteins
0.2
0.3
5
4
42
25
500
74
2639
245
pc-sources
pcr-cere
0.2
0.6
3
6
31
30
286
79
792
535
pcr-einstein.en
pcr-kernel
0.4
0.2
12
8
83
233
1419
1274
3953
6608
pcr-para
0.4
4
26
98
265
Table 2: Running times in seconds, evaluated on different input sizes. We took prefixes of 1MiB, 10MiB,
and 100MiB of all collections.
F
Pseudo Code
17
Algorithm 1: Modified Algorithm 1 of [22]
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
b(f ) denotes the left end of a factor f = T [b(f )..b(f ) + |f | − 1], lcp and lcs compute the LCE in T
and the LCE in the reverse of T (mirroring the input indices by i 7→ n − i for 1 ≤ i ≤ n − 1),
respectively.
Let f1 , . . . , fz be the factors of the Lempel-Ziv factorization
fz+1 ← T [n]
// dummy factor
Function recursive-rotate(s : starting position, e: ending position)
m ← LPF.RMQ[s..e]
if m > 2p then return
report(m, 2p) and B[m] ← 1
recursive-rotate(s,m − 1) and recursive-rotate(m + 1,e)
Function right-rotate(s : starting position of square, p: period of square)
if B[s] = 1 then return
if LPF[s] < 2p then report(s, 2p) and B[s] ← 1
ℓ ← lcp(s, s + p)
recursive-rotate(s + 1, s + p − 1, s + ℓ − p)
Z ← array of size z lg z bits, zero initialized
m ← max(|f1 | + |f2 | , . . . , |fz−1 | + |fz |)
for p = 1, . . . , m do
B ← bit vector of length n, zero initialized
for x = 1, . . . , z do
if |fx | + |fx+1 | < p then
y←x
while |fy | + |fy+1 | < p do
if Z[y] 6= 0 then y ← Z[y]
else incr y
Z[x] ← y and x ← y
if |fx | ≥ p then // probe for squares satisfying Lem. 4.2(a)
q ← b(fx+1 ) − p
ℓR ← lcp(b(fx+1 ), q) and ℓL ← lcs(b(fx+1 ) − 1, q − 1)
if ℓR + ℓL ≥ p and ℓR > 0 then // found a square of length 2p with its right
end in fx+1
s ← max(q − ℓL , q − p + 1) // square starts at s
right-rotate(s, p)
q ← b(fx ) + p // probe for squares satisfying Lem. 4.2(b)
ℓR ← lcp(b(fx ), q) and ℓL ← lcs(b(fx ) − 1, q − 1)
s ← max(b(fx ) − ℓL , b(fx ) − p + 1) // square starts in a factor preceding fx
if ℓR + ℓL ≥ p and ℓR > 0 and s + p ≤ b(fx+1 ) and ℓL > 0 then // found a square of
length 2p whose center is in fx
right-rotate(s, p)
18
| 8cs.DS
|
A Novel Weighted Distance Measure for Multi-Attributed Graph
Muhammad Abulaish, SMIEEE
Jahiruddin∗
Department of Computer Science
South Asian University
New Delhi-21, India
[email protected]
Department of Computer Science
Jamia Millia Islamia
New Delhi-25, India
[email protected]
arXiv:1801.07150v1 [cs.SI] 22 Jan 2018
ABSTRACT
Due to exponential growth of complex data, graph structure has
become increasingly important to model various entities and their
interactions, with many interesting applications including, bioinformatics, social network analysis, etc. Depending on the complexity of the data, the underlying graph model can be a simple
directed/undirected and/or weighted/un-weighted graph to a complex graph (aka multi-attributed graph) where vertices and edges are
labelled with multi-dimensional vectors. In this paper, we present
a novel weighted distance measure based on weighted Euclidean
norm which is defined as a function of both vertex and edge attributes, and it can be used for various graph analysis tasks including classification and cluster analysis. The proposed distance
measure has flexibility to increase/decrease the weightage of edge
labels while calculating the distance between vertex-pairs. We have
also proposed a MAGDist algorithm, which reads multi-attributed
graph stored in CSV files containing the list of vertex vectors and
edge vectors, and calculates the distance between each vertex-pair
using the proposed weighted distance measure. Finally, we have
proposed a multi-attributed similarity graph generation algorithm,
MAGSim, which reads the output of MAGDist algorithm and generates a similarity graph that can be analysed using classification
and clustering algorithms. The significance and accuracy of the
proposed distance measure and algorithms is evaluated on Iris and
Twitter data sets, and it is found that the similarity graph generated
by our proposed method yields better clustering results than the
existing similarity graph generation methods.
CCS CONCEPTS
• Information systems → Similarity measures; Data analytics; Clustering; • Human-centered computing → Social network
analysis;
KEYWORDS
Data mining, Clustering, Multi-attributed graph, Weighted distance
measure, Similarity measure
∗ To
whom correspondence should be made
Permission to make digital or hard copies of all or part of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for profit or commercial advantage and that copies bear this notice and the full citation
on the first page. Copyrights for components of this work owned by others than ACM
must be honored. Abstracting with credit is permitted. To copy otherwise, or republish,
to post on servers or to redistribute to lists, requires prior specific permission and/or a
fee. Request permissions from [email protected].
Compute ’17, Bhopal, India
© 2017 ACM. 978-1-4503-5323-6/17/11. . . $15.00
DOI: 10.1145/3140107.3140114
ACM Reference format:
Muhammad Abulaish, SMIEEE and Jahiruddin. 2017. A Novel Weighted
Distance Measure for Multi-Attributed Graph. In Proceedings of 10th Annual ACM India Compute Conference, Bhopal, India, November 16–18, 2017
(Compute ’17), 9 pages.
DOI: 10.1145/3140107.3140114
1
INTRODUCTION
Due to increasing popularity of Internet and Web2.0, the UserGenerated Contents (UGCs) are growing exponentially. Since most
of the UGCs are not independent, rather linked, the graph data structure is being considered as a suitable mathematical tool to model
the inherent relationships among data. Simple linked data are generally modelled using simple graph G = (V , E), where V is the set
of vertices representing key concepts or entities and E ⊆ V × V is
the set of links between the vertices representing the relationships
between the concepts or entities. Depending on the nature of data
to be modelled, the graph G could be weighted/un-weighted or
directed/undirected, and it may have self-loops. However, there are
many complex data like online social networks, where an entity is
characterized by a set of features and multiple relationships exist
between an entity-pair. To model such data, the concept of multiattributed graph can be used wherein each vertex is represented by
an n-dimensional vector and there may be multiple weighted edges
between each pair of vertices. In other words, in a multi-attributed
graph, both vertices and edges are assigned multiple labels. One of
the important tasks related to graph data analysis is to decompose
a given graph into multiple cohesive sub-graphs, called clusters,
based on some common properties. The clustering is an unsupervised learning process to identify the underlying structure (in the
form of clusters) of data, which is generally based on some similarity/distance measures between data elements. Graph clustering
is special case of clustering process which divides an input graph
into a number of connected components (sub-graphs) such that
intra-component edges are maximum and inter-components edges
are minimum. Each connected component is called a cluster (aka
community) [13]. Though graph clustering has received attention
of many researchers and a number of methods for graph clustering
has been proposed by various researchers [19], to the best of our
knowledge, the field of clustering multi-attributed graph is still
unexplored.
Since similarity/distance measure is the key requirement for
any clustering algorithm, in this paper, we have proposed a novel
weighted distance measure based on weighted Euclidean norm to
calculate the distance between the vertices of a multi-attributed
graph. The proposed distance measure considers both vertex and
edge weight-vectors, and it is flexible enough to assign different
weightage to different edges and scale the overall edge-weight
Compute ’17, November 16–18, 2017, Bhopal, India
while computing the weighted distance between a vertex-pair. We
have also proposed a MAGDist algorithm that reads the lists of
vertex and edge vectors as two separate CSV files and calculates the
distance between each vertex-pairs using the proposed weighted
distance measure. Finally, we have proposed a multi-attributed similarity graph generation algorithm, MAGSim, which reads the output
of MAGDist algorithm and generates a similarity graph. In other
words, MAGDist and MAGSim algorithms can be used to transform
a multi-attributed graph into a simple weighted similarity graph,
wherein a single weighted edge exists between each vertex-pair.
Thereafter, the weighted similarity graph can be analysed using
existing classification and clustering algorithms for varied purposes.
The efficacy of the proposed distance measure and algorithms is
tested over the well-known Iris data set and a Twitter data set
related to three different events. The proposed similarity graph generation approach is compared with other existing similarity graph
generation methods like Gaussian kernel and k-nearest neighbours
methods, and it is found that our proposed approach yields better
clustering results in comparison to the existing methods. Moreover,
the proposed distance measure can be applied to any graph data
where both vertices are edges are multi-dimensional real vectors.
In case, the data is not linked, i.e., edges do not exist between the
edges, the proposed distance measure simple works as an Euclidean
distance between the node vectors.
The rest of the paper is organized as follows. Section 2 presents
a brief review on various distance measures and graph clustering methods. Section 3 presents the formulation of our proposed
weighted distance measure for multi-attributed graph. It also presents
the founding mathematical concepts and formal descriptions of the
MAGDist and MAGSim algorithms. Section 4 presents the experimental setup and evaluation results. Finally, section 5 concludes
the paper with future directions of work.
2
RELATED WORK
Multi-attributed graph is used to model many complex problems,
mainly those in which objects or entities are characterized using a
set of features and linked together in different ways. For example,
an online social network user can be characterized using a set of
features like ID, display name, demographic information, interests,
etc. Similarly, two person in an online social network may be associated through different relationships like friendship, kinship,
common interests, common friends, etc [4]. In [15], the authors
proposed a new principled framework for estimating graphs from
multi-attribute data. Their method estimates the partial canonical
correlations that naturally accommodate complex vertex features
instead of estimating the partial correlations. However, when the
vertices of a multi-attributed graph have different dimensions, it
is unclear how to combine the estimated graphs to obtain a single
Markov graph reflecting the structure of the underlying complex
multi-attributed data. In [14], Katenka and Kolaczyk proposed a
method for estimating association networks from multi-attribute
data using canonical correlation as a dependence measure between
two groups of attributes.
Clustering is an unsupervised learning technique which aims to
partition a data set into smaller groups in which elements of a group
are similar and that elements from different groups are dissimilar.
Abulaish et al.
As a result, clustering has broad applications, including the analysis
of business data, spatial data, biological data, social network data,
and time series data [24], and a large number of researchers have
targeted clustering problem [2, 12, 17]. Since graph is a popular data
structure to model structural as well as contextual relationships of
data objects, recently graph data clustering is considered as one of
the interesting and challenging research problems [16, 22], and it
aims to decompose a large graph into different densely connected
components. Some of the applications of the graph clustering is
community detection in online social networks [5, 7, 8], social bot
detection [10, 11], spammer detection [1, 3, 6, 9], functional relation
identification in large protein-protein interaction networks, and so
on. Generally graph clustering methods are based on the concept of
normalized cut, structural density, or modularity[16, 22]. However,
like [20], graphs can be partitioned on the basis of attribute similarity in such a way that vertices having similar attribute vectors
are grouped together to form a cluster. Mainly graph clustering
and simple data clustering differs in the way associations between
objects are calculated. In graph clustering, the degree of association between a pair of objects is calculated as closeness between
the respective nodes of the graph, generally in terms of number
of direct links or paths between them. Whereas, in simple data
clustering, the degree of association between a pair of objects is
calculated in terms of similarity/distance measure between the vector representations of the objects. Both topological structure and
vertex properties of a graph play an important role in many real
applications. For example, in a social graph, vertex properties can
be used to characterize network users, whereas edges can be used
to model different types of relationships between the users.
It can be seen from the discussions mentioned above that most
of the graph analysis approaches have considered only one aspect
of the graph structure and ignored the other aspects, due to which
the generated clusters either have loose intra-cluster structures
or reflect a random vertex properties distribution within clusters.
However, as stated in [24], “an ideal graph clustering should generate clusters which have a cohesive intra-cluster structure with
homogeneous vertex properties, by balancing the structural and
attribute similarities". Therefore, considering both vertex attributes
and links for calculating similarity/distance between the pairs of
vertices in a graph is one of basic requirements for clustering complex multi-attributed graphs. In this paper, we have proposed a
weighted distance function that can transform a multi-attributed
graph into a simple similarity graph on which existing graph clustering algorithms can be applied to identify densely connected
components.
3
PRELIMINARIES AND DISTANCE
MEASURES
In this section, we present the mathematical basis and formulation
of the proposed weighted distance measures for multi-attributed
graph. Starting with the basic mathematical concepts in subsection
3.1, the formulation of the proposed distance function along with
an example is presented in the subsequent subsections.
A Novel Weighted Distance Measure for Multi-Attributed Graph
3.1
Founding Mathematical Concepts
Since the Linear Algebra concepts inner product and norm generally
form the basis for any distance function, we present a brief overview
of these mathematical concepts in this section.
Inner Product: An inner product is a generalized form of the
vector dot product to multiply vectors together in such a way that
the end result is a scalar quantity. If a® = (a 1 , a 2 , ..., an )T and b® =
(b1 , b2 , ..., bn )T are two vectors in the vector space <n , then the
® and defined using
inner product of a® and b® is denoted by h®
a , bi
equation 1 [18].
n
Õ
® = a® · b® = a 1b1 + a 2b2 + · · · + an bn =
h®
a , bi
a i bi
(1)
Compute ’17, November 16–18, 2017, Bhopal, India
(1) kak
® > 0 with kak
® = 0 iff a® = 0
(positivity)
(2) knak
® = nkak
®
(homogeneity)
(3) ka® + b®k ≤ kak
® + kb®k
(triangle inequality)
Some of the well-known norms defined in [21] are as follows:
(1) L1 -norm (aka Manhattan norm): The L 1 -norm of a vector
a® ∈ <n is simply obtained by adding the absolute values
of its components. Formally, the L1 -norm of the vector a® is
represented as kak
® 1 and it can be defined using equation 5.
n
Õ
kak
®1=
|ai |
(5)
i=1
(2) L2 -norm (aka Euclidean norm): The L 2 -norm of a vector
a® ∈ <n is obtained by taking the positive square root of
the sum of the square of its components. Formally, the
L2 -norm of a vector a® is represented as kak
® 2 and it can be
defined using equation 6.
! 1/2
n
Õ
2
kak
®2=
ai
(6)
i=1
b 1
b 2
T
®
h®
a , bi = a b = a 1 a 2 . . . an .
..
b
n
= a 1b 1 + a 2b 2 + · · · + a n b n
(2)
i=1
(3) Infinity-norm (aka max-norm): The Infinity-norm of a vector a® ∈ <n is obtained as maximum of the absolute values
of the components of the vector. Formally, the infinitynorm of the vector a® is represented as kak
® ∞ and it can be
defined using equation 7.
Alternatively, inner product of a® and b® can be defined as a matrix
product of row vector a®T and column vector b® using equation
2. However, as stated in [18], an inner product must satisfy the
® and c® belong to <n ,
following four basic properties, where a,
® b,
and n is a scalar quantity.
(1) h®
a + b® , c®i = h®
a , c®i + hb® , c®i
®
®
(2) hna® , bi = nh®
a , bi
®
®
(3) h®
a , bi = hb , ai
®
(4) h®
a , ai
® > 0 and h®
a , ai
® = 0 iff a® = 0
n
kak
® ∞ = max |ai |
i=1
(4) Lp -norm: The Lp norm of a vector a® ∈ <n is the positive
p th root of the sum of p th power of the absolute value of
the components of the vector. Formally, the Lp -norm of the
vector a® is represented as kak
® p and it can be defined using
equation 8.
! 1/p
n
Õ
p
kak
®p=
|ai |
(8)
Weighted Inner Product: The weighted inner product is generally
used to emphasize certain features (dimensions) through assigning
weight to each dimension of the vector space <n . If d 1 , d 2 , . . . , dn ∈
< are n positive real numbers between 0 and 1 and D is a corresponding diagonal matrix of order n × n, then the weighted inner
product of vectors a® and b® is defined by equation 3 [18]. It can be easily verified that weighted inner product also satisfies the four basic
properties of the inner product mentioned earlier in this section.
d 1
0
T
®
h®
a , biD = a Db =
di ai bi , where D= .
..
i=1
0
n
Õ
0
d2
..
.
0
...
...
..
.
...
0
0
..
.
dn
i=1
(5) Weighted Euclidean norm: The weighted Euclidean norm of
a vector a® ∈ <n is a special case of the Euclidean norm in
which different dimensions of a® can have different weights.
If AT = a®T is a row matrix of order 1 × n, and D is a
diagonal matrix of order n × n whose i th diagonal element
is the weight of the i th dimension of the vector a,
® then the
weighted Euclidean norm of a® is the positive square root of
the product matrix AT DA. In case D is an identity matrix,
this gives simply the Euclidean norm. Formally, for a given
vector a® ∈ <n and a weight (diagonal) matrix D of order
n × n, the weighted Euclidean norm of a® is represented as
kak
® D and defined using equation 9.
(3)
Norm: In linear algebra and related area of mathematics, the
norm on a vector space <n is a function used to assign a non
negative real number to each vector a® ∈ <n . Every inner product
gives a norm that can be used to calculate the length of a vector.
However, not every norm is derived from an inner product [18].
The norm of a vector a® ∈ <n is denoted by kak
® and can be defined
using equation 4.
p
kak
® = h®
a , ai
®
(4)
T
T
®
As given in [18], if a® = (a 1 , a 2 , ..., an ) and b = (b1 , b2 , ..., bn ) are
two vectors of the vector space <n and n > 0 is a scalar quantity,
then every norm satisfies the following three properties.
(7)
! 1/2
n
1/2
Õ
T
2
kak
® D = A DA
=
di ai
(9)
i=1
3.2
Multi-Attributed Graph
In this section, we present a formal definition of multi-attributed
graph, in which both vertices and edges can be represented as multidimensional vectors. Mathematically, a multi-attributed graph can
Compute ’17, November 16–18, 2017, Bhopal, India
Abulaish et al.
be defined as a quadruple Gm = (V , E, Lv , Le ), where V , ϕ
represents the set of vertices, E ⊆ V × V represents the set of
edges, Lv : V → <n is a vertex-label function that maps each
vertex to an n-dimensional real vector, and Le : E → <m is an
edge-label function that maps each edge to an m-dimensional real
vector. Accordingly, a vertex v ∈ V in a multi-attributed graph can
be represented as an n-dimensional vector v® = (v 1 , v 2 , . . . , vn )T
and an edge between a vertex-pair (u, v) can be represented as an
m-dimensional vector e®(u, v) = (e 1 (u, v), e 2 (u, v), . . . , em (u, v))T .
3.3
Proposed Weighted Distance Measure
In this section, we present our proposed weighted distance measure
for multi-attributed graph that is based on weighted Euclidean norm.
If u = u® = (u 1 , u 2 , . . . , un )T and v = v® = (v 1 , v 2 , . . . , vn )T are
two vertices of a multi-attributed graph and (u, v) = e®(u, v) =
(e 1 (u, v), e 2 (u, v), . . . , em (u, v))T is a multi-labelled edge between
u and v, then the distance between u and v is denoted by ∆(u, v) and
calculated using equation 10, where λ is a scalar value (equation 11),
and I is an identity matrix of order n × n. The value of λ depends on
the aggregate weight, ω(u, v), of the edges between the vertex-pair
(u, v), which is calculated using equation 12. The value of γ > 0 is
a user-supplied threshold, providing flexibility to tune the value of
λ for calculating distance between a vertex-pair. In equation 12, α i
Í
is a constant such that α i ≥ 0 and ni=1 α i = 1.
⇒ (1 + ω 1 ) ≤ (1 + ω 2 )
⇒ (1 + ω 1 )γ ≤ (1 + ω 2 )γ , where γ ≥ 1
⇒ (1+ω1 )γ ≥ (1+ω1 )γ
1
2
⇒ f (ω 1 ) ≥ f (ω 2 )
Hence, λ is a monotonically decreasing function of ω for γ ≥ 1.
Similarly, it can be shown that λ is a monotonically decreasing
function of γ for ω > 0.
Let λ = f (γ ) be a function of γ
Let γ 1 , γ 2 ≥ 1 such that γ 1 ≤ γ 2
⇒ (1 + ω)γ1 ≤ (1 + ω)γ2 , where ω > 0
1
1
⇒ (1+ω)
γ 1 ≥ (1+ω)γ 2
⇒ f (γ 1 ) ≥ f (γ 2 )
Hence, λ is a monotonically decreasing function of γ for ω > 0.
ω=1
ω=0.75
ω=0.50
ω=0.25
1.1
1
0.9
0.8
0.7
0.6
λ
0.5
0.4
∆(u, v) = ∆(®
u, v)
® = ku® − v®kλI = (u − v)T .λI .(u − v)
u 1 − v 1 1/2
...
©
. ª®
..
= u 1 − v 1 . . .
.. ®
.
u − v
...
n¬
«
n
1/2
= λ(u 1 − v 1 )2 + λ(u 2 − v 2 )2 + · · · + λ(un − vn )2
! 1/2
n
Õ
√
2
(ui − vi )
= λ×
λ
.
un − vn ..
0
0.3
1/2
0
..
.
λ
0.2
0.1
0
0
(10)
2
3
4
5
6
7
8
9 10 11 12 13 14 15 16 17 18 19 20
γ
Figure 1: Visualization of the monotonically decreasing nature of λ for varying γ and ω values
i=1
1
λ=
(1 + ω(u, v))γ
ω(u, v) = α 1e 1 (u, v) + α 2e 2 (u, v) + · · · + αm em (u, v)
n
Õ
α i ei (u, v)
=
1
(11)
It should be noted that if there is no direct link (edge) between a
vertex pair (u, v), then the value of ω(u, v) in equation 11 becomes
zero, leading the value of λ to 1. In this case, the value of ∆(u, v)
is simply an Euclidean distance between the vertex-pair (u, v), as
proved in theorem 3.2.
(12)
i=1
It may be noted that the λ function defined using equation 11 is
a monotonic decreasing function, as proved in theorem 3.1, so that
the distance between a vertex-pair could decrease with increasing
ties between them, and vice-versa. The novelty of the proposed
distance function lies in providing flexibility (i) to assign different
weights to individual edges using α, and (ii) to control the degree
of monotonicity using γ , as shown in figure 1. It may also be noted
that the value of λ will always be 1, if either if ω(u, v) = 0 or γ = 0.
Theorem 3.1. The λ function defined in equation 11 is a monotonically decreasing function.
Proof. Let λ = f (ω) be a function of ω, where ω is the aggregate
weight of edges between a vertex-pair (u, v).
Let ω 1 , ω2 ≥ 0 such that ω 1 ≤ ω 2
Theorem 3.2. In a multi-attributed graph, if there is no edge
between a vertex-pair then the distance between them is simply an
Euclidean distance.
Proof. Let u = u® = (u 1 , u 2 , . . . , un )T and v = v® = (v 1 , v 2 , . . . , vn )T
be two vertices not connected by any edge. Since there is no edge between the vertex-pair (u, v), the edge vector e®(u, v) = (e 1 (u, v), e 2 (u, v), . . . ,
em (u, v))T = 0®.
⇒ e 1 (u, v) = e 2 (u, v) = · · · = em (u, v) = 0
Hence, ω(u, v) = α 1 .e 1 (u, v) + α 2 .e 2 (u, v) + · · · + αm .em (u, v)
= α 1 .0 + α 2 .0 + · · · + αm .0 = 0.
[using equation 12]
1
1
Hence, λ = (1+ω(u,v))
[using equation 11]
γ = (1+0)γ = 1
√
1/2
Ín
2
Finally, ∆(u, v) = λ × i=1 (ui − vi )
[using equation 10]
√
1/2
Ín
Ín
2
2 1/2 , which is an
= 1×
=
i=1 (ui − vi )
i=1 (ui − vi )
Euclidean distance between the vertex-pair (u, v).
A Novel Weighted Distance Measure for Multi-Attributed Graph
Algorithm 1 presents a formal way to calculate the distance
between all pairs of vertices of a given multi-attributed graph
using MAGDist. The proposed MAGDist algorithm reads a multiattributed graph using two separate CSV files – one containing
the list of vertex vectors and the other containing the list of edge
vectors, and produces the distance between each vertex-pairs as a
CSV file, wherein each tuple contains a vertex-pair and distance
value. We have also proposed MAGSim algorithm to generate similarity graph using the distance values calculated by the MAGDist
algorithm. The proposed algorithm reads each vertex-pair and its
distance value < i, j, ∆(i, j) > and calculates similarity between the
vertex-pair (i, j) using equation 13.
sim(i, j) = 1 −
∆(i, j)
max {∆(x, y)}
Algorithm 1: MAGDist(Lv , Le , α, γ )
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
Algorithm 2: MAGSim(D)
1
2
3
4
// generating similarity graph corresponding to a
multi-attributed graph
Input : A CSV file D containing vertex-pairs along with
distance output by the MAGDist.
Output : A CSV file G s containing edge-listed similarity graph.
dmax ← getMaxDistance(D);
for each tuple < i, j, ∆(i, j > in D do
∆(i, j)
sim(i, j) = 1 − d
write tuple < i, j, sim(i, j) > into G s ;
max
end
(13)
x,y ∈V
1
Compute ’17, November 16–18, 2017, Bhopal, India
// computing distance between all pairs of
vertices of a multi-attributed graph
Input : CSV files Lv and Le containing list of vertex vectors,
and edge vectors, respectively. An 1D array α[1..m],
Í
wherein α i ≥ 0 and m
i=1 α i = 1 for calculating the
linear combination of edge weights between a pair of
vertices. A positive integer threshold γ representing
the weightage of edges in distance calculation.
Output : A CSV file D containing distance between each pairs
of vertices.
nv ← vertexCount[Lv ] ;
// number of vertices
n ← vertexDimCount[Lv ] ; // vertex vector dimension
m ← edдeDimCount[Le ] ;
// edge vector dimension
V [nv ][n] ← Lv ;
// reading Lv into array V .
for each vertex-pair (i, j) ∈ Le do
// calculating aggregate weight ω(i, j) of the
edges between vertex-pair (i, j).
ω(i, j) ← 0;
for k ← 1 to m do
ω(i, j) = ω(i, j) + α[k] × ek (i, j) ;
// [eqn. 12]
end
// calculating the value of scalar quantity λ
1
;
// [eqn. 11]
λ = (1+ω(i,
j))γ
// calculating distance ∆(i, j) between the
vertex-pair (i, j).
d ← 0;
for k ← 1 to n do
d = d + (V [i][k] − V [j][k])2 ;
end
√
√
∆(i, j) = λ × d ;
// [eqn. 10]
write tuple < i, j, ∆(i, j) > into D ;
end
Example: Figure 2 presents a simpler case of multi-attributed
graph having four vertices in which each vertex is represented as
a two dimensional feature vector and each edge is represented as
an one dimensional vector. In case, there is no direct edge between
a pair of vertices (e.g., v 1 and v 3 ), the corresponding edge vector
is a zero vector. If we simply calculate the Euclidean distance between the vertex-pairs, then the distance between the vertex-pairs
(v 1 , v 2 ), (v 2 , v 3 ), (v 3 , v 4 ) and (v 4 , v 1 ) is same (10 unit), whereas the
distance calculated by the proposed MAGDist differs, based on
the weight of the edges between them. Similarly, the Euclidean
distance
between the vertex-pairs (v 1 , v 3 ) and (v 2 , v 4 ) are same
√
(10 2), but the distance values calculated using MAGDist are different. The distance values between each vertex-pairs of the multiattributed graph calculated using MAGDist for γ = 1 and γ = 2
are is shown in D 1 and D 2 matrices, respectively of figure 2. It can
be observed that giving more weightage to edges by increasing
the value of γ reduces the distance between the respective vertexpairs. Figure 3 presents a multi-attributed graph in which both
vertex and edge labels are multi-dimensional vectors. For example, the edge vector corresponding to the edge connecting v 2 and
v 3 is e®(2, 3) = (0.36, 0.64)T . If we simply calculate the Euclidean
distance between the vertex-pairs, then the distance between the
vertex-pairs (v 1 , v 2 ), (v 2 , v 3 ), (v 3 , v 4 ) and (v 4 , v 1 ) is same (10 unit),
whereas the distance calculated by the proposed MAGDist differs,
based on the weight of the edges between them. The distance values
between each vertex-pairs of the multi-attributed graph calculated
using MAGDist for γ = 1 and γ = 2 are is shown in D 1 and D 2
matrices, respectively of figure 3. It can be observed from these two
distance matrices too that giving more weightage to edges by increasing the value of γ reduces the distance between the respective
vertex-pairs.
4
EXPERIMENTAL SETUP AND RESULTS
To establish the efficacy of the proposed MAGDist distance measure,
we have considered the well-known Iris data set 1 , which contains
total 150 instances of three different categories of Iris flower; 50
instances of each category. The Iris data set can be represented as
a 150 × 5 data matrix, wherein each row represents an Iris flower,
first four columns represent four different attribute values in centimetre, and the 5th column represents class labels (categories) of
the Iris flower as Setosa, Virginica, or Versicolour. Table 1 shows
a partial snapshot of the Iris data set. We model Iris data set as a
multi-attributed similarity graph in which each vertex v ∈ <4 is a
4-dimensional vector representing a particular instance of the Iris
1 http://archive.ics.uci.edu/ml/datasets/Iris
Compute ’17, November 16–18, 2017, Bhopal, India
0 v04
10 10
v3 v1010
3
v4 1.01.0
1010
0 0 9.81
.14
9.81 1414
.14 8.894
.94
9.81
0
7
.
81
1010
9
.
81
0
7
.
81
1.01.0 0.64
0.64 D1D1
1414
.14.14 7.81
7.81 0 0 7.707
.07
8
.
94
10
7
.
07
0
8.94 10
7.07
0
1010
0.250.25
0 0
v
0 01
Abulaish et al.
0.04
v1 0.04
DD2 2
00
99.62
.62
14
14.14
.14
88.00
.00
99..62
62 14
14..14
14
00
66..10
10
66..10
00
10
77..07
5
.
00
07
00
88..00
7
.
07
7.07
00
55..00
0
v2 v20 0
Figure 2: A multi-attributed graph with vertices as multi-dimensional vectors, and distance matrices D 1 , D 2 calculated using
MAGDist algorithm for γ = 1 and γ = 2, respectively
0 0v4
10 10
v4
1.01.0
9.81 1414
.14 8.816
.16
0 0 9.81
.14
9
.
81
0
8
.
16
14
.14
0
8.16 14.14
D1 9.81
D
DD2 2
1
14
.
14
8
.
16
0
7
.
0.36 0.64
0.64
14.14 8.16
0
7.0707
0.36
8.16 1414
.07 0 0
8.16
.14.14 7.707
1010
1.01.0
0.250.25 0.750.75
0 0
v01
0
v3 v31010
v1
0.04
0.04
0.04
0.04
v2
1010
0
0
00
9
.62
9.62
14
.14
14.14
.67
66.67
62 14
14..14
14 66..67
99..62
67
0
6
.
67
14
.
0
6.67 14.14
14
6
.
67
55..00
6.67
00
00
14..14
14 55..00
00
00
14
v2
Figure 3: A multi-attributed graph with both vertices and edges as multi-dimensional vectors, and distance matrices D 1 , D 2
calculated using MAGDist algorithm for γ = 1 and γ = 2, respectively
Table 1: A partial view of the Iris data set
Sepal length
5.1
4.9
4.7
4.6
5.0
...
6.4
6.9
5.5
6.5
5.7
...
6.3
5.8
7.1
6.3
6.5
Sepal width
3.5
3.0
3.2
3.1
3.6
...
3.2
3.1
2.3
2.8
2.8
...
3.3
2.7
3.0
2.9
3.0
Petal length
1.4
1.4
1.3
1.5
1.4
...
4.5
4.9
4.0
4.6
4.5
...
6.0
5.1
5.9
5.6
5.8
Petal width
0.2
0.2
0.2
0.2
0.2
...
1.5
1.5
1.3
1.5
1.3
...
2.5
1.9
2.1
1.8
2.2
Species
Setosa
Setosa
Setosa
Setosa
Setosa
...
versicolor
versicolor
versicolor
versicolor
versicolor
...
virginica
virginica
virginica
virginica
virginica
flower. The edge (similarity) between a vertex-pair (u, v) is determined using equation 14 on the basis of the Gaussian kernel value
defined in equation 15, where σ = 1 is a constant value [23].
(
κ G (u, v) if κ G (u, v) ≥ 0.55
e(u, v) =
(14)
0
otherwise
κ G (u, v) = e
− ku−v2k
2σ
2
(15)
The resulting multi-attributed Iris similarity graph is shown in
figure 4 (termed hereafter as G 1 for rest of the paper), which contains 150 vertices and 2957 edges. In this graph, the instances of
Setosa, Virginica, or Versicolour are shown using triangles, squares,
and circles, respectively. Although κ G (u, u) = 1.0 for all vertices,
we haven’t shown self-loops in this graph. The proposed MAGDist
algorithm is applied over G 1 to calculate distance between all vertexpairs, and finally MAGSim algorithm is applied to generate Iris similarity graph (termed hereafter as G 2 for rest of the paper), which is
shown in figure 5. In [23], the authors have also used Gaussian kernel followed by the concept of nearest-neighbours to generate Iris
similarity graph (termed hereafter as G 3 for rest of the paper) and
applied Markov Clustering (MCL) to classify the instances of the
Iris data into three different categories. Therefore, in order to verify
the significance of our MAGDist and MAGSim algorithms, we have
also applied the MCL over the Iris similarity graphs G 1 and G 2 , and
present a comparative analysis of all clustering results. Figures 6
and 7 present the clustering results after applying MCL over the Iris
similarity graphs G 1 and G 2 , respectively. Table 2 presents the contingency table for the discovered clusters versus true Iris types from
all three different Iris similarity graphs. It can be observed from
this table that, in case of G 2 , only six instances of iris-versicolor
are wrongly grouped with iris-virginica in C 2 and three instances
of iris-virginica are wrongly grouped with iris-versicolor in C 3 ;
whereas in G 1 forty iris-versicolor instances are wrongly grouped
with iris-virginica in C 2 , and in G 3 , one instance of iris-versicolor
is wrongly grouped with iris-setosa in C 1 and fourteen instances of
iris-virginica are wrongly grouped with iris-versicolor in C 3 .
A Novel Weighted Distance Measure for Multi-Attributed Graph
Figure 4: G 1 : Iris data graph modelled as a multi-attributed
graph in which vertices are 4-dimensional real vectors and
edges are the Gaussian similarity (≥ 0.55) between the respective vertices
Compute ’17, November 16–18, 2017, Bhopal, India
Figure 6: Clustering results after applying MCL over the Iris
data graph G 1
Figure 7: Clustering results after applying MCL over the Iris
data graph G 2
Figure 5: G 2 : Iris data graph modelled as a multi-attributed
graph in which vertices are 4-dimensional real vectors and
edges are MAGSim similarity (≥ 0.80) calculated using equation 13
We have also analyzed the significance of different similarity
graph generation methods in terms of True Positive Rate (TPR) and
False Positive Rates (FPR) that are defined using equations 16 and
17, respectively. In these equations, TP is the True Positives, representing the number of correctly classified positive instances, FP is
the False Positives, representing the number of wrongly classified
negative instances, and P and N represent the total number of positive and negative instances, respectively in the data set. Table 3
presents TPR and FPR values for all three different similarity graphs,
showing best results for G 2 , which has been generated using our
proposed MAGDist and MAGSim algorithms.
Table 2: Contingency table for MCL clusters from similarity
graphs generated by three different methods
Clusters
C 1 (triangle)
C 2 (square)
C 3 (circle)
Set
50
0
0
G1
Vir
0
50
0
Ver
0
40
10
Set
50
0
0
G2
Vir
0
47
3
Ver
0
6
44
Set
50
0
0
G 3 [23]
Vir Ver
0
1
36
0
14
49
TPR =
TP
P
(16)
FPR =
FP
N
(17)
Compute ’17, November 16–18, 2017, Bhopal, India
Abulaish et al.
Table 3: Performance comparison of three different methods on Iris data set
Clusters
C 1 (triangle)
C 2 (square)
C 3 (circle)
Average
4.1
G1
TPR FPR
1.00
0.00
1.00
0.40
0.20
0.00
0.73 0.13
G2
TPR FPR
1.00 0.00
0.94 0.06
0.88 0.03
0.94 0.03
G 3 [23]
TPR FPR
1.00 0.01
0.72 0.00
0.98 0.14
0.90 0.05
Evaluation Results on Twitter Data Set
In order to illustrate the application of the proposed distance measure over a real multi-attributed graph, we have considered a Twitter data set of 300 tweets, comprising equal number of tweets related to three different events – NoteBandi (NTB), RyanInternationalSchool (RIS), and Rohingya (ROH). The tweets are modelled as
a multi-attributed graph, wherein each vertex represents a tweet
as an 110-dimensional binary vector based on the top-110 keyterms identified using tf-idf, and two different edges exist between
a vertex-pair – one representing the degree of Hashtags overlap
and the other representing the tweet-time overlap. The similarity
graph is generated using MAGSim algorithm, and shown in figure 8 wherein the instances of NoteBandi, RyanInternationalSchool,
and Rohingya are represented using squares, triangles, and circles,
respectively. Finally, MCL is applied over the similarity graph to
group the tweets into different clusters shown in figure 9. The evaluation of the obtained clusters is given in table 4. It can be seen
from this table that only five instances of RyanInternationalSchool
are wrongly clustered with Rohingya in C 3 .
Figure 8: Similarity graph generated from Twitter data set
(only edges having similarity value > 0.5 are shown)
5
CONCLUSION AND FUTURE WORKS
In this paper, we have proposed a novel weighted distance measure
based on weighted Euclidean norm that can be used to calculate
the distance between vertex-pairs of a multi-attributed graph containing multi-labelled vertices and multiple edges between a single
Figure 9: Clustering results obtained by applying MCL over
the similarity graph of the Twitter data set
Table 4: Evaluation results of the proposed method on Twitter data set
Clusters
C 1 (triangle)
C 2 (square)
C 3 (circle)
Contingency Table
NTB RIS ROH
0
95
0
100
0
0
0
5
100
Average
Evaluation Results
TPR
FPR
1.00
0.00
1.00
0.00
1.00
0.025
1.00
0.008
vertex-pair. The proposed distance measure considers both vertex
and edge weight-vectors, and it is flexible enough to assign different
weightage to different edges and scale the overall edge-weight while
computing the weighted distance between a vertex-pair. We have
also proposed a MAGDist algorithm that reads the lists of vertex and
edge vectors as two separate CSV files and calculates the distance
between each vertex-pairs using the proposed weighted distance
measure. Finally, we have proposed a multi-attributed similarity
graph generation algorithm, MAGSim, which reads the output produced by the MAGDist algorithm and generates a similarity graph,
which can be used by the existing classification and clustering algorithms for various analysis tasks. Since the proposed MAGDist
algorithm reads multi-attributed graph as CSV files containing
vertex and edge vectors, it can be scaled to handle large complex
graphs (aka big graphs). Applying proposed distance measure and
algorithms on (research articles) citation networks and online social
networks to analyze them at different levels of granularity is one
of the future directions of work.
REFERENCES
[1] Muhammad Abulaish and Sajid Yousuf Bhat. 2015. Classifier Ensembles using
Structural Features for Spammer Detection in Online Social Networks. Foundations of Computing and Decision Sciences 40, 2 (2015), 89–105.
A Novel Weighted Distance Measure for Multi-Attributed Graph
[2] Rakesh Agrawal, Johannes Gehrke, Dimitrios Gunopulos, and Prabhakar Raghavan. 1998. Automatic Subspace Clustering of High Dimensional Data for Data
Mining Applications. In Proceedings of the ACM SIGMOD international conference
on Management of data. Seattle, Washington, USA, 94–105.
[3] Faraz Ahmed and Muhammad Abulaish. 2013. A Generic Statistical Approach
for Spam Detection in Online Social Networks. Computer Communications 36,
10-11 (2013), 1120–1129.
[4] Sajid Yousuf Bhat and Muhammad Abulaish. 2013. Analysis and Mining of
Online Social Networks - Emerging Trends and Challenges. WIREs Data Mining
and Knowledge Discovery 3, 6 (2013), 408–444.
[5] Sajid Yousuf Bhat and Muhammad Abulaish. 2014. HOCTracker: Tracking the
Evolution of Hierarchical and Overlapping Communities in Dynamic Social
Networks. IEEE Transactions on Knowledge and Data Engineering 27, 4 (2014),
1019–1032. DOI:http://dx.doi.org/10.1109/TKDE.2014.2349918
[6] Sajid Yousuf Bhat and Muhammad Abulaish. 2014. Using communities against
deception in online social networks. Computer Fraud & Security 2014, 2 (2014),
8–16.
[7] Sajid Yousuf Bhat and Muhammad Abulaish. 2015. OCMiner: A Density-Based
Overlapping Community Detection Method for Social Networks. Intelligent Data
Analysis 19, 4 (2015), 1–31.
[8] Sajid Yousuf Bhat and Muhammad Abulaish. 2017. A Unified Framework for
Community Structure Analysis in Dynamic Social Networks. In Hybrid Intelligence for Social Networks, Hema Banati, Siddhartha Bhattacharyya, Ashish Mani,
and Mario Koppen (Eds.). Springer, 1–21.
[9] Sajid Y. Bhat, Muhammad Abulaish, and Abdulrahman A. Mirza. 2014. Spammer Classification using Ensemble Methods over Structural Social Network
Features. In Proceedings of the 14th IEEE/WIC/ACM International Conference on
Web Intelligence (WIâĂŹ14). Warsaw, Poland, 11–14.
[10] Mohd Fazil and Muhammad Abulaish. 2017. Identifying Active, Reactive, and
Inactive Targets of Socialbots in Twitter. In Proceedings of the IEEE/WIC/ACM
International Conference on Web Intelligence (WIâĂŹ17), Leipzig, Germany. ACM,
573–580.
[11] Mohd Fazil and Muhammad Abulaish. 2017. Why a Socialbot is Effective in
Twitter? A Statistical Insight. In Proceedings of the 9th International Conference on
Communication Systems and Networks (COMSNETS), Social Networking Workshop,
Bengaluru, India. 562–567.
Compute ’17, November 16–18, 2017, Bhopal, India
[12] David Gibson, Jon Kleinberg, and Prabhakar Raghavan. 1998. Inferring Web
Communities from Link Topology. In Proceedings of the Ninth ACM Conference
on Hypertext and Hypermedia. ACM, New York, USA, 225–234.
[13] M. Girvan and M. E. J. Newman. 2002. Community structure in social and
biological networks. In Proceedings of the National Academy of Sciences. USA,
8271–8276.
[14] Natallia Katenka and Eric D. Kolaczyk. 2011. Multi-Attribute Networks and the
Impact of Partial Information on Inference and Characterization. The Annals of
Applied Statistics 6, 3 (2011), 1068–1094.
[15] Mladen Kolar, Han Liu, and Eric P. Xing. 2014. Graph Estimation From MultiAttribute Data. Journal of Machine Learning Research 15 (2014), 1713–1750.
http://jmlr.org/papers/v15/kolar14a.html
[16] M. E. Newman and M. Girvan. 2004. Finding and evaluating community structure
in networks. Physical Review E69, 026113 (Feb 2004).
[17] Raymond T. Ng and Jiawei Han. 1994. Efficient and Effective Clustering Methods
for Spatial Data Mining. In Proceedings of the 20th International Conference on
Very Large Data Bases. Santiago, Chile, 144–155.
[18] Peter J. Olver. 2008. Numerical Analysis Lecture Note. Retrieved on 18.03.2017
from http://www-users.math.umn.edu/~olver/num_/lnn.pdf.
[19] S. E. Schaeffer. 2007. Graph clustering. Computer Science Review 1, 1 (2007),
27–64. DOI:http://dx.doi.org/10.1016/j.cosrev.2007.05.001
[20] Yuanyuan Tian, Richard A. Hankins, and Jignesh M. Patel. 2008. Efficient Aggregation for Graph Summarization. In Proceedings of the ACM SIGMOD International
Conference on Management of Data. Vancouver, Canada, 567–580.
[21] E.W. Weisstein. 2002. Vector Norm. Wolfram MathWorld. Retrieved on 18.03.2017
from http://mathworld.wolfram.com/VectorNorm.html.
[22] Xiaowei Xu, Nurcan Yuruk, Zhidan Feng, and Thomas A. J. Schweiger. 2007.
SCAN: A Structural Clustering Algorithm for Networks. In Proceedings of the
13th ACM SIGKDD International Conference on Knowledge Discovery and Data
Mining. San Jose, California, USA, 824–833.
[23] Mohammed J. Zaki and Wagner Meira Jr. 2014. Data Mining and Analysis:
Fundamental Concepts and Algorithms. Cambridge University Press, New York,
USA.
[24] Yang Zhou, Hong Cheng, and Jeffrey Xu Yu. 2009. Graph Clustering Based on
Structural/Attribute Similarities. VLDB Endowment 2, 1 (Aug 2009), 718–729.
DOI:http://dx.doi.org/10.14778/1687627.1687709
| 2cs.AI
|
arXiv:1603.07051v1 [cs.AI] 23 Mar 2016
Cosolver2B: An Efficient Local Search Heuristic for
the Travelling Thief Problem
Mohamed El Yafrani
Belaı̈d Ahiod
LRIT, associated unit to CNRST (URAC 29)
Faculty of Science, Mohammed V University of Rabat
B.P. 1014 Rabat, Morocco
Email: [email protected]
LRIT, associated unit to CNRST (URAC 29)
Faculty of Science, Mohammed V University of Rabat
B.P. 1014 Rabat, Morocco
Email: [email protected]
Abstract—Real-world problems are very difficult to optimize.
However, many researchers have been solving benchmark problems that have been extensively investigated for the last decades
even if they have very few direct applications. The Traveling Thief
Problem (TTP) is a NP-hard optimization problem that aims to
provide a more realistic model. TTP targets particularly routing
problem under packing/loading constraints which can be found in
supply chain management and transportation. In this paper, TTP
is presented and formulated mathematically. A combined local
search algorithm is proposed and compared with Random Local
Search (RLS) and Evolutionary Algorithm (EA). The obtained
results are quite promising since new better solutions were found.
I. I NTRODUCTION
The travelling thief problem (TTP) is a novel NP-hard
problem introduced in [1] to provide a model that better
represents real-world problems. The particularity of TTP is
that it is composed of two other NP-hard problems, namely
the travelling salesman problem and the knapsack problem,
which are interdependent.
The problem can be introduced with the following simplified statement:
”Given n cities and m items scattered among these cities, a
thief with his rented knapsack should visit all n cities, once
and only once each, and pick up some items. The more the
knapsack gets heavier, the more the thief becomes slower. What
is the best path and picking plan to adopt to achieve the best
benefit ?”.
Two particular properties can be extracted from the statement above. First, the overall problem is composed of two
sub-problems: choosing the best path and picking up the most
profitable items. Second, the sub-problems are interdependent:
when the knapsack gets heavier, the speed of the thief decreases. The composition increases the number of possible
solutions, and the interdependence makes it impossible to
isolate sub-problems.
This kind of multiple interdependent components is widely
found in logistics and supply chain management. Nevertheless, few attempts have been made to study and solve these
problems as a whole, and a lot of effort have been made to
solve the components independently. In [3], the authors explain
why there is a gap between the work done by the Evolutionary Computation researchers and real-world applications. As
far as we know, these observations can be extended to all
metaheuristics community.
Examples of other realistic problems with multiple interdependent sub-problems include most supply chain optimization
problems [7], [8], routing problems with loading constraints
such as 2L-CVRP and 3L-CVRP [9], [10], [3], and water tank
delivery [14].
Since TTP was introduced, some algorithms were proposed
to solve it. An Evolutionary Algorithm and a Random Local
Search were proposed in [13] to provide a starting point to
other researchers. In [2], an approach named Cosolver was
introduced to solve TTP by separating the sub-problems and
managing a communication between them. Lastly, an interesting work on TTP introduces many complexity reduction
techniques in order to solve very large instances in a time
budget of 10 minutes [11].
In this paper, we follow the ideas proposed in [2] and [11]
to propose further improvements and introduce an algorithm
based on the Cosolver framework that can solve TTP instances
efficiently.
This paper is organized as follows. In section II TTP is
mathematically defined and investigated. Section III is dedicated to introduce our approach for solving TTP. The tests and
results are presented in section IV. Section V concludes the
paper and outlines areas for future research.
II. BACKGROUND
In this section, we present some background information
about TTP. The problem is formulated and an abstract algorithm is presented.
A. The Travelling Thief Problem
Herein we formulate the Travelling Thief Problem (TTP)
which combines two other well known benchmark problems,
namely the Travelling Salesman Problem (TSP) and the Knapsack Problem (KP).
In TTP, we consider n cities and the associated distance
matrix {dij }. There are m items scattered in these cities, each
item k have a profit pk and a weight wk . A thief with his
knapsack is going to visit all these cities (once and only once
978-1-5090-0478-2/15/$31.00 c 2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any
current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or
redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
each), and pick up some items to fill his knapsack. We note
W the maximum capacity of the knapsack, vmin and vmax are
the minimum and maximum possible velocity respectively.
Also, we consider also the following constraints and parameters:
•
•
•
Each item is available in only one city. We note {Ai } the
availability vector, Ai ∈ {1, ..., n} contains the reference
to the city that contains the item i.
We suppose that the knapsack is rented. We note R the
renting price per time unit.
The velocity of the thief changes accordingly to the
knapsack weight. We note vxi the velocity of the thief
at city xi (see equation 1).
vxi = vmax − C ∗ wxi
(1)
−vmin
where C = vmaxW
is a constant value, and wxi
represents the weight of the knapsack at city xi .
The goal of the problem is to find the tour x and the picking
plan z that optimize the total travel gain defined in equation
2.
G(x, z) = g(z) − R ∗ f (x, z)
(2)
P
Where g(z) = m pm ∗ zm is the total value of the items
Pn−1
P
subject to m wm ∗ zm ≤ W , and f (x, z) = i=1 txi ,xi+1 +
txn ,x1 is the total travel time.
The solutions could be naturally coded as follows. The tour
x = (x1 , ..., xn ) is a vector containing the ordered list of cities,
and the picking plan z = (z1 , ..., zn ) is a binary vector such
as zi is equal to 1 if the item i is picked, 0 otherwise.
The interdependence between KP and TSP have been investigated. As shown in [1], [11], optimizing the sub-problems
in isolation (even to optimality) does not guarantee finding
good solutions for the overall problem. Therefore, finding good
global solutions requires an algorithm that takes interdependence of components in consideration, which makes the design
of such an algorithm quite difficult.
B. Cosolver
Cosolver is an abstract algorithm proposed in [2] to solve
TTP. The idea behind the algorithm is simple. Decompose
the overall problem and solve components separately using a
fitness function that takes in consideration the interdependence
between the two components.
Thus, given an initial solution (x0 , z0 ), TTP is decomposed
into the following problems.
1) The Travelling Salesman with Knapsack Problem
(TSKP): consists of finding the best tour x′ that, combined
with the last found picking plan z ′ , optimizes the TTP objective function G. Also, because the total profit function g
does not depend on the tour, instead of maximizing G, we
can consider minimizing the total travel cost T (see equation
3).
T (x, z) = R ∗ f (x, z)
(3)
2) The Knapsack on the Route Problem (KRP): consists of
finding the best picking plan z ′ that maximizes the total gain
G when combined with the last found tour x′ .
Figure 1 represents a flowchart of the Cosolver framework.
III. P ROPOSED
APPROACH
In this section, we propose an algorithm that implements
the Cosolver framework and uses some techniques proposed
in [11].
A. Solution initialization
In TTP, the initial solution has a big impact on the search
algorithm. Thus, the initialization strategy should be chosen
carefully. In our implementation, we use a heuristic approach
to initialize both the tour and the picking plan.
Firstly, the tour is generated using a good TSP algorithm
such as the Lin-Kernighan heuristic [6] or the Ant Colony
Optimization algorithm [5].
Then, the picking plan is initialized using the following
approach.
1) The insertion heuristic proposed in [11] is used to
fill the knapsack with items according to three fitness
approximations.
2) A simple bit-flip search on inserted items is performed
to eliminate some useless items from the picking plan
using the objective function.
We will refer to this heuristic as the insertion & elimination
heuristic.
B. Complexity reduction techniques
Our algorithm uses the following complexity reduction
techniques.
1) TSKP neighborhood reduction: The Delaunay triangulation [4] is used as a candidate generator for the 2-OPT
heuristic. This strategy was also proposed in [11].
2) Objective value recovery: Instead of using the objective
function to calculate the objective value of neighbors, this
value can be recovered by keeping track of time and weight
information at each tour’s city. The following vectors are used
to perform such operation.
acc
• Time accumulator (t
): a vector that contains the current
time at each city of the tour.
acc
• Weight accumulator (w
): a vector that contains the
current weight at each city of the tour.
reg
• Time register (t
): a vector that contains the added time
at each city of the tour.
reg
• Weight register (w
): a vector that contains the added
weight at each city of the tour.
Figure 2 shows the effect (in gray) of mutating a TTP
solution on the total travel time. Two mutations are shown
(in black): the one-bit-flip on the picking plan, and a 2-OPT
exchange on the tour.
A similar technique named incremental evaluation was
proposed in [11]. In our implementation, we go further and
use these techniques also to recover the vectors.
Fig. 1.
bit- ip
x(1)
A simplified Cosolver flowchart
x(i)
x(n)
t(1)
t(i-1)
x(1)
2-opt
t(n)
x(j)
x(i)
x(n)
t(1)
t(n)
t(i)
t(j)
Fig. 2. Example of changes that can be applied to a TTP solution (in black)
and its effect on the total traveling time function (in gray)
3) Objective function calculation: The objective function
has a complexity of O(m ∗ n) as proposed in [12], where
m is the number of items and n is the number of cities. The
complexity could be reduced to O(k∗n) where k is the number
of items per city. In the CEC ’2015 competition website 1 ,
the Java implementations already has a reduced complexity
but it uses a technique highly dependent on the TTP instance
generator. We believe that a better way is to class items per
city.
Figure 3 explains this technique using a simple example. In
the example, 4 cities are considered: city 1 contains 4 items (1,
2, 3 and 4), city 2 contains 2 items (5 and 6), city 3 contains
no items, city 4 contains 3 items (7, 8 and 9).
Fig. 4.
Fig. 3.
Data structure for classing items by cities
C. Proposed algorithm
Our heuristic, namely Cosolver2B, is based on local search
algorithms, and it implements the Cosolver framework. In
addition to the techniques presented above, we use the 2-OPT
heuristic to solve TSKP and a bit-flip search to solve the KRP.
The algorithm is summarized in the flowchart in figure 4.
1 http://cs.adelaide.edu.au/
optlog/CEC2015Comp/
Cosolver2B: Cosolver with 2-opt and bit-flip
The algorithm starts with a tour generated using the LinKernighan heuristic. The insertion & elimination heuristic is
then used to initialize the picking plan. The obtained tour
and picking plan are then given to the TSKP optimizer that
tries to improve the current tour using a 2-OPT heuristic.
The resulting tour is combined with the current picking plan
and given to the KRP optimizer that uses a simple bit-flip to
find a decent picking plan. If there is improvement, the new
picking plan is combined with the current tour and given to
the TSKP optimizer. This process is repeated until there is no
improvement.
IV. E XPERIMENTAL RESULTS
We tested our algorithm on 15 TTP instances of various
sizes [13]. The obtained results are compared with RLS and
TABLE I
R ESULTS OF C OSOLVER 2B COMPARED TO EA AND RLS
instance
berlin52 n255 uncorr-similar-weights 05
kroA100 n495 uncorr-similar-weights 05
ch150 n745 uncorr-similar-weights 05
ts225 n1120 uncorr-similar-weights 05
a280 n1395 uncorr-similar-weights 05.ttp
lin318 n1585 uncorr-similar-weights 05
u574 n2865 uncorr-similar-weights 05
dsj1000 n4995 uncorr-similar-weights 05
rl1304 n6515 uncorr-similar-weights 05
fl1577 n7880 uncorr-similar-weights 05
d2103 n10510 uncorr-similar-weights 05
pcb3038 n15185 uncorr-similar-weights 05
fnl4461 n22300 uncorr-similar-weights 05
rl11849 n59240 uncorr-similar-weights 05
usa13509 n67540 uncorr-similar-weights 05
pla33810 n169045 uncorr-similar-weights 05
EA
Cosolver2B
firstfit
Cosolver2B
bestfit
objective
time
objective
RLS
time
objective
time
objective
time
20591
38864
40922
84907
104365
75387
223165
320165
573667
589756
801110
1119168
1477673
2152954
2226676
-9929644
1.28
1.92
2.69
3.82
5.64
6.87
21
47
95
127
214
427
600
600
600
600
20591
38864
40922
84907
104365
75387
223165
320165
573667
589756
801110
1119169
1478963
4328939
5077892
-3158915
0.89
1.06
1.38
1.69
1.84
3.81
5.42
12
21
28
44
101
265
600
600
600
25440
39599
52225
88925
107233
114915
243571
332916
571634
665866
869584
1117659
1220469
1785671
4420300
14887314
0.13
0.21
0.38
0.61
0.88
1.25
5.36
5.95
68
139
357
600
600
600
600
600
26658
39597
53075
89079
112003
114915
253770
332917
586576
684731
869584
1086092
696650
478884
4082169
15085752
0.11
0.27
0.43
0.92
1.09
1.54
6.51
8.44
83
148
389
600
600
600
600
600
EA proposed in the same paper 2 .
We have implemented two versions of Cosolver2B. The first
is best fit (also known as best improvement) which searches
the entire neighborhood on a given iteration and selects the
best neighbor. The second is first fit (also known as first
improvement) which stops the neighborhood search once a
better solution is found.
Since our algorithms are deterministic, one run per instance
is sufficient. The algorithms have a maximum runtime limit
of 600 seconds. Note that our implementation uses the Java
platform, and the tests are performed on a core i3-2370M CPU
2.40GHz machine with 4 GB of RAM, running Linux.
On the other hand, due to their random behavior, 30 runs
per instance were performed using RLS and EA. The tests on
EA and RLS were performed on a different machine (Matlab
2014, core i7 2600 CPU 3.4 GHz, with 4GB of RAM, running
Windows 7). Thus, The runtimes for these algorithms are given
for guidance. Furthermore, in our comparison, we only select
the best found solution for these two algorithms.
The results are reported in table I. Note that the runtimes
are measured with seconds and the best objective values are
made bolder.
The results show that our algorithm was able to find new
better solutions for most tested instances only by combining
local search algorithms. Furthermore, we have made the following observations:
• Cosolver2B surpasses EA and RLS on various TTP sizes.
• The runtime of Cosolver2B is very decent for small and
mid-size instances. However, for very large instances the
runtime is quite high compared to RLS and EA.
2 for
instance files and raw results of RLS and EA, the reader is referred to
https://sites.google.com/site/mohammadrezabonyadi/standarddatabases/travellingthief-problem-data-bases-and-raw-results
•
•
•
Both EA and RLS have an unpredictable behavior, while
Cosolver2B is deterministic and garantees decent solutions for most instances.
For many instances, most optimization runtime and gain
improvement is done on the KRP sub-problem.
The best fit strategy performed better than first fit for
most small and mid-size instances.
V. C ONCLUSION
In this paper, a combined local search heuristic has been
proposed. Our approach is based on the Cosolver framework
and complexity reduction techniques. The experimental results
have shown promising results both in terms of solution quality
and runtime. The good performance of Cosolver2B and the
memetic algorithm MALTS on very large scale instances
[11] proves the importance of making strong assumptions
about the problem domain when dealing with multi-component
problems.
Furthermore, we engage to improve our algorithm in terms
of space exploration and runtime by using more sophisticated
search heuristics.
ACKNOWLEDGMENT
The authors express their gratefulness to the following
persons who have contributed to this work with their useful
comments: Asmae El Ghazi, Aziz Ouaarab, and Mehdi El
Krari.
R EFERENCES
[1] Mohammad Reza Bonyadi, Zbigniew Michalewicz, and Luigi Barone.
The travelling thief problem: the first step in the transition from
theoretical problems to realistic problems. In Evolutionary Computation
(CEC), 2013 IEEE Congress on, pages 1037–1044. IEEE, 2013.
[2] Mohammad Reza Bonyadi, Zbigniew Michalewicz, Michaŏ Roman Przybyŏek, and Adam Wierzbicki. Socially inspired algorithms
for the travelling thief problem. In Proceedings of the 2014 conference
on Genetic and evolutionary computation, pages 421–428. ACM, 2014.
[3] Andreas Bortfeldt. A hybrid algorithm for the capacitated vehicle
routing problem with three-dimensional loading constraints. Computers
& Operations Research, 39(9):2248–2257, 2012.
[4] Boris Delaunay. Sur la sphere vide. Izv. Akad. Nauk SSSR, Otdelenie
Matematicheskii i Estestvennyka Nauk, 7(793-800):1–2, 1934.
[5] Marco Dorigo and Luca Maria Gambardella. Ant colonies for the
travelling salesman problem. BioSystems, 43(2):73–81, 1997.
[6] Keld Helsgaun. An effective implementation of the lin–kernighan
traveling salesman heuristic. European Journal of Operational Research,
126(1):106–130, 2000.
[7] Maksud Ibrahimov, Arvind Mohais, Sven Schellenberg, and Zbigniew
Michalewicz. Evolutionary approaches for supply chain optimisation:
part i: single and two-component supply chains. International Journal
of Intelligent Computing and Cybernetics, 5(4):444–472, 2012.
[8] Maksud Ibrahimov, Arvind Mohais, Sven Schellenberg, and Zbigniew
Michalewicz. Evolutionary approaches for supply chain optimisation.
part ii: multi-silo supply chains. International Journal of Intelligent
Computing and Cybernetics, 5(4):473–499, 2012.
[9] Manuel Iori and Silvano Martello. Routing problems with loading
constraints. Top, 18(1):4–27, 2010.
[10] Stephen CH Leung, Zhenzhen Zhang, Defu Zhang, Xian Hua, and
Ming K Lim. A meta-heuristic algorithm for heterogeneous fleet vehicle
routing problems with two-dimensional loading constraints. European
Journal of Operational Research, 225(2):199–210, 2013.
[11] Yi Mei, Xiaodong Li, and Xin Yao. Improving efficiency of heuristics
for the large scale traveling thief problem. In Simulated Evolution and
Learning, pages 631–643. Springer, 2014.
[12] Yi Mei, Xiaodong Li, and Xin Yao. On investigation of interdependence
between sub-problems of the travelling thief problem. Soft Computing,
pages 1–16, 2014.
[13] Sergey Polyakovskiy, Mohammad Reza, Markus Wagner, Zbigniew
Michalewicz, and Frank Neumann. A comprehensive benchmark set
and heuristics for the traveling thief problem. In Proceedings of the Genetic and Evolutionary Computation Conference (GECCO), Vancouver,
Canada, 2014.
[14] Jacob Stolk, Isaac Mann, Arvind Mohais, and Zbigniew Michalewicz.
Combining vehicle routing and packing for optimal delivery schedules
of water tanks. OR Insight, 26(3):167–190, 2013.
| 8cs.DS
|
arXiv:cs/0204047v2 [cs.CE] 22 Apr 2002
Sampling Strategies for Mining in Data-Scarce Domains
Chris Bailey-Kellogg
Department of Computer Sciences
Purdue University, IN 47907
Tel: (765) 494-9025
Email: [email protected]
Naren Ramakrishnan
Department of Computer Science
Virginia Tech, VA 24061
Tel: (540) 231-8451
Email: [email protected]
Abstract
Data mining has traditionally focused on the task of drawing inferences from large datasets. However, many
scientific and engineering domains, such as fluid dynamics and aircraft design, are characterized by scarce data,
due to the expense and complexity of associated experiments and simulations. In such data-scarce domains, it
is advantageous to focus the data collection effort on only those regions deemed most important to support a
particular data mining objective. This paper describes a mechanism that interleaves bottom-up data mining, to
uncover multi-level structures in spatial data, with top-down sampling, to clarify difficult decisions in the mining
process. The mechanism exploits relevant physical properties, such as continuity, correspondence, and locality,
in a unified framework. This leads to effective mining and sampling decisions that are explainable in terms of
domain knowledge and data characteristics. This approach is demonstrated in two diverse applications — mining
pockets in spatial data, and qualitative determination of Jordan forms of matrices.
1 Introduction
A number of important scientific and engineering applications, such as fluid dynamics simulation and aircraft design,
require analysis of spatially-distributed data from expensive experiments and/or complex simulations demanding
days, weeks, or even years on petaflops-class computing systems. For example, consider the conceptual design of
a high-speed civil transport (HSCT), which involves the disciplines of aerodynamics, structures, controls (missionrelated), and propulsion. 80% of the aircraft lifecycle cost is determined at this stage. Fig. 1 shows a cross-section
of the design space for such a problem involving 29 design variables with 68 constraints [10]. Frequently, the
engineer will change some aspect of a nominal design point, and run a simulation to see how the change affects
the objective function and various constraints dealing with aircraft geometry and performance/aerodynamics. Or
the design process is made configurable, so the engineer can concentrate on accurately modeling some aspect (e.g.,
the interaction between the wing root and the fuselage) while replacing the remainder of the design with fixed
boundary conditions surrounding the focal area. Both these approaches are inadequate for exploring such large
high-dimensional design spaces, even at low fidelity. Ideally, the design engineer would like a high-level mining
system to identify the pockets that contain good designs and which merit further consideration; traditional tools
from optimization and approximation theory can then be applied to fine-tune such preliminary analyses.
Three important characteristics distinguish such applications. First, they are characterized not by an abundance
of data, but rather by a scarcity of data (owing to the cost and time involved in conducting simulations). Second, the
computational scientist has complete control over the data acquisition process (e.g. regions of the design space where
data can be collected), especially via computer simulations. And finally, there exists significant domain knowledge
in the form of physical properties such as continuity, correspondence, and locality. It is natural therefore to use
such information to focus data collection for data mining. In this paper, we are interested in the question: ‘Given a
simulation code, knowledge of physical properties, and a data mining goal, at what points should data be collected?’
1
no constraint violations
constraints active
constraints violated
range constraint
landing CLmax and tip scrape
tip spike constraint
Optimum 2
TOGW
658000
657000
656000
655000
654000
653000
652000
651000
650000
649000
648000
647000
646000
645000
644000
Optimum 1
Figure 1: A pocket in an aircraft design space viewed as a slice through three design points [10] (courtesy Layne T.
Watson).
By suitably formulating an objective function and constraints around this question, we can pose it as a problem
of minimizing the number of samples needed for data mining. Such a combination of {data-scarcity + control
over data collection + need to exploit domain knowledge} characterizes many important computational science
applications. Data mining is now recognized as a key solution approach for such applications, supporting analysis,
visualization, and design tasks [17]. It serves a primary role in many domains (e.g., microarray bioinformatics) and a
complementary role in others, by augmenting traditional techniques from numerical analysis, statistics, and machine
learning.
The goal of this paper is to describe focused sampling strategies for mining scientific data. Our approach is
based on the spatial aggregation language (SAL) [3], which supports construction of data interpretation and control
design applications for spatially-distributed physical systems. Used as a basis for describing data mining algorithms,
SAL programs also help exploit knowledge of physical properties such as continuity and locality in data fields. They
work in a bottom-up manner to uncover regions of uniformity in spatially distributed data. In conjunction with
this process, we introduce a top-down sampling strategy that focuses data collection in only those regions that are
deemed most important to support a data mining objective. Together, they help define a methodology for mining in
data-scarce domains. We describe this methodology at a high-level and devote the major part of the paper to two
applications that employ it.
2
2 A Methodology for Mining in Data-Scarce Domains
It is possible to study the problem of sampling for targeted data mining activities, such as clustering, finding association rules, and decision tree construction [9]. This is the approach taken by work such as [12]. In this paper,
however, we are interested in a general framework or language to express data mining operations on datasets and
which can be used to study the design of data collection and sampling strategies. The spatial aggregation language
(SAL) [3, 19] is such a framework.
2.1 SAL: The Spatial Aggregation Language
As a data mining framework, SAL is based on successive manipulations of data fields by a uniform vocabulary
of aggregation, classification, and abstraction operators. Programming in SAL follows a philosophy of building a
multi-layer hierarchy of aggregations of data. These increasingly abstract descriptions of data are built using explicit
representations of physical knowledge, expressed as metrics, adjacency relations, and equivalence predicates. This
allows a SAL program to uncover and exploit structures in physical data.
SAL programs employ what has been called an imagistic reasoning style [20]. They employ vision-like routines
to manipulate multi-layer geometric and topological structures in spatially distributed data. SAL adopts a field
ontology, in which the input is a field mapping from one continuum to another (e.g. 2-D temperature field: R2 → R1 ;
3-D fluid flow field: R3 → R3 ). Multi-layer structures arise from continuities in fields at multiple scales. Due to
continuity, fields exhibit regions of uniformity, and these regions of uniformity can be abstracted as higher-level
structures which in turn exhibit their own continuities. Task-specific domain knowledge specifies how to uncover
such regions of uniformity, defining metrics for closeness of both field objects and their features. For example,
isothermal contours are connected curves of nearby points with equal (or similar enough) temperature.
The identification of structures in a field is a form of data reduction: a relatively information-rich field representation is abstracted into a more concise structural representation (e.g. pressure data points into isobar curves or pressure
cells; isobar curve segments into troughs). Navigating the mapping from field to abstract description through multiple layers rather than in one giant step allows the construction of more modular programs with more manageable
pieces that can use similar processing techniques at different levels of abstraction. The multi-level mapping also
allows higher-level layers to use global properties of lower-level objects as local properties of the higher-level objects. For example, the average temperature in a region is a global property when considered with respect to the
temperature data points, but a local property when considered with respect to a more abstract region description. As
this paper demonstrates, analysis of higher-level structures in such a hierarchy can guide interpretation of lower-level
data.
SAL supports structure discovery through a small set of generic operators, parameterized with domain-specific
knowledge, on uniform data types. These operators and data types mediate increasingly abstract descriptions of the
input data (see Fig. 2) to form higher-level abstractions and mine patterns. The primitives in SAL are contiguous
regions of space called spatial objects; the compounds are (possibly structured) collections of spatial objects; the
abstraction mechanisms connect collections at one level of abstraction with single objects at a higher level.
SAL is currently available as a C++ library1 providing access to a large set of data type implementations and
operations. In addition, an interpreted, interaction environment layered over the library supports rapid prototyping
of data mining applications. It allows users to inspect data and structures, test the effects of different predicates, and
graphically interact with representations of the structures.
To illustrate SAL programming style, consider the task of bundling vectors in a given vector field (e.g. wind
velocity or temperature gradient) into a set of streamlines (paths through the field following the vector directions).
This process can be depicted as shown in Fig. 3 and the corresponding SAL data mining program is shown in
1
The SAL implementation can be downloaded from http://www.cis.ohio-state.edu/insight/sal-code.html.
3
Abstract Description
Higher-Level Objects
Disaggregate
Redescribe
Structural description
Equivalence
classes
Map, Filter,
geometric ops
Update
Classify
Spatial
objects
Redescribe
Behavioral description
Aggregate
Disaggregate
N-graph
Search
Consistent?
Lower-Level Objects
Input Field
Figure 2: SAL multi-layer spatial aggregates, uncovered by a uniform vocabulary of operators utilizing domain
knowledge. A variety of scientific data mining tasks, such as vector field bundling, contour aggregation, correspondence abstraction, clustering, and uncovering regions of uniformity can be expressed as multi-level computations
with SAL aggregates.
4
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
Figure 3: Example steps in SAL implementation of vector field analysis application. (a) Input vector field. (b) 8adjacency neighborhood graph. (c) Forward neighbors. (d) Best forward neighbors. (e) Ngraph transposed from best
forward neighbors. (f) Best backward neighbors. (g) Resulting adjacencies redescribed as curves. (h) Higher-level
aggregation and classification of curves whose flows converge.
5
// (a) Read vector field.
vect_field = read_point_point_field(infile);
points = domain_space(vect_field);
// (b) Aggregate with 8-adjacency (i.e. within 1.5 units).
point_ngraph = aggregate(points, make_ngraph_near(1.5));
// (c) Compare vector directions with node-neighbor direction.
angle = function (p1, p2) {
dot(normalize(mean(feature(vect_field, p1), feature(vect_field, p2))),
normalize(subtract(p2, p1)))
}
forward_ngraph = filter_ngraph(adj in point_ngraph, {
angle(from(adj), to(adj)) > angle similarity
})
// (d) Find best forward neighbor, comparing vector direction
// with ngraph edge direction and penalizing for distance.
forward_metric = function (adj) {
angle(from(adj), to(adj)) - distance penalty * distance(from(adj),to(adj))
}
best_forward_ngraph = best_neighbors_ngraph(forward_ngraph, forward_metric);
// (e) Find backward neighbors by transposing best forward neighbors.
backward_ngraph = transpose_ngraph(best_forward_ngraph);
// (f) At junctions, keep best backward neighbor using metric
// similar to that for best forward neighbors.
backward_metric = function (adj) {
angle(to(adj), from(adj)) - distance penalty*distance(from(adj),to(adj))
}
best_backward_ngraph = best_neighbors_ngraph(backward_ngraph, backward_metric);
// (g) Move to a higher abstraction level by forming equivalence classes
// from remaining groups and redescribing them as curves.
final_ngraph = symmetric_ngraph(best_backward_ngraph, extend=true);
point_classes = classify(points, make_classifier_transitive(final_ngraph));
points_to_curves = redescribe(classes(point_classes),
make_redescribe_op_path_nline(final_ngraph));
trajs = high_level_objects(points_to_curves);
Figure 4: SAL data mining program for the vector field analysis application of Fig. 3.
6
Fig. 4. The steps in this program are as follows: (a) Establish a field mapping points (locations) to points (vector
directions, assumed here to be normalized). (b) Localize computation with a neighborhood graph, so that only
spatially proximate points are compared. (c)–(f) Use a series of local computations on this representation to find
equivalence classes of neighboring vectors with respect to vector direction (systematically eliminate all edges but
those whose directions best match the vector direction at both endpoints). (g) Redescribe equivalence classes of
vectors into more abstract streamline curves. (h) Aggregate and classify these curves into groups with similar flow
behavior, using the exact same operators but with different metrics (code not shown). As this example illustrates,
SAL provides a vocabulary for expressing the knowledge required (e.g., distance metrics and similarity metrics) for
uncovering multi-level structures in spatial datasets. It has been applied to applications ranging from decentralized
control design [2] to analysis of diffusion-reaction morphogenesis [16].
2.2 Data Collection and Sampling
The above example illustrated the use of SAL in a data-rich domain. The exploitation of physical properties is
a central tenet of SAL since it drives the computation of multi-level spatial aggregates. Many important physical
properties can be expressed as SAL computations by suitably defining adjacency relations and aggregation metrics.
To extend the use of SAL to data-scarce settings, we present the sampling methodology outlined in Fig. 5.
Once again, it is easy to understand the methodology in the context of the vector-field bundling application
(Fig. 3). Assume that we apply the SAL data mining program of Fig. 4 with a small dataset and have navigated upto
the highest level of the hierarchy (streamlines bundled with convergent flows). The SAL program computes different
streamline aggregations from a neighborhood graph and chooses one based on how well its curvature matches the
direction of the vectors it aggregates. If data is scarce, it is likely that some of these classification decisions will be
ambiguous, i.e., there may exist multiple streamline aggregations. In such a case, we would like to choose a new
data sample that reduces the ambiguity and clarifies what the correct classification should be.
This is the essence of our sampling methodology: using SAL aggregates, we identify an information-theoretic
measure (here, ambiguity) that can be used to drive stages of future data collection. For instance, the ambiguous
streamline classifications can be summarized as a 2D ambiguity distribution that has a spike for every location
where an ambiguity was detected. Reduction of ambiguity can be posed as the problem of minimization of (or
maximization, as the case may be) a functional involving the (computed) ambiguity. The functional could be the
entropy in the underlying data field, as revealed by the ambiguity distribution. Such a minimization will lead us to
selecting a data point(s) that clarifies the distribution of streamlines, and hence makes more effective use of data
for data mining purposes. The net effect of this methodology is that we are able to capture the desirability of a
particular design (data layout) in terms of computations involving SAL aggregates. Thus, sampling is conducted
for the express purpose of improving the quality and efficacy of data mining. The dataset is updated with the newly
collected value and the process is repeated till a desired stopping criteria is met. For instance, we could terminate
if the functional is within accepted bounds, or when there is no improvement in confidence of data mining results
between successive rounds of data collection. In our case, when there is no further ambiguity.
This idea of sampling to satisfy particular design criteria has been studied in various contexts, especially spatial
statistics [6, 11, 18]. Many of these approaches (including ours) rely on capturing properties of a desirable design
in terms of a novel objective function. The distinguishing feature of our work is that it uses spatial information
gleaned from a higher level of abstraction to focus data collection at the field/simulation code layer. The applications
presented here are also novel in that they span and connect arbitrary levels of abstraction, thus suggesting new ways
to integrate qualitative and quantitative simulation [4].
We present concrete realizations of the above methodology in the next section. But before we proceed, it is
pertinent to note an optional step in our methodology. The newly collected data value can be used to improve a
surrogate model which then generates a dense data field for mining. A surrogate function is something that is used
in lieu of the real data source, so as to generate sufficient data for mining purposes. This is often more advantageous
7
Step 2: Calculate information
SAL Objects
theoretic measure M from SAL
......
Step 3: Capture design merits
as a functional involving M
Step 1: Data mining using
successive spatial aggregation
SAL Objects
Step 4: Sample data point(s)
to minimize the functional
SAL Objects
Data field
Optional: Improve surrogate model
Figure 5: The sampling methodology for SAL mining in data-scarce domains.
than working directly with sparse data. Surrogate models are widely used in engineering design, optimization, and
in response surface approximations [13, 15].
Together, SAL and our focused sampling methodology address the main issues raised in the beginning of the
paper: SAL’s uniform use of fields and abstraction operators allows us to exploit prior knowledge in a bottom-up
manner. Discrepancies as suggested by our knowledge of physical properties (e.g., ambiguities) are used in a topdown manner by the sampling methodology. Continuing these two stages alternatively leads to a closed-loop data
mining solution for data-scarce domains.
3 Example Applications
3.1 Mining Pockets in Spatial Data
Our first application is motivated by the aircraft design problem and is meant to illustrate the basic idea of our
methodology. Here, we are given a spatial vector field and we wish to identify pockets underlying the gradient. In
a weather map, this might mean identifying pressure troughs, for instance. The question is: ‘where should data be
collected so that we are able to mine the pockets with high confidence?’ We begin by presenting a mathematical
function that gives rise to pockets in spatial fields. This function will be used to validate and test our data mining
and sampling methodology.
de Boor’s function
Carl de Boor invented a pocket function that exploits containment properties of the n-sphere of radius 1 centered
at the origin (Σxi 2 ≤ 1) with respect to the n-dimensional hypercube defined by xi ∈ [−1, 1], i = 1 · · · n. Even
though the sphere is embedded inside the cube, notice that the ratio of the volume of the cube (2n ) to that of the sphere
(π n/2 /(n/2)!) grows unboundedly with n. This means that the volume of a high-dimensional cube is concentrated
in its corners (a counterintuitive notion at first). de Boor exploited this property to design a difficult-to-optimize
8
1
0.5
0
−0.5
−1
−1.5
−2
1
0.5
1
0.5
0
0
−0.5
−0.5
−1
−1
Figure 6: A 2D pocket function.
function which assumes a pocket in each corner of the cube (Fig. 6), that is just outside the sphere. Formally, it can
be defined as:
!
n
X
xi
i
2 1+
α(X) = cos
−2
(1)
| xi |
i=1
δ(X) = kX − 0.5Ik
(2)
2
p(X) = α(X)(1 − δ (X)(3 − 2δ(X))) + 1
(3)
where X is the n-dimensional point (x1 , x2 , · · · , xn ) at which the pocket function p is evaluated, I is the identity
n-vector, and k · k is the L2 norm.
It is easily seen that p has 2n pockets (local minima); if n is large (say, 30, which means it will take more than
half a million points to just represent the corners of the n-cube!), naive global optimization algorithms will require
an unreasonable number of function evaluations to find the pockets. Our goal for data mining here is to obtain a
qualitative indication of the existence, number, and locations of pockets, using low-fidelity models and/or as few
data points as possible. The results can then be used to seed higher-fidelity calculations. This is also fundamentally
different from DACE [18], polynomial response surface approximations [13], and other approaches in geo-statistics
where the goal is accuracy of functional prediction at untested data points. Here, accuracy of estimation is traded for
the ability to mine pockets.
Surrogate Function
In this study, we use the SAL vector-field bundling code presented earlier along with a surrogate model as the basis
for generating a dense field of data. Surrogate theory is an established area in engineering optimization and there are
several ways in which we can build a surrogate. However, the local nature of SAL computations means that we can
be selective about our choice of surrogate representation. For example, global, least-squares type approximations
are inappropriate since measurements at all locations are equally considered to uncover trends and patterns in a
particular region. We advocate the use of kriging-type interpolators [18], which are local modeling methods with
roots in Bayesian statistics. Kriging can handle situations with multiple local extrema (for example, in weather data,
remote sensing data, etc.) and can easily exploit anisotropies and trends. Given k observations, the interpolated
model gives exact responses at these k sites and estimates values at other sites by minimizing the mean squared error
(MSE), assuming a random data process with zero mean and a known covariance function.
Formally (for two dimensions), the true function p is assumed to be the realization of a random process such as:
p(x, y) = β + Z(x, y)
9
(4)
where β is typically a uniform random variate, estimated based on the known k values of p, and Z is a correlation
function. Kriging then estimates a model p′ of the same form, based on the k observations:
p′ (xi , yi ) = E(p(xi , yi ) | p(x1 , y1 ), · · · , p(xk , yk ))
(5)
and minimizing mean squared error between p′ and p:
M SE = E(p′ (x, y) − p(x, y))2
(6)
A typical choice for Z in p′ is σ 2 R, where scalar σ 2 is the estimated variance, and correlation matrix R encodes
domain-specific constraints and reflects the current fidelity of data. We use an exponential function for entries in R,
with two parameters C1 and C2 :
2
2
(7)
Rij = e−C1 |xi −xj | −C2 |yi −yj |
Intuitively, values at closer points should be more highly correlated.
The estimator minimizing mean squared error is then obtained by multi-dimensional optimization (the derivation
from Eqs. 6 and 7 is beyond the scope of this paper):
max
C
−k
(ln σ 2 + ln |R|)
2
(8)
This expression satisfies the conditions that there is no error between the model and the true values at the chosen k
sites, and that all variability in the model arises from the design of Z. The multi-dimensional optimization is often
performed by gradient descent or pattern search methods. More details are available in [18], which demonstrates
this methodology in the context of the design and analysis of computer experiments.
Data Mining and Sampling Methodology
The bottom-up computation of SAL aggregates from the surrogate model’s outputs will possibly lead to some ambiguous streamline classifications, as discussed earlier. Ambiguity can reflect the desirability of acquiring data at
or near a specified point, to clarify the correct classification and to serve as a mathematical criterion of information
content. There are several ways in which we can use information about ambiguity to drive data collection. In this
study, we express the ambiguities as a distribution describing the number of possible good neighbors (for a streamline). This ambiguity distribution provides a novel mechanism to include qualitative information — streamlines that
agree will generally contribute less to data mining, for information purposes. The information-theoretic measure M
(ref. Fig. 5) was thus defined to be the ambiguity distribution ℘.
The functional was defined as the posterior entropy E(− log d), where d is the conditional density of ℘ over the
design space not covered by the current data values. By a reduction argument, minimizing this posterior entropy
can be shown to be maximizing the prior entropy over the unsampled design space [18]. In turn, this means that the
amount of information obtained from an experiment (additional data collection) is maximized. In addition, we also
incorporated ℘ as an indicator covariance term in our surrogate model (this is a conventional method for including
qualitative information in an interpolatory model [11]).
Experimental Results
The initial experimental configuration used a face-centered design (4 points in the 2D case). A surrogate model by
kriging interpolation then generated data on a 41n -point grid. de Boor’s function was used as the source for data
values; we also employed pseudorandom perturbations of it that shift the pockets from the corners in a somewhat
unpredictable way (see [1] for details). In total, we experimented with 100 perturbed variations (each) of the 2D
10
35
30
Krig
Ambig
Freq (%)
25
20
15
10
5
0
5
10
15
# Samples
20
25
Figure 7: Pocket-finding results (2D) show that focused sampling using a measure of ambiguity always requires
fewer total samples (7-15) than conventional kriging (17-23).
and 3D pocket functions. For each of these cases, data collection was organized in rounds of one extra sample each
(that minimizes the above functional). The number of samples needed to mine all the pockets by SAL was recorded.
We also compared our results with those obtained from a pure DACE/kriging approach (i.e., where sampling was
directed at improving accuracy of function estimation). In other words, we used the DACE methodology to suggest
new locations for data collection and determined how these choices fared with respect to mining the pockets.
Fig. 7 shows the distributions of total number of data samples required to mine the four pockets for the 2D
case. We were thus able to mine the 2D pockets using 3 to 11 additional samples, whereas the conventional kriging
approach required 13 to 19 additional samples. The results were were more striking in the 3D case: at most 42
additional samples for focused sampling and upto 151 points for conventional kriging. This shows that our focused
sampling methodology performs 40-75% better than sampling by conventional kriging.
Fig. 8 (left) describes a 2D design involving only 7 total data points that is able to mine the four pockets.
Counterintuitively, no additional sample is required in the lower left quadrant! While this will lead to a highly
sub-optimal design (from the traditional viewpoint of minimizing variance in predicted values), it is nevertheless an
appropriate design for data mining purposes. In particular, this means that neighborhood calculations involving the
other three quadrants are enough to uncover the pocket in the fourth quadrant. Since the kriging interpolator uses
local modeling and since pockets in 2D effectively occupy the quadrants, obtaining measurements at ambiguous
locations serves to capture the relatively narrow regime of each dip, which in turn helps to distinguish the pocket in
the neighboring quadrant. This effect is hard to achieve without exploiting knowledge of physical properties, in this
case, locality of the dips.
3.2 Qualitative Jordan Form Determination
In our second application, we use our methodology to identify the most probable Jordan form of a given matrix.
This is a good application for data mining since the direct computation of the Jordan form leads to a numerically
unstable algorithm.
11
1
0.5
0
−0.5
−1
−1
−0.5
0
0.5
1
Figure 8: Mining pockets in 2D from only 7 sample points. (left) The chosen sample locations: 4 initial facecentered samples (marked as blue circles) plus 3 samples selected by our methodology (marked as red diamonds).
Note that no additional sample is required in the lower-left quadrant. (right) SAL structures in surrogate model data,
confirming the existence of four pockets.
Jordan forms
A matrix A (real or complex) that has r independent eigenvectors has a Jordan form that consists of r blocks. Each
of these blocks is an upper triangular matrix that is associated with one of the eigenvectors of A and whose size
describes the multiplicity of the corresponding eigenvalue. For the given matrix A, the diagonalization thus posits a
nonsingular matrix B such that:
J1
J2
B −1 AB =
(9)
·
Jr
where
λi 1
· 1
Ji =
·
1
λi
(10)
and λi is the eigenvalue revealed by the ith Jordan block (Ji ). The Jordan form is most easily explained by looking
at how eigenvectors are distributed for a given eigenvalue. Consider, for example, the matrix
1
1 −1
0
0
2
0 −1
3
that has eigenvalues at 1, 1, and 2. This matrix has only two eigenvectors, as revealed by the two-block structure of
its Jordan form:
1 1 0
0 1 0
0 0 2
12
−3
1.5
−4
x 10
1.5
1
1
0.5
0.5
0
0
−0.5
−0.5
−1
−1
−1.5
6.998
6.9985
6.999
6.9995
7
7.0005
7.001
7.0015
7.002
x 10
6.9998
6.9999
6.9999
7
7
7.0001
7.0001
7.0002
7.0002
Figure 9: Superimposed spectra for assessing the Jordan form of the Brunet matrix. Two Jordan blocks of multiplicity 3 are observed for eigenvalue 7, at different (left, right) perturbation levels.
The Jordan form is unique modulo shufflings of the blocks and, in this case, shows that there is one eigenvalue (1)
of multiplicity 2 and one eigenvalue (2) of multiplicty 1. We say that the matrix has the Jordan structure given by
(1)2 (2)1 . In contrast, the matrix
1 0 0
0 2 0
0 0 1
has the same eigenvalues but a three-block Jordan structure:
1 0 0
0 1 0
0 0 2
This is because there are three independent eigenvectors (the unit vectors, actually). The diagonalizing matrix is
thus the identity matrix and the Jordan form has three permutations. The Jordan structure is therefore given by
(1)1 (1)1 (2)1 . These two examples show that a given eigenvalue’s multiplicity could be distributed across one,
many, or all Jordan blocks. Correlating the eigenvalue with the block structure is an important problem in numerical
analysis.
The typical approach to computing the Jordan form is to ‘follow the staircase’ pattern of the structure and
perform rank determinations in conjunction with ascertaining the eigenvalues. One of the more serious caveats with
such an approach involves mistaking an eigenvalue of multiplicity > 1 for multiple eigenvalues [8]. In the first
example matrix above, this might lead to inferring that the Jordan form has three blocks. The extra care needed to
safeguard staircase algorithms usually involves more complexity than the original computation to be performed! The
ill-conditioned nature of this computation has thus traditionally prompted numerical analysts to favor other, more
stable, decompositions.
Qualitative assessment of Jordan forms
A recent development has been the acceptance of a qualitative approach to Jordan structure determination, proposed
by Chaitin-Chatelin and Frayssé [5]. This approach does not employ the staircase idea and, instead, exploits a
semantics of eigenvalue perturbations to infer multiplicity. This leads to a geometrically intuitive algorithm that can
be implemented using SAL.
Consider a matrix that has eigenvalues λ1 , λ2 , · · · , λn with multiplicities ρ1 , ρ2 , · · · , ρn (resp). Any attempt at
finding the eigenvalues (e.g., determining the roots of the characteristic polynomial) is intrinsically subject to the
13
0.1
0.1
0
0
−0.1
6.9
7
−0.1
6.9
7.1
0.1
0
−0.1
6.9
7
7.1
0.1
0
7
−0.1
6.9
7.1
7
7.1
Figure 10: Mining Jordan forms from (left) a small sample set, and (right) large sample set. (top) Approximately
congruent triangles. (bottom) Evaluation of correspondence of rotated triangles in terms of match between original
(red dots) and rotated (green circles) samples.
numerical analysis dogma: the problem being solved will actually be a perturbed version of the original problem.
This allows the expression of the computed eigenvalues in terms of perturbations on the actual eigenvalues. It can
be easily seen that the computed eigenvalue corresponding to any λk will be distributed on the complex plane as:
1
iφ
λk + |∆| ρk e ρk
where the phase φ of the perturbation ∆ ranges over {2π, 4π, . . . , 2ρk π} if ∆ is positive and over {3π, 5π, . . . , 2(ρk +
1)π} if ∆ is negative. The insight in [5] is to superimpose numerous such perturbed calculations graphically so that
the aggregate picture reveals the ρk of the eigenvalue λk . Notice that the phase variations imply that the computed
eigenvalues will be lying on the vertices of a regular polygon centered on the actual eigenvalue and where the number of sides is two times the multiplicity of the considered eigenvalue (this takes into account both positive and
negative ∆). Since the diameter of the polygon is influenced by ∆, iterating this process over many ∆ will lead to a
‘sticks’ depiction of the Jordan form.
To illustrate, we choose a matrix whose computations will be more prone to finite precision errors. Perturbations
on the 8-by-8 Brunet matrix [5] with Jordan structure (−1)1 (−2)1 (7)3 (7)3 induce the superimposed structures
shown in Fig. 9. The left part of Fig. 9 depicts normwise relative perturbations in the scale of [2−50 , 2−40 ]. The
six sticks around the eigenvalue at 7 clearly reveal that its Jordan block is of size 3. The other Jordan block, also
centered at 7, is revealed if we conduct our exploration at a finer perturbation level. Fig. 9 reveals the second Jordan
block using perturbations in the range [2−53 , 2−50 ]. The noise in both pictures is a consequence of (i) having two
Jordan blocks with the same size, and (ii) a ‘ring’ phenomenon studied in [7]; we do not attempt to capture these
effects in this paper.
14
Data Mining and Sampling Methodology
For this study, we collect data by random normwise perturbations in a given region and a SAL program determines
multiplicity by detecting symmetry correspondence in the samples. The first aggregation level collects the samples for a given perturbation into triangles. The second aggregation level finds congruent triangles via geometric
hashing [14], and uses congruence to establish an analogy relation among triangle vertices. This relation is then
abstracted into a rotation about a point (the eigenvalue), and evaluated for whether each point rotates onto another
and whether matches define regular polygons. A third level then compares rotations across different perturbations,
re-visiting perturbations or choosing new perturbations in order to disambiguate (see Fig. 10). The end result of this
analysis is a confidence measure on models of possible Jordan forms. Each model is defined by its estimate of λ
and ρ (notice that we are working only within one region at a time). The measure M was defined to be the joint
probability distribution over the space of λ and ρ.
Experimental Results
Since our Jordan form computation treats multiple perturbations (irresp. of level) as independent estimates of eigenstructure, the idea of sampling here is not ‘where to collect,’ but ‘how much to collect.’ The goal of data mining is
hence to improve our confidence in model evaluation. We organized data collection into rounds of 6-8 samples each,
varied a tolerance parameter for triangle congruence from 0.1 to 0.5 (effectively increasing the number of models
posited), and determined the number of rounds needed to determine the Jordan form. As test cases, we used the
set of matrices studied in [5]. On average, our focused sampling approach required 1 round of data collection at a
tolerance of 0.1 and up to 2.7 rounds at 0.5. Even with a large number of models posited, additional data quickly
weeded out bad models. Fig. 10 demonstrates this mechanism on the Brunet matrix discussed above for two sets of
sample points. To the best of our knowledge, this is the only known known focused sampling methodology for this
domain; we hence are unable to present any comparisons. However, it is clear that by harnessing domain knowledge
about correspondences, we have arrived at an intelligent sampling methodology that resembles what a human would
obtain by visual inspection.
4 Discussion
The presented methodology for mining in data-scarce domains has several intrinsic benefits. First, it is based on a
uniform vocabulary of operators that can be exploited for a rich diversity of applications. Second, it demonstrates a
novel factorization to the problem of mining when data is scarce, namely, formulating an experiment design methodology to clarify, disambiguate, and improve confidences in higher-level aggregates of data. This allows us to bridge
qualitative and quantitative information in a unified framework. SAL programs thus uncover bottom-up structures in
data systematically and use difficulties encountered in this process (ambiguities, lack of correspondences) to guide
top-down selection of additional data samples. By using knowledge of physical properties explicitly, our approach
can provide more holistic and explainable results than off-the-shelf data mining algorithms. Third, our methodology
can co-exist with more traditional approaches to problem solving (numerical analysis, optimization) and is not meant
to be a replacement or a contrasting approach. This is amply demonstrated in each of the two applications above,
where connections with various traditional methodologies have been carefully established.
The methodology makes several intrinsic assumptions which we only briefly mention here. All of our applications have been such that the cause, formation, and effect of the relevant physical properties are well understood.
This is precisely what allows us to act decisively based on higher-level information from SAL aggregates, through
the measure M . It also assumes that the problems that will be encountered by the mining algorithm are the same
as the problems for which it was designed. This is an inheritance from Bayesian inductive inference and leads to
fundamental limitations on what can be done in such a setting. For instance, if new data does not help clarify an
15
ambiguity, does the fault lie with the model (SAL higher-level aggregate) or with the data? We can summarize this
problem by saying that the approach requires strong a priori information about what is possible and what is not.
Nevertheless, by advocating targeted use of domain specific knowledge and aiding qualitative model selection, our methodology is more efficient at determining high level models from empirical data. Together, SAL and
our information-theoretic measure M encapsulate knowledge about physical properties and this is what makes our
methodology a viable one for data mining purposes. In future we aim to characterize more formally the particular
forms of domain knowledge that help overcome sparsity and noise in scientific datasets.
It should be mentioned that while the two studies formulate their sampling objectives differently, they are naturally supported by the SAL framework:
• (pockets) Where should I collect data in order to mine the pockets with high confidence?
• (Jordan forms) How much data should I collect in order to determine the right Jordan form with high confidence?
One could imagine extending our framework to also take into account the expense of data samples. If the cost of
data collection is non-uniform across the domain, then including this in the design of our functional will allow us
to tradeoff the cost of gathering information with the expected improvement in problem solving performance. This
area of data mining is referred to as active learning.
Data mining can sometimes be a controversial term in a discipline that is used to mathematical rigor; this is
because it often used synonymously with ‘lack of a hypothesis or theory.’ We hope to have convinced the reader that
this need not be the case and that data mining can indeed be sensitive to knowledge about the domain, especially
physical properties of the kind we have harnessed here. As data mining applications become more prevalent in
science, the need to incorporate a priori domain knowledge will only become more important.
References
[1] C. Bailey-Kellogg and N. Ramakrishnan. Ambiguity-Directed Sampling for Qualitative Analysis of Sparse
Data from Spatially Distributed Physical Systems. In Proceedings of the Seventeenth International Joint Conference on Artificial Intelligence (IJCAI-01), pages 43–50, 2001.
[2] C. Bailey-Kellogg and F. Zhao. Influence-Based Model Decomposition for Reasoning about Spatially Distributed Physical Systems. Artificial Intelligence, Vol. 130(2):pages 125–166, 2001.
[3] C. Bailey-Kellogg, F. Zhao, and K. Yip. Spatial Aggregation: Language and Applications. In Proceedings of
the Thirteenth National Conference on Artificial Intelligence (AAAI’96), pages 517–522, 1996.
[4] D. Berleant and B. Kuipers. Qualitative and Quantitative Simulation: Bridging the Gap. Artificial Intelligence,
Vol. 95(2):pages 215–255, 1998.
[5] F. Chaitin-Chatelin and V. Frayssé. Lectures on Finite Precision Computations. SIAM Monographs, 1996.
[6] R.G. Easterling. Comment on ‘Design and Analysis of Computer Experiments’. Statistical Science, Vol.
4(4):pages 425–427, 1989.
[7] A. Edelman and Y. Ma. Non-Generic Eigenvalue Perturbations of Jordan Blocks. Linear Algebra & Applications, Vol. 273(1-3):pages 45–63, 1998.
[8] A. Edelman and Y. Ma. Staircase Failures Explained by Orthogonal Versal Forms. SIAM Journal on Matrix
Analysis and Applications, Vol. 21(3):pages 1004–1025, 2000.
16
[9] V. Ganti, J. Gehrke, and R. Ramakrishnan. Mining Very Large Databases. IEEE Computer, Vol. 32(8):pages
38–45, August 1999.
[10] A. Goel, C.A. Baker, C.A. Shaffer, B. Grossman, W.H. Mason, L.T. Watson, and R.T. Haftka. VizCraft:
A Problem-Solving Environment for Aircraft Configuration Design. IEEE/AIP Computing in Science and
Engineering, Vol. 3(1):pages 56–66, 2001.
[11] A. Journel. Constrainted Interpolation and Qualitative Information - The Soft Kriging Approach. Mathematical
Geology, Vol. 18(2):pages 269–286, November 1986.
[12] J. Kivinen and H. Mannila. The Use of Sampling in Knowledge Discovery. In Proceedings of the Thirteenth
ACM Symposium on Principles of Database Systems, pages 77–85, 1994.
[13] D.L. Knill, A.A. Giunta, C.A. Baker, B. Grossman, W.H. Mason, R.T. Haftka, and L.T. Watson. Response
Surface Models Combining Linear and Euler Aerodynamics for Supersonic Transport Design. Journal of
Aircraft, 36(1):pages 75–86, 1999.
[14] Y. Lamdan and H. Wolfson. Geometric Hashing: A General and Efficient Model-Based Recognition Scheme.
In Proceedings of the Second International Conference on Computer Vision (ICCV), pages 238–249, 1988.
[15] R.H. Myers and D.C. Montgomery. Response Surface Methodology: Process and Product Optimization using
Designed Experiments. Wiley, Jan 2002.
[16] I. Ordóñez and F. Zhao. STA: Spatio-Temporal Aggregation with Applications to Analysis of DiffusionReaction Phenomena. In Proceedings of the Seventeenth National Conference on Artificial Intelligence
(AAAI’00), pages 517–523, 2000.
[17] N. Ramakrishnan and A.Y. Grama. Mining Scientific Data. Advances in Computers, Vol. 55:pages 119–169,
Sep 2001.
[18] J. Sacks, W.J. Welch, T.J. Mitchell, and H.P. Wynn. Design and Analysis of Computer Experiments. Statistical
Science, Vol. 4(4):pages 409–435, 1989.
[19] K.M. Yip and F. Zhao. Spatial Aggregation: Theory and Applications. Journal of Artificial Intelligence
Research, Vol. 5:pages 1–26, 1996.
[20] K.M. Yip, F. Zhao, and E. Sacks. Imagistic Reasoning. ACM Computing Surveys, Vol. 27(3):pages 363–365,
1995.
17
| 5cs.CE
|
Concentrated Differential Privacy:
Simplifications, Extensions, and Lower Bounds
arXiv:1605.02065v1 [cs.CR] 6 May 2016
Mark Bun∗
Thomas Steinke†
{mbun,tsteinke}@seas.harvard.edu
Abstract
“Concentrated differential privacy” was recently introduced by Dwork and Rothblum as a relaxation of differential privacy, which permits sharper analyses of many
privacy-preserving computations. We present an alternative formulation of the concept of concentrated differential privacy in terms of the Rényi divergence between the
distributions obtained by running an algorithm on neighboring inputs. With this reformulation in hand, we prove sharper quantitative results, establish lower bounds, and
raise a few new questions. We also unify this approach with approximate differential
privacy by giving an appropriate definition of “approximate concentrated differential
privacy.”
∗
†
Supported by an NDSEG Fellowship and NSF grant CNS-1237235.
Supported by NSF grants CCF-1116616, CCF-1420938, and CNS-1237235.
1
Contents
1 Introduction
1.1 Our Reformulation: Zero-Concentrated Differential Privacy .
1.1.1 Comparison to the Definition of Dwork and Rothblum
1.2 Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.1 Relationship between zCDP and Differential Privacy .
1.2.2 Gaussian Mechanism . . . . . . . . . . . . . . . . . . .
1.2.3 Basic Properties of zCDP . . . . . . . . . . . . . . . .
1.2.4 Group Privacy . . . . . . . . . . . . . . . . . . . . . .
1.2.5 Lower Bounds . . . . . . . . . . . . . . . . . . . . . .
1.2.6 Approximate zCDP . . . . . . . . . . . . . . . . . . .
1.3 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.4 Further Work . . . . . . . . . . . . . . . . . . . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
3
. 4
. 5
. 6
. 6
. 6
. 7
. 7
. 8
. 9
. 9
. 10
2 Rényi Divergence
11
2.1 Composition and Postprocessing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
2.2 Gaussian Mechanism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
3 Relation to Differential Privacy
13
3.1 Pure DP versus zCDP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
3.2 Approximate DP versus zCDP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
4 Zero- versus Mean-Concentrated Differential Privacy
17
5 Group Privacy
18
6 Lower Bounds
20
6.1 Example Applications of the Lower Bound . . . . . . . . . . . . . . . . . . . . . . . . 22
7 Obtaining Pure DP Mechanisms from zCDP
25
8 Approximate zCDP
30
8.1 Approximate DP Implies Approximate zCDP . . . . . . . . . . . . . . . . . . . . . . 31
8.2 Approximate zCDP Implies Approximate DP . . . . . . . . . . . . . . . . . . . . . . 32
8.3 Application of Approximate zCDP . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Acknowledgements
34
References
34
A Postprocessing and mCDP
37
B Miscellaneous Proofs and Lemmata
39
B.1 Proof of Lemma 2.2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
C Privacy versus Sampling
49
2
1
Introduction
Differential privacy [DMNS06] is a formal mathematical standard for protecting individuallevel privacy in statistical data analysis. In its simplest form, (pure) differential privacy is
parameterized by a real number ε > 0, which controls how much “privacy loss”1 an individual
can suffer when a computation (i.e., a statistical data analysis task) is performed involving
his or her data.
One particular hallmark of differential privacy is that it degrades smoothly and predictably under the composition of multiple computations. In particular, if one performs k
computational tasks that are each ε-differentially private and combines the results of those
tasks, then the computation as a whole is kε-differentially private. This property makes differential privacy amenable to the type of modular reasoning used in the design and analysis
of algorithms: When a sophisticated algorithm is comprised of a sequence of differentially
private steps, one can establish that the algorithm as a whole remains differentially private.
A widely-used relaxation of pure differential privacy is approximate or (ε, δ)-differential
privacy [DKM+ 06], which essentially guarantees that the probability that any individual
suffers privacy loss exceeding ε is bounded by δ. For sufficiently small δ, approximate (ε, δ)differential privacy provides a comparable standard of privacy protection as pure ε-differential
privacy, while often permitting substantially more useful analyses to be performed.
Unfortunately, there are situations where, unlike pure differential privacy, approximate
differential privacy is not a very elegant abstraction for mathematical analysis, particularly
the analysis of composition. The “advanced composition theorem” of Dwork, Rothblum,
and Vadhan [DRV10] (subsequently improved by [KOV15, MV16])√shows that the composition of k tasks which are each (ε, δ)-differentially private is (≈ kε, ≈ kδ)-differentially
private. However, these bounds can be unwieldy; computing the tightest possible privacy
guarantee for the composition of k arbitrary mechanisms with differing (εi , δi )-differential
privacy guarantees is #P-hard [MV16]! Furthermore, these bounds are not tight even for
simple and natural privacy-preserving computations. For instance, consider the mechanism
which approximately answers k statistical queries on a given database by adding independent
Gaussian noise to each answer. Even for this basic computation, the advanced composition
theorem does not yield a tight analysis.2
Dwork and Rothblum [DR16] recently put forth a different relaxation of differential privacy called concentrated differential privacy. Roughly, a randomized mechanism satisfies
concentrated differentially privacy if the privacy loss has small mean and is subgaussian.
Concentrated differential privacy behaves in a qualitatively similar way as approximate
1
The privacy loss is a random variable which quantifies how much information is revealed about an
individual by a computation involving their data; it depends on the outcome of the computation, the way
the computation was performed, and the information that the individual wants to hide. We discuss it
informally in this introduction and define it precisely in Definition 1.2 on page 4.
2
In particular, consider answering k statistical queries on a dataset of n individualspby adding noise
drawn from N (0, (σ/n)2 ) independently for each query. Each individual query satisfies (O( log(1/δ)/σ), δ)differential privacy for any δ >
√ 0. Applying the advanced composition theorem shows that the composition
of all k queries satisfies (O( k log(1/δ)/σ), (k + 1)δ)-differential
privacy for any δ > 0. However, it is
p
well-known that this bound can be improved to (O( k log(1/δ)/σ), δ)-differential privacy.
3
(ε, δ)-differential privacy under composition. However, it permits sharper analyses of basic
computational tasks, including a tight analysis of the aforementioned Gaussian mechanism.
Using the work of Dwork and Rothblum [DR16] as a starting point, we introduce an
alternative formulation of the concept of concentrated differential privacy that we call “zeroconcentrated differential privacy” (zCDP for short). To distinguish our definition from that
of Dwork and Rothblum, we refer to their definition as “mean-concentrated differential privacy” (mCDP for short). Our definition uses the Rényi divergence between probability distributions as a different method of capturing the requirement that the privacy loss random
variable is subgaussian.
1.1
Our Reformulation: Zero-Concentrated Differential Privacy
As is typical in the literature, we model a dataset as a multiset or tuple of n elements (or
“rows”) in X n , for some “data universe” X , where each element represents one individual’s
information. A (privacy-preserving) computation is a randomized algorithm M : X n → Y,
where Y represents the space of all possible outcomes of the computation.
Definition 1.1 (Zero-Concentrated Differential Privacy (zCDP)). A randomised mechanism
M : X n → Y is (ξ, ρ)-zero-concentrated differentially private (henceforth (ξ, ρ)-zCDP) if, for
all x, x0 ∈ X n differing on a single entry and all α ∈ (1, ∞),
Dα (M (x)kM (x0 )) ≤ ξ + ρα,
(1)
where Dα (M (x)kM (x0 )) is the α-Rényi divergence3 between the distribution of M (x) and
the distribution of M (x0 ).
We define ρ-zCDP to be (0, ρ)-zCDP.4
Equivalently, we can replace (1) with
E e(α−1)Z ≤ e(α−1)(ξ+ρα) ,
(2)
where Z = PrivLoss (M (x)kM (x0 )) is the privacy loss random variable:
Definition 1.2 (Privacy Loss Random Variable). Let Y and Y 0 be random variables on Ω.
We define the privacy loss random variable between Y and Y 0 – denoted Z = PrivLoss (Y kY 0 )
3
Rényi divergence has a parameter α ∈ (1, ∞) which allows it to interpolate between KL-divergence
(α → 1) and max-divergence (α → ∞). It should be thought of as a measure of dissimilarity between
distributions. We define it formally in Section 2. Throughout, we assume that all logarithms are natural
unless specified otherwise — that is, base e ≈ 2.718. This includes logarithms in information theoretic
quantities like entropy, divergence, and mutual information, whence these quantities are measured in nats
rather than in bits.
4
For clarity of exposition, we consider only ρ-zCDP in the introduction and give more general statements
for (ξ, ρ)-zCDP later. We also believe that having a one-parameter definition is desirable.
4
– as follows. Define a function f : Ω → R by f (y) = log(P [Y = y] /P [Y 0 = y]).5 Then Z is
distributed according to f (Y ).
Intuitively, the value of the privacy loss Z = PrivLoss (M (x)kM (x0 )) represents how well
we can distinguish x from x0 given only the output M (x) or M (x0 ). If Z > 0, then the
observed output of M is more likely to have occurred if the input was x than if x0 was the
input. Moreover, the larger Z is, the bigger this likelihood ratio is. Likewise, Z < 0 indicates
that the output is more likely if x0 is the input. If Z = 0, both x and x0 “explain” the output
of M equally well.
A mechanism M : X n → Y is ε-differentially private if and only if P [Z > ε] = 0, where
Z = PrivLoss (M (x)kM (x0 )) is the privacy loss of M on arbitrary inputs x, x0 ∈ X n differing
in one entry. On the other hand, M being (ε, δ)-differentially private is equivalent, up to a
small loss in parameters, to the requirement that P [Z > ε] ≤ δ.
In contrast, zCDP
entails a bound on the moment generating function of the privacy
(α−1)Z
loss Z — that is, E e
as a function of α − 1. The bound (2) implies that Z is a
subgaussian random variable6 with small mean. Intuitively, this means that Z resembles a
Gaussian distribution with mean ξ + ρ and variance 2ρ. In particular, we obtain strong tail
bounds on Z. Namely (2) implies that
P [Z > λ + ξ + ρ] ≤ e−λ
2 /4ρ
for all λ > 0.7
Thus zCDP requires that the privacy loss random variable is concentrated around zero
(hence the name). That is, Z is “small” with high probability, with larger deviations from
zero becoming increasingly unlikely. Hence we are unlikely to be able to distinguish x from
x0 given the output of M (x) or M (x0 ). Note that the randomness of the privacy loss random
variable is taken only over the randomnesss of the mechanism M .
1.1.1
Comparison to the Definition of Dwork and Rothblum
For comparison, Dwork and Rothblum [DR16] define (µ, τ )-concentrated differential privacy
for a randomized mechanism M : X n → Y as the requirement that, if Z = PrivLoss (M (x)kM (x0 ))
5
Throughout we abuse notation by letting P [Y = y] represent either the probability mass function or
the probability density function of Y evaluated at y. Formally, P [Y = y] /P [Y 0 = y] denotes the RadonNikodym derivative of the measure Y with respect to the measure Y 0 evaluated at y, where we require Y to
be absolutely continuous with respect to Y 0 , i.e. Y Y 0 .
6
A randomhvariable X being
is characterised by hthe following
i four 2equivalent conditions
i subgaussian
t(X−E[X])
−Ω(λ2 )
[Riv12]. (i) P |X − E [X] | > λ ≤ e
for all λ > 0. (ii) E e
≤ eO(t ) for all t ∈ R. (iii)
h
i
c(X−E[X])2
E (X − E [X])2k ≤ O(k)k for all k ∈ N. (iv) E e
≤ 2 for some c > 0.
7
We only discuss bounds on the upper tail of Z. We can obtain similar bounds on the lower tail of
Z = PrivLoss (M (x)kM (x0 )) by considering Z 0 = PrivLoss (M (x0 )kM (x)).
5
is the privacy loss for x, x0 ∈ X n differing on one entry, then
h
i
21 2
(α−1)(Z−E[Z])
E [Z] ≤ µ
and
E e
≤ e(α−1) 2 τ
for all α ∈ R. That is, they require both a bound on the mean of the privacy loss and that
the privacy loss is tightly concentrated around its mean. To distinguish our definitions, we
refer to their definition as mean-concentrated differential privacy (or mCDP).
Our definition, zCDP, is a relaxation of mCDP. In particular, a (µ, τ )-mCDP mechanism
is also (µ − τ 2 /2, τ 2 /2)-zCDP (which is tight for the Gaussian mechanism example), whereas
the converse is not true. (However, a partial converse holds; see Lemma 4.3.)
1.2
1.2.1
Results
Relationship between zCDP and Differential Privacy
Like Dwork and Rothblum’s formulation of concentrated differential privacy, zCDP can be
thought of as providing guarantees of (ε, δ)-differential privacy for all values of δ > 0:
p
Proposition 1.3. If M provides ρ-zCDP, then M is (ρ + 2 ρ log(1/δ), δ)-differentially
private for any δ > 0.
We also prove a slight strengthening of this result (Lemma 3.6). Moreover, there is
a partial converse, which shows that, up to a loss in parameters, zCDP is equivalent to
differential privacy with this ∀δ > 0 quantification (see Lemma 3.7).
There is also a direct link from pure differential privacy to zCDP:
Proposition 1.4. If M satisfies ε-differential privacy, then M satisfies ( 21 ε2 )-zCDP.
Dwork and Rothblum [DR16, Theorem 3.5] give a slightly weaker version of Proposition
1.4, which implies that ε-differential privacy yields ( 21 ε(eε − 1))-zCDP; this improves on an
earlier bound [DRV10] by the factor 12 .
We give proofs of these and other properties using properties of Rényi divergence in
Sections 2 and 3.
Propositions 1.3 and 1.4 show that zCDP is an intermediate notion between pure differential privacy and approximate differential privacy. Indeed, many algorithms satisfying
approximate differential privacy do in fact also satisfy zCDP.
1.2.2
Gaussian Mechanism
Just as with mCDP, the prototypical example of a mechanism satisfying zCDP is the Gaussian mechanism, which answers a real-valued query on a database by perturbing the true
answer with Gaussian noise.
Definition 1.5 (Sensitivity). A function q : X n → R has sensitivity ∆ if for all x, x0 ∈ X n
differing in a single entry, we have |q(x) − q(x0 )| ≤ ∆.
6
Proposition 1.6 (Gaussian Mechanism). Let q : X n → R be a sensitivity-∆ query. Consider
the mechanism M : X n → R that on input x, releases a sample from N (q(x), σ 2 ). Then M
satisfies (∆2 /2σ 2 )-zCDP.
We remark that either inequality defining zCDP — (1) or (2) — is exactly tight for the
Gaussian mechanism for all values of α. Thus the definition of zCDP seems tailored to the
Gaussian mechanism.
1.2.3
Basic Properties of zCDP
Our definition of zCDP satisfies the key basic properties of differential privacy. Foremost,
these properties include smooth degradation under composition, and invariance under postprocessing:
Lemma 1.7 (Composition). Let M : X n → Y and M 0 : X n → Z be randomized algorithms.
Suppose M satisfies ρ-zCDP and M 0 satisfies ρ0 -zCDP. Define M 00 : X n → Y ×Z by M 00 (x) =
(M (x), M 0 (x)). Then M 00 satisfies (ρ + ρ0 )-zCDP.
Lemma 1.8 (Postprocessing). Let M : X n → Y and f : Y → Z be randomized algorithms.
Suppose M satisfies ρ-zCDP. Define M 0 : X n → Z by M 0 (x) = f (M (x)). Then M 0 satisfies
ρ-zCDP.
These properties follow immediately from corresponding properties of the Rényi divergence outlined in Lemma 2.2.
We remark that Dwork and Rothblum’s definition of mCDP is not closed under postprocessing; we provide a counterexample in Appendix A. (However, an arbitrary amount of
postprocessing can worsen the guarantees of mCDP by at most constant factors.)
1.2.4
Group Privacy
A mechanism M guarantees group privacy if no small group of individuals has a significant
effect on the outcome of a computation (whereas the definition of zCDP only refers to
individuals, which are groups of size 1). That is, group privacy for groups of size k guarantees
that, if x and x0 are inputs differing on k entries (rather than a single entry), then the outputs
M (x) and M (x0 ) are close.
Dwork and Rothblum [DR16, Theorem 4.1] gave nearly tight bounds on the group privacy
guarantees of concentrated differential privacy, showing that a (µ = τ 2 /2, τ )-concentrated
differentially private mechanism affords (k 2 µ · (1 + o(1)), kτ · (1 + o(1)))-concentrated differential privacy for groups of size k = o(1/τ ). We are able to show a group privacy guarantee
for zCDP that is exactly tight and works for a wider range of parameters:
Proposition 1.9. Let M : X n → Y satisfy ρ-zCDP. Then M guarantees (k 2 ρ)-zCDP for
groups of size k — i.e. for every x, x0 ∈ X n differing in up to k entries and every α ∈ (1, ∞),
we have
Dα (M (x)kM (x0 )) ≤ (k 2 ρ) · α.
In particular, this bound is achieved (simultaneously for all values α) by the Gaussian
mechanism. Our proof is also simpler than that of Dwork and Rothblum; see Section 5.
7
1.2.5
Lower Bounds
The strong group privacy guarantees of zCDP yield, as an unfortunate consequence, strong
lower bounds as well. We show that, as with pure differential privacy, zCDP is susceptible to
information-based lower bounds, as well as to so-called packing arguments [HT10, MMP+ 10,
De12]:
Theorem 1.10. Let M : X n → Y satisfy ρ-zCDP. Let X be a random variable on X n .
Then
I (X; M (X)) ≤ ρ · n2 ,
where I(·; ·) denotes the mutual information between the random variables (in nats, rather
than bits). Furthermore, if the entries of X are independent, then I(X; M (X)) ≤ ρ · n.
Theorem 1.10 yields strong lower bounds for zCDP mechanisms, as we can construct
distributions X such that, for any accurate mechanism M , M (X) reveals a lot of information
about X (i.e. I(X; M (X)) is large for any accurate M ).
In particular, we obtain a strong separation between approximate differential privacy
and zCDP. For example, we can show that releasing an accurate approximate histogram (or,
equivalently, accurately answering
all point queries) on a data domain of size k requires an
√
input with at least n = Θ( log k) entries to satisfy zCDP. In contrast, under approximate
differential privacy, n can be independent of the domain size k [BNS13]! In particular,
our lower bounds show that “stability-based” techniques (such as those in the propose-testrelease framework [DL09]) are not compatible with zCDP.
Our lower bound exploits the strong group privacy guarantee afforded by zCDP. Group
privacy has been used to prove tight lower bounds for pure differential privacy [HT10, De12]
and approximate differential privacy [SU15a]. These results highlight the fact that group
privacy is often the limiting factor for private data analysis. For (ε, δ)-differential privacy,
group privacy becomes vacuous for groups of size k = Θ(log(1/δ)/ε). Indeed, stability-based
techniques exploit precisely this breakdown in group privacy.
As a result of this strong lower bound, we show that any mechanism for answering
statistical queries that satisfies zCDP can be converted into a mechanism satisfying pure
differential privacy with only a quadratic blowup in its sample complexity. More precisely,
the following theorem illustrates a more general result we prove in Section 7.
Theorem 1.11. Let n ∈ N and α ≥ 1/n be arbitrary. Set ε = α and ρ = α2 . Let
q : X → [0, 1]k be an arbitrary family of statistical queries. Suppose M : X n → [0, 1]k
satisfies ρ-zCDP and
E [kM (x) − q(x)k∞ ] ≤ α
M
0
for all x ∈ X . Then there exists M 0 : X n → [0, 1]k for n0 = 5n2 satisfying ε-differential
privacy and
E0 [kM 0 (x) − q(x)k∞ ] ≤ 10α
n
M
n0
for all x ∈ X .
8
For some classes of queries, this reduction is essentially tight. For example,
√ for k oneway marginals, the Gaussian mechanism achieves sample complexity n = Θ( k) subject
to zCDP, whereas the Laplace mechanism achieves sample complexity n = Θ(k) subject to
pure differential privacy, which is known to be optimal.
For more details, see Sections 6 and 7.
1.2.6
Approximate zCDP
To circumvent these strong lower bounds for zCDP, we consider a relaxation of zCDP in the
spirit of approximate differential privacy that permits a small probability δ of (catastrophic)
failure:
Definition 1.12 (Approximate Zero-Concentrated Differential Privacy (Approximate zCDP)).
A randomized mechanism M : X n → Y is δ-approximately (ξ, ρ)-zCDP if, for all x, x0 ∈ X n
differing on a single entry, there exist events E (depending on M (x)) and E 0 (depending on
M (x0 )) such that P [E] ≥ 1 − δ, P [E 0 ] ≥ 1 − δ, and
∀α ∈ (1, ∞)
Dα (M (x)|E kM (x0 )|E 0 ) ≤ ξ+ρ·α
∧
Dα (M (x0 )|E 0 kM (x)|E ) ≤ ξ+ρ·α,
where M (x)|E denotes the distribution of M (x) conditioned on the event E. We further
define δ-approximate ρ-zCDP to be δ-approximate (0, ρ)-zCDP.
In particular, setting δ = 0 gives the original definition of zCDP. However, this definition
unifies zCDP with approximate differential privacy:
Proposition 1.13. If M satisfies (ε, δ)-differential privacy, then M satisfies δ-approximate
1 2
ε -zCDP.
2
Approximate zCDP retains most of the desirable properties of zCDP, but allows us to
incorporate stability-based techniques and bypass the above lower bounds. This also presents
a unified tool to analyse a composition of zCDP with approximate differential privacy; see
Section 8.
1.3
Related Work
Our work builds on the aforementioned prior work of Dwork and Rothblum [DR16].8 We
view our definition of concentrated differential privacy as being “morally equivalent” to their
definition of concentrated differential privacy, in the sense that both definitions formalize the
same concept.9 (The formal relationship between the two definitions is discussed in Section
8
Although Dwork and Rothblum’s work only appeared publicly in March 2016, they shared a preliminary
draft of their paper with us before we commenced this work. As such, our ideas are heavily inspired by
theirs.
9
We refer to our definition as “zero-concentrated differential privacy” (zCDP) and their definition as
“mean-concentrated differential privacy” (mCDP). We use “concentrated differential privacy” (CDP) to
refer to the underlying concept formalized by both definitions.
9
4.) However, the definition of zCDP generally seems to be easier to work with than that of
mCDP. In particular, our formulation in terms of Rényi divergence simplifies many analyses.
Dwork and Rothblum prove several results about concentrated differential privacy that
are similar to ours. Namely, they prove analogous properties of mCDP as we prove for
zCDP (cf. Sections 1.2.1, 1.2.2, 1.2.3, and 1.2.4). However, as noted, some of their bounds
are weaker than ours; also, they do not explore lower bounds.
Several of the ideas underlying concentrated differential privacy are implicit in earlier
works. In particular, the proof of the advanced composition theorem of Dwork, Rothblum,
and Vadhan [DRV10] essentially uses the ideas of concentrated differential privacy. Their
proof contains analogs of Propositions 1.7, 1.3, and 1.4,.
We also remark that Tardos [Tar08] used Rényi divergence to prove lower bounds for cryptographic objects called fingerprinting codes. Fingerprinting codes turn out to be closely related to differential privacy [Ull13, BUV14, SU15b], and Tardos’ lower bound can be (loosely)
viewed as a kind of privacy-preserving algorithm.
1.4
Further Work
We believe that concentrated differential privacy is a useful tool for analysing private computations, as it provides both simpler and tighter bounds. We hope that CDP will be prove
useful in both the theory and practice of differential privacy.
Furthermore, our lower bounds show that CDP can really be a much more stringent
condition than approximate differential privacy. Thus CDP defines a “subclass” of all (ε, δ)differentially private algorithms. This subclass includes most differentially private algorithms
in the literature, but not all — the most notable exceptions being algorithms that use the
propose-test-release approach [DL09] to exploit low local sensitivity.
This “CDP subclass” warrants further exploration. In particular, is there a “complete”
mechanism for this class of algorithms, in the same sense that the exponential mechanism
[MT07, BLR13] is complete for pure differential privacy? Can we obtain a simple characterization of the sample complexity needed to satisfy CDP? The ability to prove stronger
and simpler lower bounds for CDP than for approximate DP may be useful for showing
the limitations of certain algorithmic paradigms. For example, any differentially private algorithm that only uses the Laplace mechanism, the exponential mechanism, the Gaussian
mechanism, and the “sparse vector” technique, along with composition and postprocessing
will be subject to the lower bounds for CDP.
There is also room to examine how to interpret the zCDP privacy guarantee. In particular, we leave it as an open question to understand the extent to which ρ-zCDP provides a
stronger privacy guarantee than the implied (ε, δ)-DP guarantees (cf. Proposition 1.3).
In general, much of the literature on differential privacy can be re-examined through the
lens of CDP, which may yield new insights and results.
10
2
Rényi Divergence
Recall the definition of Rényi divergence:
Definition 2.1 (Rényi Divergence [Rén61, Equation (3.3)]). Let P and Q be probability
distributions on Ω. For α ∈ (1, ∞), we define the Rényi divergence of order α between P
and Q as
Z
1
α
1−α
log
P (x) Q(x) dx
Dα (P kQ) =
α−1
Ω
α
P (x)
1
log E
=
x∼Q
α−1
Q(x)
"
α−1 #!
1
P (x)
=
log E
,
x∼P
α−1
Q(x)
where P (·) and Q(·) are the probability mass/density functions of P and Q respectively or,
more generally, P (·)/Q(·) is the Radon-Nikodym derivative of P with respect to Q.10 We
also define the KL-divergence
Z
P (x)
P (x) log
dx
D1 (P kQ) = lim Dα (P kQ) =
α→1
Q(x)
Ω
and the max-divergence
D∞ (P kQ) = lim Dα (P kQ) = sup log
α→∞
x∈Ω
P (x)
Q(x)
.
Alternatively, Rényi divergence can be defined in terms of the privacy loss (Definition
1.2) between P and Q:
(α−1)Z
e(α−1)Dα (P kQ) =
E
e
Z∼PrivLoss(P kQ)
for all α ∈ (1, ∞). Moreover, D1 (P kQ) =
E
Z∼PrivLoss(P kQ)
[Z].
We record several useful and well-known properties of Rényi divergence. We refer the
reader to [vEH14] for proofs and discussion of these (and many other) properties. Selfcontained proofs are given in Appendix B.1.
Lemma 2.2. Let P and Q be probability distributions and α ∈ [1, ∞].
• Non-negativity: Dα (P kQ) ≥ 0 with equality if and only if P = Q.
10
If P is not absolutely continuous with respect to Q (i.e. it is not the case that P Q), we define
Dα (P kQ) = ∞ for all α ∈ [1, ∞].
11
• Composition: Suppose P and Q are distributions on Ω × Θ. Let P 0 and Q0 denote the
marginal distributions on Ω induced by P and Q respectively. For x ∈ Ω, let Px0 and
Q0x denote the conditional distributions on Θ induced by P and Q respectively, where
x specifies the first coordinate. Then
Dα (P 0 kQ0 ) + min Dα (Px0 kQ0x ) ≤ Dα (P kQ) ≤ Dα (P 0 kQ0 ) + max Dα (Px0 kQ0x ) .
x∈Ω
x∈Ω
In particular if P and Q are product distributions, then the Rényi divergence between
P and Q is just the sum of the Rényi divergences of the marginals.
• Quasi-Convexity: Let P0 , P1 and Q0 , Q1 be distributions on Ω, and let P = tP0 + (1 −
t)P1 and Q = tQ0 +(1−t)Q1 for t ∈ [0, 1]. Then Dα (P kQ) ≤ max{Dα (P0 kQ0 ) , Dα (P1 kQ1 )}.
Moreover, KL divergence is convex:
D1 (P kQ) ≤ tD1 (P0 kQ0 ) + (1 − t)D1 (P1 kQ1 ) .
• Postprocessing: Let P and Q be distributions on Ω and let f : Ω → Θ be a function.
Let f (P ) and f (Q) denote the distributions on Θ induced by applying f to P or Q
respectively. Then Dα (f (P )kf (Q)) ≤ Dα (P kQ).
Note that quasi-convexity allows us to extend this guarantee to the case where f is a
randomized mapping.
• Monotonicity: For 1 ≤ α ≤ α0 ≤ ∞, Dα (P kQ) ≤ Dα0 (P kQ).
2.1
Composition and Postprocessing
The following lemma gives the postprocessing and (adaptive) composition bounds (extending
Lemmas 1.7 and 1.8).
Lemma 2.3 (Composition & Postprocessing). Let M : X n → Y and M 0 : X n × Y → Z.
Suppose M satisfies (ξ, ρ)-zCDP and M 0 satisfies (ξ 0 , ρ0 )-zCDP (as a function of its first
argument). Define M 00 : X n → Z by M 00 (x) = M 0 (x, M (x)). Then M 00 satisfies (ξ+ξ 0 , ρ+ρ0 )zCDP.
The proof is immediate from Lemma 2.2. Note that, while Lemma 2.3 is only stated for
the composition of two mechanisms, it can be inductively applied to analyse the composition
of arbitrarily many mechanisms.
2.2
Gaussian Mechanism
The following lemma gives the Rényi divergence between two Gaussian distributions with
the same variance.
12
Lemma 2.4. Let µ, ν, σ ∈ R and α ∈ [1, ∞). Then
α(µ − ν)2
Dα N (µ, σ ) N (ν, σ ) =
2σ 2
Consequently, the Gaussian mechanism,
2 which answers a sensitivity-∆ query by adding
∆
2
noise drawn from N (0, σ ), satisfies 2σ
2 -zCDP (Proposition 1.6).
2
2
Proof. We calculate
Z
1
(x − ν)2
(x − µ)2
dx
exp (α − 1)Dα N (µ, σ ) N (ν, σ ) = √
− (1 − α)
exp −α
2σ 2
2σ 2
2πσ 2 R
Z
1
(x − (αµ + (1 − α)ν))2 − (αµ + (1 − α)ν)2 + αµ2 + (1 − α)ν 2
=√
dx
exp −
2σ 2
2πσ 2 R
−(αµ + (1 − α)ν)2 + αµ2 + (1 − α)ν 2
=
E
exp −
x∼N (αµ+(1−α)ν,σ 2 )
2σ 2
α(α − 1)(µ − ν)2
= exp
.
2σ 2
2
2
For the multivariate Gaussian mechanism, Lemma 2.4 generalises to the following.
Lemma 2.5. Let µ, ν ∈ Rd , σ ∈ R, and α ∈ [1, ∞). Then
αkµ − νk22
Dα N (µ, σ 2 Id ) N (ν, σ 2 Id ) =
2σ 2
Thus, if M : X n → Rd is the mechanism that, on input x, releases a sample from
N (q(x), σ 2 Id ) for some function q : X n → Rd , then M satisfies ρ-zCDP for
ρ=
3
1
2σ 2
sup
x,x0 ∈X n
differing in one entry
kq(x) − q(x0 )k22 .
(3)
Relation to Differential Privacy
We now discuss the relationship between zCDP and the traditional definitions of pure and
approximate differential privacy. There is a close relationship between the notions, but not
an exact characterization.
For completeness, we state the definition of differential privacy:
Definition 3.1 (Differential Privacy (DP) [DMNS06, DKM+ 06]). A randomized mechanism
M : X n → Y satisfies (ε, δ)-differential privacy if, for all x, x0 ∈ X differing in a single entry,
we have
P [M (x) ∈ S] ≤ eε P [M (x0 ) ∈ S] + δ
for all (measurable) S ⊂ Y. Further define ε-differential privacy to be (ε, 0)-differential
privacy.
13
3.1
Pure DP versus zCDP
Pure differential privacy is exactly characterized by (ξ, 0)-zCDP:
Lemma 3.2. A mechanism M : X n → Y satisfies ε-DP if and only if it satisfies (ε, 0)-zCDP.
Proof. Let x, x0 ∈ X n be neighbouring. Suppose M satisfies ε-DP. Then D∞ (M (x)kM (x0 )) ≤
ε. By monotonicity,
Dα (M (x)kM (x0 )) ≤ D∞ (M (x)kM (x0 )) ≤ ε = ε + 0 · α
for all α. So M satisfies (ε, 0)-zCDP. Conversely, suppose M satisfies (ε, 0)-zCDP. Then
D∞ (M (x)kM (x0 )) = lim Dα (M (x)kM (x0 )) ≤ lim ε + 0 · α = ε.
α→∞
α→∞
Thus M satisfies ε-DP.
We now show that ε-differential privacy implies ( 21 ε2 )-zCDP (Proposition 1.4).
Proposition 3.3. Let P and Q be probability distributions on Ω satisfying D∞ (P kQ) ≤ ε
and D∞ (QkP ) ≤ ε. Then Dα (P kQ) ≤ 21 ε2 α for all α > 1.
Remark 3.4. In particular, Proposition 3.3 shows that the KL-divergence D1 (P kQ) ≤ 12 ε2 .
A bound on the KL-divergence between random variables in terms of their max-divergence is
an important ingredient in the analysis of the advanced composition theorem [DRV10]. Our
bound sharpens (up to lower order terms) and, in our opinion, simplifies the previous bound
of D1 (P kQ) ≤ 21 ε(eε − 1) proved by Dwork and Rothblum [DR16].
Proof of Proposition 3.3. We may assume 21 εα ≤ 1, as otherwise 12 ε2 α > ε, whence the result
follows from monotonicity. We must show that
α
1
P (x)
2
(α−1)Dα (P kQ)
≤ e 2 α(α−1)ε .
e
= E
x∼Q
Q(x)
We know that e−ε ≤
E [A(x)] =
A
P (x)
Q(x)
≤ eε for all x. Define a random function A : Ω → {e−ε , eε } by
for all x. By Jensen’s inequality,
E
P (x)
Q(x)
x∼Q
P (x)
Q(x)
α
= E
x∼Q
h
α i
h
i
α
E [A(x)]
≤ E E [A(x) ] = E [Aα ] ,
A
x∼Q
A
A
where A denotes A(x) for a random x ∼ Q. We also have E [A] = E
A
x∼Q
h
P (x)
Q(x)
equation, we can conclude that
eε − 1
P A = e−ε = ε
A
e − e−ε
and
14
P [A = eε ] =
A
1 − e−ε
.
eε − e−ε
i
= 1. From this
Thus
e(α−1)Dα (P kQ) ≤E [Aα ]
A
eε − 1
1 − e−ε αε
−αε
·
e
+
·e
eε − e−ε
eε − e−ε
(eαε − e−αε ) − (e(α−1)ε − e−(α−1)ε )
=
eε − e−ε
sinh(αε) − sinh((α − 1)ε)
.
=
sinh(ε)
=
The result now follows from the following inequality, which is proved in Lemma B.1.
0 ≤ y < x ≤ 2 =⇒
3.2
1
sinh(x) − sinh(y)
≤ e 2 xy .
sinh(x − y)
Approximate DP versus zCDP
The statements in this section show that, up to some loss in parameters, zCDP is equivalent
to a family of (ε, δ)-DP guarantees for all δ > 0.
Lemma 3.5. Let M : X n → Y satisfy (ξ, ρ)-zCDP. Then M satisfies (ε, δ)-DP for all δ > 0
and
p
ε = ξ + ρ + 4ρ log(1/δ).
Thus to achieve a given (ε, δ)-DP guarantee it suffices to satisfy (ξ, ρ)-zCDP with
p
2
p
(ε − ξ)2
ρ=
.
ε − ξ + log(1/δ) − log(1/δ) ≈
4 log(1/δ)
Proof. Let x, x0 ∈ X n be neighbouring. Define f (y) = log(P [M (x) = y] /P [M (x0 ) = y]). Let
Y ∼ M (x) and Z = f (Y ). That is, Z = PrivLoss (M (x)kM (x0 )) is the privacy loss random
variable. Fix α ∈ (1, ∞) to be chosen later. Then
!α−1
P
[M
(x)
=
Y
]
= e(α−1)Dα (M (x)kM (x0 )) ≤ e(α−1)(ξ+ρα) .
E e(α−1)Z = E
0
Y ∼M (x)
P [M (x ) = Y ]
By Markov’s inequality
E e(α−1)Z
(α−1)Z
P [Z > ε] = P e
> e(α−1)ε ≤
≤ e(α−1)(ξ+ρα−ε) .
e(α−1)ε
Choosing α = (ε − ξ + ρ)/2ρ > 1 gives
2 /4ρ
P [Z > ε] ≤ e−(ε−ξ−ρ)
15
≤ δ.
Now, for any measurable S ⊂ Y,
P [M (x) ∈ S] =P [Y ∈ S]
≤P [Y ∈ S ∧ Z ≤ ε] + P [Z > ε]
≤P [Y ∈ S ∧ Z ≤ ε] + δ
Z
= P [M (x) = y] · I(y ∈ S) · I(f (y) ≤ ε) dy + δ
ZY
≤ eε P [M (x0 ) = y] · I(y ∈ S) dy + δ
Y
ε
=e P [M (x0 ) ∈ S] + δ.
Lemma 3.5 is not tight. In particular, we have the following refinement of Lemma 3.5,
the proof of which is deferred to the appendix (Lemma B.2).
Lemma 3.6. Let M : X n → Y satisfy (ξ, ρ)-zCDP. Then M satisfies (ε, δ)-DP for all δ > 0
and
q
√
ε = ξ + ρ + 4ρ · log( π · ρ/δ).
Alternatively M satisfies (ε, δ)-DP for all ε ≥ ξ + ρ and
√
π·ρ
1
2
1+(ε−ξ−ρ)/2ρ
δ = e−(ε−ξ−ρ) /4ρ · min
r 2
1+ ε−ξ−ρ + (1+ ε−ξ−ρ )2 + 4
2ρ
2ρ
.
πρ
Note that the last of three options in the minimum dominates the first two options. We
have included the first two options as they are simpler.
Now we show a partial converse to Lemma 3.5, which is proved in the appendix (Lemma
B.3).
Lemma 3.7. Let M : X n → Y satisfy (ε, δ)-DP for all δ > 0 and
p
ε = ξˆ + ρ̂ log(1/δ)
1
4
ˆ ρ̂ ∈ [0, 1]. Then M is ξˆ − 1 ρ̂ + 5√
for some constants ξ,
ρ̂,
ρ̂
-zCDP.
4
4
(4)
Thus zCDP and DP are equivalent up to a (potentially substantial) loss in parameters
and the quantification over all δ.
16
4
Zero- versus Mean-Concentrated Differential Privacy
We begin by stating the definition of mean-concentrated differential privacy:
Definition 4.1 (Mean-Concentrated Differential Privacy (mCDP) [DR16]). A randomized
mechanism M : X n → Y satisfies (µ, τ )-mean-concentrated differential privacy if, for all
x, x0 ∈ X n differing in one entry, and letting Z = PrivLoss (M (x)kM (x0 )), we have
E [Z] ≤ µ
and
λ Z−E[Z]
E e
≤ eλ
2 ·τ 2 /2
for all λ ∈ R.
In contrast (ξ, ρ)-zCDP requires that, for all α ∈ (1, ∞), E e(α−1)Z ≤ e(α−1)(ξ+ρα) , where
Z ∼ PrivLoss (M (x)kM (x0 )) is the privacy loss random variable. We now show that these
definitions are equivalent up to a (potentially significant) loss in parameters.
Lemma 4.2. If M : X n → Y satisfies (µ, τ )-mCDP, then M satisfies (µ−τ 2 /2, τ 2 /2)-zCDP.
Proof. For all α ∈ (1, ∞),
h
i
(α−1)Z
2 2
2
2
(α−1)(Z−E[Z])
(α−1)E[Z]
E e
=E e
·e
≤ e(α−1) τ /2 · e(α−1)µ = e(α−1)(µ−τ /2+τ /2·α) .
√
Lemma 4.3. If M : X n → Y satisfies (ξ, ρ)-zCDP, then M satisfies (ξ + ρ, O( ξ + 2ρ))mCDP.
The proof of Lemma 4.3 is deferred to the appendix.
p
Thus we can convert (µ, τ )-mCDP into (µ−τ 2 /2, τ 2 /2)-zCDP and then back to (µ, O( µ + τ 2 /2))mCDP. This may result in a large loss in parameters, which is why, for example, pure DP
can be characterised in terms of zCDP, but not in terms of mCDP.
We view zCDP as a relaxation of mCDP; mCDP requires the privacy loss to be “tightly”
concentrated about its mean and that the mean is close to the origin. The triangle inequality
then implies that the privacy loss is “weakly” concentrated about the origin. (The difference
between “tightly” and “weakly” accounts for the use of the triangle inequality.) On the other
hand, zCDP direcly requires that the privacy loss is weakly concentrated about the origin.
That is to say, zCDP gives a subgaussian bound on the privacy loss that is centered at
zero, whereas mCDP gives a subgaussian bound that is centered at the mean and separately
bounds the mean.
There may be some advantage to the stronger requirement of mCDP, either in terms of
what kind of privacy guarantee it affords, or how it can be used as an analytic tool. However,
it seems that for most applications, we only need what zCDP provides.
17
5
Group Privacy
In this section we show that zCDP provides privacy protections to small groups of individuals.
Definition 5.1 (zCDP for Groups). We say that a mechanism M : X n → Y provides
(ξ, ρ)-zCDP for groups of size k if, for every x, x0 ∈ X n differing in at most k entries, we
have
∀α ∈ (1, ∞)
Dα (M (x)kM (x0 )) ≤ ξ + ρ · α.
The usual definition of zCDP only applies to groups of size 1. Here we show that it
implies bounds for all group sizes. We begin with a technical lemma.
Lemma 5.2 (Triangle-like Inequality for Rényi Divergence). Let P , Q, and R be probability
distributions. Then
Dα (P kQ) ≤
kα
D kα−1 (P kR) + Dkα (RkQ)
kα − 1 k−1
(5)
for all k, α ∈ (1, ∞).
Proof. Let p =
kα−1
α(k−1)
and q =
(α−1)Dα (P kQ)
e
kα−1
.
α−1
Z
Then
1
p
1
q
+
=
α(k−1)+(α−1)
kα−1
= 1. By Hölder’s inequality,
P (x)α Q(x)1−α dx
=
ZΩ
P (x)α R(x)−α · R(x)α−1 Q(x)1−α · R(x)dx
Ω
"
α
α−1 #
P (x)
R(x)
= E
·
x∼R
R(x)
Q(x)
"
pα 1/p
q(α−1) #1/q
R(x)
P (x)
· E
≤ E
x∼R
x∼R
R(x)
Q(x)
=
=e(pα−1)Dpα (P kR)/p · eq(α−1)Dq(α−1)+1 (RkQ)/q .
Taking logarithms and rearranging gives
Dα (P kQ) ≤
Now pα =
kα−1
,
k−1
pα−1
p(α−1)
kα
kα−1
=
pα − 1
Dpα (P kR) + Dq(α−1)+1 (RkQ) .
p(α − 1)
q(α − 1) + 1 = kα, and
pα − 1 kα − 1
·
=
pα
k(α − 1)
kα−1
−
k−1
kα−1
k−1
1
·
kα − 1
kα − 1 − k + 1 kα − 1
=
·
= 1,
k(α − 1)
kα − 1
k(α − 1)
as required.
18
Proposition 5.3. If M : X n → Y satisfies (ξ, ρ)-zCDP, then M gives (ξ · k
zCDP for groups of size k.
Note that
k
X
1
i=1
i
Z
=1+
1
k
1
dx ≤ 1 +
dxe
Z
k
1
Pk
1
i=1 i , ρ
· k 2 )-
1
dx = 1 + log k.
x
Thus (ξ, ρ)-zCDP implies (ξ · O(k log k), ρ · k 2 )-zCDP for groups of size k.
The Gaussian mechanism shows that k 2 ρ is the optimal dependence on ρ. However,
O(k log k)ξ is not the optimal dependence on ξ: (ξ, 0)-zCDP implies (kξ, 0)-zCDP for groups
of size k.
Proof. We show this by induction on k. The statement is clearly true for groups of size 1.
We now assume the statement holds for groups of size k − 1 and will verify it for groups of
size k.
Let x, x0 ∈ X n differ in k entries. Let x̂ ∈ X n be such that x and x̂ differ in k − 1 entries
and x0 and x̂ differ in one entry.
Then, by the induction hypothesis,
Dα (M (x)kM (x̂)) ≤ ξ · (k − 1)
k−1
X
1
i=1
i
+ ρ · (k − 1)2 · α
and, by zCDP,
Dα (M (x̂)kM (x0 )) ≤ ξ + ρ · α
for all α ∈ (1, ∞).
By (5), for any α ∈ (1, ∞),
kα
D kα−1 (M (x)kM (x̂)) + Dkα (M (x̂)kM (x0 ))
kα − 1 k−1
!
k−1
X
1
kα
−
1
kα
ξ · (k − 1)
+ ρ · (k − 1)2 ·
+ ξ + ρ · kα
≤
kα − 1
i
k
−
1
i=1
!
k−1
X
kα
1
kα
2 kα − 1
=ξ · 1 +
(k − 1)
+ρ·
(k − 1)
+ kα
kα − 1
i
kα − 1
k−1
i=1
!
k−1
X
kα
1
=ξ · 1 +
(k − 1)
+ ρ · k2 · α
kα − 1
i
i=1
!
k−1
X1
k
≤ξ · 1 +
(k − 1)
+ ρ · k2 · α
k−1
i
i=1
Dα (M (x)kM (x0 )) ≤
=ξ · k
k
X
1
i=1
i
+ ρ · k 2 · α,
where the last inequality follows from the fact that
α > 1.
19
kα
kα−1
is a decreasing function of α for
6
Lower Bounds
In this section we develop tools to prove lower bounds for zCDP. We will use group privacy to
bound the mutual information between the input and the output of a mechanism satisfying
zCDP. Thus, if we are able to construct a distribution on inputs such that any accurate
mechanism must reveal a high amount of information about its input, we obtain a lower
bound showing that no accurate mechanism satisfying zCDP can be accurate for this data
distribution.
We begin with the simplest form of our mutual information bound, which is an analogue
of the bound of [MMP+ 10] for pure differential privacy:
Proposition 6.1. Let M : X n → Y satisfy (ξ, ρ)-zCDP. Let X be a random variable in X n .
Then
I(X; M (X)) ≤ ξ · n(1 + log n) + ρ · n2 ,
where I denotes mutual information (measured in nats, rather than bits).
P
Proof. By Proposition 5.3, M provides (ξ · n ni=1 1i , ρ · n2 )-zCDP for groups of size n. Thus
0
D1 (M (x)kM (x )) ≤ ξ · n
n
X
1
i=1
i
+ ρ · n2 ≤ ξ · n(1 + log n) + ρ · n2
for all x, x0 ∈ X n . Since KL-divergence is convex,
I(X; M (X)) = E [D1 (M (x)kM (X))]
x←X
h
i
0
≤ E
E [D1 (M (x)kM (x ))]
x←X x0 ←X
h
i
2
≤ E
E
ξ
·
n(1
+
log
n)
+
ρ
·
n
0
x←X
x ←X
=ξ · n(1 + log n) + ρ · n2 .
The reason this lower bound works is the strong group privacy guarantee — even for
groups of size n, we obtain nontrivial privacy guarantees. While this is good for privacy it is
bad for usefulness, as it implies that even information that is “global” (rather than specific
to a individual or a small group) is protected. These lower bounds reinforce the connection
between group privacy and lower bounds [HT10, De12, SU15a].
In contrast, (ε, δ)-DP is not susceptible to such a lower bound because it gives a vacuous
privacy guarantee for groups of size k = O(log(1/δ)/ε). This helps explain the power of the
propose-test-release paradigm.
Furthermore, we obtain even stronger mutual information bounds when the entries of
the distribution are independent:
20
Lemma 6.2. Let M : X m → Y satisfy (ξ, ρ)-zCDP. Let X be a random variable in X m with
independent entries. Then
I (X; M (X)) ≤ (ξ + ρ) · m,
where I denotes mutual information (measured in nats, rather than bits).
Proof. First, by the chain rule for mutual information,
X
I(X; M (X)) =
I(Xi ; M (X)|X1···i−1 ),
i∈[m]
where
I(Xi ; M (X)|X1···i−1 ) =
E
[I(Xi |X1···i−1 = x; M (X)|X1···i−1 = x)]
=
E
[I(Xi ; M (x, Xi···m ))] ,
x←X1···i−1
x←X1···i−1
by independence of the Xi s.
We can define mutual information in terms of KL-divergence:
I(Xi ; M (x, Xi···m )) = E [D1 (M (x, Xi···m )|Xi = ykM (x, Xi···m ))]
y←Xi
= E [D1 (M (x, y, Xi+1···m )kM (x, Xi···m ))] .
y←Xi
By zCDP, we know that for all x ∈ X i−1 , y, y 0 ∈ X , and z ∈ X m−i , we have
D1 (M (x, y, z)kM (x, y 0 , z)) ≤ ξ + ρ.
Thus, by the convexity of KL-divergence,
D1 (M (x, y, Xi+1···m )kM (x, Xi···m )) ≤ ξ + ρ
for all x and y. The result follows.
More generally, we can combine dependent and independent entries as follows.
Theorem 6.3. Let M : X n → Y satisfy (ξ, ρ)-zCDP. Take n = m · `. Let X 1 , · · · , X m be
independent random variables on X ` . Denote X = (X 1 , · · · , X m ) ∈ X n . Then
I (X; M (X)) ≤ m · ξ · `(1 + log `) + ρ · `2 ,
where I denotes the mutual information (measured in nats, rather than bits).
21
Proof. By Proposition 5.3, M provides (ξ · `
D1 (M (x1 , · · · , xi , · · · , xm )kM (x1 , · · ·
P`
1
i=1 i , ρ
, x0i , · · ·
· `2 )-zCDP for groups of size `. Thus
, xm )) ≤ ξ ·`
`
X
1
i=1
i
+ρ·`2 ≤ ξ ·`(1+log `)+ρ·`2
(6)
for all x1 , · · · , xm , x0i ∈ X ` .
By the chain rule for mutual information,
X
I(X; M (X)) =
I(Xi ; M (X)|X1···i−1 ),
i∈[m]
where
I(Xi ; M (X)|X1···i−1 ) =
E
[I(Xi |X1···i−1 = x; M (X)|X1···i−1 = x)]
=
E
[I(Xi ; M (x, Xi···m ))] ,
x←X1···i−1
x←X1···i−1
by independence of the Xi s.
We can define mutual information in terms of KL-divergence:
I(Xi ; M (x, Xi···m )) = E [D1 (M (x, Xi···m )|Xi = ykM (x, Xi···m ))]
y←Xi
= E [D1 (M (x, y, Xi+1···m )kM (x, Xi···m ))] .
y←Xi
By (6) and the convexity of KL-divergence,
D1 (M (x, y, Xi+1···m )kM (x, Xi···m )) ≤ ξ · `(1 + log `) + ρ · `2
for all x and y. The result follows.
6.1
Example Applications of the Lower Bound
We informally discuss a few applications of our information-based lower bounds to some
simple and well-studied problems in differential privacy.
One-Way Marginals Consider M : X n → Y where X = {0, 1}d and Y = [0, 1]d . The
goal of M is to estimate the attribute means, or one-way marginals, of its input database x:
1X
M (x) ≈ x =
xi .
n
i∈[n]
It is known that this is possible subject to ε-DP if andp
only if n = Θ(d/ε) [HT10, SU15a].
This is possible subject to (ε, δ)-DP if and only if n = Θ̃( d log(1/δ)/ε), assuming δ 1/n
[BUV14, SU15a].
22
We now analyze what can be accomplished with zCDP. Adding independent noise drawn
from N (0, d/2n2 ρ) to each
p of the d coordinates of x satisfies ρ-zCDP. This gives accurate
answers as long as n d/ρ.
For a lower bound, consider sampling X1 ∈ {0, 1}d uniformly at random. Set Xi = X1
for all i ∈ [n]. By Proposition 6.1,
I(X; M (X)) ≤ n2 ρ
for any ρ-zCDP M : ({0, 1}d )n → [0, 1]d . However, if M is accurate, we can recover (most
p of)
X1 from M (X), whence I(X; M (X)) ≥ Ω(d). This yields a lower bound of n ≥ Ω( d/ρ),
which is tight up to constant factors.
Histograms (a.k.a. Point Queries) Consider M : X n → Y, where X = [T ] and Y = RT .
The goal of M is to estimate the histogram of its input:
M (x)t ≈ ht (x) = |{i ∈ [n] : xi = t}|
For ε-DP it is possible to do this if and only if n = Θ(log(T )/ε)); the optimal algorithm
is to independently sample
M (x)t ∼ ht (x) + Laplace(2/ε).
However, for (ε, δ)-DP, it is possible to attain sample complexity n = O(log(1/δ)/ε)
[BNS13,
p
BNS16b, Theorem 3.13]. Interestingly, for zCDP we can show that n = Θ( log(T )/ρ) is
sufficient and necessary:
Sampling
M (x)t ∼ ht (x) + N (0, 1/ρ)
independently for t ∈ [T ] satisfies ρ-zCDP. Moreover,
2
P max |M (x)t − ht (x)| ≥ λ ≤ T · P [|N (0, 1/ρ)| > λ] ≤ T · e−λ ρ/2 .
t∈[T ]
i
h
p
In particular P maxt∈[T ] |M (x)t − ht (x)| ≥ log(T /β)/ρ ≤ β for all β > 0. Thus this
p
algorithm is accurate if n log(T )/ρ.
On the other hand, if we sample X1 ∈ [T ] uniformly at random and set Xi = X1 for all
i ∈ [n], then I(X; M (X)) ≥ Ω(log T ) for any accurate M , p
as we can recover X1 from M (X)
if M is accurate. Proposition 6.1 thus implies that n ≥ Ω( log(T )/ρ) is necessary to obtain
accuracy.
This gives a strong separation between approximate DP and zCDP.
23
Randomized Response and the Exponential Mechanism Consider M : {±1}n →
{±1}n where the goal is to maximize hx, M (x)i subject to ρ-zCDP.
One solution is randomized response [War65]: Each output bit i of M is chosen independently with
eε
.
P [M (x)i = xi ] = ε
e +1
This satisfies ε-DP and, hence, 12 ε2 -zCDP. And E [hx, M (x)i] = n(eε − 1)/(eε + 1) = Θ(nε).
Alternatively, we can independently choose the output bits i according to
√
M (x)i = sign N (xi , 2/ρ) ,
which satisfies ρ-zCDP.
Turning our attention to lower bounds: Let X ∈ {±1}n be uniformly random. By
Lemma 6.2, since the bits of X are independent, we have I(X; M (X)) ≤ ρ · n for any ρzCDP M . However, if M is accurate, we can recover part of X from M (X) [BSU16], whence
I(X; M (X)) ≥ Ω(n).
Randomized response is a special case of the exponential mechanism [MT07, BLR13].
Consequently this can be interpreted as a lower bound for search problems.
Lower Bounds with Accuracy The above examples can be easily discussed in terms of a
more formal and quantitative definition of accuracy. In particular, we consider the histogram
example again:
Proposition 6.4. If M : [T ]n → RT satisfies ρ-zCDP and
n
∀x ∈ [T ]
E max M (x)t − ht (x) ≤ αn,
M
t∈[T ]
p
then n ≥ Ω( log(α2 T )/ρα2 ).
Proof. Let m = 1/10α and ` = n/m. For simplicity, assume that both m and n are integral.
Let X1 , X2 , · · · , Xm ∈ [T ]` be independent, where each Xi is ` copies of a uniformly
random element of [T ]. By Theorem 6.3,
I(X; M (X)) ≤ ρ · m · `2 = 10ραn2 ,
where X = (X1 , · · · , Xm ) ∈ X n . However,
I(X; M (X)) ≥I(f (X); g(M (X)))
=H(f (X)) − H(f (X)|g(M (X)))
=H(X) − H(X|f (X)) − H(f (X)|g(M (X)))
for any functions f and g, where H is the entropy (in nats). In particular, we let
f (x) = {t ∈ T : ∃i ∈ [n] xi = t}
and
24
g(y) = {t ∈ T : yt ≥ 5αn}.
(7)
Clearly H(X) = m log T . Furthermore, H(X|f (X)) ≤ m log m, since X can be specified by
naming m elements of f (X), which is a set of at most m elements.
If
max M (X)t − ht (X) < 5α,
(8)
t∈[T ]
then g(M (X)) contains exactly all the values in X — i.e. f (X) = g(M (X)). By Markov’s
inequality, (8) holds with probability at least 4/5.
Now we can upper bound H(f (X)|g(M (X))) by giving a scheme for specifying f (X)
given g(M (X)). If (8) holds, we simply need one bit to say so. If (8) does not hold, we need
one bit to say this and m log2 T bits to describe f (X). This gives
H(f (X)|g(M (X))) ≤ log 2 + P [f (X) 6= g(M (X))] · m log T.
Combining these inequalities gives
4
1
I(X; M (X)) ≥ m log T −m log m−log 2− m log T ≥ m log(T m−5/4 )−1 ≥ Ω(log(α1.25 T )/α).
5
5
Combining this with (7) completes the proof.
We remark that our lower bounds for zCDP can be converted to lower bounds for mCDP
using Lemma 4.2.
7
Obtaining Pure DP Mechanisms from zCDP
We now establish limits on what more can be achieved with zCDP over pure differential
privacy. In particular, we will prove that any mechanism satisfying zCDP can be converted
into a mechanism satisfying pure DP with at most a quadratic blowup in sample complexity.
Formally, we show the following theorem.
Theorem 7.1. Fix n ∈ N, n0 ∈ N, k ∈ N α > 0, and ε > 0. Let q : X → Rk and let k · k be
a norm on Rk . Assume maxx∈X kq(x)k ≤ 1.
Suppose there exists a (ξ, ρ)-zCDP mechanism M : X n → Rk such that for all x ∈ X n ,
E [kM (x) − q(x)k] ≤ α.
M
Assume ξ ≤ α2 , ρ ≤ α2 , and
4
ρ · n2 + ξ · n · (1 + log n) + 1 .
n0 ≥
εα
0
Then there exists a (ε, 0)-differentially private M 0 : X n → Rk satisfying
E [kM 0 (x) − q(x)k] ≤ 10α
M0
and
1
4
0
≤β
P0 kM (x) − q(x)k > 10α + 0 log
M
εn
β
0
for all x ∈ X n and β > 0.
25
Before discussing the proof of Theorem 7.1, we make some remarks about its statement:
• Unfortunately, the theorem only works for families of statistical queries q : X → Rk .
However, it works equally well for k · k∞ and k · k1 error bounds.
• If ξ = 0, we have n0 = O(n2 ρ/εα). So, if ρ, ε, and α are all constants, we have
n0 = O(n2 ). This justifies our informal statement that we can convert any mechanism satisfying zCDP into one satisfying pure DP with a quadratic blowup in sample
complexity.
• Suppose M : X n → Rk is the Gaussian mechanism scaled to satisfy ρ-zCDP and
k · k = k · k1 /k. Then
s
!
k
α = E [kM (x) − q(x)k] = Θ
.
ρn2
p
0
In particular, n = Θ( k/ρα2 ). The theorem then gives us a ε-DP M 0 : X n → Rk
with E [kM 0 (x) − q(x)k] ≤ O(α) for
0
n =Θ
n2 ρ
εα
=Θ
k
α3 ε
.
However, the Laplace mechanism achieves ε-DP and E [kM 0 (x) − q(x)k] ≤ α with
n = Θ(k/αε).
This example illustrates that the theorem is not tight in terms of α; it loses a 1/α2
factor here. However, the other parameters are tight.
• The requirement that ξ, ρ ≤ α2 is only used to show that
max min kq(x) − q(x̂)k ≤ 2α
n
x∈X n0 x̂∈X
(9)
using Lemma 7.5. However, in many situations (9) holds even when ξ, ρ α2 . For
example, if n ≥ O(log(k)/α2 ) or even n ≥ O(V C(q)/α2 ) then (9) is automatically
satisfied.
The technical condition (9) is needed to relate the part of the proof with inputs of size
n to the part with inputs of size n0 .
Thus we can restate Theorem 7.1 with the condition ξ, ρ ≤ α2 replaced by (9). This
would be more general, but also more mysterious.
Alas, the proof of Theorem 7.1 is not constructive. Rather than directly constructing a mechanism satisfying pure DP from any mechanism satisfying zCDP, we show the contrapositive
statement: any lower bound for pure DP can be converted into a lower bound for zCDP.
Pure DP is characterized by so-called packing lower bounds and the exponential mechanism.
We begin by giving a technical lemma showing that for any output space and any desired
accuracy we have a “packing” and a “net:”
26
Lemma 7.2. Let (Y, d) be a metric space. Fix α > 0. Then there exists a countable T ⊂ Y
such that both of the following hold.
• (Net:) Either T is infinite or for all y 0 ∈ Y there exists y ∈ T with d(y, y 0 ) ≤ α.
• (Packing:) For all y, y 0 ∈ T , if y 6= y 0 , then d(y, y 0 ) > α.
Proof. Consider the following procedure for producing T .
• Initialize A ← Y and T ← ∅.
• Repeat:
– If A = ∅, terminate.
– Pick some y ∈ A.
– Update T ← T ∪ {y}.
– Update A ← {y 0 ∈ A : d(y 0 , y) > α}.
This procedure either terminates giving a finite T or runs forever enumerating a countably
infinite T .
(Net:) If T is infinite, we immediately can dispense the first condition, so suppose the
procedure terminates and T is finite. Fix y 0 ∈ Y. Since the procedure terminates, A = ∅ at
the end, which means y 0 was removed from A at some point. This means some y ∈ T was
added such that d(y 0 , y) ≤ α, as required.
(Packing:) Fix y 6= y 0 ∈ T . We assume, without loss of generality, that y was added to
T before y 0 . This means y 0 was not removed from A when y was added to T . In particular,
this means d(y 0 , y) > α.
It is well-known that a net yields a pure DP algorithm:
Lemma 7.3 (Exponential Mechanism [MT07, BLR13]). Let ` : X n ×T → R satisfy |`(x, y)−
`(x0 , y)| ≤ ∆ for all x, x0 ∈ X n differing in one entry and all y ∈ T . Then, for all ε > 0,
there exists an ε-differentially private M : X n → T such that
|T |
2∆
log
P `(x, M (x)) ≤ min `(x, y) +
≥1−β
M
y∈T
ε
β
and
E [`(x, M (x))] ≤ min `(x, y) +
M
y∈T
2∆
log |T |
ε
n
for all x ∈ X and β > 0.
Proof. The mechanism is defined by
P [M (x) = y] = P
M
e−`(x,y)ε/2∆
.
−`(x,y)ε/2∆
y 0 ∈T e
The analysis can be found in [DR14, Theorems 3.10 and 3.11] and [BNS+ 16a, Lemma 7.1].
27
We also show that a packing yields a lower bound for zCDP:
Lemma 7.4. Let (Y, d) be a metric space and q : X n → Y a function. Let M : X n → Y be
a (ξ, ρ)-zCDP mechanism satisfying
P [d(M (x), q(x)) > α/2] ≤ β
M
for all x ∈ X n . Let T ⊂ Y be such that d(y, y 0 ) > α, for all y, y 0 ∈ T with y 6= y 0 . Assume
that for all y ∈ T there exists x ∈ X n with q(x) = y. Then
(1 − β) log |T | − log 2 ≤ ξ · n(1 + log n) + ρ · n2 .
In particular, if ξ = 0, we have
s
p
(1 − β) log |T | − log 2
n≥
= Ω( log |T |/ρ).
ρ
Proof. Let q −1 : T → X n be a function such that q(q −1 (y)) = y for all y ∈ T . Define
f : Y → T by
f (y) = argmin d(y, y 0 )
y 0 ∈T
(breaking ties arbitrarily). Then
P f (M (q −1 (y))) = y ≥ 1 − β
M
for all y ∈ T , as P [d(M (q −1 (y)), y) > α/2] ≤ β and d(y 0 , y) > α for all y 0 ∈ T \ {y}.
M
Let Y be a uniformly random element of T and let X = q −1 (Y ). By the data processing
inequality and Proposition 6.1,
I(Y ; f (M (q −1 (Y )))) = I(q(X); f (M (X))) ≤ I(X; M (X)) ≤ ξ · n(1 + log n) + ρ · n2 .
However, P [f (M (q −1 (Y ))) = Y ] ≥ 1 − β. Denote Z = f (M (q −1 (Y ))) and let E be the
indicator of the event that Z = Y . We have
I(Y ; Z) = H(Y ) − H(Y |Z) = H(Y ) − H(Y, E|Z) = H(Y ) − H(Y |E, Z) − H(E|Z).
Clearly H(Y ) = log |T | and H(E|Z) ≤ H(E) ≤ log 2. Moreover,
H(Y |E, Z) = E [H(Y |Z, E = e)]
e←E
=P [Y = Z] · 0 + P [Y 6= Z] · H(Y |Z, Y 6= Z)
≤β · H(Y ).
Thus
I(Y ; Z) ≥ log |T | − log 2 − β log |T |.
The result now follows by combining inequalities.
28
We need one final technical lemma:
Lemma 7.5. Let q : X → Rk satisfy maxx∈X kq(x)k ≤ 1, where k · k is some norm. Let
M : X n → Rk satisfy (ξ, ρ)-zCDP and
E [kM (x) − q(x)k] ≤ α
M
for all x ∈ X n . For all n0 ,
max0 minn kq(x̂) − q(x)k ≤ 2α +
x∈X n x̂∈X
p
2(ξ + ρ).
The proof of Lemma 7.5 is deferred to the appendix.
Now we can combine Lemmas 7.2, 7.3, 7.4, and 7.5 to prove Theorem 7.1:
o
n
P
Proof of Theorem 7.1. Apply Lemma 7.2 with Y = q(x) = n1 i∈[n] q(xi ) : x ∈ X n ⊂ Rk
and d being the metric induced by the norm to obtain T ⊂ Y:
• (Net:) Either T is infinite or for all y 0 ∈ {q(x) : x ∈ X n } ⊂ Rk there exists y ∈ T with
ky − y 0 k ≤ 4α.
• (Packing:) For all y, y 0 ∈ T , if y 6= y 0 , then ky − y 0 k > 4α.
By Markov’s inequality
1
P [kM (x) − q(x)k > 2α] ≤ .
M
2
Thus, by Lemma 7.4,
1
log |T | − log 2 ≤ ξ · n(1 + log n) + ρ · n2 .
2
This gives an upper bound on |T |. In particular, T must be finite.
0
Let M 0 : X n → Rk be the exponential mechanism (Lemma 7.3) instantiated with T and
`(x, y) = ky − q(x)k. We have
4
|T |
P kM (x) − q(x)k ≤ min ky − q(x)k + 0 log
≥1−β
M
y∈T
εn
β
and
4
log |T |
M
y∈T
εn0
0
0
for all x ∈ X n . For x ∈ X n , by the Net property and Lemma 7.5,
E [kM (x) − q(x)k] ≤ min ky − q(x)k +
min ky − q(x)k ≤ min min
ky − y 0 k + ky 0 − q(x)k
y∈T
y∈T y 0 ∈Y
0
0
= min
min ky − y k + ky − q(x)k
0
y ∈Y
y∈T
≤ min
(4α + ky 0 − q(x)k)
0
y ∈Y
= minn (4α + kq(x̂) − q(x)k)
x̂∈X
p
≤4α + 2α + 2(ξ + ρ).
29
Furthermore,
4
8
log |T | ≤ 0 ξ · n(1 + log n) + ρ · n2 + log 2 ≤ 2α.
0
εn
εn
The theorem now follows by combining inequalities.
8
Approximate zCDP
In the spirit of approximate DP, we propose a relaxation of zCDP:
Definition 8.1 (Approximate zCDP). A randomised mechanism M : X n → Y is δapproximately (ξ, ρ)-zCDP if, for all x, x0 ∈ X n differing on a single entry, there exist events
E = E(M (x)) and E 0 = E 0 (M (x0 )) such that, for all α ∈ (1, ∞),
Dα (M (x)|E kM (x0 )|E 0 ) ≤ ξ + ρ · α
and P [E] ≥ 1 − δ and
M (x)
and
Dα (M (x0 )|E 0 kM (x)|E ) ≤ ξ + ρ · α
P [E 0 ] ≥ 1 − δ.
M (x0 )
Clearly 0-approximate zCDP is simply zCDP. Hence we have a generalization of zCDP.
As we will show later in this section, δ-approximate (ε, 0)-zCDP is equivalent to (ε, δ)-DP.
Thus we have also generalized approximate DP. Hence, this definition unifies both relaxations
of pure DP.
Approximate zCDP is a three-parameter definition which allows us to capture many
different aspects of differential privacy. However, three parameters is quite overwhelming.
We believe that use of the one-parameter ρ-zCDP (or the two-parameter δ-approximate
ρ-zCDP if necessary) is sufficient for most purposes.
It is easy to verify that the definition of approximate zCDP satisfies the following basic
properties.
Lemma 8.2 (Composition & Postprocessing). Let M : X n → Y and M 0 : X n × Y → Z be
randomized algorithms. Suppose M satisfies δ-approximate (ξ, ρ)-zCDP and, for all y ∈ Y,
M 0 (·, y) : X n → Z satisfies δ 0 -approximate (ξ 0 , ρ0 )-zCDP. Define M 00 : X n → Z by M 00 (x) =
M 0 (x, M (x)). Then M 00 satisfies (δ + δ 0 − δ · δ 0 )-approximate (ξ + ξ 0 , ρ + ρ0 )-zCDP.
Lemma 8.3 (Tradeoff). Suppose M : X n → Y satisfies δ-approximate (ξ, 0)-zCDP. Then
M satisfies δ-approximate ξ-zCDP and δ-approximate 21 ξ 2 -zCDP.
However, the strong group privacy guarantees of Section 5 no longer apply to approximate
zCDP and, hence, the strong lower bounds of Section 6 also no longer hold. Circumventing
these lower bounds is part of the motivation for considering approximate zCDP. However,
approximate zCDP is not necessarily the only way to relax zCDP that circumvents our lower
bounds:
Proving the group privacy bound requires “inflating” the parameter α: Suppose M :
n
X → Y satisfies ρ-zCDP and x, x0 ∈ X n differ on k entries. To prove Dα (M (x)kM (x0 )) ≤
30
k 2 ρα, the proof of Proposition 5.3 requires a bound on Dkα (M (x00 )kM (x000 )) for x00 , x000 ∈ X n
differing on a single entry.
Consider relaxing the definition of zCDP to only require the bound (1) or (2) to hold
when α ≤ m:
Definition 8.4 (Bounded zCDP). We say that M : X n → Y satisfies m-bounded (ξ, ρ)zCDP if, for all x, x0 ∈ X n differing in only one entry and all α ∈ (1, m), Dα (M (x)kM (x0 )) ≤
ξ + ρ · α.
This relaxed definition may also be able to circumvent the group privacy-based lower
bounds, as our group privacy proof would no longer work for groups of size larger than m.
We do not know what group privacy guarantees Definition 8.4 provides for groups of size
k m. This relaxed definition may be worth exploring, but is beyond the scope of our
work.
8.1
Approximate DP Implies Approximate zCDP
We can convert approximate DP to approximate zCDP using the following lemma.
First we define a approximate DP version of the randomized response mechanism:
Definition 8.5. For ε ≥ 0 and δ ∈ [0, 1], define M̃ε,δ : {0, 1} → {0, 1} × {⊥, >} by
h
i
h
i
P M̃ε,δ (b) = (b, >) =δ,
P M̃ε,δ (b) = (1 − b, >) =0,
h
i
h
i
1
eε
,
P
M̃
(b)
=
(1
−
b,
⊥)
=(1
−
δ)
P M̃ε,δ (b) = (b, ⊥) =(1 − δ)
ε,δ
1 + eε
1 + eε
for both b ∈ {0, 1}.
The above mechanism is “complete” for approximate DP:
Lemma 8.6 ([KOV15], [MV16, Lemma 3.2]). For every (ε, δ)-DP M : X n → Y and all
x0 , x1 ∈ X n differing in one entry, there exists a randomized T : {0, 1} × {⊥, >} → Y such
that T (M̃ε,δ (b)) has the same distribution as M (xb ) for both b ∈ {0, 1}.
Corollary 8.7. If M : X n → Y satisfies (ε, δ)-DP, then M satisfies δ-approximate (ε, 0)zCDP, which, in turn, implies δ-approximate (0, 21 ε2 )-zCDP.
Proof. Fix neighbouring x0 , x1 ∈ X n . Let T : {0, 1} × {⊥, >} → Y be as in Lemma 8.6.
Now we can write M (xb ) = T (M̃ε,δ (b)) for b ∈ {0, 1}. Define events E0 and E1 by
h
i
Eb ≡ M̃ε,δ (b) ∈ {0, 1} × {⊥} .
By definition, for both b ∈ {0, 1},
P
[Eb ] = 1 − δ and
M̃ε,δ (b)
M (xb )|Eb = T M̃ε,δ (b)|M̃ε,δ (b)∈{0,1}×{⊥} = T (M̃ε,0 (b)).
31
We have D∞ M̃ε,0 (b) M̃ε,0 (1 − b) ≤ ε for both b ∈ {0, 1}. By postprocessing and
monotonicity, this implies
Dα M (xb )|Eb M (x1−b )|E1−b ≤ ε
for both b ∈ {0, 1} and all α ∈ (1, ∞). Thus we have satisfied the definition of δ-approximate
(ε, 0)-zCDP.
Applying Proposition 3.3 shows that this also implies δ-approximate (0, 12 ε2 )-zCDP.
8.2
Approximate zCDP Implies Approximate DP
Lemma 8.8. Suppose M : X n → Y satisfies δ-approximate (ξ, ρ)-zCDP. If ρ = 0, then M
satisfies (ξ, δ)-DP. In general, M satisfies (ε, δ + (1 − δ)δ 0 )-DP for all ε ≥ ξ + ρ, where
1
√
π·ρ
2
1
.
δ 0 = e−(ε−ξ−ρ) /4ρ · min
1+(ε−ξ−ρ)/2ρ
2
r
1+ ε−ξ−ρ + (1+ ε−ξ−ρ )2 + 4
2ρ
2ρ
πρ
Proof. Fix neighbouring x, x0 ∈ X n and let E and E 0 be the events promised by definition
8.1. We can assume, without loss of generality that P [E] = P [E 0 ] = 1 − δ.
Fix S ⊂ Y. Then
P [M (x) ∈ S] =P [M (x) ∈ S | E] · P [E] + P [M (x) ∈ S | ¬E] · P [¬E]
≤P [M (x) ∈ S | E] · (1 − δ) + δ,
P [M (x0 ) ∈ S] =P [M (x0 ) ∈ S | E 0 ] · P [E 0 ] + P [M (x0 ) ∈ S | ¬E 0 ] · P [¬E 0 ]
≥P [M (x0 ) ∈ S | E 0 ] · (1 − δ).
Firstly, if ρ = 0, then
P [M (x) ∈ S | E] ≤ eξ P [M (x0 ) ∈ S | E 0 ]
and
P [M (x) ∈ S] ≤ P [M (x) ∈ S | E]·(1−δ)+δ ≤ eξ P [M (x0 ) ∈ S | E 0 ]·(1−δ)+δ ≤ eξ P [M (x0 ) ∈ S]+δ,
which proves the first half of the lemma.
Secondly, by Lemma B.2 (cf. Lemma 3.5), for all ε ≥ ξ + ρ,
1
√
π·ρ
2
1
P [M (x) ∈ S | E] ≤ eε P [M (x0 ) ∈ S | E 0 ] + e−(ε−ξ−ρ) /4ρ · min
1+(ε−ξ−ρ)/2ρ
r 2
1+ ε−ξ−ρ + (1+ ε−ξ−ρ )2 + 4
2ρ
32
2ρ
πρ
.
Thus
2 /4ρ
P [M (x) ∈ S] ≤ eε P [M (x0 ) ∈ S] + δ + (1 − δ) · e−(ε−ξ−ρ)
· min
1
√
π·ρ
8.3
1
1+(ε−ξ−ρ)/2ρ
r 2
1+ ε−ξ−ρ
+
2ρ
(1+ ε−ξ−ρ
2ρ )
.
2
4
+ πρ
Application of Approximate zCDP
Approximate zCDP subsumes approximate DP. A result of this is that we can apply our
tightened lemmas to give a tighter version of the so-called advanced composition theorem
[DRV10].
Note that the following results are subsumed by the bounds of Kairouz, Oh, and Viswanath
[KOV15] and Murtagh and Vadhan [MV16]. However, these bounds may be extended to analyse the composition of mechanisms satisfying CDP with mechanisms satisfying approximate
DP. We believe that such a “unified” analysis of composition will be useful.
Applying Corollary 8.7, Lemma 8.2, and Lemma 8.8 yields the following result.
Corollary 8.9. Let M1 , · · · , Mk : X n → Y and
let M : X n → Y k be their composition.
P
k
Suppose each Mi satisfies (εi , δi )-DP. Set ρ = 12 i ε2i . Then M satisfies
!
k
Y
ε, 1 − (1 − δ 0 ) (1 − δi ) -DP
i
for all ε ≥ ρ and
2 /4ρ
δ 0 = e−(ε−ρ)
· min
1
√
π·ρ
1
1+(ε−ρ)/2ρ
r 2
1+ ε−ρ
+
2ρ
.
2
(1+ ε−ρ
2ρ )
4
+ πρ
A slight restatement is the following
n
k
Corollary 8.10. Let M1 , · · · , Mk : X n → Y and
Pklet2 M : X → Y be their composition.
1
2
Suppose each Mi satisfies (εi , δi )-DP. Set ε = 2 i εi . Then M satisfies
!
k
Y
2
0
ε + 2λε, 1 − (1 − δ ) (1 − δi ) -DP
i
for all λ ≥ 0 and
2
δ 0 = e−λ · min
1√
π·ε
.
1
1+λ/ε
1+ λε +
33
q 2
2
(1+ λε ) +
4
πε2
Finally, by picking the second term in the minimum and using 1 −
we have the following simpler form of the lemma.
Q
i (1
− δi ) ≤
P
i δi ,
Corollary 8.11. Let M1 , · · · , Mk : X n → Y and let M : X n → Y k be their composition.
Suppose each Mi satisfies (εi , δi )-DP. Then M satisfies
r
√
π
1
2
−λ2
kεk2 + 2λkεk2 ,
· kεk2 · e
+ kδk1 -DP
2
2
for all λ ≥ 0. Alternatively M satisfies
q
p
1
2
0
0
kεk2 + 2 log( π/2 · kεk2 /δ ) · kεk2 , δ + kδk1 -DP
2
for all δ 0 ≥ 0.
In comparison to the composition theorem
p of [DRV10], we save modestly by a constant
factor in the first term and, in most cases π/2kεk2 < 1, whence the logarithmic term is an
improvement over the usual advanced composition theorem.
Acknowledgements We thank Cynthia Dwork and Guy Rothblum for sharing a preliminary draft of their work with us. We also thank Ilya Mironov, Kobbi Nissim, Adam Smith,
Salil Vadhan, and the Harvard Differential Privacy Research Group for helpful discussions
and suggestions.
References
[AS64]
Milton
Abramowitz
and
mathematical
functions:
ematical
tables,
volume
http://people.math.sfu.ca/
Irene
A
Stegun.
Handbook of
with
formulas,
graphs,
and
math55.
Courier
Corporation,
1964.
cbm/aands/abramowitz and stegun.pdf.
[BLR13]
Avrim Blum, Katrina Ligett, and Aaron Roth. A learning theory approach to
noninteractive database privacy. J. ACM, 60(2):12, 2013.
[BNS13]
Amos Beimel, Kobbi Nissim, and Uri Stemmer. Private learning and sanitization:
Pure vs. approximate differential privacy. In Approximation, Randomization, and
Combinatorial Optimization. Algorithms and Techniques - 16th International
Workshop, APPROX 2013, and 17th International Workshop, RANDOM 2013,
Berkeley, CA, USA, August 21-23, 2013. Proceedings, pages 363–378, 2013.
[BNS+ 16a] Raef Bassily, Kobbi Nissim, Adam Smith, Thomas Steinke, Uri Stemmer, and
Jonathan Ullman. Algorithmic stability for adaptive data analysis. In STOC,
2016.
34
[BNS16b]
Mark Bun, Kobbi Nissim, and Uri Stemmer. Simultaneous private learning of
multiple concepts. In Proceedings of the 2016 ACM Conference on Innovations
in Theoretical Computer Science, ITCS ’16, pages 369–380, New York, NY, USA,
2016. ACM.
[BNSV15] Mark Bun, Kobbi Nissim, Uri Stemmer, and Salil Vadhan. Differentially private
release and learning of threshold functions. In Foundations of Computer Science
(FOCS), 2015 IEEE 56th Annual Symposium on, pages 634–649. IEEE, 2015.
[BSU16]
Mark Bun, Thomas Steinke, and Jonathan Ullman. Make up your mind: The
price of online queries in differential privacy. CoRR, abs/1604.04618, 2016.
[BUV14]
Mark Bun, Jonathan Ullman, and Salil P. Vadhan. Fingerprinting codes and the
price of approximate differential privacy. In Symposium on Theory of Computing,
STOC 2014, New York, NY, USA, May 31 - June 03, 2014, pages 1–10, 2014.
[Coo09]
John D Cook. Upper and lower bounds for the normal distribution function,
2009.
[De12]
Anindya De. Lower bounds in differential privacy. In Proceedings of the 9th
International Conference on Theory of Cryptography, TCC’12, pages 321–338,
Berlin, Heidelberg, 2012. Springer-Verlag.
[DKM+ 06] Cynthia Dwork, Krishnaram Kenthapadi, Frank McSherry, Ilya Mironov, and
Moni Naor. Our data, ourselves: Privacy via distributed noise generation. In
Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings, pages 486–503, 2006.
[DL09]
Cynthia Dwork and Jing Lei. Differential privacy and robust statistics. In Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC
2009, Bethesda, MD, USA, May 31 - June 2, 2009, pages 371–380, 2009.
[DMNS06] Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. Calibrating
noise to sensitivity in private data analysis. In Theory of Cryptography, Third
Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March
4-7, 2006, Proceedings, pages 265–284, 2006.
[DR14]
Cynthia Dwork and Aaron Roth. The Algorithmic Foundations of Differential
Privacy, volume 9. Foundations and Trends R in Theoretical Computer Sc, 2014.
[DR16]
Cynthia Dwork and Guy Rothblum. Concentrated differential privacy. CoRR,
abs/1603.01887, 2016.
[DRV10]
Cynthia Dwork, Guy N. Rothblum, and Salil P. Vadhan. Boosting and differential privacy. In IEEE Symposium on Foundations of Computer Science (FOCS
’10), pages 51–60. IEEE, 23–26 October 2010.
35
[DSS+ 15]
Cynthia Dwork, Adam Smith, Thomas Steinke, Jonathan Ullman, and Salil
Vadhan. Robust traceability from trace amounts. In FOCS, 2015.
[Due10]
L. Duembgen. Bounding Standard Gaussian Tail Probabilities. ArXiv e-prints,
December 2010.
[hh]
hbp
(http://math.stackexchange.com/users/131476/hbp).
Hyperbolic
trig
inequality.
Mathematics
Stack
Exchange.
URL:http://math.stackexchange.com/q/1461426 (version: 2015-10-02).
[HT10]
Moritz Hardt and Kunal Talwar. On the geometry of differential privacy. In Proceedings of the Forty-second ACM Symposium on Theory of Computing, STOC
’10, pages 705–714, New York, NY, USA, 2010. ACM.
[KOV15]
Peter Kairouz, Sewoong Oh, and Pramod Viswanath. The composition theorem
for differential privacy. In Proceedings of the 32nd International Conference on
Machine Learning, ICML 2015, Lille, France, 6-11 July 2015, pages 1376–1385,
2015.
[MMP+ 10] Andrew McGregor, Ilya Mironov, Toniann Pitassi, Omer Reingold, Kunal Talwar, and Salil P. Vadhan. The limits of two-party differential privacy. In 51th
Annual IEEE Symposium on Foundations of Computer Science, FOCS 2010,
October 23-26, 2010, Las Vegas, Nevada, USA, pages 81–90, 2010.
[MT07]
F. McSherry and K. Talwar. Mechanism design via differential privacy. In Foundations of Computer Science, 2007. FOCS ’07. 48th Annual IEEE Symposium
on, pages 94–103, Oct 2007.
[MV16]
Jack Murtagh and Salil P. Vadhan. The complexity of computing the optimal
composition of differential privacy. In Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I, pages 157–175, 2016.
[Rén61]
Alfréd Rényi. On measures of entropy and information. In Proceedings of the
Fourth Berkeley Symposium on Mathematical Statistics and Probability, Volume
1: Contributions to the Theory of Statistics, pages 547–561, Berkeley, Calif.,
1961. University of California Press.
[Riv12]
Omar Rivasplata. Subgaussian random variables: An expository note, 2012.
http://www.stat.cmu.edu/ arinaldo/36788/subgaussians.pdf.
[SU15a]
Thomas Steinke and Jonathan Ullman. Between pure and approximate differential privacy. CoRR, abs/1501.06095, 2015.
[SU15b]
Thomas Steinke and Jonathan Ullman.
Interactive fingerprinting codes
and the hardness of preventing false discovery.
In COLT, 2015.
http://arxiv.org/abs/1410.1228.
36
[Tar08]
Gábor Tardos. Optimal probabilistic fingerprint codes. J. ACM, 55(2), 2008.
[Ull13]
Jonathan Ullman. Answering n {2+ o (1)} counting queries with differential
privacy is hard. In Proceedings of the forty-fifth annual ACM symposium on
Theory of computing, pages 361–370. ACM, 2013.
[vEH14]
T. van Erven and P. Harremos. Rényi divergence and Kullback-Leibler divergence. IEEE Transactions on Information Theory, 60(7):3797–3820, July 2014.
[War65]
Stanley L. Warner. Randomized response: A survey technique for eliminating
evasive answer bias. Journal of the American Statistical Association, 60(309):63–
69, 1965. PMID: 12261830.
A
Postprocessing and mCDP
In this appendix we give a family of counterexamples showing that mCDP is not closed
under postprocessing (unlike zCDP).
Fix a parameter σ > 0, and consider the Gaussian mechanism for a single bit M :
{−1, 1} → R, where M (x) samples from N (x, σ 2 ). The mechanism M satisfies (2/σ 2 , 2/σ)mCDP (and also (2/σ 2 )-zCDP).
Now consider the postprocessing function T : R → {−1, 0, 1} defined as follows:
if y > t
1
T (y) = −1 if y < −t
0
if − t ≤ y ≤ t.
We examine the mCDP guarantees of the postprocessed mechanism M 0 : {−1, 1} →
{−1, 0, 1} defined by M 0 (x) = T (M (x)):
Proposition A.1. Let σ ≥ 1 and let t ≥ 6σ 3 + 1. Then while the mechanism M is
(2/σ 2 , 2/σ)-mCDP, the postprocessed mechanism M 0 is not (2/σ 2 , 2/σ)-mCDP.
Proof. For each x ∈ {−1, 1}, let
p = P [M 0 (x) = x] = P N (0, σ 2 ) > t − 1 ,
q = P [M 0 (x) = −x] = P N (0, σ 2 ) > t + 1 .
Note that p > q. Hence, for each x ∈ {−1, 1},
P [M 0 (x) = 0] = P N (0, σ 2 ) ∈ [−t − 1, t − 1] = 1 − p − q.
Let f (y) = log(P [M (1) = y] /P [M (−1) = y]), and observe that
p
f (1) = log ,
q
q
f (−1) = log ,
p
37
f (0) = 0.
Now consider the privacy loss random variable Z = PrivLoss (M (1)kM (−1)) = f (M (1)).
Then Z is distributed according to
p
log q w.p. p
Z = log pq w.p. q
.
0
w.p. 1 − p − q
This gives E [Z] = (p − q) log(p/q) ≥ 0. For λ ∈ R, we have
!
λ
λ
−λ(p−q)
q
p
p
λ(Z−E[Z])
+q
+1−p−q ·
.
E e
= p
q
p
q
h
i
2
2
λ(Z−E[Z])
If M 0 were to satisfy (2/σ 2 , 2/σ)-mCDP, we would have E e
≤ e2λ /σ for all
λ > 0. We will show that this does not hold for any setting of parameters σ ≥ 1 and
t ≥ 6σ 3 + 1, which shows that mCDP is not closed under postprocessing.11
h
i
Lemma A.2. The values p, q satisfy the following inequalities:
q
q
2
2
1
σ
1
−(t−1)2 /2σ 2
·
·
e
≤
p
≤
· σ · e−(t−1) /2σ
1.
2π t+σ−1
2π t−1
2.
p
q
≥ e2t/σ
2
Proof. We have [Coo09, Equation (5)]
q
q
2 −x2 /2
2 −x2 /2
e
·
x
e
π
π
≤
P
[N
(0,
1)
>
x]
≤
x2 + 1
x
for all x ≥ 0. Thus
q
q
2 −(t−1)2 /2σ 2
2 −(t−1)2 /2σ 2
e
·
(t
−
1)
e
·σ
t−1
π
π
≤
p
=
P
N
(0,
1)
>
≤
.
σ · ((t − 1)2 /σ 2 + 1)
σ
t−1
The first part now follows from the fact that σ ≤ t − 1.
To establish the second inequality, we write
Z ∞
1
2
2
p= √
e−x /2σ dx
2
2πσ Zt−1
∞
1
2
2
e−(u−2) /2σ du
=√
2
2πσ Zt+1
∞
1
2
2
2
=√
e(4u−4)/2σ · e−u /2σ du
2
2πσ t+1 Z
∞
1
2
2
2
≥ e2t/σ √
e−u /2σ du
2
2πσ t+1
2t/σ 2
=e
· q.
11
For specific settings of parameters, this can be verified numerically. (For example, with the values σ = 1,
t = 3, and λ = 2.)
38
By Lemma A.2,
h
λ(Z−E[Z])
E e
i
!
λ
λ
−λ(p−q)
p
q
p
= p
+q
+1−p−q ·
q
p
q
λ(1−(p−q))
p
≥p
q
r
σ
1
2
2
2
·
· e−(t−1) /2σ · (e2t/σ )λ(1−p) .
≥
2π t + σ − 1
Now set λ = 2t . Then this quantity becomes
r
σ
1
2
2
2
2
2
2
·
· e−(t−1) /2σ · et (1−p)/σ = et /2σ ·
2π t + σ − 1
We now examine the term
r
2
2
1 σt2 e−(t−1) /2σ
2
pt ≤
2π
t−1
r
5/2 −(t−1)
1 t e
≤
4π t − 1
1
≤
2
r
σ
1
·
· exp
2π t + σ − 1
t
pt2
1
− 2 − 2 .
σ2
σ
2σ
(10)
by Lemma A.2
for t ≥ 2σ 2 + 1
for t ≥ 3.
We may thus bound (10) from below by
r
r
σ
t−1
t−1
1
1 1
t2 /2σ 2
t2 /2σ 2
e
·
·
· exp
≥e
·
· · exp
2π t + σ − 1
2σ 2
2π 2t
2σ 2
2
The expression
is monotone increasing for t ≥ 2σ 2 . Thus, it is strictly
√ exp((t − 1)/2σ )/2t
larger than 2π as long as t ≥ 6σ 3 + 1.
B
Miscellaneous Proofs and Lemmata
Lemma B.1.
0 ≤ y < x ≤ 2 =⇒
1
sinh(x) − sinh(y)
≤ e 2 xy .
sinh(x − y)
1
This technical lemma may be “verified” numerically by inspecting a plot of z = e 2 xy ·
sinh(x − y) − (sinh(x) − sinh(y)) for (x, y) ∈ [0, 2]2 .
39
For intuition, consider the third-order Taylor approximation to sinh(x) about 0:
1
sinh(x) = x + x3 ± O(x5 ).
6
Then we can approximate
x + 61 x3 − (y + 16 y 3 )
sinh(x) − sinh(y)
≈
sinh(x − y)
(x − y) + 16 (x − y)3
3xy(x − y)
=1+
6(x − y) + (x − y)3
1
≤ 1 + xy
2
1
xy
≤ e2 .
Unfortunately, turning this intuition into an actual proof is quite involved. We instead
provide a proof from [hh]:
Proof. We need the following hyperbolic trigonometric identities.
cosh (w + z) = cosh(w) cosh(z) + sinh(w) sinh(z)
= cosh(w) cosh(z) (1 + tanh(w) tanh(z)) ,
1
sinh(x − y) = ex−y + 1 − 1 − e−(x−y)
2
1 (x−y)/2
= e
− e−(x−y)/2 e(x−y)/2 + e−(x−y)/2
2
x−y
x−y
=2 sinh
cosh
2
2
x
x−y
−y
−y
x
=2 sinh
cosh
tanh
cosh
1 + tanh
2
2
2
2
2
x
y
x
y
x−y
cosh
cosh
1 − tanh
tanh
,
=2 sinh
2
2
2
2
2
1
sinh(x) − sinh(y) = ex − e−x − ey + e−y
2
1 (x−y)/2
= e
− e−(x−y)/2 e(x+y)/2 + e−(x+y)/2
2
x−y
x+y
=2 sinh
cosh
2
2
y
x
y
x
x−y
=2 sinh
cosh
cosh
1 + tanh
tanh
.
2
2
2
2
2
40
We also use the fact that 0 ≤ tanh(z) < min{z, 1} for all z > 0. Thus
1 + tanh x2 tanh y2
sinh(x) − sinh(y)
1+t
=
,
y =
x
sinh(x − y)
1−t
1 − tanh 2 tanh 2
where t = tanh x2 tanh y2 < 1. Now
1+t
≤ exy/2 ⇐⇒ 1 + t ≤ (1 − t)exy/2 ⇐⇒ (exy/2 + 1)t ≤ exy/2 − 1
1−t
xy
exy/4 − e−xy/4
exy/2 − 1
= xy/4
.
⇐⇒ t ≤ xy/2
= tanh
e
+1
e
+ e−xy/4
4
So it only remains to show that tanh x2 tanh y2 ≤ tanh xy
. This is clearly true when
4
y = 0. Now
x
y
x
y 1
y x
∂
tanh
tanh
= tanh
cosh−2
≤ cosh−2
∂y
2
2
2
2 2
2 4
and
xy
xy x
∂
tanh
= cosh−2
.
∂y
4
4 4
Since 0 ≤ y < x ≤ 2, we have 0 ≤ xy/4 ≤ y/2 and, hence, cosh(y/2) ≥ cosh(xy/4). Thus
x
y
xy
∂
∂
tanh
tanh
≤
tanh
.
∂y
2
2
∂y
4
The inequality now follows by integration of the inequality on the derivatives.
The following lemma immediately implies Lemma 3.6 and is also used to prove Lemma
8.8.
Lemma B.2. Let P and Q be probability distributions on Y with Dα (P kQ) ≤ ξ + ρ · α for
all α ∈ (1, ∞). Then, for any ε ≥ ξ + ρ and
1
√
π·ρ
2
1
δ = e−(ε−ξ−ρ) /4ρ · min
,
1+(ε−ξ−ρ)/2ρ
2
r
1+ ε−ξ−ρ + (1+ ε−ξ−ρ )2 + 4
2ρ
2ρ
πρ
we have
P (S) ≤ eε Q(S) + δ
for all (measurable) S.
41
Proof. Define f : Y → R by f (y) = log(P (y)/Q(y)). Let Y ∼ P , Y 0 ∼ Q and let Z = f (Y )
be the privacy loss random variable. That is, Z = PrivLoss (P kQ). For any measurable
S ⊂ Y,
P (S) =P [Y ∈ S]
=P [Y ∈ S ∧ f (Y ) ≤ ε] + P [Y ∈ S ∧ f (Y ) > ε]
Z
= P (y)I[f (y) ≤ ε]dy + P [Y ∈ S ∧ f (Y ) > ε]
ZS
= P (y)I[P (y) ≤ eε Q(y)]dy + P [Y ∈ S ∧ f (Y ) > ε]
ZS
≤ eε Q(y)I[f (y) ≤ ε]dy + P [Y ∈ S ∧ f (Y ) > ε]
S
=eε P [Y 0 ∈ S ∧ f (Y 0 ) ≤ ε] + P [Y ∈ S ∧ f (Y ) > ε]
=eε P [Y 0 ∈ S] − eε P [Y 0 ∈ S ∧ f (Y 0 ) > ε] + P [Y ∈ S ∧ f (Y ) > ε]
≤eε P [Y 0 ∈ S] + P [f (Y ) > ε] − eε P [f (Y 0 ) > ε] .
Thus we want to bound
δ =P [f (Y ) > ε] − eε P [f (Y 0 ) > ε]
=E [I[f (Y ) > ε]] − E0 [eε I[f (Y 0 ) > ε]]
Y
Y
Z
eε I[f (y) > ε]Q(y)dy
=E [I[f (Y ) > ε]] −
Y
ZY
Q(y)
eε I[f (y) > ε]
=E [I[f (Y ) > ε]] −
P (y)dy
Y
P (y)
Y
=E [I[f (Y ) > ε]] − E eε I[f (Y ) > ε]e−f (Y )
Y
Y
ε−Z
=E I[Z > ε] 1 − e
Z
=E max 0, 1 − eε−Z
Z
Z ∞
=
1 − eε−z P [Z = z] dz.
ε
In particular,
δ ≤ E [I[Z > ε]] = P [Z > ε] .
Z
Alternatively, by integration by parts,
Z
δ=
∞
eε−z P [Z > z] dz.
ε
Now it remains to bound P [Z > z].
42
As in Lemma 3.5, by Markov’s inequality, for all α > 1 and λ > ξ + ρ,
0
E e(α−1)Z
e(α−1)Dα (M (x)kM (x ))
P [Z > λ] ≤
≤
≤ e(α−1)(ξ+ρα−λ) .
e(α−1)λ
e(α−1)λ
Choosing α = (λ − ξ + ρ)/2ρ > 1 gives
P [Z > λ] ≤ e−(λ−ξ−ρ)
2 /4ρ
Thus δ ≤ P [Z > ε] ≤ e−(ε−ξ−ρ)
Z
. Furthermore,
eε−z P [Z > z] dz
Zε ∞
≤
Z
.
∞
δ=
ε
2 /4ρ
2 /4ρ
eε−z e−(z−ξ−ρ)
∞
dz
2
e−(z−ξ+ρ) /4ρ−ξ+ε dz
ε
√
Z
eε−ξ · 2π · 2ρ ∞ −(z−ξ+ρ)2 /4ρ
= √
e
dz
2π · 2ρ
ε
p
=eε−ξ · 2π · 2ρ · P [N (ξ − ρ, 2ρ) > ε]
√
ε+ρ−ξ
ε−ξ
=e · 2 π · ρ · P N (0, 1) > √
.
2ρ
√
2
Define h(x) = P [N (0, 1) > x] · 2π · ex /2 . Then
=
δ≤e
ε−ξ
√
·2 π·ρ· √
h
ε+ρ−ξ
√
2ρ
2
2π · e
ε+ρ−ξ
√
2ρ
/2
p
p
ε−ξ−ρ
−(ε−ξ−ρ)2 /4ρ
= 2ρ · e
·h
2ρ + √
.
2ρ
Now we can substitute upper bounds on h to obtain the desired results.
p
2
First we use P [N (0, 1) > x] ≤ 12 e−x /2 , which holds for all x ≥ 0. That is, h(x) ≤ π/2,
whence
r
p
π
−(ε−ξ−ρ)2 /4ρ
δ ≤ 2ρ · e
·
.
2
This rearranges to
q
√
ε ≤ ξ + ρ + 4ρ · log( π · ρ/δ).
√
2
Alternatively, we can use P [N (0, 1) > x] ≤ e−x /2 / 2πx, which holds for all x > 0. That
is, h(x) ≤ 1/x and
p
2
δ ≤ 2ρ · e−(ε−ξ−ρ) /4ρ · h
ε−ξ+ρ
√
2ρ
2
2ρ
e−(ε−ξ−ρ) /4ρ
2
=
· e−(ε−ξ−ρ) /4ρ =
·.
ε+ρ−ξ
1 + (ε − ξ − ρ)/2ρ
43
Finally, we can use P [N (0, 1) > x] ≤ e−x
2 /2
· 2/(
p
√
x2 + 8/π + x) 2π, which holds for
all x ≥ 0 p
[Due10, Equation (4)][Coo09, Equation (7)][AS64, Equation 7.1.13]. That is,
h(x) ≤ 2/( x2 + 8/π + x) and
p
2
δ ≤ 2ρ · e−(ε−ξ−ρ) /4ρ · h
ε−ξ+ρ
√
2ρ
2
2 · e−(ε−ξ−ρ) /4ρ
r
=
2
ε−ξ−ρ
1 + 2ρ +
1 + ε−ξ−ρ
+
2ρ
.
4
πρ
Lemma B.3 (Restating Lemma 3.7). Let M : X n → Y satisfy (ε, δ)-DP for all δ > 0 and
p
(11)
ε = ξˆ + ρ̂ log(1/δ)
1
4
ˆ ρ̂ ∈ [0, 1]. Then M is ξˆ − 1 ρ̂ + 5√
-zCDP.
for some constants ξ,
ρ̂
ρ̂,
4
4
Proof. Let x, x0 ∈ X n be neighbouring. Define f (y) = log(P [M (x) = y] /P [M (x0 ) = y]). Let
Y ∼ M (x) and Z = f (Y ). That is, Z = PrivLoss (M (x)kM (x0 )) is the privacy loss random
variable. Let Y 0 ∼ M (x0 ) and Z 0 = f (Y 0 ). That is, −Z 0 is the privacy loss random variable
if we swap x and x0 .
Let ε, δ > 0 satisfy (11). By postprocessing, for all t ∈ R,
P [Z > t] =P [f (M (x)) > t]
≤eε P [f (M (x0 )) > t] + δ
Z
ε
=e
P [M (x0 ) = y] · I(P [M (x) = y] > et P [M (x0 ) = y])dy + δ
ZY
<eε P [M (x) = y] · e−t · I(P [M (x) = y] > et P [M (x0 ) = y])dy + δ
Y
=eε−t P [Z > t] + δ,
whence P [Z > t] ≤
δ
.
1−eε−t
2
Then we can set ε = ξˆ + λ and δ = e−λ /ρ̂ to obtain
2
e−λ /ρ̂
.
0<λ<t 1 − eλ−t
h
i
ˆ
∀t > 0 P Z > ξ + t ≤ inf
In particular, for all t ≥ 0,
2
h
P Z > ξˆ +
p
4
i
ρ̂ + t ≤
e−t /ρ̂
2 −t2 /ρ̂
√
≤ √
e
.
4
4
−
ρ̂
ρ̂
1−e
44
We use the inequality 1 + xeξ ≤ ex+ξ for all x, ξ ≥ 0. We have
Z ∞
(α−1)Z
P e(α−1)Z > t dt
E e
=
Z0 ∞
log t
P Z>
=
dt
α−1
0
Z ∞
dt
P [Z > z] dz
=
dz
Z−∞
∞
(α − 1)e(α−1)z · P [Z > z] dz
=
−∞
√
ξ̂+ 4 ρ̂
∞
√
2 −t2 /ρ̂
4
e
dt
(α − 1)e(α−1)(t+ξ̂+ ρ̂) · √
4
ρ̂
−∞
0
Z ∞
√
√
2
(α−1)(ξ̂+ 4 ρ̂)
(α−1)(ξ̂+ 4 ρ̂) 2
√
=e
+ (α − 1)e
e(α−1)t · e−t /ρ̂ dt
4
ρ̂ 0
Z ∞
√
√
(α−1)(ξ̂+ 4 ρ̂) 2
(α−1)(ξ̂+ 4 ρ̂)
−(t− 12 (α−1)ρ̂)2 /ρ̂+ 14 (α−1)2 ρ̂
√
+ (α − 1)e
dt
≤e
e
4
ρ̂ −∞
√
√
2 1 (α−1)2 ρ̂ p
4
4
=e(α−1)(ξ̂+ ρ̂) + (α − 1)e(α−1)(ξ̂+ ρ̂) √
e4
π ρ̂
4
ρ̂
√
√ p
1
4
(α−1)2 ρ̂
(α−1)(ξ̂+ 4 ρ̂)
4
1 + (α − 1)2 π ρ̂e
=e
Z
≤
(α − 1)e
√
4
(α−1)z
Z
· 1dz +
√ √
4
1
≤e(α−1)(ξ̂+ ρ̂) e(α−1)2 π ρ̂+ 4 (α−1)
√
√ √
1
4
4
=e(α−1)(ξ̂+ ρ̂+2 π ρ̂+ 4 (α−1)ρ̂)
√
=e(α−1)(ξ̂+(1+2
√
π) 4 ρ̂− ρ̂4 + ρ̂4 α)
2 ρ̂
.
0
Since E e(α−1)Z = e(α−1)Dα (M (x)kM (x )) , this completes the proof.
We make use of the following technical lemma taken from [DSS+ 15].
Lemma B.4. Let X be a random variable. Then
h
i 1 1
X−E[X]
E e
≤ E e2X + E e−2X .
2
2
Proof. Let X 0 be an independent copy of X and let Y ∈ {0, 1} be uniformly random and
independent from X and X 0 . By Jensen’s inequality,
h
i
h E [X−X 0 ] i
h
i
h 2E[Y X−(1−Y )X 0 ] i
0
X−E[X]
E e
=E eX 0
≤ E 0 eX−X = E 0 e Y
X
X,X
X,X
i 1 1
h
i
h
1
1
2Y X−2(1−Y )X 0
2X−0
0−2X 0
= E0 e
+ E0 e
= E e2X + E e−2X .
≤ E0 e
X,X ,Y
2 X,X
2 X,X
2
2
45
n
Lemma B.5
√ (Restating Lemma 4.3). If M : X → Y satisfies (ξ, ρ)-zCDP, then M satisfies
(ξ + ρ, O( ξ + 2ρ))-CDP.
Proof. Let x and x0 be neighbouring databases and Z ∼ PrivLoss (M (x)kM (x0 )) the privacy
loss random variable We have E [Z] = D1 (M (x)kM (x0 )) ∈ [0, ξ + ρ] by non-negativity and
zCDP. By zCDP, for all α ∈ (1, ∞), we have
0
E e(α−1)Z = e(α−1)Dα (M (x)kM (x )) ≤ e(α−1)(ξ+ρα)
and
E e−αZ =
E
Y ∼M (x)
=
P [M (x) = Y ]
P [M (x0 ) = Y ]
"
P [M (x0 ) = Y ]
E
!−α
!α #
P [M (x) = Y ]
Y ∼M (x)
0
=e(α−1)Dα (M (x )kM (x))
≤e(α−1)(ξ+ρα) .
By Lemma B.4, for λ ≥ 1/2,
h
i 1
1
1
1
2
λ(Z−E[Z])
E e
≤ E e2λZ + E e−2λZ ≤ e2λ(ξ+ρ(2λ+1)) + e(2λ−1)(ξ+2ρλ) ≤ e4(ξ+2ρ)λ
2
2
2
2
and, for λ ≤ −1/2,
h
i 1
1
1
1
2
λ(Z−E[Z])
E e
≤ E e2λZ + E e−2λZ ≤ e(−2λ−1)(ξ−2ρλ) + e−2λ(ξ+ρ(1−2λ)) ≤ e4(ξ+2ρ)λ .
2
2
2
2
Now suppose |λ| < 1/2. Then
h
i 1
1
λ(Z−E[Z])
E e
≤ E e2λZ + E e−2λZ
2
2
∞
X
(2λ)2k 2k
=1 +
E Z
(2k)!
k=1
2
≤1 + (2λ)
∞
X
1
E Z 2k
(2k)!
k=1
1 Z 1 −Z
2
=1 + 4λ
E e + E e
−1
2
2
≤1 + 4λ2 eξ+2ρ − 1
≤eλ
2 O(ξ+2ρ)
.
46
B.1
Proof of Lemma 2.2
Proof of Non-Negativity. Let h(t) = tα . Then h00 (t) = α(α − 1)tα−2 > 0 for all t > 0
and α > 1. Thus h is strictly convex. Hence e(α−1)Dα (P kQ)) = E [h(P (x)/Q(x))] ≥
x∼Q
h( E [P (x)/Q(x)]) = h(1) = 1, as required.
x∼Q
Proof of Composition.
(α−1)Dα (P kQ)
e
Z
P (x, y)α Q(x, y)1−α d(x, y)
ZΩ×Θ
Z
0
α 0
1−α
= P (x) Q (x)
Px0 (y)α Q0x (y)1−α dydx
Θ
ZΩ
0
0
= P 0 (x)α Q0 (x)1−α e(α−1)Dα (Px kQx ) dx
ZΩ
0
0
≤ P 0 (x)α Q0 (x)1−α dx · max e(α−1)Dα (Px kQx )
=
Ω
(α−1)Dα (P 0 kQ0 )
=e
x
(α−1) maxx Dα (Px0 kQ0x )
·e
.
The other side of the inequality is symmetric.
Proof of Quasi-Convexity. Unfortunately Rényi divergence is not convex for α > 1. (Although KL-divergence is.) However, the following property implies that Rényi divergence is
quasi-convex.
Lemma B.6. Let P0 , P1 , Q0 , Q1 be distributions on Ω. For t ∈ [0, 1], define Pt = tP1 + (1 −
t)P0 and Qt = tQ1 + (1 − t)Q0 to be the convex combinations specified by t. Then
e(α−1)Dα (Pt kQt ) ≤ te(α−1)Dα (P1 kQ1 ) + (1 − t)e(α−1)Dα (P0 kQ0 ) .
Moreover, the limit as α → 1+ gives
D1 (Pt kQt ) ≤ tD1 (P1 kQ1 ) + (1 − t)D1 (P0 kQ0 ) .
Proof of Lemma B.6. Let f (t) = e(α−1)Dα (Pt kQt ) . Since the equality is clearly true for t = 0
47
and t = 1, it suffices to show that f 00 (t) ≥ 0 for all t ∈ [0, 1]. We have
Z
f (t) = Pt (x)α Qt (x)1−α dx,
ZΩ
d
f 0 (t) =
Pt (x)α Qt (x)1−α dx
dt
ZΩ
d
d
α−1
1−α
α
−α
= αPt (x)
Pt (x) Qt (x)
+ (1 − α)Pt (x) Qt (x)
Qt (x) dx
dt
dt
Ω
Z
= αPt (x)α−1 (P1 (x) − P0 (x)) Qt (x)1−α + (1 − α)Pt (x)α Qt (x)−α (Q1 (x) − Q0 (x)) dx,
ZΩ
f 00 (t) = α(α − 1)Pt (x)α−2 (P1 (x) − P0 (x))2 Qt (x)1−α
Ω
+ α(1 − α)Pt (x)α−1 (P1 (x) − P0 (x)) Qt (x)−α (Q1 (x) − Q0 (x))
+ (1 − α)αPt (x)α−1 (P1 (x) − P0 (x)) Qt (x)−α (Q1 (x) − Q0 (x))
+ (1 − α)(−α)Pt (x)α Qt (x)−α−1 (Q1 (x) − Q0 (x))2 dx
Z p
2
p
α−2
1−α
α
−α−1
=α(α − 1)
Pt (x) Qt (x)
(P1 (x) − P0 (x)) − Pt (x) Qt (x)
(Q1 (x) − Q0 (x)) dx
Ω
≥0.
Proof of Postprocessing. Let h(x) = xα . Note that h is convex. Let f −1 (y) = {x ∈ Ω :
f (x) = y}. Let Qy be the conditional distribution on x ∼ Q conditioned on f (x) = y. By
Jensen’s inequality,
α
P (x)
(α−1)Dα (P kQ)
e
= E
x∼Q
Q(x)
P (x)
= E
E h
y∼f (Q) x∼Qy
Q(x)
P (x)
≥ E
h
E
x∼Qy Q(x)
y∼f (Q)
Z
Q(x) P (x)
= E
h
dx
−1 (y)) Q(x)
y∼f (Q)
f −1 (y) Q(f
P (f −1 (y))
= E
h
y∼f (Q)
Q(f −1 (y))
=e(α−1)Dα (f (P )kf (Q)) .
48
α0 −1
Proof of Monotonicity. Let 1 < α ≤ α0 < ∞. Let h(x) = x α−1 . Then
0
α −1
α0 − 1 α0 − 1
00
h (x) =
− 1 x α−1 −2 ≥ 0,
α−1 α−1
so h is convex on (0, ∞). Thus
(α0 −1)Dα (P kQ)
e
=h e
(α−1)Dα (P kQ)
"
=h
E
x∼P
P (x)
Q(x)
"
α−1 #!
≤ E
x∼P
h
P (x)
Q(x)
α−1 !#
which gives the result.
C
Privacy versus Sampling
In this appendix we prove the technical Lemma 7.5. Essentially we show that if a private
mechanism can accurately answer a set of queries with a given sample complexity, then those
queries can be approximated on an unknown distribution with the same sample complexity.
This is related to lower bounds on private sample complexity using Vapnik-Chervonenkis
dimension e.g. [DR14, Theorem 4.8] and [BNSV15, Theorem 5.5].
First we state Pinsker’s inequality [vEH14, Theorem 31].
Lemma C.1 (Pinsker’s Inequality). Let X and Y be random variables on [−1, 1]. Then
p
E [X] − E [Y ] ≤ 2D1 (XkY )
We can also generalise Pinsker’s inequality using Rényi divergence:
Lemma C.2. Let P and Q be distributions on Ω and f : Ω → R. Then
E [f (x)] − E [f (x)] ≤
x∼P
x∼Q
q
E [f (x)2 ] ·
x∼Q
p
eD2 (P kQ) − 1.
In particular, if M : X n → Y satisfies (ξ, ρ)-zCDP. Then, for any f : Y → R and all
neighbouring x, x0 ∈ X n ,
p
q
E [f (M (x0 ))] − E [f (M (x))] ≤ E [f (M (x))2 ] · eξ+2ρ − 1.
Proof. By Cauchy-Schwartz,
P (x)
E [f (x)] − E [f (x)] = E f (x)
−1
x∼P
x∼Q
x∼Q
Q(x)
v
"
u
2 #
u
q
P
(x)
≤ E [f (x)2 ] · t E
−1
.
x∼Q
x∼Q
Q(x)
49
0
= e(α −1)Dα0 (P kQ) ,
Now
"
E
x∼Q
"
#
2 #
2
P (x)
P (x)
P (x)
−1
= E
−2
+1
x∼Q
Q(x)
Q(x)
Q(x)
"
2 #
P (x)
= E
−2+1
x∼Q
Q(x)
=eD2 (P kQ) − 1.
Proposition C.3. Let q : X → Rk satisfy maxx∈X kq(x)k ≤ 1, where k · k is some norm.
Let M : X n → Rk satisfy (ξ, ρ)-zCDP and
E [kM (x) − q(x)k] ≤ α
M
for all x ∈ X n . Then, for any distribution D on X ,
En
x∼D ,M
[kM (x) − q(D)k] ≤ α +
p
2(ξ + ρ)
and
E n [kq(x) − q(D)k] ≤ 2α +
x∼D
p
2(ξ + ρ),
where q(D) = E [q(z)].
z∼D
Proof. First define the dual norm: For x ∈ Rk ,
kxk∗ :=
max
y∈Rk :kyk=1
hx, yi.
By definition, hx, yi = hy, xi ≤ kxk∗ ·kyk for all x, y ∈ Rk . Moreover, kzk = maxy∈Rk :kyk∗ =1 hz, yi
for all z ∈ Rk .
Fix a distribution D. Define W : X n → Rk × Rk as follows. On input x ∈ X n , compute
a = M (x) and
s = argmax ha − q(D), vi,
v∈Rk :kvk∗ =1
and output (a, s).
By postprocessing, W satisfies (ξ, ρ)-zCDP and
E [ha − q(x), si | (a, s) = W (x)] ≤ E [ka − q(x)k · ksk∗ | (a, s) = W (x)] = E [kM (x) − q(x)k] ≤ α
W
W
M
(12)
for all x ∈ X n .
50
The following is similar to [BNS+ 16a, Lemma 3.1]. Let x ∼ Dn and y ∼ D. Now
1X
E [hq(x), si | (a, s) = W (x)] =
E [hq(xi ), si | (a, s) = W (x)]
x,W
x,W
n
(13)
i∈[n]
=
1X
E [f (xi , W (x))]
x,W
n
i∈[n]
(letting f : X × Rk × Rk → [−1, 1] be f (z, a, s) = hq(z), si/ksk∗ )
≤
1X
E [f (xi , W (x1 , · · · , xi−1 , y, xi+1 , · · · , xn ))]
x,y,W
n
i∈[n]
p
+ 2D1 (f (xi , W (x))kf (xi , W (x1 , · · · , xi−1 , y, xi+1 , · · · , xn )))
(by Pinsker’s inequality)
≤
1X
E [f (y, W (x1 , · · · , xi−1 , xi , xi+1 , · · · , xn ))]
x,y,W
n
i∈[n]
p
+ 2D1 (W (x)kW (x1 , · · · , xi−1 , y, xi+1 , · · · , xn ))
(by postprocessing and convexity and the fact that xi and y are interchangable)
≤
1X
E [hq(y), si | (j, s, a) = W (x)]
x,y,W
n
i∈[n]
p
+ 2(ξ + ρ)
(by zCDP)
= E [hq(D), si | (a, s) = W (x)] +
x,W
p
2(ξ + ρ).
Combining (12) and (13) gives
E [kM (x) − q(D)k] = E [ha − q(D), si | (a, s) = W (x)] ≤ α +
x,M
x,W
p
2(ξ + ρ).
Finally, combining (14) and (12) gives
E [kq(x) − q(D)k] ≤ E [kM (x) − q(x)k] + E [kM (x) − q(D)k] ≤ 2α +
x
x,M
x,M
51
p
2(ξ + ρ).
(14)
0
Proof of Lemma 7.5. Fix x ∈ X n . Let D be the uniform distribution on elements of x so
that q(D) = q(x). By Proposition C.3,
p
E n [kq(x̂) − q(D)k] ≤ 2α + 2(ξ + ρ).
x̂∼D
In particular, there must exist x̂ ∼ Dn such that kq(x̂) − q(D)k ≤ 2α +
required.
52
p
2(ξ + ρ), as
| 8cs.DS
|
Weight Normalization: A Simple Reparameterization
to Accelerate Training of Deep Neural Networks
arXiv:1602.07868v3 [cs.LG] 4 Jun 2016
Tim Salimans
OpenAI
[email protected]
Diederik P. Kingma
OpenAI
[email protected]
Abstract
We present weight normalization: a reparameterization of the weight vectors
in a neural network that decouples the length of those weight vectors from their
direction. By reparameterizing the weights in this way we improve the conditioning
of the optimization problem and we speed up convergence of stochastic gradient
descent. Our reparameterization is inspired by batch normalization but does not
introduce any dependencies between the examples in a minibatch. This means
that our method can also be applied successfully to recurrent models such as
LSTMs and to noise-sensitive applications such as deep reinforcement learning
or generative models, for which batch normalization is less well suited. Although
our method is much simpler, it still provides much of the speed-up of full batch
normalization. In addition, the computational overhead of our method is lower,
permitting more optimization steps to be taken in the same amount of time. We
demonstrate the usefulness of our method on applications in supervised image
recognition, generative modelling, and deep reinforcement learning.
1
Introduction
Recent successes in deep learning have shown that neural networks trained by first-order gradient
based optimization are capable of achieving amazing results in diverse domains like computer vision,
speech recognition, and language modelling [5]. However, it is also well known that the practical
success of first-order gradient based optimization is highly dependent on the curvature of the objective
that is optimized. If the condition number of the Hessian matrix of the objective at the optimum is
low, the problem is said to exhibit pathological curvature, and first-order gradient descent will have
trouble making progress [18, 28]. The amount of curvature, and thus the success of our optimization,
is not invariant to reparameterization [1]: there may be multiple equivalent ways of parameterizing
the same model, some of which are much easier to optimize than others. Finding good ways of
parameterizing neural networks is thus an important problem in deep learning.
While the architectures of neural networks differ widely across applications, they are typically mostly
composed of conceptually simple computational building blocks sometimes called neurons: each such
neuron computes a weighted sum over its inputs and adds a bias term, followed by the application of
an elementwise nonlinear transformation. Improving the general optimizability of deep networks is a
challenging task [4], but since many neural architectures share these basic building blocks, improving
these building blocks improves the performance of a very wide range of model architectures and
could thus be very useful.
Several authors have recently developed methods to improve the conditioning of the cost gradient for
general neural network architectures. One approach is to explicitly left multiply the cost gradient
with an approximate inverse of the Fisher information matrix, thereby obtaining an approximately
whitened natural gradient. Such an approximate inverse can for example be obtained by using a
Kronecker factored approximation to the Fisher matrix and inverting it (KFAC, [19]), by using an
approximate Cholesky factorization of the inverse Fisher matrix (FANG, [8]), or by whitening the
input of each layer in the neural network (PRONG, [3]).
Alternatively, we can use standard first order gradient descent without preconditioning, but change
the parameterization of our model to give gradients that are more like the whitened natural gradients
of these methods. For example, Raiko et al. [23] propose to transform the outputs of each neuron
to have zero output and zero slope on average. They show that this transformation approximately
diagonalizes the Fisher information matrix, thereby whitening the gradient, and that this leads to
improved optimization performance. Another approach in this direction is batch normalization [11],
a method where the output of each neuron (before application of the nonlinearity) is normalized by
the mean and standard deviation of the outputs calculated over the examples in the minibatch. This
reduces covariate shift of the neuron outputs and the authors suggest it also brings the Fisher matrix
closer to the identity matrix.
Following this second approach to approximate natural gradient optimization, we propose a simple
but general method, called weight normalization, for improving the optimizability of the weights
of neural network models. The method is inspired by batch normalization, but it is a deterministic
method that does not share batch normalization’s property of adding noise to the gradients. In
addition, the overhead imposed by our method is lower: no additional memory is required and the
additional computation is negligible. The method show encouraging results on a wide range of deep
learning applications.
2
Weight Normalization
We consider standard artificial neural networks where the computation of each neuron consists in
taking a weighted sum of input features, followed by an elementwise nonlinearity:
y = φ(w · x + b),
(1)
where w is a k-dimensional weight vector, b is a scalar bias term, x is a k-dimensional vector of input
features, φ(.) denotes an elementwise nonlinearity such as the rectifier max(., 0), and y denotes the
scalar output of the neuron.
After associating a loss function to one or more neuron outputs, such a neural network is commonly
trained by stochastic gradient descent in the parameters w, b of each neuron. In an effort to speed up
the convergence of this optimization procedure, we propose to reparameterize each weight vector w
in terms of a parameter vector v and a scalar parameter g and to perform stochastic gradient descent
with respect to those parameters instead. We do so by expressing the weight vectors in terms of the
new parameters using
g
w=
v
(2)
||v||
where v is a k-dimensional vector, g is a scalar, and ||v|| denotes the Euclidean norm of v. This
reparameterization has the effect of fixing the Euclidean norm of the weight vector w: we now
have ||w|| = g, independent of the parameters v. We therefore call this reparameterizaton weight
normalization.
The idea of normalizing the weight vector has been proposed before (e.g. [27]) but earlier work
typically still performed optimization in the w-parameterization, only applying the normalization
after each step of stochastic gradient descent. This is fundamentally different from our approach: we
propose to explicitly reparameterize the model and to perform stochastic gradient descent in the new
parameters v, g directly. Doing so improves the conditioning of the gradient and leads to improved
convergence of the optimization procedure: By decoupling the norm of the weight vector (g) from the
direction of the weight vector (v/||v||), we speed up convergence of our stochastic gradient descent
optimization, as we show experimentally in section 5.
Instead of working with g directly, we may also use an exponential parameterization for the scale, i.e.
g = es , where s is a log-scale parameter to learn by stochastic gradient descent. Parameterizing the g
parameter in the log-scale is more intuitive and more easily allows g to span a wide range of different
magnitudes. Empirically, however, we did not find this to be an advantage. In our experiments,
the eventual test-set performance was not significantly better or worse than the results with directly
learning g in its original parameterization, and optimization was slightly slower.
2
2.1
Gradients
Training a neural network in the new parameterization is done using standard stochastic gradient
descent methods. Here we differentiate through (2) to obtain the gradient of a loss function L with
respect to the new parameters v, g. Doing so gives
∇w L · v
g
g∇g L
∇g L =
v,
(3)
,
∇v L =
∇w L −
||v||
||v||
||v||2
where ∇w L is the gradient with respect to the weights w as used normally.
Backpropagation using weight normalization thus only requires a minor modification to the usual
backpropagation equations, and is easily implemented using standard neural network software. We
provide reference implementations for Theano at https://github.com/TimSalimans/weight_
norm. Unlike with batch normalization, the expressions above are independent of the minibatch size
and thus cause only minimal computational overhead.
An alternative way to write the gradient is
g
ww0
∇v L =
,
(4)
Mw ∇w L,
with
Mw = I −
||v||
||w||2
where Mw is a projection matrix that projects onto the complement of the w vector. This shows
that weight normalization accomplishes two things: it scales the weight gradient by g/||v||, and it
projects the gradient away from the current weight vector. Both effects help to bring the covariance
matrix of the gradient closer to identity and benefit optimization, as we explain below.
Due to projecting away from w, the norm of v grows monotonically with the number of weight
updates when learning a neural network with weight normalization using standard gradient descent
without momentum: Let v0 = v + ∆v denote our parameter update, with ∆v ∝ ∇v L (steepest
ascent/descent), then ∆v is necessarily orthogonal to the current weight vector w since we project
away from it when calculating ∇v L (equation 4). Since v is proportional to w, the update is thus also
orthogonal to v and increases its norm by the Pythagorean
theorem. Specifically,
if ||∆v||/||v|| = c
p
√
the new weight vector will have norm ||v0 || = ||v||2 + c2 ||v||2 = 1 + c2 ||v|| ≥ ||v||. The rate
of increase will depend on the the variance of the weight gradient. If our gradients are noisy, c will be
high and the norm of v will quickly increase,√which in turn will decrease the scaling factor g/||v||.
If the norm of the gradients is small, we get 1 + c2 ≈ 1, and the norm of v will stop increasing.
Using this mechanism, the scaled gradient self-stabilizes its norm. This property does not strictly
hold for optimizers that use separate learning rates for individual parameters, like Adam [12] which
we use in experiments, or when using momentum. However, qualitatively we still find the same effect
to hold.
Empirically, we find that the ability to grow the norm ||v|| makes optimization of neural networks
with weight normalization very robust to the value of the learning rate: If the learning rate is too
large, the norm of the unnormalized weights grows quickly until an appropriate effective learning rate
is reached. Once the norm of the weights has grown large with respect to the norm of the updates, the
effective learning rate stabilizes. Neural networks with weight normalization therefore work well
with a much wider range of learning rates than when using the normal parameterization. It has been
observed that neural networks with batch normalization also have this property [11], which can also
be explained by this analysis.
By projecting the gradient away from the weight vector w, we also eliminate the noise in that
direction. If the covariance matrix of the gradient with respect to w is given by C, the covariance
matrix of the gradient in v is given by D = (g 2 /||v||2 )Mw CMw . Empirically, we find that w is
often (close to) a dominant eigenvector of the covariance matrix C: removing that eigenvector then
gives a new covariance matrix D that is closer to the identity matrix, which may further speed up
learning.
2.2
Relation to batch normalization
An important source of inspiration for this reparameterization is batch normalization [11], which
normalizes the statistics of the pre-activation t for each minibatch as
t − µ[t]
t0 =
,
σ[t]
3
with µ[t], σ[t] the mean and standard deviation of the pre-activations t = v · x. For the special
case where our network only has a single layer, and the input features x for that layer are whitened
(independently distributed with zero mean and unit variance), these statistics are given by µ[t] = 0
and σ[t] = ||v||. In that case, normalizing the pre-activations using batch normalization is equivalent
to normalizing the weights using weight normalization.
Convolutional neural networks usually have much fewer weights than pre-activations, so normalizing
the weights is often much cheaper computationally. In addition, the norm of v is non-stochastic, while
the minibatch mean µ[t] and variance σ 2 [t] can in general have high variance for small minibatch
size. Weight normalization can thus be viewed as a cheaper and less noisy approximation to batch
normalization. Although exact equivalence does not usually hold for deeper architectures, we still
find that our weight normalization method provides much of the speed-up of full batch normalization.
In addition, its deterministic nature and independence on the minibatch input also means that our
method can be applied more easily to models like RNNs and LSTMs, as well as noise-sensitive
applications like reinforcement learning.
3
Data-Dependent Initialization of Parameters
Besides a reparameterization effect, batch normalization also has the benefit of fixing the scale of the
features generated by each layer of the neural network. This makes the optimization robust against
parameter initializations for which these scales vary across layers. Since weight normalization lacks
this property, we find it is important to properly initialize our parameters. We propose to sample the
elements of v from a simple distribution with a fixed scale, which is in our experiments a normal
distribution with mean zero and standard deviation 0.05. Before starting training, we then initialize
the b and g parameters to fix the minibatch statistics of all pre-activations in our network, just like
in batch normalization, but only for a single minibatch of data and only during initialization. This
can be done efficiently by performing an initial feedforward pass through our network for a single
minibatch of data X, using the following computation at each neuron:
v·x
t − µ[t]
t=
,
and y = φ
,
(5)
||v||
σ[t]
where µ[t] and σ[t] are the mean and standard deviation of the pre-activation t over the examples in
the minibatch. We can then initialize the neuron’s biase b and scale g as
g←
1
,
σ[t]
b←
−µ[t]
,
σ[t]
(6)
so that y = φ(w · x + b). Like batch normalization, this method ensures that all features initially have
zero mean and unit variance before application of the nonlinearity. With our method this only holds
for the minibatch we use for initialization, and subsequent minibatches may have slightly different
statistics, but experimentally we find this initialization method to work well. The method can also be
applied to networks without weight normalization, simply by doing stochastic gradient optimization
on the parameters w directly, after initialization in terms of v and g: this is what we compare to in
section 5. Independently from our work, this type of initialization was recently proposed by different
authors [20, 14] who found such data-based initialization to work well for use with the standard
parameterization in terms of w.
The downside of this initialization method is that it can only be applied in similar cases as where
batch normalization is applicable. For models with recursion, such as RNNs and LSTMs, we will
have to resort to standard initialization methods.
4
Mean-only Batch Normalization
Weight normalization, as introduced in section 2, makes the scale of neuron activations approximately
independent of the parameters v. Unlike with batch normalization, however, the means of the neuron
activations still depend on v. We therefore also explore the idea of combining weight normalization
with a special version of batch normalization, which we call mean-only batch normalization: With
this normalization method, we subtract out the minibatch means like with full batch normalization,
4
but we do not divide by the minibatch standard deviations. That is, we compute neuron activations
using
t = w · x,
t̃ = t − µ[t] + b,
y = φ(t̃)
(7)
where w is the weight vector, parameterized using weight normalization, and µ[t] is the minibatch
mean of the pre-activation t. During training, we keep a running average of the minibatch mean
which we substitute in for µ[t] at test time.
The gradient of the loss with respect to the pre-activation t is calculated as
∇t L = ∇t̃ L − µ[∇t̃ L],
(8)
where µ[.] denotes once again the operation of taking the minibatch mean. Mean-only batch normalization thus has the effect of centering the gradients that are backpropagated. This is a comparatively
cheap operation, and the computational overhead of mean-only batch normalization is thus lower
than for full batch normalization. In addition, this method causes less noise during training, and
the noise that is caused is more gentle as the law of large numbers ensures that µ[t] and µ[∇t̃ ] are
approximately normally distributed. Thus, the added noise has much lighter tails than the highly
kurtotic noise caused by the minibatch estimate of the variance used in full batch normalization. As
we show in section 5.1, this leads to improved accuracy at test time.
5
Experiments
We experimentally validate the usefulness of our method using four different models for varied
applications in supervised image recognition, generative modelling, and deep reinforcement learning.
5.1
Supervised Classification: CIFAR-10
To test our reparameterization method for the application of supervised classification, we consider the
CIFAR-10 data set of natural images [15]. The model we are using is based on the ConvPool-CNN-C
architecture of [26], with some small modifications: we replace the first dropout layer by a layer
that adds Gaussian noise, we expand the last hidden layer from 10 units to 192 units, and we use
2 × 2 max-pooling, rather than 3 × 3. The only hyperparameter that we actively optimized (the
standard deviation of the Gaussian noise) was chosen to maximize the performance of the network
on a holdout set of 10000 examples, using the standard parameterization (no weight normalization
or batch normalization). A full description of the resulting architecture is given in table A in the
supplementary material.
We train our network for CIFAR-10 using Adam [12] for 200 epochs, with a fixed learning rate and
momentum of 0.9 for the first 100 epochs. For the last 100 epochs we set the momentum to 0.5 and
linearly decay the learning rate to zero. We use a minibatch size of 100. We evaluate 5 different
parameterizations of the network: 1) the standard parameterization, 2) using batch normalization,
3) using weight normalization, 4) using weight normalization combined with mean-only batch normalization, 5) using mean-only batch normalization with the normal parameterization. The network
parameters are initialized using the scheme of section 3 such that all four cases have identical parameters starting out. For each case we pick the optimal learning rate in {0.0003, 0.001, 0.003, 0.01}.
The resulting error curves during training can be found in figure 1: both weight normalization
and batch normalization provide a significant speed-up over the standard parameterization. Batch
normalization makes slightly more progress per epoch than weight normalization early on, although
this is partly offset by the higher computational cost: with our implementation, training with batch
normalization was about 16% slower compared to the standard parameterization. In contrast, weight
normalization was not noticeably slower. During the later stage of training, weight normalization
and batch normalization seem to optimize at about the same speed, with the normal parameterization
(with or without mean-only batch normalization) still lagging behind.
After optimizing the network for 200 epochs using the different parameterizations, we evaluate their
performance on the CIFAR-10 test set. The results are summarized in table 2: weight normalization,
the normal parameterization, and mean-only batch normalization have similar test accuracy (≈ 8.5%
error). Batch normalization does significantly better at 8.05% error. Mean-only batch normalization
combined with weight normalization has the best performance at 7.31% test error, and interestingly
does much better than mean-only batch normalization combined with the normal parameterization:
This suggests that the noise added by batch normalization can be useful for regularizing the network,
5
Model
Test Error
Maxout [6]
11.68%
0.1
Network in Network [17]
10.41%
Deeply Supervised [16]
9.6%
ConvPool-CNN-C [26]
9.31%
0.05
ALL-CNN-C [26]
9.08%
our CNN, mean-only B.N.
8.52%
0
our CNN, weight norm.
8.46%
0
50
100
150
200
training epochs
our CNN, normal param.
8.43%
our CNN, batch norm.
8.05%
Figure 1: Training error for CIFAR-10 using differ- ours, W.N. + mean-only B.N. 7.31%
ent network parameterizations. For weight normal- Figure 2: Classification results on CIFAR-10
ization, batch normalization, and mean-only batch without data augmentation.
normalization we show results using Adam with a
learning rate of 0.003. For the normal parameterization we instead use 0.0003 which works best in
this case. For the last 100 epochs the learning rate
is linearly decayed to zero.
training error
normal param.
weight norm.
batch norm.
WN + mean−only BN
mean−only BN
but that the reparameterization provided by weight normalization or full batch normalization is also
needed for optimal results. We hypothesize that the substantial improvement by mean-only B.N. with
weight normalization over regular batch normalization is due to the distribution of the noise caused
by the normalization method during training: for mean-only batch normalization the minibatch mean
has a distribution that is approximately Gaussian, while the noise added by full batch normalization
during training has much higher kurtosis. As far as we are aware, the result with mean-only batch
normalization combined with weight normalization represents the state-of-the-art for CIFAR-10
among methods that do not use data augmentation.
5.2
Generative Modelling: Convolutional VAE
Next, we test the effect of weight normalization applied to deep convolutional variational autoencoders (CVAEs) [13, 24, 25], trained on the MNIST data set of images of handwritten digits and
the CIFAR-10 data set of small natural images.
Variational auto-encoders are generative models that explain the data vector x as arising from a set of
latent variables z, through a joint distribution of the form p(z, x) = p(z)p(x|z), where the decoder
p(x|z) is specified using a neural network. A lower bound on the log marginal likelihood log p(x)
can be obtained by approximately inferring the latent variables z from the observed data x using
an encoder distribution q(z|x) that is also specified as a neural network. This lower bound is then
optimized to fit the model to the data.
We follow a similar implementation of the CVAE as in [25] with some modifications, mainly that the
encoder and decoder are parameterized with ResNet [9] blocks, and that the diagonal posterior is
replaced with auto-regressive variational inference1 . For MNIST, the encoder consists of 3 sequences
of two ResNet blocks each, the first sequence acting on 16 feature maps, the others on 32 feature
maps. The first two sequences are followed by a 2-times subsampling operation implemented using
2 × 2 stride, while the third sequence is followed by a fully connected layer with 450 units. The
decoder has a similar architecture, but with reversed direction. For CIFAR-10, we used a neural
architecture with ResNet units and multiple intermediate stochastic layers1 . We used Adamax [12]
with α = 0.002 for optimization, in combination with Polyak averaging [22] in the form of an
exponential moving average that averages parameters over approximately 10 epochs.
In figure 3, we plot the test-set lower bound as a function of number of training epochs, including
error bars based on multiple different random seeds for initializing parameters. As can be seen, the
parameterization with weight normalization has lower variance and converges to a better optimum.
We observe similar results across different hyper-parameter settings.
1
Manuscript in preparation
6
Convolutional VAE on MNIST
84.0
Convolutional VAE on CIFAR-10
10000
85.0
bound on marginal likelihood
bound on marginal likelihood
84.5
85.5
86.0
86.5
87.0
normal parameterization
weight normalization
87.5
88.0
50
100
150
200
training epochs
250
9500
9000
8500
normal parameterization
weight normalization
8000
0
300
50
100
150
200 250 300
training epochs
350
400
450
Figure 3: Marginal log likelihood lower bound on the MNIST (top) and CIFAR-10 (bottom) test
sets for a convolutional VAE during training, for both the standard implementation as well as our
modification with weight normalization. For MNIST, we provide standard error bars to indicate
variance based on different initial random seeds.
5.3
Generative Modelling: DRAW
Next, we consider DRAW, a recurrent generative model by [7]. DRAW is a variational auto-encoder
with generative model p(z)p(x|z) and encoder q(z|x), similar to the model in section 5.2, but with
both the encoder and decoder consisting of a recurrent neural network comprised of Long Short-Term
Memory (LSTM) [10] units. LSTM units consist of a memory cell with additive dynamics, combined
with input, forget, and output gates that determine which information flows in and out of the memory.
The additive dynamics enables learning of long-range dependencies in the data.
At each time step of the model, DRAW uses the same set of weight vectors to update the cell states
of the LSTM units in its encoder and decoder. Because of the recurrent nature of this process it is not
clear how batch normalization could be applied to this model: Normalizing the cell states diminishes
their ability to pass through information. Fortunately, weight normalization can be applied trivially to
the weight vectors of each LSTM unit, and we find this to work well empirically.
We take the Theano implementation of DRAW provided at https://github.com/jbornschein/
draw and use it to model the MNIST data set of handwritten digits. We then make a single modification to the model: we apply weight normalization to all weight vectors. As can be seen in figure 4,
this significantly speeds up convergence of the optimization procedure, even without modifying the
initialization method and learning rate that were tuned for use with the normal parameterization.
bound on marginal log likelihood
−80
−85
−90
−95
−100
−105
−110
normal parameterization
weight normalization
−115
−120
0
10
20
30
40
50
60
70
80
90
100
training epochs
Figure 4: Marginal log likelihood lower bound on the MNIST test set for DRAW during training, for
both the standard implementation as well as our modification with weight normalization. 100 epochs
is not sufficient for convergence for this model, but the implementation using weight normalization
clearly makes progress much more quickly than with the standard parameterization.
7
5.4
Reinforcement Learning: DQN
Next we apply weight normalization to the problem of Reinforcement Learning for playing games on
the Atari Learning Environment [2]. The approach we use is the Deep Q-Network (DQN) proposed
by [21]. This is an application for which batch normalization is not well suited: the noise introduced
by estimating the minibatch statistics destabilizes the learning process. We were not able to get
batch normalization to work for DQN without using an impractically large minibatch size. In
contrast, weight normalization is easy to apply in this context, as is the initialization method of
section 3. Stochastic gradient learning is performed using Adamax [12] with momentum of 0.5. We
search for optimal learning rates in {0.0001, 0.0003, 0.001, 0.003}, generally finding 0.0003 to work
well with weight normalization and 0.0001 to work well for the normal parameterization. We also
use a larger minibatch size (64) which we found to be more efficient on our hardware (Amazon
Elastic Compute Cloud g2.2xlarge GPU instance). Apart from these changes we follow [21]
as closely as possible in terms of parameter settings and evaluation methods. However, we use a
Python/Theano/Lasagne reimplementation of their work, adapted from the implementation available
at https://github.com/spragunr/deep_q_rl, so there may be small additional differences in
implementation.
Figure 5 shows the training curves obtained using DQN with the standard parameterization and
with weight normalization on Space Invaders. Using weight normalization the algorithm progresses
more quickly and reaches a better final result. Table 6 shows the final evaluation scores obtained
by DQN with weight normalization for four games: on average weight normalization improves the
performance of DQN.
2500
Game
Breakout
Enduro
Seaquest
Space Invaders
test reward per episode
2000
1500
1000
500
0
0
normal parameterization
weight normalization
50
100
150
200
training epochs
Figure 5: Evaluation scores for Space Invaders obtained by DQN after each epoch of
training, for both the standard parameterization and using weight normalization. Learning rates for both cases were selected to maximize the highest achieved test score.
6
normal
410
1,250
7,188
1,779
weightnorm
403
1,448
7,375
2,179
Mnih
401
302
5,286
1,975
Figure 6: Maximum evaluation scores obtained by
DQN, using either the normal parameterization or
using weight normalization. The scores indicated by
Mnih et al. are those reported by [21]: Our normal
parameterization is approximately equivalent to their
method. Differences in scores may be caused by small
differences in our implementation. Specifically, the
difference in our score on Enduro and that reported
by [21] might be due to us not using a play-time limit
during evaluation.
Conclusion
We have presented weight normalization, a simple reparameterization of the weight vectors in a
neural network that accelerates the convergence of stochastic gradient descent optimization. Weight
normalization was applied to four different models in supervised image recognition, generative
modelling, and deep reinforcement learning, showing a consistent advantage across applications. The
reparameterization method is easy to apply, has low computational overhead, and does not introduce
dependencies between the examples in a minibatch, making it our default choice in the development
of new deep learning architectures.
Acknowledgments
We thank John Schulman for helpful comments on an earlier draft of this paper.
8
References
[1] S. Amari. Neural learning in structured parameter spaces - natural Riemannian gradient. In Advances in
Neural Information Processing Systems, pages 127–133. MIT Press, 1997.
[2] M. G. Bellemare, Y. Naddaf, J. Veness, and M. Bowling. The arcade learning environment: An evaluation
platform for general agents. Journal of Artificial Intelligence Research, 47:253–279, 06 2013.
[3] G. Desjardins, K. Simonyan, R. Pascanu, et al. Natural neural networks. In Advances in Neural Information
Processing Systems, pages 2062–2070, 2015.
[4] X. Glorot and Y. Bengio. Understanding the difficulty of training deep feedforward neural networks. In
International conference on artificial intelligence and statistics, pages 249–256, 2010.
[5] I. Goodfellow, Y. Bengio, and A. Courville. Deep learning. Book in preparation for MIT Press, 2016.
[6] I. J. Goodfellow, D. Warde-Farley, M. Mirza, A. Courville, and Y. Bengio. Maxout networks. In ICML,
2013.
[7] K. Gregor, I. Danihelka, A. Graves, and D. Wierstra. Draw: A recurrent neural network for image
generation. arXiv preprint arXiv:1502.04623, 2015.
[8] R. Grosse and R. Salakhudinov. Scaling up natural gradient by sparsely factorizing the inverse fisher
matrix. In ICML, pages 2304–2313, 2015.
[9] K. He, X. Zhang, S. Ren, and J. Sun. Deep residual learning for image recognition. arXiv preprint
arXiv:1512.03385, 2015.
[10] S. Hochreiter and J. Schmidhuber. Long short-term memory. Neural computation, 9(8):1735–1780, 1997.
[11] S. Ioffe and C. Szegedy. Batch normalization: Accelerating deep network training by reducing internal
covariate shift. In ICML, 2015.
[12] D. Kingma and J. Ba. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980, 2014.
[13] D. P. Kingma and M. Welling. Auto-Encoding Variational Bayes. Proceedings of the 2nd International
Conference on Learning Representations, 2013.
[14] P. Krähenbühl, C. Doersch, J. Donahue, and T. Darrell. Data-dependent initializations of convolutional
neural networks. arXiv preprint arXiv:1511.06856, 2015.
[15] A. Krizhevsky and G. Hinton. Learning multiple layers of features from tiny images, 2009.
[16] C.-Y. Lee, S. Xie, P. Gallagher, Z. Zhang, and Z. Tu. Deeply-supervised nets. In Deep Learning and
Representation Learning Workshop, NIPS, 2014.
[17] M. Lin, C. Qiang, and S. Yan. Network in network. In ICLR: Conference Track, 2014.
[18] J. Martens. Deep learning via hessian-free optimization. In Proceedings of the 27th International
Conference on Machine Learning (ICML-10), pages 735–742, 2010.
[19] J. Martens and R. Grosse. Optimizing neural networks with kronecker-factored approximate curvature.
arXiv preprint arXiv:1503.05671, 2015.
[20] D. Mishkin and J. Matas. All you need is a good init. arXiv preprint arXiv:1511.06422, 2015.
[21] V. Mnih, K. Kavukcuoglu, D. Silver, A. A. Rusu, J. Veness, M. G. Bellemare, A. Graves, M. Riedmiller,
A. K. Fidjeland, G. Ostrovski, et al. Human-level control through deep reinforcement learning. Nature,
518(7540):529–533, 2015.
[22] B. T. Polyak and A. B. Juditsky. Acceleration of stochastic approximation by averaging. SIAM Journal on
Control and Optimization, 30(4):838–855, 1992.
[23] T. Raiko, H. Valpola, and Y. LeCun. Deep learning made easier by linear transformations in perceptrons.
In International Conference on Artificial Intelligence and Statistics, pages 924–932, 2012.
[24] D. J. Rezende, S. Mohamed, and D. Wierstra. Stochastic backpropagation and approximate inference in
deep generative models. In ICML, pages 1278–1286, 2014.
[25] T. Salimans, D. P. Kingma, and M. Welling. Markov chain Monte Carlo and variational inference: Bridging
the gap. In ICML, 2015.
9
[26] J. T. Springenberg, A. Dosovitskiy, T. Brox, and M. Riedmiller. Striving for simplicity: The all convolutional net. In ICLR Workshop Track, 2015.
[27] N. Srebro and A. Shraibman. Rank, trace-norm and max-norm. In Proceedings of the 18th Annual
Conference on Learning Theory, pages 545—-560, 2005.
[28] I. Sutskever, J. Martens, G. Dahl, and G. Hinton. On the importance of initialization and momentum in
deep learning. In ICML, pages 1139–1147, 2013.
10
A
Neural network architecure for CIFAR-10 experiments
Layer type
# channels x, y dimension
raw RGB input
3
32
ZCA whitening
3
32
Gaussian noise σ = 0.15
3
32
3 × 3 conv leaky ReLU
96
32
3 × 3 conv leaky ReLU
96
32
3 × 3 conv leaky ReLU
96
32
2 × 2 max pool, str. 2
96
16
dropout with p = 0.5
96
16
3 × 3 conv leaky ReLU
192
16
3 × 3 conv leaky ReLU
192
16
3 × 3 conv leaky ReLU
192
16
2 × 2 max pool, str. 2
192
8
dropout with p = 0.5
192
8
3 × 3 conv leaky ReLU
192
6
1 × 1 conv leaky ReLU
192
6
1 × 1 conv leaky ReLU
192
6
global average pool
192
1
softmax output
10
1
Table 1: Neural network architecture for CIFAR-10.
11
| 9cs.NE
|
Proper affine actions in non-swinging
representations
arXiv:1605.03833v1 [math.GR] 12 May 2016
Ilia Smilga
May 13, 2016
For a semisimple real Lie group G with an irreducible representation ρ on
a finite-dimensional real vector space V , we give a sufficient criterion on ρ for
existence of a group of affine transformations of V whose linear part is Zariskidense in ρ(G) and that is free, nonabelian and acts properly discontinuously
on V .
1 Introduction
1.1 Background and motivation
The present paper is part of a larger effort to understand discrete groups Γ of affine
transformations (subgroups of the affine group GLn (R) ⋉ Rn ) acting properly discontinuously on the affine space Rn . The case where Γ consists of isometries (in other words,
Γ ⊂ On (R) ⋉ Rn ) is well-understood: a classical theorem by Bieberbach says that such
a group always has an abelian subgroup of finite index.
We say that a group G acts properly discontinuously on a topological space X if for
every compact K ⊂ X, the set {g ∈ G | gK ∩ K 6= ∅} is finite. We define a crystallographic group to be a discrete group Γ ⊂ GLn (R) ⋉ Rn acting properly discontinuously
and such that the quotient space Rn /Γ is compact. In [Aus64], Auslander conjectured
that any crystallographic group is virtually solvable, that is, contains a solvable subgroup
of finite index. Later, Milnor [Mil77] asked whether this statement is actually true for
any affine group acting properly discontinuously. The answer turned out to be negative:
Margulis [Mar83, Mar87] gave a nonabelian free group of affine transformations with linear part Zariski-dense in SO(2, 1), acting properly discontinuously on R3 . On the other
hand, Fried and Goldman [FG83] proved the Auslander conjecture in dimension 3 (the
cases n = 1 and 2 are easy). Recently, Abels, Margulis and Soifer [AMS13] proved it in
dimension n ≤ 6. See [Abe01] for a survey of already known results.
Margulis’s breakthrough was soon followed by the construction of other counterexamples to Milnor’s conjecture. The first advance was made by Abels et al. [AMS02]: they
1
generalized Margulis’s construction to subgroups of the affine group
SO(2n + 2, 2n + 1) ⋉ R4n+3 ,
for all values of n. The author further generalized this in his previous paper [Smi16], by
finding such subgroups in the affine group G ⋉ g, where G is any noncompact semisimple
real Lie group, acting on its Lie algebra g by the adjoint representation. Recently Danciger et al. [DGK] found examples of affine groups acting properly discontinuously that
were neither virtually solvable nor virtually free.
Proliferation of these counterexamples leads to the following question. Consider a
semisimple real Lie group G; for every representation ρ of G on a finite-dimensional
real vector space V , we may consider the affine group G ⋉ V . Which of those affine
groups contain a nonabelian free subgroup with linear part Zariski-dense in G and acting
properly discontinuously on V ?
In this paper, we give a fairly general sufficient condition on the representation ρ for
existence of such subgroups. Before stating this condition, we need to introduce a few
classical notations.
1.2 Basic notations
For the remainder of the paper, we fix a semisimple real Lie group G; let g be its Lie
algebra. Let us introduce a few classical objects related to g and G (defined for instance
in Knapp’s book [Kna96], though our terminology and notation differ slightly from his).
We choose in g:
• a Cartan involution θ. Then we have the corresponding Cartan decomposition
g = k ⊕ q, where we call k the space of fixed points of θ and q the space of fixed
points of −θ. We call K the maximal compact subgroup with Lie algebra k.
• a Cartan subspace a compatible with θ (that is, a maximal abelian subalgebra of g
among those contained in q). We set A := exp a.
• a system Σ+ of positive restricted roots in a∗ . Recall that a restricted root is a
nonzero element α ∈ a∗ such that the restricted root space
gα := {Y ∈ g | ∀X ∈ a, [X, Y ] = α(X)Y }
is nontrivial. They form a root system Σ; a system of positive roots Σ+ is a subset
of Σ contained in a half-space and such that Σ = Σ+ ⊔ −Σ+ .
We call Π be the set of simple restricted roots in Σ+ . We call
a++ := X ∈ a ∀α ∈ Σ+ , α(X) > 0
the (open) dominant Weyl chamber of a corresponding to Σ+ , and
a+ := X ∈ a ∀α ∈ Σ+ , α(X) ≥ 0 = a++
the closed dominant Weyl chamber.
2
Then we call:
• M the centralizer of a in K, m its Lie algebra.
• L the centralizer of a in G, l its Lie algebra. It is clear that l = a ⊕ m, and well
known (see e.g. [Kna96], Proposition 7.82a) that L = M A.
• n+ (resp. n− ) the sum of the restricted root spaces of Σ+ (resp. of −Σ+ ), and
N + := exp(n+ ) and N − := exp(n− ) the corresponding Lie groups.
• p+ := l ⊕ n+ and p− := l ⊕ n− the corresponding minimal parabolic subalgebras,
P + := LN + and P − := LN − the corresponding minimal parabolic subgroups.
• W := NG (A)/ZG (A) the restricted Weyl group.
• w0 the longest element of the Weyl group, that is, the unique element such that
w0 (Σ+ ) = Σ− .
See Examples 2.3 and 2.4 in the author’s previous paper [Smi16] for working through
those definitions in the cases G = PSLn (R) and G = PSO+ (n, 1).
Finally, if ρ is a representation of G on a finite-dimensional real vector space V , we
call:
• the restricted weight space in V corresponding to a form λ ∈ a∗ the space
V λ := {v ∈ V | ∀X ∈ a, X · v = λ(X)v} ;
• a restricted weight of the representation ρ any form λ ∈ a∗ such that the corresponding weight space is nonzero.
Remark 1.1. The reader who is unfamiliar with the theory of noncompact semisimple
real Lie groups may focus on the case where G is split, i.e. its Cartan subspace a is
actually a Cartan subalgebra (just a maximal abelian subalgebra, without any additional
hypotheses). In that case the restricted roots are just roots, the restricted weights are just
weights, and the restricted Weyl group is just the usual Weyl group. Also the algebra m
vanishes and M is a discrete group.
However, the case where G is split does not actually require the full strength of this
paper, in particular because quasi-translations (see Section 4.5) then reduce to ordinary
translations.
1.3 Statement of main result
Let ρ be an irreducible representation of G on a finite-dimensional real vector space V .
Without loss of generality, we may assume that G is connected and acts faithfully. We
may then identify the abstract group G with the linear group ρ(G) ⊂ GL(V ). Let VAff be
the affine space corresponding to V . The group of affine transformations of VAff whose
linear part lies in G may then be written G ⋉ V (where V stands for the group of
translations). Here is the main result of this paper.
3
Main Theorem. Suppose that ρ satisfies the following conditions:
(i) there exists a vector v ∈ V such that:
(a) ∀l ∈ L, l(v) = v, and
(b) w̃0 (v) 6= v, where w̃0 is any representative in G of w0 ∈ NG (A)/ZG (A);
(ii) there exists an element X0 ∈ a such that −w0 (X0 ) = X0 and for every λ nonzero
restricted weight of ρ, we have λ(X0 ) 6= 0.
Then there exists a subgroup Γ in the affine group G ⋉ V whose linear part is Zariskidense in G and that is free, nonabelian and acts properly discontinuously on the affine
space corresponding to V .
(Note that the choice of the representative w̃0 in (i)(b) does not matter, precisely
because by (i)(a) the vector v is fixed by L = ZG (A).)
A few words about the significance of these hypotheses. We call representations satisfying condition (ii) "non-swinging" representations (see Section 3.3 to understand why).
This seems to be merely a technical assumption: the author conjectures that condition (i)
alone is sufficient, and in fact necessary and sufficient.
We shall start working with an arbitrary representation ρ, and gradually make stronger
and stronger hypotheses on it (except for the "no swinging" assumption which is logically
independent), introducing each one when we need it to make the construction work (so
that it is at least partially motivated). Here is the complete list of places where new
assumptions on ρ are introduced:
• Assumption 3.2, which is a necessary condition for (i)(a);
• Assumption 3.8, which is (ii) (the "no swinging" assumption);
• Assumption 4.23, which is (i)(a);
• Assumption 10.1, which is (i).
For each of these, we postpone the discussion of which groups do and which groups do
not satisfy it until the spot where it is introduced in the text. For the moment, let us
just say that the previously-known examples do fall under the scope of this theorem:
Example 1.2.
1. For G = SO+ (2n + 2, 2n + 1), the standard representation (acting on V = R4n+3 )
satisfies these conditions (see Remark 3.9 and Examples 4.22.1.b and 10.2.1 for
details). So Theorem A from [AMS02] is a particular case of this theorem.
2. If the real semisimple Lie group G is noncompact, the adjoint representation satisfies these conditions (see Remark 3.9 and Examples 4.22.3 and 10.2.2 for details).
So the main theorem of [Smi16] is a particular case of this theorem.
4
Remark 1.3. When G is compact, no representation can satisfy these conditions: indeed
in that case L is the whole group G and condition (i)(a) fails. So for us, only noncompact
groups are interesting. This is not surprising: indeed, any compact group acting on a
vector space preserves a positive-definite quadratic form, and so falls under the scope of
Bieberbach’s theorem.
1.4 Strategy of the proof
The proof has a lot in common with the author’s previous paper [Smi16]. The main idea
(which comes back to Margulis’s seminal paper [Mar83]) is to introduce, for some affine
maps g, an invariant that measures the translation part of g along a particular affine
subspace of V . The key part of the argument (just as in [Mar83] and in [Smi16]) is then
to show that, under some conditions, the invariant of the product of two maps is roughly
equal to the sum of their invariants (Proposition 8.1). Here are the two main difficulties
that were not present in [Smi16].
• The first one is that [Smi16] crucially relies on the following fact: if two maps are
R-regular (i.e. the dimension of their centralizer is the lowest possible), in general
position with respect to each other and strongly contracting (when acting on g),
their product is still R-regular. The natural generalization of the notion of an Rregular map that is adapted to an arbitrary representation is that of a "generic"
map, i.e. a map that has as few eigenvalues of modulus 1 (counted with multiplicity)
as possible. Unfortunately, the corresponding statement is then no longer true in
an arbitrary representation. If the representation is "too large", i.e. if it contains
restricted weights that are not multiples of restricted roots (see Example 3.5.2),
there are several different "types" of generic maps, depending on the region where
their Jordan projection (see Definition 2.3) falls.
In order to ensure that the product of two generic maps g and h (that are in general
position and strongly contracting) is still generic, we need to control the Jordan
projection Jd(gh) of the product based on the Jordan projections Jd(g), Jd(h) of
the factors. To do this, we use ideas developed by Benoist in [Ben96, Ben97]: when
g and h are in general position and sufficiently contracting, he show that Jd(gh) is
approximately equal to Jd(g) + Jd(h). So if we restrict all maps to have the same
"type", our argument works.
• Here is where the second difficulty comes: the argument of [Ben96] only works for
maps that are actually R-regular in addition of being generic. In most representations this is automatically true: if every restricted root occurs as a restricted
weight, then every generic map is in particular R-regular. But when the representation is "too small", this is not the case. (A surprising fact is that a handful
of representations are actually "too large" and "too small" at the same time: see
Example 3.5.4!)
As an example, consider the subgroup G of GL5 (R) consisting of transformations
5
preserving the quadratic form
x1 x3 + x2 x4 + x25 .
This is a form of signature (3, 2), so G ≃ SO(3, 2). Now take any real number
λ > 1 and any x ∈ R; then the element
λ λx
0
0 0
0 λ
0
0 0
−1
λ
0 0
g=
0 0
∈G
0 0 −λ−1 x λ−1 0
0 0
0
0 1
is generic in the standard representation ("pseudohyperbolic" in the terminology
of [AMS02] and [Smi14]), but not R-regular (when x 6= 0 it is not even semisimple!).
Just as there are two different notions of being "generic" (the notion of R-regularity,
which is adapted to the adjoint representation, and the notion of being generic in ρ),
there are also two different notions of being "in general position", two different
notions of being "strongly contracting" and so on. The results of [Ben96] crucially
rely on the stronger version of every property.
If we had used them as such, our Proposition 6.14 about products of maps "of given
type" (and the subsequent propositions that rely on it) would no longer include, as a
particular case, the corresponding result for G = SO+ (n+1, n) (namely Lemma 5.6,
point (1) in [AMS02]). Instead, we would need to duplicate all definitions, and to
always require that the maps we deal with satisfy both versions of the constraints.
(In particular, we would probably lose the benefit of the unified treatment of the
linear part and translation part, as outlined in Remark 5.3).
This weaker version is in theory sufficient for us, because it is known that "almost
all" elements are R-regular. So it is actually possible to construct the group Γ in
such a way that its elements all have this additional property, and thus provide a
working proof of the Main Theorem. But we felt that the simpler, stronger version
of Proposition 6.14 was interesting in its own right.
To prove it, we needed a generalization of the results of [Ben96]. Benoist’s subsequent paper [Ben97] does seem to provide such a generalization, by proving similar theorems with the hypothesis of R-regularity replaced by what he calls "θproximality", for θ some subset of Π. This is quite close to what we are looking
for; but unfortunately, the results of [Ben97] rely on the assumption that the Jordan projections of the maps lie in a vector subspace of a (see Remark 6.13 for
details), which is unacceptably restrictive for us. So in Section 6 of this paper, we
redeveloped this theory from scratch, in a suitably general way.
1.5 Plan of the paper
In Section 2, we give some background from representation theory.
6
In Section 3, we study the dynamics of elements of A. We choose one particular
element X0 ∈ a with some nice properties, with the goal of eventually "modelling", in
some sense, generators of the group Γ on exp(X0 ).
In Section 4, we study the dynamics of elements g of the affine group G ⋉ V that are of
type X0 (see Definition 4.14). This section culminates in the definition of the Margulis
invariant of g, which measures the translation part of g along its "axis".
In Section 5, we study some quantitative properties of such elements g. In particular we
define a quantitative measure of being "in general position", and a quantitative measure
of being "strongly contracting"; both of these notions are tailored to the choice of ρ
and of X0 . We also define analogous notions for proximal maps, and prove a theorem
(Proposition 5.12) about products of proximal maps.
Section 6 is where most of the new ideas of this paper are exploited. Here we apply the
theory of products of proximal maps to a selection of "fundamental representations" ρi
(defined in Proposition 2.12). The goal is to show that the product of two strongly
contracting maps of type X0 in general position is still of type X0 .
In Section 7, we now apply the theory of products of proximal maps to suitable exterior
powers of the maps g, in order to study the quantitative properties of products of elements
of type X0 . This section follows Section 3.2 of [Smi16] very closely.
Section 8 contains the key part of the proof. We prove that if we take two strongly
contracting maps of type X0 in general position, the Margulis invariant of their product
is close to the sum of their Margulis invariants. This section follows Section 4 of [Smi16]
very closely.
The very short Section 9 uses induction to extend the results of the two previous
sections to products of an arbitrary number of elements. We omit the proof, as it is a
straightforward generalization of Section 5 in [Smi16].
Section 10 contains the proof of the Main Theorem. It follows Section 6 of [Smi16]
quite closely, but there are a couple of additions.
1.6 Acknowledgements
I am very grateful to my Ph.D. advisor, Yves Benoist, whose help while I was working
on this paper has been invaluable to me.
I would also like to thank Bruno Le Floch for some interesting discussions, which in
particular helped me gain some insight about weights of representations.
2 Algebraic preliminaries
In this section, we give some background about real finite-dimensional representations of
semisimple real Lie groups.
In Subsection 2.1, for any element g ∈ G, we relate the eigenvalues and singular values
of ρ(g) (where ρ is some representation) to some "absolute" properties of g.
In Subsection 2.2, we enumerate some properties of restricted weights of a real finitedimensional representation of a real semisimple Lie group.
7
2.1 Eigenvalues in different representations
The goal of this subsection is to prove Proposition 2.6, which expresses the eigenvalues
and singular values of a given element g ∈ G acting in a given representation ρ, exclusively in terms of the structure of g in the abstract group G (respectively its Jordan
decomposition and its Cartan decomposition).
Proposition 2.1 (Jordan decomposition). Let g ∈ G. There exists a unique decomposition of g as a product g = gh ge gu , where:
• gh is conjugate in G to an element of A ( hyperbolic);
• ge is conjugate in G to an element of K ( elliptic);
• gu is conjugate in G to an element of N + ( unipotent);
• these three maps commute with each other.
Proof. This is well-known, and given for example in [Ebe96], Theorem 2.19.24. Note
however that the latter theorem uses representation-dependent definitions of a hyperbolic,
elliptic or unipotent element (applied to the case of the adjoint representation). To state
the theorem with the representation-agnostic definitions that we used, we need to apply
Theorems 2.19.18 and 2.19.16 from the same book.
Proposition 2.2 (Cartan decomposition). Let g ∈ G. Then there exists a decomposition
of g as a product g = k1 ak2 , with k1 , k2 ∈ K and a = exp(X) with X ∈ a+ . Moreover,
the element X is uniquely determined by g.
Proof. This is a classical result; see e.g. Theorem 7.39 in [Kna96].
Definition 2.3. For every element g ∈ G, we define:
• the Jordan projection of g, written Jd(g), to be the unique element of the closed
dominant Weyl chamber a+ such that the hyperbolic part gh (from the Jordan
decomposition g = gh ge gu given above) is conjugate to exp(Jd(g));
• the Cartan projection of g, written Ct(g), to be the element X from the Cartan
decomposition given above.
To talk about singular values, we need to introduce a Euclidean structure. We are
going to use a special one.
Lemma 2.4. Let ρ∗ be some real representation of G on some space V∗ . There exists a
K-invariant positive-definite quadratic form B∗ on V∗ such that all the restricted weight
spaces are pairwise B∗ -orthogonal.
We want to reserve the plain notation ρ for the "default" representation, to be fixed
once and for all at the beginning of Section 3. We use the notation ρ∗ so as to encompass
both this representation ρ and the representations ρi defined in Proposition 2.12.
Such quadratic forms have been considered previously: see for example Lemma 5.33.a)
in [BQ].
8
Example 2.5. If ρ∗ = Ad is the adjoint representation, then B∗ is the form Bθ given by
∀X, Y ∈ g,
Bθ (X, Y ) = −B(X, θY ),
where B is the Killing form and θ is the Cartan involution (see (6.13) in [Kna96]).
Proof. First note that there is a unique representation ρC
∗ (the complexified representation) such that the diagram
g
ρ∗
gl(V∗ )
(2.1)
gC
ρC
∗
gl(V∗C )
commutes (where the vertical arrows represent the canonical inclusions). Let u = k ⊕ iq
be the compact real form of gC . Then the subgroup of GL(V∗C ) with Lie algebra ρC
∗ (u)
C
is compact; by averaging over this subgroup, we may find on V∗ a u-invariant positivedefinite Hermitian form B∗C . By construction, we then have:
(
C
∀X ∈ k, ρC
∗ (X) is B∗ -anti-self-adjoint;
C
∀X ∈ q, ρC
∗ (iX) is B∗ -anti-self-adjoint.
Now we define on V∗ a bilinear form B∗ by
∀x, y ∈ V∗ ,
B∗ (x, y) := Re B∗C (x ⊗ 1, y ⊗ 1) .
(2.2)
It is straightforward to check that B∗ is still positive definite, and that we have:
(
∀X ∈ k, ρ∗ (X) is B∗ -anti-self-adjoint;
∀X ∈ q, ρ∗ (X) is B∗ -self-adjoint.
The first property implies that B∗ is k-invariant, hence (since K is connected) Kinvariant. The second property implies that any element of q has pairwise B∗ -orthogonal
eigenspaces in V∗ . Applying this to any X ∈ a ⊂ q such that all restricted weights of ρ∗
take pairwise distinct values on X, we conclude that all the restricted weight spaces of ρ∗
are pairwise B∗ -orthogonal.
Recall that the singular values of a map g in a Euclidean space are defined as the square
roots of the eigenvalues of g∗ g, where g∗ is the adjoint map. The largest and smallest
singular values of g then give respectively the operator norm of g and the reciprocal of
the operator norm of g−1 .
Proposition 2.6. Let ρ∗ : G → GL(V∗ ) be any representation of G on some vector
space V∗ ; let λ1∗ , . . . , λd∗∗ be the list of all the restricted weights of ρ∗ , repeated according
to their multiplicities. Let g ∈ G; then:
9
(i) The list of the moduli of the eigenvalues of ρ∗ (g) is given by
i
eλ∗ (Jd(g))
.
1≤i≤d∗
(ii) The list of the singular values of ρ∗ (g), with respect to a K-invariant Euclidean
norm B∗ on V∗ that makes the restricted weight spaces of V∗ pairwise orthogonal
(such a norm exists by Lemma 2.4), is given by
i
eλ∗ (Ct(g))
.
1≤i≤d∗
Proof.
(i) Let g = gh ge gu be the Jordan decomposition of g.
We begin with the remark that:
• ρ∗ (ge ) is conjugate to a map that is orthogonal with respect to the norm B∗
constructed in Lemma 2.4;
• for any X ∈ n+ , the linear map ρ∗ (X) is nilpotent (this essentially follows from
the identity ρ∗ (gα ) · V∗λ ⊂ V∗α+λ for any restricted root α and any restricted
root λ of ρ∗ ); hence by exponentiating, for any n ∈ N + , the linear map ρ∗ (n)
is unipotent; hence also ρ∗ (gu ) is unipotent.
If follows that ρ∗ (ge ) and ρ∗ (gu ) both have eigenvalues of modulus 1. Since gh , ge
and gu all commute with each other, we deduce that the eigenvalues of ρ∗ (g) are
equal, in modulus, to those of ρ∗ (gh ).
On the other hand, gh is by definition conjugate to exp(Jd(g)), so ρ∗ (gh ) has the
same eigenvalues as ρ∗ (exp(Jd(g)).
Finally, since exp(Jd(g)) is in A (the group corresponding to the Cartan subspace),
the list of the eigenvalues of ρ∗ (exp(Jd(g))) is by definition given by
i
eλ∗ (Jd(g))
.
1≤i≤d∗
(ii) Let g = k1 exp(Ct(g))k2 be the Cartan decomposition of g. Since ρ∗ (k1 ) and ρ∗ (k2 )
are B∗ -orthogonal maps, the B∗ -singular values of ρ∗ (g) coincide with those of the
map exp(Ct(g)); since exp(Ct(g)), being an element of A, is self-adjoint, its singular
values coincide with its eigenvalues. We conclude as in the previous point.
2.2 Properties of restricted weights
In this subsection, we introduce a few properties of restricted weights of real finitedimensional representations. (Proposition 2.7 is actually a general result about Coxeter
groups.) The corresponding theory for ordinary weights is well-known: see for example
Chapter V in [Kna96].
10
Let α1 , . . . , αr be an enumeration of the set Π of simple restricted roots generating Σ+ .
For every i, we set
(
2αi if 2αi is a restricted root
′
αi :=
(2.3)
αi
otherwise.
For every index i such that 1 ≤ i ≤ r, we define the i-th fundamental restricted weight ̟i
by the relationship
h̟i , α′j i
2
= δij
(2.4)
kα′j k2
for every j such that 1 ≤ j ≤ r.
By abuse of notation, we will often allow ourselves to write things such as "for all i in
some subset Π′ ⊂ Π, ̟i satisfies..." (tacitly identifying the set Π′ with the set of indices
of the simple restricted roots that are inside).
In the following proposition, for any subset Π′ ⊂ Π, we denote:
• by WΠ′ the Weyl subgroup of type Π′ :
WΠ′ := hsα iα∈Π′ ;
• by a+
Π′ the fundamental domain for the action of WΠ′ on a:
′
a+
Π′ := X ∈ a ∀α ∈ Π , α(X) ≥ 0 ,
(2.5)
(2.6)
which is a kind of prism whose base is the dominant Weyl chamber of WΠ′ .
Proposition 2.7. Take any Π′ ⊂ Π, and let us fix X ∈ a+
Π′ . Let Y ∈ a. Then the
following two conditions are equivalent:
(i) the vector Y is in a+
Π′ and satisfies the system of linear inequalities
(
∀i ∈ Π′ ,
̟i (Y ) ≤ ̟i (X),
′
∀i ∈ Π \ Π , ̟i (Y ) = ̟i (X);
(ii) the vector Y is in a+
Π′ and also in the convex hull of the orbit of X by WΠ′ .
Proof. For Π′ = Π, this is well known: see e.g. [Hal15], Proposition 8.44.
Now let Π′ be an arbitrary subset of Π. We may translate everything by the vector
X
̟i (X)Hi
i∈Π\Π′
(where (Hi )i∈Π is a basis of a dual to the basis (̟i )i∈Π of a∗ ), which is obviously fixed
by WΠ′ . Thus we reduce the problem to the case where
∀i ∈ Π \ Π′ ,
̟i (X) = 0.
(2.7)
Now let Σ′ be the intersection of Σ with the vector space aΠ′ determined by this system
of equations, which is also the linear span of (αi )i∈Π′ . Then Σ′ is a root system that has:
11
• Π′ as a simple root system;
• WΠ′ as the Weyl group;
• a+
Π′ ∩ aΠ′ as the dominant Weyl chamber.
This reduces the problem to the case Π′ = Π.
Proposition 2.8. Every restricted weight of every representation of g is a linear combination of fundamental restricted weights with integer coefficients.
Proof. This is a particular case of Proposition 5.8 in [BT65]. For a correction concerning
the proof, see also Remark 5.2 in [BT72].
Proposition 2.9. If ρ∗ is an irreducible representation of g, there is a unique restricted
weight λ∗ of ρ∗ , called its highest restricted weight, such that no element of the form
λ∗ + αi with 1 ≤ i ≤ r is a restricted weight of ρ∗ .
Remark 2.10. In contrast to the situation with non-restricted weights, the highest restricted weight is not always of multiplicity 1; nor is a representation uniquely determined
by its highest restricted weight.
Proof. Let h be a Cartan subalgebra of g containing a (i.e. h is just a maximal abelian
subalgebra of g, without the requirement of being contained in q). Let ∆ be the set
of (non restricted) roots in h∗ ; then restricted roots are just restrictions of roots to a.
(Similarly, restricted weights are just restrictions of weights.) Let ∆+ be the subset of ∆
formed by roots whose restrictions are positive restricted roots (i.e. elements of Σ+ ); then
∆+ forms a system of positive roots.
It is well known (see e.g. [Kna96], Theorem 5.5 (d)) that ρ∗ has a unique (non restricted) weight with respect to h that is the highest with respect to ∆+ . Let λ∗ be
its restriction to a; then the required property for the highest restricted weight follows
from the corresponding property for the highest non restricted weight, and the fact that
restrictions of positive roots are positive restricted roots.
Proposition 2.11. Let ρ∗ be an irreducible representation of g; let λ∗ be its highest
restricted weight. Let Λλ∗ be the restricted root lattice shifted by λ∗ :
Λλ∗ := {λ∗ + c1 α1 + · · · + cr αr | c1 , . . . , cr ∈ Z} .
Then the set of restricted weights of ρ∗ is exactly the intersection of the lattice Λλ∗ with
the convex hull of the orbit {w(λ∗ ) | w ∈ W } of λ∗ by the restricted Weyl group.
Proof. Once again, this follows from the corresponding result for non restricted weights
(see e.g. [Hal15], Theorem 10.1) by passing to the restriction. In the case of restricted
weights, one of the inclusions is stated in [Hel08], Proposition 4.22.
Proposition 2.12. For every index i such that 1 ≤ i ≤ r, there exists an irreducible
representation ρi of G on a space Vi whose highest restricted weight is equal to ni ̟i (for
some positive integer ni ) and has multiplicity 1.
12
Proof. This follows from the general Theorem 7.2 in [Tit71].
Lemma 2.13. Fix an index i such that 1 ≤ i ≤ r. Then all restricted weights of ρi other
than ni ̟i have the form
r
X
cj αj ,
ni ̟i − αi −
j=1
with cj ≥ 0 for every j.
Proof. Let λ be some restricted weight of ρi . By Proposition 2.11 taken together with
Proposition 2.7, we already know that it can be written as
λ = ni ̟i −
r
X
c′j αj ,
j=1
where all coefficients c′j are nonnegative integers. It remains to show that if λ 6= ni ̟i ,
then necessarily c′i > 0.
Assume that c′i = 0. By Proposition 8.42 in [Hal15], we lose no generality in assuming
that λ is dominant. Let Πi := Π \ {i}; by Proposition 2.7, it follows that λ is then in the
convex hull of the orbit of ni ̟i by WΠi . But clearly WΠi fixes ̟i , hence also ni ̟i . The
conclusion follows.
3 Choice of a reference Jordan projection
For the remainder of the paper, we fix ρ an irreducible representation of G on a finitedimensional real vector space V . For the moment, ρ may be any representation; but in
the course of the paper, we shall gradually introduce several assumptions on ρ (namely
Assumptions 3.2, 3.8, 4.23 and 10.1) that will ensure that ρ satisfies the hypotheses of
the Main Theorem.
<
We call Ω the set of restricted weights of ρ. For any X ∈ a, we call Ω>
X (resp. ΩX ,
≥
≤
=
ΩX , ΩX , ΩX ) the set of all restricted weights of ρ that take a positive (resp. negative,
zero, nonnegative, nonpositive) value on X:
Ω≥
X := {λ ∈ Ω | λ(X) ≥ 0}
Ω>
X := {λ ∈ Ω | λ(X) > 0}
Ω≤
X := {λ ∈ Ω | λ(X) ≤ 0}
Ω<
X := {λ ∈ Ω | λ(X) < 0}
Ω=
X := {λ ∈ Ω | λ(X) = 0} .
The goal of this section is to study these sets, and to choose a vector X0 ∈ a+ for
which the corresponding sets have some nice properties. The motivation for their study
is that they parametrize the dynamical spaces (defined in Subsection 4.3) of exp(X0 )
(obviously), and actually of any element g ∈ G whose Jordan projection "has the same
type" as X0 (see Proposition 4.16).
In Subsection 3.1, we introduce the notion of a generic vector X ∈ a, and impose a
first constraint on ρ: that 0 be a restricted weight.
13
In Subsection 3.2, we introduce an equivalence relation on the set of generic vectors
that identifies elements with the same dynamics, and give several examples.
In Subsection 3.3, we introduce the notion of a symmetric vector X ∈ a, and ensure
that ρ does not exclude generic vectors from being symmetric.
In Subsection 3.4, we define parabolic subgroups and subalgebras of type X; we also
associate to every X ∈ a+ a set ΠX of simple restricted roots and a subgroup WX of the
restricted Weyl group.
In Subsection 3.5, we prove Proposition 3.17, which shows that every equivalence
class of generic vectors has a representative that has "as much symmetry" as the whole
equivalence class, called an "extreme" representative.
At the end of this section, we shall fix once and for all an extreme, symmetric, generic
vector X0 ∈ a+ , which will serve as a reference Jordan projection (see the definition at
the beginning of Subsection 4.4).
3.1 Generic elements
We say that an element X ∈ a is generic if
Ω=
X ⊂ {0}.
Remark 3.1. This is indeed the generic case: it happens as soon as X avoids a finite
collection of hyperplanes, namely the kernels of all nonzero restricted weights of ρ.
Assumption 3.2. From now on, we assume that 0 is a restricted weight of ρ:
0 ∈ Ω,
or equivalently
dim V 0 > 0.
Remark 3.3. By Proposition 2.11, this is the case if and only if the highest restricted
weight of ρ is a Z-linear combination of restricted roots.
We lose no generality in assuming this, because this assumption is necessary for condition (i)(a) of the Main Theorem (which is also Assumption 4.23, see below) to hold.
Indeed, any nonzero vector fixed by L is in particular fixed by A ⊂ L, which means that
it belongs to the zero restricted weight space.
In that case, for generic X we actually have
Ω=
X = {0}.
3.2 Types of elements of a
For two vectors X, Y ∈ a, we say that Y has the same type as X if
(
>
Ω>
Y = ΩX ;
<
Ω<
Y = ΩX ,
(3.1)
i.e. if every restricted weight takes the same sign on both of them. For generic X and Y ,
this implies that all five spaces Ω≥ , Ω≤ , Ω= , Ω> and Ω< coincide for X and Y , hence
that exp(X) and exp(Y ) have the same dynamical spaces (see Subsection 4.3).
14
This is an equivalence relation, which partitions the set of generic vectors into finitely
many equivalence classes. Some generic X ∈ a being fixed, we call
(
)
(
∀λ ∈ Ω>
,
λ(Y
)
>
0;
X
(3.2)
aρ,X := Y ∈ a
∀λ ∈ Ω<
X , λ(Y ) < 0
its equivalence class in a. If X is dominant, we additionally call
+
a+
ρ,X := aρ,X ∩ a
(3.3)
its equivalence class in the closed dominant Weyl chamber a+ .
Remark 3.4. Every such equivalence class is obviously a convex cone. Also, these equivalence classes actually coincide with connected components of the set of generic vectors.
Example 3.5.
1. If G is any noncompact semisimple real Lie group and ρ = Ad is its adjoint representation (so that V = g):
• A vector X ∈ a is generic if and only if it lies in one of the open Weyl chambers.
In particular a vector X in a+ is generic if and only if it lies in a++ .
• All elements of a++ have the same type; so there is only one generic equivalence
++ .
class in a+ . For any X ∈ a++ , we have aAd,X = a+
Ad,X = a
2. Take G = SO+ (3, 2). The root system is then B2 :
−e1 + e2
e2
e1 + e2
e1
−e1
−e1 − e2
−e2
e1 − e2
As this group is split, the roots are also the restricted roots. Let ρ be the representation with highest weight 2e1 + e2 (in the notations of [Kna96], Appendix C).
This is a representation of dimension 35, whose weights (also restricted weights)
are as follows:
15
(a) ρ of highest weight 2e1 + e2
(b) ρ of highest weight e1
Figure 1: Equivalence classes and Weyl chambers for two different representations of G =
SO+ (3, 2). Dashed lines represent walls of Weyl chambers. Thick gray lines
represent kernels of nonzero weights, which separate the different equivalence
classes. The dominant Weyl chamber a+ is hatched. All equivalence classes
in a that intersect a+ are shaded, with different shades if there are more than
one.
(the number of dots at each node represents multiplicity.) Then every equivalence
class in a is contained in some Weyl chamber: see Figure 1a. The dominant Weyl
chamber a+ is split into two equivalence classes by the line of slope 12 , kernel of the
weight −e1 + 2e2 .
3. Take G = SO+ (3, 2) and ρ the standard representation on V = R5 . Using once
again the notations of [Kna96], Appendix C, its highest weight is e1 and its weights
are ±e1 , ±e2 and 0 (of course all with multiplicity 1). Then (see Figure 1b):
• A vector X ∈ a+ is generic if and only if it avoids the "horizontal" wall of the
dominant Weyl chamber (the one normal to e2 ).
• All such vectors have the same type. So for a generic X ∈ a+ , the equivalence
class a+
ρ,X is the half-open dominant Weyl chamber, with the diagonal wall
included and the horizontal wall excluded.
• The whole equivalence class aρ,X is then an open quadrant of the plane a,
consisting of two half-open Weyl chambers glued back-to-back along their
shared diagonal wall.
4. Suppose that G and ρ are such that the set of its restricted weights of ρ neither
contains nor is contained in the set of multiples of the restricted roots of G. Then
16
both phenomena occur at the same time: equivalence classes in a neither contain
nor are contained in the Weyl chambers.
Examples are not immediate to come up with: the author even mistakenly believed
for some time that no such representations existed. However, here is one such
example:
• Take G = PSp4 (R) (which is a split form). In the notations of [Kna96],
Appendix C, its roots are all the possible expressions of the form ±ej ± ei
or ±2ei .
• Take ρ to be the representation with highest weight e1 + e2 + e3 + e4 . It has:
– the 16 weights of the form ±e1 ± e2 ± e3 ± e4 , with multiplicity 1;
– the 24 weights of the form ±ei ± ej , with multiplicity 1;
– the zero weight with multiplicity 2,
for a total dimension of 42.
The reader may check that there are then three different "types" of generic vectors
in the dominant Weyl chamber a+ , and two of the equivalence classes contain a
slice of the wall normal to 2e4 .
3.3 Swinging
We start this subsection with the following observation: if the Jordan projection of g
is X, then the Jordan projection of g−1 is −w0 (X), where w0 is the "longest element" of
the Weyl group that interchanges positive and negative restricted roots (see Section 1.2).
We would like to ensure that for every element g of the group Γ we are trying to
construct, the element g itself and its inverse g−1 have similar dynamics. To do that, we
would like X and −w0 (X) to be of the same type. Replacing if necessary X and −w0 (X)
by their midpoint, we lose no generality in assuming they are actually equal.
Definition 3.6. We say that an element X ∈ a is symmetric if it is invariant by −w0 :
−w0 (X) = X.
Unfortunately, it is not always possible to find a vector X that is both symmetric and
generic, as shown by the following example:
Example 3.7. Take G = SL3 (R). It is a split form, so its restricted root system is the
17
same as its root system, namely A2 :
e1 − e3
e2 − e3
e1 − e2
e2 − e1
e3 − e2
e3 − e1
For this group, −w0 is the map that exchanges the two simple positive roots e1 − e2
and e2 − e3 (we use the notations of [Kna96], Appendix C); in the picture above, it
corresponds to the reflection about the vertical axis. So a vector X ∈ a+ is symmetric if
and only if it lies on that vertical axis (which bisects the dominant Weyl chamber a+ ).
Now consider the representation ρ of G with highest weight 2e1 − e2 − e3 . Note that
this is three times the first fundamental weight, so ρ is actually the third symmetric
product S 3 R3 of the standard representation. Here are its weights:
e1 − e3
e2 − e3
2e1 − e2 − e3
e1 − e2
−e1 + 2e2 − e3
0
−e2 + e3
−e1 + e2
−e1 + e3
−e1 − e2 + 2e3
We see that any symmetric vector necessarily annihilates the weight −e1 +2e2 −e3 , hence
it cannot be generic.
We call this phenomenon "swinging". Here is the picture to have in mind: when we
apply the involution −w0 to some generic X, the annihilator of X (i.e. the hyperplane
of a∗ consisting of linear forms that vanish on X) "swings" past the weight −e1 +2e2 −e3 ,
thus switching it from the set Ω> to the set Ω< .
From now on, we assume that this issue does not arise:
Assumption 3.8 ("No swinging"). From now on, we assume that ρ is such that there
exists a symmetric generic element of a.
This is precisely condition (ii) from the Main Theorem.
18
Remark 3.9.
• It is well-known that when the restricted root system of G has any type other than
An (with n ≥ 2), D2n+1 or E6 , we actually have w0 = − Id. For those groups, every
vector X ∈ a is symmetric, and so every representation satisfies this condition.
• For the remaining groups, a straightforward linear algebra manipulation shows that
this condition is equivalent to the following: no nonzero restricted weight of ρ must
fall into the linear subspace
{λ ∈ a∗ | w0 λ = λ}
(3.4)
(the "axis of symmetry" of w0 in a∗ ). For example, this is always true for the
adjoint representation (any restricted root fixed by w0 would need to be positive
and negative at the same time). Heuristically, this seems to hold when the highest
restricted weight is "small", but to quickly fail when it gets "large enough".
3.4 Parabolic subgroups and subalgebras
A parabolic subgroup (or subalgebra) is usually defined in terms of a subset Π′ of the set Π
of simple restricted roots. We find it more convenient however to use a slightly different
language. To every to every such subset corresponds a facet of the Weyl chamber, given
by intersecting the walls corresponding to elements of Π′ . We may exemplify this facet
by picking some element X in it that does not belong to any subfacet. Conversely, for
every X ∈ a+ , we define the corresponding subset
ΠX := {α ∈ Π | α(X) = 0} .
(3.5)
The parabolic subalgebras and subgroups of type ΠX can then be very conveniently
rewritten in terms of X, as follows.
Remark 3.10. The set ΠX actually encodes the "type" of X with the respect to the
adjoint representation.
Definition 3.11. For every X ∈ a+ , we define:
−
• p+
X and pX the parabolic subalgebras of type X, and lX their intersection:
p+
X := l ⊕
M
gα ;
M
gα ;
α(X)≥0
p−
X := l ⊕
α(X)≤0
lX := l ⊕
M
α(X)=0
19
gα .
• PX+ and PX− the corresponding parabolic subgroups, and LX their intersection:
PX+ := NG (p+
X );
PX− := NG (p−
X );
LX := PX+ ∩ PX− .
An object closely related to these parabolic subgroups (see formula (4.4), the Bruhat
decomposition for parabolic subgroups) is the stabilizer of X in the Weyl group:
Definition 3.12. For any X ∈ a+ , we set
WX := {w ∈ W | wX = X} .
Remark 3.13. The group WX is also closely related to the set ΠX . Indeed, it follows
immediately that a simple restricted root α belongs to ΠX if and only if the corresponding
reflection sα belongs to WX . Conversely, it is well-known (Chevalley’s lemma, see e.g.
[Kna96], Proposition 2.72) that these reflections actually generate the group WX .
Thus WX is actually the same thing as WΠ′ (as defined before Proposition 2.7) where
we substitute Π′ = ΠX .
Example 3.14. To help understand the conventions we are taking, here are the extreme
cases:
1. If X lies in the open Weyl chamber a++ , then:
• PX+ = P + is the minimal parabolic subgroup; PX− = P − ; LX = L;
• ΠX = ∅;
• WX = {Id}.
2. If X = 0, then:
• PX+ = PX− = LX = G;
• ΠX = Π;
• WX = W .
3.5 Extreme vectors
Besides WX , we are also interested in the group
Wρ,X := {w ∈ W | wX has the same type as X} ,
(3.6)
which is the stabilizer of X "up to type". It obviously contains WX . The goal of this
subsection is to show that in every equivalence class, we can actually choose X in such
a way that both groups coincide.
20
Example 3.15. In Example 3.5.3 (G = SO+ (3, 2) acting on V = R5 ), the group Wρ,X
corresponding to any generic X is a two-element group. If we take X to be generic not
only with respect to ρ but also with respect to the adjoint representation (in other terms
if X is in an open Weyl chamber), then the group WX is trivial. If however we take as X
any element of the diagonal wall of the Weyl chamber, we have indeed WX = Wρ,X .
Definition 3.16. We call an element X ∈ a+ extreme if WX = Wρ,X , i.e. if it satisfies
the following property:
∀w ∈ W,
wX has the same type as X ⇐⇒ wX = X.
Proposition 3.17. For every generic X ∈ a+ , there exists a generic X ′ ∈ a+ that has
the same type as X and that is extreme.
If moreover X is symmetric, then X ′ is still symmetric.
Remark 3.18. The following statement will never be used in the paper (so we leave it
without proof), but might help to understand what is going on: for every generic X, we
have
+
aρ,X = Wρ,X a+
ρ,X = WX ′ aρ,X .
Also, it can be shown that a representative X ′ of a given equivalence class a+
ρ,X is extreme
+
if and only if it lies in every wall of the Weyl chamber that "touches" aρ,X (or, equivalently,
passes through aρ,X ), hence the term "extreme".
Proof. To construct an element that has the same type as X but has the whole group Wρ,X
as stabilizer, we simply average over the action of this group: we set
X
X′ =
wX.
(3.7)
w∈Wρ,X
(As multiplication by positive scalars does not change anything, we have written it as a
sum rather than an average for ease of manipulation.) Then obviously:
• By definition every wX for w ∈ Wρ,X has the same type as X; since the equivalence
class aρ,X is a convex cone, their sum X ′ also has the same type as X.
• In particular X ′ is generic.
• By construction whenever wX has the same type as X, we have wX ′ = X ′ ; conversely if w fixes X ′ , then wX has the same type as wX ′ = X ′ which has the same
type as X. So X ′ is extreme.
Let us now show that X ′ ∈ a+ , i.e. that for every α ∈ Π, we have α(X ′ ) ≥ 0:
• If sα X ′ = X ′ , then obviously α(X ′ ) = 0.
21
• Otherwise, since X ′ is extreme, it follows that sα X ′ does not even have the same
type as X ′ . Since X ′ is generic, this means that there exists a restricted weight λ
of ρ such that
(
λ(X ′ ) > 0,
(3.8)
sα (λ)(X ′ ) < 0.
By definition, the same inequalities then hold for any Y with the same type as X ′
(or as X):
(
λ(Y ) > 0,
sα (λ)(Y ) < 0.
In particular the form λ − sα (λ), which is a multiple of α, takes a positive value on
every such Y ; hence α never vanishes on the equivalence class aρ,X . By hypothesis X ∈ a+ , so α(X) ≥ 0. Since aρ,X is connected, we conclude that α(X ′ ) > 0.
Finally, assume that X0 is symmetric, i.e. −w0 (X) = X. Then since w0 belongs to the
Weyl group, it induces a permutation on Ω, hence we have:
>
>
<
w0 Ω>
X = Ωw0 X = Ω−X = ΩX ,
(3.9)
<
so that w0 swaps the sets Ω>
X and ΩX . Now by definition we have
<
Wρ,X = StabW (Ω>
X ) ∩ StabW (ΩX ),
(3.10)
hence w0 normalizes Wρ,X . Obviously the map X 7→ −X commutes with everything, so
−w0 also normalizes Wρ,X . We conclude that
X
−w0 (X ′ ) =
−w0 (w(X))
w∈Wρ,X
=
X
w′ (−w0 (X))
w ′ ∈Wρ,X
= X ′,
(3.11)
so that X ′ is still symmetric.
Remark 3.19. In practice, it can be shown that if G is simple, the set ΠX for extreme,
symmetric, generic X can actually only be one of the following:
(a) empty;
(b) the set of long simple restricted roots;
(c) the whole set Π.
Case (a) accounts for the vast majority of representations. Case (b) obviously only
occurs when the restricted root system has a non-simply-laced Dynkin diagram (G2 , F4 ,
Bn , Cn or BCn ), and then only occurs in finitely many representations of each group.
Case (c) only occurs in trivial situations, namely when either dim a = 0 (i.e. the group G
is compact) or the representation is trivial.
The proof of this fact mostly relies on the following two observations:
22
• As soon as Ω is large enough to include some simple restricted root α, no set ΠX ′
may contain α. Indeed in that case, α(X ′ ) never vanishes for generic X ′ .
• The Weyl group acts transitively on the set of restricted roots of the same length;
so as soon as Ω contains one restricted root of a given length, it contains all of
them.
For the remainder of the paper, we fix some symmetric generic vector X0 in the closed
dominant Weyl chamber a+ that is extreme.
4 Dynamics of elements of type X0
Now we take an element g in the affine group ρ(G) ⋉ V such that the Jordan projection
of its linear part has the same type as X0 . The goal of this section is to understand the
dynamics of g acting on the affine space corresponding to V , in particular its "dynamical
spaces" defined in Subsection 4.3. There is a lot of parallelism between this section and
Section 2 in [Smi16].
In Subsection 4.1, we introduce the dynamical subspaces of X0 . We also show that the
stabilizers in G of those subspaces (except for the neutral one) are precisely the parabolic
subgroups introduced in Subsection 3.4.
In Subsection 4.2, we introduce some formalism that reduces the study of the affine
space VAff corresponding to V to the study of a vector space called A. We also introduce
affine equivalents of linear notions defined previously.
In Subsection 4.3, we define the linear and affine dynamical subspaces associated to
an element of the affine group ρ(G) ⋉ V . This is very similar to Section 2.1 in [Smi16].
In Subsection 4.4, we describe the dynamical subspaces of an element g ∈ ρ(G) ⋉ V
whose Jordan projection has the same type as X0 .
In Subsection 4.5, we show that the action of any such element on its affine neutral
space is a "quasi-translation", and explain what that means. This is a generalization of
Section 2.4 in [Smi16].
In Subsection 4.6, we introduce a family of canonical identifications between different affine neutral spaces, and use them to define the "Margulis invariant" for any such
element, which is a vector measuring its translation part along a subspace of its affine
neutral space. This is a generalization of Section 2.5 in [Smi16].
4.1 Reference dynamical spaces
Recall that X0 is some generic, symmetric, extreme vector in the closed dominant Weyl
chamber a+ , chosen once and for all.
Definition 4.1. We define the following subspaces of V :
L
• V0> := λ(X0 )>0 V λ , the reference expanding space;
• V0< :=
L
λ(X0 )<0 V
λ,
the reference contracting space;
23
• V0= :=
• V0≥ :=
• V0≤ :=
L
λ(X0 )=0 V
L
λ(X0 )≥0 V
L
λ(X0 )≤0 V
λ,
the reference neutral space;
λ,
the reference noncontracting space;
λ,
the reference nonexpanding space.
In other terms, V0≥ is the direct sum of all restricted weight spaces corresponding to
weights in Ω≥
X0 , and similarly for the other spaces.
Clearly these are precisely the dynamical spaces (see Subsection 4.3) associated to the
map exp(X0 ) (acting on V by ρ).
Remark 4.2. Note that since X0 is generic, V0= is actually just the zero restricted weight
space:
V0= = V 0 ;
moreover by Assumption 3.2, zero is a restricted weight, so this space is nontrivial.
Example 4.3.
1. For G = SO+ (p, q) acting on V = Rp+q (where p ≥ q), there is only one generic
type. The spaces V0> and V0< are some maximal totally isotropic subspaces (transverse to each other), V0≥ and V0≤ are their respective orthogonal supplements,
and V0= is the (p − q)-dimensional space orthogonal to both V0> and V0< .
2. If G is any semisimple real Lie group acting on V = g (its Lie algebra) by the
adjoint representation, then the reference noncontracting space g≥
0 is obviously
equal to p+
.
There
is
once
again
only
one
generic
type,
given
by
any
X0 ∈ a++ ;
X0
+ is actually the (reference) minimal
we then have ΠX0 = ∅, so that p+
X0 = p
parabolic subalgebra. We have similar identities for the other dynamical spaces,
namely:
+
g≥
0 =p ;
+
g>
0 =n ;
−
g≤
0 =p ;
−
g<
0 =n ;
g=
0 = l.
Let us now understand what happens when we apply an element of G to one of those
subspaces. The motivation for this, as well as the explanation of the term "reference
subspace", comes from Corollary 4.17.
Proposition 4.4. We have:
(i) StabW (V0≥ ) = StabW (V0> ) = StabW (V0≤ ) = StabW (V0< ) = WX0 .
(ii) StabG (V0≥ ) = StabG (V0> ) = PX+0 .
(iii) StabG (V0≤ ) = StabG (V0< ) = PX−0 .
24
Remark 4.5. Note that every restricted weight space is invariant by ZG (A) = L, and that
NG (A) permutes these spaces; so if we have a direct sum of several restricted weights, it
makes sense to talk about its image by an element of W . Moreover, we have the obvious
identity
∀w ∈ W, ∀λ ∈ a∗ , wV λ = V wλ .
(4.1)
Proof of Proposition 4.4.
(i) First note that since X0 is generic, the only restricted weight that vanishes on X0
is the zero weight, so we have indeed
StabW (V0≥ ) = StabW (V0> ) = StabW (V0≤ ) = StabW (V0< ).
Moreover, this group is obviously included in the group Wρ,X0 = StabW (aρ,X0 ),
which is equal to WX0 since X0 is extreme. Conversely, let w ∈ WX0 ; then X0 is
fixed by w, and so is (say) the set Ω≥
X0 of restricted weights nonnegative on X0 . It
follows that StabW (V0≥ ) contains WX0 .
(ii) We first show that both StabG V0> and StabG V0≥ contain the group P + . Indeed:
• The group L stabilizes every restricted weight space V λ . Indeed, take some
λ ∈ a∗ , v ∈ V λ , l ∈ L, X ∈ a; then we have:
X · l(v) = l(Ad(l−1 )(X) · v) = l(X · v) = λ(X)l(v).
(4.2)
• Let α be a positive restricted root and λ a restricted weight such that the
value λ(X0 ) is positive (resp. nonnegative). Then clearly we have
gα · V λ ⊂ V λ+α ,
and (λ + α)(X0 ) is still positive (resp. nonnegative). Hence n+ stabilizes V0>
and V0≥ .
• The statement follows as P + = L exp(n+ ).
Now take any element g ∈ G. Let us apply the Bruhat decomposition: we may
write
g = p1 wp2 ,
with p1 , p2 some elements of the minimal parabolic subgroup P + and w some element of the restricted Weyl group W (see e.g. [Kna96], Theorem 7.40). (Technically
we need to replace w ∈ W = NG (A)/ZG (A) by some representative w̃ ∈ NG (A);
but by the remark preceding this proof, we may ignore this distinction.) From the
statement that we just proved it immediately follows that
StabG (V0≥ ) = StabG (V0> ) = P + StabW (V0≥ )P + = P + WX0 P + .
(4.3)
On the other hand, we have the Bruhat decomposition for parabolic subgroups:
+
+
PX+0 := StabG (p+
X0 ) = P W X0 P .
25
(4.4)
This can be shown by applying a similar reasoning to the adjoint representation:
indeed in that case the space V0≥ corresponding to the same X0 is just p+
X0 . (There
is just a small difficulty due to the fact that X0 is not, in general, generic with
respect to the adjoint representation.)
The conclusion follows.
(iii) Replacing P + and PX+0 respectively by P − and PX−0 , the same reasoning applies.
4.2 Extended affine space
Let VAff be an affine space whose underlying vector space is V .
Definition 4.6 (Extended affine space). We choose once and for all a point of VAff which
we take as an origin; we call R0 the one-dimensional vector space formally generated by
this point, and we set A := V ⊕ R0 the extended affine space corresponding to V . (We
hope that A, the extended affine space, and A, the group corresponding to the Cartan
space, occur in sufficiently different contexts that the reader will not confuse them.)
Then VAff is the affine hyperplane "at height 1" of this space, and V is the corresponding
vector hyperplane:
V = V × {0} ⊂ V × R0 ;
VAff = V × {1} ⊂ V × R0 .
Definition 4.7 (Linear and affine group). Any affine map g with linear part ℓ(g) and
translation vector v, defined on VAff by
g : x 7→ ℓ(g)(x) + v,
can be extended in a unique way to a linear map defined on A, given by the matrix
ℓ(g) v
.
0
1
From now on, we identify the abstract group G with the group ρ(G) ⊂ GL(V ), and
the corresponding affine group G ⋉ V with a subgroup of GL(A).
Definition 4.8 (Affine subspaces). We define an extended affine subspace of A to be a
vector subspace of A not contained in V . There is a one-to-one correspondence between
extended affine subspaces of A and affine subspaces of VAff of dimension one less. For
any extended affine subspace of A denoted by A1 (or A2 , A′ and so on), we denote by V1
(or V2 , V ′ and so on) the space A ∩ V (which is the linear part of the corresponding affine
space A ∩ VAff ).
Definition 4.9 (Translations). By abuse of terminology, elements of the normal subgroup V ⊳ G ⋉ V will still be called translations, even though we shall see them mostly
as endomorphisms of A (so that they are formally transvections). For any vector v ∈ V ,
we denote by τv the corresponding translation.
26
Definition 4.10 (Reference affine dynamical spaces). We now give a name for (the
vector extensions of) the affine subspaces of VAff parallel respectively to V0≥ , V0≤ and V0=
and passing through the origin: we set
≥
A≥
0 := V0 ⊕ R0 ,
the reference affine noncontracting space;
A0 := V0 ⊕ R0 ,
the reference affine nonexpanding space;
A0 := V0 ⊕ R0 ,
the reference affine neutral space.
≤
=
≤
=
These are obviously the affine dynamical spaces (see next subsection) corresponding to
the map exp(X0 ), seen as an element of G ⋉ V by identifying G with the stabilizer of R0
in G ⋉ V .
Definition 4.11 (Affine Jordan projection). Finally, we extend the notion of Jordan
projection to the whole group G ⋉ V , by setting
∀g ∈ G ⋉ V,
Jd(g) := Jd(ℓ(g)).
Remark 4.12.
1. It is tempting to try to define an "affine Jordan decomposition": to wit, any affine
map g ∈ G ⋉ V may be written as g = τv gh ge gu with gh (resp. ge , gu ) conjugate
in G ⋉ V to an element of A (resp. of K, of N + ) and v some element of V .
Unfortunately, we can neither require that τv commute with the other three factors,
nor (as erroneously claimed in the author’s previous paper [Smi16]) determine v in
a unique fashion. The trouble comes from unipotent elements; to understand the
problem, examine the affine transformation
x
1 1
x
0
g:
7→
+
.
y
0 1
y
1
So we must be a little more careful; see the proof of Proposition 4.16 for a more
detailed study of conjugacy classes in G ⋉ V .
2. We do not extend similarly the Cartan projection to G⋉V , for the following reason.
While eigenvalues of an element of G ⋉ V depend only on the eigenvalues of its
linear part, the same statement does not hold for its singular values.
4.3 Definition of dynamical spaces
For every g ∈ G ⋉ V , we define its linear dynamical spaces as follows:
• Vg> , the expanding space associated to g:
the largest vector subspace of V stable by g such that all eigenvalues λ of the
restriction of g to that subspace satisfy |λ| > 1;
• Vg< , the contracting space associated to g:
the same thing with |λ| < 1;
27
• Vg= , the neutral space associated to g:
the same thing with |λ| = 1;
• Vg≥ , the noncontracting space associated to g:
the same thing with |λ| ≥ 1;
• Vg≤ , the nonexpanding space associated to g:
the same thing with |λ| ≤ 1.
Equivalently, Vg> is the direct sum of all the generalized eigenspaces E λ of g associated to
eigenvalues λ of modulus larger than 1 (defined as E λ = ker(g −λ Id)n where n = dim V ),
and similarly for the four other spaces. We then obviously have
Vg≥
z }| {
V = Vg> ⊕ Vg= ⊕ Vg< .
| {z }
Vg≤
(4.5)
Also note that the restriction of g from A to V is just its linear part, so that the linear
dynamic subspaces of g only depend on ℓ(g).
For every g ∈ G ⋉ V , we define its affine dynamical subspaces:
• A≥
g , the affine noncontracting space associated to g,
• A≤
g , the affine nonexpanding space associated to g,
• and A=
g , the affine neutral space associated to g,
in the same way as the linear dynamical subspaces, but with V replaced everywhere
by A.
Remark 4.13.
<
• Note that if we defined in the same way A>
g (resp. Ag ), it would actually be
contained in V and so just be equal to Vg> (resp. Vg< ). Indeed an element of G ⋉ V
can never act on a vector in A\V (i.e. an element of A with a nonzero R0 component)
with an eigenvalue other than 1.
• Hence the decomposition (4.5) now becomes:
A≥
g
z }| {
>
<
A = Vg ⊕ A=
g ⊕ Vg
| {z }
A≤
g
(pay attention to the distribution of A’s and V ’s).
28
(4.6)
≥
≤
• From this identity, it immediately follows that neither A=
g , Ag nor Ag are contained
in V .
• Finally, it is obvious that the intersections of these three spaces with V are respectively Vg= , Vg≥ and Vg≤ . Thus this notation is consistent with the convention
outlined above.
In purely affine terms, these spaces may be understood as follows:
=
• A=
g ∩ VAff is the unique g-invariant affine space parallel to Vg (the "axis" of g);
=
≥
• A≥
g ∩ VAff is the unique affine space parallel to Vg and containing Ag ∩ VAff , and
≤
similarly for Ag ∩ VAff .
4.4 Description of dynamical spaces
We shall now characterize the dynamical subspaces of those elements of G ⋉ V that
satisfy the following property.
Definition 4.14. We say that an element g ∈ G ⋉ V is of type X0 if Jd(g) has the same
type as X0 , i.e. if
Jd(g) ∈ aρ,X0 .
Example 4.15.
1. For G = SO+ (p, q) acting on V = Rp+q (where p ≥ q), there is only one generic
type. For every g ∈ G, we have
dim Vg> = dim Vg< ≤ q.
(4.7)
An element g ∈ G is of generic type if and only if equality is attained. Such elements
have been called pseudohyperbolic in the previous literature ([AMS02, Smi14]).
2. If G is any semisimple real Lie group acting on V = g (its Lie algebra) by the
adjoint representation, there is only one generic type and an element g ∈ G is
of that type if and only if Jd(g) ∈ a++ . Such elements are called R-regular or
(particularly in [BQ]) loxodromic.
Here is a partial description of the dynamical spaces of an element of type X0 .
Proposition 4.16. Let g ∈ G ⋉ V be a map of type X0 . In that case:
(i) There exists a map φ ∈ G ⋉ V , called a canonizing map for g, such that
(
≥
φ(A≥
g ) = A0 ;
≤
φ(A≤
g ) = A0 .
<
(ii) The space Vg> is uniquely determined by A≥
g . The space Vg is uniquely determined
≤
by Ag .
29
(Compare this with Claim 2.5 in [Smi16].)
Proof.
(i)
• We start with the obvious decomposition
g = τv ℓ(g),
(4.8)
where ℓ(g) ∈ G is the linear part of g (seen as an element of G ⋉ V by
identifying G with the stabilizer of the origin R0 ) and v ∈ V is its translation
part. We then observe that we may rewrite this as
g = τv′ τw−1 ℓ(g)τw
(4.9)
for some w ∈ V , where v ′ is now actually an element of Vg= . Indeed, for any
translation vector v ∈ V and linear map f ∈ G, we have
f τv = τf (v) f.
(4.10)
The statement then follows from the fact that the map induced by ℓ(g) − Id
on Vg> ⊕ Vg< does not have 0 as an eigenvalue, hence is surjective. (In fact, this
argument shows that we could even require v ′ to lie in the actual characteristic
space corresponding to the eigenvalue 1.)
• Now let ℓ(g) =: gh ge gu be the Jordan decomposition of ℓ(g), so that
τw gτw−1 = τv′ gh ge gu ;
(4.11)
let φℓ ∈ G be any map that realizes the conjugacy φℓ gh φ−1
ℓ = exp(Jd(g)); and
let φ := φℓ τw .
Calling g′ := φgφ−1 and τv′′ , ge′ , gu′ the respective conjugates of τv′ , ge , gu
by φℓ (so that v ′′ = φℓ (v ′ )), we then have
g′ = τv′′ exp(Jd(g))ge′ gu′ ,
(4.12)
where ge′ ∈ G is elliptic, gu′ ∈ G is unipotent, both commute with exp(Jd(g)),
and v ′′ ∈ Vg=′ .
As already seen in the proof of Proposition 2.6, ge′ and gu′ have all eigenvalues
of modulus 1 and commute with exp(Jd(g)). Hence the linear dynamical
spaces of g′ coincide with those of exp(Jd(g)).
=
Now since exp(Jd(g)) ∈ G fixes R0 , the space A=
exp(Jd(g)) is just Vexp(Jd(g)) ⊕R0 ;
and since v ′′ ∈ Vg=′ , that space is still invariant by g ′ . It follows that we have
=
=
A=
g ′ = Aexp(Jd(g)) = Vexp(Jd(g)) ⊕ R0 .
(4.13)
By taking the direct sum with V > and with V < , we deduce that all the affine
dynamical spaces of g′ coincide with those of exp(Jd(g)).
30
Now since g is of type X0 , by definition, Jd(g) is a vector in a that has the
same type as X0 . Hence the affine dynamical subspaces of exp(Jd(g)) coincide
with those of exp(X0 ), which are the reference subspaces. We conclude that
(
≥
A≥
g ′ = A0 ;
≤
A≤
g ′ = A0 .
≥
≤
Since obviously A≥
g ′ = φ(Ag ) and similarly for A , the conclusion follows.
≥
>
>
(ii) Suppose that g is a map of type X0 such that A≥
g = A0 ; let us show that Vg = V0 .
≥
′
−1
Define g = φgφ as in the previous point; then φ stabilizes A0 . On the other
hand, we have Vg> = φ−1 (Vg>′ ); but from the previous point, it follows also that
Vg>′ = V0> .
Clearly the linear part of φ stabilizes V0≥ . It follows from Proposition 4.4 that it
also stabilizes V0> . Since the latter space is contained in V , the translation part
of φ acts trivially on it. We conclude that Vg> = V0> as required.
≥
Now if we have two maps g and g ′ of type X0 such that A≥
g = Ag ′ , by conjugating,
it follows that we also have Vg> = Vg>′ . The same proof works for A≤ and V < .
This immediately allows us to describe the remaining dynamical spaces of g:
Corollary 4.17. Let g ∈ G ⋉ V be a map of type X0 . Then if φ ∈ G ⋉ V is any
canonizing map of g, we have:
≥
φ(A≥
g ) = A0
φ(Vg≥ ) = V0≥
φ(Vg> ) = V0>
≤
φ(A≤
g ) = A0
φ(Vg≤ ) = V0≤
φ(Vg< ) = V0<
=
φ(A=
g ) = A0
φ(Vg= ) = V0= .
In other terms, if φ is a canonizing map of g then all eight dynamical spaces of the
conjugate φgφ−1 coincide with the reference dynamical spaces. This explains why we
called them "reference" spaces.
Proof. The equalities for A≥ and A≤ hold by definition of a canonizing map. The equality
for A= follows by taking the intersection. The equalities for V ≥ , V ≤ and V = follow by
taking the linear part. The equalities for V > and V < follow from Proposition 4.16 (ii).
4.5 Quasi-translations
Let us now investigate the action of a map g ∈ G ⋉ V of type X0 on its affine neutral
space A=
g . The goal of this subsection is to prove that it is "almost" a translation
(Proposition 4.20).
We fix on V a Euclidean form B satisfying the conditions of Lemma 2.4 for the representation ρ.
Definition 4.18. We call quasi-translation any affine automorphism of A=
0 induced by
an element of L ⋉ V0= .
31
Let us explain and justify this terminology. First note that the action of L on V0=
preserves B: indeed, the action of M does so because M ⊂ K, and the action of A on
this space is just trivial. The following statement is then immediate:
Proposition 4.19. Let V0t be the set of fixed points of L in V0= :
V0t := {v ∈ V0= | ∀l ∈ L, lv = v} .
(Note that this is also the set of fixed points of M ). Let V0r be the B-orthogonal complement of V0t in V0= , and let O(V0r ) denote the set of B-preserving automorphisms of V0r .
Then any quasi-translation is an element of
O(V0r ) ⋉ V0r × V0t .
In other words, quasi-translations are affine isometries of V0= that preserve the directions of V0r and V0t and act only by translation on the V0t component. You may think of a
quasi-translation as a kind of "screw displacement"; the superscripts t and r respectively
stand for "translation" and "rotation".
We now claim that any map of type X0 acts on its affine neutral space by quasitranslations:
Proposition 4.20. Let g ∈ G ⋉ V be a map of type X0 , and let φ ∈ G ⋉ V be any
canonizing map for g. Then the restriction of the conjugate φgφ−1 to A=
0 is a quasitranslation.
Let us actually formulate an even more general result, which will have another application in the next subsection:
≤
=
Lemma 4.21. Any map f ∈ G ⋉ V stabilizing both A≥
0 and A0 acts on A0 by quasitranslation.
Proof.
−
=
• We begin by showing that any element of lX0 = p+
X0 ∩ pX0 acts on V0 in the same
way as some element of l. Recall that by definition
M
lX0 = l ⊕
gα ;
α(X0 )=0
hence it is sufficient to show that for every restricted root α such that α(X0 ) = 0,
we have gα · V0= = 0. Indeed, since V0= = V 0 (because X0 is generic), we have
gα · V0= ⊂ V α .
On the other hand, we know by Proposition 4.4 that for such α, the action of gα
stabilizes both V0≥ and V0≤ ; it follows that the image gα · V0= lies in both of these
spaces, hence in their intersection V0= , which is also V 0 . Since α is nonzero, we
have V 0 ∩ V α = 0, which yields the desired equality.
32
• Let PX+0 ,e and PX−0 ,e denote the identity components of PX+0 and PX−0 respectively;
by integrating the previous statement, it follows that any element of PX+0 ,e ∩ PX−0 ,e
acts on V0= in the same way as some element of L.
• Now it follows from [Kna96] Proposition 7.82 (d) (using 7.83 (e)) that
LX0 = PX+0 ∩ PX−0 ⊂ M (PX+0 ,e ∩ PX−0 ,e ).
(4.14)
(Here we are using the assumption that G is connected.) We deduce that any
element of LX0 acts on V0= in the same way as some element of L.
≤
• Finally, any f ∈ G ⋉ V stabilizing both A≥
0 and A0 has linear part stabilizing both
≥
≤
V0 and V0 (hence lying in LX0 , by Proposition 4.4), and translation part contained
both in V0≥ and in V0≤ (in other words, in V0= ). The conclusion follows.
Proof of Proposition 4.20. The Proposition follows immediately by taking f = φgφ−1 .
≤
Indeed, by definition the "canonized" map φgφ−1 has A≥
0 and A0 as dynamical spaces;
in particular it stabilizes them.
Example 4.22.
1. For G = SO+ (p, q) acting on V = Rp+q (with p ≥ q), we have:
• M ≃ SOp−q (R),
• V0= = V 0 ≃ Rp−q ,
and the action of M on V0= is the obvious one. We may then distinguish two cases:
a. If p − q ≥ 2, then the action of M is transitive. The space V0t is trivial
and V0r = V0= . Any affine isometry of V0= may be a quasi-translation.
b. If p − q = 1, then the group M is trivial. We have on the contrary V0t = V0=
and V0r is trivial. A quasi-translation is just a translation.
(We exclude the case p = q because in that case V 0 = 0, which violates Assumption 3.2.)
2. More generally if G is split, then we have m = 0. The group M is in general a
nontrivial finite group; however, it can be shown that we still always have V0t = V0= ,
and a quasi-translation is still just a translation.
3. If G is any semisimple real Lie group acting on V = g (its Lie algebra) by the
adjoint representation, then:
0
• g=
0 = g = l;
• gt0 is the direct sum of a and of the center of m;
• gr0 is the semisimple part of m (in other terms, its derived subalgebra).
The example of G = SO+ (4, 1) (acting on so(4, 1), not on R5 ) shows that V0t and V0r
can both be nontrivial at the same time.
33
We would like to treat quasi-translations a bit like translations; for this, we need to
have at least a nontrivial space V0t . So from now on, we exclude cases like 1.a. above:
Assumption 4.23. The representation ρ is such that
dim V0t > 0.
This is precisely condition (i)(a) from the Main Theorem.
4.6 Canonical identifications and the Margulis invariant
The main goal of this subsection is to associate to every map g ∈ G ⋉ V of type X0 a
vector in V0t , called its "Margulis invariant" (see Definition 4.30). The two Propositions
and the Lemma that lead up to this definition are important as well, and will be often
used subsequently.
Corollary 4.17 has shown us that the "geometry" of any map g of type X0 (namely
the position of its dynamical spaces) is entirely determined by the pair of spaces
≥
≤
≤
(A≥
g , Ag ) = φ(A0 , A0 ).
In fact, such pairs of spaces play a crucial role. Let us begin with a definition; its
connection with the observation we just made will become clear after Proposition 4.26.
Definition 4.24.
• We define a parabolic space to be any subspace of V that is the image of either V0≥
or V0≤ (no matter which one, since X is symmetric) by some element of G.
• We define an affine parabolic space to be any subspace of A that is the image of A≥
0
by some element of G ⋉ V . Equivalently, a subspace A≥ ⊂ A is an affine parabolic
space iff it is not contained in V and its linear part V ≥ = A≥ ∩ V is a parabolic
space.
• We say that two parabolic spaces (or two affine parabolic spaces) are transverse if
their intersection has the lowest possible dimension.
Example 4.25.
1. For G = SO+ (p, q) acting on V = Rp+q (where p ≥ q), a subspace F ⊂ Rp+q
is a parabolic space if and only if F ⊥ is a maximal totally isotropic subspace.
Equivalently, F is a parabolic space if and only if F contains F ⊥ and is minimal
for that property (namely p-dimensional). Pairs of transverse parabolic spaces were
called frames in [Smi14].
2. If G is any semisimple real Lie group acting on V = g (its Lie algebra) by the
adjoint representation, a parabolic space is just an arbitrary minimal parabolic
subalgebra of g (hence the name "parabolic space").
34
Proposition 4.26. A pair of parabolic spaces (resp. of affine parabolic spaces) is trans≤
verse if and only if it may be sent to (V0≥ , V0≤ ) (resp. to (A≥
0 , A0 )) by some element of G
(resp. of G ⋉ V ).
In particular, it follows from Proposition 4.16 that for any map g ∈ G ⋉ V of type X0 ,
≤
the pair (A≥
0 , A0 ) is a transverse pair of affine parabolic spaces.
This Proposition, as well as its proof, is very similar to Claim 2.8 in [Smi16].
Proof. Let us prove the linear version; the affine version follows immediately. Let (V1 , V2 )
be any pair of parabolic spaces. By definition, for i = 1, 2, we may write Vi = φi (V0≥ ) for
some φi ∈ G. Let us apply the Bruhat decomposition to the map φ−1
1 φ2 : we may write
φ−1
1 φ2 = p1 wp2 ,
(4.15)
where p1 , p2 belong to the minimal parabolic subgroup P + , and w is an element of the
restricted Weyl group W (or, technically, some representative thereof). Let φ := φ1 p1 =
−1
+ stabilizes V ≥ , we have
φ2 p−1
2 w ; since P
0
V1 = φ(V0≥ ) and V2 = φ(wV0≥ ).
(4.16)
Thus V1 and V2 are transverse if and only if wV0≥ is transverse to V0≥ , which happens if
and only the sum of the multiplicities of restricted weights contained in the intersection
≥
Ω≥
X0 ∩ wΩX0
is the smallest possible.
Clearly, this intersection always contains {0}. Since by assumption X0 is generic and
≤
symmetric, we deduce that if we have wΩ≥
X0 = ΩX0 , and only in that case, it is equal
to {0}. Since X0 is symmetric, that case is realized when w = w0 . Then we have
V1 = φ(V0≥ ) and V2 = φ(V0≤ ) as required.
Remark 4.27.
• It follows from Proposition 4.4 that the set of all parabolic spaces can be identified
with the flag variety G/PX+0 , by identifying every parabolic space φ(V0≥ ) with the
coset φPX+0 .
• Using the Bruhat decomposition of PX0 (see (4.4)), we may show that two parabolic
spaces V1 = φ1 (V0≥ ) and V2 = φ2 (V0≥ ) = φ2 ◦ w0 (V0≤ ) are transverse if and only if
the corresponding pair of cosets
(φ1 PX+0 , φ2 w0 PX−0 )
is in the open G-orbit of G/PX+0 × G/PX−0 .
Consider a transverse pair of affine parabolic spaces. Their intersection may be seen as
a sort of "abstract affine neutral space". We now introduce a family of "canonical identifications" between those spaces. Unfortunately, these identifications have an inherent
ambiguity: they are only defined up to quasi-translation.
35
Proposition 4.28. Let (A1 , A2 ) be a pair of transverse affine parabolic spaces. Then any
≤
map φ ∈ G ⋉ V such that φ(A1 , A2 ) = (A≥
0 , A0 ) gives, by restriction, an identification of
the intersection A1 ∩ A2 with A=
0 , which is unique up to quasi-translation.
Here by φ(A1 , A2 ) we mean the pair (φ(A1 ), φ(A2 )). Note that if A1 ∩A2 is obtained in
another way as an intersection of two affine parabolic spaces, the identification with A=
0
will, in general, no longer be the same, not even up to quasi-translation: there could also
be an element of the Weyl group involved.
Compare this with Corollary 2.14 in [Smi16].
Proof. The existence of such a map φ follows from Proposition 4.26. Now let φ and φ′
be two such maps, and let f be the map such that
φ′ = f ◦ φ
(4.17)
≤
(i.e. f := φ′ ◦ φ−1 ). Then by construction f stabilizes both A≥
0 and A0 . It follows from
=
Lemma 4.21 that the restriction of f to A0 is a quasi-translation.
Let us now explain why we call these identifications "canonical". The following lemma,
while seemingly technical, is actually crucial: it tells us that the identifications defined in
Proposition 4.28 commute (up to quasi-translation) with the projections that naturally
arise if we change one of the parabolic subspaces in the pair while fixing the other.
Lemma 4.29. Take any affine parabolic space A1 .
Let A2 and A′2 be any two affine parabolic spaces both transverse to A1 .
Let φ (resp. φ′ ) be an element of G ⋉ V that sends the pair (A1 , A2 ) (resp. (A1 , A′2 ))
≤
to (A≥
0 , A0 ); these two maps exist by Proposition 4.26.
Let W1 be image of V0> by any map φ such that A1 = φ(A≥
0 ) (which is unique by
Proposition 4.4).
Let
ψ : A1 −−−−→ A1 ∩ A′2
be the projection parallel to W1 .
Then the map ψ defined by the commutative diagram
A=
0
ψ
φ′
φ
A1 ∩ A2
A=
0
ψ
A1 ∩ A′2
is a quasi-translation.
The space W1 is, in a sense, the "abstract linear expanding space" corresponding to
the "abstract affine noncontracting space" A1 : more precisely, for any map g ∈ G ⋉ V
>
of type X0 such that A≥
g = A1 , we have Vg = W1 (by Proposition 4.16 (ii)).
36
≥
≤
>
>
=
The projection ψ is well-defined because A≥
0 = V0 ⊕ V0 = V0 ⊕ (A0 ∩ A0 ), and so
≥
A1 = φ′−1 (A0 ) = W1 ⊕ (A1 ∩ A′2 ).
This statement generalizes Lemma 2.18 in [Smi16]. The proof is similar, but care must
be taken to replace minimal parabolics by parabolics of type X0 .
Proof. Without loss of generality, we may assume that φ = Id (otherwise we simply
replace the three affine parabolic spaces by their images under φ−1 .) Then we have
≤
′−1 (A≤ ), where φ′ can be any map stabilizing the
′
A1 = A≥
0
0 , A2 = A0 and A2 = φ
≥
space A0 . We want to show that the map φ′ ◦ ψ is a quasi-translation.
We know that φ′ lies in the stabilizer StabG⋉V (A≥
0 ); by Proposition 4.4, the latter is
equal to PX+0 ⋉ V0≥ . We now introduce the algebra
n+
X0 :=
M
gα
(4.18)
α(X0 )>0
+
:= exp n+
and the group NX
X0 . We then have the Langlands decomposition
0
+
PX+0 = LX0 NX
0
(4.19)
(see e.g. [Kna96], Proposition 7.83). Since LX0 stabilizes V0> , this generalizes to the
"affine Langlands decomposition"
+
⋉ V0> ).
PX+0 ⋉ V0≥ = (LX0 ⋉ V0= )(NX
0
(4.20)
+
⋉ V0> .
Thus we may write φ′ = l ◦ n with l ∈ LX0 ⋉ V0= and n ∈ NX
0
+
⋉ V0> stabilizes the
We shall use the following fact: every element n of the group NX
0
≥
>
>
space V0 and induces the identity map on the quotient space A0 /V0 . Indeed, when the
+
+
element n lies in the "linear" group NX
, since NX
is connected, this follows from the
0
0
≥
+
>
+
fact that nX0 · V0 ⊂ V0 (which, in turn, is true because n+
X0 ⊂ n ). When n is a pure
translation by a vector of V0> , this is obvious.
>
By definition, ψ also stabilizes V0> and induces the identity on A≥
0 /V0 ; hence so does
the map n ◦ ψ. But we also know that n ◦ ψ is defined on A1 ∩ A2 = A=
0 , and sends it
onto
=
n ◦ ψ(A1 ∩ A2 ) = n(A1 ∩ A′2 ) = l−1 (A=
0 ) = A0 .
′
Hence the map n ◦ ψ is the identity on A=
0 . It follows that ψ = φ ◦ ψ = l ◦ n ◦ ψ = l (in
restriction to A=
0 ); by Lemma 4.21, ψ is a quasi-translation as required.
Now let g be a map of type X0 . We already know that it acts on its neutral affine space
by quasi-translation; now the canonical identifications we have just introduced allow us
to compare the actions of different elements on their respective neutral affine spaces, as
if they were both acting on the same space A=
0 . However there is a catch: since the
identifications are only canonical up to quasi-translation, we lose information about the
rotation part; only the translation part along V0t remains.
Formally, we make the following definition. Let πt denote the projection from V0=
onto V0t parallel to V0r .
37
Definition 4.30. Let g ∈ G ⋉ V be a map of type X0 . Take any point x in the affine
≥
≤
≥
≤
space A=
g ∩ VAff and any map φ ∈ G such that φ(Vg , Vg ) = (V0 , V0 ). Then we define
the Margulis invariant of g to be the vector
M (g) := πt (φ(g(x) − x)) ∈ V0t .
We call it the Margulis invariant of g.
This vector does not depend on the choice of x or φ: indeed, composing φ with a
quasi-translation does not change the V0t -component of the image. See Proposition 2.16
in [Smi16] for a detailed proof of this claim (for V = g).
5 Quantitative properties
In this section, we define and study two important quantitative properties of maps of
type X0 :
• C-non-degeneracy, which means that the geometry of the map is not too close to
a degenerate case;
• and contraction strength, which measures the extent to which the map g is "much
more contracting" on its contracting space than on its affine nonexpanding space.
In Subsection 5.1, we define these and several other quantitative properties. Several
definitions coincide with those from Section 2.6 in [Smi16] or generalize them.
In the very short Subsection 5.2 (which is a straightforward generalization of Section 2.7
from [Smi16]), we compare these properties for an affine map and its linear part.
In Subsection 5.3, we define analogous quantitative properties for proximal maps, and
relate properties of a product of a (sufficiently contracting and nondegenerate) pair of
proximal maps to the properties of the factors. This is almost the same thing as Section 3.1 in [Smi16], but with one additional result.
5.1 Definitions
We endow the extended affine space A with a Euclidean norm (written simply k • k)
whose restriction to V coincides with the norm B defined in Lemma 2.4 and that makes
R0 orthogonal to V . Then the subspaces V0> , V0< , V0r , V0t and R0 are pairwise orthogonal,
and the restriction of this norm to V0r is invariant by quasi-translations. For any linear
map g acting on A, we write kgk := supx6=0 kg(x)k
kxk its operator norm.
Consider a Euclidean space E (for the moment, the reader may suppose that E = A;
later we will also need the case E = Λp A for some integer p). We introduce on the
projective space P(E) a metric by setting, for every x, y ∈ P(E),
α(x, y) := arccos
|hx, yi|
∈ [0, π2 ],
kxkkyk
38
(5.1)
where x and y are any vectors representing respectively x and y (obviously, the value
does not depend on the choice of x and y). This measures the angle between the lines x
and y. For shortness’ sake, we will usually simply write α(x, y) with x and y some actual
vectors in E \ {0}.
For any vector subspace F ⊂ E and any radius ε > 0, we shall denote the εneighborhood of F in P(E) by:
BP (F, ε) := {x ∈ P(E) | α(x, P(F )) < ε} .
(5.2)
(You may think of it as a kind of "conical neighborhood".)
Consider a metric space (M, δ); let X and Y be two subsets of M. We shall denote
the ordinary, minimum distance between X and Y by
(5.3)
δ(X, Y ) := inf inf δ(x, y),
x∈X y∈Y
as opposed to the Hausdorff distance, which we shall denote by
δHaus (X, Y ) := max
sup δ {x}, Y , sup δ {y}, X
x∈X
y∈Y
!
.
(5.4)
Finally, we introduce the following notation. Let X and Y be two positive quantities,
and p1 , . . . , pk some parameters. Whenever we write
X .p1 ,...,pk Y,
we mean that there is a constant K, depending on nothing but p1 , . . . , pk , such that
X ≤ KY . (If we do not write any subscripts, this means of course that K is an "absolute"
constant — or at least, that it does not depend on any "local" parameters; we consider
the "global" parameters such as the choice of G and of the Euclidean norms to be fixed
once and for all.) Whenever we write
X ≍p1 ,...,pk Y,
we mean that X .p1 ,...,pk Y and Y .p1 ,...,pk X at the same time.
Definition 5.1. Take a pair of affine parabolic spaces (A1 , A2 ). An optimal canonizing
map for this pair is a map φ ∈ G ⋉ V satisfying
≤
φ(A1 , A2 ) = (A≥
0 , A0 )
and minimizing the quantity max kφk, kφ−1 k . By Proposition 4.26 and a compactness
argument, such a map exists iff A1 and A2 are transverse.
We define an optimal canonizing map for a map g ∈ G ⋉ V of type X0 to be an optimal
≤
canonizing map for the pair (A≥
g , Ag ).
Let C ≥ 1. We say that a pair of affine parabolic spaces (A1 , A2 ) (resp. a map g of
type X0 ) is C-non-degenerate if it has an optimal canonizing map φ such that
kφk ≤ C
and
φ−1 ≤ C.
Now take g1 , g2 two maps of type X0 in G ⋉ V . We say that the pair (g1 , g2 ) is
≤
C-non-degenerate if every one of the four possible pairs (A≥
gi , Agj ) is C-non-degenerate.
39
The point of this definition is that there are a lot of calculations in which, when we
treat a C-non-degenerate pair of spaces as if they were perpendicular, we err by no more
than a (multiplicative) constant depending on C. The following result will often be
useful:
Lemma 5.2. Let C ≥ 1. Then any map φ ∈ GL(E) such that kφ±1 k ≤ C induces a
C 2 -Lipschitz continuous map on P(E).
This is exactly Lemma 2.20 from [Smi16].
Remark 5.3. The set of transverse pairs of extended affine spaces is characterized by two
open conditions: there is of course transversality of the spaces, but also the requirement
that each space not be contained in V . What we mean here by "degeneracy" is failure of
one of these two conditions. Thus the property of a pair (A1 , A2 ) being C-non-degenerate
actually encompasses two properties.
First, it implies that the spaces A1 and A2 are transversal in a quantitative way. More
precisely, this means that some continuous function that would vanish if the spaces were
not transversal is bounded below. An example of such a function is the smallest non
identically vanishing of the "principal angles" defined in the proof of Lemma 7.2 (iv).
Second, it implies that both A1 and A2 are "not too close" to the space V (in the same
sense). In purely affine terms, this means that the affine spaces A1 ∩ VAff and A2 ∩ VAff
contain points that are not too far from the origin.
Both conditions are necessary, and appeared in the previous literature (such as [Mar87]
and [AMS02]). However, they were initially treated separately. The idea of encompassing
both in the same concept of "C-non-degeneracy" seems to have been first introduced in
the author’s previous paper [Smi16].
Definition 5.4. Let g ∈ GL(E), let n = dim E, and let p be an integer such that
1 ≤ p < n. Let λ1 , . . . , λn be the eigenvalues of g ordered by nondecreasing modulus.
Then we define the p-th spectral gap of g to be the quotient
κp (g) :=
|λp+1 |
.
|λp |
(5.5)
Note that we chose the convention where the gap is a number smaller or equal than 1.
When E = A, we will most often use the p-th spectral gap for p = dim A≥
0 . In this
case we will omit the index:
κ(g) := κdimA≥ (g).
(5.6)
0
Also, we denote the spectral radius of g, i.e. the largest modulus of any eigenvalue, by:
r(g) := |λ1 |.
(5.7)
(The usual notation, ρ(g), is already taken to mean "g in the representation ρ".)
Definition 5.5. Let s > 0. For a map g ∈ G⋉V of type X0 , we say that g is s-contracting
if we have:
kg(y)k
kg(x)k
≤s
.
(5.8)
∀(x, y) ∈ Vg< × A≥
g,
kxk
kyk
40
(Note that by Corollary 4.17 the spaces Vg< and A≥
g always have the same dimensions as
≥
<
V0 and A0 respectively, hence they are nonzero.)
We define the strength of contraction of g to be the smallest number s(g) such that g
is s(g)-contracting. In other words, we have
s(g) = g|Vg<
g−1
A≥
g
.
(5.9)
Remark 5.6. This strength of contraction s(g) is defined as a kind of "mixed gap": it
measures the gap between singular values of the restrictions of g to some sums of its
eigenspaces. It turns out that this definition is the most convenient for our purposes.
However, if the map g from the above definition is C-non-degenerate, then we may
pretend that s(g) is a "purely singular" gap, as long as we do not care about multiplicative
constants. Indeed, let g′ = φgφ−1 , where φ is an optimal canonizing map for g; then it
is easy to see that we have
s(g) ≍C s(g′ ).
(5.10)
≥
On the other hand, since Vg<′ = V0< and A≥
g ′ = A0 are orthogonal (by convention), every
′
singular value of g is either a singular value of g′ |V < or of g′ |A≥ . It follows that s(g′ ) is
0
0
the quotient between two actual singular values of g ′ , and two consecutive singular values
if s(g) is small enough. See the proof of Lemma 5.1 (iii) for a more detailed discussion.
Remark 5.7. The spectral gap and contraction strength are somewhat related. Take
some affine map g ∈ G ⋉ V of type X0 ; then since the norm of any linear map is at least
equal to its spectral radius, we obviously have
s(g) ≥ κ(g).
(5.11)
On the other hand, for any map g ∈ G ⋉ V , we have
log s(gN ) = N log κ(g) + O (log N ).
N →∞
(5.12)
If g is of type X0 , then κ(g) < 1, so that
s(gN ) → 0.
N →∞
(5.13)
5.2 Affine and linear case
For any map f ∈ G ⋉ V , we denote by ℓ(f ) the linear part of f , seen as an element
of G ⋉ V by identifying G with the stabilizer of the "origin" R0 . In other words, for
every vector (x, t) ∈ V ⊕ R0 = A, we set
ℓ(f )(x, t) = f (x, 0) + (0, t).
(5.14)
(Seeing G as a subgroup of G ⋉ V allows us to avoid introducing new definitions of
C-non-degeneracy and contraction strength for elements of G.)
41
Lemma 5.8. Let C ≥ 1, and take any C-non-degenerate map g (or pair of maps (g, h))
of type X0 in G ⋉ V . Then:
(i) The map ℓ(g) (resp. the pair (ℓ(g), ℓ(h))) is still C-non-degenerate;
(ii) We have s(ℓ(g)) ≤ s(g);
.
(iii) Suppose that s(g−1 ) ≤ 1. Then we actually have s(g) ≍C s(ℓ(g)) g|A=
g
Proof. The proof is exactly the same as the proof of Lemma 2.25 in [Smi16], mutatis
mutandis.
5.3 Proximal maps
Let E be a Euclidean space. The goal of this section is to show Proposition 5.12. We
begin with a few definitions.
Definition 5.9. Let γ ∈ GL(E); let λ1 , . . . , λn be its eigenvalues repeated according to
multiplicity and ordered by nonincreasing modulus. We define the proximal spectral gap
of γ as its first spectral gap:
|λ2 |
κ̃(γ) := κ1 (γ) =
.
|λ1 |
We say that γ is proximal if κ̃(γ) < 1. We may then decompose E into a direct sum of a
line Eγs , called its attracting space, and a hyperplane Eγu , called its repelling space, both
stable by γ and such that:
(
γ|Eγs = λ1 Id;
for every eigenvalue λ of γ|Eγu , |λ| < |λ1 |.
Definition 5.10. Consider a line E s and a hyperplane E u of E, transverse to each other.
An optimal canonizing map for the pair (E s , E u ) is a map φ ∈ GL(E) satisfying
φ(E s ) ⊥ φ(E u )
and minimizing the quantity max kφk, kφ−1 k .
We define an optimal canonizing map for a proximal map γ ∈ GL(E) to be an optimal
canonizing map for the pair (Eγs , Eγu ).
Let C ≥ 1. We say that the pair formed by a line and a hyperplane (E s , E u ) (resp.
that a proximal map γ) is C-non-degenerate if it has an optimal canonizing map φ such
that φ±1 ≤ C.
Now take γ1 , γ2 two proximal maps in GL(E). We say that the pair (γ1 , γ2 ) is C-nondegenerate if every one of the four possible pairs (Eγsi , Eγuj ) is C-non-degenerate.
Definition 5.11. Let γ ∈ GL(E) be a proximal map. We define the proximal strength
of contraction of γ by
γ|Eγu
γ|Eγu
=
s̃(γ) :=
r(γ)
γ|Eγs
42
(where r(γ) is the spectral radius of γ, equal to |λ1 | in the notations of the previous
definition). We say that γ is s̃-contracting if s̃(γ) ≤ s̃.
Note that these definitions are different from the ones we used in the context of maps
of type X0 (hence the new notations s̃ and κ̃).
Proposition 5.12. For every C ≥ 1, there is a positive constant s̃5.12 (C) with the
following property. Take a C-non-degenerate pair of proximal maps γ1 , γ2 in GL(E), and
suppose that both γ1 and γ2 are s̃5.12 (C)-contracting. Then γ1 γ2 is proximal, and we
have:
(i) α Eγs1 γ2 , Eγs1 .C s̃(γ1 );
(ii) s̃(γ1 γ2 ) .C s̃(γ1 )s̃(γ2 ).
(iii) r(γ1 γ2 ) ≍C kγ1 kkγ2 k.
(The constant s̃5.12 (C) is indexed by the number of the proposition, a scheme that
we will stick to throughout the paper.)
Similar results have appeared in the literature for a long time, see e.g. Lemma 5.7
in [AMS02] or Proposition 6.4 in [Ben96].
Proof. The first two points have already been proved in the author’s previous paper:
see Proposition 3.4 in [Smi16]. To prove (iii), we start with the following observation.
Let η = 2Cπ 2 ; then by Lemma 5.2 we have:
α(Eγs1 , Eγu2 ) ≥ η.
On the other hand, we have already seen in the proof of Proposition 3.4 in [Smi16] that
we have
Eγs1 γ2 ∈ B(Eγs1 , η3 ).
The triangular inequality immediately gives us
2η
α Eγs1 γ2 , Eγu2 ≥
.
3
(5.15)
Take any nonzero x ∈ Eγs1 γ2 . We are going to show the estimates
kγ2 (x)k
≍C kγ2 k;
kxk
(5.16a)
kγ1 (γ2 (x))k
≍C kγ1 k.
kγ2 (x)k
(5.16b)
Since by definition, we have γ1 (γ2 (x)) = λx for some λ ∈ C having modulus r(γ1 γ2 ), the
estimate (iii) follows by multiplying (5.16a) and (5.16b) together.
43
Let us first show (5.16a). Let φ be an optimal canonizing map for γ2 ; since γ2 is Cnon-degenerate, we lose no generality by replacing γ2 and x respectively by γ2′ := φγ2 φ−1
and x′ := φ(x). Obviously we have:
kγ2′ (x′ )k ≤ kγ2′ kkx′ k.
(5.17)
To show the other inequality, let us decompose
x′ =: x′s + x′u .
|{z} |{z}
(5.18)
kγ2′ (x′ )k ≥ kγ2′ (x′s )k − kγ2′ (x′u )k.
(5.19)
∈E s′
γ2
Then we have
∈E u′
γ2
For the first term, we have:
kγ2′ (x′s )k = r(γ2′ ) · kx′s k
= kγ2′ k · sin α φ(Eγs1 γ2 ), Eγu′ · kx′ k
2
s
u
α
E
,
E
γ1 γ2
γ2
≥ kγ2′ k · sin
· kx′ k
C2
1 2η
≥ kγ2′ k · sin 2
· kx′ k
C 3
by Lemma 5.2
by (5.15).
(5.20)
For the second term, we have:
kγ2′ (x′u )k ≤ γ2′
E u′
≤ γ2′
E u′
γ
2
kx′u k
kx′ k
γ
2
= kγ2′ k s̃(γ2′ ) kx′ k
≤ kγ2′ k C 2 s̃(γ2 ) kx′ k.
Plugging those two estimates into (5.19), we obtain
2η
2
′
′
′
− C s̃(γ2 ) kx′ k.
kγ2 (x )k ≥ kγ2 k sin
3C 2
We may assume that s̃(γ2 ) ≤
we conclude that
1 1
2 C2
(5.21)
(5.22)
2η
sin 3C
2 . Since by construction η depends only on C,
kγ2′ (x′ )k &C kγ2′ kkx′ k.
(5.23)
Putting together (5.17) and (5.23), we get (5.16a) as required.
Now to show (5.16b), simply notice that
γ2 (Eγs1 γ2 ) = Eγs2 γ1
(5.24)
(since γ2 γ1 is the conjugate of γ1 γ2 by γ2 ), so that γ2 (x) ∈ Eγs2 γ1 . Hence we may follow
the same reasoning as for (5.16a), simply exchanging the roles of γ1 and γ2 .
44
6 Additivity of Jordan projections
The goal of this section is to prove Proposition 6.14, which says that the product of two
sufficiently contracting maps of type X0 in general position is still of type X0 . As it is
a purely linear property, we forget about translation parts and work exclusively in the
linear group G for the duration of this section. We proceed in four stages.
We start with Proposition 6.1, which shows that if an element of G is of type X0
and strongly contracting in the default representation ρ, it is proximal and strongly
contracting in some of the fundamental representations ρi defined in Proposition 2.12.
We continue with Proposition 6.6, which relates C-non-degeneracy in V and C ′ -nondegeneracy in the spaces Vi .
We then prove Proposition 6.10 (and a reformulated version, Corollary 6.12), which
constrains the Jordan projection of gh in terms of the Cartan projections of g and h.
Finally, we use Corollary 6.12 to prove Proposition 6.14.
Proposition 6.1. For every C ≥ 1, there is a constant s6.1 (C) with the following
property. Let g ∈ G be a C-non-degenerate map of type X0 such that s(g) ≤ s6.1 (C).
Then for every i ∈ Π \ ΠX0 , the map ρi (g) is proximal and we have
s̃(ρi (g)) .C s(g).
Remark 6.2.
• Note that since all Euclidean norms on a finite-dimensional vector space are equivalent, this estimate makes sense even though we did not specify any norm on Vi .
In the course of the proof, we shall choose one that is convenient for us.
• Recall that "i ∈ Π \ ΠX0 " is a notation shortcut for "i such that αi ∈ Π \ ΠX0 ".
Remark 6.3. Note that we have excluded the indices i that lie in ΠX0 . The latter should
be thought of as a kind of "exceptional set"; indeed, recall (Remark 3.19) that it is often
empty.
To pave the way for proving the Proposition, let us prove a couple of lemmas that
relate the contraction strength of an element of G to its Cartan projection.
Lemma 6.4. Let g ∈ LX0 . Then the Cartan decomposition
g = k1 exp(Ct(g))k2
may be done in such a way that both k1 and k2 are in K ∩ LX0 .
Proof. By Proposition 7.82 (a) in [Kna96], LX0 is the centralizer of the intersection of
the kernels of simple roots in ΠX0 :
(6.1)
LX0 = ZG {X ∈ a | ∀α ∈ ΠX0 , α(X) = 0} .
By Proposition 7.25 in [Kna96], it follows:
45
• that LX0 is reductive;
• that K ∩ LX0 is a maximal compact subgroup in LX0 .
Obviously a ⊂ lX0 is a Cartan subspace of lX0 . Thus if we do a Cartan decomposition in
the group LX0 (see Theorem 7.39 in [Kna96]), it will also be a valid Cartan decomposition
in G.
Lemma 6.5. For every C ≥ 1, there is a constant ε6.5 (C) with the following property.
Let g ∈ G be a C-non-degenerate map of type X0 . Then we have
min λ(Ct(g)) − max
λ(Ct(g)) ≥ − log s(g) − ε6.5 (C).
<
λ∈Ω≥
X
λ∈ΩX
0
0
(Recall that Ω≥
X0 is the set of restricted weights that take nonnegative values on X0 ,
and Ω<
is
its
complement in Ω.)
X0
Note that the first term on the left-hand side is certainly nonpositive, as 0 ∈ Ω≥
X0 .
Proof. First of all let φ be an optimal canonizing map for g, and let g′ = φgφ−1 . Then
it is easy to see that we have
s(g′ ) ≍C s(g)
(we already mentioned this in Remark 5.6), and the difference Ct(g′ ) − Ct(g) is bounded
by a constant that depends only on C. Hence it is enough to show the corresponding
inequality for g′ instead of g and without the ε6.5 (C) error term. In fact, let us prove
that equality holds:
min λ(Ct(g′ )) − max
λ(Ct(g′ )) = − log s(g′ ).
<
λ∈Ω≥
X
λ∈ΩX
0
(6.2)
0
By construction we have Vg≥′ = V0≥ and Vg<′ = V0< . Obviously g ′ stabilizes these two
vector spaces, hence (using Proposition 4.4) we have
g ′ ∈ PX+0 ∩ PX−0 = LX0 .
(6.3)
By Lemma 6.4, we may then write
g′ = k1 exp(Ct(g′ ))k2
(6.4)
with k1 , k2 ∈ K ∩ LX0 . In particular both k1 and k2 stabilize both V0≥ and V0< . Hence
so does the Cartan projection Ct(g′ ), and we have
g′ |V ≥ = exp(Ct(g′ ))|V ≥ ;
0
0
(6.5)
(g′ )−1 < = exp(Ct(g′ ))−1 < .
V
V
0
0
46
Now we know that exp(Ct(g′ )) (seen in the default representation ρ) is self-adjoint (by
choice of the Euclidean structure B), hence its singular values coincide with its eigenvalues. (Moreover V0≥ and V0< are orthogonal.) As exp(Ct(g′ )) ∈ A, obviously it acts on
every restricted weight space V λ with the eigenvalue
exp(λ(Ct(g′ ))).
This implies (6.2) as desired.
Proof of Proposition 6.1. Let s6.1 (C) be a constant small enough to satisfy all the
constraints that will appear in the course of the proof. Let us fix i ∈ Π \ ΠX0 , and let
g ∈ G be a map satisfying the hypotheses. Let us prove the two estimates
κ̃(ρi (g)) = exp(αi (Jd(g)))−1 ≤ κ(g),
(6.6)
which will show that ρi (g) is proximal; and then the two estimates
s̃(ρi (g)) ≍C exp(αi (Ct(g)))−1 .C s(g),
(6.7)
whose combination completes the proof.
• Let us start with the right part of (6.6). Since i ∈ Π \ ΠX0 and since X0 is extreme,
sαi (X0 ) does not have the same type as X0 . Since X0 is generic, we may then find
a restricted weight λ of ρ such that
λ(X0 ) > 0
and
sαi (λ)(X0 ) < 0
(6.8)
(we already made this observation in (3.8)). Since λ is a restricted weight, by
Proposition 2.8, the number
hλ, αi i
(6.9)
nλ :=
2hαi , αi i
is an integer. We have, on the one hand:
nλ αi (X0 ) = (λ − sαi (λ)) (X0 ) > 0;
on the other hand, αi (X0 ) ≥ 0 (because X0 ∈ a+ ); hence nλ is positive.
By Proposition 2.11, every element of the sequence
λ, λ − αi , . . . , λ − nλ αi
is a restricted weight of ρ. There must then exist an integer iλ such that:
(
(λ − iλ αi ) (X0 ) ≥ 0;
(λ − (iλ + 1)αi ) (X0 ) < 0.
47
(6.10)
Now since g is of type X0 , by definition, any restricted weight of ρ has the same
sign when evaluated at Jd(g) or at X0 . Thus we also have
(
(λ − iλ αi ) (Jd(g)) ≥ 0;
(λ − (iλ + 1)αi ) (Jd(g)) < 0.
From Proposition 2.6, it then follows that
κ(g) ≥ exp(αi (Jd(g)))−1
as desired.
• Similarly we may establish the right part of (6.7). By considering once again a
restricted weight λ and an integer iλ satisfying (6.10), it follows from Lemma 6.5
that
αi (Ct(g)) ≥ − log s(g) − ε6.5 (C).
By taking the opposite on both sides and exponentiating, the desired estimate
follows immediately.
• Let us now prove the left part of (6.6). By Proposition 2.6 (i), the list of the moduli
of the eigenvalues of ρi (g) is precisely
j
eλi (Jd(g))
,
1≤j≤di
where di is the dimension of Vi and (λji )1≤j≤di is the list of restricted weights of ρi
listed with multiplicity.
Up to reordering that list, we may suppose that λ1i = ni ̟i is the highest restricted
weight of ρi . We may also suppose that λ2i = ni ̟i − αi . Indeed we have
sαi (ni ̟i ) = sα′i (ni ̟i )
= ni ̟i − 2ni
h̟i , α′i i ′
α
hα′i , α′i i i
= ni ̟i − 2ni α′i
(6.11)
(recall that α′i is equal to 2αi if 2αi is a restricted root and to αi otherwise). But
by Proposition 2.11, sαi (ni ̟i ) is a restricted weight of ρi (because it is the image
of a restricted weight of ρi by an element of the Weyl group) and then ni ̟i − αi
is also a restricted weight of ρi (as a convex combination of two restricted weights
of ρi , that belongs to the restricted root lattice shifted by ni ̟i ).
Take any j > 2. Since by hypothesis, the restricted weight ni ̟i has multiplicity 1,
we have λji 6= λ1i . By Lemma 2.13, it follows that this restricted weight has the
form
48
λji = ni ̟i − αi −
r
X
ci′ αi′ ,
i′ =1
with ci′ ≥ 0 for every index i′ .
Finally, since by definition Jd(g) ∈ a+ , for every index i′ we have αi′ (Jd(g)) ≥ 0.
It follows that for every j > 2, we have
λ1i (Jd(g)) ≥ λ2i (Jd(g)) ≥ λji (Jd(g)).
(6.12)
In other words, among the moduli of the eigenvalues of ρi (g), the largest is
exp(λ1i (Jd(g))) = exp(ni ̟i (Jd(g))),
and the second largest is
exp(λ2i (Jd(g))) = exp(ni ̟i (Jd(g)) − αi (Jd(g))).
It follows that
κ̃(ρi (g)) = exp(αi (Jd(g)))−1
as desired.
• Let us finish with the left part of (6.7). We start with the following observation:
for every C ≥ 1, the set
φ ∈ G kφk ≤ C, kφ−1 k ≤ C
(6.13)
is compact. It follows that the continuous map
φ 7→ max ρi (φ) , ρi (φ−1 )
(6.14)
is bounded on that set, by some constant Ci′ that depends only on C (and on the
choice of a norm on Vi , to be made soon). Let φ be the optimal canonizing map
of g, and let g ′ = φgφ−1 ; then we get
s̃(ρi (g)) ≍C s̃(ρi (g′ )).
(6.15)
Now let us choose, on the space Vi where the representation ρi acts, a K-invariant
Euclidean form Bi such that all the restricted weight spaces for ρi are pairwise
Bi -orthogonal (this is possible by Lemma 2.4 applied to ρi ). Then s̃(ρi (g′ )) is simply
the quotient of the two largest singular values of ρi (g ′ ). By Proposition 2.6 (ii)
(giving the singular values of an element of G in a given representation) and by a
calculation analogous to the previous point, we have
s̃(ρi (g′ )) = exp(αi (Ct(g)))−1 .
The desired estimate follows by combining (6.15) with (6.16).
49
(6.16)
Proposition 6.6. Let (g1 , g2 ) be a C-non-degenerate pair of elements of G of type X0 .
Then for every i ∈ Π \ ΠX0 , the pair (ρi (g1 ), ρi (g2 )) is a Ci′ -non-degenerate pair of
proximal maps in GL(Vi ), where Ci′ is some constant that depends only on C and i.
For the duration of the proof of this Proposition, let us fix some i ∈ Π \ ΠX0 . Before
going on, we need a couple of lemmas.
Lemma 6.7.
(i) The restricted weight space Vini ̟i is stable by ρi (PX+0 ).
(ii) The direct sum of all restricted weight spaces Viλ with λ 6= ni ̟i is stable by ρi (PX−0 ).
Proof.
(i) Let us first prove that this space is stable by p+
X0 . By definition, we have:
p+
X0 = l ⊕
M
gβ ;
β(X0 )≥0
Since l centralizes a, it preserves the restricted weight space decomposition; so
clearly l stabilizes Vini ̟i .
Now let β be a root such that β(X0 ) > 0; let us write
X
β=
cα α.
α∈Π
By definition of the set ΠX0 , we then have
cα ≥ 0 for α ∈ Π \ ΠX0 .
Now we know that
(6.17)
gβ · Vini ̟i ⊂ Vini ̟i +β .
The latter space is actually zero. Indeed, otherwise, ni ̟i + β would have to be a
restricted root. But from Lemma 2.13, we know that this would imply
cαi ≤ −1,
which contradicts the inequality above, since i (or, technically, αi ) is in Π \ ΠX0 .
It follows that for every β such that β(X0 ) ≥ 0, the space Vini ̟i is stable by gβ ;
we conclude that it is stable by p+
X0 .
By integration, we deduce that this space is also stable by PX+0 ,e . Now we know (it
follows from [Kna96], Proposition 7.82 (d)) that PX+0 = M PX+0 ,e . Since M centralizes a, it preserves the restricted weight space decomposition, so it stabilizes Vini ̟i .
We conclude that PX+0 stabilizes Vini ̟i .
(ii) The proof is completely analogous.
50
In the following lemma, we denote by PS the set of all parabolic spaces of V ; we also
identify the projective space P(Vi ) with the set of vector lines in Vi and the projective
space P(Vi∗ ) with the set of vector hyperplanes of Vi .
Remark 6.8. Recall (Remark 4.27) that by Proposition 4.4, the manifold PS is diffeomorphic to G/PX+0 .
Lemma 6.9. There exist two continuous maps
Φsi : PS → P(Vi )
and
Φui : PS → P(Vi∗ )
with the following properties:
(i) for every map g ∈ G of type X0 , we have
(
Eρsi (g) = Φsi (Vg≥ );
Eρui (g) = Φui (Vg≤ ).
(ii) if V1 , V2 ∈ PS are transverse, then Φsi (V1 ) 6∈ Φui (V2 ).
Proof. We define the maps Φsi and Φui in the following way. For every φ ∈ G, we set
( s
ni ̟ i
Φi (φ(V0≥ )) = ρi (φ) (V
);
i
L
≤
u
λ .
Φi (φ(V0 )) = ρi (φ)
V
λ6=ni ̟i i
(6.18)
Let us first check that these maps are well-defined. Clearly it is enough to check that
whenever some φ ∈L
G stabilizes the space V0≥ (resp. V0≤ ), it also stabilizes the line Vini ̟i
λ
(resp. hyperplane
λ6=ni ̟i Vi ). Since i ∈ Π \ ΠX0 , this follows from Lemma 6.7 and
Proposition 4.4.
The fact that these maps are continuous is then obvious. To show property (i), we
essentially use:
• the identities
(
Eρsi (exp(Jd(g))) = Vini ̟i ;
L
Eρui (exp(Jd(g))) = λ6=ni ̟i Viλ ,
(6.19)
which follow from the inequality (6.12) ranking the values of different restricted
weights of ρi evaluated at Jd(g);
• and the simple observation that any eigenspace of φgφ−1 is the image by φ of the
eigenspace of g with the same eigenvalue.
Property (ii) essentially follows from Proposition 4.26, which says that G acts transitively
on the set of transverse pairs of parabolic spaces.
51
Proof of Proposition 6.6. Let C ≥ 1. Then the set of C-non-degenerate pairs of parabolic
spaces is compact. On the other hand, the function
(V1 , V2 ) 7→ α(Φsi (V1 ), Φui (V2 ))
is continuous, and (by Lemma 6.9 (ii)) takes positive values on that set. Hence it is
bounded below. So there is a constant Ci′ ≥ 1, depending only on C, such that whenever
a pair (V1 , V2 ) of parabolic spaces is C-non-degenerate, the pair (Φsi (V1 ), Φui (V2 )) is Ci′ non-degenerate.
The conclusion then follows by Lemma 6.9 (i).
Proposition 6.10. For every C ≥ 1, there are positive constants s6.10 (C) and ε6.10 (C)
with the following property. Take any C-non-degenerate pair (g, h) of elements of G of
type X0 such that s(g) ≤ s6.10 (C) and s(h) ≤ s6.10 (C). Then we have:
(i) ∀i ∈ Π,
̟i (Jd(gh) − Ct(g) − Ct(h)) ≤ 0;
(ii) ∀i ∈ Π \ ΠX0 ,
̟i (Jd(gh) − Ct(g) − Ct(h)) ≥ −ε6.10 (C).
See Figure 2 for a picture explaining both this proposition and the corollary below.
Remark 6.11. Though we shall not use it, a very important particular case is g = h.
We then obviously have Jd(gh) = 2 Jd(g) and Ct(g) + Ct(h) = 2 Ct(g), so that the
inequalities (i) and (ii) give a relationship between the Cartan and Jordan projections of
a C-non-degenerate, sufficiently contracting map of type X0 .
Before proving the Proposition, let us give a more palatable (though slightly weaker)
reformulation.
Corollary 6.12. For every C ≥ 1, there exists a positive constant ε6.12 (C) with the
following property. For any pair (g, h) satisfying the hypotheses of the Proposition, we
have
Jd(gh) ∈ Conv WX0 · Ct′ (g, h) ,
(6.20)
where Conv denotes the convex hull and Ct′ (g, h) is some vector in a satisfying
k Ct′ (gh) − Ct(g) − Ct(h)k ≤ ε6.12 (C).
(6.21)
Note that the vector Ct′ (g, h) might not lie in the closed dominant Weyl chamber a+
(even though it is very close to the vector Ct(g) + Ct(h) which does).
Proof. We define Ct′ (g, h) by the linear system
(
∀i ∈ Π \ ΠX0 , ̟i (Ct′ (g, h)) = ̟i (Jd(gh));
∀i ∈ ΠX0 ,
̟i (Ct′ (g, h)) = ̟i (Ct(g) + Ct(h)),
(6.22)
which is possible because (̟i )i∈Π is a basis of a. The estimate (6.21) then immediately
follows from the inequalities of Proposition 6.10. But we may now rewrite Proposition 6.10 without the epsilons: we now have
(
∀i ∈ Π,
̟i (Jd(gh) − Ct′ (g, h)) ≤ 0;
(6.23)
∀i ∈ Π \ ΠX0 , ̟i (Jd(gh) − Ct′ (g, h)) = 0.
52
WX0 = {Id, sα1 }
ε6.10 (C)
X0
sα1 · Ct′ (g, h)
α2
̟2
Jd(gh)
Ct(g) + Ct(h)
̟1
Ct′ (g, h)
α1
Figure 2: This picture represents the situation of Example 3.5.3, namely G = SO+ (3, 2)
acting on R5 . We have chosen a generic, symmetric, extreme vector X0 . The
set ΠX0 is then {α1 } (or {1} with the usual abuse of notations), and the
group WX0 is generated by the single reflection sα1 . Proposition 6.10 states
that Jd(gh) lies in the shaded trapezoid. Corollary 6.12 states that it lies on
the thick line segment. In any case it lies by definition in the dominant open
Weyl chamber (the shaded sector).
53
Let us now show the inequalities
∀i ∈ ΠX0 ,
αi (Ct′ (g, h)) ≥ 0.
(6.24)
Let (Hi )i∈Π be the basis of a dual to (̟i )i∈Π , i.e. the unique basis such that the
identity
X
̟i
cj Hj = ci
(6.25)
j∈Π
holds for any i ∈ Π and any tuple (ci ) ∈ RΠ . By definition of the fundamental restricted
weights ̟i , it then follows that we also have the identity
∀i ∈ Π, ∀λ ∈ a∗ ,
λ(Hi ) =
2hλ, α′i i
.
kα′i k2
(6.26)
By decomposing the vector Ct(g)+Ct(h)−Ct′ (g, h) in the basis (Hi )i∈Π and by plugging
the formula (6.25) into the second line of the defining system (6.22), we find that we may
write
X
Ct′ (g, h) = Ct(g) + Ct(h) −
cj Hj ;
(6.27)
j∈Π\ΠX0
by combining the first line of the defining system (6.22) with Proposition 6.10 (i), we
also obtain that cj ≥ 0 for every j ∈ Π \ ΠX0 .
Finally, take any index i ∈ ΠX0 . Then we have
X
X
αi
cj Hj =
cj αi (Hj )
j∈Π\ΠX0
j∈Π\ΠX0
=
X
j∈Π\ΠX0
cj
2hαi , α′j i
kα′j k2
≤0:
(6.28)
indeed since j varies in Π \ ΠX0 and i ∈ ΠX0 , we have i 6= j hence hαi , αj i ≤ 0; and α′j is
by construction a positive multiple of αj . We conclude that
αi (Ct′ (g, h)) ≥ αi (Ct(g)) + αi (Ct(h)) ≥ 0
(since Ct(g), Ct(h) ∈ a+ ), which gives us (6.24).
Now the system of inequalities (6.24) is equivalent to saying that
Ct′ (g, h) ∈ a+
X0 ,
(6.29)
where a+
X0 is a fundamental domain for the action of Weyl subgroup WX0 on a, more
specifically the one that contains the dominant Weyl chamber a+ . The statement (6.20)
then follows from this and from (6.23), by applying Proposition 2.7 which characterizes
convex hulls of orbits of WX0 .
54
Proof of Proposition 6.10. Let i ∈ Π. We know (see (6.12) above) that for any X ∈ a+ ,
the number ni ̟i (X) is the largest eigenvalue of ρi (X). From Proposition 2.6, it then
follows that:
(
ni ̟i (Ct(g)) = log kρi (g)k;
(6.30)
ni ̟i (Jd(g)) = log r(ρi (g))
(recall that r denotes the spectral radius).
(i) is straightforward from here: indeed,
ni ̟i Jd(gh) = log r(ρi (gh))
≤ log kρi (gh)k
≤ log kρi (g)kkρi (h)k
= ni ̟i Ct(g) + Ct(h) .
(6.31)
(ii) Assume that i ∈ Π \ ΠX0 . By Proposition 6.1, we know that the maps ρi (g)
and ρi (h) are proximal. By Proposition 6.6, they form a C ′ -non-degenerate pair,
for some Ci′ that depends only on C. By Proposition 6.1, if we take s6.10 (C) small
enough, we may then assume that both ρi (g) and ρi (h) are s̃5.12 (Ci′ )-contracting.
We may then apply Proposition 5.12 (iii) to these two maps: we get
r(ρi (g)ρi (h)) ≍C kρi (g)kkρi (h)k.
Now from Proposition 2.6, it follows that we have:
r(ρi (gh)) = exp(ni ̟i (Jd(gh)));
kρi (g)k = exp(ni ̟i (Ct(g)));
kρi (h)k = exp(ni ̟i (Ct(h))).
Taking the logarithm, we deduce that there exists a constant εi (C) such that for
sufficiently contracting g and h, we have
(6.32)
ni ̟i Jd(gh) − Ct(g) − Ct(h) ∈ [−εi (C), εi (C)].
Taking
ε6.10 (C) := max
i∈Π\Π
X0
1
εi (C),
ni
(6.33)
the conclusion follows.
Remark 6.13. Corollary 6.12 generalizes a result given by Benoist in [Ben97]. More
specifically, by taking together Lemma 4.1 and Lemma 4.5.1 from that paper, we obtain
that under suitable conditions, the vector
Jd(gh) − Ct(g) − Ct(h)
(which is λ(gh) − µ(g) − µ(h) in Benoist’s notations) is bounded. This seems to be
stronger than our result; but in fact, it also relies on stronger assumptions. There are
two possible ways to interpret it:
55
• Either we may take his set θ to be our Π \ ΠX0 . In that case, [Ben97] uses the
additional assumption that g and h are "of type θ", which means that their Jordan
projections must be WX0 -invariant. If we make this assumption on g and h, then
the estimate can also be deduced from our Corollary 6.12.
• Or we may take θ to be the whole set Π. But in that case, [Ben97] needs the
assumption that g and h are proximal (and in general position) in all representations ρi , which is stronger than the hypotheses we have made.
Proposition 6.14. For every C ≥ 1, there is a positive constant s6.14 (C) ≤ 1 with the
following property. Take any C-non-degenerate pair (g, h) of maps of type X0 in G such
that s(g±1 ) ≤ s6.14 (C) and s(h±1 ) ≤ s6.14 (C). Then gh is still of type X0 .
Proof. Let C ≥ 1, and let (g, h) be a C-non-degenerate pair of maps in G⋉ V of type X0 ,
such that
s(g±1 ) ≤ s6.14 (C) and s(h±1 ) ≤ s6.14 (C)
for some constant s6.14 (C) to be specified later.
Lemma 6.5 then gives us
max λ(Ct(g)) ≤ log s(g) + ε6.5 (C) + min λ(Ct(g))
λ∈Ω<
X
λ∈Ω≥
X
0
0
≤ log s(g) + ε6.5 (C).
(6.34)
(Indeed by Assumption 3.2, λ = 0 is a restricted weight that is certainly contained
in Ω≥
X0 , so the minimum above is nonpositive.)
Taking s6.14 (C) small enough, we may assume that
1
<
max kλk ε6.12 (C).
(6.35)
∀λ ∈ ΩX0 , λ(Ct(g)) < −
2 λ∈Ω
Of course a similar estimate holds for h:
<
∀λ ∈ ΩX0 ,
1
λ(Ct(h)) < −
2
max kλk ε6.12 (C).
λ∈Ω
(6.36)
Now let λ be any restricted weight that does not vanish on X0 . We distinguish two
cases:
• Suppose that λ(X0 ) < 0. Let Ct′ (g, h) be the vector defined in Corollary 6.12.
Then on the one hand, we deduce from (6.21) that:
|λ(Ct′ (g, h)) − λ(Ct(g)) − λ(Ct(h))| ≤ kλkk Ct′ (g, h) − Ct(g) − Ct(h)k
≤ max kλk ε6.12 (C).
(6.37)
λ∈Ω
Adding together the three estimates (6.35), (6.36) and (6.37), we get
56
λ(Ct′ (g, h)) < 0;
(6.38)
and this is true for any λ ∈ Ω<
X0 .
On the other hand, we have (6.20) which says that
Jd(gh) ∈ Conv(WX0 · Ct′ (g, h)).
Now take any w ∈ WX0 . Since X0 is extreme, λ is still negative on wX0 , so that
the restricted weight w−1 (λ) still satisfies
w−1 (λ)(X0 ) < 0.
Since (6.38) holds for any such restricted weight, we also have
λ(w(Ct′ (g, h))) = w−1 (λ)(Ct′ (g, h)) < 0.
Thus λ takes negative values on every point of the orbit WX0 · Ct′ (g, h); hence it
also takes negative values on every point of its convex hull. In particular, we have
λ(Jd(gh)) < 0.
(6.39)
• Suppose that λ(X0 ) > 0. Since the set of restricted weights Ω is invariant by W ,
the form w0 (λ) is still a restricted weight; since by hypothesis X0 is symmetric (i.e.
−w0 (X0 ) = X0 ), we then have
w0 (λ)(X0 ) < 0.
We may thus apply the previous point to the weight w0 (λ) and to the map (gh)−1 =
h−1 g−1 (since g−1 and h−1 verify the same hypotheses as g and h); this gives us
w0 (λ)(Jd((gh)−1 )) < 0.
Since Jd((gh)−1 ) = −w0 (Jd(gh)), we conclude that
λ(Jd(gh)) > 0.
(6.40)
We conclude that gh is indeed of type X0 .
Remark 6.15. If we assume that both g and g−1 are sufficiently contracting, then clearly
Lemma 6.5 implies that Ct′ (g, g) and then Ct(g) also has the same type as X0 . Conversely, we may show (by a version of Lemma 6.5 with the inequality going both ways)
that if Ct(g) has the same type as X0 and is "far enough" from the borders of aρ,X0 ,
then g and g −1 are strongly contracting.
57
7 Products of maps of type X0
The goal of this section is to prove Proposition 7.4, which not only says that a product of
a C-non-degenerate, sufficiently contracting pair of maps of type X0 is itself of type X0 ,
but allows us to control the geometry and contraction strength of the product. To do
this, we proceed almost exactly as in Section 3.2 in [Smi16]: we reduce the problem to
Proposition 5.12, by considering the action of G ⋉ V on a suitable exterior power Λp A
(rather than on the spaces Vi as in the previous section).
There is however one crucial difference from [Smi16]: while it is still true that when
g is of type X0 , its exterior power Λp g is proximal, the converse no longer holds. Filling
that gap is what the whole previous section was about.
Remark 7.1. The reader might wonder why we did not (developing upon the final remark
from the previous section) prove an additivity theorem for Cartan projections similar to
Proposition 6.10, and use it to estimate s(gh) in terms of s(g±1 ) and s(h±1 ). Since we
need to study the action on the spaces Vi anyway, this would seemingly allow us to forgo
the additional introduction of Λp A.
The reason is that this approach only works for linear maps g and h: for g ∈ G⋉V , the
Cartan projection is only defined for ℓ(g) and only gives information about the singular
values of ℓ(g), not those of g. So while possible, this approach would force us, on the
other hand, to abandon the unified treatment of quantitative properties of affine maps
(as outlined in Remark 5.3).
We introduce the integers:
≥
p := dim A≥
0 = dim V0 + 1;
q := dim V0< ;
(7.1)
d := dim A = dim V + 1 = q + p.
For every g ∈ G ⋉ V , we may define its exterior power Λp g : Λp A → Λp A. The Euclidean
structure of A induces in a canonical way a Euclidean structure on Λp A.
Lemma 7.2.
(i) Let g ∈ G ⋉ V be a map of type X0 . Then Λp g is proximal, and the attracting (resp.
<
repelling) space of Λp g depends on nothing but A≥
g (resp. Vg ):
(
EΛs p g = Λp A≥
g p
u
EΛp g = x ∈ Λ A x ∧ Λq Vg< = 0 .
(ii) For every C ≥ 1, whenever (g1 , g2 ) is a C-non-degenerate pair of maps of type X0 ,
(Λp g1 , Λp g2 ) is a C p -non-degenerate pair of proximal maps.
(iii) For every C ≥ 1, for every C-non-degenerate map g ∈ G ⋉ V of type X0 , we have
s(g) .C s̃(Λp g).
58
(7.2)
If in addition s(g) ≤ 1, we have
s(g) ≍C s̃(Λp g).
(7.3)
(Recall the Definitions 5.5 and 5.11 of the "contraction strengths" s(g) and s̃(γ),
respectively.)
(iv) For any two p-dimensional subspaces A1 and A2 of A, we have
αHaus (A1 , A2 ) ≍ α (Λp A1 , Λp A2 ) .
This is similar to Lemma 3.8 in [Smi16], except for point (i) which here is weaker than
there.
Proof. For (i), let g ∈ G ⋉ V be a map of type X0 . Let λ1 , . . . , λd be the eigenvalues of
g (acting on A) counted with multiplicity and ordered by nondecreasing modulus; then
|λq+1 | = 1 and |λq | < 1. On the other hand, we know that the eigenvalues of Λp g counted
with multiplicity are exactly the products of the form λi1 · · · λip , where 1 ≤ i1 < · · · <
ip ≤ d. As the two largest of them (by modulus) are λq+1 · · · λd and λq λq+2 · · · λd , it
follows that Λp g is proximal.
As for the expression of E s and E u , it follows immediately by considering a basis that
trigonalizes g.
For (ii), (iii) and (iv), the proof is exactly the same as for the corresponding points in
Lemma 3.8 in [Smi16], mutatis mutandis.
We also need the following technical lemma, which generalizes Lemma 3.9 in [Smi16]:
Lemma 7.3. There is a constant ε > 0 with the following property. Let A1 , A2 be any
two affine parabolic spaces such that
(
αHaus (A1 , A≥
0) ≤ ε
≤
Haus
α
(A2 , A0 ) ≤ ε.
Then they form a 2-non-degenerate pair.
(Of course the constant 2 is arbitrary; we could replace it by any number larger than 1.)
Proof. The proof is exactly the same as the proof of Lemma 3.9 in [Smi16], mutatis
mutandis.
Proposition 7.4. For every C ≥ 1, there is a positive constant s7.4 (C) ≤ 1 with the
following property. Take any C-non-degenerate pair (g, h) of maps of type X0 in G ⋉ V ;
suppose that we have s(g±1 ) ≤ s7.4 (C) and s(h±1 ) ≤ s7.4 (C). Then gh is of type X0 ,
2C-non-degenerate, and we have:
59
≥
αHaus A≥
.C s(g)
,
A
g
gh
(i)
αHaus A≤ , A≤ . s(h−1 )
C
gh
h
;
(ii) s(gh) .C s(g)s(h).
(This generalizes Proposition 3.6 in [Smi16].)
Before giving the proof, let us first formulate a particular case:
Corollary 7.5. Under the same hypotheses, we have
≥
αHaus Vgh
, Vg≥ .C s(ℓ(g))
αHaus V ≤ , V ≤ . s(ℓ(h)−1 ).
C
gh
h
Proof. This follows from Lemma 5.8. The proof is the same as for Corollary 3.7 in [Smi16].
Proof of Proposition 7.4. Let us fix some constant s7.4 (C), small enough to satisfy all
the constraints that will appear in the course of the proof. Let (g, h) be a pair of maps
satisfying the hypotheses.
First note that by Lemma 5.8, we have
s(ℓ(g)±1 ) ≤ s(g±1 ) ≤ s7.4 (C)
(7.4)
and similarly for h. If we take s7.4 (C) ≤ s6.14 (C), then Proposition 6.14 tells us
that ℓ(gh), hence gh (indeed the Jordan projection depends only on the linear part), is
of type X0 .
The remainder of the proof works exactly like the proof of Proposition 3.6 in [Smi16],
namely by applying Proposition 5.12 to the maps γ1 = Λp g and γ2 = Λp h. Taking into
account the central position occupied in the paper by the Proposition we are currently
proving, let us reproduce these details nevertheless. Let us check that γ1 and γ2 satisfy
the required hypotheses:
• By Lemma 7.2 (i), γ1 and γ2 are proximal.
• By Lemma 7.2 (ii), the pair (γ1 , γ2 ) is C p -non-degenerate.
• Since we have supposed s7.4 (C) ≤ 1, it follows by Lemma 7.2 (iii) that s̃(γ1 ) .C
s(g) and s̃(γ2 ) .C s(h). If we choose s7.4 (C) sufficiently small, then γ1 and γ2 are
s̃5.12 (C p )-contracting, i.e. sufficiently contracting to apply Proposition 5.12.
Thus we may apply Proposition 5.12. It remains to deduce from its conclusions the
conclusions of Proposition 7.4.
• We already know that gh is of type X0 .
60
• From Proposition 5.12 (i), using Lemma 7.2 (i), (iii) and (iv), we get
≥
,
A
αHaus A≥
g .C s(g),
gh
which shows the first line of Proposition 7.4 (i).
• By applying Proposition 5.12 to γ2−1 γ1−1 instead of γ1 γ2 , we get in the same way
the second line of Proposition 7.4 (i).
≤
• Let φ be an optimal canonizing map for the pair (A≥
g , Ah ). By hypothesis, we have
φ±1 ≤ C. But if we take s7.4 (C) sufficiently small, the two inequalities that we
have just shown, together with Lemma 7.3, allow us to find a map φ′ with kφ′ k ≤ 2,
kφ′ −1 k ≤ 2 and
≤
≥
≤
φ′ ◦ φ(A≥
gh , Agh ) = (A0 , A0 ).
It follows that the composition map gh is 2C-non-degenerate.
• The last inequality, namely Proposition 7.4 (ii), now is deduced from Proposition 5.12 (ii) by using Lemma 7.2 (iii).
8 Additivity of Margulis invariant
Proposition 8.1 below is the key ingredient of the proof. It explains how the Margulis
invariant behaves under group operations (inverse and composition).
The first point is easy to prove, but still important. It is a generalization of Proposition 4.1 (i) in [Smi16]; as the general case is slightly harder, we have now given more
details.
The proof of the second point occupies the remainder of this section. We prove it by
reducing it successively to Lemma 8.6 (which is proved using the technical lemma 8.7),
then to Lemma 8.9. The proof follows very closely that of Proposition 4.2 (ii) in [Smi16],
and we have actually omitted the proofs of Lemmas 8.7 and 8.9. We did repeat the proof
of the Proposition itself (to help the reader figure out precisely what is to be changed),
as well as the proof of Lemma 8.6 (to clear up a small confusion in the original proof:
see Remark 8.8).
Proposition 8.1.
(i) For every map g ∈ G ⋉ V of type X0 , we have
M (g−1 ) = −w0 (M (g)).
(ii) For every C ≥ 1, there are positive constants s8.1 (C) ≤ 1 and ε8.1 (C) with the
following property. Let g, h ∈ G⋉V be a C-non-degenerate pair of maps of type X0 ,
with g ±1 and h±1 all s8.1 (C)-contracting. Then gh is of type X0 , and we have:
kM (gh) − M (g) − M (h)k ≤ ε8.1 (C).
61
Remark 8.2. Note that M (g) is (by definition) an element of the space V0t , which (again
by definition) is the set of fixed points of L = ZG (A). From this, it is straightforward
to deduce that V0t is invariant by NG (A). Hence w0 induces a linear involution on V0t ,
which does not depend on the choice of a representative of w0 in G.
Let C ≥ 1. We choose some constant s8.1 (C) ≤ 1, small enough to satisfy all the
constraints that will appear in the course of the proof. For the remainder of this section,
we fix g, h ∈ G ⋉ V a C-non-degenerate pair of maps of type X0 such that g±1 and h±1
are s8.1 (C)-contracting.
The following remark will be used throughout this section.
≤
≥
≤
≤
≥
Remark 8.3. We may suppose that the pairs (A≥
gh , Agh ), (Ahg , Ahg ), (Ag , Agh ) and
≤
(A≥
hg , Ag ) are all 2C-non-degenerate. Indeed, recall that (by Proposition 7.4), we have
≥
αHaus A≥
,
A
g .C s(g)
gh
αHaus A≤ , A≤ . s(h−1 )
C
gh
h
and similar inequalities with g and h interchanged. On the other hand, by hypothe≤
sis, (A≥
g , Ah ) is C-non-degenerate. If we choose s8.1 (C) sufficiently small, these four
statements then follow from Lemma 7.3.
Proof of Proposition 8.1.
(i) Let φ be a canonizing map for g. Since Vg≥−1 = Vg≤ and vice-versa (obviously) and
since V0≤ = w0 V0≥ and vice-versa (because X0 is symmetric), it follows that w0 φ is
a canonizing map for g −1 .
It remains to show that w0 commutes with πt . Indeed, it is well-known that the
group W , that we defined as the quotient NG (A)/ZG (A), is also equal to the
quotient NK (A)/ZK (A) (see [Kna96], formulas (7.84a) and (7.84b)); hence
NG (A) = W ZG (A) = W ZK (A)A = NK (A)A ⊂ KA.
(8.1)
Let w̃0 be any representative of w0 in NG (A). We already know (Remark 8.2)
that both V0= = V 0 and V0t are invariant by w̃0 . Now by definition the group A
acts trivially on V 0 , and by construction K acts on V 0 by orthogonal transformations (indeed the Euclidean structure was chosen in accordance with Lemma 2.4);
hence V0r , which is the orthogonal complement of V0t in V 0 , is also invariant by w̃0 .
The desired formula now immediately follows from the definition of the Margulis
invariant.
(ii) The proof of this point is a straightforward generalization of the proof of Proposition 4.1 (ii) in [Smi16].
If we take s8.1 (C) ≤ s7.4 (C), then Proposition 7.4 ensures that gh is of type X0 .
=
To estimate M (gh), we decompose gh : A=
gh → Agh into a product of several maps.
62
• We begin by decomposing the product gh into its factors. We have the commutative diagram
gh
A=
gh
A=
hg
g
A=
gh
h
(8.2)
Indeed, since hg is the conjugate of gh by h and vice-versa, we have h(A=
gh ) =
=
=
A=
and
g(A
)
=
A
.
hg
hg
gh
=
=
=
• Next we factor the map g : A=
hg → Agh through the map g : Ag → Ag , which
is better known to us. We have the commutative diagram
A=
gh
A=
hg
g
πg
πg
A=
g
g
(8.3)
A=
g
<
>
where πg is the projection onto A=
g parallel to Vg ⊕ Vg . (It commutes with g
=
>
<
because Ag , Vg and Vg are all invariant by g.)
• Finally, we decompose again every diagonal arrow from the last diagram into
two factors. For any two maps u and v of type X0 , we introduce the notation
≥
≤
A=
u,v := Au ∩ Av .
=
We call P1 (resp. P2 ) the projection onto A=
g,gh (resp. Ahg,g ), still parallel
<
>
to Vg ⊕ Vg . To justify this definition, we must check that A=
g,gh (and sim=
>
<
ilarly Ahg,g ) is supplementary to Vg ⊕ Vg . Indeed, by Remark 8.3, A≤
gh is
>
;
,
hence
(by
Proposition
4.16
(ii))
supplementary
to
V
transverse to A≥
g thus
g
=
>
<
≥
<
=
>
.
Then
we
have
the
⊕
A
⊕
V
=
V
⊕
A
and
A
=
V
⊕
A
=
V
A≥
g
g
g
g
g
g
g,gh
g,gh
commutative diagrams
A=
gh
P1
A=
g,gh
πg
A=
g
(8.4a)
A=
g
(8.4b)
πg
and
A=
hg
P2
A=
hg,g
πg
πg
The second and third step can be repeated with h instead of g. The way to adapt
=
the second step is straightforward; for the third step, we factor πh : A=
hg → Ah
=
=
=
=
through Ah,hg and πh : Agh → Ah through Agh,h .
63
A=
0
A=
0
ggh
P1
A=
0
P2
A=
0
A=
0
gg,gh
ψ1
ψ2
A=
0
φgh
hgh
φg,gh
φg
A=
gh
A=
0
g=
φhg,g
φg
φhg
A=
hg
g
P1
φgh
h
A=
gh
P2
A=
g,gh
A=
hg,g
πg
πg
A=
g
A=
g
g
Diagram 3
Combining these three decompositions, we get the lower half of Diagram 3. (We
left out the expansion of h; we leave drawing the full diagram for especially brave
readers.) Let us now interpret all these maps as endomorphisms of A=
0 . To do this,
we choose some optimal canonizing maps
φg , φgh , φhg , φg,gh , φhg,g
≤
≥
≤
respectively of g, of gh, of hg, of the pair (A≥
g , Agh ) and of the pair (Ahg , Ag ). This
allows us to define ggh , hgh , gg,gh , g= , P1 , P2 , ψ1 , ψ2 to be the maps that make the
whole Diagram 3 commutative.
Now let us define
(
Mgh (g) := πt (ggh (x) − x)
Mgh (h) := πt (hgh (x) − x)
(8.5)
=
=
=
:= A=
, where VAff,0
for any x ∈ VAff,0
0 ∩ VAff is the affine space parallel to V0 and
64
passing through the origin. Since gh is the conjugate of hg by g and vice-versa,
the elements of G ⋉ V (defined in an obvious way) whose restrictions to A=
0 are
≤
ggh and hgh stabilize the spaces A≥
g
and
h
and
A
.
By
Lemma
4.21,
gh
gh are
0
0
thus quasi-translations. It follows that these values Mgh (g) and Mgh (h) do not
depend on the choice of x. Compare this to the definition of a Margulis invariant
=
(Definition 4.30): we have M (gh) = πt (ggh ◦ hgh (x) − x) for any x ∈ VAff,0
. It
immediately follows that
M (gh) = Mgh (g) + Mgh (h).
(8.6)
Thus it is enough to show that kMgh (g)−M (g)k .C 1 and kMgh (h)−M (h)k .C 1.
This is an immediate consequence of Lemma 8.6 below. (Note that while the vectors
Mgh (g) and Mgh (h) are elements of V0t , the maps ggh and hgh are extended affine
isometries acting on the whole subspace A=
0 .)
Remark 8.4. In contrast to actual Margulis invariants, the values Mgh (g) and Mgh (h) do
depend on our choice of canonizing maps. Choosing other canonizing maps would force
us to subtract some constant from the former and add it to the latter.
Definition 8.5. We shall say that a linear bijection f between two subspaces of the
extended affine space A is K(C)-bounded if it is bounded by a constant depending only
on C, that is, kf k .C 1 and kf −1 k .C 1. We say that two automorphisms f1 , f2 of A=
0
(depending somehow on g and h) are K(C)-almost equivalent, and we write f1 ≈C f2 , if
they satisfy the condition
kf1 − ξ ◦ f2 ◦ ξ ′ k .C 1
for some K(C)-bounded quasi-translations ξ, ξ ′ . This is indeed an equivalence relation.
Lemma 8.6. The maps ggh and hgh are K(C)-almost equivalent to g= and h= , respectively.
To show this, we use the following property:
Lemma 8.7. All the non-horizontal arrows in Diagram 3 represent K(C)-bounded, bijective maps.
Note that Lemma 8.7 alone does not imply Lemma 8.6: indeed, while the maps ψ 1
and ψ 2 are quasi-translations by Lemma 4.29, the maps P 1 and P 2 need not be. This
issue will be addressed in Lemma 8.9.
Proof of Lemma 8.7. The proof is exactly the same as the proof of Lemma 4.6 in [Smi16],
mutatis mutandis.
Proof of Lemma 8.6. We shall concentrate on the estimate ggh ≈C g= ; the proof of the
estimate hgh ≈C h= is analogous.
We now use Lemma 4.29 which shows that canonical identifications commute up to
quasi-translation with suitable projections; it implies that the maps ψ1 and ψ2 are quasitranslations. Hence gg,gh is also a quasi-translation.
65
A=
0
A=
0
′
ggh
ℓ(ggh )
A=
0
P2′
P1
P2
A=
0
A=
0
′
gg,gh
ψ2′
ψ1
A=
0
φgh
ℓ(gg,gh )
φg,gh
ψ2
A=
0
g=
φg
A=
gh
A=
0
φ′hg,g φhg,g φ′hg
φg
φhg
A=
hg
g
P1
P2
A=
hg,g
A=
g,gh
πg
πg
A=
g
A=
g
g
Diagram 4
We would like to pretend that ggh and gg,gh are actually translations. To do that, we
modify slightly the upper right-hand corner of Diagram 3. We set
(
φ′hg := ℓ(ggh ) ◦ φhg
(8.7)
φ′hg,g := ℓ(gg,gh ) ◦ φhg,g ,
where ℓ stands for the linear part as defined in Section 5.2, and we define P2′ , ψ2′ ,
′ , g′
ggh
g,gh so as to make the new diagram commutative (see Diagram 4). The factors
ℓ(ggh ) and ℓ(gg,gh ) we introduced (the short horizontal arrows in Diagram 4) have norm 1:
indeed, being quasi-translations of A=
0 fixing R0 , they are orthogonal linear transformations (by Lemma 4.21). Thus Lemma 8.7 still holds for Diagram 4; but now, the modified
′ and g ′
maps ggh
g,gh are translations by construction.
We may write:
−1
′ = (P −1 ◦ g ′
ggh
◦ P2′ ).
(8.8)
1
g,gh ◦ P1 ) ◦ (P1
′ and g ′
Then, since ggh
g,gh are translations, P1
−1
66
◦ P2′ is also a translation. By Lemma 8.7
(applied to Diagram 4), it is the composition of two K(C)-bounded maps, hence K(C)bounded. Thus we have
′ ≈ P −1 ◦ g ′
ggh
(8.9)
C 1
g,gh ◦ P1 .
Since ℓ(ggh ), ℓ(gg,gh ), ψ1 and ψ2 are K(C)-bounded quasi-translations, ggh is K(C)′ and g is K(C)-almost equivalent to g ′
almost equivalent to ggh
=
g,gh . It remains to check
′
that the map gg,gh
is K(C)-almost equivalent to its conjugate P1
−1
′
◦ gg,gh
◦ P1 .
This follows from Lemma 8.9 below. Indeed, let P1′′ be the quasi-translation con′
structed in Lemma 8.9. Let v ∈ V0= be the translation vector of gg,gh
, so that
′
gg,gh
=: τv .
(8.10)
Keep in mind that while we call the map
τv a "translation", it is formally a transvection:
v . Then we have
its matrix in a suitable basis is Id
0 1
P1
−1
′
◦ gg,gh
◦ P1 − P1′′
−1
′
◦ P1′′ = τP
◦ gg,gh
−1
1
= P1
−1
≤ (P1
(v)
− τP ′′ −1 (v)
(v) −
−1
1
−1
P1′′ (v)
− P1′′
−1
)
V0=
kvk
(8.11)
(as v ∈ V0= ).
Remark 8.8. While the corresponding calculation in [Smi16] does not technically contain
any explicit falsehoods (the inequality just happens to be slightly weaker than what it
should be), it implicitly relies on the false "identity" τu − τv = τu−v . Here we have
corrected this confusion.
Now by Lemma 4.21, we know that the quasi-translation P1′′ restricted to V0= is a
linear map preserving the Euclidean norm. We also know that the map ρ 7→ ρ−1 (defined
on GL(V0= )) is Lipschitz-continuous on a neighborhood of the orthogonal group (which
is compact). Finally, by Lemma 5.8, s(ℓ(g)) does not exceed s(g) which is by hypothesis
smaller than or equal to s8.1 (C). Taking s8.1 (C) small enough, we may deduce from
Lemma 8.9 that
(P1
−1
− P1′′
−1
)
V0=
.C s(ℓ(g)).
(8.12)
′
′
, since gg,gh
On the other hand, we have kvk ≤ kτv k = gg,gh
.C g|A=
is the compog
with several K(C)-bounded maps. It follows that
sition of g|A=
g
P1
−1
′
◦ gg,gh
◦ P1 − P1′′
−1
′
.
◦ P1′′ .C s(ℓ(g)) g|A=
◦ gg,gh
g
(8.13)
.C s(g); and we know that s(g) ≤ 1. Finally
By Lemma 5.8 (iii), we have s(ℓ(g)) g|A=
g
we get
−1
−1
′
′
P1 ◦ gg,gh
◦ P1 − P1′′ ◦ gg,gh
◦ P1′′ .C 1.
(8.14)
67
To complete the proof of Lemma 8.6, and hence also the proof of Proposition 8.1, it
remains only to prove Lemma 8.9.
Lemma 8.9. The linear part of the map P1 is "almost" a quasi-translation. More precisely, there is a quasi-translation P1′′ such that
(P1 − P1′′ )
V0=
.C s(ℓ(g)).
Recall that ℓ(g) is the map with the same linear part as g, but with no translation
part: see subsection 5.2. We use the double prime because the relationship between P1′′
and P1 is not the same as the relationship between P2′ and P2 .
Proof. The proof is exactly the same as the proof of Lemma 4.7 in [Smi16], mutatis
mutandis.
9 Margulis invariants of words
We have already studied how contraction strengths (Proposition 7.4) and Margulis invariants (Proposition 8.1) behave when we take the product of two C-non-degenerate,
sufficiently contracting maps of type X0 . The goal of this section is to generalize these
results to words of arbitrary length on a given set of generators. It is a straightforward
generalization of Section 5 in [Smi16] (we slightly changed the notations).
Definition 9.1. Take k generators g1 , . . . , gk . Consider a word g = giσ11 · · · giσll with
length l ≥ 1 on these generators and their inverses (for every m we have 1 ≤ im ≤ k
and σm = ±1). We say that g is reduced if for every m such that 1 ≤ m ≤ l − 1, we have
(im+1 , σm+1 ) 6= (im , −σm ). We say that g is cyclically reduced if it is reduced and also
satisfies (i1 , σ1 ) 6= (il , −σl ).
Proposition 9.2. For every C ≥ 1, there is a positive constant s9.2 (C) ≤ 1 with the
following property. Take any family of maps g1 , . . . , gk ∈ G ⋉ V satisfying the following
hypotheses:
(H1) Every gi is of type X0 .
(H2) Any pair taken among the maps {g1 , . . . , gk , g1−1 , . . . , gk−1 } is C-non-degenerate, except of course if it has the form (gi , gi−1 ) for some i.
(H3) For every i, we have s(gi ) ≤ s9.2 (C) and s(gi−1 ) ≤ s9.2 (C).
Take any nonempty cyclically reduced word g = giσ11 · · · giσll (with 1 ≤ im ≤ k, σm = ±1
for every m). Then g is of type X0 , 2C-non-degenerate, and we have
M (g) −
l
X
M (giσmm ) ≤ lε8.1 (2C)
m=1
(where ε8.1 (2C) is the constant introduced in Proposition 8.1).
68
The proof proceeds by induction, with Proposition 7.4 and Proposition 8.1 providing
the induction step.
Proof. The proof is exactly the same as proof of Proposition 5.2 in [Smi16], mutatis
mutandis.
10 Construction of the group
Here we prove the Main Theorem. We closely follow Section 6 from [Smi16], with only
two substantial differences:
• While in the case of the adjoint representation, existence of a −w0 -invariant vector
in V0t was automatic, here we must postulate it explicitly (Assumption 10.1).
• Where we originally relied on Lemma 7.2 in [Ben96], we now need the more general
Lemma 4.3.a in [Ben97].
In the next-to-last paragraph of the proof, we have also made more explicit the relationship between sMain (C) and s9.2 (C).
Let us recall the outline of the proof. We begin by showing (Lemma 10.3) that if we
take a group generated by a family of C-non-degenerate, sufficiently contracting maps of
type X0 with suitable Margulis invariants, it satisfies all of the conclusions of the Main
Theorem, except Zariski-density. We then exhibit such a group that is also Zariski-dense
(and thus prove the Main Theorem).
The idea is to ensure that the Margulis invariants of all elements of the group lie
almost on the same half-line. Obviously if −w0 maps every element of V0t to its opposite,
Proposition 8.1 (i) makes this impossible. So we now exclude this case:
Assumption 10.1. The representation ρ is such that the action of w0 on V0t is not
trivial.
This is precisely condition (i) from the Main Theorem. More precisely, V0t is the set of
all vectors that satisfy (i)(a), and what we say here is that some of them also satisfy (i)(b).
Example 10.2.
1. Consider G = SO+ (p, q) acting on Rp+q (with p ≥ q), we have already seen that
the only case when V0t 6= 0 is when p − q = 1 (see Example 4.22.1) So let p = n + 1,
q = n; then we may show that
w0 |V t = (−1)n Id
0
(10.1)
(this is essentially the content of Lemma 3.1 in [AMS02] or of Proposition 2.7
in [Smi14]). So G = SO+ (n + 1, n) satisfies this assumption if and only if n is odd.
2. If G is any semisimple real Lie group acting on V = g (its Lie algebra) by the adjoint
representation, then gt0 contains the Cartan subspace a (see Example 4.22.2), on
which w0 obviously acts nontrivially unless a is itself trivial. So this assumption is
satisfied whenever G is noncompact.
69
Thanks to Assumption 10.1, we choose once and for all some nonzero vector v ∈ V0t
that is a fixed point of −w0 (which is possible since w0 is an involution). We also choose
a vector M0 collinear to v and such that kM0 k = 2ε8.1 (2C).
Lemma 10.3. Take any family g1 , . . . , gk ∈ G ⋉ V satisfying the hypotheses (H1), (H2)
and (H3) from Proposition 9.2, and also the additional condition
(H4) For every i, M (gi ) = M0 .
Then these maps generate a free group acting properly discontinuously on the affine
space VAff .
Proof. The proof is exactly the same as the proof of Lemma 6.1 in [Smi16], mutatis
mutandis. The (orthogonal) projection
π̂z : ĝ → z ⊕ R0
parallel to d ⊕ n+ ⊕ n−
now becomes the (orthogonal) projection
π̂t : A → V0t ⊕ R0
parallel to V0r ⊕ V0> ⊕ V0< .
Proof of Main Theorem. First note that the assumptions we have made on ρ in the course
of the paper ensure that it satisfies the hypotheses of the Main Theorem: Assumptions 10.1 and 3.8 give the conditions (i) and (ii) respectively.
(The two other assumptions were "for free": Assumption 4.23 is just the weaker condition (i)(a), and Assumption 3.2 is an even weaker condition that follows from (i)(a).)
Once again, we use the same strategy as in the proof of the Main Theorem of [Smi16].
We find a positive constant C ≥ 1 and a family of maps g1 , . . . , gk ∈ G ⋉ V (with
k ≥ 2) that satisfy the conditions (H1) through (H4) and whose linear parts generate a
Zariski-dense subgroup of G, then we apply Lemma 10.3. We proceed in several stages.
• We begin by using a result of Benoist: we apply Lemma 4.3.a in [Ben97] to
– Γ = G;
– t = k + 1;
– Ωi = aρ,X0 ∩ a++ for every i.
This gives us, for any k ≥ 2, a family of maps γ1 , . . . , γk ∈ G (which we shall see
as elements of G ⋉ V , by identifying G with the stabiliser of R0 ), such that:
(i) Every γi is of type X0 (this is (H1)).
(ii) For any two indices i, i′ and signs σ, σ ′ such that (i′ , σ ′ ) 6= (i, −σ), the spaces
Vγ≥σ and V ≤σ′ are transverse.
i
γi′
(iii) Any single γi generates a Zariski-connected group.
(iv) All of the γi generate together a Zariski-dense subgroup of G.
70
Since in our case t is finite, Benoist’s item (v) is not relevant to us.
A comment about item (i): we actually get not only that every γi is of type X0 ,
but also that every γi is R-regular.
A comment about item (ii): since we have taken Benoist’s Γ to be the whole
group G, we have θ = Π, so that YΓ is the complete flag variety G/P + . Benoist’s
conclusion can then be restated by saying that the pair of cosets
(φg P + , φh P − )
(where φg and φh are respective canonizing maps of g and h as defined by us in
Proposition 4.16) is in the open G-orbit of G/P + ×G/P − . Once again it is actually
stronger than our conclusion, which is equivalent to saying that the pair of cosets
(φg PX+0 , φh PX−0 )
is in the open G-orbit of G/PX+0 × G/PX−0 .
• Clearly, every pair of transverse spaces is C-non-degenerate for some finite C; and
here we have a finite number of such pairs. Hence if we choose some suitable value
of C (which we fix for the rest of this proof), the hypothesis (H2) becomes a direct
consequence of the condition (ii) above.
• From condition (iii) (Zariski-connectedness), it follows that any algebraic group
containing some power γiN of some generator must actually contain the generator γi
itself. This allows us to replace every γi by some power γiN without sacrificing condition (iv) (Zariski-density). Clearly, conditions (i), (ii) and (iii) are then preserved
as well. If we choose N large enough, we may suppose that the numbers s(γi±1 ) are
as small as we wish: this gives us (H3). In fact, we shall suppose that for every i,
we have s(γi±1 ) ≤ sMain (C) for an even smaller constant sMain (C), to be specified
soon.
• To satisfy (H4), we replace the maps γi by the maps
gi := τφ−1 (M0 ) ◦ γi
i
(10.2)
(for 1 ≤ i ≤ k), where φi is a canonizing map for γi .
We need to check that this does not break the first three conditions. Indeed, for
every i, we have γi = ℓ(gi ); even better, since the translation vector φ−1
i (M0 )
=
lies in the subspace Vγi stable by γi , obviously the translation commutes with γi ,
≥
≥
hence gi has the same geometry as γi (meaning that A≥
gi = Aγi = Vγi ⊕ R0 and
≤
≤
≤
Agi = Aγi = Vγi ⊕ R0 ). Hence the gi still satisfy the hypotheses (H1) and (H2),
but now we have M (gi ) = M0 (this is (H4)). As for contraction strength, we have,
by Lemma 5.8:
s(gi ) .C s(γi )kτM0 k
≤ sMain (C)kτM0 k,
71
(10.3)
and similarly for gi−1 . Recall that kM0 k = 2ε8.1 (2C), hence kτM0 k depends only
on C: in fact it is equal to the norm of the 2-by-2 matrix 01 kM10 k . It follows that
if we choose
−1
1 2ε8.1 (2C)
,
(10.4)
sMain (C) ≤ s9.2 (C)
0
1
then the hypothesis (H3) is satisfied.
We conclude that the group generated by the elements g1 , . . . , gk acts properly
discontinuously (by Lemma 10.3), is free (by the same result), nonabelian (since
k ≥ 2), and has linear part Zariski-dense in G.
References
[Abe01] H. Abels. Properly discontinuous groups of affine transformations, a survey.
Geom. Dedicata, 87:309–333, 2001.
[AMS02] H. Abels, G.A. Margulis, and G.A. Soifer. On the Zariski closure of the linear
part of a properly discontinuous group of affine transformations. J. Differential
Geometry, 60:315–344, 2002.
[AMS13] H. Abels, G.A. Margulis, and G.A. Soifer. The Auslander conjecture for dimension less than 7. Preprint, arXiv:1211.2525, 2013.
[Aus64]
L. Auslander. The structure of compact locally affine manifolds. Topology,
3:131–139, 1964.
[Ben96]
Y. Benoist. Actions propres sur les espaces homogènes réductifs. Annals of
Mathematics, 144:315–347, 1996.
[Ben97]
Y. Benoist. Propriétés asymptotiques des groupes linéaires. Geom. and funct.
anal., 7:1–47, 1997.
[BQ]
Y.
Benoist
and
J.-F.
Quint.
Random
walks
on
ductive groups.
Ergebnisse.
To appear;
available
http://www.math.u-psud.fr/~benoist/prepubli/15walk.pdf.
[BT65]
A. Borel and J. Tits. Groupes réductifs. Publications Mathématiques de l’IHÉS,
27:55–151, 1965.
[BT72]
A. Borel and J. Tits. Compléments à l’article “ Groupes réductifs ”. Publications
Mathématiques de l’IHÉS, 41:253–276, 1972.
[DGK]
J. Danciger, F. Guéritaud, and F. Kassel. Proper affine action of right-angled
Coxeter groups. In preparation.
[Ebe96]
P.B. Eberlein. Geometry of Nonpositively Curved Manifolds. University of
Chicago Press, 1996.
72
reat
[FG83]
D. Fried and W.M. Goldman. Three-dimensional affine crystallographic groups.
Adv. in Math., 47:1–49, 1983.
[Hal15]
B.C. Hall. Lie Groups, Lie Algebras and Representations: An Elementary
Introduction. Springer International Publishing, second edition, 2015.
[Hel08]
S. Helgason. Geometric Analysis on Symmetric Spaces. Amer. Math. Soc.,
second edition, 2008.
[Kna96] A.W. Knapp. Lie Groups Beyond an Introduction. Birkhaüser, 1996.
[Mar83] G.A. Margulis. Free properly discontinuous groups of affine transformations.
Dokl. Akad. Nauk SSSR, 272:937–940, 1983.
[Mar87] G.A. Margulis. Complete affine locally flat manifolds with a free fundamental
group. J. Soviet Math., 134:129–134, 1987.
[Mil77]
J. Milnor. On fundamental groups of complete affinely flat manifolds. Adv. in
Math., 25:178–187, 1977.
[Smi14]
I. Smilga. Fundamental domains for properly discontinuous affine groups.
Geom. Dedicata, 171:203–229, 2014.
[Smi16]
I. Smilga. Proper affine actions on semisimple Lie algebras. Annales de l’Institut
Fourier, 66(2):785–831, 2016.
[Tit71]
J. Tits. Représentations linéaires irréductibles d’un groupe réductif sur un
corps quelconque. Journ. Reine Angw. Math., 247:196–220, 1971.
73
| 4math.GR
|
Approximately Counting Triangles in Sublinear Time
arXiv:1504.00954v3 [cs.DS] 22 Sep 2015
Talya Eden∗
Amit Levi†
Dana Ron‡
C. Seshadhri
§
Abstract
We consider the problem of estimating the number of triangles in a graph. This problem
has been extensively studied in both theory and practice, but all existing algorithms read the
entire graph. In this work we design a sublinear-time algorithm for approximating the number
of triangles in a graph, where the algorithm is given query access to the graph. The allowed
queries are degree queries, vertex-pair queries and neighbor queries.
We show that for any given approximation parameter 0 < ǫ < 1, the algorithm provides
an estimate b
t such that with high constant probability, (1 − ǫ) · t < b
t < (1 + ǫ) · t, where t is
the
number
of
triangles
in
the
graph
G.
The
expected
query
complexity
of the algorithm is
n
o
m3/2
n
+ min m, t
· poly(log n, 1/ǫ), where n is the number of vertices in the graph and
t1/3
3/2
n
· poly(log n, 1/ǫ). We
m is the number of edges, and the expected running time is t1/3
+ mt
n
o
n
m3/2
also prove that Ω t1/3 + min m, t
queries are necessary, thus establishing that the query
complexity of this algorithm is optimal up to polylogarithmic factors in n (and the dependence
on 1/ǫ).
∗
School of Computer Science, Tel Aviv University, [email protected]
School of Electrical Engineering, Tel Aviv University, [email protected]
‡
School of Electrical Engineering, Tel Aviv University, [email protected]. This research was partially supported
by the Israel Science Foundation grant No. 671/13 and by a grant from the Blavatnik fund.
§
University of California, Santa Cruz, [email protected]
†
1
Contents
1 Introduction
1.1 Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2 Overview of the algorithm . . . . . . . . . . . . . . . . . . . . . . .
1.2.1 A simple oracle-based procedure for a 1/3-estimate . . . . .
1.2.2 Assigning weights to triangles so as to improve the estimate
1.2.3 Deciding whether
a vertex is heavy . . . . . . . . . . . . . .
P
1.2.4 Estimating v∈S wt(v) . . . . . . . . . . . . . . . . . . . .
1.3 A high level discussion of the lower bound . . . . . . . . . . . . . .
1.4 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.4.1 Approximating graph parameters in sublinear time . . . . .
1.4.2 Triangle counting . . . . . . . . . . . . . . . . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
2 Preliminaries
3 The
3.1
3.2
3.3
3.4
6
Algorithm
Heavy and light vertices . . . . . . . . . . . . . . .
A procedure for deciding whether a vertex is heavy
Estimating the number of triangles given m and t .
The final algorithm . . . . . . . . . . . . . . . . . .
4 A Lower Bound
4.1 A lower bound for t = m . . . . . . . . . . .
4.1.1 The lower-bound construction . . . .
4.1.2 Definition of the processes P1 and P2
4.1.3 The auxiliary graph for t = m . . . .
4.1.4 Statistical distance . . . . . . . . . .
4.2 A lower bound for m < t < m3/2 . . . . . .
4.2.1 The lower-bound construction . . . .
4.2.2 The processes P1 and P2 . . . . . . .
4.2.3 The auxiliary graph . . . . . . . . .
4.2.4 Statistical distance . . . . . . . . . .
√
4.3 A lower bound for m ≤ t ≤ 14 m . . . . . .
4.3.1 The lower-bound construction . . . .
4.3.2 The processes P1 and P2 . . . . . . .
4.3.3 The auxiliary graph . . . . . . . . .
4.3.4 Statistical distance . . . . . . . . . .
√
4.4 Lower Bound for t < 14 m. . . . . . . . . .
4.4.1 The construction . . . . . . . . . . .
4.4.2 The processes P1 and P2 . . . . . . .
4.4.3 The auxiliary graph . . . . . . . . .
4.4.4 Statistical distance . . . . . . . . . .
4.5 Wrapping things up . . . . . . . . . . . . .
2
2
3
3
3
3
4
5
5
5
5
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
7
7
9
11
15
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
17
20
20
20
23
24
28
28
28
28
29
30
30
30
31
32
35
35
37
37
38
38
1
Introduction
Counting the number of triangles in a graph is a fundamental algorithmic problem. In the study
of complex networks and massive real-world graphs, triangle counting is a key operation in graph
analysis for bioinformatics, social networks, community analysis, and graph modeling [HL70, Col88,
Por00, EM02, MSOI+ 02, Bur04, BBCG08, FWVDC10, BHLP11, SKP12]. In the theoretical
computer science community, the primary tool for counting the number of triangles is fast matrix multiplication [IR78, AYZ97, BPWZ14]. On the more applied side, there is a plethora of
provable and practical algorithms that employ clever sampling methods for approximate triangle counting [CN85, SW05b, SW05a, Tso08, TKMF09, Avr10, KMPT12, CC11, SV11, TKM11,
AKM13, SPK13, TPT13]. Triangle counting has also been a popular problem in the streaming
setting [BYKS02, JG05, BFL+ 06, AGM12, KMSS12, JSP13, PTTW13, TPT13, ADNK14].
All these algorithms read the entire graph, which may be time consuming when the graph is
very large. In this work, we focus on sublinear algorithms for triangle counting. We assume the
following query access to the graph, which is standard for sublinear algorithms that approximate
graph parameters. The algorithm can make: (1) Degree queries, in which the algorithm can query
the degree dv of any vertex v. (2) Neighbor queries, in which the algorithm can query what vertex
is the ith neighbor of a vertex v, for any i ≤ dv . (3) Vertex-pair queries, in which the algorithm
can query for any pair of vertices v and u whether (u, v) is an edge.
Gonen et al. [GRS11], who studied the problem of approximating the number of stars in a
graph in sublinear time, also considered the problem of approximating the number of triangles in
sublinear time. They proved that there is no sublinear approximation algorithm for the number
of triangles when the algorithm is allowed to perform degree and neighbor queries (but not pair
queries). 1
They asked whether a sublinear algorithm exists when allowed vertex-pair queries in addition
to degree and neighbor queries. We show that this is indeed the case.
1.1
Results
Let G be a graph with n vertices, m edges, and t triangles. We describe an algorithm that, given
an approximation parameter 0 < ǫ < 1 and query access to G, outputs an estimate b
t, such that
with high constant probability (over the randomness of the algorithm), (1 − ǫ) · t ≤ b
t ≤ (1 + ǫ) · t.
The expected query complexity of the algorithm is
(
)!
n
m3/2
+ min m,
· poly(log n, 1/ǫ) ,
t
t1/3
3/2
n
+ mt
and its expected running time is t1/3
· poly(log n, 1/ǫ). We show that this result is almost
optimal by proving that the number of queries performed by any multiplicative-approximation
algorithm for the number of triangles in a graph is
(
)!
m3/2
n
Ω 1/3 + min m,
.
t
t
1
To be precise, they showed that there exist two families of graphs over m = Θ(n) edges, such that all graphs in
one family have Θ(n) triangles, all graphs in the other family have no triangles, but in order to distinguish between
a random graph in the first family and random graph in the second family, it is necessary to perform Ω(n) degree
and neighbor queries.
2
1.2
Overview of the algorithm
For the sake of clarity, we suppress any dependencies on the approximation parameter ǫ and on
log n using the notation O∗ (·).
1.2.1
A simple oracle-based procedure for a 1/3-estimate
First, let us assume access to an P
oracle that, given a vertex v, returns tv , the number of triangles that
v is incident to. Note that t = v tv /3. An unbiased estimate is obtained
by sampling, uniformly
P
at random, a (multi-)set S of s vertices, and outputting tS = 31 · ns · v∈S tv . Yet this estimate can
have extremely large variance (consider the “wheel” graph where there is one vertex with tv = Θ(n)
and all other tv ’s are constant). Inspired by work on estimating the average degree [Fei06, GR08],
we can reduce the variance by simply “cutting off” the contribution of vertices v for which tv is
above a certain threshold. Call such vertices heavy, and denote the remaining light. If the threshold
is set to Θ(t2/3 /ǫ1/3 ), then the number of heavy vertices is O((ǫt)1/3 ). This implies that the total
number of triangles in which all three endpoints are heavy is O(ǫt).
Hence, suppose we define e
tv to be tv if tv ≤ t2/3 /ǫ1/3 and 0 otherwise, and consider e
tS =
1 n P
e
e
t
.
We
can
argue
that
E[
t
]
∈
[(1/3
−
ǫ)t,
t],
since
(roughly
speaking)
every
triangle
·
·
v
S
v∈S
3 s
that contains at least one light vertex is counted at least once. Since e
tv ranges
0 and
between
n
2/3
1/3
∗
t /ǫ , by applying the multiplicative Chernoff bound, a sample of size s = O t1/3 is sufficient
to ensure that with high constant probability e
tS is in the range 1 − 2ǫ · t, (1 + ǫ) · t .
3
1.2.2
Assigning weights to triangles so as to improve the estimate
To improve the approximation, we assign weights to triangles inversely proportional to the number
of their light endpoints (rather than assigning a uniform weight of 31 as is done when defining
P
e
tS = ns · v∈S 31 · e
tv ). If for each light vertex v we let wt(v) be the sum over the weights of all
triangles that
v participates in and for each heavy vertex v we let wt(v) = e
tv = 0, then the expected
n P
value of s · v∈S wt(v) is in [(1 − O(ǫ)) · t, (1 + O(ǫ)) · t].
To get rid of the fictitious oracle, we must resolve two issues. The first P
issue is efficiently deciding
n
whether a vertex is heavy or light, and the second is approximating s · v∈S wt(v), assuming we
have a procedure for deciding whether a vertex is heavy or light. We next discuss each of these two
issues. For convenience, we will assume that the algorithm already has constant factor estimates
for m and t. This can be removed by approximating m and performing a geometric search on t.
1.2.3
Deciding whether a vertex is heavy
Let v be a fixed vertex with degree dv . Consider an edge e incident to v, and let u be the other
endpoint of this edge. Let te denote the number of triangles that e belongs to. Consider the random
variable Y defined by selecting, uniformly at random, a neighbor w of u, and setting Y = du if (v, w)
is an edge (so that (v, u, w) is a triangle) and Y = 0 otherwise. Since the number of neighbors
of u that form a triangle with v is te , the expected value of Y is dteu · du = te . Now consider
selecting (uniformly at random) several edges incident to v, denoted e1 , . . . , er , and for each
edge
1 Pr
ej selected, defining the corresponding random variable Yj . Then the expected value of r j=1 Yj
P
is d1v · e=(v,u) te = d2v · tv . If we multiply by dv /2, then we get an unbiased estimator for tv , which
in particular can indicate whether v is heavy or light.
However, once again the difficulty is with the variance of this estimator and the implication
on the complexity of the resulting decision procedure. To address these difficulties we modify
3
the procedure described above as follows. First, if dv is above a certain
threshold, then v is also
1/3
considered heavy (where this threshold is of order O m/(ǫt)
, so that the total number of
triangles in which all three endpoints are heavy remains O(ǫt). Second, observe that when trying
to estimate the number of triangles that an edge ej = (v, xj ) participates in, we can either select
a random neighbor w of v and check whether (xj , w) ∈ E, or we can select a random neighbor
w of xj and check whether (v, w) ∈ E. Since it is advantageous for the sake of the complexity
to consider the endpoint that has a smaller degree, we do the following. Each time we select an
edge ej = (v, xj ) incident to v, we let uj be the endpoint of ej that has smaller degree. If duj is
√
√
relatively large (larger than m), then we select k = ⌈duj / m⌉ neighbors of uj and let Yj equal
duj times the fraction among these neighbors that close a triangle with ej . The setting of k implies
√
a bound on the variance of Yj (conditioned on the choice of ej ), which is m times its expected
value, tej . Third, in order to bound the variance due to the random choice of edges ej incident to
v, we do the following. We assign each triangle that v participates in to a unique edge incident to
v and modify the definition of te to be the number of such triangles that are assigned to e. The
√
assignment is such that te is always upper bounded by O( m). Finally, we perform a standard
median selection over O(log n) repetitions of the procedure.
Our analysis shows
it suffices to set r (the number of random edges incident to v that are
3/2that
m
so as to ensure the correctness of the procedure (with high probability).
selected) to be O∗ t
In the analysis of the expected query complexity and running time of the procedure we have to
√
take into account the number of iterations k = ⌈duj / m⌉ for each selected (lower degree endpoint)
uj and argue that for every vertex v, the expected number of these iterations is a constant.
1.2.4
Estimating
P
v∈S
wt(v)
n
s
4
·
P
wt(v) is indeed in
[(1− O(ǫ)) ·
n
∗
t, (1 + O(ǫ)) · t] (which we know occurs with high probability if we select s = O t1/3
vertices
uniformly at random). Consider the set of edges incident to vertices in S, where we view edges as
directed, so that if there is an edge between v and v ′ that both belong to S, then (v, v ′ ) and (v ′ , v)
are considered
P as two different edges. We denote this set of edges by ES , and their number by dS ,
where dS = v∈S dv . Suppose that for each edge e = (v, x) we assign a weight wt(e), which is the
sum of the weights of all triangles that v participates in and are assigned to e (where the weight
of
as defined previously based on the number of light endpoints that it has). Then
P a triangle is P
wt(e)
=
v∈S wt(v).
e∈ES
The next idea is to sample edges in ES uniformly at random, and for each selected edge e = (v, u)
to estimate wt(e). An important observation is that since we can query the degrees of all vertices
in S, we can efficiently select uniform random edges in ES (as opposed to the more difficult task
of selecting random edges from the entire graph). Similarly to what was described in the decision
procedure for heavy vertices, given an edge e ∈ ES we let u be its endpoint that has smaller degree.
√
We then select ⌈ m/du ⌉ random neighbors of u and for each check whether it closes a triangle with
e. For each triangle found that is assigned to e, we check how many heavy endpoints it has (using
the aforementioned procedure for detecting heavy vertices) so as to compute the weight
of the
1 P
triangle. In this manner we can obtain random variables whose expected value is dS v∈S wt(v),
√
and whose variance is not too large (upper bounded
3/2by
m times this expected value). We can
now take an average over sufficiently many (O ∗ m t ) such random variables and multiply by
dS · n. By upper bounding the probability that dS is much larger than its expected value we can
prove that the output of the algorithm is as desired. The expected query complexity and running
Suppose we have a (multi-)set S of vertices such that
v∈S
time of the algorithm are shown to be O ∗
n
t1/3
+
m3/2
t
3/2
.
3/2
Finally we note that if t < m1/2 so that m t > m, then we can replace m t with m in the
upper bound on the query complexity since we can store all queried edges so that no edge needs to
be queried more than twice (once from each endpoint).
1.3
A high level discussion of the lower bound
n
queries is fairly
Proving that every multiplicative-approximation algorithm must perform Ω t1/3
n
o
3/2
straightforward, and our main focus is on proving that Ω min m, m t
queries are necessary
as well. In order to prove this claim we define, for every n, every 1 ≤ m ≤ n2 and every
1 ≤ t ≤ min{ n3 , m3/2 }, a graph G1 and a family of graphs G2 for which the following holds:
(1) The graph G1 and all the graphs in G2 have n vertices and m edges. (2) In G1 there are no
triangles, while the number of triangles
in each graph G ∈ G2 is Θ(t). We prove that for values of t
√
m3/2
queries are required in order to distinguish with high constant
such that t ≥ m, at least Ω t
probability between G1 and a random graph in G2 . We then prove that for values of t such that
√
t < m, at least Ω(m) queries are required for this task. We give three different constructions for
G1 and G2 depending on the value of t as a function of m (where two of the constructions are for
√
subcases of the case that t ≥ m). For further discussion of the lower bound, see Section 4.
1.4
1.4.1
Related Work
Approximating graph parameters in sublinear time
We build on previous work on approximating the average degree of a graph and the number of
stars [Fei06, GR08, GRS11]. Feige [Fei06] investigated the problem of estimating the average degree of a graph, denoted d, when given query access
q to thedegrees of the vertices. By performing
n/d/ǫ queries are sufficient in order to oba careful variance analysis, Feige proved that O
tain a ( 21 − ǫ)-approximation of d. He also proved that a better approximation ratio cannot be
achieved in sublinear time using only degree queries. The same problem was considered by Goldreich and
[GR08]. Goldreich and Ron proved that a (1 + ǫ)-approximation can be achieved
q Ron
√
n/ d · poly(log n, 1/ǫ) queries, if neighbor queries are also allowed.
with O
Building on these ideas, Gonen et al. [GRS11] considered the problem of approximating the
number of s-stars in a graph. Their algorithm only used neighbor and degree queries. A major
difference between stars and triangles is that the former are non-induced subgraphs, while the
latter are. Additional work on sublinear algorithms for estimating other graph parameters include
those for approximating the size of the minimum weight spanning tree [CRT05, CS09, CEF+ 05],
maximum matching [NO08, YYI09] and of the minimum vertex cover [PR07, NO08, MR09, YYI09,
HKNO09, ORRR12].
1.4.2
Triangle counting
Triangle counting has a rich history. A classic result of Itai and Rodeh showed that triangles
can be enumerated in O(m3/2 ) time, and a more elegant algorithm was given by Chiba and
Nishizeki [CN85]. The connections to matrix multiplication have been exploited for faster theoretical algorithms [IR78, AYZ97, BPWZ14]. In practice, there is a diverse body on work on
5
counting triangles using different techniques, for different models. There are serial algorithms based
on eigenvalue methods [Tso08, Avr10], graph sparsification [TDM+ 09, KMPT12, TKM11, PT12],
and sampling paths [SW05b, SPK13]. Triangle counters have been given for MapReduce [Coh09,
SV11, KPP+ 13]; external memory models [CC11]; distributed settings [AKM13]; semi-streaming
models [BBCG08, KMPT12]; one-pass streaming [BYKS02, JG05, BFL+ 06, AGM12, KMSS12,
JSP13, PTTW13, TPT13, ADNK14]. It is worth noting that across the board, all these algorithms
required reading the entire graph.
Most relevant to our work are various sampling algorithms, that set up a random variable whose
expectation is directly related to the triangle count [SW05b, KMPT12, JG05, BFL+ 06, SPK13,
JSP13, PTTW13, TPT13, ADNK14]. Typically, this involves sampling some set of vertices or edges
to get a set of three vertices. The algorithm checks whether the sampled set induces a triangle, and
uses the probability of success to estimate the triangle count. We follow the basic same philosophy.
But it is significantly more challenging to set up the “right” random experiment, since we cannot
read the entire graph.
2
Preliminaries
Let G = (V, E) be a simple graph with |V | = n vertices and |E| = m edges. For a vertex v ∈ V ,
we denote by dv the degree of the vertex, by Γv the set of v’s neighbors, and by Ev the set of edges
incident to v. We denote by Tv the set of triangles incident to the vertex v, and let tv = |Tv |.
Similarly, the set of triangles in the graph G is denoted by T , and the number of triangles in the
graph in denote by t. We use c, c1 , . . . to denote sufficiently large constants.
We consider algorithms that can sample uniformly in V and perform three types of queries:
1. Degree queries, in which the algorithm may query for the degree dv of any vertex v of its
choice.
2. Neighbor queries, in which the algorithm may query for the ith neighbor of any vertex v of
its choice. If i > dv , then a special symbol (e.g. †) is returned. No assumption is made on
the order of the neighbors of any vertex.
3. Pair queries, in which the algorithm may ask if there is an edge (u, v) ∈ E between any pair
of vertices u and v.
We sometimes use set notations for operations on multisets. We use the notation O∗ (·) to suppress
dependencies on the approximation parameter ǫ or on log n.
We use the following variant of the multiplicative Chernoff bound. Let χ1 , . . . , χr be r independent random variables, such that χi ∈ [0, B] for some B > 0 and E[χi ] = b for every 1 ≤ i ≤ r. For
every γ ∈ (0, 1] the following holds:
#
" r
2
γ ·b·r
1X
χi > (1 + γ)b < exp −
,
(1)
Pr
r
3B
i=1
and
#
2
r
γ ·b·r
1X
χi < (1 − γ)b < exp −
.
Pr
r
2B
"
(2)
i=1
We will also make an extensive use of Chebyshev’s inequality: For a random variable X and for
γ > 0,
Var[X]
.
Pr [|X − E[X]| ≥ γ] ≤
γ2
6
We fix a total order on vertices denoted by ≺ as follows: u ≺ v if du < dv or du = dv and u < v
(in terms of id number). Given u and v, two degree queries suffice to decide their ordering.
√
Claim 1. Fix any vertex v. The number of neighbors w of v such that v ≺ w is at most 2m.
Proof. P
Let S = {w|w ∈ Γv , v ≺ w}.
√ Naturally, dv ≥ |S|. By definition of ≺, ∀w ∈ S, dw ≥ dv ≥ |S|.
Thus, w∈S dw ≥ |S|2 and |S| ≤ 2m.
3
The Algorithm
We start by introducing the notions of heavy and light vertices and how they can be utilized
in the context of estimating the number of triangles. We then give a procedure for deciding
(approximately) whether a vertex is heavy or light. Using this procedure we give an algorithm for
estimating the number of triangles based on the following assumption (which is later removed).
Assumption 1. Our initial algorithm takes as input estimates t and m on the number of edges
and triangles in the graph respectively, such that
1. t/4 ≤ t ≤ t.
2. m/6 ≤ m.
Assumption 1 can be easily removed by performing a geometric search on t and using the
algorithm from [Fei06] to approximate m, as explained precisely in the proof of Theorem 13.
For every vertex v, we view the set of edges Ev as directed edges originating from v. We then
associate each triangle (v, x, w) ∈ Tv with a unique edge e ∈ Ev , as defined next.
−−−→
Definition 1. We say that a triangle (v, x, w) ∈ Tv is associated with the directed edge (v, x) if
−−−→
−−−→
→
→
x ≺ w, and to (v, w) otherwise. For a directed edge −
e = (v, x) we let T−
e denote the set of triangles
that it is associated with, that is, the set of triangles (v, x, w) such that x ≺ w.
Since it will always be clear from the context from which vertex an edge we consider originates,
for the sake of succinctness, we drop the
Pdirected notation and use the notation Te . We let te = |Te |,
te .
and for a fixed vertex v, we get tv =
e∈Ev
In all the follows we assume that ǫ < 1/2, and otherwise we run the algorithm with ǫ = 1/2.
3.1
Heavy and light vertices
Definition 2. We say that a vertex v is heavy if dv >
dv ≤
2m
(ǫt)1/3
and tv ≤
2/3
t
,
2ǫ1/3
2m
(ǫt)1/3
or if tv >
2/3
2t
ǫ1/3
. If v is such that
then we say that v is light.
We shall say that a partition (H, L) of V is appropriate (with respect to m and t) if every heavy
vertex belongs to H and every light vertex belongs to L.
Note that for an appropriate partition (H, L) both H and L may contain vertices that are
neither heavy nor light (but no light vertex belongs to H and no heavy vertex belongs to L).
For a fixed partition (H, L) we associate with each triangle ∆ a weight depending on the number
of its endpoints that belong to L.
7
Definition 3. For a triangle ∆ we define its weight wtL (∆) to be
(
0
if no endpoints of ∆ belong to L
wtL (∆) =
1/ℓ if ∆ has ℓ > 0 endpoints that belong to L .
Whenever it is clear for the context, we drop the subscript L and use the notation wt(·) instead
of wtL (·).
Claim 2. If (H, L) is appropriate and Assumption 1 holds, then the number of triangles with weight
0 is at most cH · ǫt for some constant cH .
Proof. By Assumption 1, the number of vertices v such that dv is greater than (2m/(ǫt)1/3 , is at
2/3
most 2m/(2m/(ǫt)1/3 ) ≤ 6(ǫt)1/3 , and the number of vertices v such that tv > 2t /ǫ1/3 is at most
1/3
2/3
< 2000ǫt triangles with all three
3t/(2t /ǫ1/3 ) ≤ 6(ǫt)1/3 . Therefore, there are at most 12(ǫt)
3
endpoints in H. Setting cH = 2000 completes the proof.
P
wt(∆). For a vertex v ∈ L we
Definition 4. For any set T of triangles we define wt(T ) =
∆∈T
P
wt(∆), and wt(v) = 0 for v ∈ H.
define wt(v) =
∆∈Tv
P
wt(v) ≤ t. If (H, L) is appropriate and Assumption 1
Lemma 3. For any partition (H, L),
v∈L
P
wt(v) ∈ [t(1 − cH · ǫ), t].
holds, then
v∈L
Proof. Let χ(v, ∆) be an indicator variable such that χ(v, ∆) = 1 if ∆ contains the vertex v, and
χ(v, ∆) = 0 otherwise. Consider a triangle ∆ that contains ℓ > 0 light vertices. Then
X
χ(v, ∆) = ℓ = 1/wt(∆) .
v∈L
If ℓ = wt(∆) = 0, then the above expression equals 0. By interchanging summations,
X
X
X
X X
wt(∆) =
wt(∆)
χ(v, ∆) = t − |{∆ | wt(∆) = 0}|.
wt(v) =
v∈L
∆∈T
v∈L ∆∈Tv
v∈L
Clearly for any partition (H, L) the above expression is at most t. On the other hand, If (H, L) is
appropriate and Assumption 1 holds, then by Claim 2 we have that |{∆ | wt(∆) = 0}| ≤ cH · ǫt,
and the lemma follows.
1/3
Theorem 4. Let s = (c log(n/ǫ)/ǫ3 )n/t
where c is a constant, and let S be a sample of s vertices
v1 , v2 , . . . , vs that are selected uniformly, independently at random. Then
" s
#
1X
t
E
wt(vi ) ≤ .
s
n
i=1
Furthermore, if (H, L) is appropriate and Assumption 1 holds, then
" s
#
1X
E
wt(vi ) ∈ [t(1 − cH · ǫ)/n, t/n]
s
i=1
and for a sufficiently large constant c,
#
" s
1X
wt(vi ) < t(1 − 2cH · ǫ)/n < ǫ2 /n .
Pr
s
i=1
8
s
P
Proof. Let Y denote the random variable Y = 1s
wt(vi ). By the first part of Lemma 3,
i=1
s
P
E 1s
wt(vi ) ≤ t/n. Now assume that (H, L) is appropriate and Assumption 1 holds. The
i=1
claim regarding the expected value of Y follows from the second part of Lemma 3, so it remains to
prove the claim regarding the deviation from the expected value. Note that wt(v) ≤ tv for every
vertex v, which for v ∈ L is at most
Assumption 1,
2/3
2t
ǫ1/3
. By the multiplicative Chernoff bound and by Item 1 in
ǫ2 E[Y ]s
Pr [Y < (1 − ǫ)E[Y ]] < exp − 2/3 1/3
4t /ǫ
< exp −
ǫ2 · c log(n/ǫ)(n/ǫt
4t
2/3
1/3
/ǫ1/3
) · t/(2n)
!
<
ǫ2
,
n
where the last inequality holds for a sufficiently large constant c.
3.2
A procedure for deciding whether a vertex is heavy
In this subsection we provide a procedure for deciding (approximately) whether a given vertex v is
heavy or light. Recall that a high-level description of the procedure appears in Subsection 1.2.3 of
the introduction.
Heavy(v)
1. If dv > 2m/(ǫt)1/3 , output heavy.
2. For i = 1, 2, . . . , 10 log n:
(a) For j = 1, 2, . . . , s = 20m3/2 /ǫ2 t:
i. Select an edge e ∈ Ev uniformly, independently and at random, and let u
be the smaller endpoint according
to the order ≺.
√
ii. For k = 1, 2, . . . , r = ⌈du / m⌉:
A. Pick a neighbor w of u uniformly at random. Let x denote the endpoint
of e that is not v.
B. If e andPw form a triangle and x ≺ w, set Zk = du , else Zk = 0.
iii. Set Yj = 1r
Zk .
k
P
Yj .
(b) Set Xi = dsv
j
3. If the median of the Xi variables is greater than t
light.
2/3
/ǫ1/3 , output heavy, else output
We have three nested loops, with loop variables i, j, k respectively. We refer to these as “iteration
i”, “iteration j”, and “iteration k”.
Lemma 5. For any iteration i, Pr[|Xi − tv | > ǫ · max(tv , tdv /m)] < 1/4.
Proof. Recall that we associate each
P triangle (v, x, w) ∈ Tv with (v, x) if x ≺ w and with (v, w)
otherwise, so that we have tv = e∈Ev te . For an edge e = (v, x), te is upper bounded by the
√
number of neighbors w of x such that x ≺ w. By Claim 1, te ≤ 2m.
Fix an iteration j and let ej denote the edge chosen in the j th iteration and uj denote its smaller
degree endpoint. We use Ej to denote the event of ej being chosen. Conditioned on the event Ej ,
the probability that Zk is non-zero is is tej /duj . Hence,
E[Zk | Ej ] =
te j
· duj = tej ,
duj
9
and
Var[Zk | Ej ] ≤ E[Zk2 | Ej ] ≤ duj · E[Zk | Ej ].
By linearity of expectation,
#
r
r
1X
1X
Zk | Ej =
E [Zk | Ej ] = tej .
E[Yj | Ej ] = E
r
r
"
k=1
(3)
k=1
By the independence of the Zk variables,
" r
#
r
r
1X
1 X
1 X
Var[Yj | Ej ] = Var
Var [Zk | Ej ] ≤ 2
duj · E [Zk | Ej ]
Zk | Ej = 2
r
r
r
k=1
k=1
k=1
√
du
= 2j · r · tej ≤ m · tej .
r
(4)
The conditioning can be removed to yield
E[Yj ] =
X 1
tv
1 X
te = .
· E[Yj | Ej ] =
·
dv
dv
dv
e∈Ev
By the law of total variance, the law of total expectation, the bounds tej ≤
by Equations (3) and (4):
Let Y =
1
s
P
(5)
e∈Ev
√
2m and m ≤ 6m, and
Var[Yj ] = Eej [Var [Yj | Ej ]] + Varej [E [Yj | Ej ]]
h√
i
≤ Eej
m · E [Yj | Ej ] + Varej [tej ]
√
= m · E [Yj ] + Eej [t2ej ]
√
1 X 2
= m · E [Yj ] +
te j
·
dv
ej ∈Ev
√
√
√
≤ m · E [Yj ] + 2m · E[Yj ] < 5 mE[Yj ] .
(6)
Yj . By Equation (5), E[Y ] = tv /dv . By Equation (6),
j
√
s
s
s
X
X
X
√
5 m
1
1
1
Var[Y ] = Var
Var[Yj ] < 2
5 m · E [Yj ] =
Yj = 2
·E
Yj
s
s
s
s
s
j=1
j=1
j=1
j=1
√
√
2
5 m · (tv /dv )
5 m
ǫ tv t
=
=
E Y =
·
·
.
(7)
3/2
2
s
4 dv m
20 · m /ǫ t
s
1X
By Chebyshev’s inequality and Equation (7),
tv t
Var[Y ]
1
tv
Pr Y −
> ǫ · max
,
≤ 2
< .
2
dv
dv m
4
ǫ max(tv /dv , t/m)
Since Xi = dv · Y , we have that Pr[|Xi − tv | > ǫ · max(tv , tdv /m)] < 1/4.
Lemma 6. For every vertex v, if v is heavy, then a call to Heavy(v) returns heavy with probability
at least 1−1/n2 . If v is light, then a call to Heavy(v) returns light with probability at least 1−1/n2 .
10
Proof. First consider a heavy vertex v. Clearly, if dv > 2m/(ǫt)1/3 , then v is declared heavy.
2/3
2/3
Therefore, assume that tv > 2t /ǫ1/3 and dv ≤ 2m/(ǫt)1/3 , so that tdv /m ≤ 2t /ǫ1/3 , and hence
max(tdv /m, tv ) = tv . By Lemma 5, and since ǫ <≤ 1/2, for any iteration i, Pr [|Xi − tv | > ǫtv ] <
2/3
1/4. Therefore, Pr[Xi < t /ǫ1/3 ] < 1/4, and by Chernoff, the probability that the median of the
2/3
Xi variables (where i = 1, . . . , 10 log n) will be greater than t /ǫ1/3 is at least 1 − 1/n2 . Hence
Heavy(v) outputs heavy with probability at least 1 − 1/n2 .
2/3
Now consider a light vertex v. Since dv ≤ 2m/(ǫt)1/3 and tv ≤ t /2ǫ1/3 , it holds that tdv /m ≤
2/3
2/3
2t /ǫ1/3 , implying that max(tdv /m, tv ) = tv ≤ 2t /ǫ1/3 . Therefore, by Lemma 5, Pr[|Xi − tv | >
2/3
2/3
ǫ(2t /ǫ1/3 )] < 1/4, and the probability that the median will be less than t /ǫ1/3 is at least
1 − 1/n2 . Hence v is declared light with probability at least 1 − 1/n2 .
The following is a corollary of Lemma 6.
Corollary 7. Consider running Heavy for all the vertices in the graph. Let H denote the set of
vertices that are declared heavy and let L denote the set of vertices that are declared light. Then,
with probability at least 1 − 1/n, the partition (H, L) is appropriate (as defined in Definition 2).
We now turn to analyze the running time of Heavy. The proof will be similar to the complexity
analysis of the exact triangle counter of Chiba and Nishizeki [CN85].
Lemma 8. If Item 2 in Assumption 1 holds, then for every vertex v the expected running time of
Heavy(v) is O ∗ (m3/2 /t).
Proof. We first argue that the expected time to generate a single sample of Yj is O(1). Our query
√
model allows for selecting an edge in Ev uniformly at random by√a single query. If dv ≤ m,
then the degree of the smaller endpoint for √
any e ∈ Ev is at most m. Hence a sample is clearly
generated in O(1) time.
√ Suppose that dv > m. If an edge e = (v, u) is sampled, then the runtime
is O(1 + min(dv , du )/ m). Hence, the expected runtime to generate Yj is, up to constant factors,
at most:
X
X
1
2m
1
min {dv , du }
1 X
√
du ≤ 1 + √
du ≤ 1 + √
≤ 5,
≤1+ √
1+
dv
m
m
·
d
m
·
d
m
·
d
v
v
v
u∈Γ
u∈Γ
u∈V
v
v
where the last inequality follows from Item 2 in Assumption 1
By the above, each iteration of the ‘for’ loop in Step 2a takes O(1) time in expectation. Therefore, together, all iterations of Step 2a take O(m3/2 /(ǫt)) time in expectation, and since it is repeated
O(log n) times, the expected running time of the procedure is (m3/2 /t) · poly(log n, 1/ǫ).
3.3
Estimating the number of triangles given m and t
We are now ready to present an algorithm Estimate-with-advice that takes m, t as input (“advice”), and outputs an estimate of t. Later, we employ the the average degree approximation
algorithm of Feige [Fei06] and a geometric search to get the bonafide algorithm that estimates t
without any initial estimates m and t. Recall that a high-level description of the procedure appears
in Subsection 1.2.4 of the introduction. In what follows we rely on the following assumption.
Assumption 2. We will assume that the random coins used by Heavy are fixed in advance, and
that the partition (H, L) as defined in Corollary 7 is indeed appropriate.
By Corollary 7 this assumption only adds 1/n to the error probability in all subsequent probability bounds. Recall that we use c, c1 , . . . to denote sufficiently large constants.
Recall that cH is the constant defined in Claim 2.
11
Estimate-with-advice(m, t, ǫ)
1/3
1. Sample s1 = c1 ǫ−3 log(n/ǫ)(n/t ) vertices, uniformly, independently and at random. Denote the chosen multiset S.
2. Set up a data structure to enable sampling vertices in S proportional to their degree.
3. For i = 1, 2, . . . , s2 = c2 ǫ−4 (log2 n)(m3/2 /t):
(a) Sample v ∈ S proportional to dv and sample e ∈ Ev uniformly at random. Let
u be the smaller endpoint according to the order ≺. Let x be the endpoint of
e that is√not v.
√
(b) If du √
≤ m, set r = 1√with probability du / m and set r = 0 otherwise. If
du > m, set r = ⌈du / m⌉.
(c) Repeat for j = 1, 2, . . . , r:
i. Pick a neighbor w of u uniformly at random.
ii. If e and w do not form a triangle, set Zj = 0.
iii. If e and w form a triangle and w ≺ x, set Zj = 0.
iv. If e and w form a triangle ∆ and x ≺ w: call Heavy for all vertices in ∆,
and let (
0
if Heavy(v) returned heavy
√
.
Zj =
max(du , m) · wt(∆) otherwise
r
P
(d) Set Yi = 1r
Zj . (If r = 0, set Yi = 0.)
j=1
s
2
P
P
n
dv ·
Yi .
4. Output X = s1 s2 ·
v∈S
i=1
Theorem 9. For X as defined in Step 4 of Estimate-with-advice, E[X] ≤ t. Moreover, if (H, L)
is appropriate and Assumption 1 holds, then E[X] ∈ [t(1 − cH · ǫ), t] and Pr[X < t(1 − 3cH · ǫ)] <
3ǫ/ log n.
There are three “levels” of randomness. First is the choice of S, second is the choice of e
(Step 3a), and finally the Zj ’s. When analyzing the randomness in any level, we condition on the
previous levels. Before proving the theorem, we present the following definition and claim.
P
wt(v)/s1 ≥ t(1 −
Definition 5. Let S be a multiset of s1 vertices. We say that S is good if
v∈S
P
dv ≤ s1 (2m/n)(log n/ǫ).
2cH · ǫ)/n. We say that S is great if, in addition to being good, dS =
v∈S
P
P
wt(v)
dv . For every i, E[Yi | S] = d−1
Claim 10. Fix the choice of the set S, and let dS =
S
v∈S
v∈S
√
and Var[Yi | S] < 5 m · E[Yi | S].
Proof. This is similar to the argument in Lemma 5. Let vi be the chosen vertex in the ith iteration of
the algorithm, and let ei be the chosen edge. We refer to this event by Ei , and condition over the set
S being chosen and the event Ei . Denote by ui the lower degree endpoint of ei . If Heavy(vi )=heavy,
then E[Y√
i | S, Ei ] = 0 and Var[Yi | S, Ei ] = 0. If Heavy(vi )=light, then there are two possibilities.
If dui ≤ m then,
du X 1 √
· m · wt(∆) = wt(Tei ) .
E[Yi | S, Ei ] = √ i
m ∆∈T dui
ei
12
Since the maximum value of Yi in this case is at most
√
m,
√
(8)
Var[Yi | S, Ei ] ≤ E[Yi2 | S, Ei ] ≤ m · E[Yi | S, Ei ] .
√
Now consider the case that dui > m. In order to bound the variance of the Yi variables we first
analyze the expectation and variance of the Zj variables. Note that Zj is non-zero when a triangle
∆ ∈ Tei is found. It holds that
E[Zj | S, Ei ] =
X
∆∈Tei
1
· dui · wt(∆) = wt(Tei ),
dui
and
Var[Zj | S, Ei ] ≤ dui · E[Zj | S, Ei ].
(9)
By linearity of expectation,
E[Yi | S, Ei ] = wt(Tei ).
By independence of the (Zj | S, Ei ) variables, linearity of expectation and Equation (9),
r
r
r
X
1 X
1 X
1
Var [Zj | S, Ei ] ≤ 2
dui · E [Zj | S, Ei ]
Zj | S, Ei = 2
Var[Yi | S, Ei ] = Var
r
r
r
j=1
j=1
j=1
r
X
√
du
1
= i · E
Zj | S, Ei ≤ m · E[Yi | S, Ei ].
(10)
r
r
j=1
We remove the conditioning on Ei :
E[Yi | S] =
X
X X
X dv 1 X
−1
wt(v) .
wt(T
)
=
d
wt(Te ) = d−1
·
e
S
S
dS dv
v∈S∩L
v∈S
v∈S∩L e∈Ev
e∈Ev
√
Recall that by Claim 1, wt(e) ≤ 2m. Therefore, by the law of total variance, the law of total
expectation, the bound m ≤ 6m, and Equations (8) and (10),
Var[Yi | S] = Eei [Var [Yi | S, Ei ]] + Varei [E [Yi | S, Ei ]]
i
h√
m · E [Yi | S, Ei ] + Eei [wt(Tei )2 ]
≤ Eei
√
√
√
m · E[Yi | S] + 2mEei [wt(Tei )] < 5 m · E[Yi | S] .
This completes the proof of Claim 10.
Proof of Theorem 9: For a fixed set S, let XS denote the sum XS =
n
s1 s2
P
v∈S
s
2
P
dv ·
Yi
i=1
(as defined in Step 4 of Estimate-with-advice), given that the set S in chosen in Step 1. By the
definition of XS and by Claim 10,
E[XS ] =
ndS
n X
E[Yi | S] =
wt(v).
s1
s1
v∈S
By Theorem 4, ES
1
s1
P
v∈S
wt(v) ∈ [t(1 − cH · ǫ)/n, t/n], implying that
E[XS ] ∈ [t(1 − cH · ǫ), t].
13
(11)
By Theorem 4, Definition 5 and Assumption 2, S
expected value, over S, of dS is Es [dS ] = s1 · 2m
n .
2m
PrS dS > s1 ·
n
is good with probability at least 1 − ǫ2 /n. The
By Markov’s inequality,
log n
ǫ
·
.
<
ǫ
log n
By taking a union bound, the probability that S is great is at least 1 − 2ǫ/ log n. For a fixed choice
s2
P
Yi . By the independence of the Yi variables and by Claim 10,
of S, let YS = s12
i=1
√
s2
s2
√
1 X
5 m
1 X
Var [Yi | S] < 2
5 m · E[Yi | S]=
Var [YS ] = 2
· E [YS ] .
s2
s2 i=1
s2 i=1
(12)
By Chebyshev’s inequality, the setting of s2 and Equation (12), we get that
√
5 m · E[YS ]
Var[YS ]
≤ 2
Pr |YS − E[YS ]| > ǫE[YS ] < 2
ǫ · E[YS ]2
ǫ (c2 ǫ−4 log2 n)(m3/2 /t) · E[YS ]2
ǫ2
.
=
c2 (log2 n)(m/t) · E[YS ]
P
wt(v), which for a great S is at least
By Claim 10, E[YS ] = d−1
S
v∈S
t(1 − 2cH · ǫ)/n)/s1
t
ǫ
≥
·
.
s1 (2m/n)(ǫ/ log n)
4m log n
Therefore, by Assumption 1, for a sufficiently large constant c2 ,
ǫ
.
log n
Pr [|YS − E[YS ]| > ǫE[YS ]] ≤
By the definition of XS in Step 4 of the algorithm, XS is just a scaling of YS . Therefore,
Pr [|XS − E[XS ]| > ǫE[XS ]] ≤
By Equation (11), E[XS ] =
great S,
n
s1
P
v∈S
ǫ
.
log n
wt(v), which for a great S is at least t(1 − 2cH · ǫ). Hence, for a
Pr [XS < (1 − 3cH · ǫ) · t] ≤
ǫ
.
log n
The probability of S not being great is at most 2ǫ/ log n. We apply the union bound to remove the
conditioning, so we get
3ǫ
,
Pr [X < (1 − 3cH · ǫ) · t] ≤
log n
which completes the proof.
Theorem 11. If Item 2 in Assumption 1 holds then the expected running time of Estimate-with-advice
1/3
is O∗ (n/t + m3/2 /t).
14
1/3
Proof. The sampling of S is done in O∗ (n/t ) time. Generating the Zj variables, without the
calls to Heavy, takes time O∗ (m3/2 /t) in expectation, by an argument identical to that in the proof
of Lemma 8. Therefore, it remains to bound the running time resulting from calls to Heavy.
Let us compute the expected number of triangles found during the run of the algorithm. In each
iteration
√ choosing an edge e, the expected number of triangles found is at most
√ i, conditioned on
2(du / m)(te /du ) = 2te / m. Averaging
over the edges, the expected number of triangles found in
√
a single iteration is at most 6t/(m · m), which by Item 2 in Assumption 1 is O(t/m3/2 ). There are
O(m3/2 /t) · poly(log n, 1/ǫ) iterations, leading to a total of O∗ (1) expected triangles. Thus, there
are O ∗ (1) expected calls to Heavy, each taking O ∗ (m3/2 /t) time by Lemma 8. Together with the
1/3
above, we get an expected running time of O(n/t + m3/2 /t) · poly(log n, 1/ǫ).
3.4
The final algorithm
We are now ready to present an algorithm that requires no prior knowledge regarding m and t.
Estimate(ǫ)
1. Let ǫ′ = ǫ/3cH , where cH is the constant defined in Claim 2.
2. Invoke Feige’s algorithm [Fei06] for approximating the average degree of a graph
10 log n times. Let d be the median value of all invocations.
3. Let m = nd/2.
4. Let e
t = n3 .
5. While e
t≥1
t:
(a) For t = n3 , n3 /2, n3 /4, . . . , e
i. For i = 1, . . . , cǫ−1 log log n:
A. Let Xi =Estimate-with-advice(ǫ′, m, t).
ii. Let X = mini {Xi }.
iii. If X ≥ t return X.
(b) Let e
t=e
t/2.
Before analyzing the correctness and running time of the algorithm, we present the following
simple proposition, whose proof we give for the sake of completeness.
Proposition 12. For every graph G, t ≤ 43 m3/2 .
Proof.
1X1
1
t=
tv ≤
3
2
6
v∈V
X
√
v: dv > m
tv +
X
√
v: dv ≤ m
√
√
1
2d2v ≤ 2 m · 2m + 2 m
6
X
√
v: dv ≤ m
4
dv ≤ m3/2 .
3
Theorem 13. Algorithm Estimate(ǫ) returns a value X, such that (1 − ǫ)t ≤ X ≤
(1 + ǫ)t, with probability
at least 5/6. The expected query complexity of the algorithm is
O∗ n/t1/3 + max m, m3/2 /t
and the expected running time of the algorithm is O ∗ (n/t1/3 +
m3/2 /t).
Proof. We first prove that the value of X is as stated in the theorem. Let davg denote the average
degree of vertices in G. The algorithm from [Fei06] returns a value d such that, with probability
at least 2/3, d ∈ [davg /(2 + γ), davg ] for a constant γ. Since we take the median value of 10 log n
15
invocations, it follows from Chernoff’s inequality that m is as stated in Item 2 of Assumption 1
with probability at least 1 − 1/poly(n). Assume that this is indeed the case.
Before analyzing the algorithm Estimate as described above, first consider executing Step 5a
with e
t = 1. That is, rather than running both an outer loop over decreasing values of e
t and an
inner loop over decreasing values of t, we only run a single loop over decreasing value of t, starting
with t = n3 . By the first part of Theorem 9 and by Markov’s inequality, for each value of t and for
each i, Pr[Xi ≤ (1 + ǫ)t] > ǫ/2, where Xi as defined in Step 5(a)iA. Therefore, for each value of t,
the minimum estimate X (as defined in Step 5(a)iii) is at most (1 + ǫ)t, with probability at least
1 − 1/ log 3 n. It follows that for each t such that t > 2t, we have that X < t with probability at
least 1 − 1/ log 3 n, and the algorithm will continue with t = t/2. Once we reach a value of t for
which t/4 ≤ t ≤ t/2, Item 1 in Assumption 1, regarding t, holds. By the second part of Theorem 9,
Xi ∈ [(1 − ǫ)t, (1 + ǫ)t] for every i with probability at least 1 − c/ log n. Hence, we have that
t≤
1
t ≤ (1 − ǫ)t ≤ X ≤ (1 + ǫ)t,
2
with probability at least 1 − c/ log n. Therefore, we halt and return correct X.
If however we do reach a value t such that t ≤ t/4, since Assumption 1 does not hold, we cannot
lower bound X, implying that we can no longer bound the probability that X < t. Therefore we
might continue running with decreasing values of t, causing the running time to exceed the desired
bound of O∗ (n/t1/3 + m3/2 /t). In order to avoid this scenario, we run both an outer loop over e
t and
3
e
e
an inner loop over t. Specifically, starting with t = n , whenever we halve t, we run over all values
of t = n3 , n3 /2, . . ., until we reach e
t. This implies that for every value of e
t > 2t the probability of
returning an incorrect estimate, that is, outside the range of (1 − ǫ)t ≤ X ≤ (1 + ǫ)t, is at most
1 − 1/ log 2 n. On the other hand, for values of e
t such that e
t ≤ t/2 the probability of returning a
correct estimate (within (1 − ǫ)t ≤ X ≤ (1 + ǫ)t) is at least 1 − c/ log n. A union bound over all
failure probabilities gives a success probability of at least 5/6.
We now turn to analyze the query complexity and running time of the algorithm. By [Fei06],
√
the expected running time of the average degree approximation algorithm is O ∗ (n/ m). By
Theorem 11, conditioned on m satisfying Item 2 in Assumption 1, the expected running time
1/3
of Estimate-with-advice(ǫ, m, t) is O∗ (n/t
+ m3/2 /t). It follows from Proposition 12 that
√
n/ m = O(n/t1/3 ), implying that the running time is determined by the value of m and by the
smallest value of t that Estimate-with-advice(ǫ, m, t) is invoked with.
Recall that whenever we halve the value of t̃, we run with all values t = n3 , n3 /2, . . .. This,
together with the fact that when running with t/4 ≤ t ≤ t/2 we halt with probability at least
1−c/ log n, implies that the probability of reaching a value t̃ = t/2k is at most (c/ log n)k . Therefore,
the expected running time, conditioned on m satisfying Item 2 in Assumption 1, is bounded by
! log n
!
!
X
m3/2
m3/2
m3/2
n
n
n
2
∗
∗
k
k
∗
log n · O
+
+
+
+
=O
.
(c/ log n) · 2 · O
t
t
t
t1/3
t1/3
t1/3
k=1
Now consider the value of m computed in Step 3 of Estimate(ǫ). As stated previously, with
probability at least 1 − 1/poly(n) (e.g., 1 − 1/n4 ), the estimate m is within a constant factor from
m. Therefore the expected running time of the algorithm (without the conditioning on the value
of m) is bounded by
!
!
3/2
3/2
m
m
1
n
n
1
+ 4 · O(n3 ) = O ∗ 1/3 +
.
1 − 4 · O ∗ 1/3 +
n
t
n
t
t
t
16
Observe that we can always assume that the algorithm does not perform queries it can answer by
itself. That is, we can allow the algorithm to save all the information it obtained from past queries,
and assume it does not query for information it can deduce from its past queries. Further observe
that any pair query is preceded by a neighbor query. Therefore, if at any point the algorithm
performs more than 2m queries, it can abort. It follows that the expected query complexity is
O∗ (n/t1/3 + min{m, m3/2 /t}).
4
A Lower Bound
In this section we present a lower bound on the number of queries necessary for estimating the
number of triangles in a graph. Since we sometimes refer to the number of triangles in different
graphs, we use the notation t(G) for the number of triangles in a graph G. Our lower bound matches
our upper bound in terms of the dependence on n, m and t(G), up to polylogarithmic factors in
n and the dependence in 1/ǫ. In what follows, when we refer to approximation algorithms for the
number of triangles in a graph, we mean multiplicative-approximation algorithms that output with
high constant probability an estimation b
t such that t(G)/C ≤ b
t ≤ C · t(G) for some predetermined
approximation factor C.
We consider multiplicative-approximation algorithms that are allowed the following three types
of queries: Degree queries, pair queries and random new-neighbor queries. Degree queries and pair
queries are as defined in Section 2. A random new-neighbor query qi is a single vertex u and the
corresponding answer is a vertex v such that (u, v) ∈ E and the edge (u, v) is selected uniformly
at random among the edges incident to u that have not yet been observed by the algorithm. In
Corollary 34 we show that this implies a lower bound when the algorithm may perform (standard)
neighbor queries instead of random new-neighbor queries.
We first give a simple lower bound that depends on n and t(G).
Theorem 14. Any
algorithm for the number of triangles in a graph
multiplicative-approximation
n
must perform Ω t(G)1/3 queries, where the allowed queries are degree queries, pair queries and
random new-neighbor queries.
Proof. For every n and every 1 ≤ t ≤ n3 we next define a graph G1 and a family of graphs G2 for
which the following holds. The graph G1 is the empty graph over n vertices.
In G2 , each graph
1/3
1/3
consists of a clique of size t
and an independent set of size n − t
. See Figure 1 for an
illustration. Within G2 the graphs differ only in the labeling of the vertices. By construction, G1
contains no triangles and each graph in G2 contains Θ(t) triangles. Clearly, unless the algorithm
“hits” a vertex in the clique it cannot distinguish between the two cases.
The probability of hitting
1/3 /n. Thus, in order for this
such a vertex in a graph selected uniformly at random
from
G
is
t
2
event to occur with high constant probability, Ω
n
t1/3
queries are necessary.
We next state our main theorem.
Theorem 15. Any multiplicative-approximation
algorithm for the number of triangles in a graph
n 3/2 o
m
must perform at least Ω min t(G) , m
queries, where the allowed queries are degree queries,
pair queries and random new-neighbor queries.
For every n, every 1 ≤ m ≤ n2 and every 1 ≤ t ≤ min n3 , m3/2 we define a graph G1 and
a family of graphs G2 for which the following holds. The graph G1 and all the graphs in G2 have
n vertices and m edges. For the graph G1 , t(G1 ) = 0, and for every graph G ∈ G2 , t(G) = Θ(t).
17
n
∆1/3
n − ∆1/3
Figure 1: An illustration of the two families.
n 3/2 o
We prove it is necessary to perform Ω min m t , m
queries in order to distinguish with high
constant probability between G1 and a random graph in G2 . For the sake of simplicity, in everything
√
that follows we assume that m is even.
1√
We prove that for values of t such that
t
<
3/2 4 m, at least Ω(m) queries are required, and for
√
values of t such that t ≥ m at least Ω m t
queries are required.
We delay the discussion on the former case to Subsection 4.4, and start with the case that
√
t ≥ m. Our construction of G2 depends on the value of t as a function of m where we deal
separately with the following two ranges of t:
1. t ∈ [Ω(m), O(m3/2 )].
√
2. t ∈ [Ω( m, O(m)].
We prove that for every t as above, Ω(m3/2 /t) queries are needed in order to distinguish between
the graph G1 and a random
graph in G2 . Observe that by Proposition 12, for every graph G, it
holds that t(G) = O m3/2 . Hence, the above ranges indeed cover all the possible values of t as a
function of m.
A high level discussion of the lower bound. The constructions for the different ranges of
√
t ≥ m are all based on the same basic idea, and have the following in common. In all construction
√
for t as above, G1 consists of a complete bipartite graph (L ∪ R, E) with |L| = |R| = m and an
√
independent set of n − 2 m vertices. The basic structure of the graphs in the family G2 is the same
as that of G1 with the following modifications:
√
• For every value of t, we add t/ m edges between vertices in L (and similarly in R). Since
√
each edge contributes (roughly) m triangles, this gives the desired total number of triangles
in the graph. In the case that t = m this is done by adding a perfect matching within L and
a perfect matching within R. In the case that t > m we add several such perfect matchings,
√
√
and in the case that m ≤ t ≤ m/4 we add a (non-perfect) matching of size t/ m.
• In order to maintain the degrees of all the vertices in the bipartite component, we remove
edges between vertices in L and R.
For an illustration of the case t = m, see Figure 2. In what follows we assume that the algorithm
knows in advance which vertices are in L and which are in R, and consider only the bipartite
component of the graphs. In order to give the intuition for the m3/2 /t lower bound we consider
each type of query separately, starting with degree queries.
18
Since both in the graph G1 and in all the graphs in G2 , all the vertices in L ∪ R have the
√
same degree (of m), degree queries do not reveal any information that is useful for distinguishing
between the two.
As for pair queries, unless the algorithm queries a pair in L × L (or R × R) and receives a
positive answer, or queries a pair in L × R and receives a negative answer, the algorithm cannot
distinguish between the bipartite component of the graph G1 and those of the graphs in G2 . We
√
refer to these pairs as witness pairs. Roughly speaking, since there are Θ(t/ m) such pairs, and
m pairs in total, it takes Ω(m3/2 /t) queries in order to “catch a witness pair”.
We are left to deal with neighbor queries. Here too, distinguishing between the graph G1 and
the graphs in G2 can be done by “catching a witness”. That is, if the algorithm queries for a
neighbor of a vertex in L and the answer is another vertex in L (analogously for a vertex in R).
As before, the probability for hitting such a witness pair is small. However, there is another source
of difference resulting from neighbor queries. When the algorithm queries a vertex v ∈ L there is
a difference in the conditional distribution on answers v ∈ R when the answer is according to the
graph G1 or according to a graph in the family G2 . The reason for the difference, is that in the
√
graph G1 every vertex has exactly m neighbors in the opposite side, while for graphs in G2 , each
√
√
vertex has Θ( m − t/m) neighbors in the opposite side (for the range Ω( m) ≤ t ≤ O(m) this is
true on average). We prove that this difference in sufficiently small so as to ensure the Ω(m3/2 /t)
lower bound.
Our formal analysis is based on defining two processes that interact with an algorithm for
approximating the number of triangles, denoted ALG. The first process answer queries according
to G1 , and the second process answers queries while constructing a uniformly selected graph in
G2 . An interaction between ALG and each of these processes induces a distribution over sequences
of queries and answers. We prove that if the number of queries performed by ALG is smaller
than m3/2 /(ct) for a sufficiently large constant c, then the statistical distance between the two
distributions is a small constant.
We start by addressing the case that t = m in Subsection 4.1, and deal with the case that
√
3/2
m < t ≤ m8 in Subsection 4.2, and with the case that m ≤ t ≤ m
4 in Subsection 4.3.
Before embarking on the proof for t = m, we introduce the notion of a knowledge graph (as
defined previously in e.g., [GR02]), which will be used in all lower bound proofs. Let ALG be an
algorithm for approximating he number of triangles, which performs Q queries. Let qt denote its tth
query and let at denote the corresponding answer. Then ALG is a (possibly probabilistic) mapping
from query-answer histories π , h(q1 , a1 ), . . . , (qt , at )i to qt+1 , for every t < Q, and to N for t = Q.
We assume that the mapping determined by the algorithm is determined only on histories that
are consistent with the graph G1 or one of the graphs in G2 . Any query-answer history π of length
kn
t can be used to define a knowledge graph Gkn
π at time t. Namely, the vertex set of Gπ consists
of n vertices. For every new-neighbor query ui answered by vi for i ≤ t, the knowledge graph
contains the edge (ui , vi ), and similarly for every pair query (uj , vj ) that was answered by 1. In
addition, for every pair query (ui , vi ) that is answered by 0, the knowledge graph maintains the
information that (ui , vi ) is a non-edge. The above definition of the knowledge graph is a slight
abuse of the notation of a graph since Gkn
π is a subgraph of the graph tested by the algorithm, but
it also contains additional information regarding queried pairs that are not edges. For a vertex u,
kn
kn
we denote its set of neighbors in the knowledge graph by Γkn
π (u), and let dπ (u) = Γπ (u) . We
denote by Nπkn (u) the set of vertices v such that (u, v) is either an edge or a non-edge in Gkn
π .
19
4.1
A lower bound for t = m
4.1.1
The lower-bound construction
√
The graph G1 has two components. The first component is a complete bipartite graph with m
√
vertices on each side, i.e, K√m,√m , and the second component is an independent set of size n−2 m.
We denote by L the set of vertices ℓ1 , . . . , ℓ√m on the left-hand side of the bipartite component and
by R the set of vertices r1 , . . . , r√m on its right-hand side. The graphs in the family G2 have the
same basic structure with a few modifications. We first choose for each graph a perfect matching
M C between the two sides R and L and remove the edges in M C from the graph. We refer to the
removed matching as the “red matching” and its pairs as “crossing non-edges” or “red pairs”. Now,
we add two perfect matching from L to L and from R to R, denoted M L and M R respectively.
We refer to these matchings as the blue matchings and their edges as “non-crossing edges” or “blue
pairs”. Thus for each choice of three perfect matchings M C , M L and M R as defined above, we
have a corresponding graph in G2 .
√
Consider a graph G ∈ G2 . Clearly, every blue edge participate in m − 2 triangles. Since, every
√
√
triangle in the graph contains exactly one blue edge, there are 2 m · ( m − 2) = Θ(m) triangles
in G.
√
√
n−2 m
m
Figure 2: An illustration of the family G2 for t = m.
4.1.2
Definition of the processes P1 and P2
In what follows we describe two random processes, P1 and P2 , which interact with an arbitrary
algorithm ALG. The process P1 answers ALG’s queries consistently with G1 . The process P2
answers ALG’s queries while constructing a uniformly selected random graph from G2 . We assume
without loss of generality that ALG does not ask queries whose answers can be derived from its
knowledge graph, since such queries give it no new information. For example, ALG does not ask
a pair query about a pair of vertices that are already known to be connected by an edge due to a
neighbor query. Also, we assume ALG knows in advance which vertices belong to L and which to
to R, so that ALG need not query vertices in the independent set. Since the graphs in G2 differ
from G1 only in the edges of the subgraph induced by L ∪ R, we think of G1 and graphs in G2 as
consisting only of this subgraph. Finally, since in our constructions all the vertices in L ∪ R have
√
the same degree of m, we assume that no degree queries are performed.
For every, Q, every t ≤ Q and every query-answer history π of length t − 1 the process P1
answers the tth query of the algorithm consistently with G1 . Namely:
• For a pair query qt = (u, v) if the pair (u, v) is a crossing pair in G1 , then the process replies
1, and otherwise it replies 0.
20
• For a random new-neighbor query qt = u the process answers with a random neighbor of u that
has yet been observed by the algorithm. That is, for every vertex v such that v ∈ Γ(u)\Γkn
π (u)
√
the process replies at = v with probability 1/( m − dkn
(u)).
π
The process P2 is defined as follows:
• For a query-answer history π we denote by G2 (π) ⊂ G2 the subset of graphs in G2 that are
consistent with π.
• For every t ≤ Q and every query-answer history π of length t − 1, the process P2 selects a
graph in G2 uniformly at random and answers the tth query as follows.
1. If the tth query is a pair query qt = (u, v), then P2 answers the query qt according to the
selected graph.
2. If the tth query is a random new-neighbor query qt = ut , then P2 ’s answer is a uniform
new neighbor of ut in the selected graph.
• After all queries are answered (i.e., after Q queries), uniformly choose a random graph G
from G2 (π).
For a query-answer history π of length Q we denote by π ≤t the length t prefix of π and by π ≥t
the Q − t + 1 suffix of π.
We note that the selected graph is only used to answer the tth query and is then “discarded
back to” the remaining graphs that are consistent with that answer (and all previous answers in
π).
Claim 16. Let π be a query-answer history of length t − 1. We use ◦ to denote concatenation.
• If the tth query is a pair query, then at = 1 with probability
|G2 (π ◦ (qt , 1))|
,
|G2 (π)|
and at = 0 with probability
|G2 (π ◦ (qt , 0))|
.
|G2 (π)|
• If the tth query is a random new-neighbor query qt = ut , then for every v ∈ V \ Γkn
π (u) the
probability that the process P2 answers at = v is
1
|G2 (π ◦ (qt , v))|
·√
.
|G2 (π)|
m − dkn
π (ut )
If v ∈ Γkn
π (u) then the probability that P2 answers at = v is 0.
Proof. First consider a pair query qt = (ut , vt ). The probability that (ut , vt ) is an edge in the graph
chosen by the process P2 is the fraction of graphs in G2 (π) in which (ut , vt ) is an edge. This is
t ,1))|
. Similarly, the probability of choosing a graph in which (ut , vt ) is not an edge
exactly |G2 (π◦(q
|G2 (π)|
is
|G2 (π◦(qt ,0))|
.
|G2 (π)|
Now consider a random new-neighbor query qt = ut . We start with the case that v ∈ V \ Γkn
π .
The probability that v is chosen by P2 is the probability that a graph G in which v is a neighbor
of ut is chosen in the first step, and that v is the chosen new neighbor among all of u’s neighbors
21
in the second step. Since there are |G2 (π ◦ (u, v))| graphs in which v is a neighbor of ut , and ut has
√
m − dkn
π (ut ) neighbors, this happens with probability
|G2 (π ◦ (u, v))|
1
·√
.
|G2 |
m − dkn
π (ut )
For a vertex v such that v ∈
/ V \ Γkn
π , in every graph G ∈ G2 , v is not a neighbor of ut , implying
that the probability that the process replies at = v is 0.
Lemma 17. For every algorithm ALG, the process P2 , when interacting with ALG, answers ALG’s
queries according to a uniformly generated graph G in G2 .
Proof. Consider a specific graph G ∈ G2 . Let π be the query-answer history generated by the
interaction between ALG and P2 . Let Q be the number of queries performed during the interaction.
The probability that G is the resulting graph from that interaction is
1
Pr[G ∈ G2 (π ≤1 )] · Pr[G ∈ G2 (π ≤2 ) | G ∈ G2 (π ≤1 )] · . . . · Pr[G ∈ G2 (π ≤Q )|G ∈ G2 (π ≤Q−1 )] ·
|G(π ≤Q )|
|G2 (π ≤1 )| |G2 (π ≤2 )|
|G2 (π ≤Q )|
1
1
=
·
·
.
.
.
·
·
=
,
|G2 |
|G2 (π ≤1 )|
|G2 (π ≤Q−1 )| |G2 (π Q )|
|G2 |
and the lemma follows.
b
For a fixed algorithm ALG that performs Q queries, and for b ∈ {1, 2}, let DALG
denote the
distribution on query-answers histories of length Q induced by the interaction between ALG and
3/2
Pb . We shall show that for every algorithm ALG that performs at most
Q = m
100t queries, the
statistical distance between D1ALG and D2ALG , denoted d D1ALG , D2ALG , is at most 31 . This will
imply that the lower bound stated in Theorem 15 holds for the case that t(G) = m. In order to
obtain this bound we introduce the notion of a query-answer witness pair, defined next.
Definition 6. We say that ALG has detected a query-answer witness pair in three cases:
1. If qt is a pair query for a crossing pair (ut , vt ) ∈ L × R and at = 0.
2. If qt is a pair query for a non-crossing pair (ut , vt ) ∈ (L × L) ∪ (R × R) and at = 1.
3. If qt = ut is a random new-neighbor query and at = v for some v such that (ut , v) is a
non-crossing pair.
We note that the source of the difference between D1ALG and D2ALG is not only due to the
probability that the query-answer history contains a witness pair (which is 0 under D1ALG and
non-0 under D2ALG ). There is also a difference in the distribution over answers to random new
neighbor queries when the answers do not result in witness pairs (in particular when we condition
on the query-answer history prior to the tth query). However, the analysis of witness pairs serves
us also in bounding the contribution to the distance due to random new neighbor queries that do
not result in a witness pairs.
Let w be a “witness function”, such that for a pair query qt on a crossing pair, w(qt ) = 0, and
for a non-crossing pair, w(qt ) = 1. The probability that ALG detects a witness pair when qt is a
pair query (ut , vt ) and π is a query-answer history of length t − 1, is
PrP2 [w(qt ) | π] =
|G2 (π ◦ (qt , w(qt )))|
|G2 (π ◦ (qt , w(qt )))|
≤
.
|G2 (π)|
|G2 (π ◦ (qt , w(qt )))|
Therefore, to bound the probability that the algorithm observes a witness pair it is sufficient to
bound the ratio between the number of graphs in G2 (π ◦ (q, w(qt ))) and the number of graphs in
G2 (π ◦ (q, w(qt ) )). We do this by introducing an auxiliary graph, which is defined next.
22
4.1.3
The auxiliary graph for t = m
For every t ≤ Q, every query-answer history π of length t − 1 for which π is consistent with G1 (that
is, no witness pair has yet been detected), and every pair (u, v), we consider a bipartite auxiliary
graph Aπ,(u,v) . On one side of Aπ,(u,v) we have a node for every graph in G2 (π) for which the pair
(u, v) is a witness pair. We refer to these nodes as witness graphs. On the other side of the auxiliary
graph, we place a node for every graph in G2 (π) for which the pair is not a witness. We refer
to these nodes as non-witness graphs. We put an edge in the auxiliary graph between a witness
graph W and a non-witness graph W if the pair (u, v) is a crossing (non-crossing) pair and the two
graphs are identical except that their red (blue) matchings differ on exactly two pairs – (u, v) and
one additional pair. In other words, W can be obtained from W by performing a switch operation,
as defined next.
Definition 7. We define a switch between pairs in a matching in the following manner. Let (u, v)
and (u′ , v ′ ) be two matched pairs in a matching M . A switch between (u, v) and (u′ , v ′ ) means
removing the edges (u, v) and (u′ , v ′ ) from M and adding to it the edges (u, v ′ ) and (u′ , v).
Note that the switch process maintains the cardinality of the matching. We denote by dw (Aπ,(u,v) )
the minimal degree of any witness graph in Aπ,(u,v) , and by dnw (Aπ,(u,v) ) the maximal degree of the
non-witness graphs. See Figure 3 for an illustration.
edge in
Aπ,(u,v)
dw
witness
graphs
non-witness ′
u
graphs
v′
u′
v′
u
v
u
v
dw
A witness graph W
(a) The auxiliary graph with witness nodes on
the left and non-witness nodes on the right.
W – A neighbor of W
(b) An illustration of two neighbors in the auxiliary graph
for t = m.
Figure 3
3/2
Lemma 18. Let t = m and Q = m
100t . For every t ≤ Q, every query-answer history π of length
t − 1 such that π is consistent with G1 and every pair (u, v),
dnw (Aπ,(u,v) )
2
2t
≤ √ = 3/2 .
dw (Aπ,(u,v) )
m
m
Proof. Recall that the graphs in G2 are as defined in Subsection 4.1.1 and illustrated in Figure 2.
In the following we consider crossing pairs, as the proof for non-crossing pairs is almost identical.
Recall that a crossing pair is a pair (u, v) such that u ∈ L and v ∈ R or vise versa. A witness graph
W with respect to the pair (u, v) is a graph in which (u, v) is a red pair, i.e., (u, v) ∈ M C . There
is an edge from W to every non-witness graph W ∈ G2 (π) such that M C (W ) and M C (W ) differ
exactly on (u, v) and one additional edge.
23
Every red pair (u′ , v ′ ) ∈ M C (W ) creates a potential non-witness graph W (u′ ,v′ ) when switched
with (u, v) (as defined in Definition 7). However, not all of the these non-witness graphs are in
′
kn
G2 (π). If u′ is a neighbor of v in the knowledge graph Gkn
π , i.e., u ∈ Γπ (v), then W (u′ ,v′ ) is not
/ G2 (π). This is also the case for a
consistent with the knowledge graph, and therefore W (u′ ,v′ ) ∈
′ , v ′ ) ∈ M C such that u′ ∈
(u).
Therefore,
only
pairs
(u
/ Γkn
pair (u′ , v ′ ) such that v ′ ∈ Γkn
π (v) and
π
′
kn
v ∈
/ Γπ (u) produce a non-witness graph W (u′ ,v′ ) ∈ G2 (π) when switched with (u, v). We refer to
√
m
m
, both u and v each have at most 100
neighbors in the
these pairs as consistent pairs. Since t ≤ 100
√
knowledge graph, implying that out of the m − 1 potential pairs, the number of consistent pairs
is at least
√
√
√
m
1√
kn
kn
m − 1 − dπ (u) − dπ (v) ≥ m − 1 − 2 ·
m.
≥
100
2
√
Therefore, the degree of every witness graph W ∈ Aπ,(u,v) is at least 12 m, implying that
√
dw (Aπ,(u,v) ) ≥ 12 m.
In order to prove that dnw (Aπ,(u,v) ) = 1, consider a non-witness graph W . Since W is a nonwitness graph, the pair (u, v) is not a red pair. This implies that u is matched to some vertex
v ′ ∈ R, and v is matched to some vertex u′ ∈ L. That is, (u, v ′ ), (v, u′ ) ∈ M C . By the construction
of the edges in the auxiliary graph, every neighbor W of W can be obtained by a single switch
between two red pairs in the red matching. The only possibility to switch two pairs in M C (W )
and obtain a matching in which (u, v) is a red pair is to switch the pairs (u, v ′ ) and (v, u′ ). Hence,
every non-witness graph W has at most one neighbor.
√
We showed that dw (Aπ,(u,v) ) ≥ 21 m and that dnw (Aπ,(u,v) ) ≤ 1, implying
dnw (Aπ,(u,v) )
2
2t
≤ √ = 3/2 ,
dw (Aπ,(u,v) )
m
m
and the proof is complete.
4.1.4
Statistical distance
For a query-answer history π of length t − 1 and a query qt , let Ans(π, qt ) denote the set of possible
answers to the query qt that are consistent with π. Namely, if qt is a pair query (for a pair that
does not belong to the knowledge graph Gkn
π ), then Ans(π, qt ) = {0, 1}, and if qt is a random
new-neighbor query, then Ans(π, qt ) consists of all vertices except those in Nπkn .
3/2
Lemma 19. Let t = m and Q = m
100t . For every t ≤ Q, every query-answer history π of length
t − 1 such that π is consistent with G1 and for every query qt :
X
12t
12
PrP1 [a | π, qt ] − PrP2 [a | π, qt ] ≤ √ = 3/2 .
m
m
a∈Ans(π,qt )
Proof. We prove the lemma separately for each type of query.
• We start with a crossing pair query (ut , vt ). In this case the witnesses are red pairs. Namely,
our witness graphs for this case are all the graphs in G2 (π ◦(qt , 0)), and the non-witness graphs
are all the graphs in G2 (π ◦ (qt , 1)). By the construction of the auxiliary graph
|G2 (π ◦ (qt , 0))| · dw (Aπ,(u,v) ) ≤ |G2 (π ◦ (qt , 1))| · dnw (Aπ,(u,v) ).
This, together with Lemma 18, implies
dnw (Aπ,(u,v) )
|G2 (π ◦ (qt , 0))|
|G2 (π ◦ (qt , 0))|
2
2t
≤
≤
= √ = 3/2 .
|G2 (π)|
|G2 (π ◦ (qt , 1))|
dw (Aπ,(u,v) )
m
m
24
For a pair query qt , the set of possible answers Ans(π, qt ) is {0, 1}. Therefore,
X
PrP1 [a | π, qt ] − PrP2 [a | π, qt ]
a∈{0,1}
= PrP1 [0 | π, qt ] − PrP2 [0 | π, qt ] + PrP1 [1 | π, qt ] − PrP2 [1 | π, qt ]
2t
4t
4
2t
= 3/2 + 1 − 1 − 3/2 = 3/2 = √ .
m
m
m
m
(13)
• For a non-crossing pair query qt = (u, v) our witness graphs are graphs that contain qt as a
blue pair, i.e., graphs from G2 (π, (qt , 1)), and our non-witness graphs are graphs in which no
blue pair had been queried, i.e., graphs from G2 (π, (qt , 0)). From Lemma 18 we get that for
a non-crossing pair query qt :
dnw (Aπ,(u,v) )
2
|G2 (π ◦ (qt , 1))|
2t
|G2 (π ◦ (qt , 1))|
≤
≤
= 3/2 = √ .
|G2 (π)|
|G2 (π ◦ (qt , 0))|
dw (Aπ,(u,v) )
m
m
Therefore,
X
a∈{0,1}
PrP1 [a | π, qt ] − PrP2 [a | π, qt ]
=
PrP1 [0 | π, qt ] − PrP2 [0 | π, qt ] + PrP1 [1 | π, qt ] − PrP2 [1 | π, qt ]
2t
2t
4t
4
= 1 − 1 − 3/2 + 3/2 = 3/2 = √ .
m
m
m
m
(14)
• For a new-neighbor query qt = ut , the set of possible answers Ans(π, qt ) is the set of all the
vertices in the graph. Therefore,
X
PrP1 [a | π, qt ] − PrP2 [a | π, qt ]
a∈Ans(π,qt )
=
X
v∈R
PrP1 [v | π, qt ] − PrP2 [v | π, qt ] +
X
v∈L
PrP1 [v | π, qt ] − PrP2 [v | π, qt ] .
Recall that for a vertex v ∈ Γkn
π (u), PrP1 [v | π, qt ] = PrP2 [v | π, qt ] = 0. Therefore, it suffices to
consider only vertices v such that v ∈
/ Γkn
π (u). Assume without loss of generality that u ∈ L,
kn
and consider a vertex v ∈ R, v ∈
/ Γπ (u). Since for every v ∈ R we have that (ut , v) ∈ E(G1 ),
by the definition of P1 ,
PrP1 [v | π, qt ] = √
1
.
m − dkn
π (ut )
Now consider the process P2 . By its definition,
G2 (π ◦ (qt , v))
1
·√
G2 (π)
m − dkn
π (u)
1
G2 (π ◦ ((u, v), 1))
·√
=
G2 (π)
m − dkn
(u)
π
1
G2 (π ◦ ((u, v), 0))
.
·√
= 1−
G2 (π)
m − dkn
π (u)
PrP2 [v | π, qt ] =
25
(15)
By the first item in the proof, for any crossing pair qt = (u, v),
4t
G2 (π ◦ (qt , 0))
4
= 3/2 = √ ,
G2 (π)
m
m
and it follows that
PrP2 [v | π, qt ] =
4t
1 − 3/2
m
·√
1
.
m − dkn
π (u)
(16)
/ Γkn
By Equations (15) and (16), we get that for every v ∈ R such that v ∈
π (u),
PrP1 [v | π, qt ] − PrP2 [v | π, qt ] = √
Therefore,
X
v∈R
PrP1 [v | π, qt ] − PrP2 [v | π, qt ] =
=
√
X
v∈R,v∈Γ
/ kn
π (u)
4t/m3/2
.
m − dkn
π (u)
(17)
PrP1 [v | π, qt ] − PrP2 [v | π, qt ]
4t/m3/2
4
4t
√
m − dkn
(u)
·
= 3/2 = √ .
π
kn
m − dπ (u)
m
m
(18)
Now consider a vertex v ∈ L. Observe that for every v ∈ L, it holds that v ∈
/ Γkn
π (u) since
otherwise π is not consistent with G1 . For the same reason,
PrP1 [v | π, qt ] = 0 .
(19)
As for P2 , as before,
PrP2 [v | π, qt ] =
1
G2 (π, (ut , v))
·√
.
G2 (π)
m − dkn
π (ut )
By the second item of the claim, since for every v ∈ L, (ut , v) is a non-crossing pair, we have
that
4
4t
|G2 (π, (ut , v))|
= 3/2 = √ .
(20)
|G2 (π)|
m
m
Combining Equations (19) and (20) we get that for every v ∈ L
PrP1 [v | π, qt ] − PrP2 [v | π, qt ] = √
√
3/2
m
kn
Since Q = m
100t = 100 , for every t ≤ Q, dπ (u) <
bounded by 2. Hence,
X
v∈L
4t/m3/2
.
m − dkn
π (u)
1√
2 m,
and it follows that
√
√
m−1
m−dkn (u)
is
√
4t/m3/2
PrP1 [v | π, qt ] − PrP2 [v | π, qt ] = ( m − 1) · √
m − dkn
π (u)
=
8
8t
=√ .
3/2
m
m
(21)
By Equations (18) and (21) we get
X
X
PrP1 [v | π, qt ] − PrP2 [v | π, qt ]
PrP1 [v | π, qt ] − PrP2 [v | π, qt ] +
v∈L
v∈R
12t
12
= 3/2 = √ .
m
m
(22)
26
This completes the proof.
Recall that DbALG , b ∈ {1, 2}, denotes the distribution on query-answer histories of length Q,
induced by the interaction of ALG and Pb . We show that the two distributions are indistinguishable
for Q that is sufficiently small.
Lemma 20. Let t = m. For every algorithm ALG that asks at most Q =
statistical distance between D1ALG and D2ALG is at most 31 .
m3/2
100t
queries, the
ALG be the distribution over query-answer
Proof. Consider the following hybrid distribution. Let D1,t
histories of length Q, where in the length t prefix ALG is answered by the process P1 and in the
ALG = D ALG and that
length Q − t suffix ALG is answered by the process P2 . Observe that D1,Q
1
ALG = D ALG . Let π = (π , π , . . . , π ) denote a query-answer history of length ℓ. By the triangle
D1,0
1
2
ℓ
2
Q−1
P
ALG , D ALG ) .
inequality d(D1ALG , D2ALG ) ≤
d(D1,t+1
1,t
t=0
d(D1ALG , D2ALG ) ≤
Q−1
X
t=0
1
2
ALG , D ALG ) =
It thus remains to bound d(D1,t+1
1,t
ALG
ALG
d(D1,t+1
, D1,t
).
P
π
PrDALG [π] − PrDALG [π] for every t such that
1,t+1
1,t
0 ≤ t ≤ Q − 1. Let Q denote the set of all possible queries.
X
π
PrDALG [π] − PrDALG [π] =
1,t+1
1,t
·
·
X
π1 ,...,πt−1
PrP1 ,ALG [π1 , . . . , πt−1 ] ·
X
a∈Ans((π1 ,...,πt−1 ),q)
X
πt+1 ,...,πQ
X
q∈Q
PrALG [q | π1 , . . . , πt−1 ]
PrP1 [a | π1 , . . . , πt−1 , q] − PrP2 [a | π1 , . . . , πt−1 , q]
PrP2 ,ALG [πt+1 , . . . , πQ | π1 , . . . , πt−1 , (q, a)] .
By Lemma 19, for every 1 ≤ t ≤ Q − 1, and every π1 , . . . , πt−1 and q,
X
12t
PrP1 [a | π1 , . . . , πt−1 , q] − PrP2 [a | π1 , . . . , πt−1 , q] ≤ 3/2 .
m
a∈Ans((π1 ,...,πt−1 ),q)
We also have that for every pair (q, a),
X
PrP2 ,ALG [πt+1 , . . . , πQ | π1 , . . . , πt−1 , (q, a)] = 1 .
πt+1 ,...,πQ
Therefore,
X
PrDALG [π] − PrDALG [π] ≤
π
1,t+1
1,t
Hence, for Q =
√
m
100 ,
X
PrP1 ,ALG [π1 , . . . , πt−1 ]
π1 ,...,πt−1
q∈Q
Q−1
d(D1ALG , D2ALG ) =
and the proof is complete.
X
PrALG [q | π1 , . . . , πt−1 ] ·
1
12t
1XX
1
PrDALG [π] − PrDALG [π] ≤ · Q · 3/2 ≤ ,
1,t+1
1,t
2 π
2
3
m
t=1
27
12t
12t
= 3/2 .
3/2
m
m
3/2
In the next subsection we turn to prove the theorem for the cases where m < t ≤ m8 , and for
√
the case where m ≤ t ≤ m
4 . We start with the former case. The proof will follow the building
blocks of the proof for t = m, where the only difference is in the description of the auxiliary graph
dnw (A
)
√2r .
Aπ,(u,v) and in the proof that dw (A π,(u,v)) ≤ m2t
3/2 =
m
π,(u,v)
4.2
A lower bound for m < t < m3/2
√
Let t = r · m for an integer r such that 1 < r ≤ 18 m. It is sufficient for our needs to consider only
values of t for which r is an integer. The proof of the lower bound for this case is a fairly simple
extension of the proof for the case of t = m, that is, r = 1. We next describe the modifications we
make in the construction of G2 .
4.2.1
The lower-bound construction
Let G1 be as defined in Subsection 4.1.1. The construction of G2 for t = r · m can be thought
of as repeating the construction of G2 for t = m (as described in Subsection 4.1.1) r times. We
√
again start with a complete bipartite graph K√m,√m and an independent set of size n − 2 m. For
each graph G ∈ G2 we select r perfect matchings between the two sides R and L and remove these
edges from the graph. We denote the r perfect matchings by M1C , . . . , MrC and refer to them as the
red matchings. We require that each two perfect matchings MiC and MjC do not have any shared
edges. That is, for every i and for every j, for every (u, v) ∈ MiC it holds that (u, v) ∈
/ MjC . In
order to maintain the degrees of the vertices, we next select r perfect matchings for each side of the
bipartite graph (L to L and R to R). We denote these matchings by M1R , ..., MrR and M1L , ..., MrL
respectively. Again we require that no two matchings share an edge. We refer to these matchings
as the blue matchings and their edges as blue pairs. Each such choice of 3r matchings defines a
graph in G2 .
Let G be a graph in G2 . We say that a triangle is blue if all its edges are blue. Otherwise
√
we say the triangle is mixed. Observe that every blue edge in G participates in at least m − 2r
mixed triangles, and at most r blue triangles. Also note that every two mixed triangles are disjoint.
√
√
√
√
√
Therefore, there are at least 12 r m · (2 m − 2r) = Ω(r · m) and at most 21 r m · (2 m − 2r) + r 2 m
√
triangles in G. Since r < 18 m, we get that every graph in G has Θ(r · m) triangles.
4.2.2
The processes P1 and P2
The definition of the processes P1 and P2 is the same as in Subsection 4.1.2 (using the modified
definition of G2 ), and Lemma 17 holds here as well.
4.2.3
The auxiliary graph
As before, for every t ≤ Q, every query-answer history π of length t−1 such that π is consistent with
G1 and every pair (u, v), we define a bipartite auxiliary graph Aπ,(u,v) , such that on one side there
is a node for every witness graph W ∈ G2 (π), and on the other side a node for every non-witness
graph W ∈ G2 (π). The witness graphs for this case are graphs in which (u, v) is a red (blue) edge
in one of the red (blue) matchings. If (u, v) is a crossing pair, then for every witness graph W ,
(u, v) ∈ MiC (W ) for some 1 ≤ i ≤ r. If (u, v) is a non-crossing pair, then for every witness graph
W , (u, v) ∈ MiL (W ) or (u, v) ∈ MiL (W ). There is an edge from W to every graph W such that
the matching that contains (u, v) in W and the corresponding matching in W differ on exactly two
pairs – (u, v) and one additional pair. For example, if (u, v) ∈ MiC (W ), there is an edge from W
to every graph W such that MiC (W ) and MiC (W ) differ on exactly (u, v) and one additional pair.
28
√
3/2
Lemma 21. Let t = r · m for an integer r such that 1 < r ≤ 8m and let Q = m
100t . For every
t ≤ Q, every query-answer history π of length t − 1 such that π is consistent with G1 and every
pair (u, v),
dnw (Aπ,(u,v) )
2r
2t
≤ 3/2 = √ .
dw (Aπ,(u,v) )
m
m
Proof. We again analyze the case in which the pair is a crossing pair (u, v), as the proof for a
non-crossing pair is almost identical. We first consider the minimal degree of the witness graphs in
Aπ,(u,v) . Let MiC be the matching to which (u, v) belongs. As before, only pairs (u′ , v ′ ) ∈ MiC such
′ / Γkn (v) result in a non-witness graph W ∈ G (π) when switched with (u, v).
that u′ ∈
/ Γkn
2
π
π (u), v ∈
However, we have an additional constraint. Since by our construction no two red matchings share
an edge, it must be that u′ is not matched to v in any of the other r red matching, and similarly
√
m3/2
)
that u is not matched to v ′ in any of the other matchings. It follows that of the ( m−1−2· 100·r·m
√
potential pairs (as in the proof of Lemma 18), we discard 2r additional pairs. Since 1 ≤ r ≤ 8m
√
√
√
√
√
we remain with ( m − 1 − 50m − 14 m) ≥ 12 m potential pairs. Thus, dw (Aπ,(u,v) ) ≥ 12 m.
We now turn to consider the degree of the non-witness graphs and prove that dnw (Aπ,(u,v) ) ≤ r.
Consider a non-witness graph W . To prove that W has at most r neighbors it is easier to consider
all the possible options to “turn” W from a non-witness graph into a witness graph. It holds that
for every j ∈ [r], (u, v) ∈
/ MjC (W ). Therefore for every matching MjC , u is matched to some vertex,
′
denoted vj and v is matched to some vertex, denoted u′j . If we switch between the pairs (u, vj′ )
and (v, u′j ), this results in a matching in which (u, v) is a witness pair. We again refer the reader
to Figure 3b, where the illustrated matching can be thought of as the j th matching. Denote the
resulting graph by W(u′j ,vj′ ) . If the pair (u′j , vj′ ) has not been observed yet by the algorithm then
W(u′j ,vj′ ) is a witness graph in Aπ,(u,v) . Therefore there are at most r options to turn W into a
√
witness graph, and dnw (Aπ,(u,v) ) ≤ r. We showed that dw (Aπ,(u,v) ) ≥ 21 m and dnw (Aπ,(u,v) ) ≤ r,
implying
dnw (Aπ,(u,v) )
2r
2t
≤ √ = 3/2 ,
dw (Aπ,(u,v) )
m
m
as required.
4.2.4
Statistical distance
The proof of the next lemma is exactly the same as the proof of Lemma 19, except that occurrences
√
√
of the term (t/m3/2 ) are replaced by (r/ m) instead of (1/ m), and we apply Lemma 21 instead
of Lemma 18.
√
3/2
Lemma 22. Let t = r · m for an integer r such that 1 < r ≤ 8m and let Q = m
100t . For every
t ≤ Q, every query-answer history π of length t − 1 such that π is consistent with G1 and for every
query qt ,
X
12t
12r
PrP1 [a | π, qt ] − PrP2 [a | π, qt ] = 3/2 = √ .
m
m
a∈Ans(π,qt )
The proof of the next lemma is same as the proof of Lemma 20 except that we replace the
application of Lemma 19, by an application of Lemma 22.
Lemma 23. Let t = r · m for an integer r such that 1 < r ≤
performs at most Q =
m3/2
100t
√
m
8 .
For every algorithm ALG that
queries, the statistical distance between D1ALG and D2ALG is at most 13 .
29
4.3
A lower bound for
√
m ≤ t ≤ 14 m
√
Similarly√to the previous section, we let t = k m and assume that k is an integer such that
1 ≤ k ≤ 4m .
4.3.1
The lower-bound construction
The construction of the graph G1 is as defined in Subsection 4.1.1, and we modify the construction of
the graphs in G2 . As before, the basic structure of every graph is a complete bipartite graph K√m,√m
√
and an independent set of size n−2 m vertices. In this case, for each graph in G2 , we do not remove
a perfect matching from the bipartite graph, but rather a matching M C of size k. In order to keep
√
the degrees of all vertices to be m, we modify the way we construct the blue matchings. Let M C =
{(ℓi1 , ri1 ), (ℓi2 , ri2 ), . . . , (ℓik , rik )} be the crossing matching. The blue matchings will be M L =
{(ℓi1 , ℓi2 ), (ℓi3 , ℓi4 ), . . . , (ℓik −1 , ℓik )} and M R = {(ri1 , ri2 ), (ri3 , ri4 ), . . . , (rik −1 , rik )}. Note that every
matched pair belongs to a four-tuple hℓij , ℓij+1 , rij+1 , rij i such that (ℓij , rij ) and (ℓij+1 , rij+1 ) are red
pairs and (ℓij , ℓij+1 ) and (rij , rij+1 ) are blue pairs. We refer to these structures as matched squares
and to four-tuples (ℓx , ℓy , rz , rw ) such that no pair in the tuple is matched as unmatched squares.
See Figure 4 for an illustration. Every graph in G2 is defined by its set of k four-tuples.
Similarly to previous constructions, in every graph G ∈ G2 , every blue edge participates in
√
m − 2 triangles. Since every triangle in the G contains exactly one blue edge, we have that G has
√
√
k · ( m − 2) = Θ(k m) triangles.
√
The ith
matched square
m
Figure 4: An illustration of the bipartite component in the family G2 for
4.3.2
√
m ≤ t ≤ 14 m.
The processes P1 and P2
We introduce a small modification to the definition of the processes P1 and P2 . Namely, we leave
the answering process for pair queries as described in Subsection 4.1.2 and modify the answering
process for random new-neighbor queries as follows. Let t ≤ Q, and π be a query-answer history of
length t − 1 such that π is consistent with G1 . If the tth query is a new-neighbor query qt = u and
1√
in Subsection 4.1.2. However, if
dkn
π (u) < 2 m, then the processes P1 and P2 answer as described √
1
the tth query is a new-neighbor query qt = u such that dkn
(u)
≥
π
2 m, then the processes answers
as follows.
• The process P1 answers with the set of all neighbors of u in G1 . That is, if u is in L, then the
process replies with a = R = {r1 , . . . , r√m }, and if u is in R, then the process replies with
a = L = {ℓ1 , . . . , ℓ√m }.
30
The process P2 answers with a = {v1 , . . . , v√m }, where {v1 , . . . , v√m } is the set of neighbors
of u in a subset of the graphs in G2 . By the definition of G2 , if u is in L, then this set is either
R, or it is R \ {ri } ∪ {ℓj } for some ri ∈ R and ℓj ∈ L, and if u is in R, then this set is either
L, or it is L \ {ℓi } ∪ {rj } for some ℓi ∈ L and rj ∈ R. For every such set a ∈ Ans(π, qt ), the
process returns a as an answer with probability
|G2 (π ◦ (qt , a))|
.
|G2 (π)|
We call this query an all-neighbors query.
First note that the above modification makes the algorithm “more powerful”. That is, every
algorithm that is not allowed all-neighbors query can be emulated by an algorithm that is allowed
this type of query. Therefore this only strengthen our lower bound results.
Also note that this modification does not affect the correctness of Lemma 17. We can redefine
the function αt (π) to be
if qt (π) is a pair query
1 √
kn
αt (π) = 1/ m − dπ≤t−1 (u) if qt (π) = u is a random new-neighbor query ,
1
if qt (π) is an all-neighbors query
and the rest of the proof follows as before.
4.3.3
The auxiliary graph
For every t ≤ Q, every query-answer history π of length t − 1 such that π is consistent with G1
and every pair (u, v), the witness graphs in Aπ,(u,v) are graphs in which (u, v) is either a red pair
or a blue pair. There is an edge between a witness graph W and a non-witness graph W if the two
graphs have the same set of four-tuples except for two matched squares – one that contains the
pair (u, v), hu, v, u′ , v ′ i and another one.
Definition 8. We define a switch between a matched square and an unmatched square in the following manner. Let hu, v, u′ , v ′ i be a matched square and hx, y, x′ , y ′ i be an un matched squares.
Informally, a switch between the squares is “unmatching” the matched square and instead “matching” the unmatched square.
Formally, a switch consists of two steps. The first step is removing the edges (u, v) and (u′ , v ′ )
from the red matching M C and the edges (u, u′ ) and (v, v ′ ) from the blue matchings M L and M R
respectively. The second step is adding the edges (x, y) and (x′ , y ′ ) from the red matching M C and
the edges (x, x′ ) and (y, y ′ ) from the blue matchings M L and M R respectively. See Figure 5 for an
illustration.
√
√
3/2
Lemma 24. Let t = k · m for an integer k such that 1 < k ≤ 4m and let Q = m
600t . For every
t ≤ Q, every query-answer history π of length t − 1 such that π is consistent with G1 and every
pair (u, v),
dnw (Aπ,(u,v) )
16k
16t
=
= 3/2 .
dw (Aπ,(u,v) )
m
m
Proof. We start with proving that dw (Aπ,(u,v) ) ≥ 12 m. A witness graph in Aπ,(u,v) with respect
to a pair (u, v) is a graph in which (u, v) is part of a matched square hu, v, u′ , v ′ i. Potentially,
31
x′
y′
x′
y′
x
y
x
y
A switch
u′
v′
u′
v′
u
v
u
v
Figure 5: An illustration of a switch between the squares hu, v, u′ , v ′ i and hx, y, x′ , y ′ i.
hu, v, u′ , v ′ i could be switched with every unmatched square to √
get a non-witness
pair. There are
√
√
m−k
m−k
m − k unmatched vertices on each side, so that there are
·
≥ 18 m2 potential
2
2
′
′
squares. To get a graph that is in G2 (π), the unmatched square hx, y, x , y i must be such that
none of the induced pairs between the vertices x, x′ , y, y ′ have been observed yet by the algorithm.
When all-neighbor queries are allowed, if at most Q queries has been performed, then at most 4Q
m
≤ 14 m of the potential
pairs have been observed by the algorithm. Therefore, for at most 4 100k
squares, an induced pair was queried. Hence, every witness square can be switched with at least
1 2
1
1
1
2
2
8 m − 4 m ≥ 16 m consistent unmatched squares, implying that dw (Aπ,(u,v) ) ≥ 16 m .
To complete the proof it remains to show that dnw (Aπ,(u,v) ) ≤ mk. To this end we would like
to analyze the number of witness graphs that every non-witness W can be “turned” into. In every
non-witness graph W the pair (u, v) is unmatched, and in order to turn W into a witness graph,
one of the k matched squares should be removed and the pair (u, v) with an additional pair (u′ , v ′ )
should be “matched”. There are k options to remove an existing square, and at most m options to
choose a pair u′ , v ′ to match (u, v) with. Therefore, the number of potential neighbors of W is at
most mk. It follows that
dnw (Aπ,(u,v) )
16mk
16t
16k
=
= 3/2 ,
=
dw (Aπ,(u,v) )
m2
m
m
and the proof is complete.
4.3.4
Statistical distance
For an all-neighbors query q = u we say that the corresponding answer is a witness answer if u ∈ L
and a 6= R, or symmetrically if u ∈ R and a 6= L. Let E Q be the set of all query-answer histories π
of length Q such that there exists a query-answer pair (q, a) in π in which q is an all-neighbors pair
Q
Q
and a is a witness answer with respect to that query, and let E = ΠQ \ E Q . That is, E is the set
of all query-answer histories of length Q such that no all-neighbors query is answered with a witness
answer. Let Pe1 and Pe2 by the induced distributions of the processes P1 and P2 conditioned on the
event that the process do not reply with a witness answer. Observe that for every query-answer
history π of length t − 1, for every query qt that is either a pair query or a random new-neighbor
query and for every a ∈ Ans(π, qt ),
PrPeb [a | π, qt ] = PrPb [a | π, qt ].
for b ∈ {1, 2}. Therefore, the proof of the next lemma is exactly the same as the proof of Lemma 19,
√
except that occurrences of the term (t/m3/2 ) are replaced by (k/m) instead of (1/ m) and we apply
Lemma 24 instead of Lemma 18.
32
√
√
3/2
Lemma 25. Let t = k · m for an integer k such that 1 < k ≤ 4m and let Q = m
600t . For every
t ≤ Q, every query-answer history π of length t − 1 such that π is consistent with G1 and for every
pair or random new-neighbors query qt ,
X
a∈Ans(π,qt )
PrPe1 [a | π, qt ] − PrPe2 [a | π, qt ] =
96k
96t
= 3/2 .
m
m
Note that Lemma 25 does not cover all-neighbors queries, and hence we establish the next
lemma.
√
√
3/2
Lemma 26. Let t = k · m for an integer k such that 1 < k ≤ 4m and let Q = m
600t . For every
t ≤ Q, every query-answer history π of length t − 1 such that π is consistent with G1 and for every
all-neighbors query qt ,
16k
PrP2 [at is a witness answer | π, qt ] ≤ √ .
m
Proof. Assume without loss of generality that u ∈ L. By the definition of the process P2 , it
answers the query consistently with a uniformly selected random graph G2 ∈ G2 (π) by returning
the complete set of u’s neighbors in G2 . In G2 , there are two types of graphs. First, there are graphs
in which u is not matched, that is (u, u′ ) ∈
/ M L for every vertex u′ ∈ L. In these graphs the set
√
of u’s neighbors is R ={r1 , . . . , r m }. We refer to these graphs as non-witness graphs. The second
type of graphs are those in which (u, u′ ) ∈ M L for some u′ ∈ L and (u, v) ∈ M C for some v ∈ R.
In these graphs the set of u’s neighbors is (R \ {v}) ∪ {u′ }. We refer to these graphs as witness
graphs. As before, let Ans(π, qt ) be the set of all possible answers for an all-neighbors query qt . It
holds that
X
PrP2 [at is a witness answer | π, qt ] =
PrP2 [a | π, qt ]
a∈Ans(π,qt )
a6=R
=
X
u′ ∈L,v∈R
=
|G2 (π ◦ ((u, u′ ), 1) ◦ ((u, v), 0))|
|G2 (π)|
X |G2 (π ◦ ((u, u′ ), 1))| X |G2 (π ◦ ((u, u′ ), 1) ◦ ((u, v), 0))|
·
|G2 (π)|
|G2 (π)|
′
v∈R
u ∈L
X |G2 (π ◦ ((u, u′ ), 1))|
.
=
|G2 (π)|
′
u ∈L
Similarly to the proof of Lemma 19, for every u and u′ in L,
PrP2 [at is a witness answer | π, qt ] =
|G2 (π◦((u,u′ ),1))|
|G2 (π)|
≤
16k
m .
Therefore,
X |G2 (π ◦ ((u, u′ ), 1))| √
16k
16k
≤ m·
=√ ,
|G2 (π)|
m
m
′
u ∈L
and the lemma follows.
√
It remains to prove that a similar lemma to Lemma 20 holds for m ≤ t ≤ 14 m (and the
distributions D1ALG and D2ALG as defined in this subsection).
√
√
Lemma 27. Let t = k · m for an integer k such that 1 < k ≤ 4m . For every algorithm ALG that
performs at most Q =
m3/2
600t
queries, the statistical distance between D1ALG and D2ALG is at most 13 .
33
Q
Proof. Let the sets E Q and E be as defined in the beginning of this subsection. By the definition
of the statistical distance, and since PrP1 ,ALG [E Q ] = 0,
X
X
1
PrP1 ,ALG [π] − PrP2 ,ALG [π] +
PrP1 ,ALG [π] − PrP2 ,ALG [π]
d(D1ALG , D2ALG ) =
2
Q
Q
π∈E
π∈E
X
1
= PrP2 ,ALG [E Q ] +
(23)
PrP1 ,ALG [π] − PrP2 ,ALG [π] .
2
Q
π∈E
By Lemma 26, the probability of detecting a witness as a result of an all-neighbors query is at most
√
16k
√
. Since in Q queries, there can be at most 4Q/ m all-neighbors queries, we have that
m
PrDALG [E Q ] ≤
2
1
.
6
(24)
We now turn to upper bound the second term. Let α = PrP2 ,ALG [E Q ].
X
π∈E
Q
PrP1 ,ALG [π] − PrP2 ,ALG [π]
=
X
π∈E
=
π∈E
≤
Q
X
π∈E
≤
Q
X
Q
X
π∈E
Q
Q
Q
PrPe1 ,ALG [π] · PrP1 ,ALG [E ] − PrPe2 ,ALG [π] · PrP2 ,ALG [E ]
(25)
PrPe1 ,ALG [π] − (1 − α) · PrPe2 ,ALG [π]
Q
PrPe1 ,ALG [π] − PrPe2 ,ALG [π] + α · PrPe2 ,ALG [E ]
PrPe1 ,ALG [π] − PrPe2 ,ALG [π] +
1
,
6
(26)
Q
where in Equation (25) we used the fact that PrP1 ,ALG [E ] = 1, and in Equation (26) we used the
Q
fact that PrPe2 ,ALG [E ] = 1 and that α ≤ 1/6.
Therefore, it remains to bound
X
PrPe1 ,ALG [π] − PrPe2 ,ALG [π] .
π∈E
Q
ALG for t ∈ [Q − 1] be as defined in Lemma 20 (based on the
Let the hybrid distributions D1,t
ALG
ALG
that are induced by the processes P1 and P2 that were defined in
and D2
distributions D1
ALG
ALG conditioned on the event that no
e
this subsection). Also, let D1,t be the hybrid distribution D1,t
e ALG is the distribution over query-answer
all-neighbors query is answered with a witness. That is, D
1,t
histories π of length Q, where in the length t prefix ALG is answered by the process P1 , in the
length Q − t suffix ALG is answered by the process P2 , and each all-neighbors query is answered
consistently with G1 (so that no witness is observed). By the above definitions and the triangle
inequality,
X
π∈E
Q
PrPe1 ,ALG [π] − PrPe2 ,ALG [π] ≤
Q−1
X
34
t
X
π∈E
Q
PrDe ALG [π] − PrDe ALG [π] .
1,t+1
1,t
(27)
As in the proof of Lemma 20 we have that for every t ∈ [Q − 1],
X
PrDe ALG [π] − PrDe ALG [π]
π∈E
1,t+1
Q
1,t
X
=
π ′ =π1 ,...,πt−1 ,qt :
t−1
π ′ ∈E
PrPe1 ,ALG [π ′ , qt ] ·
X
PrPe1 [a | π ′ , qt ] − PrPe2 [a | π ′ , qt ] .
a∈Ans(π ′ ,qt ):
t
π ′ ◦(qt ,a)∈E
(28)
By Lemma 25 (and since for an all-neighbor query qt we have that the (unique) answer according
to Pe2 is the same as according to Pe1 ),
X
PrPe1 [a | π ′ , qt ] − PrPe2 [a | π ′ , qt ] ≤
a∈Ans(π ′ ,qt ):
t
π ′ ◦(qt ,a)∈E
and it follows that
X
π∈E
Hence, for Q =
PrDe ALG [π] − PrDe ALG [π] ≤
1,t+1
Q
1,t
96k
96t
= 3/2 ,
m
m
96t
96k
= 3/2 .
m
m
m3/2
600t ,
Q−1
X
t
X
π∈E
Q
PrDe ALG [π] − PrDe ALG [π] ≤ Q ·
1,t
1,t+1
1
48t
≤ .
3/2
6
m
Combining Equations (23), (24), (26), (27) and (29), we get
1 1 1 1
1
ALG
ALG
+ +
d(D1 , D2 ) ≤
≤ ,
2 6 6 6
3
(29)
(30)
and the proof is complete.
4.4
4.4.1
Lower Bound for t <
1√
m.
4
The construction
In this case the basic structure of G1 and G2 is a bit different. Also, for the sake of simplicity, we
present graphs with 2m edges, and either 0 or 4t triangles. The graph G1 has three components –
√
√
two complete bipartite graphs, each over 2 m vertices, and an independent set of size n − 4 m.
Let A and B be the left-hand side and the right-hand side sets, respectively, of the first bipartite
component, and C and D of the second one. We refer to the edges between
A and B and the edges
√
m
between C and D as black edges. We divide each of these
sets into t subsets of size t, denoted
√
{Λ1 , . . . , Λ √m } for Λ ∈ {A, B, C, D}. For every 1 ≤ i ≤
t
m
t ,
we first remove a complete bipartite
graph between Ai and Bi and between Ci and Di , and refer to the removed edges as red edges.
We then add a complete bipartite graph between Bi and Ci and between Di and Ai , and refer to
√
added edges as blue edges. Note that this maintains the degrees of all the vertices to be m.
In G2 the basic structure of all the graphs is the same as of G1 with the following modifications.
Each graph is defined by the choice of four “special” vertices a∗ , b∗ , c∗ , d∗ such that a∗ ∈ Aia∗ , b∗ ∈
Bib∗ , c∗ ∈ Cic∗ and d∗ ∈ Did∗ for some indices ia∗ , ib∗ , ic∗ and id∗ such that no two indices are equal.
We then add edges (a∗ , c∗ ) and (b∗ , d∗ ), referred to as green edges, and remove edges (a∗ , b∗ ) and
35
A
B
C
D
c∗
a∗
d∗
b∗
Figure 6: An illustration of a graph in G2 . The broken thin (red) edges describe edges that were
removed and the thin (blue) edges describe edges that were added. The broken thick (purple) edges
describe the special non-edges (a∗ , b∗ ) and (c∗ , d∗ ). The curly (green) edges describe the special
edges (a∗ , c∗ ) and (b∗ , d∗ ).
(c∗ , d∗ ), referred to as purple edges. We also refer to the green and purple edges as special edges.
Note that we add one edge and remove one edge from each special vertex, thus maintaining their
initial degrees. See Figure 6.
We first prove that t(G1 ) = 0 and then that for every graph G in G2 , t(G) = 4t.
Claim 28. The graph G1 has no triangles.
Proof. Consider an edge (u, v) in G1 . First assume u and v are connected by a black edge, that
is, they are on different sides of the same bipartite component. Hence we can assume without loss
of generality that u ∈ A and that v ∈ B. Since u is in A it is only connected to vertices in B or
vertices in D. Since v is in B it is only connected to vertices in A or vertices in C. Thus u and v
cannot have a common neighbor. A similar analysis can be done for a pair (u, v) that is connected
by a blue edge. Therefore t(G) is indeed zero as claimed.
Claim 29. For every graph G ∈ G2 , t(G) = 4t.
Proof. Since the only differences between G1 and graphs in G2 are the two added green edges and
the two removed red edges, any triangle in G2 must include a green edge. Therefore we can count
all the triangles that the green edges form. Consider the green edge (a∗ , c∗ ) and recall that a∗ is
in Aia∗ and c∗ is in Cic∗ . The only common neighbors of (a∗ , c∗ ) are all the vertices in Bic∗ and all
the vertices in Dia∗ . A vertex v such that v ∈
/ Bic∗ and v ∈
/ Dia∗ is either (1) in A or in D \ Dia∗ , in
which case it is not a neighbor of a∗ , or it is (2) in C or in B \Bic∗ , in which case it is not a neighbor
36
of c∗ . Since both Bic∗ and Dia∗ are of size t, the edge (a∗ , c∗ ) participates in 2t triangles. Similarly
the edge (b∗ , d∗ ) participate in 2t triangles, and together we get that t(G) = 4t, as claimed.
4.4.2
The processes P1 and P2
The definition of the processes P1 and P2 is the same as in Subsection 4.3.2 (using the modified
definitions of G1 and G2 ).
4.4.3
The auxiliary graph
We define a switch for this case as well. Informally, a switch between a matched pair (u∗ , v ∗ ) and
an unmatched pair (u, v) is “unmatching” (u∗ , v ∗ ) and “matching” (u, v) instead. Formally stating
we define a switch as follows.
Definition 9. A switch between a green pair (a∗ , c∗ ) and a pair (a, c) such that a ∈ Ai , c ∈ Cj
and none of the indices i, j, ib∗ , id∗ are equal, is the following two steps process. In the first step we
“unmatch” (a∗ , c∗ ) by removing the green edge (a∗ , c∗ ) and adding the edges (a∗ , b∗ ) and (c∗ , d∗ ).
In the second step we “match” (a, c) by adding the green edge (a, c) and removing the edges (a, b∗ )
and (c, d∗ ). A switch with the pair (b∗ , d∗ ) can be defined in a similar manner.
a
a
c
c∗
c
c∗
A switch
a∗
a∗
d∗
d∗
b∗
b∗
Figure 7: An illustration of a switch between the pairs (a∗ , c∗ ) and (a, c).
√
m
. For every t ≤ Q, every query-answer history π of length t − 1 and
Let t < m and let Q = 600
every pair (u, v) we define the following auxiliary graph. The witness nodes are graphs in which
(u, v) is one of the four special pairs. If the pair is a green matched pair then there is an edge in
the auxiliary graph between a witness graph W and a non-witness graph W , if W can be obtained
from W by a single switch between (u, v) and another unmatched pair.
√
m
Lemma 30. For t < 14 m let Q = 600
. For every t ≤ Q, every query-answer history π of length
t − 1 such that π is consistent with G1 and every pair (u, v),
dnw (Aπ,(u,v) )
8
= .
dw (Aπ,(u,v) )
m
Proof. We analyze the case where the pair (u, v) is such that u ∈ A and v ∈ C, as the proof for
the other cases is almost identical. We first prove that dw (Aπ,(u,v) ) ≥ 81 m. A witness graph W
is a graph in which (a, c) is a special pair. That is (u, v) = (a∗ , c∗ ). Potentially, for every pair
(a′ , c′ ) such that a′ ∈ Ai , c′ ∈ Cj and none of the indices i, j, ib∗ , id∗ are equal, the graph resulting
√
from a switch between (a∗ , c∗ ) and (a′ , c′ ) is a non-witness graph. There are m − 2t vertices a′ in
√
A \ (Aib∗ ∪ Aid∗ ) and for each such a′ there are m − 3t vertices c′ in C \ (Cib∗ ∪ Cid∗ ∪ Cia′ )). Since
37
√
√
√
t < 14 m, there are at least ( m − 2t) · ( m − 3t) = m − 6t2 ≥ 41 m potential pairs (a′ , c′ ) that
(a∗ , c∗ ) could be switched with. For the resulting graph to be consistent, that is, to be in G2 (π),
the pair (a′ , c′ ) must be such that the pairs (a′ , c′ ), (a∗ , b∗ ) and (c∗ , d∗ ) have not been observed yet
1
1
by the algorithm. Since the number of queries is at most 600
m, at least 14 m − 125
m ≥ 18 m of the
potential pairs (a′ , c′ ) can be switched with (a∗ , c∗ ) such that the resulting graph is consistent with
G2 (π). Therefore, dw (Aπ,(u,v) ) ≥ 81 m.
Now consider a non-witness graph W . There is only one possibility to turn W into a witness
graph, which is to switch the pair (u, v) with the green pair (a∗ , c∗ ). Therefore, the maximal degree
of every non-witness graph, dnw (Aπ,(u,v) ), is 1.
Together we get that
dnw (Aπ,(u,v) )
8
≤ ,
dw (Aπ,(u,v) )
m
and the proof is complete.
4.4.4
Statistical distance
A similar proof to the ones of Lemma 25 and Lemma 26 using Lemma 30 gives the following
√
lemmas for the case that 1 ≤ t < 14 m.
√
m
. For every t ≤ Q, every query-answer history π of
Lemma 31. Let 1 ≤ t < 41 m and Q = 600
length t − 1 such that π is consistent with G1 and for every all-neighbors query qt ,
PrP2 [at is a witness answer | π, qt ] ≤
16
.
m
√
m
Lemma 32. Let 1 ≤ t < 41 m and Q = 600
. For every t ≤ Q, every query-answer history π of
length t − 1 such that π is consistent with G1 and for every pair or random new-neighbors query qt ,
X
a∈Ans(π,qt )
PrPe1 [a | π, qt ] − PrPe2 [a | π, qt ] =
96
.
m
The next lemma is proven in a similar way to 1.3.4 based on the above two lemma.
√
m
, the statistical
Lemma 33. Let 1 ≤ t < 41 m. For every algorithm ALG that asks at most Q = 600
1
ALG
ALG
is at most 3 .
and D2
distance between D1
4.5
Wrapping things up
Theorem 15 follows from Lemmas 20, 23, 27 and 33, and the next corollary is proved using Theorems
15 and 14.
Corollary 34. Any
algorithm for the number of triangles in a graph
n
multiplicative-approximation
o
m3/2
n
must perform Ω t(G)1/3 + min m, t(G)
queries, where the allowed queries are degree queries,
pair queries and neighbor queries.
Proof. Assume towards a contradiction that there exists an algorithm ALG’ for which the following
holds:
1. ALG’ is allowed to ask neighbor queries as well as degree queries and pair queries.
2. ALG’ asks Q′ queries.
38
3. ALG’ outputs a (1 ± ǫ)-approximation to the number of triangles of any graph G with probability greater than 2/3.
Using ALG’ we can define an algorithm ALG that is allowed random new-neighbor queries, performs
at most Q = 3Q′ queries and answers correctly with the same probability as ALG’ does. ALG runs
ALG’ and whenever ALG’ performs a query qt′ , ALG does as follows:
• If qt′ is a degree query, ALG performs the same query and sets a′t = at .
• If qt′ is a pair query (u, v), then ALG performs the same query q = q ′ . Let at be the
corresponding answer.
– If at = 0, then ALG sets a′t = at .
– If at = 1, then ALG sets a′t = (at , i, j), such that i and j are randomly chosen labels
that have not been previously used for neighbors of u and v, and are within the ranges
[1..d(u)] and [1..dv ] respectively.
• If qt′ is a neighbor query (u, i), ALG performs a random new-neighbor query qt = u, and
returns the same answer a′t = at .
We note that the above requires the algorithm ALG to store for every vertex v, all the labels used for
its neighbors in the previous steps. Once ALG’ outputs an answer, ALG outputs the same answer.
It follows that ALG performs at most 3Q queries to the graph G. By the third assumption above,
ALG outputs a (1 ± ǫ)-approximation
to the n
number of
otriangles of anygraph G withnprobability
o
3/2
n
m3/2
′
then Q ∈
/ Ω t(G)n1/3 + min m, m
greater than 2/3. If Q ∈
/ Ω t(G)1/3 + min m, t(G)
t(G)
which is a contradiction to Theorem 14 and Theorem 15.
References
[ADNK14]
N. K. Ahmed, N. Duffield, J. Neville, and R. Kompella. Graph sample and hold: A
framework for big graph analytics. In Conference on Knowledge Discovery and Data
Mining (KDD), 2014. 2, 6
[AGM12]
K. J. Ahn, S. Guha, and A. McGregor. Graph sketches: sparsification, spanners, and
subgraphs. In Principles of Database Systems, pages 5–14, 2012. 2, 6
[AKM13]
Shaikh Arifuzzaman, Maleq Khan, and Madhav Marathe. Patric: A parallel algorithm for counting triangles in massive networks. In Proceedings of the 22nd ACM
international conference on Conference on information & knowledge management,
pages 529–538. ACM, 2013. 2, 6
[Avr10]
Haim Avron. Counting triangles in large graphs using randomized matrix trace estimation. In Workshop on Large-scale Data Mining: Theory and Applications, volume 1, 2010. 2, 6
[AYZ97]
Noga Alon, Raphael Yuster, and Uri Zwick. Finding and counting given length cycles.
Algorithmica, 17(3):209–223, 1997. 2, 5
[BBCG08]
Luca Becchetti, Paolo Boldi, Carlos Castillo, and Aristides Gionis. Efficient semistreaming algorithms for local triangle counting in massive graphs. In Proceedings of
the 14th ACM SIGKDD international conference on Knowledge discovery and data
mining, pages 16–24. ACM, 2008. 2, 6
39
[BFL+ 06]
Luciana S Buriol, Gereon Frahling, Stefano Leonardi, Alberto Marchetti-Spaccamela,
and Christian Sohler. Counting triangles in data streams. In Proceedings of the
twenty-fifth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database
systems, pages 253–262. ACM, 2006. 2, 6
[BHLP11]
J. W. Berry, B. Hendrickson, R. A. LaViolette, and C. A. Phillips. Tolerating the
Community Detection Resolution Limit with Edge Weighting. Physical Review E,
83(5), May 2011. 2
[BPWZ14]
A. Björklund, R. Pagh, V. Vassilevska Williams, and U. Zwick. Listing triangles. In
Proceedings of International Colloquium on Automata, Languages, and Programming
(ICALP), pages 223–234, 2014. 2, 5
[Bur04]
R. S. Burt. Structural holes and good ideas.
110(2):349–399, 2004. 2
[BYKS02]
Ziv Bar-Yossef, Ravi Kumar, and D Sivakumar. Reductions in streaming algorithms,
with an application to counting triangles in graphs. In Proceedings of the Thirteenth
Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pages 623–632. Society for Industrial and Applied Mathematics, 2002. 2, 6
[CC11]
Shumo Chu and James Cheng. Triangle listing in massive networks and its applications. In Proceedings of the 17th ACM SIGKDD international conference on
Knowledge discovery and data mining, pages 672–680. ACM, 2011. 2, 6
[CEF+ 05]
Artur Czumaj, Funda Ergün, Lance Fortnow, Avner Magen, Ilan Newman, Ronitt
Rubinfeld, and Christian Sohler. Approximating the weight of the euclidean minimum
spanning tree in sublinear time. SIAM Journal on Computing, 35(1):91–109, 2005. 5
[CN85]
Norishige Chiba and Takao Nishizeki. Arboricity and subgraph listing algorithms.
SIAM Journal on Computing, 14(1):210–223, 1985. 2, 5, 11
[Coh09]
J. Cohen. Graph twiddling in a MapReduce world. Computing in Science & Engineering, 11:29–41, 2009. 6
[Col88]
J. S. Coleman. Social capital in the creation of human capital. American Journal of
Sociology, 94:S95–S120, 1988. 2
[CRT05]
Bernard Chazelle, Ronitt Rubinfeld, and Luca Trevisan. Approximating the minimum
spanning tree weight in sublinear time. SIAM Journal on Computing, 34(6):1370–
1379, 2005. 5
[CS09]
Artur Czumaj and Christian Sohler. Estimating the weight of metric minimum spanning trees in sublinear time. SIAM Journal on Computing, 39(3):904–922, 2009. 5
[EM02]
J.-P. Eckmann and E. Moses. Curvature of co-links uncovers hidden thematic layers
in the World Wide Web. Proceedings of the National Academy of Sciences (PNAS),
99(9):5825–5829, 2002. 2
[Fei06]
Uriel Feige. On sums of independent random variables with unbounded variance and
estimating the average degree in a graph. SIAM Journal on Computing, 35(4):964–
984, 2006. 3, 5, 7, 11, 15, 16
40
American Journal of Sociology,
[FWVDC10] Brooke Foucault Welles, Anne Van Devender, and Noshir Contractor. Is a friend
a friend?: Investigating the structure of friendship networks in virtual worlds. In
CHI’10 Extended Abstracts on Human Factors in Computing Systems, pages 4027–
4032. ACM, 2010. 2
[GR02]
Oded Goldreich and Dana Ron. Property testing in bounded degree graphs. Algorithmica, pages 302–343, 2002. 19
[GR08]
Oded Goldreich and Dana Ron. Approximating average parameters of graphs. Random Structures and Algorithms, 32(4):473–493, 2008. 3, 5
[GRS11]
Mira Gonen, Dana Ron, and Yuval Shavitt. Counting stars and other small subgraphs
in sublinear-time. SIAM Journal on Discrete Math, 25(3):1365–1411, 2011. 2, 5
[HKNO09]
Avinatan Hassidim, Jonathan A Kelner, Huy N Nguyen, and Krzysztof Onak. Local
graph partitions for approximation and testing. In Proceedings of the Fiftieth Annual
Symposium on Foundations of Computer Science (FOCS), pages 22–31. IEEE, 2009.
5
[HL70]
P. W. Holland and S. Leinhardt. A method for detecting structure in sociometric
data. American Journal of Sociology, 76:492–513, 1970. 2
[IR78]
Alon Itai and Michael Rodeh. Finding a minimum circuit in a graph. SIAM Journal
on Computing, 7(4):413–423, 1978. 2, 5
[JG05]
Hossein Jowhari and Mohammad Ghodsi. New streaming algorithms for counting
triangles in graphs. In Computing and Combinatorics, pages 710–716. Springer, 2005.
2, 6
[JSP13]
M. Jha, C. Seshadhri, and A. Pinar. A space efficient streaming algorithm for triangle
counting using the birthday paradox. In Proceedings of the 19th ACM SIGKDD
international conference on Knowledge discovery and data mining, KDD ’13, pages
589–597, New York, NY, USA, 2013. ACM. 2, 6
[KMPT12]
Mihail N Kolountzakis, Gary L Miller, Richard Peng, and Charalampos E
Tsourakakis. Efficient triangle counting in large graphs via degree-based vertex partitioning. Internet Mathematics, 8(1-2):161–185, 2012. 2, 6
[KMSS12]
D. M. Kane, K. Mehlhorn, T. Sauerwald, and H. Sun. Counting arbitrary subgraphs
in data streams. In International Colloquium on Automata, Languages, and Programming (ICALP), pages 598–609, 2012. 2, 6
[KPP+ 13]
Tamara G. Kolda, Ali Pinar, Todd Plantenga, C. Seshadhri, and Christine Task.
Counting triangles in massive graphs with MapReduce. arXiv:1301.5887, January
2013. 6
[MR09]
Sharon Marko and Dana Ron. Approximating the distance to properties in boundeddegree and general sparse graphs. ACM Transactions on Algorithms, 5(2), 2009.
5
[MSOI+ 02]
Ron Milo, Shai Shen-Orr, Shalev Itzkovitz, Nadav Kashtan, Dmitri Chklovskii, and
Uri Alon. Network motifs: simple building blocks of complex networks. Science,
298(5594):824–827, 2002. 2
41
[NO08]
Huy N Nguyen and Krzysztof Onak. Constant-time approximation algorithms via
local improvements. In Proceedings of the Forty-Ninth Annual Symposium on Foundations of Computer Science (FOCS), pages 327–336. IEEE, 2008. 5
[ORRR12]
Krzysztof Onak, Dana Ron, Michal Rosen, and Ronitt Rubinfeld. A near-optimal
sublinear-time algorithm for approximating the minimum vertex cover size. In Proceedings of the Twenty-Third Annual ACM-SIAM Symposium on Discrete Algorithms
(SODA), pages 1123–1131. SIAM, 2012. 5
[Por00]
Alejandro Portes. Social capital: Its origins and applications in modern sociology.
LESSER, Eric L. Knowledge and Social Capital. Boston: Butterworth-Heinemann,
pages 43–67, 2000. 2
[PR07]
Michal Parnas and Dana Ron. Approximating the minimum vertex cover in sublinear time and a connection to distributed algorithms. Theoretical Computer Science,
381(1-3):183–196, 2007. 5
[PT12]
R. Pagh and C. Tsourakakis. Colorful triangle counting and a mapreduce implementation. Information Processing Letters, 112:277–281, 2012. 6
[PTTW13]
A. Pavan, K. Tangwongsan, S. Tirthapura, and K.-L. Wu. Counting and sampling
triangles from a graph stream. In International Conference on Very Large Databases
(VLDB), 2013. 2, 6
[SKP12]
C. Seshadhri, T. G. Kolda, and A. Pinar. Community structure and scale-free collections of Erdös-Rényi graphs. Physical Review E, 85(5):056109, May 2012. 2
[SPK13]
C. Seshadhri, A. Pinar, and T. G. Kolda. Fast triangle counting through wedge
sampling. In Proceedings of the SIAM Conference on Data Mining, 2013. 2, 6
[SV11]
S. Suri and S. Vassilvitskii. Counting triangles and the curse of the last reducer. In
World Wide Web (WWW), pages 607–614, 2011. 2, 6
[SW05a]
T. Schank and D. Wagner. Approximating clustering coefficient and transitivity.
Journal of Graph Algorithms and Applications, 9:265–275, 2005. 2
[SW05b]
T. Schank and D. Wagner. Finding, counting and listing all triangles in large graphs,
an experimental study. In Experimental and Efficient Algorithms, pages 606–609.
Springer Berlin / Heidelberg, 2005. 2, 6
[TDM+ 09]
Charalampos E Tsourakakis, Petros Drineas, Eirinaios Michelakis, Ioannis Koutis,
and Christos Faloutsos. Spectral counting of triangles in power-law networks
via element-wise sparsification. In Social Network Analysis and Mining, 2009.
ASONAM’09. International Conference on Advances in, pages 66–71. IEEE, 2009.
6
[TKM11]
Charalampos E Tsourakakis, Mihail N Kolountzakis, and Gary L Miller. Triangle
sparsifiers. J. Graph Algorithms Appl., 15(6):703–726, 2011. 2, 6
[TKMF09]
Charalampos E Tsourakakis, U Kang, Gary L Miller, and Christos Faloutsos. Doulion:
counting triangles in massive graphs with a coin. In Proceedings of the 15th ACM
SIGKDD international conference on Knowledge discovery and data mining, pages
837–846. ACM, 2009. 2
42
[TPT13]
K. Tangwongsan, A. Pavan, and S. Tirthapura. Parallel triangle counting in massive
streaming graphs. In ACM Conference on Information & Knowledge Management
(CIKM), 2013. 2, 6
[Tso08]
Charalampos E Tsourakakis. Fast counting of triangles in large real networks without counting: Algorithms and laws. In Data Mining, 2008. ICDM’08. Eighth IEEE
International Conference on, pages 608–617. IEEE, 2008. 2, 6
[YYI09]
Yuichi Yoshida, Masaki Yamamoto, and Hiro Ito. An improved constant-time approximation algorithm for maximum. In Proceedings of the Fourty-First Annual ACM
Symposium on the Theory of Computing, pages 225–234. ACM, 2009. 5
43
| 8cs.DS
|
MULTIPLICATIVE STRUCTURES OF HYPERCYCLIC
FUNCTIONS FOR CONVOLUTION OPERATORS
LUIS BERNAL-GONZÁLEZ, J. ALBERTO CONEJERO, GEORGE COSTAKIS,
AND JUAN B. SEOANE-SEPÚLVEDA
arXiv:1710.10413v1 [math.FA] 28 Oct 2017
Dedicated to Professor Domingo Garcı́a on the occasion of his 60th birthday
Abstract. In this note, it is proved the existence of an infinitely generated
multiplicative group consisting of entire functions that are, except for the constant function 1, hypercyclic with respect to the convolution operator associated
to a given entire function of subexponential type. A certain stability under multiplication is also shown for compositional hypercyclicity on complex domains.
1. Introduction
Assume that X is a (Hausdorff) topological vector space over the real line R or
the complex plane C, and consider the vector space L(X) of all operators on X,
that is, the family of all continuous linear self-mappings T : X → X. An operator
T ∈ L(X) is said to be hypercyclic provided that it admits a dense orbit, that is,
provided that there is some vector x0 ∈ X (called hypercyclic for T ) such that
the orbit {T n x0 : n ∈ N} of x0 under T is dense in X (N := {1, 2, . . . }). The
set of hypercyclic vectors for T will be denoted by HC(T ). In this paper, we are
concerned with the size of HC(T ), mainly from an algebraic point of view and for
certain differential operators. For background on hypercyclic operators we refer
the reader to the excellent books [6, 20]. An account of concepts and results about
algebraic structures inside nonlinear sets can be found in [2, 5, 11, 15, 17, 29, 30].
It is well known that if X is an F-space (i.e., complete and metrizable) and T is
a hypercyclic operator then the set HC(T ) is residual, that is, it contains a dense
Gδ subset of the (Baire) space X; we can say that HC(T ) is topologically large.
Furthermore, for any topological vector space and any hypercyclic T ∈ L(X), the
family HC(T ) is algebraically large; specifically, it contains, except for 0, a dense
(even T -invariant) vector subspace of X (see [33]). Starting from [25], a number of
criteria have been established for an operator T ∈ L(X) to support a closed infinite
dimensional vector subspace all of whose nonzero vectors are T -hypercyclic on an
2010 Mathematics Subject Classification. 22A05, 30E10, 30K20, 46E10, 47A16.
Key words and phrases. hypercyclic operator, convolution operator, composition operator,
subexponential growth, group of non-vanishing entire functions, lineability, spaceability.
1
2
BERNAL, CONEJERO, COSTAKIS, AND SEOANE
F-space X; however, not all hypercyclic operators support such a subspace (see
[6, Chapter 8] and [20, Chapter 10]).
By a domain in C we mean a nonempty connected open subset G ⊂ C. It
is well known that the space H(G) of holomorphic functions G → C becomes
an F-space when endowed with the topology of uniform convergence on compact
subsets of G. We are mainly interested in operators defined on the space H(C)
of entire functions C → C. An operator T ∈ L(H(C)) is said to be a convolution
operator provided that it commutes with translations, that is,
T ◦ τa = τa ◦ T for all a ∈ C,
where τa f := f (· + a). Then T ∈ L(H(C)) happens to be a convolution operator
if and only if T is an infinite order linear differential operator with constant coefficients T = Φ(D), where Φ is an entire function with exponential type, that is,
there exist constants A,P
B ∈ (0, +∞) such that |Φ(z)| ≤ AeB|z| for all z ∈ C. For
such a function Φ(z) = n≥0 an z n and f ∈ H(C), we have
Φ(D)f =
∞
X
an f (n) .
n=0
Godefroy and Shapiro [18] proved that every non-scalar convolution operator is
hypercyclic, so covering the classical Birkhoff and MacLane results on hypercyclicity of the translation operator τa (take Φ(z) = eaz , a 6= 0) and of the derivative
operator D : f 7→ f ′ (take Φ(z) = z), respectively. It has been proved that,
for every non-scalar convolution operator T , the set HC(T ) contains, except for
0, a closed infinite dimensional vector subspace of H(C); see [24, 28, 32] and also
[2, Section 4.5] and [20, Section 10.1].
In view of the preceding paragraph, we can say that hypercyclic vectors of
convolution operators are rather stable under summation and scaling. However,
stability under multiplication does not seem to be so clear. For instance, for every
a 6= 0, every f ∈ HC(τa ) and every n ∈ N with n ≥ 2 we have that f n 6∈ HC(τa )
(see [3, Cor. 2.4]). As a positive result, it was proved in [3, Th. 2.3] the existence of
a function f ∈ H(C) –in fact, of a residual subset of them– such that f n ∈ HC(D)
for all n ∈ N, see also [4]. This result was extended by Bayart and Matheron
who proved that there is even a residual set of functions in H(C) generating a
hypercyclic algebra for the derivative operator, that is every non-null function in
one of these algebras is hypercyclic for the operator D [6, Th. 8.26]. Recall that
the algebra generated by a function f is nothing but the set {P ◦f : P polynomial,
P (0) = 0}. The existence of (one-generated) algebras of hypercyclic functions for
D was also independently proved by Shkarin in [32] and extended by Bès et al. in
[12] to operators of the form P (D), where P is a nonconstant polynomial with
P (0) = 0. The existence of hypercyclic algebras for many convolution operators
HYPERCYCLIC FUNCTIONS FOR CONVOLUTION OPERATOS
3
not induced by polynomials, such as cos(D), DeD , or eD − aI, where 0 < a ≤ 1
was recently shown in [13].
So far, the existence of multiply generated algebras of hypercyclic entire functions is unknown. The lack of knowledge about existence of families of hypercyclic
functions that are stable under multiplication seems to be one of the main obstacles. Our goal in this paper is to contribute to fill in this gap. Specifically, given
a nonconstant entire function Φ of subexponential type, we will construct in Section 3 an infinitely generated multiplicative group of entire functions all of whose
members, except for the constant function 1(z) = 1, are hypercyclic with respect
to the operator Φ(D). A certain multiplicative stability is also shown for hypercyclicity with respect to composition operators. Section 2 is devoted to provide the
necessary background and auxiliary results.
2. Non-vanishing hypercyclic entire functions
Recall that the exponential type of a Φ ∈ H(C) is defined as, see [14],
τ (Φ) = lim sup
r→∞
log max{|Φ(z)| : |z| = r}
.
r
Hence, f has subexponential type if and only if, given ε > 0, there exists A =
A(ε) ∈ (0, +∞) such that |f (z)| ≤ A eε|z| for all z ∈ C. In fact, if Φ has subexponential type then Φ(D) is a well defined operator on H(G) for any domain
G ⊂ C (see for instance [7] or [9, Theorem 4]). It should be underlined that if Φ
is of exponential type, then the operator Φ(D) does not act on proper domains
in general: take, for instance, G = D and Φ(z) = ez .
As we have mentioned in Section 1, there is no entire function f such that
f is hypercyclic for the translation operator τa = eaD (a 6= 0). If we observe
that Φ(z) := eaz has exponential type τ (Φ) = |a| > 0, then we may wonder
whether there are entire functions f such that f and f 2 are in HC(Φ(D)) if Φ has
subexponential type, i.e., if τ (Φ) = 0. This property happens to be true, in a strong
sense, in the special case of Φ = P , a nonconstant polynomial with P (0) = 0 [12].
The rate of growth of a hypercyclic function for D has been optimally estimated
in [19, 31].
2
It is well known (see, for instance, [1]) that a function f ∈ H(C) is never
zero if and only if there is g ∈ H(C) such that f = eg . Consistently, we can
denote the family of non-vanishing entire functions by eH(C) . This family forms,
trivially, a group under the pointwise multiplication. Moreover, eH(C) is –as it
is easily proven– a topological group (for background on topological groups, see
for instance [23]) under the topology of uniform convergence in compacta, that is,
both mappings
1
(f, g) ∈ eH(C) × eH(C) 7→ f g ∈ eH(C) and f ∈ eH(C) 7→ ∈ eH(C)
f
4
BERNAL, CONEJERO, COSTAKIS, AND SEOANE
are continuous, from which one can derive that each mapping f ∈ eH(C) 7→ f m ∈
eH(C) (m ∈ Z = the set of integers) is a continuous homomorphism (recall that a
mapping Φ : G1 → G2 between two groups G1 , G2 is an homomorphism whenever
Φ(ab) = Φ(a)Φ(b) for all a, b ∈ G1 ). Note that this mapping is not bijective
H(C)
(except for m = ±1), but if we consider the topological subgroup e+,0 := {f ∈
eH(C) : f (0) > 0} then each restriction
H(C)
H(C)
Φm : f ∈ e+,0 7→ f m ∈ e+,0
(m ∈ Z \ {0})
is not only continuous (and homomorphic) but also bijective, because for any
H(C)
g ∈ e+,0 there are exactly m entire functions f with f m = g (necessarily, such
f ’s are non-vanishing), but only one of them satisfies f (0) > 0. In fact, in the
H(C)
following two lemmas it is shown that the group e+,0 also enjoys a nice topological
structure and that every Φm is an automorphism of it.
H(C)
Lemma 2.1. The set e+,0 is a Gδ -subset of H(C). In particular, it is a separable
completely metrizable space, as well as a Baire space.
Proof. The second part is a consequence of the first one. Indeed, Alexandroff’s
theorem (see e.g. [27, pp. 47–48]) asserts that a Gδ -set is homeomorphic to a
complete metrizable space; separability is inherited by any subspace of a separable
metrizable space; finally, any completely metrizable space is a Baire space (see
T
H(C)
e.g. [26]). As for the first part, simply put e+,0 = ∞
k=1 Ak , where Ak is defined
as
1
Ak := f ∈ H(C) : inf |f (z)| > 0, |Imf (0)| < and Ref (0) > 0 .
|z|≤k
k
That each Ak is open follows from the facts that {z ∈ C : |z| ≤ k} is compact
and that both evaluation mappings f ∈ H(C) 7→ Ref (0) ∈ R, f ∈ H(C) 7→
Imf (0) ∈ R are continuous.
Lemma 2.2. For each m ∈ Z\ {0}, the mapping Φm is an onto homeomorphism.
Proof. The unique property to be proved is that every Φm has inverse continuous.
Since Φ−1 is an onto homeomorphism, it is enough to see that, given m ∈ N
H(C)
H(C)
with m ≥ 2, the mapping Ψ = (Φm )−1 : e+,0 → e+,0 is continuous. By
H(C)
Lemma 2.1, e+,0 is a completely metrizable topological group. Note that Ψ is a
H(C)
homomorphism from the group e+,0 into itself. According to the abstract closed
graph theorem (see, e.g., [16, Theorem 5.2]), it is enough to show that Ψ has closed
H(C)
graph. To this end, assume that (fk ) ⊂ e+,0 is a sequence such that there are
H(C)
f, g ∈ e+,0 with (fk , Ψ(fk )) → (f, g) as k → ∞ in the topology product. Then
fk → f and Ψ(fk ) → g. The continuity of Φm yields fk = Φm Ψ(fk ) → Φm (g),
and the uniqueness of the limit implies f = Φm (g) or, that is the same, g = Ψ(f ),
which proves that the graph of Ψ is closed, as required.
HYPERCYCLIC FUNCTIONS FOR CONVOLUTION OPERATOS
5
Finally, we will use in the next section the following theorem, that is contained
in [8, Theorem 5]. This theorem is, in turn, an extension of a result about inherited
D-hypercyclicity due to Herzog [21].
Theorem 2.3. If Φ is a nonconstant entire function of subexponential type, then
the set HC(Φ(D)) ∩ eH(C) is residual in eH(C) .
Additional statements on zero-free D-hypercyclic entire functions can be found
in [10].
3. Groups of hypercyclic functions
Firstly, we show that the family of entire functions f that are hypercyclic
with respect to certain convolution operators (including D) satisfying f (0) > 0 is
topologically large.
Proposition 3.1. If Φ is a nonconstant entire function of subexponential type,
H(C)
H(C)
then the set HC(Φ(D)) ∩ e+,0 is residual in e+,0 .
Proof. According to Birkhoff transitivity theorem (see e.g. [20]), if Tn : X → Y
(n ∈ N) is a sequence of continuous mappings between two Hausdorff topological
spaces, with X Baire and first-countable and Y second-countable, then the set
U = U((Tn )) of points x ∈ X whose orbit {Tn x : n ∈ N} is dense in Y is a Gδ
subset of X; consequently, U is residual as soon as it is dense. By Theorem 2.3,
the set HC(Φ(D)) ∩ eH(C) is residual in eH(C) . It is easy to see that the mapping
|f (0)|
H(C)
· f ∈ e+,0
f (0)
is continuous and onto. Then it takes dense sets into dense sets. In particular, the
H(C)
image Π(HC(Φ(D)) ∩ eH(C) ) is dense in e+,0 . Since any nonzero scalar multiple
of a hypercyclic vector is also hypercyclic, we obtain Π(HC(Φ(D)) ∩ eH(C) ) ⊂
H(C)
H(C)
HC(Φ(D)) ∩ e+,0 . But U := HC(Φ(D)) ∩ e+,0 equals the set of elements
H(C)
f ∈ X := e+,0 whose orbit under the sequence (Tn ) := ((Φ(D))n |eH(C) ) is dense
Π : f ∈ eH(C) 7→
+,0
in Y := H(C) (note that X is Baire and first-countable by Lemma 2.1). Therefore
H(C)
U is a Gδ dense subset of e+,0 , hence residual.
Our main result (Theorem 3.3) will be deduced as a consequence of the following,
more abstract, assertion.
Theorem 3.2. Let X be a separable infinite dimensional F-space. Assume that
X is also a unitary commutative linear algebra, and that the corresponding multiplication law (f, g) ∈ X × X 7→ f ∗ g ∈ X is continuous. Suppose also that Z is a
subset of X fulfilling the following conditions:
(i) Z is a Gδ -subset of X.
(ii) (Z, ∗) is a topological group.
6
BERNAL, CONEJERO, COSTAKIS, AND SEOANE
(iii) The mappings u ∈ Z 7→ uk ∈ Z (k ∈ N) are onto homeomorphisms.
(iv) No nonempty relatively open subset of Z is contained in a countable dimensional vector subspace of X.
Then for each residual subset R of Z there exists a subset G ⊂ Z satisfying the
following properties:
(a) G is a subgroup of Z.
(b) G is dense in Z.
(c) R ⊃ G \ {e}, where e denotes the unit element of X.
(d) G is infinitely generated in a strong sense, namely, the algebra generated
by G is infinitely generated.
Proof. By Alexandroff’s theorem and by the fact that X is a separable F-space,
we have (thanks to (i)) that Z is a completely metrizable space that, in addition,
is second-countable. Then Z is a Baire space and there is a countable open basis
{Gn }n≥1 for the topology of Z. From (ii) and (iii) one takes out that every
mapping Ψk : u ∈ Z 7→ uk ∈ Z (k ∈ Z \ {0}) is an onto homeomorphism.
Moreover, it follows from (ii) that, for every v ∈ Z, the multiplication mapping
Mv : u ∈ Z 7→ v ∗ u ∈ Z is also an onto homeomorphism.
Fix a residual subset R of Z. Then, for each k ∈ Z \ {0}, the set Ψ−1
k (R) is
residual in Z. Then the countable intersection
\
R0 :=
Ψ−1
k (R)
k∈Z\{0}
is also residual –and, in particular, dense– in Z. Let us set L0 := span{e}, which
equals the algebra generated by e. Since L0 is a finite dimensional subspace, it is
closed in X. Then G1 \ L0 is a nonempty (otherwise, G1 ⊂ L0 , contradicting (iv))
open set in the topology of Z. Then there exists v1 ∈ G1 ∩ R0 .
Let us proceed by induction. Assume that, for some n ∈ N, the vectors v1 , . . . , vn
have been selected. Let Ln denote the linear algebra generated by v0 , v1 , . . . , vn ,
that is, Ln = span{v1jn ∗ · · · ∗ vnjn : (j1 , . . . , jn ) ∈ Nn0 }, where N0 := N ∪ {0}.
Observe that Ln is a countable dimensional vector subspace of X. Since X is a
Baire space, if follows that Ln is an Fσ set with empty interior. Now, we set
\
\
−1
−1
M k1
Rn :=
Ψk
kn (R) .
k∈Z\{0}
(k1 ,...,kn )∈Zn
v1 ∗···∗vn
Observe that the choice (k1 , . . . , kn ) = (0, . . . , 0) gives Rn ⊂ R0 . Since the Ψk ’s
as well as the M −1
k1
kn ’s are onto homeomorphisms and countable intersections
v1 ∗···∗vn
of residual sets are residual, we get that each Rn is residual in Z. Assume, by
way of contradiction, that Gn+1 \ Ln is of first category (in the sense of Baire) in
Z. Then Gn+1 = (Gn+1 \ Ln ) ∪ (Gn+1 ∩ Ln ) and, by the assumption (iv), Ln ∩ Z
is a (relatively Fσ ) set with empty interior in Z, so of first category in Z. This
HYPERCYCLIC FUNCTIONS FOR CONVOLUTION OPERATOS
7
implies that its subset Gn+1 ∩Ln is also of first category in Z, hence Gn+1 is, which
is absurd because Z is a Baire space. Thus, Gn+1 \ Ln is of second category (in
the sense of Baire) in Z. As Rn is residual in Z, we have Rn ∩ (Gn+1 \ Ln ) 6= ∅.
Therefore, we can select vn+1 ∈ Rn ∩ (Gn+1 \ Ln ) and the induction procedure is
finished.
Define G as the group generated by {vn }n∈N , that is
G = v1k1 ∗ · · · ∗ vnkn : (k1 , . . . , kn ) ∈ Zn , n ∈ N .
Since each vn belongs to Z and vn ∈ Gn (n ∈ N), we obtain conclusions (a) and
(b). Property (c) is derived from the fact that, by construction, each combination
v1k1 ∗ · · · ∗ vnkn ∈ R as soon as (k1 , . . . , kn ) ∈ Zn \ {(0, . . . , 0)}. Finally, S
property
(d) is true because the algebra generated by G contains the algebra A := n≥0 Ln ,
and A is infinitely generated. Indeed, assume that A is generated by some finite
subset F ⊂ A. Since Ln ⊂ Ln+1 (n ≥ 0), there is N ∈ N such that F ⊂ LN .
Then LN generates A. But LN is itself an algebra, so A = LN , which is absurd
because vN +1 ∈ A \ LN . Hence A cannot be finitely generated, which concludes
the proof.
Theorem 3.3. Assume that Φ is a nonconstant entire function of subexponential type. Consider the convolution operator T = Φ(D) associated to Φ. Then
there exists an infinitely generated multiplicative group G ⊂ H(C) such that every
member of G –except for 1– is Φ(D)-hypercyclic. Moreover, G is a dense subgroup
H(C)
of e+,0 and the algebra generated by G is infinitely generated.
Proof. It suffices to apply Theorem 3.2 with the following “characters”: Take X :=
H(C)
H(C), Z := e+,0 , ∗ := the usual multiplication, e := 1 and R := HC(Φ(D)) ∩
H(C)
e+,0 . Now, Z is a topological group for which the mappings f 7→ f k (k ∈ N) are
onto homeomorphisms by Lemma 2.2, Z is a Gδ subset of X by Lemma 2.1, and
R is residual in Z by Proposition 3.1.
H(C)
Now, assume that O is a nonempty open subset in e+,0 and that, by way of
contradiction, Y is a countable dimensional space of H(C) with O ⊂ Y . Then
span{hn }n≥1 =
SY for certain hn ∈ H(C) (n ≥ 1). Setting Yn := span{h1 , . . . , hn }
we get Y = n≥1 Yn . But each Yn is a finite dimensional subspace, hence σcompact, and so Y is. In other words, there are countably many compact sets
S
H(C)
H(C)
Kn ⊂ e+,0 (n ∈ N) such that Y = n≥1 Kn . Therefore each set Zn := e+,0 ∩
S
H(C)
H(C)
Kn is compact (hence closed) in e+,0 and O ⊂ n≥1 Zn . Since e+,0 is a
completely metrizable space, Baire’s category theorem tells us that at least one
H(C)
H(C)
Zm has nonempty interior in e+,0 . Now, the group structure of e+,0 entails that
H(C)
the function 1 possesses a compact neighborhood W in e+,0 .
Now, consider the vector space S := {g ∈ H(C) : Im g(0) = 0} endowed
with the topology inherited from H(C). Trivially, S is a topological group for the
8
BERNAL, CONEJERO, COSTAKIS, AND SEOANE
H(C)
operation “+” and the same topology. For every f ∈ e+,0 there is a unique g ∈ S
H(C)
such that f = eg . Hence the mapping T : f = eg ∈ (e+,0 , ·) 7→ g ∈ (S, +) is an
algebraic group isomorphism. But it is in fact a topological isomorphism. Indeed,
T −1 : g 7→ eg is trivially continuous (any superposition mapping g ∈ H(C) 7→
ϕ ◦ g ∈ H(C), with ϕ ∈ H(C), is continuous), and T is continuous because it is
continuous at the neutral element 1. This means that if a sequence (fn = egn ) ⊂
H(C)
e+,0 (with gn = un + ivn ∈ S, so that vn (0) = 0 for all n) satisfies fn → 1 then
gn = un + ivn = T (fn ) → T (1) = 0 uniformly on compacta. This, in turn, follows
by invoking the continuity of the principal branch logp w := ln |w| + i argp w of
the logarithm on C \ (−∞, 0]. Indeed, since 1 ∈ C \ (−∞, 0], for given R > 0
we have that fn (K) ⊂ C \ (−∞, 0] eventually, where K = {z : |z| ≤ R}. Then
logp (fn ) → logp 1 = 0 uniformly on K. But logp (fn (z)) = un (z) + i argp (eivn (z) ) =
un (z) + i(vn (z) + 2kn π) for certain kn ∈ Z not depending on z. Hence un → 0 and
vn + 2kn π → 0 uniformly on K. In particular, 2kn π = vn (0) + 2kn π → 0, so kn → 0
and, since kn ∈ Z, we get kn = 0 eventually. This implies vn → 0 uniformly on
K, and so does gn = un + ivn as n → ∞, as required. We have proved that T
is a homeomorphism. Thus T (W ) is a compact neighborhood of 0 in S. But
Riesz’s theorem (see, e.g., [22, page 147, Theorem 3]) implies that dim (S) < ∞,
which is absurd because S contains all functions z n (n ∈ N). This is the desired
contradiction.
Hence O is not contained in any countable dimensional subspace of H(C). Consequently, conditions (i)–(iv) in Theorem 3.2 are fulfilled and the conclusion follows.
Another important class of operators is the one formed by the composition
operators. If G ⊂ C is a domain and ϕ : G → G is a holomorphic self-map of G,
the mapping
Cϕ : f ∈ (G) 7→ f ◦ ϕ ∈ H(G)
is well defined, linear and continuous, and it is called the composition operator
with symbol ϕ. By Aut(G) we denote the group of automorphisms of G, i.e., the
family of all bijective holomorphic functions G → G. The translations τa (a ∈ C)
form a special instance when G = C and ϕ(z) := z + a. We have already seen
that, even for translations, the set of hypercyclic functions is not stable under
products (f 2 is never τa -hypercyclic, whatever f is). Nevertheless, we obtain a
reasonably degree of stability if the products do not allow repetition of factors.
This can be done for many composition operators, as the following theorem –with
which we conclude this paper– shows. Recall that a domain G ⊂ C is called simply
connected if it lacks holes, that is, if C∞ \ G is connected.
Theorem 3.4. Let G ⊂ C be a simply connected domain. Assume that ϕ ∈
Aut(G) and ϕ has no fixed points. Then for every f ∈ HC(Cϕ ) there is a family
F ⊂ H(G) satisfying the following properties:
HYPERCYCLIC FUNCTIONS FOR CONVOLUTION OPERATOS
(a)
(b)
(c)
(d)
9
f ∈ F ⊂ HC(Cϕ ).
F is dense in H(G).
Q
For each finite nonempty subfamily F0 ⊂ F , one has g∈F0 g ∈ HC(Cϕ ).
F is a linearly free system.
Proof. Since ϕ has no fixed points, the operator Cϕ is mixing (see [20, Theorem
4.37]). In the context of F-spaces (as H(G) is), this is equivalent to the fact
that, for every (strictly increasing) subsequence (nk ) ⊂ N, the set U((Cϕnk )) of
functions having dense (Cϕnk )-orbit is dense (even residual) in H(G). Of course,
mixing property implies hypercyclicity. Observe that (Cϕ )m = Cϕm for m ∈ N,
where ϕ1 := ϕ and ϕm+1 := ϕ ◦ ϕm .
Fix f ∈ HC(Cϕ ) as well as a countable topological basis (Gn ) for the topology
of H(G) (recall that H(G) is metrizable and separable, hence second countable).
We set f0 := f and G0 := H(G). Then there is a sequence (p(1, k)) ⊂ N such that
f0 ◦ ϕp(1,k) → 1 (k → ∞) uniformly on each compact subset of G. Since the set
p(1,k)
p(1,k)
U((Cϕ )) is dense in H(G), there exists f1 ∈ G1 ∩ U((Cϕ )). In particular, for
the constant function z 7→ 1, there is a subsequence (p(2, k)) ⊂ (p(1, k)) satisfying
f1 ◦ ϕp(2,k) → 1 (k → ∞) in H(G). Of course, f0 ◦ ϕp(2,k) → 1 in H(G).
By following this procedure, we can obtain recursively a countable family F :=
{fn }n≥0 ⊂ H(G) as a well as countable family {(p(n, k))k≥1 }n≥0 of strictly increasing sequences of natural numbers, satisfying, for each n ≥ 0, the following:
p(n,k)
• fn ∈ Gn ∩ U((Cϕ
)),
• (p(n + 1, k)) ⊂ (p(n, k)), and
• fj ◦ ϕp(n+1,k) → 1 (k → ∞) in H(G) for all j = 0, . . . , n.
Since (Gn ) is a topological basis and fn ∈ Gn , the set F is dense in H(G).
p(n,k)
By construction, f ∈ F and, since HC(Cϕ ) ⊃ U((Cϕ
)) for every n, we get
F ⊂ HC(Cϕ ). Now, if ∅ 6= F0 ⊂ F with F0 finite, we can write F0 =
{fm(1) , . . . , fm(N ) }, with 0 ≤ m(1) < m(2) < · · · < m(N). Let
h :=
Y
g∈F0
g=
N
Y
fm(j) .
j=1
Trivially, h ∈ HC(Cϕ ) if N = 1. If N > 1 then h = h0 · fm(N ) , where h0 :=
QN −1
p(m(N ),k)
)), there is a subsequence
j=1 fm(j) . Fix F ∈ H(G). As fm(N ) ∈ U((Cϕ
(νk ) ⊂ (p(m(N), k)) such that fm(N ) ◦ ϕνk → F (k → ∞) uniformly on compacta
in G. But fm(j) ◦ ϕνk → 1 (k → ∞) uniformly on compacta in G for each
j ∈ {1, . . . , N − 1}. This entails h0 ◦ ϕνk → 1 in H(G). Thus
h ◦ ϕνk = (h0 ◦ ϕνk ) · (fm(N ) ◦ ϕνk ) −→ 1 · F = F in H(G).
Consequently, h ∈ HC(Cϕ ). So far, (a), (b) and (c) have been proved.
10
BERNAL, CONEJERO, COSTAKIS, AND SEOANE
In order to prove (d), assume, by way of contradiction, that there is some Ntuple (c0 , c1 , . . . , cN ) ∈ CN +1 \ {(0, . . . , 0)} such that c0 f0 + · · · + cN fN = 0, where,
without loss of generality, we can suppose cN 6= 0. Then c0 (f0 ◦ ϕp(N,k) ) + · · · +
cN (fN ◦ ϕp(N,k) ) = 0 for all k ≥ 1. Letting k → ∞ we get c0 · 1 + · · · + cN −1 · 1 +
cN (fN ◦ ϕp(N,k) ) → 0, so
fN ◦ ϕ
p(N,k)
−→ −
N
−1
X
cj c−1
in H(G) as k → ∞,
N
j=0
which is absurd because {fN ◦ ϕp(N,k) }k≥1 is dense in H(G). The theorem is now
totally proved.
Acknowledgments.
The authors are indebted to the referee for helpful comments and suggestions,
specially for nice simplifications of the proofs of some results.
The first author has been supported by the Plan Andaluz de Investigación
de la Junta de Andalucı́a FQM-127 Grant P08-FQM-03543 and by MEC Grant
MTM2015-65242-C2-1-P. The second author has been supported by MEC Grant
MTM2016-75963-P. The second and third authors were also supported by Generalitat Valenciana, Project GV/2010/091, and by Universitat Politècnica de València,
Project PAID-06-09-2932. The fourth author has been supported by Grant MTM201565825-P.
References
[1] L. V. Ahlfors, Complex Analysis, 3rd ed., McGraw-Hill, London, 1979.
[2] R. M. Aron, L. Bernal-González, D. Pellegrino, and J. B. Seoane-Sepúlveda, Lineability:
The search for linearity in Mathematics, Monographs and Research Notes in Mathematics,
Chapman & Hall/CRC, Boca Raton, FL, 2016.
[3] R. M. Aron, J. A. Conejero, A. Peris, and J. B. Seoane-Sepúlveda, Powers of hypercyclic
functions for some classical hypercyclic operators, Integr. Equ. Oper. Theory 58 (2007),
no. 4, 591–596.
[4] R. M. Aron, J. A Conejero, A. Peris, and J. B. Seoane-Sepulveda, Sums and products of bad
functions, Contemporary Mathematics 435 (2007), 47–52.
[5] R. M. Aron, V. I. Gurariy, and J. B. Seoane-Sepúlveda, Lineability and spaceability of sets
of functions on R, Proc. Amer. Math. Soc. 133 (2005), no. 3, 795–803.
[6] F. Bayart and E. Matheron, Dynamics of Linear Operators, Cambridge Tracts in Mathematics, Cambridge University Press, 2009.
[7] C. A. Berenstein and R. Gay, Complex analysis and special topics in harmonic analysis,
Springer, New York, 1995.
[8] L. Bernal-González, On universal functions with zero-free derivatives, Arch. Math. 68
(1997), 145–150.
, Hypercyclic sequences of differential and antidifferential operators, J. Approx. The[9]
ory 96 (1999), 323–337.
[10] L. Bernal-González, A. Bonilla, and G. Costakis, On the growth of zero-free MacLaneuniversal entire functions, Indag. Math. 23 (2012), 311–317.
HYPERCYCLIC FUNCTIONS FOR CONVOLUTION OPERATOS
11
[11] L. Bernal-González, D. Pellegrino, and J. B. Seoane-Sepúlveda, Linear subsets of nonlinear
sets in topological vector spaces, Bull. Amer. Math. Soc. (N.S.) 51 (2014), no. 1, 71–130.
[12] J. Bès, J. A. Conejero, and D. Papathanasiou, Convolution operators supporting hypercyclic
algebras, J. Math. Anal. Appl. 445 (2017), no. 2, 1232–1238.
, Hypercyclic algebras for convolution and composition operators, Preprint (2017).
[13]
[14] R. P. Boas Jr., Entire functions, Academic Press, New York, 1954.
[15] D. Cariello and J. B. Seoane-Sepúlveda, Basic sequences and spaceability in ℓp spaces, J.
Funct. Anal. 266 (2014), no. 6, 3797–3814, DOI 10.1016/j.jfa.2013.12.011.
[16] J. P. R. Christensen., Topology and Borel structure, North Holland, Amsterdam, 1974.
[17] P. H. Enflo, V. I. Gurariy, and J. B. Seoane-Sepúlveda, Some results and open questions on
spaceability in function spaces, Trans. Amer. Math. Soc. 366 (2014), no. 2, 611–625.
[18] G. Godefroy and J. H. Shapiro, Operators with dense, invariant, cyclic vectors manifolds,
J. Funct. Anal. 98 (1991), no. 2, 229–269.
[19] K.-G. Grosse-Erdmann, On the universal functions of G.R. MacLane, Complex Variables
and Elliptic Equations 15 (1990), no. 3, 193–196.
[20] K.-G. Grosse-Erdmann and A. Peris, Linear Chaos, Springer, London, 2011.
[21] G. Herzog, On zero-free universal entire functions, Arch. Math. 63 (1994), 329–332.
[22] J. Horváth, Topological vector spaces and distributions, Vol. I, Addison-Wesley, Reading,
Massachusetts, 1966.
[23] N. G. Markley, Topological Groups: An Introduction, Wiley, NJ, 2010.
[24] Q. Menet, Hypercyclic subspaces and weighted shifts, Adv. Math. 255 (2014), 305–337.
[25] A. Montes-Rodrı́guez, Banach spaces of hypercyclic vectors, Michigan Math. J. 43 (1996),
no. 3, 419–436.
[26] J. R. Munkres, Topology: A First Course, 2nd ed., Prentice-Hall Inc., Upper Saddle River,
NJ, 2000.
[27] J. C. Oxtoby, Measure and Category, 2nd edition, Springer-Verlag, New York, 1980.
[28] H. Petersson, Hypercyclic subspaces for Fréchet spaces operators, J. Math. Anal. Appl. 319
(2006), no. 2, 764–782.
[29] J. B. Seoane-Sepúlveda, Chaos and lineability of pathological phenomena in analysis, ProQuest LLC, Ann Arbor, MI, 2006. Thesis (Ph.D.)–Kent State University.
, Explicit constructions of dense common hypercyclic subspaces, Publ. Res. Inst.
[30]
Math. Sci. 43 (2007), no. 2, 373–384.
[31] S. A. Shkarin, On the growth of D-universal functions, On the growth of D-universal functions 48 (1993), no. 6, 49–51.
[32] S. Shkarin, On the set of hypercyclic vectors for the differentiation operator, Israel J. Math.
180 (2010), no. 1, 271–283.
[33] J. Wengenroth, Hypercyclic operators on nonlocally convex spaces, Proc. Amer. Math. Soc.
131 (2003), no. 6, 1759–1761.
12
BERNAL, CONEJERO, COSTAKIS, AND SEOANE
Departamento de Análisis Matemático,
Facultad de Matemáticas, Universidad de Sevilla,
Avenida Reina Mercedes,
41080 Sevilla, Spain.
E-mail address: [email protected]
Instituto Universitario de Matemática Pura y Aplicada,
Universitat Politècnica de València,
46022 València, Spain.
E-mail address: [email protected]
Department of Mathematics and Applied Mathematics,
University of Crete, Voutes Campus,
70013 Heraklion, Crete, Greece.
E-mail address: [email protected]
IMI and Departamento de Análisis Matemático,
Facultad de Ciencias Matemáticas,
Plaza de Ciencias 3,
Universidad Complutense de Madrid,
28040 Madrid, Spain.
E-mail address: [email protected]
| 4math.GR
|
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.